搜索资源列表
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
getPDF7
- On the Equivalence of Interleavers for Turbo Codes Using Quadratic Permutation Polynomials over Integer Rings
Testing-Using-permutation-test
- 。该法根据所研 究的问题构造检验统计量,并利用手头样本,按排列组合的原理导出检验统计量的理论抽样分布; 若难以导出确切的理论分布,则采用抽样模拟的方法估计其近似分布,然后求出从该分布中获得 手头样本及更极端样本的概率(P值),并界定此概率值,作出推论。-It is sample.based distribution-free method,which makes use of“permutation or combination”to get the theo. retical
HGPS1
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法-A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data
ICA2171
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
icccn04
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
icda-7-6
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
SUV_GAP_Paper
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
takehisa-gecco2000
- A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data英文文献,遗传算法
abcde
- 表置换函数,Out是输出序列,In是输入序列,Table是置换表,Len是序列长度,该函数的功能是输入一段序列,选择置换表,将置换的结果输出-Table permutation function Out output sequence, In is the input sequence, Table permutation table, Len is the sequence length, the functionality of the function is the input of a
permutation-scanning-worms
- In recent years, both sophistication and damage potential of Internet worms have increased tremendously. To understand their threat, we need to look into their payload for signatures as well as propagation pattern for Internet-scale behavior. An accu
matrix-transpose-operation
- 稀疏矩阵的三元组存储及其转置运算。使用三元组存储以下稀疏矩阵,并使用3种转置算法进行转置。转置方法1:直接交换行列,再排序。 转置方法2:执行n次扫描。 转置方法3:快速转置。-Triple store sparse matrix transpose operation.Using a sparse matrix, the following triple store and use three kinds of the permutation algorithm to transpose.Th
ppppppp
- the PDF details contain the frame synchronization mechanism that can be used with permutation code sets
CIA
- In the present paper, Interference Alignment by propagation delay is applied to a delay-based X- channel and a delay-based K- user interference channel. The key ingredient in our approach is the cyclic permutation property of the delay- based
Permutatiuon
- Matlab permutation matrix
06005941
- 多个访问性能epeated-permutation MPPM与干扰避免-Multiple Access Performance for Repeated-permutation MPPM with Interference Avoidance
scheduling-in-flow-shop
- 本文将局部优化与模拟退火算法结合解决了置换流水车间的订单接收和调度问题。本文给出了数学模型,局部优化策略,邻域搜索的3个操作(Swap, Insert, Reverse),并给出了相应的调度和计算收益的程序。 -Permutation flow shop scheduling with order acceptance and weighted tardiness.
cryptanalysis
- 一种可破解permutation-only图像加密算法的通用方法,使用cat,baker等置乱方法加密的图像可成功被破解。-One kind of permutation-only image can crack the encryption algorithm common method using cat, baker and other image scrambling encryption method can be successfully cracked.
factorial
- Simple Example of Permutation of numbers. Should point you in the right direction towards generic selection coding.
Permutation-and-combination
- 在26个子母中去任意多个字母实现排列组合。-Permutation and combination