Sponsored links

Top Source Codes

Visual Cryptography

What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Crypto...
  Java Development        JavaScript     

graph cut Image segmentation

function [Ncut] = graphcuts(I,pad,MAXVAL) % function [Ncut] = graphcuts(I) % Input: I image % pad: spatial connectivity; eg. 3 % MAXVAL: maximum image value % Output: Ncut: Binary map 0 or 1 corresponding to image segmentation...
  Image Processing        Matlab     

image hiding steganography using vb

In this project i am doing to do the  image hiding steganography in visual basic .in this steganography we like to do segment the image...
  CSharp        VB     

Steganography using Exploiting Modification Direction

Anti forensics indicates the identifying, investigating the images sent via a network and ensures the imperceptibility and quality of the image. This work presents an SAFE-PC Tool kit [Steganography with Anti Forensics Embedding and Payload Capacity]. The Toolkit provides both the high embedding...
  Algorithm        Java     

coloring of graph

The Product “Exam Scheduling Using graph Coloring Problem” is a Software Simulation of how we can schedule the exam in a institute without the possibility of occurring of more than one exam of any student within the minimum time. It is, basically, the graphical User Interface that schedule of...
  Application        C#     

grapheur java sur axe x et y

ce programme dessine depuis un fichier texte un point ou une ligne sur un grapheur. Si il y a 2 données dans le fichier alors on dessine un point sur un axe et si il y a 4 données dans le fichier alors on dessine une ligne....
  software        Java     

Visual Cryptography

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains...
  Java Development        Java     

Choosing embedded graphical libraries

graphical interfaces are a major component of many embedded systems As usual, the free software and open source world offers a lot of choices to implement graphical interfaces Such a diversity makes it difficult to find one's way through all the available solutions This ta...
  book        PDF     

C # drawing graphs

Often in our program development process will need to draw graphs and bar charts as well, especially when doing statistical functions. But sometimes we do not feel the need to use third-party controls (for example:Zedgraph , etc), this is you can write your own code to implement these drawing functi...
  CSharp        C#     

graph algorithms and MATLAB realization

This is the graph-theoretic algorithm and MATLAB implementation portion of the code in the book, in greater detail, lazy students can take a look, and this book treats all graph theory algorithm realization is good, but there are some small problems....
  Matlab        Matlab     

Data hiding with encrytion using lsb steganography

In this data is a image which i am to hide the image over the other image .if any third party know the information image we can easily get the hidden for that i am goning to encryt the hide image if any attracter try to see the hide image the want the key for it so it more secure then the general ls...
  Matlab        Matlab     

graphical gaussian model

how to compute a graphical gaussian model. It's a good tutorial for machine learning and statistical modelling. PMTK is a collection of Matlab/Octave functions. The toolkit is primarily designed to accompany Kevin Murphy's textbook, but can also be used independently of this b...
  Matlab        Matlab     

how to analyses crap basic matrix

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % Introduction to Matlab % (adapted from http://www.stanford.edu/class/cs223b/matlabIntro.html) % % Stefan Roth <roth (AT) cs DOT brown DOT edu>, 09/08/2003 % % Stolen from cs143 for cs129 by % Patrick Doran <pdoran (...
  Matlab        Matlab     

Simulation study on inverse problem of electrical resistance tomography

1. Matlab realization of finite element method in Electrical Impedance Tomography system problem of data; 2. Matlab realization of Newton - Raphson algorithm for image reconstruction and image reconstruction simulation data are problems....
  Matlab        Matlab     

Parallel matrix algorithms

On parallel matrix algorithms, including how the faces of the four vertices after subtracting fixed temperature data after the first round of the operation is finished, will be the first round of data is passed to the second round in a subtraction operation using loop algorithm until the final tempe...
  Computer Cluster        C++     

Creating graphics with program written in WindowsForms

VC++ in OpenGL draw robot manipulator(OpenGL - C++) - This procedure is prepared using the OpenGL dialog based ... OpenGL MFC templates(OpenGL - C++) - This is a single document VC6.0 OpenGL based template progra ... OPENGL+VC++ realization of gear billet o...
  Windows        C++     

Homography

Compute Hormography matrix of image then correct geometric distortion of that image....
  Image Processing        Matlab     

Transpose of a matrix

Mathematically finding transpose of a matrix is quite easy with a simple formula. But generating the transpose when an input matrix is given,it is quite complex as computer should generate automatically. That automation is possible only if system is feeded by a program written.In this program which...
  math        C     

matrix multiplication

/* matrix.cpp */ const int size = 1000; float a[size][size]; float b[size][size]; float c[size][size]; int main() { // Initialize buffers. for (int i = 0; i < size; ++i) { for (int j = 0; j < size; ++j) { a[i][j] = (float)i + j; b[i][j] =...
  Algorithm        C++     

Encoder on LDPC for low-triangular matrix

The file including the random number generator, converting the Alist matrix into the General matrix,do the enc part. This enc method only focused on the lower-triangular matrix and it can easier get the enc message. Hopeful this file can help you a lot on how to encode the LDPC codes with Lower...
  Communication        C     

Hot Search Keywords


    Sponsored links
bmp?bin |  ant colony applied on graph coloring problem |  neural network design hagan?cmd=sign |  姹囩紪 鐢熸垚闅忔満鏁? |  ?mop=AddEntry&op=modload&name=G hit hit 38 hit 1 href= s 0 |  ?? PHP Link Directory Submit Article ??&? and 1=1?mop=AddE |  rate matching lte |  MK8202RD C?cmd=sign |  article s 0 bingmapsql |  MLFQ scheduling Powered by Jcow Apex |  s? enter word verification in box below guestbook ul |  nmea parser c |  business object?cmd=sign?name=Guestbook Enter the ca?c?mop=A |  Evtx Parser Powered by Easy Guestbook thefts |  quaternion filter color image denoising |  beagle board lane detection methods |  RAIL FENCE |  preamble detection ofdm?mop=AddEntry&name=Guestb &op=modload |  hy stm32 100 |  jpg avi |  FPGA lcd显示 |  byj 3 e230225 |  verilog spi slave Add Article PHP Link Directory?prev=&prev |  ?mop=AddEntry&op=modload&name=Gues hit 1 hit 1 href= s 0 n |  ?mop=AddEntry&op=modload&name=Guestb h h hit 1 href= hit 2 |  st7920 msp430?mop=AddEntry&op=modload&name=Guestb hit 1 href |  firing circuit for IGBT pcb design |  eye nose and mouth detection in face image |  Cooperative caching in MANET NS2 |  bfs romania?mop=AddEntry&name=guestbook h hit 107&op=modload |  缁寸撼婊ゆ尝鐨勫疄鐜?3Fmop=AddEntry&op=modload&nam |  canon EDSDK?mop=AddEntry&name=G hit 10 hit 1 hre&op=modload |  uCOSView V310G?mop=AddEntry&op=modload&name=G hit 1 href= s |  ? enter word verification in box below guestbook?action=?m |  lc72131 bascom?mop=AddEntry&name=Guestbo h hit 95&op=modload |  lis3dh?mop=AddEntry&op=modload&name=Guestb h h hit 2 href= |  mfc?mop=AddEntry&op=modload&name=G hit hit 5 h hit 2 href= |  MapXView?mop=AddEntry&op=modload&name=Guestbo hit 6153 href |  MINST matlab?mop=AddEntry&op=modload&name=Guestbo hit 30878 |  pccn enter word verification in box below guestbook?name=h |  opnet zigbee model ? ei=xFhhUeSV& sa=U& zb path=test? |  opensees源码 Powered by PHPLD Add Article?prev= search |  bluesnarfing |  vmm 最新黄金参考手册?amp ei=lWIxUYTkB4K90QW&amp sa=U |  german dictionary?mode=register&agreed=true&iscanyesno=yeswe |  p2p streaming server |  bitmap process |  Evtx Parser Powered by Easy Guestbook thefts?cmd=sign?mode |  nrf arduino?mop=AddEntry&name=Guestb hit 28 href&op=modload |  Enigma 2 |  SGH i997r infuse 4g recovery |  legendary Three Kingdoms source?mop=AddEntry&name&op=modload |  Affiliate Ultimate Guestbook Version affiliation&ct=clnk |  lte ldpc |  8051 and ds12c887 in asm |  opengl 乌龟 |  通用手写笔迹存储和处理系统的设计与实现 |  DHT11涓嶭CD1602 8051 |  simulink MATLAB AES encryption |  memory pipeline verilog |  asp 静态生成 |  lCD interfacing With FPGA in spi |  DSP5637?name=Guestbook |  plot using c powered by TPK Guestbook now&tbs=qdr:w&ct=cln |  LCD TCB8000A |  atmega8 74HC595 |  windows usb hid send read data |  人脸识别英文 |  iris corner detector matlab |  M M none?cmd=sign |  Developing device driver to interface keyboard on LPC2148 |  ds1280 enter word verification in box below guestbook?name |  AT91SAM7S256 bootloader |  PID 继电 自整定?cmd=sign?cmd=sign |  gaussian delay estiamtion for clock |  legendary Three Kingdoms source |  distance vector routing simulation |  distance vector routing protocol |  bluecore bccmd |  yiqunsuafa enter word verification in box below guestbook |  opensees源码 Powered by PHPLD Add Article&prev= search |  vss |  CLog 鏃ュ織 write |  argb888 Powered by Advanced Guestbook multiplier?cmd=sign |  SQL Server 2008 BI |  水朝美树和月野姬 |  step motor mathematical model in simulink |  lcd 12864 st7920 arduino?mop=AddEntry&op=modload&name=Gu hit |  php home pages |  &#32593 &#21475 &#25968 &#25454 &#35299 &#26512 |  inverter pendulum simulink |  webbrowser getdocument |  vb6 plc omron cqm1 |  tide filter |  tlv2543 enter word verification in box below guestbook?mop |  HMAC md5 C powered by TPK Guestbook wielding?ct=clnk |  制造执行 |  i2c mstar Powered by: php Link Directory Add Article 8 |  heuristic source code |  library management system php mysql |