搜索:encryption+algorithm

找到约 1,353 项符合「encryption+algorithm」的查询结果

结果 1,353
按分类筛选
显示更多分类
https://www.eeworm.com/dl/678/438432.html 系统设计方案

This article describes how to build simple audio spectrum analyzer based on FFT algorithm using Phi

This article describes how to build simple audio spectrum analyzer based on FFT algorithm using Philips LPC2138 microcontroller.
下载 110
·
查看 1062
https://www.eeworm.com/dl/637/438778.html 多国语言处理

CRFsuite is a very fast implmentation of the Conditional Random Fields (CRF) algorithm. It handles t

CRFsuite is a very fast implmentation of the Conditional Random Fields (CRF) algorithm. It handles tens of thousands sentences in merely one second. In comparison to CRF++, CRFSuite yields substantially better efficiency performance
下载 131
·
查看 1157
https://www.eeworm.com/dl/665/439513.html matlab例程

AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yo

AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files 1. ADABOOST_tr.m 2. ADABOOST_te.m to traing and test a user-coded learning (classification) algorithm with ...
下载 159
·
查看 1120
https://www.eeworm.com/dl/650/439518.html 人工智能/神经网络

AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yo

AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files
下载 80
·
查看 1077
https://www.eeworm.com/dl/665/440163.html matlab例程

Matlab script for solution to the driven cavity problem using the FDS algorithm, which discretizes t

Matlab script for solution to the driven cavity problem using the FDS algorithm, which discretizes the Stokes form of the Navier-Stokes equations.
下载 56
·
查看 1138
https://www.eeworm.com/dl/542/440172.html 其他书籍

SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384,

SHA Hash algorithm. This standard specifies four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA- 512.
下载 187
·
查看 1070
https://www.eeworm.com/dl/519/387672.html 加密解密

The MD5 Message-Digest Algorithm Status of this Memo This memo provides information for the I

The MD5 Message-Digest Algorithm Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Acknowlegements We would like to thank Don Coppersmith, Burt Kaliski, Ralph Me ...
下载 167
·
查看 1092
https://www.eeworm.com/dl/637/388927.html 多国语言处理

n algorithm for domain independent linear text segmentation This the Windows version of the C99 al

n algorithm for domain independent linear text segmentation This the Windows version of the C99 algorithm that was presented in my NAACL00 paper. [Directories] bin contains executables, JAR file and test files classes compiled code as individual class files doc NAACL 00 pape ...
下载 192
·
查看 1100
https://www.eeworm.com/dl/650/311739.html 人工智能/神经网络

Theory of Genetic Algorithm 遗传算法理论 国外网站下载

Theory of Genetic Algorithm 遗传算法理论 国外网站下载,希望能有所帮助
下载 60
·
查看 1042
https://www.eeworm.com/dl/684/314998.html 软件设计/软件工程

In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containi

In this paper, we present LOADED, an algorithm for outlier detection in evolving data sets containing both continuous and categorical attributes. LOADED is a tunable algorithm, wherein one can trade off computation for accuracy so that domain-specific response times are achieved. ...
下载 149
·
查看 1095