虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

two-layer

  • Please read your package and describe it at least 40 bytes. System will automatically delete the di

    Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.

    标签: automatically describe package Please

    上传时间: 2014-01-02

    上传用户:ynsnjs

  • 伸展树

    伸展树,基本数据结构,The tree is drawn in such a way that both of the edges down from a node are the same length. This length is the minimum such that the two subtrees are separated by at least two blanks.

    标签:

    上传时间: 2017-05-07

    上传用户:JIUSHICHEN

  • AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yo

    AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files 1. ADABOOST_tr.m 2. ADABOOST_te.m to traing and test a user-coded learning (classification) algorithm with AdaBoost. A demo file (demo.m) is provided that demonstrates how these two files can be used with a classifier (basic threshold classifier) for two class classification problem.

    标签: well-known algorithm AdaBoost Adaptive

    上传时间: 2014-01-15

    上传用户:qiaoyue

  • AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yo

    AdaBoost, Adaptive Boosting, is a well-known meta machine learning algorithm that was proposed by Yoav Freund and Robert Schapire. In this project there two main files

    标签: well-known algorithm AdaBoost Adaptive

    上传时间: 2013-12-31

    上传用户:jiahao131

  • Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

    Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though. Firstly, the large number of attacks and weaknesses which appear as fast as new algorithms are proposed, emphasizes the limits of this technology and in particu-lar the fact that it may not match users expectations. Secondly, the requirements, tools and methodologies to assess the current technologies are almost non-existent. The lack of benchmarking of current algorithms is bla-tant. This confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs. Indeed basing long-lived protection schemes on badly tested watermarking technology does not make sense.

    标签: Watermarking watermarking evaluation presented

    上传时间: 2013-12-04

    上传用户:thinode

  • Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be

    Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.

    标签: videocomposite Video-DVM complex output

    上传时间: 2014-12-09

    上传用户:xuan‘nian

  • ystem will automatically delete the directory of debug and release, so please do not put files on th

    ystem will automatically delete the directory of debug and release, so please do not put files on these two directory.

    标签: automatically directory release delete

    上传时间: 2014-01-07

    上传用户:yyq123456789

  • pdf格式的英文文献

    pdf格式的英文文献,是关于认知无线电网络的,编者是加拿大桂尔夫大学的Qusay H. Mahmoud。ISBN:978-0-470-06196-1 章节内容: 1 Biologically Inspired Networking 2 The Role of Autonomic Networking in Cognitive Networks 3 Adaptive Networks 4 Self-Managing Networks 5 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges 6 Cross-Layer Design and Optimization in Wireless Networks 等,共计13章,全书348页,pdf文件383页。

    标签: 英文

    上传时间: 2014-01-27

    上传用户:daguda

  • Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

    Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair

    标签: monoalphabetic Playfair provides security

    上传时间: 2017-05-25

    上传用户:变形金刚

  • Please read your package and describe it at least 40 bytes. System will automatically delete the di

    Please read your package and describe it at least 40 bytes. System will automatically delete the directory of debug and release, so please do not put files on these two directory.

    标签: automatically describe package Please

    上传时间: 2013-12-06

    上传用户:dave520l