Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (10)
client-serveur
no vote
The basic client-server model involves a client process, which requires the execution of a service, and a server process that performs this service. Client and server are located on two machines connected by a communication network. This model was introduced to implement the first distributed applications (file transfer, connection to a remote machine, electronic mail, etc.), each performed by a specific application protocol. In a second step, a common construction, remote procedure call, was introduced to provide a general tool for programming client-server applications.
djihen bhl
2016-08-23
1
1
application_client_serveur
no vote
djihen bhl
2016-08-23
0
1
LSB algorithm watermarking
no vote
in this programme with matlab ,a simple and robust watermarking algorithm is presented by using the third and the fourth least significant bits (LSB) technique. The proposed algorithm is more robust than the traditional LSB technique in hiding the data inside the image. Using the proposed algorithm, we will embed two bits in the third and fourth LSB. Experimental results show that the quality of the watermarked image is higher.
djihen bhl
2016-08-23
0
1
wong_watermarking
no vote
This work is the current digital watermarking technology in the past work, using Huang, Huang has proposed secret key10 and public key11 watermarking algorithm for image authentication, which can detect and localize any changes to the watermarked image. Based on data block, the image is divided into non overlapping blocks to verify each block. Later, Holliman and memon12 observed that many block based watermarking schemes are vulnerable to substitution attacks. They follow the specifications that show that plan Huang can be attacked using the vector quantization (VQ) method. This attack takes advantage of the fact that if a large number of Su Æ ci ent images containing the same watermark bitmap are not available, a new image watermark can be created by using VQ similar technology. Regarding the same time and independence, coppersmith et al.13 proposed to use overlapping blocks to resist this attack. Although this method can make the attack ine Æ cent, it does make sense with the localized property loss of beveled watermark. In this paper, we will extend Huang schemes10,11, so the resulting algorithm can resist VQ attack, and also provide the same localized attribute watermark as the original scheme. The key idea is a unique process of image watermark insertion based on block ID, so that VQ attack will not have enough codebook to create watermark.
djihen bhl
2016-08-23
0
1
dijkstra_algoritm
no vote
djihen bhl
2016-08-23
0
1
jDBC algorithm
no vote
JDBC ™ The API is designed to keep simple things simple. This means that JDBC is easy for daily database tasks. This path takes you through the use of JDBC to execute common SQL statements, and to execute other targets together as examples of database applications. JDBC API is a Java API, which can access any type of table data, especially the data stored in relational database. DBC helps you write Java applications. It manages the three activities of these programming: connecting to data sources, such as databasesend query and updating to databaseretrieve statement, and processing the results. Receive a reply from JDBC ™ API provides programming access to relational data from Java ™ Database in programming language. Using JDBC API, applications can execute SQL statements, retrieve results, and propagate changes back to underlying data sources. JDBC API can also interact with multiple data sources in distributed heterogeneous environment. JDBC API is a Java platform, including Java ™ Standard Edition (Java) ™ SE) and Java ™ Enterprise Edition (Java) ™ EE). The JDBC 4.0 API is divided into two packages: java.sql And javax.sql . Both packages are included in the Java Se and Java EE platforms. Here, you will learn the basics of JDBC API.
djihen bhl
2016-08-23
0
1
JPA algorithm
no vote
You find in this file a simple application of object persistence in the library book, which is recorded in the database as an example. The Java persistence API provides Java developers for managing relational data in Java applications with object / relational mapping facility. There are four domains of Java persistence considerations: Java persistence API, query language, Java persistence criteria API, object / Relation Mapping metadata, Java persistence API provides POJO persistence model, which is used for object relation mapping. Java persistence API is developed by EJB 3.0 software expert group as a part of JSR 220, but its use is not limited to EJB software components. It can also be used directly through web applications and application clients, inside and outside, and even the Java EE platform.
djihen bhl
2016-08-23
0
1
hibernat algorithm
no vote
Hibernation solution open source type ORM (object relation mapping) develop De La couche and insist on D \'une application. Dormant permet donc de repr é senter une base de donn é es en art Java ET and vice versa. The technology of hibernation and wrinkle removal can last for a long time. La quantit é de code ainsi é pargn é e EST is also important. D'autant que CE Code EST g é n é ralement fastidieux et redondant. Dormant people notamment à cause de SES maid to perform et de son Association à de nombreuses base de donn é es. Les base de donn é es support é es memory Les singlet Du March é: DB2, Oracle, mysql, PostgreSQL, Sybase, SQL server, SAP dB, we,... Sleep besoin de plusieurs é L é ments inverted fontioner: une class de type JavaBean Label entella class et la table (mapping) des propri é t é s de configure notamment des information La base de donn é es
djihen bhl
2016-08-23
0
1
biometric system
no vote
Biometrics is a method by which a person's authentication information is generated by digitizing measurements of a physiological or behavioral characteristic. Biometric authentication verifies user's claimed identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Fingerprints remain constant throughout life. In over 140 years of fingerprint comparison worldwide, no two fingerprints have ever been found to be alike, not even those of identical twins. Good fingerprint scanners have been installed in PDAs like the iPaq Pocket PC; so scanner technology is also easy. Might not work in industrial applications since it requires clean hands.  Fingerprint identification involves comparing the pattern of ridges and furrows on the fingerti
djihen bhl
2016-08-23
0
1
digital image watematking using wong
no vote
Using Huang's current work on digital watermarking, in previous work, Huang has proposed both secret key10 and public key11 watermarking algorithms for image authentication that can detect and localize any changes made to a watermarked image. In other words, the separated images are divided into non overlapping blocks, and each block is verified separately block.Subsequently Holiman and memon12 observed that many block based watermarking schemes are susceptible to substitution attacks. Their specific US cloud shows that the Yellow scheme can use the vector quantization (VQ) method. The attack takes advantage of the fact that if the image contains the same watermarkbitmap and a su Æ ci ent number is available, a VQ like technique can be used to forge the watermark into a new image. As for sametime and independence, coppersmith et al. [13] proposed using overlapped blocks to resist this attack. Althoughthis method can make attacks on ine Æ cent, it does so by localizing the attributes of watermark with significant loss, we extend Huang schemes10 in this paper, 11 makes the algorithm can resist the VQ attack, and at the same time provides a unique image subordinate block ID to the watermark process in the key idea of the original plan with the same localization attribute of the watermark, so that the VQ attack will not have enough arich Hotel codebook "forged watermark".
djihen bhl
2015-03-05
0
1
No more~