虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

2020

  • 小波分解与重构

    这是一组小波分解与重构代码,大家可以交流学习

    标签: 小波分解

    上传时间: 2020-01-02

    上传用户:461494244lcz

  • MATLAB7.0

    MATLAB7.0_从入门到精通,求是科技。。。。

    标签: MATLAB7

    上传时间: 2020-01-02

    上传用户:dxtrine

  • 软件维护协议

    软件维护协议,欢迎大家下载。。。。。。。。。。。。。。。。。。。。。。。。

    标签: 软件维护 协议

    上传时间: 2020-01-02

    上传用户:5zouyi

  • 基于卷积神经网络的深度学习模型分析

    深度学习,神经网络,卷积神经网络 Analysis of Deep Learning Models using CNN Techniques

    标签: 卷积 神经网络 模型分析

    上传时间: 2020-01-02

    上传用户:wzy2020

  • ALCOR_U2_MP_v19.04.01.00

    安国U盘量产工具 并不适用于所有U盘,只给有缘人和懂的人

    标签: ALCOR_U MP_v 19 04 01 00

    上传时间: 2020-01-03

    上传用户:HYHol

  • 欧姆龙USB64位系统驱动

    是欧姆龙编程软件自带的是32位系统驱动,这里的是64位系统的驱动。

    标签: USB 64 欧姆龙 系统 驱动

    上传时间: 2020-01-03

    上传用户:hukui8682

  • J.K. Rowling Harry Potter Prequel

    J.K. Rowling - HP 0 - Harry Potter Prequel.pdf

    标签: J.K. Rowling Prequel Potter Harry

    上传时间: 2020-01-03

    上传用户:nothingtiger

  • labview读取excl表格数据

    labview读取表格数据,自己做的一个子vi,简单高效

    标签: labview excl 读取 表格 数据

    上传时间: 2020-01-03

    上传用户:15584153385

  • 在线教学辅助系统

    在线教学辅助系统在线教学辅助系统在线教学辅助系统在线教学辅助系统在线教学辅助系统在线教学辅助系统在线教学辅助系统在线教学辅助系统

    标签: 在线教学 辅助系统Java

    上传时间: 2020-01-04

    上传用户:重度拖延症233

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas