搜索资源列表
fit_line
- //最小二乘法直线拟合 m_FoldList为关键点(x,y)的链表 拟合直线方程(Y=kX+b) -/ / linear least squares fitting m_FoldList as the key point (x, y) of Chain fitting linear equation (Y = C/56 b)
Expert_Choice[1]
- Expert Choice represents a significant contribution to the decision making process 工t assists a decision maker in solving complex problems involving many criteria and several courses of action . An Expert Choice solution to a problem reflects the exp
54154156489
- #define MSGHEADER \"MICROCALC - A Turbo C Demonstration Program\" #define MSGKEYPRESS \"Press any key to continue.\" #define MSGCOMMAND \"Press / for the list of commands\" #define MSGMEMORY \"Memory Available:\" #define MSGERROR \"ERROR\"
svm_v0[1].55beta.tar
- 用于进行所谓的支持向量机的分析,关键是对信号进行分类,用于处理非线性非平稳信号-used for the so-called support vector machines, the key is the signal classification for handling nonlinear non-stationary signals
gausssaderalgrithem
- 高斯-赛德尔迭代法--源代码及关键源代码。包括了高斯-赛德尔矩阵算法类,高斯-赛德尔矩阵变换函数,迭代函数,求解函数,精度要求等-Gauss - Seidel iterative method -- the key source code and the source code. Including the Gauss - Seidel algorithm matrix category, Gauss - Seidel matrix transform function, iterative f
arithmeticofDESencrypt
- 提供高质量的数据保护,防止数据未经授权的泄露和未被察觉的修改; 具有相当高的复杂性,使得破译的开销超过可能获得的利益,同时又要便于理解和掌握; DES密码体制的安全性应该不依赖于算法的保密,其安全性仅以加密密钥的保密为基础; 实现经济,运行有效,并且适用于多种完全不同的应用。 -provide high-quality data protection to prevent unauthorized data disclosure an
twice_OPt_prime
- 两次素数筛选算法源程序!先筛选sprt(n)内的素数,再选n内的素数,些算法更快~主要用VC实现-two prime screening algorithm source! Sprt first screening (n) the prime, n re-election of prime numbers, some faster-key algorithm with VC
Douglas-PeuckerLineApproximationAlgorithm
- When working with mathematical simulations or engineering problems, it is not unusual to handle curves that contains thousands of points. Usually, displaying all the points is not useful, a number of them will be rendered on the same pixel since the
1024位大整数相乘(N次方)取模
- 1024位的大整数进行相乘(N方)取模,是RSA密钥算法的一部分。其中,我对十进制,二进制的高效转换部分非常满意-1024 for the large integer multiplication (N) The tray is RSA key part of the algorithm. Which, I decimal, binary conversion efficiency is very satisfactory
MYFFT.rar
- 实现了一个简单的快速傅立叶变化功能函数,对一副图象进行傅立叶变化,其中关键的变换部分是用汇编实现的,To achieve a simple Fast Fourier change function of a Fourier image changes, which transform a key part of the compilation is achieved
ada04
- 详细介绍PCA(主成分分析),应用于人脸识别。PCA概念,发展,关键技术-Details on PCA (Principal Component Analysis), applied to face recognition. PCA concept, development, and key technologies
2009122
- 想加密自己的软件,看过一些软件的作法,思路如下: 1、用户安装后,得出本机的机器码(硬盘的序列号,不想用网卡,因为很多机器没有网 卡)。生成机器码代码 2、用户将该机器码EMAIL给我,我用该机器码生成一个注册码,发送给用户。注册码生成 代码 3、用户在程序中输入该注册码,程序逆算该注册码,与机器码核对,查看是否相符。注册 码逆算、核对代码, 4、如果用户安装后没有得到注册码,在N天后部分功能不可用。不要太容易被改(虽然说 安装后也只有少部份功能能用)。时限功能代
2
- 计算双通道散射BUBBLEGUM v.2 的源代码-The FORTRAN code BUBBLEGUM.f calculates the unitary, analytic T-matrix for a two-channel problem with an arbitrary number of resonances. It also gives the approximate results from the K-matrix method, the Breit-Wigner approx
Kalman
- 跟踪滤波的目的是根据已获得的目标观测数据对目标的状态进行精确估计,跟踪滤波的关键是对机动目标的跟踪能力,机动目标跟踪的主要困难在于跟踪设定的目标模型与实际的目标动力学模型的匹配问题。 -The purpose of tracking filter is based on objective observational data has been the target of the state accurately estimate the key to tracking filter for
Hash_Table1616057162003
- A hash table that stores key/pointer pairs. The table can handle either numbers or strings as keys, you specify which type it is when you create it. When you use strings as the keys, you should store the key permanently yourself somewhere, such as in
Ellipticcurvepublickeysystem
- 计算机安全学中椭圆曲线公钥系统的c源码 输入与输出: 请输入椭圆曲线方程y^2=x^3+cx+d(mod p)中c,d,p的值:8,10,23 椭圆曲线方程为y^2=x^3+8x+10(mod23) 请输入所取明文x的x1,x2:19,13 请输入选择的椭圆曲线上的点a0的x,y:7,8 请输入私钥a=17 选取t=3 加密的结果是(y0,y1,y2) = ((22,22),20,18) 实施解密: (c1,c2)=(18,12) x1=19
ImageMining
- Image generator it will default generate number of bmp files and mining the images based on key values-Image generator it will default generate number of bmp files and mining the images based on key values...
algorithm
- DES算法 DSA算法 ElGamal算法 Kohonen的SOFM(自组织特征映射) LAM(线性联想记忆)算法 LZW 压缩算法 MD5算法 PGP的安全性(一) PKCS #7 RSA算法 SSL是怎样工作的? Ternary Search Trees 产生组合的非递归算法 大整数的乘法 对LZW算法的改进及其在图象无损压缩中的应用 复数快速傅立叶变换算法 加密算法与密钥管理 经典加密算法在VB中的实现(1)- Rsa
hash
- 已知某哈希表的装载因子小于1,哈希函数 H(key)为关键字(标识符)的第一个字母在字母表中 的序号,处理冲突的方法为线性探测开放定址法。 试编写一个按第一个字母的顺序输出哈希表中所有 关键字的算法。-Known load factor of a hash table is less than 1, the hash function H (key) for the keywords (identifiers) of the first letter of the alphabe
USACO-friday
- 该题来自USACO的Friday问题。关键为星期的取法。-The title comes from USACO the Friday issue. Borrowing from the key for the week.