资源列表
ItemEditTool
- Item EDP Editor Seal Online
DRM-encryption-technology
- 本文介绍了公钥密码算法,对称密码算法和和哈希函数等密码算法,并阐明了密码算法领域的最新发展。-This article describes the public-key cryptographic algorithms, symmetric ciphers and hash functions, such as passwords and algorithms, and to clarify the latest developments in the field of cryptographi
Estandar-de-Persistencia
- Persistence standard
dsdv
- DSDV protocol/-DSDV protocol/............
00676515
- realization of a wavelength shifter based on cascaded second-order processes in the organic molecular crystal N-(4- nitropheny1)-L-prolinol (NPP).’ In our experiment, a pump pulse p at frequency wp and a signal pulse s at w, - wp interact t
Convolution
- Convolution of 1D and 2D image
routing-using-nn-nov-2012
- The neural networks are widely used to solve the routing problem and to manage the congestion in the computer networks. In this paper, two methods are proposed to solve this problem. In the first method a feed forward neural network is includ
mining-anomalies-s
- 一个基于熵的大流量攻击检测论文,对于研究网络防护有重要意义-A large flow of entropy-based attack detection papers, research network protection for significant
fuheyucelunwen
- 针对电力系统短期负荷预测,给出了一些实际可行的方法,比如包括96点负荷预测方法,以及其他方法,运用的都是一些比较智能的方法,比如神经网络,支持向量机,等等。-fuheyuce
200710300441538998
- Establishing the model, to analyze the economic data,
296-995-1-PB
- IMAGE SEGMENTATION BY FUZZY C-MEANS CLUSTERING ALGORITHM WITH A NOVEL PENALTY TERM
Path-Planning-RL
- Path planning for omni directional robot based on potential fields