Welcome![Sign In][Sign Up]
Location:
Search - algorithm of hill

Search list

[Crack HackHill_encpyt_decrypt_system

Description: 本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。-the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5017 | Author: 张华 | Hits:

[OS Developtree

Description: 希尔排序算法的实现C++sdvzvaGedgvfsewfcAWfqawfaswfasfc-Hill Sorting Algorithm of C sdvzvaGedgvfsewfcAWfqawfas wfasfc
Platform: | Size: 1258 | Author: ervaerfvg | Hits:

[Crack HackHillCipher

Description: 自己编写的加密算法 hill加密算法。包括,hill数组的生成,hill数组矩阵的计算。-prepare their encryption algorithms hill encryption algorithm. Include hill array of generation, hill array matrix calculations.
Platform: | Size: 1933 | Author: 王王 | Hits:

[AlgorithmPathFinderRedux

Description: 包括Pheromones Algorythm、Memory Algorythm和Hill Climbing Algorythm I,II,III在内的多个人工智能算法的实现-including Pheromones Algorythm, Memory Algorythm and Hill Climbing Algorythm I, II, III from the number of artificial intelligence algorithms to achieve
Platform: | Size: 117760 | Author: 冯枫 | Hits:

[Data structs内部排序的主要算法及相关可实现程序

Description: 内部排序的所有算法,而且有相关可执行例子,包括插入排序,选择排序,希尔排序,快速排序,堆排序,归并排序等,很全,很孀。-sequencing of all internal algorithm, but is related to the executable examples, including insertion sort, select, in order of ranking Hill, the quick sort, heap sort, merging sequencing, all very, very widow.
Platform: | Size: 13312 | Author: 李雷 | Hits:

[Other算法ebook(10部算法经典著作的合集)

Description: 算法ebook(10部算法经典著作的合集) 算法ebook> 10部算法经典著作的合集 chm格式 (1)Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2)Data Structures, Algorithms and Program Style Using C by James F. Korsh and Leonard J. Garrett (3)Data Structures and Algorithm Analysis in C by Mark Allen Weiss (4)Data Structures: From Arrays to Priority Queues by Wayne Amsbury (5)Information Retrieval: Data Structures & Algorithms edited by William B. Frakes and Ricardo Baeza-Yates (6)Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (7)Practical Data Structures in C++ by Bryan Flamig (8)Reliable Data Structures in C by Thomas Plum (9)Data Structures and Algorithms Alfred V. Aho, Bell Laboratories, Murray Hill, New Jersey John E. Hopcroft, Cornell University, Ithaca, New York Jeffrey D. Ullman, Stanford University, Stanford, California (10)DDJ Algorithms and Data Structures Articles-algorithm ebook (10 Algorithm classics Collection) algorithm ebookgt; Gt; Ten algorithm classics Collection chm format (1) Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2) Data Structures and Algorithms and Program Using C by Style Asperula and James F. Leonard J. Garrett (3) Data Structures and Analysis Algorithm in C by Mark Allen Weiss (4) Data Structures : From Arrays to Priority Queues by Wayne Amsbury (5) Information Retrieval : Data Structures Algorithms edited by William B . Frakes and Ricardo Baeza- Yates (6) Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (7) Practical Data Structures in C by Bryan Flamig (8) Reliable Data Structures in C by Thomas Plum (9) Data Structures and Algorithms Alfred V. Aho, Bell Laborat
Platform: | Size: 29000704 | Author: 狼狼 | Hits:

[Data structs排序算法-java

Description: 用java实现的数据结构排序算法,包括:选择排序、插入排序、冒泡排序、希尔排序、快速排序、堆排序、归并排序。-used to achieve the ranking algorithm data structure, including : Select, in order of insertion sequence and Bubble Sort, Hill sequencing, rapid sequencing, heap sort, merging sequencing.
Platform: | Size: 54272 | Author: 陈为 | Hits:

[CSharphsdfhjshdj

Description: 对深度优先(Depth first) 、宽度优先(Breath first) 、爬山法(Hill Climbing) 、 最佳优先(Best first) 以及A*搜索算法进行分析比较,要求: 给出这几种算法的描述; 根据SearchDemonstration程序中给出的示例,给出各算法的执行过程-priority right depth (Depth first), the width of priority (Breath first), mountaineering (Hill Climbing), the best priority (Best first) and the A* search algorithm analysis, requirements : This is the description of several algorithms; According SearchDemonstration procedures given in the examples are given of the algorithm implementation process
Platform: | Size: 1748992 | Author: yao | Hits:

[Crack HackHill_encpyt_decrypt_system

Description: 本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。-the source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption and decryption.
Platform: | Size: 5120 | Author: 张华 | Hits:

[OS Developtree

Description: 希尔排序算法的实现C++sdvzvaGedgvfsewfcAWfqawfaswfasfc-Hill Sorting Algorithm of C sdvzvaGedgvfsewfcAWfqawfas wfasfc
Platform: | Size: 1024 | Author: ervaerfvg | Hits:

[matlabhill

Description: 爬山算法 可以解决许多函数优化方面的问题,可以与其他算法,如蚂蚁算法,粒子群算法等融合使用,有其一定的研究意义-Climbing algorithm can solve many function optimization problems, with other algorithms, such as ant algorithms, particle swarm optimization, such as integration of use, has its research significance
Platform: | Size: 3072 | Author: mawei | Hits:

[matlabpashansuanfa

Description: A hill climbing algorithm for finding the minimum of a function fitnessfun in the real space.
Platform: | Size: 3072 | Author: 真实的 | Hits:

[Special Effectshill_climbing

Description: 利用登山算法实现图像分割。算法适用于中心灰度较大,而向邻域逐渐递减的区域分割,如微钙化点图像。根据当前窗口手动设定的局部点,寻找局部灰度极大值点,找到16个角度下的种子点。然后以这16个点为种子点进行区域增长,约束条件为相应的灰度约束和空间约束。-Climbing algorithm using image segmentation. Algorithm applied to a larger central gray, and gradually descending to the neighborhood of the region segmentation, such as micro-calcifications image. Based on the current window to manually configure the local point, looking for gray-scale local maxima, found under the perspective of 16 seed points. Then 16 points this seed point for regional growth, constraints for the corresponding gray-bound and space bound.
Platform: | Size: 93184 | Author: fly_sea | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[JSP/Javahill

Description: 数值算法,爬山算法源码,动态演示过程,JAVA源码-Numerical algorithm, climbing algorithm source, dynamic presentation process, JAVA source
Platform: | Size: 21504 | Author: 张辉 | Hits:

[Windows Develophillclimbing

Description: algorithm of hill climbing for searching
Platform: | Size: 3072 | Author: youqi | Hits:

[JSP/Javahill

Description: 爬山算法是一种局部择优的方法,采用启发式方法,是对深度优先搜索的一种改进,它利用反馈信息帮助生成解的决策。 属于人工智能算法的一种。-Climbing algorithm is a partial merit-based approach, using heuristic methods, is a depth-first search of an improvement, which uses feedback information to generate solutions to help decision-making. Belong to a kind of artificial intelligence algorithms.
Platform: | Size: 1024 | Author: ccy | Hits:

[Software EngineeringMcGraw.Hill.Introduction.To.Algorithms.Second.Edit

Description: 由麻省理工电气工程及计算机学院编写的第二版的算法介绍,该书详尽介绍了常用计算机算法-From the Massachusetts Institute of Electrical and Computer Engineering, prepared the second edition of the algorithm, the book includes detailed descriptions of the commonly used computer algorithms
Platform: | Size: 11994112 | Author: 王俊杰 | Hits:

[CA authHill-Cipher

Description: Encryption algorithm of Hill cipher with GUI in c#
Platform: | Size: 49152 | Author: Hasnain | Hits:

[Otherhill

Description: hill密码的加密算法实现,其中可以改变矩阵大小(Implementation of encryption algorithm for hill cipher)
Platform: | Size: 172032 | Author: 123点 | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net