CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 数值算法/人工智能 matlab例程 搜索资源 - attack

搜索资源列表

  1. ufogame

    0下载:
  2. 用java实现的UFO攻击游戏,里面有代码和可执行文件,操作简单,用鼠标左键单击UFO, 每击落10架之后,就会增加一架。-used to achieve the UFO attack game, and they code and executable files, simple operation, using the left mouse button click UFO, each downed 10, will be an increase.
  3. 所属分类:matlab例程

    • 发布日期:2008-10-13
    • 文件大小:88171
    • 提供者:林立
  1. watermark-MATLAB

    0下载:
  2. 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
  3. 所属分类:matlab例程

    • 发布日期:2008-10-13
    • 文件大小:563820
    • 提供者:魏凯
  1. imlogpolar

    1下载:
  2. 实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
  3. 所属分类:matlab例程

    • 发布日期:2008-10-13
    • 文件大小:3432
    • 提供者:lhl1105
  1. DCT_watermark

    2下载:
  2. 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
  3. 所属分类:matlab例程

    • 发布日期:2008-10-13
    • 文件大小:520218
    • 提供者:魏凯
  1. shuzishuiyindeng

    2下载:
  2. 基于LSB图像隐藏系统的设计与实现,LSB算法代码,信息隐藏攻击算法,DCT域的隐藏以及数字水印。-LSB based image hiding system design and implementation, LSB algorithm code, information hiding attack algorithm, DCT hiding and digital watermarking domain.
  3. 所属分类:matlab

    • 发布日期:2016-12-19
    • 文件大小:14183424
    • 提供者:abcd0609
  1. zantaifenxi

    1下载:
  2. 电力系统暂态分析程序源代码,次源代码给出了攻角变化曲线-Power system transient analysis program source code, source code is given second angle of attack curve
  3. 所属分类:matlab例程

    • 发布日期:2013-08-01
    • 文件大小:4044
    • 提供者:韩戍罡
  1. attack

    0下载:
  2. 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
  3. 所属分类:matlab

    • 发布日期:2017-03-28
    • 文件大小:10116
    • 提供者:chenxeifong
  1. anticuttingattack

    0下载:
  2. 图像受到裁剪攻击时的一些算法 只要输入图像和想要裁剪的位置 就可以得到想要的结果-Images by cutting attack some algorithm as long as the input image and want to cut position can be the desired results
  3. 所属分类:matlab

    • 发布日期:2017-04-23
    • 文件大小:43881
    • 提供者:cao yun
  1. uihinkjn

    0下载:
  2. 遗传算法进可攻倘若覆盖就换个家看看回归那个符号那风格-Progressive genetic algorithm could be another attack if the coverage on the house to see
  3. 所属分类:matlab

    • 发布日期:2017-04-15
    • 文件大小:6152
    • 提供者:徐辉
  1. fn_collusion_attack

    0下载:
  2. Matlab Function of Collusion Attack
  3. 所属分类:matlab

    • 发布日期:2017-04-07
    • 文件大小:7075
    • 提供者:john
  1. attack.m.tar

    0下载:
  2. Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
  3. 所属分类:matlab

    • 发布日期:2017-03-27
    • 文件大小:750
    • 提供者:Francesco
  1. 20060816

    0下载:
  2. 以网格作为逻辑结构,具有高联通,低负载,扩展性强的特点。经分析表明,该方案更高效、安全、抗攻击能力更强。-To the grid as a logical structure, with high Unicom, low load, expansion and strong features. The analysis shows that the program more efficient, safe, stronger anti-attack capability.
  3. 所属分类:matlab

    • 发布日期:2017-03-31
    • 文件大小:193745
    • 提供者:张伟
  1. Aerodynam

    1下载:
  2. 运用流体力学数值计算软件对有头部攻角的弹丸气动性能进行了数值计算, 分析了有头部攻角弹 丸周围流场和作用在弹丸表面的空气动力. -The use of numerical fluid dynamics software to have the head of the projectile angle of attack aerodynamic performance of the numerical calculation, analysis of a head attack angle s
  3. 所属分类:matlab

    • 发布日期:2017-04-01
    • 文件大小:229397
    • 提供者:王顺红
  1. chi-square

    0下载:
  2. chi square attack for steganogrpahy
  3. 所属分类:matlab

    • 发布日期:2017-03-23
    • 文件大小:1413
    • 提供者:hr
  1. GoneHuntinModelingOptimal

    0下载:
  2. We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  3. 所属分类:matlab

    • 发布日期:2017-04-01
    • 文件大小:304371
    • 提供者:陈璐
  1. PursuitEvasionGames

    0下载:
  2. We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  3. 所属分类:matlab

    • 发布日期:2017-05-04
    • 文件大小:1384805
    • 提供者:陈璐
  1. TheGeometryandtheGameTheory

    0下载:
  2. We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  3. 所属分类:matlab

    • 发布日期:2017-04-16
    • 文件大小:332112
    • 提供者:陈璐
  1. all_attack

    0下载:
  2. 针对数字图片的各种攻击方法,使用Matlab编写。-Digital images for a variety of attack methods, the use of Matlab to write.
  3. 所属分类:matlab

    • 发布日期:2017-04-05
    • 文件大小:6961
    • 提供者:chenxianyi
  1. gongji

    0下载:
  2. 数字水印图像的攻击测试 包括滤波、剪切、添加噪声、jepg压缩攻击-Attack test digital watermarking images, including filtering, cropping, adding noise, jepg compression attack, etc.
  3. 所属分类:matlab

    • 发布日期:2017-03-29
    • 文件大小:2137
    • 提供者:马小平
  1. Attack-location

    0下载:
  2. To locate attack in WIFI
  3. 所属分类:matlab

    • 发布日期:2017-04-10
    • 文件大小:918
    • 提供者:DennisL
« 12 3 4 5 »
搜珍网 www.dssz.com