资源列表
ajassp.2014.969.977
- Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to lar
WWWWW
- We propose a protocol for secure mining of association rules in horizontally distributed s. The current leading protocol is that of Kantarcioglu and Clifton [18]. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of
attachments
- there are some image processing codes. Hope it will help all of you.thanking you.
Cortex_M4-
- 基于Cortex_M4内核的Kinetis微控制器的应用研究-Based on Application of Cortex_M4 Kinetis microcontroller core
Detection-of-viruses-in-tomatoes-leaf-based-on-K-
- Detection of viruses in tomatoes leaf based on K-Mean clustering algorithm
My-First-paper
- Tomato disease leaf detection
Improving-Support-Vector-Machine-classifier
- Improving Support Vector Machine classifier with differentkernel function for plant diseases detection1
Improving-Support-Vector-Machine-classifier-with-
- Improving Support Vector Machine classifier with different kernel function for plant diseases detection v 2
Improving-Support-Vector-Machine-classifier-with-
- Improving Support Vector Machine classifier with different kernel without figure
beep-tone-detectection-tk-energy_luo-zhang.pdf.zi
- Descr iption of beep tone detection using the TK energy operator. Useful for voip programming.
1.tutorials-1919332
- It describes installation of seagull & practice sessions
noise_signal
- speech enhancement for noisy signal
