-
ADOCE3_0在嵌入式农田信息采集系统中的应用研究,该书是嵌入式开发的很好的参考文献...
ADOCE3_0在嵌入式农田信息采集系统中的应用研究,该书是嵌入式开发的很好的参考文献-ADOCE3_0 in the embedded field information collection system for applied research, the book is well embedded development references
- 2023-05-01 04:25:04下载
- 积分:1
-
因特网应用高级编程包括Finger/FTP/Gopher/Http/IsAPI/Ping/RAS/Telnet等
因特网应用高级编程包括Finger/FTP/Gopher/Http/IsAPI/Ping/RAS/Telnet等-Internet applications including high-level programming Finger/FTP/Gopher/Http/IsAPI/Ping/RAS/Telnet, etc.
- 2022-03-11 06:52:59下载
- 积分:1
-
CPUKA based on the design, and control of learners FPGA care
基于CPUKA的设计,和控制,对FPGA学习者的照料-CPUKA based on the design, and control of learners FPGA care
- 2022-02-10 10:58:23下载
- 积分:1
-
VB commonly used internal function books Language : English books categories : p...
VB常用内部函数
书籍语言: 简体中文
书籍类型: 程序设计
授权方式: 免费软件
书籍大小: 50 KB
-VB commonly used internal function books Language : English books categories : program design license : free software books Size : 50 KB
- 2022-08-03 18:54:49下载
- 积分:1
-
dvfarehe聂尔错我们fwfwqwe WQ FWQ fqwqefqw FW fwwq基金我们FQW fqweqw fqwfq WWE铁…
dvfarehe nyer we fwfwqwe wq fwq fqwqefqw fw fwwq qef qwe fqw fqweqw fqwfq wwe fewq fqwe fqwe fqwf ewqf we qwfq322r2r2 3r2r 3j68kı h-dvfarehe nyer we fwfwqwe wq fwq fqwqefqw fw fwwq qef qwe fqw fqweqw fqwfq wwe fewq fqwe fqwe fqwf ewqf we qwfq322r2r2 3r2r 3j68kı h
- 2022-08-20 05:15:59下载
- 积分:1
-
Smart Card communication include tx and rx
Smart Card communication include tx and rx
- 2022-11-29 16:55:04下载
- 积分:1
-
继承运算放大器应用电路集锦,望笑纳,别见效,多提意见多开玩笑,...
继承运算放大器应用电路集锦,望笑纳,别见效,多提意见多开玩笑,-succession Operational Amplifiers circuit Gallery, Pillar heart, do not fix their criticism more than a joke. Ha Ha Ha Ha Ha Ha Ha
- 2022-03-29 03:01:23下载
- 积分:1
-
《地理信息系统设计》书中的配套powerpoint文档
《地理信息系统设计》书中的配套powerpoint文档
- 2022-05-28 01:40:26下载
- 积分:1
-
组播以其独特的优势,在网络通信方面的应用越来越广泛,但随之而来的就是安全问题,其中密钥管理是最基本的问题之一。本文研究了安全组播中的密钥管理问题。介绍了现有的两...
组播以其独特的优势,在网络通信方面的应用越来越广泛,但随之而来的就是安全问题,其中密钥管理是最基本的问题之一。本文研究了安全组播中的密钥管理问题。介绍了现有的两种主要解决方案,即SKDC方案和密钥树管理方案,并分析了它们的不足之处,指出基于密钥树的研究方向,在此基础上提出基于Huffman密钥分级树的密钥管理方案,将布尔函数的分析方法运用其中使管理简便化。并对该方案的性能从密钥管理的存储空间和密钥刷新通信量两个方面,给出了相应的分析。-Multicast With its unique advantages in the communication network is widely applied, but the attendant security issues, key management is the most basic one of the problems. This paper studies the security Multicast key management issues. Of the two main existing solutions, and key programs SKDC tree management program analysis of their deficiencies, that the tree on the key directions of research on this basis based on the classification tree Huffman key Key Management Program, Boolean function of the analytical method which enable the use of simple. Program and the performance of key management from the storage space and traffic Key set two, given the corresponding analysis.
- 2023-04-29 21:50:02下载
- 积分:1
-
一种基于贝叶斯理论的目标验证方法。
提出了一种验证图像中候选目标的新方案. 综合目标的先验知识,将目标验证转化为给定候选目标的条
件下,图像特征观察集合...
一种基于贝叶斯理论的目标验证方法。
提出了一种验证图像中候选目标的新方案. 综合目标的先验知识,将目标验证转化为给定候选目标的条
件下,图像特征观察集合的条件概率问题. 同时,提取图像的短线段特征,利用短线段特征的观察,给出了一种目标
验证方法排除复杂场景图像中虚假建筑物目标. 在自然图像集上进行的实验表明,所提出的方法能有效排除虚假
目标,满足处理自然图像的要求.-Based on Bayesian theory the goal of authentication methods. A candidate for the target image to verify the new program. Comprehensive prior knowledge of the target, the target to verify the candidate into a given target under the conditions of image feature observe the collection of conditional probability problems. At the same time, extract the image characteristics of short-paragraph the use of short-term observation of the characteristics above, given a goal of authentication method to exclude false images of complex scenes building goals. Set in the natural image experiments show that the proposed method can effectively rule out the possibility of false targets, to meet the deal with natural images requirements.
- 2022-02-09 17:12:25下载
- 积分:1