代码搜索:Random
找到约 10,000 项符合「Random」的源代码
代码结果 10,000
www.eeworm.com/read/410262/11295262
h sys_random.h
//sys_random.h
//the declaration of all random functions needed by the simulation project
//////////////////////////////////////////////////////////////////////////////
#if !defined(CDMA__SIMULAT
www.eeworm.com/read/410262/11295286
cpp sys_random.cpp
#include "math.h"
#include "stdio.h"
#include "iostream.h"
//#include "fstream.h"
#include "iomanip.h" /////////////for setw();
#include "string.h"
// C string library
#include "inclu
www.eeworm.com/read/263959/11335385
m random0.m
function ran = random0(n,m)
%RANDOM0 Generate uniform random numbers in [0,1)
% Function RANDOM0 generates an array of uniform
% random numbers in the range [0,1). The usage
% is:
%
% random0
www.eeworm.com/read/263314/11367821
txt random_generator.txt
-- Pseudo Random Bit Sequence Generator
-- This design entity uses a single conditional signal assignment statement to describe a PRBSG register.
-- The length of the register and the two tapping p
www.eeworm.com/read/263146/11373792
odc random-sets.odc
www.eeworm.com/read/407662/11412479
m random_data.m
function b = random_data(nr_data_bits)
% b = random_data(nr_data_bits)
%
% Generates a block of equiprobable random binary data, {0, 1}
%
% Input:
% nr_data_bits = the number of bits to genera
www.eeworm.com/read/403874/11507552
dsp random_n.dsp
# Microsoft Developer Studio Project File - Name="random_n" - Package Owner=
# Microsoft Developer Studio Generated Build File, Format Version 6.00
# ** DO NOT EDIT **
# TARGTYPE "Win32 (x86)
www.eeworm.com/read/403874/11507553
ncb random_n.ncb
www.eeworm.com/read/403874/11507554
plg random_n.plg
Build Log
--------------------Configuration: random_n - Win32 Debug--------------------
Command Lines
Creating temporary file "C:\DOCUME~1\Owne
www.eeworm.com/read/403874/11507555
dsw random_n.dsw
Microsoft Developer Studio Workspace File, Format Version 6.00
# WARNING: DO NOT EDIT OR DELETE THIS WORKSPACE FILE!
###############################################################################