In each step the LZSS algorithm sends either a character or a <position, length> pair. Among these, perhaps character "e" appears more frequentl...
📅 2014-01-27
👤 wang0123456789
在程序中由playfair(char *s,int length) 的实现加密和解密;解密原理与加密类似,只是加密过程的逆过程,它基于密文,采用同行取左边,同列取下边,其余取交叉的相反原理;在程序中用FLAG标识区别,当其值为1时,为加密过程;值为0时,为解密过程。...
📅 2014-01-25
👤 busterman
*
* Input
* bin_data : binary data
* bin_size : binary data length
* Mode : operation mode
* BASE64_NeedCRLF ---- Need a CRLF every 64 base6...
📅 2015-06-04
👤 ZJX5201314
The Reed-Somolon code is specified by the finite field, the length
(length <= 2^m-1), the number of redundant symbols (length-k), and
the initi...
📅 2014-07-31
👤 skfreeman
工程计算MATLAB code to calculate the reorthogonalized sine tapers
input: N = the length of the time series data to be tapered
p = the number of taper...
📅 2013-12-17
👤 wangyi39