CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 系统编程 CA认证 搜索资源 - y

搜索资源列表

  1. CubicSpline

    0下载:
  2. Cubic spline algorithm approximating function y=f(x) - ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]-Cubic spline algorithm approximating function y=f(x)- ((-2)*x*(2*x+3))/(x*x+4*x+5) in interval [-2 2]
  3. 所属分类:CA program

    • 发布日期:2017-03-27
    • 文件大小:3.63kb
    • 提供者:Vaidas Zid
  1. jj

    0下载:
  2. CORNACCHIA Algorithm * * GOAL: given d and p prime, find (x,y) such that x^2 + y^2 = d * p * * in this implementation, d = 1. This code does not accept d <> 1 !!! * see "A Course in Computational Algebraic Number Theory" by Henri
  3. 所属分类:CA program

    • 发布日期:2017-03-28
    • 文件大小:2.1kb
    • 提供者:silkan
  1. NSGAII

    0下载:
  2. [num,len] = size(y) Initialize all the distance of individuals as zero. for i = 1 : M for j = 2 : num - 1 distance(j).individual = 0 -[num,len] = size(y) Initialize all the distance of individuals as zero. for i = 1 : M fo
  3. 所属分类:CA program

    • 发布日期:2017-11-16
    • 文件大小:15.04kb
    • 提供者:庞军
  1. visualCryptography

    0下载:
  2. Criptografi Visual Se descompone cada pixel de la imagen dos bloque de 2x2 pixeles, estos bloques en conjunto formarán dos imágenes de salida. Las reglas para asignar los bloques a la imagen de salida son: • Cuando se trata de un pixel b
  3. 所属分类:CA program

    • 发布日期:2017-11-12
    • 文件大小:639byte
    • 提供者:jasso
  1. ANALYTICAL_GA

    0下载:
  2. The scr ipt fits a given general analytical law using Genetic Algorithms. Such law can depend on several input variables and various parameters, but it must have only one output, to be matched to the input variable y. The optimum coefficients a
  3. 所属分类:CA program

    • 发布日期:2017-11-18
    • 文件大小:1.78kb
    • 提供者:muralikrishna
  1. Elgamal

    0下载:
  2. ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two rando
  3. 所属分类:CA program

    • 发布日期:2017-04-16
    • 文件大小:56.25kb
    • 提供者:HamzaAnwer
  1. 4

    0下载:
  2. Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid
  3. 所属分类:CA program

    • 发布日期:2017-12-14
    • 文件大小:597byte
    • 提供者:jitender grover
搜珍网 www.dssz.com