搜索资源列表
ufogame
- 用java实现的UFO攻击游戏,里面有代码和可执行文件,操作简单,用鼠标左键单击UFO, 每击落10架之后,就会增加一架。-used to achieve the UFO attack game, and they code and executable files, simple operation, using the left mouse button click UFO, each downed 10, will be an increase.
watermark-MATLAB
- 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
imlogpolar
- 实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
shuzishuiyindeng
- 基于LSB图像隐藏系统的设计与实现,LSB算法代码,信息隐藏攻击算法,DCT域的隐藏以及数字水印。-LSB based image hiding system design and implementation, LSB algorithm code, information hiding attack algorithm, DCT hiding and digital watermarking domain.
zantaifenxi
- 电力系统暂态分析程序源代码,次源代码给出了攻角变化曲线-Power system transient analysis program source code, source code is given second angle of attack curve
attack
- 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
anticuttingattack
- 图像受到裁剪攻击时的一些算法 只要输入图像和想要裁剪的位置 就可以得到想要的结果-Images by cutting attack some algorithm as long as the input image and want to cut position can be the desired results
uihinkjn
- 遗传算法进可攻倘若覆盖就换个家看看回归那个符号那风格-Progressive genetic algorithm could be another attack if the coverage on the house to see
fn_collusion_attack
- Matlab Function of Collusion Attack
attack.m.tar
- Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
20060816
- 以网格作为逻辑结构,具有高联通,低负载,扩展性强的特点。经分析表明,该方案更高效、安全、抗攻击能力更强。-To the grid as a logical structure, with high Unicom, low load, expansion and strong features. The analysis shows that the program more efficient, safe, stronger anti-attack capability.
Aerodynam
- 运用流体力学数值计算软件对有头部攻角的弹丸气动性能进行了数值计算, 分析了有头部攻角弹 丸周围流场和作用在弹丸表面的空气动力. -The use of numerical fluid dynamics software to have the head of the projectile angle of attack aerodynamic performance of the numerical calculation, analysis of a head attack angle s
chi-square
- chi square attack for steganogrpahy
GoneHuntinModelingOptimal
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
PursuitEvasionGames
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
TheGeometryandtheGameTheory
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
all_attack
- 针对数字图片的各种攻击方法,使用Matlab编写。-Digital images for a variety of attack methods, the use of Matlab to write.
gongji
- 数字水印图像的攻击测试 包括滤波、剪切、添加噪声、jepg压缩攻击-Attack test digital watermarking images, including filtering, cropping, adding noise, jepg compression attack, etc.
Attack-location
- To locate attack in WIFI