Multimedia security: the 22nd century approach
資源簡介:Multimedia security: the 22nd century approach
上傳時間: 2016-02-26
上傳用戶:waizhang
資源簡介:Context-Sensitive Semantic Smoothing for the Language Modeling approach to Genomic IR(上下文敏感的語義平滑的語言建模方法)
上傳時間: 2015-11-04
上傳用戶:pkkkkp
資源簡介:UCL Common Code Library Routines common to a number of Multimedia tools. The library originates from work on the RAT project: these are portions that are not directly related to an audio tool and potentially useful elsewhere.
上傳時間: 2013-12-25
上傳用戶:xiaohuanhuan
資源簡介:Multimedia Messaging Service An Engineering approach To MMS[John Wiley And Sons] 這就是一本MMS好書,都已經搜到這個關鍵詞我就不多介紹了
上傳時間: 2013-12-18
上傳用戶:changeboy
資源簡介:Animal Cell Technology - Challenges for the 21st century
上傳時間: 2017-04-21
上傳用戶:363186
資源簡介:Calculate the reflection and transmission coefficients using the S-Matrix approach in Matlab.
上傳時間: 2014-12-03
上傳用戶:whenfly
資源簡介:PhD thesis on nonlinear diffusion filtering of images using the topological gradient approach to edges detection
上傳時間: 2014-12-22
上傳用戶:ruan2570406
資源簡介:Multimedia security development articles
上傳時間: 2017-07-15
上傳用戶:hzy5825468
資源簡介:An Overview of Smart Card security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-...
上傳時間: 2017-09-25
上傳用戶:busterman
資源簡介:From helping to assess the value of new medical treatments to evaluating the factors that affect our opinions and behaviors, analysts today are finding myriad uses for categorical data methods. In this book we introduce these methods and...
上傳時間: 2014-01-25
上傳用戶:jennyzai
資源簡介:The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved for...
上傳時間: 2016-12-08
上傳用戶:fxf126@126.com
資源簡介:The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Emb...
上傳時間: 2017-08-15
上傳用戶:cjf0304
資源簡介:Digital radios have undergone an astonishing evolution in the last century. Born as a set of simple and power-hungry electrical and electromechanical devices for low data rate transmission of telegraph data in the Marconi age, they have tra...
上傳時間: 2020-06-01
上傳用戶:shancjb
資源簡介:卡耐基.梅隆大學的牛發寫的關于孤立點和數據清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may imp...
上傳時間: 2017-08-29
上傳用戶:thinode
資源簡介:We consider the problem of target localization by a network of passive sensors. When an unknown target emits an acoustic or a radio signal, its position can be localized with multiple sensors using the time difference of arrival (T...
上傳時間: 2016-11-27
上傳用戶:xxmluo
資源簡介:The capability of radio waves to provide almost instantaneous distant communications without interconnecting wires was a major factor in the explosive growth of communica- tions during the 20th century. With the dawn of the 21st century, th...
上傳時間: 2020-05-26
上傳用戶:shancjb
資源簡介:When the authors of this book asked me to write the foreword of their work on the digital enterprise, I immediately thought that it was one more document on a fashionable topic in the technology and the business world of the 21st century of...
上傳時間: 2020-05-27
上傳用戶:shancjb
資源簡介:Much of Game Theory has developed within the community of Economists, starting from the book “Theory of Games and Economic behavior” by Mor- genstern and Von Neumann (1944). To a lesser extent, it has had an impact on biology (with the de...
上傳時間: 2020-05-27
上傳用戶:shancjb
資源簡介:In the nineteenth century, scientists, mathematician, engineers and innovators started investigating electromagnetism. The theory that underpins wireless communications was formed by Maxwell. Early demonstrations took place by Hertz, Tesla ...
上傳時間: 2020-05-27
上傳用戶:shancjb
資源簡介:The unguided transmission of information using electromagnetic waves at radio frequency (RF) is often referred to as wireless communications, the first demonstration of which took place at the end of the 19th cen- tury and is attributed to ...
上傳時間: 2020-06-01
上傳用戶:shancjb
資源簡介:Welcome to the third volume of the book entitled Technologies for the Wireless Future, which is produced by WWRF. The idea is to take the most important outputs from the working groups and special-interest groups that compose the Forum and ...
上傳時間: 2020-06-01
上傳用戶:shancjb
資源簡介:Electrostatic discharge (ESD) phenomena have been known to mankind since the Greek Empire when Thales of Miletus, one of the Seven Sages of Greece, noticed the attraction of strands of hay to amber, leading to the coining of the word ‘‘el...
上傳時間: 2020-06-05
上傳用戶:shancjb
資源簡介:The countless technological advances of the twentieth century require that futureengineering educationemphasizebridging thegapbetweentheoryand the real world.Thisedition hasbeenprepared withparticular attentiontothe needs of undergraduates,...
上傳時間: 2020-06-10
上傳用戶:shancjb
資源簡介:Modern information technologies and the advent of machines powered by artificial intelligence (AI) have already strongly influenced the world of work in the 21st century. Computers, algorithms and software simplify everyday tasks, and it is...
上傳時間: 2020-06-10
上傳用戶:shancjb
資源簡介:Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone i...
上傳時間: 2017-05-25
上傳用戶:變形金剛
資源簡介:Steganography is the art of communicating a message by embedding it into Multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An a...
上傳時間: 2017-07-29
上傳用戶:
資源簡介:The Tao of Network security Monitoring Beyond Intrusion Detection
上傳時間: 2014-08-15
上傳用戶:zwei41
資源簡介:IPsec VPN的RFC文檔集合: RFC 2401 《security Architecture for the Internet Protocol》 RFC 2402 《IP Authentication Header》 RFC 2406 《IP Encapsulating security Payload (ESP)》 RFC 2407 《The Internet IP security Domain of Interpretation...
上傳時間: 2015-04-21
上傳用戶:hebmuljb
資源簡介:Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software i...
上傳時間: 2015-04-30
上傳用戶:bjgaofei
資源簡介:Halting The Hacker A Practical Guide To Computer security
上傳時間: 2014-01-06
上傳用戶:希醬大魔王