Traveling Salesperson Problem Our branch-and-strategy splits a branch and bound solution into two groups: one group including a particular arc and the other excluding this arc. 1.Each splitting incurs a lower bound and we shall traverse the searching tree with the "lower" lower bound. 2.If a constant subtracted from any row or any column of the cost matrix, an optimal solution does not change.
标签: branch-and-strategy Salesperson Traveling solution
上传时间: 2013-12-29
上传用户:璇珠官人
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
THIS DOCUMENT IS PROVIDED TO THE USER AS IS . Etc.etc. Data from HITACHI LIQUID CRYSTAL CHARACTER DISPLAY MODULE and OPTREX DOT MATRIX LCD MODULE databooks
标签: DOCUMENT CHARACTE PROVIDED CRYSTAL
上传时间: 2013-12-16
上传用户:yuchunhai1990
This program implements a PIC-based fuzzy inference engine for the Fudge fuzzy development system from Motorola. It works by taking the output from Fudge for the 68HC11 processor, and converting it to a MPASM compatible assembler file using the convert batch file. This file can then be incorporated with fuzzy.asm to create a fuzzy inference engine. Tool chain ---------- FUDGE -> Fuzzy Rules -> MC68HC11.ASM -> CONVERT.BAT -> RULES.ASM -> MPASM FUZZY.ASM -> INTEL HEX Fuzzy input registers --------------------- current_ins 1..8 x 8-bit raw inputs Fuzzy inference function ------------------------ FuzzyEngine Fuzzy output registers ---------------------- cog_outs 1..8 x 8-bit raw outputs
标签: fuzzy development implements PIC-based
上传时间: 2014-01-18
上传用户:caozhizhi
The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT algorithm (following the ideas in the CMU Task parallel suite). 1.- Generates an input signal vector (dgen) with size n=n1xn2 stored in row major order In this code the size of the input signal is NN=NxN (n=NN, n1=n2=N) 2.- Transpose (tpose) A to have it stored in column major order 3.- Perform independent FFTs on the rows (cffts) 4.- Scale each element of the resulting array by a factor of w[n]**(p*q) 5.- Transpose (tpose) to prepair it for the next step 6.- Perform independent FFTs on the rows (cffts) 7.- Transpose the resulting matrix The code requires nested Parallelism.
标签: iterations performs Bailey number
上传时间: 2014-01-05
上传用户:libenshu01
This section describes the development and extension of a basic power flow program in Matlab. To the extent feasible, complex vector operations are used, even for the calculation of the Jacobian matrix .
标签: development describes extension section
上传时间: 2017-07-01
上传用户:caiiicc
AHP toolbox AHPCALC Perform a complete AHP calculation. AHPHIER One-step hierarchical assembly of AHP weighting vector. AHPREORDER Internal reordering function called by AHPCALC. AHPVECTOR Calculate the AHP ranking or weighting vector from an AHP reciproal matrix. AHPMAKEMAT Turn a vector of comparisons into an AHP reciprocal matrix. Copyright (C) 2001 Michael J. Scott
标签: calculation hierarchic AHP One-step
上传时间: 2013-11-28
上传用户:PresidentHuang
list of matlab m-files on matlab 7.0. learning , support vector machine and some utility routines : autocorrelation, linearly scale randomize the row order of a matrix
标签: matlab learning routines m-files
上传时间: 2017-07-24
上传用户:evil
Two scripts are included here. 1. convsys.m - combines the state space representation of two systems connected in series. [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) This algorithm gives the convolution of two state space representations | A1 B1 | | A2 B2 | u ==> | | ==> | | ==> y | C1 D1 | | C2 D2 | The algorithm also accepts state space objects as inputs and gives out a state space object as output. 2. sysfeedbk.m [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) Gives the closed loop state space representation for two systems connected with negative feedback in the following manner. | A1 B1 | u ==> | | ==> y + o | C1 D1 | | - | | | | A2 B2 | | |= | |= | | C2 D2 | The zip file also contains checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.
标签: representation included combines scripts
上传时间: 2017-07-25
上传用户:semi1981
Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).
标签: networks blocking switched Because
上传时间: 2017-07-28
上传用户:zhangzhenyu