搜索资源列表
communication_model.rar
- 一个混沌保密通信的simulink模型,效果很好,A chaotic secure communication of the simulink model, the effect of good
dcsk3.rar
- 混沌保密通信SIMULINK建模。自己作的很好的东西。,SIMULINK modeling of chaotic secure communication. Themselves for the good things.
Spread_Spectrum
- Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reason
how2across_the_river_safely
- 用MATLAB实现“商人怎样安全过河”模型求解-Using MATLAB to solve“how to secure traders to cross the river” model
amorph
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
vm2
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
VC.MATLAB
- VC和matlab的教程,好用,放心下载,希望对大家有帮助-VC, and matlab tutorial, easy to use, secure download, we want to help
pee
- 高压直流输电线路电磁场的计算,指导高压直流输电线路的铺设。计算安全上线-HVDC transmission line calculation of electromagnetic fields to guide the laying of high voltage direct current transmission lines. Computationally secure on-line
SHA
- A code for Secure Hashing
chaos_communication1
- 在两个混沌系统实现单变量驱动耦合同步情况下,采用混沌遮掩的加密方式,实现混沌保密通信,-Two chaotic systems synchronize single variable drive coupling case, the use of chaos cover of encryption, Secure Communication,
kong1
- special AES key generation algorithm for using secure transformation of the data from one user to another
hyper-chaos-synchronzation
- 实现了一种基于实际信道的超混沌保密通信方案的混沌同步,参考文献《一种基于实际信道的超混沌保密通信方案》-Achieve a channel based on the actual secure communication hyperchaotic synchronization program, references, " based on the actual channel ultra-secure communication solutions."
Bidirectional-quadtree-in-matlab
- matlab 中实现一个四叉树的结构,使用递归过程,整合成一次二向遍历-secure yourself with a simple quadtree in matlab
MATLAB
- 通过混沌算法对图像和单一信号进行加密和解密,混沌算法在保密通信中应用-By chaos algorithm for encryption and decryption of the image and a single signal, chaos algorithm application in secure communication
Audio Processing using Matlab
- Audio processing is the intentional alteration of auditory signals. The major application area of the audio processing is in the field of music. One of the practical examples that demonstrate audio processing is audio mastering processor for audio co
Motion-Detection-in-MATLAB
- motion detection pcoded files are not encrypted, they are just obfuscated by being pre-parsed into the format which is directly used by the MATLAB execution engine, which is not human-readable. They are not a secure way of protecting your source code
Secure Audio Based Unclocking System
- Secure Audio Based Unlocking System
WOW_matlab
- 信息隐藏代码,,采用内容自适应的方法,用于图像隐写的最安全的算法。(The most secure algorithm for image steganography, content adaptation)
NEW SECURE IMAGE TRANSACTION TECHNIQUE-GUI
- Secure image data hiding using mosaic method
量子密钥分发密钥率仿真MATLAB代码
- 量子密钥分发是安全分发密钥的一种方式,文件包含其密钥率和传输距离的仿真代码,包含各类协议的比较,直接运行即可,非常有用的资料。。。。(Quantum key distribution (QKD) is a way of secure key distribution. The file contains the simulation code of key rate and transmission distance, and the comparison of various protocol