- Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code).rar Handbook of Applied Cryptography (Algorithms
- javacircle1 计算机图形学 java描述画圆的三种算法
- jobshop 使用遗传算法和粒子群算法共同解决混合车间作业调度问题的文章
- uC-LIB uc
- TFTP-Server-Buffer-Overflow TFTP Server for Windows 1.4 Buffer Overflow
- Auditing-mechanism Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. In order to solve the security issues there are number of solutions proposed. This paper focuses on integrity assurance strategy for remote data. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The analysis and simulation results show that our proposed auditing protocols are secure and it reduce the computation load and communication cost of the auditor.
文件名称:My-NSGA2
介绍说明--下载内容来自于网络,使用问题请自行百度
NSGA2 matlab code (Non-Dominated Sorting Genetic Algorithm) - An evolutionary multi-objective optimization algorithm
(系统自动生成,下载前可以参看下载内容)
下载文件列表
My NSGA2\cec09.m
........\crossover.asv
........\crossover.m
........\crowding_distance.asv
........\crowding_distance.m
........\dominate.m
........\hypervolume.asv
........\hypervolume.m
........\mutation.asv
........\mutation.m
........\non_dominated_sorting.asv
........\non_dominated_sorting.m
........\NSGAII.asv
........\NSGAII.m
........\plotpareto.asv
........\plotpareto.m
........\sorting.asv
........\sorting.m
My NSGA2
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
