Location:
Search - hill algorithm
Search list
Description: 高斯回代算法源代码
蚁群算法的matlab源码
蚁群算法TSP(旅行商问题)通用matlab程序
Java实现几种常见的排序算法
用pascal语言实现希尔排序算法-Gaussian back to the source code generation algorithm Ant Algorithm Matlab source Ant Algorithm TSP (TSP) General Matlab procedures Java Several ranking algorithm used pascal language ranking Hill Algorithm
Platform: |
Size: 6323 |
Author: asegwaeg |
Hits:
Description: 包括Pheromones Algorythm、Memory Algorythm和Hill Climbing Algorythm I,II,III在内的多个人工智能算法的实现-including Pheromones Algorythm, Memory Algorythm and Hill Climbing Algorythm I, II, III from the number of artificial intelligence algorithms to achieve
Platform: |
Size: 117760 |
Author: 冯枫 |
Hits:
Description: 内部排序的所有算法,而且有相关可执行例子,包括插入排序,选择排序,希尔排序,快速排序,堆排序,归并排序等,很全,很孀。-sequencing of all internal algorithm, but is related to the executable examples, including insertion sort, select, in order of ranking Hill, the quick sort, heap sort, merging sequencing, all very, very widow.
Platform: |
Size: 13312 |
Author: 李雷 |
Hits:
Description: 爬山算法 可以解决许多函数优化方面的问题,可以与其他算法,如蚂蚁算法,粒子群算法等融合使用,有其一定的研究意义-Climbing algorithm can solve many function optimization problems, with other algorithms, such as ant algorithms, particle swarm optimization, such as integration of use, has its research significance
Platform: |
Size: 3072 |
Author: mawei |
Hits:
Description: 这是一个爬山法聚类算法的实现,希望对大家有用。-This is a climbing method clustering algorithm realize, in the hope that everyone useful.
Platform: |
Size: 3072 |
Author: fanliutong |
Hits:
Description:
Platform: |
Size: 1895424 |
Author: mrmark |
Hits:
Description: Hill加密算法的基本思想是将l个明文字母通过线性变换将它们转换为k个密文字母。脱密只要做一次逆变换就可以了。密钥就是变换矩阵本身。即
M=m1m2……ml
Ek(M)=c1c2……cl
其中
c1=k11m1+k12m2+……+k1lml
c2=k21m1+k22m2+……+k2lml
……
cl=kl1m1+kl2m2+……+kllml
通常对于字母加解密,使用mod 26的方法。
以上线性方程可以采用矩阵表示。
-Hill encryption algorithm the basic idea is to express the letter l a linear transformation through them is converted to k-secret alphabet. Off to do a secret as long as the inverse transform it. Key is the transformation matrix itself. That is, M = m1m2 ... ... mlEk (M) = c1c2 ... ... cl which c1 = k11m1+ K12m2+ ... ...+ K1lmlc2 = k21m1+ K22m2+ ... ...+ K2lml ... ... cl = kl1m1+ Kl2m2+ ... ...+ Kllml For encryption and decryption usually letters, use the method of mod 26. Above linear equations can be used express matrix.
Platform: |
Size: 143360 |
Author: wildkaede |
Hits:
Description: 数值算法,爬山算法源码,动态演示过程,JAVA源码-Numerical algorithm, climbing algorithm source, dynamic presentation process, JAVA source
Platform: |
Size: 21504 |
Author: 张辉 |
Hits:
Description: 对称密码学体制中hill密码加密解密算法实现。-Symmetric cryptography system hill password encryption and decryption algorithm.
Platform: |
Size: 27648 |
Author: shine |
Hits:
Description: Hill算法原代码。为压缩包,内有3个文件。-Hill algorithm source code. For compressed packets, there are three documents.
Platform: |
Size: 3072 |
Author: mara |
Hits:
Description: 爬山算法是一种局部择优的方法,采用启发式方法,是对深度优先搜索的一种改进,它利用反馈信息帮助生成解的决策。 属于人工智能算法的一种。-Climbing algorithm is a partial merit-based approach, using heuristic methods, is a depth-first search of an improvement, which uses feedback information to generate solutions to help decision-making. Belong to a kind of artificial intelligence algorithms.
Platform: |
Size: 1024 |
Author: ccy |
Hits:
Description: 包含仿射caser算法,playfair算法,hill算法,vegenere算法的加解密程序。-Contains affine caser algorithm, playfair algorithm, hill algorithm, vegenere algorithm for encryption and decryption procedures.
Platform: |
Size: 3072 |
Author: 张苏昕 |
Hits:
Description: 由麻省理工电气工程及计算机学院编写的第二版的算法介绍,该书详尽介绍了常用计算机算法-From the Massachusetts Institute of Electrical and Computer Engineering, prepared the second edition of the algorithm, the book includes detailed descriptions of the commonly used computer algorithms
Platform: |
Size: 11994112 |
Author: 王俊杰 |
Hits:
Description: 用线性同余法和Wichman-Hill算法产生[0,1]均匀分布的随机数-With a linear congruent method and Wichman-Hill algorithm to generate [0,1] uniformly distributed random number
Platform: |
Size: 5120 |
Author: 小于儿 |
Hits:
Description: Hill Algorithm
This system is based on linear algebra and has been important in the history of cryptography. It was invented by Lester S. Hill in 1929, and was the first polyalphabetic cryptographic system that was convenient to work with more than three symbols simultaneously.
Platform: |
Size: 111616 |
Author: galex |
Hits:
Description: 用C语言编的,密码学基础中的hill算法。-Hill algorithm in C language, the basis of cryptography.
Platform: |
Size: 28672 |
Author: 李李 |
Hits:
Description: Decrypht using Hill algorithm in python
Platform: |
Size: 4096 |
Author: pedraza1721 |
Hits:
Description: 希尔算法,很快的算法,排序十分简单,欢迎下载-Hill algorithm, fast algorithms, sorting is very simple.
Platform: |
Size: 1024 |
Author: liuwei |
Hits:
Description: 线性同余法-Wichmann-Hill算法产生服从均匀分布的随机变量(The linear congruence -Wichmann-Hill algorithm produces random variables subject to uniform distribution)
Platform: |
Size: 96256 |
Author: 小明123456
|
Hits:
Description: hill密码的加密算法实现,其中可以改变矩阵大小(Implementation of encryption algorithm for hill cipher)
Platform: |
Size: 172032 |
Author: 123点
|
Hits:
« 12
3
4
5
6
7
8
9
10
...
16
»