代码搜索:Random

找到约 10,000 项符合「Random」的源代码

代码结果 10,000
www.eeworm.com/read/410262/11295262

h sys_random.h

//sys_random.h //the declaration of all random functions needed by the simulation project ////////////////////////////////////////////////////////////////////////////// #if !defined(CDMA__SIMULAT
www.eeworm.com/read/410262/11295286

cpp sys_random.cpp

#include "math.h" #include "stdio.h" #include "iostream.h" //#include "fstream.h" #include "iomanip.h" /////////////for setw(); #include "string.h" // C string library #include "inclu
www.eeworm.com/read/263959/11335385

m random0.m

function ran = random0(n,m) %RANDOM0 Generate uniform random numbers in [0,1) % Function RANDOM0 generates an array of uniform % random numbers in the range [0,1). The usage % is: % % random0
www.eeworm.com/read/263314/11367821

txt random_generator.txt

-- Pseudo Random Bit Sequence Generator -- This design entity uses a single conditional signal assignment statement to describe a PRBSG register. -- The length of the register and the two tapping p
www.eeworm.com/read/263146/11373792

odc random-sets.odc

www.eeworm.com/read/407662/11412479

m random_data.m

function b = random_data(nr_data_bits) % b = random_data(nr_data_bits) % % Generates a block of equiprobable random binary data, {0, 1} % % Input: % nr_data_bits = the number of bits to genera
www.eeworm.com/read/403874/11507552

dsp random_n.dsp

# Microsoft Developer Studio Project File - Name="random_n" - Package Owner= # Microsoft Developer Studio Generated Build File, Format Version 6.00 # ** DO NOT EDIT ** # TARGTYPE "Win32 (x86)
www.eeworm.com/read/403874/11507553

ncb random_n.ncb

www.eeworm.com/read/403874/11507554

plg random_n.plg

Build Log --------------------Configuration: random_n - Win32 Debug-------------------- Command Lines Creating temporary file "C:\DOCUME~1\Owne
www.eeworm.com/read/403874/11507555

dsw random_n.dsw

Microsoft Developer Studio Workspace File, Format Version 6.00 # WARNING: DO NOT EDIT OR DELETE THIS WORKSPACE FILE! ###############################################################################