Welcome![Sign In][Sign Up]
Location:
Search - hill algorithm

Search list

[Other resource20070609

Description: 高斯回代算法源代码 蚁群算法的matlab源码 蚁群算法TSP(旅行商问题)通用matlab程序 Java实现几种常见的排序算法 用pascal语言实现希尔排序算法-Gaussian back to the source code generation algorithm Ant Algorithm Matlab source Ant Algorithm TSP (TSP) General Matlab procedures Java Several ranking algorithm used pascal language ranking Hill Algorithm
Platform: | Size: 6323 | Author: asegwaeg | Hits:

[AlgorithmPathFinderRedux

Description: 包括Pheromones Algorythm、Memory Algorythm和Hill Climbing Algorythm I,II,III在内的多个人工智能算法的实现-including Pheromones Algorythm, Memory Algorythm and Hill Climbing Algorythm I, II, III from the number of artificial intelligence algorithms to achieve
Platform: | Size: 117760 | Author: 冯枫 | Hits:

[Data structs内部排序的主要算法及相关可实现程序

Description: 内部排序的所有算法,而且有相关可执行例子,包括插入排序,选择排序,希尔排序,快速排序,堆排序,归并排序等,很全,很孀。-sequencing of all internal algorithm, but is related to the executable examples, including insertion sort, select, in order of ranking Hill, the quick sort, heap sort, merging sequencing, all very, very widow.
Platform: | Size: 13312 | Author: 李雷 | Hits:

[matlabhill

Description: 爬山算法 可以解决许多函数优化方面的问题,可以与其他算法,如蚂蚁算法,粒子群算法等融合使用,有其一定的研究意义-Climbing algorithm can solve many function optimization problems, with other algorithms, such as ant algorithms, particle swarm optimization, such as integration of use, has its research significance
Platform: | Size: 3072 | Author: mawei | Hits:

[AI-NN-PRhill

Description: 这是一个爬山法聚类算法的实现,希望对大家有用。-This is a climbing method clustering algorithm realize, in the hope that everyone useful.
Platform: | Size: 3072 | Author: fanliutong | Hits:

[Crack HackHill

Description:
Platform: | Size: 1895424 | Author: mrmark | Hits:

[Crack HackHill

Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即 M=m1m2……ml Ek(M)=c1c2……cl 其中 c1=k11m1+k12m2+……+k1lml c2=k21m1+k22m2+……+k2lml …… cl=kl1m1+kl2m2+……+kllml 通常对于字母加解密,使用mod 26的方法。 以上线性方程可以采用矩阵表示。 -Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: | Size: 143360 | Author: wildkaede | Hits:

[JSP/Javahill

Description: 数值算法,爬山算法源码,动态演示过程,JAVA源码-Numerical algorithm, climbing algorithm source, dynamic presentation process, JAVA source
Platform: | Size: 21504 | Author: 张辉 | Hits:

[Crack Hackhill

Description: 对称密码学体制中hill密码加密解密算法实现。-Symmetric cryptography system hill password encryption and decryption algorithm.
Platform: | Size: 27648 | Author: shine | Hits:

[Crack Hackhill

Description: Hill算法原代码。为压缩包,内有3个文件。-Hill algorithm source code. For compressed packets, there are three documents.
Platform: | Size: 3072 | Author: mara | Hits:

[JSP/Javahill

Description: 爬山算法是一种局部择优的方法,采用启发式方法,是对深度优先搜索的一种改进,它利用反馈信息帮助生成解的决策。 属于人工智能算法的一种。-Climbing algorithm is a partial merit-based approach, using heuristic methods, is a depth-first search of an improvement, which uses feedback information to generate solutions to help decision-making. Belong to a kind of artificial intelligence algorithms.
Platform: | Size: 1024 | Author: ccy | Hits:

[Crack Hackmimaxue

Description: 包含仿射caser算法,playfair算法,hill算法,vegenere算法的加解密程序。-Contains affine caser algorithm, playfair algorithm, hill algorithm, vegenere algorithm for encryption and decryption procedures.
Platform: | Size: 3072 | Author: 张苏昕 | Hits:

[Software EngineeringMcGraw.Hill.Introduction.To.Algorithms.Second.Edit

Description: 由麻省理工电气工程及计算机学院编写的第二版的算法介绍,该书详尽介绍了常用计算机算法-From the Massachusetts Institute of Electrical and Computer Engineering, prepared the second edition of the algorithm, the book includes detailed descriptions of the commonly used computer algorithms
Platform: | Size: 11994112 | Author: 王俊杰 | Hits:

[Othergenerate-random-numberithm

Description: 用线性同余法和Wichman-Hill算法产生[0,1]均匀分布的随机数-With a linear congruent method and Wichman-Hill algorithm to generate [0,1] uniformly distributed random number
Platform: | Size: 5120 | Author: 小于儿 | Hits:

[Crack HackHill

Description: Hill Algorithm This system is based on linear algebra and has been important in the history of cryptography. It was invented by Lester S. Hill in 1929, and was the first polyalphabetic cryptographic system that was convenient to work with more than three symbols simultaneously.
Platform: | Size: 111616 | Author: galex | Hits:

[Crack HackHill

Description: 用C语言编的,密码学基础中的hill算法。-Hill algorithm in C language, the basis of cryptography.
Platform: | Size: 28672 | Author: 李李 | Hits:

[Crack HackHill

Description: Decrypht using Hill algorithm in python
Platform: | Size: 4096 | Author: pedraza1721 | Hits:

[Data structshill

Description: 希尔算法,很快的算法,排序十分简单,欢迎下载-Hill algorithm, fast algorithms, sorting is very simple.
Platform: | Size: 1024 | Author: liuwei | Hits:

[simulation modelingsource

Description: 线性同余法-Wichmann-Hill算法产生服从均匀分布的随机变量(The linear congruence -Wichmann-Hill algorithm produces random variables subject to uniform distribution)
Platform: | Size: 96256 | Author: 小明123456 | Hits:

[Otherhill

Description: hill密码的加密算法实现,其中可以改变矩阵大小(Implementation of encryption algorithm for hill cipher)
Platform: | Size: 172032 | Author: 123点 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 16 »

CodeBus www.codebus.net