搜索资源列表
xinyongkashujufenxixitong
- 信用卡数据分析系统,很优秀的一篇设计文章,网上收集整理.-Credit card data analysis systems, designed a very good article, on-line collection.
xinyongkashujufenxi
- 收集到的,信用卡数据分析系统设计文档,质量很高!-Collected, credit card data analysis system design documents, high quality!
PA1100-datasheet-V1.0.rar
- 磁头解码芯片PA1100特性: 1、支持单、双、三轨磁条卡解码; 2、内置RAM缓存数据; 2、使用简单,无需外部阻容; 4、支持正反向刷卡; 5、支持自动增益; 6、超低功耗,读卡电流小于800uA,休眠电流小于1uA; 7、读卡速度5-254cm/秒; 8、读卡强度30 -200 ISO7811标准; 9、采用shift-out串行接口; 10、2.7~3.3V供电; 11、多种封装。 ,Chip
RFID
- RFID stands for Radio-Frequency IDentification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same p
does-ML-really-work-TOM-MITCHELL
- Does machine learning really work? Yes. Over the past decade, machine learning has evolved from a field of laboratory demonstrations to a field of significant commercial value. Machine-learning algorithms have now learned to detect credit car
Application-of-debit-credit-card
- 借记贷记应用卡片规范,将IC卡的内部功能和各种格式的数据,分析详细-Application of debit credit card IC card specification, the internal functions and data in various formats, detailed analysis
Debit-credit-terminal-specification
- 借记贷记应用卡片规范,将IC卡的内部功能和各种格式的数据,分析详细-Application of debit credit card IC card specification, the internal functions and data in various formats, detailed analysis
Safety-Specification-for-credit
- 借记贷记应用卡片规范,将IC卡的内部功能和各种格式的数据,分析详细-Application of debit credit card IC card specification, the internal functions and data in various formats, detailed analysis
Terminal-interface-specification
- 借记贷记应用卡片规范,将IC卡的内部功能和各种格式的数据,分析详细-Application of debit credit card IC card specification, the internal functions and data in various formats, detailed analysis
Practical Attacks on the MIFARE Classic
- The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers h