-
-
-
-
-
Asmuth_Bloom.zip
Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.
-
find_trans_radon_peaks.rar
A simple code to find all the peaks in the radon space which are higher then the threshold given by the user , this code return the polaire coordinates (rho, theta) of every peak
-
AssignmentSubmission.zip
... as in the assignment. In the first part of the assignment is the segmentation using thresholding technique.
Before we threshold the image, we need to prepare the better image for input such as histogram equalization to stretch the intensity ...
-
Meng04_nicola_lenihanmatlb_bom.rar
... radio map of the area with the signal strengths received at the user device from all
transmitters in the area. The Local Optimal Position (LOOP) algorithm identifies the
closest position to the current receiver position that is within a given threshold.
-
Sub-thresholdpoche.rar
基于亚阈值漏电流的数据Cache低功耗控制策略研究Sub-threshold leakage current based on data from low-power control strategy Cache
-
antennatypes.zip
it will be useful for color image denoising and wavelet transform,,,,threshold value
-
21615c.rar
... (5 μs for
F version) of VDD falling through the reset voltage
threshold. RESET is maintained active for a minimum
of 140 ms after VDD rises above the reset threshold.
The TCM812 has an active high RESET output while
the TCM811 has ...
-