搜索资源列表
科技(1) B 064 04
- 某国为了防御敌国的导弹袭击,发展出一种导弹拦截系统,但是这样的导弹拦截系统有个缺陷,虽然他的第一发炮弹能够达到任意高度,但是以后每一发炮弹都不能高于前一发的高度。某一天,雷达捕捉到敌国的导弹来袭。由于该系统还在使用阶段,所以只有一套系统,因此有可能不能拦截所有的导弹。输入导弹依次飞来的高度(雷达给出高度数据是不大于30000的整数),计算这套系统最多能拦截多少导弹,如果要拦截所有的导弹最少配备多少套这种导弹系统。 三;问题分析: 该系统的第一发炮弹能够达到任意高度,所以要求出系统最多能够
matlab-break
- 这是关于数字水印的攻击例程!经过调试,可以放心使用!-This is on digital watermarking attacks routines! After debugging, can be assured use!
blind
- 一种利用小波变换的水印算法,实现了盲检测,可以对抗常见的几何攻击。-a wavelet transform the watermark algorithm achieved a blind testing can be used to confront common geometric attacks.
expend
- 针对二值图像的广泛应用,嵌入鲁棒性水印,测试其抵抗结合攻击的能力。-value against the wider use of images, embedded watermark robustness testing their resistance combination attacks.
040320161
- 在n×n 格的棋盘上放置彼此不受攻击的车。按照国际象棋的规则,车可以攻击与之处 在同一行或同一列上的棋子。在棋盘上的若干个格中设置了堡垒,战车无法穿越堡垒攻击别 的战车。对于给定的设置了堡垒的n×n格棋盘,设法放置尽可能多彼此不受攻击的车。用概率算法实现的!-n n grid placed on the chessboard of each other against attack vehicles. According to the rules of chess, with cars can
LSB.rar
- 利用LSB算法去实现了电子水印技术。代码完全实现了嵌入以及提取, 算法同时包含了4种攻击算法以及利用psnr测量提取的水印和攻击后提取的水印,This algorithm describes digital watermark technique by using LSB. This code implement embedding and extraction. At the meanwhile, this algorithm includes 4 different kinds of att
tra
- 基于MATLAB的攻击水平机动目标比例导引三维弹道仿真。-MATLAB-based attacks on the level of proportional navigation for maneuvering target three-dimensional trajectory simulation.
zy
- 最优制导律攻击机动目标弹道仿真,matlab编写。-Optimal guidance law for maneuvering target trajectory simulation attacks, matlab prepared.
chuizhi
- 攻击垂直机动目标比例导引三维弹道仿真。matlab编写-Attacks on the proportion of vertical maneuvering target-guided three-dimensional trajectory simulation. matlab prepared
che
- 问题描述:按照国际象棋的规则,车可以攻击与之处在同一行或同一列上的棋子。指南车是有方向的车。横向指南车可以攻击与之处在同一行上的棋子。纵向指南车可以攻击与之处在同一列上的棋子。指南车问题要求在m×n格的棋盘上放置指南车,并确定各指南车的攻击方向,使棋盘上不受指南车攻击的方格数最多。 编程任务:对于给定的m×n格的棋盘和2 个整数x 和y。整数x 表示棋盘上有x个规定方格应放置指南车,但攻击方向未定。整数y表示除了已规定放置位置的x个指南车外,还要在棋盘上放置y个指南车,其位置和攻击方向
GAACA
- 基于GAACA的协同多目标攻击空战决策算法-Based on the synergy GAACA air attacks on multi-objective decision-making algorithm
logistic_dwt
- 】利用混沌动力学系统中logistic 映射先对水印图像进行置乱预处理以增强其鲁棒性, 在小波域中将原始音频信号按比例分段, 此比例为原始音频信号低频部分与水印信号个数之比, 然后将水印信号加入到音频信号的 低频部分。用StirMark 攻击后的实验结果表明, 该算法对StirMark 的部分攻击具有一定的鲁棒性。-The logistic- map sequences to encrypt the watermark are used. The original audio signal
CollectionsofWaterMarkingAttack
- 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
ABufferOverflowStudyAttacksandDefenses
- A Buffer Overflow Study - Attacks and Defenses 一本介绍缓冲区溢出非常好的书,讲解详细,通俗易懂,是值得收藏的好资料-A Buffer Overflow Study- Attacks and Defenses 1 describes a buffer overflow very good book, explained in detail, easy to understand, is worthy of a good collection of i
watermark
- 基于小波变换的数字水印算法matlab代码,含有各种攻击的效果对比,对做毕设的同学应该有帮助。-Digital Watermarking Based on Wavelet Transform algorithm matlab code, containing a variety of attacks on the effect of contrast on the Bi-based students should do help.
DCT_watermarking_System
- A gr8 Adaptive DCT based watermarking system is implemented with a nice GUI for embedding, extraction and attacks
matlab
- 一段基于DWT的数字水印的MATLAB代码,图像分块,水印受攻击-A DWT-based digital watermarking of MATLAB code, image segmentation, watermarking attacks
p53-perrig
- They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
nqueen
- 在n*n格的棋盘上放置彼此不受攻击的N各皇后,皇后可以攻击与其处在同一行或同一列或同一斜线上的棋子。-Lattice in the n* n chessboard placed on each other from attacks, N the Queen, the Queen can attack with in the same row or column or diagonal on the same piece.
Resist-geometric-attacks
- 该算法把计算出的图像不变质心作为对其进行对数极坐标变换的原 点, 再作傅立叶变换, 取出中频段幅值作为水印嵌入域。该算法具有较好的鲁棒性、可检测性, 能同时抵抗几何攻击和信号 处理攻击, 它在数字图像的版权保护等领域有广泛的应用前景。-The algorithm to calculate the heart of the image does not degenerate as the number of its polar transformation of the origin, f
