-
涉及了java开发时tomcat的大多关键配置,值得一看.
涉及了java开发时tomcat的大多关键配置,值得一看.-Java development involves the most critical when the tomcat configuration, worth a visit.
- 2022-01-26 02:23:05下载
- 积分:1
-
C袖珍参考
C Pocket Reference
- 2022-01-23 10:35:10下载
- 积分:1
-
VC common data type conversion Elaborates on
VC常用数据类型转换阐述
- 2023-05-12 11:50:03下载
- 积分:1
-
弹球游戏,很好玩的游戏,不完会后悔的。通过该例可以了解记事本的实现方法...
弹球游戏,很好玩的游戏,不完会后悔的。通过该例可以了解记事本的实现方法-Pinball game, the game is a lot of fun ... ... ... ... ... ...
- 2022-03-05 21:02:56下载
- 积分:1
-
中国的移动通信发展
中国的移动通信发展-China Mobile Communications Development
- 2022-02-11 13:01:07下载
- 积分:1
-
一种BIN码与BCD码转换电路的设计与实现.pdf
一种BIN码与BCD码转换电路的设计与实现.pdf-a BIN-coded decimal converter circuit design and implementation. Pdf
- 2022-04-08 23:34:42下载
- 积分:1
-
Applet与Swing]压缩文件
Applet与Swing]压缩文件 -Applet and Swing] compressed files
- 2022-04-30 14:12:54下载
- 积分:1
-
Stanley Lippman和Josée Lajoie编写的C++初级到中级程度的编程学习用书,除原理讲解比较详细外,还配大量源码与练习题,方便学习使用。...
Stanley Lippman和Josée Lajoie编写的C++初级到中级程度的编程学习用书,除原理讲解比较详细外,还配大量源码与练习题,方便学习使用。-Stanley Lippman and Josée Lajoie written in C++ programming beginner to intermediate level of study and books, in addition to theory to explain in more detail, but also with a large number of source code and exercises to facilitate learning.
- 2023-05-16 20:05:04下载
- 积分:1
-
怎样辞别烦恼
摘要:关键字:成长、烦恼、改变、完善
怎样辞别烦恼
摘要:关键字:成长、烦恼、改变、完善-said goodbye how trouble Abstract : Keywords : growth, a problem, change, improve
- 2022-08-02 10:52:48下载
- 积分:1
-
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添...
提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像・用提取出
的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此
可以估计出原始的鲁棒水印・通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试
验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性
-A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good
- 2023-07-21 02:35:04下载
- 积分:1