-
PIC MCU sets typical applications: arith
PIC系列单片机典型应用程序集:
arith-PIC MCU sets typical applications: arith
- 2022-08-10 17:28:41下载
- 积分:1
-
LCD1602 字符型显示,可实现与单片机接口,代码中含测试程序
LCD1602 字符型显示,可实现与单片机接口,代码中含测试程序-Character LCD1602 display can be realized with single-chip interface, the code with test procedures
- 2022-03-23 22:08:01下载
- 积分:1
-
完成了了一般图书管理系统的基本功能 图书的入库出库
完成了了一般图书管理系统的基本功能 图书的入库出库-Completion of the general library management system of the basic functions of a library book storage
- 2022-08-03 06:04:05下载
- 积分:1
-
BCB 操作Word
由于关于BCB操作word的文档较少,这里用DLL的方式创建Word,并向里面动态添加内容,动态效果明显。BCB用Ole容器的方式操作Word,完成报表。我们自己设计的很多应用程序,往往少不了将数据输出,让用户进行二次处理。输出到哪里最合适?当然是用户使用最多的、处理最方便的工具软件,这个工具往往使我们想起Word。
- 2022-03-14 04:34:13下载
- 积分:1
-
JavaSocket_线程及RMI开发框架
JavaSocket_线程及RMI开发框架-JavaSocket_ thread and the RMI Development Framework
- 2022-01-21 22:25:00下载
- 积分:1
-
通信网2 全了,一共6个教程
通信网2 全了,一共6个教程-communications network throughout the 2, a total of six Guide
- 2022-05-09 03:31:09下载
- 积分:1
-
文件搜索工具
是一个能根据用用户输入而搜索的工具,搜索的是程序或音乐、电影可直接打开。是一个很方便的工具,用c语言写的对初学者有很大帮助。
- 2022-06-15 17:06:49下载
- 积分:1
-
世界500强面试题,很有趣
世界500强面试题,很有趣- The world 500 strong test questions, are very interesting
- 2022-04-11 16:43:03下载
- 积分:1
-
代数重建技术(ART)为
Algebraic Reconstruction Techniques (ART) for
Three-dimensional Electron Microscopy and X-ray photography
- 2022-01-25 18:55:00下载
- 积分:1
-
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添...
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像・用提取出
的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此
可以估计出原始的鲁棒水印・通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试
验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性
-A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good
- 2023-07-21 02:35:04下载
- 积分:1