|
cmk wrote: FSIN, FCOS, FSINCOS, FPTAN : ~17-140
At least that wasn't the specs I saw when I first got my 80386 about 16 years ago (it was really hideous) :->
"Real programmers just throw a bunch of 1s and 0s at the computer to see what sticks" - Pete O'Hanlon
|
|
|
|
|
remember the 386 had to do each flop in software as well because it didn't have an FPU, so you were taking a double hit there.
--
If you view money as inherently evil, I view it as my duty to assist in making you more virtuous.
|
|
|
|
|
My 386 had a math co-processor with it Made a big difference.
"Real programmers just throw a bunch of 1s and 0s at the computer to see what sticks" - Pete O'Hanlon
|
|
|
|
|
you only mentioned a 386 not a 387
--
If you view money as inherently evil, I view it as my duty to assist in making you more virtuous.
|
|
|
|
|
My bad I had a 386DX-25mhz to be exact. 4 megs of ram and an 80meg harddrive. Thought I was pretty slick back then :->
"Real programmers just throw a bunch of 1s and 0s at the computer to see what sticks" - Pete O'Hanlon
|
|
|
|
|
I wish I could find it right now...
For each computer I got (from 8088 up until a Pentium-Pro) I used to update a table where I showed the speed of all the trig functions along with mul and div. It was quite amusing to see how they sped up through the years. If I find it in the next couple of days, I'll post it up here....
'droid
|
|
|
|
|
Thanks everybody for the help. Wow it's suprising that division is that much slower than multiplication and sqrt is only double division. Interesting.
|
|
|
|
|
Here are some interesting benchmarks of the Intel vector maths library - shows what can be achieved if the code can be vectorized; VML Performance[^]
Peter
"Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."
|
|
|
|
|
Hi Mike,
the other replies gave an impression of what you might be able to get, not of what you
will actually get. The only way to know is to measure it! And what you get may well vary by
CPU type, and application characteristics (float/double, integer/float balance, ...).
Luc Pattyn [Forum Guidelines] [My Articles]
this months tips:
- use PRE tags to preserve formatting when showing multi-line code snippets
- before you ask a question here, search CodeProject, then Google
|
|
|
|
|
I'm surprised no one mentioned this, but you can precompute the trig functions and build a lookup table. The lookup is faster than the computation.
There's a tradeoff between the size of your table and precision.
For values between two lookup table entries you can use a weighted sum to improve precision.
|
|
|
|
|
You can use approximate calculation instead. For example: sin(x) = x-(1/2)x^2+...
This works for x near 0 !!!
|
|
|
|
|
hey can any one give me an algorithim on comparing two pictures
|
|
|
|
|
public static bool ImagesEqual(image1, image2) {
if (wid1!=wid2) return false;
if (hei1!=hei2) return false;
if (crc1!=crc2) return false;
foreach(PixelPair p1,p2 in image1,image2) if (p1!=p2) return false;
return true;
}
Luc Pattyn [Forum Guidelines] [My Articles]
this months tips:
- use PRE tags to preserve formatting when showing multi-line code snippets
- before you ask a question here, search CodeProject, then Google
|
|
|
|
|
Would use XOR functions ( blend with XOR , I think its possible with GDI images ... I used it some time ago to overlay two biztmaps to see where tehre is a differnce )
|
|
|
|
|
Hi,
it depends what you like to match. If the pictures need to be exactly == binary identical, you could just use a md5 checksum, or something like this.
If you want to search for "similar" pictures e.g. showing the same thing but scaled (image for email, etc. ) then you could use a cooccourence matrix over the colors in the image.
If you want to check also if the contrast was changed then you need an even more elaborate algorithm, maybe doing a color histogram and then do a cross correllation. But these are only ideas...
Regards,
Tobias
|
|
|
|
|
I have only 0...256 input in decimal. Some of readers they have knew my matter. I have explain it many time in this site. But still in the trouble. Could not decide it. I think about if the input one number is inside 256 then it would be search easy without any encryption. That is really trouble. Other's word on this matter is about think it much and search it. It would be had a method to survive this problem. I have thought this and researched on the matter then result it nothing then i have thought my cryptography algorithm without long number of the initial input, it would be easy work and can't keep as security better. If it is rose the work, which is that input number size would be extended, then it would be another huge work. this work request Not only me but also another people would be handle it then can decide the long input. Therefore i would like to survive my matter without extending input number. Extending input number means Initial number from other side would be extended there, not inside my algorithm. That is my good idea but i can't decide it easily. Would like to listen first other's important idea for this matter.
I think that professional people who are working on the cryptography and security for long time, they've got expirence and knew how to decide it.
I'm really glad if any good idea for this matter
Thank you
Professional people they almost be ready for any risk and know how to resolve when they got it.
|
|
|
|
|
It is really hard to work out what you are trying to do. Sometimes you seem to have an 8 bit key - which suggests that you will have no hope of avoiding any sort of brute force attack, whereas at other times it seems that the message that you are encoding is only 8 bits.
If you are encoding only 8 bits, potentially you have only 256 possible messages, so an eavesdropper can determine, for example, if the same message is sent. The traditional way around this is to salt the message by appending a random number. As an example, to send 8 bits, add 56 random bits, then encode the resulting 64 bit message. Repeated messages with the same 8 message bits would be different and brute force searching becomes more complex.
Peter
"Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."
|
|
|
|
|
Yes your right. I need to tell more about my algorithm. The algorithm has done on the input 8 bits and encrypted output 16-32 bytes, which are included bit Expansion, Inversion and Substitution operations.It is ready more complicated correlation between initial and converted data. Other words, it means that 8 bits input data became 128-256 bits ready. If you have another idea or i thought different idea from your idea, please could you make your idea more clearify? I need to know what your means. maybe it is important.
Thank you
|
|
|
|
|
I have found Diffie-Hellman_key_exchange protocol ready and wanted to use it in my new algorithm but is that best one in the key exchange protocols? I need to make sure that protocol is suit for 32 bytes of the 8 bits key exchange before i use it in my algorithm. Most of the literature said that cryptographic algorithm could be good and perfect strength but using key exchange protocol should be enough strong security as the algorithm strong then whole algorithm can be said complete powerful one.
Please share me if you know about key exchange secret protocols. Which one is better to use it? My key generator is based one the 8 bits key. Algorithm input is 8 bits and output 32 bytes. Suggest me any thing else?
Thank you
|
|
|
|
|
I don't understand how you can expect any sort of credible security using an 8 bit key - there are only 256 different keys to try so an exhaustive search would be trivial. Diffie-Hellman has a good reputation as a key exchange algorithm, and is used in many standard security protocols. You need to ensure that you use large numbers or else the algorithm can be inverted. I'd suggest you read Applied Cryptography[^]
Peter
"Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."
|
|
|
|
|
Yes. Peter That is good book. I'll do. So I think you need to know my problem first then you may say me what to do. I have only stable 0...256 number in decimal for input. That can be converted into the binary as one byte. Mission is keep security. I have gotten same idea with you since i saw it first time. This only 256 keys. Anyone can find it. In this case, how can i keep the security? Maybe you suggest me not only cryptography but also another thing to use it? If you have any idea please share me. I'm still in the trouble because of input 0...256 in decimal. thank you
|
|
|
|
|
Good day for readers
This topic is related with patent for new creation
I have a question about new patent. If someone had creating new algorithm or equation then how the person can certify his or her algorithm or equation that is originality from him or her. There are many companies in internet for certification. But which one is really reliable and can certify the creation around the world. If any site or company for the best certification to approve new creation to the person, please share here your opinions. Your opinion is important for others, who are doing new something, and me. Certification purpose is that I'm the first person on the my new algorithm. I don't want others, who approves same thing with your creation. You know? Sometimes people are doing same thing with your creation mostly at same or at different time. Some of creators, who are doing discussing work, are cheating and stealing other's mind and technology to use it without authorization of the creator at another place from a original creator. The creator doesn't feel that. Even patent is also. Therefore i don't want others, who are doing new technical and technological novel,to repeat same thing in previous mistakes, which are about losing patent and intelligence knowledge. I hope you can share your expensive knowledge about patent and certification for new creation here if you have done something new creature before and certified that.
That your advice is not only important for me but also others who are reading this topic and doing new creation without no idea about certification.
Thank you for reading and sharing your knowledge.
Regards Bimbaa
-- modified at 11:25 Tuesday 30th October, 2007
|
|
|
|
|
I have 2 patents for an internal combustion engine design so I'll try to answer your questions. The only place that can give you a patent ultimately is the united states government. Patents have to be prepared in a very specific way. For instance you can't just send in a description of your invention, it has to be written in a way that makes you patent application a legal document and is very spefic about what you are claiming as original and various variations of your idea. If you look in the phone book (assuming you are in the US) you should be able to find the names of patent attorneys in your local. Patents are typically made public unless I think there is some sort of national security reason not publish them.
I would recommend though that you do your own patent search first though at the US patent and trademark website.http://www.uspto.gov/patft/index.html[^]. This is the best place to check since that is what patent examiners look at. But I would also check other places to be safe.
One other thing, if you don't plan to apply for a patent right away it might not be a bad idea to write up a description of your idea and get it notorized at a notary. This will give you evidence of when you invented something if a dispute happens in the future about who invented something first.
good luck,
Mike
|
|
|
|
|
MikeMarq wrote: But I would also check other places to be safe.
Such as this listing http://www.patentlawlinks.com/patoff.htm[^]
MikeMarq wrote: http://www.uspto.gov/patft/index.html[^]. This is the best place to check
One of the best no doubt, alongside those listed in my link above. But you must not restrict your searches to USA if you happen to live elsewhere.
modified 1-Aug-19 21:02pm.
|
|
|
|
|
hai all,
is it possible to find the distance in meters between the two points if i have, their longitude, latitude and height.
iam aware that, the distance between two adjacent graticules is not standatd in all the places on the earth. but, based on the height, can we do any thing?
thanks for your views.
|
|
|
|