Welcome![Sign In][Sign Up]
Location:
Search - C1C2

Search list

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。
Platform: | Size: 143581 | Author: wildkaede | Hits:

[Special EffectsC1C2

Description: 本源码是利用视觉仿生学成果进行目标识别的最新成果。c1 c2特征是MIT的Poggio教授的研究小组根据人眼视觉仿生的研究成果提出的特征。运用该特征对自然图像中的目标识别取得了较好的效果。本压缩包为提取C1 C2特征的Matlab源码。C1 C2特征的详细说明参见IEEE PAMI 2007上的文献\"Robust Object Recognition with Cortex-Like Mechanisms\"。
Platform: | Size: 16318 | Author: csb | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[Special EffectsC1C2

Description: 本源码是利用视觉仿生学成果进行目标识别的最新成果。c1 c2特征是MIT的Poggio教授的研究小组根据人眼视觉仿生的研究成果提出的特征。运用该特征对自然图像中的目标识别取得了较好的效果。本压缩包为提取C1 C2特征的Matlab源码。C1 C2特征的详细说明参见IEEE PAMI 2007上的文献"Robust Object Recognition with Cortex-Like Mechanisms"。-The source is the use of visual object recognition bionics results of the latest achievements. c1 c2 characterized by MIT Professor of Poggio research team in accordance with human visual biomimetic study the characteristics of the results. Use of the characteristics of the natural image object recognition has achieved good results. The compressed packet to extract the characteristics of C1 C2 source Matlab. C1 C2 features a detailed description see the IEEE PAMI 2007 literature Robust Object Recognition with Cortex-Like Mechanisms .
Platform: | Size: 16384 | Author: csb | Hits:

[Crack Hackvigenere

Description: 计一个vigenere密码类,类的对象各自拥有不用的密匙。用不用对象加密相同的明文,将会获得不同的密文。加密过程如下:设密匙为K=k1k2.......kn,明文为M=m1m2.......mn,密文为C=c1c2.......cn,其中k1k2.........kn,m1m2...........mn, c1c2.........cn,每个都代表一个字母。 将字母A到Z编号,从0到25,那么它们之间有这样的对应关系:ci=(mi+ki)mod26。 例如,M=data security,K=best,那么首先将M分解成长为4的序列:data secu rity 每一节都使用密匙K=best进行加密,得到序列:EELT TIUN SMLR 将明文的空格添加进去,就得到密文:EELT TIUNSMLR出于密码体制的需要,密文中的字母全部使用大写字母。-Account for one vigenere password class, class of objects do not have the keys of their respective owners. No object with the same plaintext encrypted, the ciphertext will be different. Encryption process is as follows: Let key as K = k1k2 ....... kn, expressly for the M = m1m2 ....... mn, the ciphertext is C = c1c2 ....... cn, where k1k2 ......... kn, m1m2 ........... mn, c1c2 ......... cn, each of which represents a letter. The letters A to Z number, from 0 to 25, then they have such a corresponding relationship between the: ci = (mi+ ki) mod26. For example, M = data security, K = best, then the first M sequence of decomposition of the growth of 4: data secu rity each section using the encryption key K = best, be sequences: EELT TIUN SMLR add the plaintext space go to get the ciphertext: EELT TIUNSMLR the need for cryptography, ciphertext letter in all uppercase letters.
Platform: | Size: 2048 | Author: 小杨 | Hits:

[Special Effectsgaussian-sobel-pyramid

Description: 对图像进行高斯滤波后再提取边缘 对图像进行金字塔各层图像进行sobel提取边缘。 内附有原图,处理后的效果图及程序结果说明。-Gaussian filter and the image edge extraction layers of the image pyramid image sobel edge extraction. Enclosed is the original deal with the effects of plans and procedures after the results show.
Platform: | Size: 90112 | Author: wang | Hits:

[Windows DevelopFindText

Description: 模糊搜索,支持用汉字用声母查询。模糊匹配函数,判断字母c是否为汉字(c1c2)的声母。(一个汉字由两个字节构成,且每个字节的最高位即左边第一位为1)-Fuzzy search, support the use of Chinese characters with initials query. Fuzzy matching function to determine whether the letter c for the Chinese characters (c1c2) initials. (A character is constituted by two bytes, and the highest bit of each byte that is left of the first bit is 1)
Platform: | Size: 44032 | Author: tiger | Hits:

[VHDL-FPGA-Verilogmux4_with_en

Description: 带有使能端的4输入数据选择器,S0, S1, S2, C0, C1为输入,C1,C2为使能输入,P, Q, R, T为输出,c1c2=00时输出全为0,c1c2=01时输出全为1,c1c2=10时数据选择,c1c2=11时输出是c1c2=10时的反。-4 with Enable input data selector, S0, S1, S2, C0, C1 as input, C1, C2 an enable input, P, Q, R, T as an output, c1c2 = 00 are all 0, the output, c1c2 = 01 are all the output 1, c1c2 = 10 time data selection, c1c2 = 11 c1c2 = 10, the output is in reverse.
Platform: | Size: 384000 | Author: li | Hits:

CodeBus www.codebus.net