Explore chapters and articles related to this topic
Basics of Fortran
Published in Caio Lima Firme, Quantum Mechanics, 2022
The following paragraphs are related with the use of Fortran in Windows platform. All programs used in this book are five. We have used Force 2.0.9. editor from ‘Force Fortran The Force Project’ (http://forcelepsch.com/) to write our source codes in .f extension (a type of Fortran file for the source code). In order to transform the source code into executable program we have used MinGW (Minimalist GNU for Windows) compiler (http://www.mingw.org/) along with MSYS (MinimalSystem) program. The MSYS program is used to create a Linux Shell statement line (MinGW Shell) interpreter system (a sort of Linux-based shell within the Windows platform) in order to transform the source code into an executable file and to run the corresponding executable program. See the instructions for installation of the MinGW site.
Faster, Further
Published in José Guillermo Sánchez León, ® Beyond Mathematics, 2017
These techniques require the presence of a C compiler in the computer. (CCompilerDriver/tutorial/Overview). For 32-bit systems, an option is to install Visual C++ Express, a Microsoft application that can be downloaded for free from: http://www.microsoft.com/visualstudio. In case of 64-bit systems, one option is to install the 64-bit version of MinGW (http://mingw-w64.sourceforge.net). In our case we have downloaded mingw-w64-bin_i686-mingw_20111220 and copied it to the folder C:\mingw.
A Fast Image Encryption Algorithm Based on Convolution Operation
Published in IETE Journal of Research, 2019
The computer used is configured with Intel(R) Core(TM) i7-4720HQ [email protected] GHz, 8 GB DDR3 RAM, Windows 10(64-bit), MATLAB 9.0 and Eclipse C/C++ with MinGW GCC Tool Chain. The images used in the test are Lena, Baboon, Pepper, all-black and all-white images all of size 512 × 512, as shown in Figure 4(a–e). Without loss of generality, the simulation uses the secret key K = {989209, 340466, 336436, 110955, 421653, 100976, 24776, 527877, 201612, 865082, 563081, 647203, 163613, 794037, 462583}. With the image cryptosystem shown in Figure 3, the plain images as shown in Figure 4(a–e) are encrypted into the cipher images, as shown in Figure 4(f–j), respectively, and the cipher images in Figure 4(f–j) are decrypted into the original images, as shown in Figure 4(k–o), respectively.