- TMS-Security-System-v2.4.3.1(DelphiXE2) The TMS Security System facilitates the definition of user rights on a menu or form level. In its user management features the TMS Security System relies on user/group profiles stored in a database. The users can be grouped and can inherit rights in this way. Thereby you can integrate a highly sophisticated and close grained user management that closes all potential loopholes via shortcuts with minimal effort. Only if the user has been granted the specific right by the administrator he can see or use the specific function assigned by the administrator. The administrator can configure the rights at run
- SOFTWAREENGINEERING 充分介绍了软件与软件工程
- MATLABGUI matlab gui 自动滤波 iir和fir
- The-Linux-TCP-IP-Stack---Networking-for-Embedded- Linux TCP/IP Stack. 1: Physical. Layer. 2: Data. Link. 4: Transport. 3: Network. 7: Application. 6: Presentation. 5: Session. Interface Layer (Ethernet
- JSCI-Paper Malaysian Vehicle License Plate Localization and Recognition System paper
- shunxubiao-and-lianbiao (1).对于顺序存储的线性表
文件名称:08kz1241
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:941.53kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
实现了物光和参考光双加密的数字全息加密方法,并从理论模拟和实验上分别验证了该方案,其安全性远高于仅加密一束光时的情况.使用双随机相位加密法加密了原始图像,并使用随机相位片编码了参考光. 加密后的图像由 CCD 接收后再使用计算机处
理.在实验上检测了该系统的信噪比和容错性, 并计算得到系统的密钥长度高达6.3×1014
.-Object and reference light to achieve a double-encrypted digital holographic encryption method, and from theoretical modeling and experimental validation of the program, respectively, its safety is much higher than the case when a beam of light is only encrypted using double random phase encryption encryption the original image, and use the random phase encoded reference beam slice. encrypted and then received by the CCD image processing using a computer in the experiments on the detection signal to noise ratio of the system and fault tolerance, and calculated the length of the key system up to 6.3 × 1014.
理.在实验上检测了该系统的信噪比和容错性, 并计算得到系统的密钥长度高达6.3×1014
.-Object and reference light to achieve a double-encrypted digital holographic encryption method, and from theoretical modeling and experimental validation of the program, respectively, its safety is much higher than the case when a beam of light is only encrypted using double random phase encryption encryption the original image, and use the random phase encoded reference beam slice. encrypted and then received by the CCD image processing using a computer in the experiments on the detection signal to noise ratio of the system and fault tolerance, and calculated the length of the key system up to 6.3 × 1014.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
08kz1241.pdf
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
