搜索资源列表
communication_model.rar
- 一个混沌保密通信的simulink模型,效果很好,A chaotic secure communication of the simulink model, the effect of good
dcsk3.rar
- 混沌保密通信SIMULINK建模。自己作的很好的东西。,SIMULINK modeling of chaotic secure communication. Themselves for the good things.
Spread_Spectrum
- Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reason
how2across_the_river_safely
- 用MATLAB实现“商人怎样安全过河”模型求解-Using MATLAB to solve“how to secure traders to cross the river” model
VC.MATLAB
- VC和matlab的教程,好用,放心下载,希望对大家有帮助-VC, and matlab tutorial, easy to use, secure download, we want to help
0470723173
- Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure web browsing with a phone or PC, Single Sign-On (SSO), mobile broadcast content protection
APS
- Bluetooth is a wireless technology that allows computers, phones, headsets, PDA s and other devices to wirelessly communicate over short distances (up to 33 feet). Bluetooth uses radio waves (in the 2.4 GHz range), and is designed to be a secure, low
ArchitectingSecureSoftwareSystems
- it is a book with this name Architecting Secure Software Systems
ECG-distri_Full-project-Code
- Ecg distribution in secure and encrypted manner
hyper-chaos-synchronzation
- 实现了一种基于实际信道的超混沌保密通信方案的混沌同步,参考文献《一种基于实际信道的超混沌保密通信方案》-Achieve a channel based on the actual secure communication hyperchaotic synchronization program, references, " based on the actual channel ultra-secure communication solutions."
Bidirectional-quadtree-in-matlab
- matlab 中实现一个四叉树的结构,使用递归过程,整合成一次二向遍历-secure yourself with a simple quadtree in matlab
Direct_sequence_spread_Spectrum
- direct sequence spread spectrum technology for secure data tranfer
fsh-ss-code
- frequency hop spread spectrum technology for secure data tranfer
sha
- In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm".
7
- 基于线性约束最小方差(LCMV)准则、ASC旁瓣相消——MSE准则的波束合成,运行效果极好,放心下载。-Based on the linear constrained minimum variance (LCMV) criterion, ASC Sidelobe Canceller- MSE criterion beamformer, run very effective, secure download.
sha-1
- protect digital images using secure hash
voice
- 用于语音信号处理的设计研究,主要设计语音信号处理的保密传输问题-Design for speech signal processing, primarily designed for secure transmission of voice signal processing problems
Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding
- A new type of computer art image called secret-fragment- visible mosaic image is proposed, which is created automatically by composing small fragments of a given image to become a target image in a mosaic form, achieving an effect of embedding the gi
Secure-Force-Algorithm
- implementation of Secure Force Encryption Algorithm for images.-implementation of Secure Force Encryption Algorithm for images.
Secure Audio Based Unclocking System
- Secure Audio Based Unlocking System
