搜索:encryption+algorithm

找到约 1,353 项符合「encryption+algorithm」的查询结果

结果 1,353
按分类筛选
显示更多分类
https://www.eeworm.com/dl/665/216492.html matlab例程

New matching pursuit-based algorithm for SNR improvement in ultrasonic NDT (signal process 中的文章

New matching pursuit-based algorithm for SNR improvement in ultrasonic NDT (signal process 中的文章,mp去噪)
下载 151
·
查看 1169
https://www.eeworm.com/dl/619/171810.html Linux/Unix编程

The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequence

The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the largest correlation metric. Presently, only 8-PSK modulat ...
下载 175
·
查看 1118
https://www.eeworm.com/dl/519/206918.html 加密解密

Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina

Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现!
下载 93
·
查看 1186
https://www.eeworm.com/dl/650/200938.html 人工智能/神经网络

This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your pr

This a A* pathfinding example to illustrate how to implement a A* pathfinding algorithm into your program. It s a port from Patrick Lesters example in BlitzBasic to VB.Net. It uses a Binary Heap class I made to sort the score values.
下载 173
·
查看 1088
https://www.eeworm.com/dl/658/187942.html STL

implement huffman algorithm with stl priority-queue, first you must have the file, then the result i

implement huffman algorithm with stl priority-queue, first you must have the file, then the result is saved
下载 42
·
查看 1118
https://www.eeworm.com/dl/650/343494.html 人工智能/神经网络

he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood form

he algorithm is equivalent to Infomax by Bell and Sejnowski 1995 [1] using a maximum likelihood formulation. No noise is assumed and the number of observations must equal the number of sources. The BFGS method [2] is used for optimization. The number of independent components a ...
下载 120
·
查看 1116
https://www.eeworm.com/dl/519/304536.html 加密解密

Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++.

Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++. Requirements You do this lab in a group of two students. Your program should have input and output as follows: csci>a.out --> Please input the key: receptive --> Please input the ...
下载 67
·
查看 1099
https://www.eeworm.com/dl/665/305243.html matlab例程

The FastICA package is a free (GPL) MATLAB program that implements the fast fixed-point algorithm fo

The FastICA package is a free (GPL) MATLAB program that implements the fast fixed-point algorithm for independent component analysis and projection pursuit. It features an easy-to-use graphical user interface, and a computationally powerful algorithm.
下载 87
·
查看 1103
https://www.eeworm.com/dl/519/438207.html 加密解密

This method is based upon the image hiding technic into another image using LSB algorithm called as

This method is based upon the image hiding technic into another image using LSB algorithm called as Steganography.
下载 162
·
查看 1076
https://www.eeworm.com/dl/665/371771.html matlab例程

PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A componen

PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficient ...
下载 169
·
查看 1099