CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Sub Category
Linux-Unix
Exploit
Scanner
Crack Hack
CA auth
Linux driver
Search in result
Search
OS program list
Sort by :
«
1
2
...
.43
.44
.45
.46
.47
1148
.49
.50
.51
.52
.53
...
16274
»
A-New-Chaotic-Algorithm-for-Image-Encryption
Downloaded:0
A New Chaotic Algorithm for Image Encryption
Date
: 2025-08-02
Size
: 623kb
User
:
ramana
A-Multi-Scale-Bilateral-Structure-Tensor
Downloaded:0
A Multi-Scale Bilateral Structure Tensor
Date
: 2025-08-02
Size
: 414kb
User
:
ramana
1
Downloaded:0
PAPR COCUMENTATION LAW COMPANDING
Date
: 2025-08-02
Size
: 677kb
User
:
ramana
Suspend_Resume
Downloaded:0
Ring3 layer hang process and restore process running source The code is clean and tidy
Date
: 2025-08-02
Size
: 1.19mb
User
:
贾庆鹏
my-research-paper.pdf.tar
Downloaded:0
cost of cybercrimes and information insecurity in india
Date
: 2025-08-02
Size
: 237kb
User
:
sofimukhtar
Kruskal.m
Downloaded:0
This code consists of the example of Kruskal s algorithm to find the minimum-spanning-tree which connects all the nodes through the edge with the least minimum edge values without creating the cycle.
Date
: 2025-08-02
Size
: 1kb
User
:
Peter
NNA.m
Downloaded:0
This code provides an example of the nearest neighbour algorithm to solve traveling salesman problem
Date
: 2025-08-02
Size
: 1kb
User
:
Peter
msequence
Downloaded:0
M sequence binary bit stream bitstream operations are available, and can be used to be transmitted to encrypt the secret message processing, is advantageous for the late transmissio.
Date
: 2025-08-02
Size
: 1kb
User
:
池塘
CPUInfo
Downloaded:0
A cpu can be obtained through _cpuid models, manufacturers and cpu trademark of the cla
Date
: 2025-08-02
Size
: 1kb
User
:
nico
hello_64.asm-first-sample-program
Downloaded:0
x64 assembly hello_64.asm first sample program
Date
: 2025-08-02
Size
: 2kb
User
:
Dev
detection
Downloaded:0
Detection and correction of control flow errors in processors with difference of time between jumping in one block to other block .
Date
: 2025-08-02
Size
: 1kb
User
:
Mohsen
steganography
Downloaded:0
In this code we used a fingerprint as cover and a text image as hidden image by using wdt to enhance security for sending our text.
Date
: 2025-08-02
Size
: 175kb
User
:
Mohsen
«
1
2
...
.43
.44
.45
.46
.47
1148
.49
.50
.51
.52
.53
...
16274
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.