搜索资源列表
Secondhand-information-006
- 供求二手信息网站系统源代码 供求二手信息网站系统源代码--006-Supply and demand information site system used second-hand source of supply and demand information site system source code- 006
Source-of-information-theory
- 信息论法信号源数估计,包扩性能比较,和分析-Source of information theory method was estimated, including the expansion of performance comparison, and analysis
Advanced.Information.dialog.VC.code
- VC高级编程设计信息对话框代码Advanced Programming Information dialog box VC code -Advanced Programming Information dialog box VC code
Keylogger-and-sends-the-information
- 键盘记录并发送指定邮箱实现信息窥探,这个程序我写了很长时间的,大家也支持一下吗........ -Keylogger and sends the information to achieve the specified mailbox snooping
MySchool
- C#版学生综合信息管理系统,它可以完成学生个人信息管理、考试管理、作业提交、讨论交流、在线答题、成绩查询等功能,在VS2005下顺利编译,使用MSSQL数据库,运行前请先附加数据库。-C# version of student' s comprehensive information management system, which the students can complete personal information management, test management, job
C4_5.m
- his algorithm was proposed by Quinlan (1993). The C4.5 algorithm generates a classification-decision tree for the given data-set by recursive partitioning of data. The decision is grown using Depth-first strategy. The algorithm considers all the poss
Information-hiding
- 基于 DCT(离散余弦变换 )域的信息隐藏算法是目前应用最广的变换域算法 ,此类算法的最大不足是嵌信息量小。通过分析 DCT域隐藏算法隐藏容量少的原因 ,提出了一种大容量的 DCT域信息隐藏算法。算法首先对载体图像进行频谱均匀化处理 ,然后对图像进行全局 DCT变换 ,并将隐藏信息嵌入到载体图像的低频 DCT系数上 ,信息嵌入采用分段量化的方法实现 ,提取隐藏信息时不需要原始载体图像。实验结果表明 ,该算法的嵌入容量大 ,不可感知性好。-Based on DCT (discrete cosine
information-security-ppt
- 北京邮电大学计算机学院信息安全基础课课件(最新)。-Beijing University of Posts and Telecommunications Computer Science and Information Security Basic Course courseware (the latest).
Enterprise-information-management
- 企业信息管理系统中,前台可以浏览一些企业的基本情况,后台被企业内部使用。有新闻、组织、人员、项目、成果、用户六大管理模块。-Enterprise information management system, front desk can browse some of the basic situation of enterprises, the background was within the enterprise. With news, organization, personnel, pr
Traffic-information-display
- 北京交通路况信息展示示例Flex代码,界面渲染的非常漂亮。大家一起学习啊-displaying the traffic information of beijing
mRMRFeatureSelection
- mRMR_0.9_compiled最小冗余和最大相关特征选取源代码,-This package is the mRMR (minimum-redundancy maximum-relevancy) feature selection method, whose better performance over the conventional top-ranking method has been demonstrated on a number of data sets in recent pu
kaiman2
- 一个二维的卡尔曼滤波程序,给定了状态方程和观测方程,对学习信息融合,滤波估计灯方面有积极的知道效果-A two-dimensional Kalman filtering process, given the state equation and observation equation, the study of information fusion, filtering light area is estimated to know there is a positive effect
new
- 分布式视频编码中用时域内插法生成边信息的算法-Distributed Video Coding interpolation algorithm to generate side information
Monitor_EDID_Info
- This code displays the Monitor information including its Serial Number which is very useful when doing an asset management. This information is provided through the EDID information contained in the monitor itself.
AIM
- NIPS2006论文“Saliency based on Information Maximization”的源码,用于显著图计算,作者是N. Bruce 和 J.Tsotsos -a code for "Saliency based on Information Maximization",N. Bruce &J.Tsotsos ,NIPS,2006
MSIC10_8_4
- Product: MiTeC System Information Component Suite with source code Version: 10.8.4
02course_registration
- Problem Statement As the head of information systems for Wylie College you are tasked with developing a new student registration system. The college would like a new client-server system to replace its much older system developed around mainframe t
dxzm(Information_Website)
- 大学之门整站系统(贫龙版),用ASP实现的一个信息类网站-door to the entire University System Station (depleted Long version), the ASP an information website
informationhiding
- 一个基于DCT变换的信息隐藏程序,能把文本信息隐藏到经过DCT变换的图像载体的频域中去。程序重点在于对图像的DCT变换-DCT-based Information Hiding Transform procedures, able to hide text message into image after DCT transform domain to the frequency vector. Procedures focus on the DCT transform of image
Information
- cissp入门必备经典资料,我从淘宝网上拍下来的,一直在钻研,挺有用的。你会对信息安全领域有一个全新的认识-CISSP classic data entry required, from the time I shot down on Taobao, has been studied, quite useless. The area of information security you will have a new understanding of