This program is a new way to estimate the coherence function. It s based on the MVDR and is much more reliable than the classical Welch s method implemented in MATLAB. There are 2 programs: the main program called coherence_MVDR.m and and an example, called illustrate.m, that calls the main function to show how it works. There also included 2 papers that we published on this algorithm.
标签: coherence the estimate function
上传时间: 2016-07-03
上传用户:athjac
The Universal Asynchronous Receiver Transmitter (UART) is a popular and widely-used device for data communication in the field of telecommunication. There are different versions of UARTs in the industry.
标签: Asynchronous Transmitter widely-used Universal
上传时间: 2014-11-06
上传用户:star_in_rain
Sun’s most advanced certification program in Java technology is the Sun Certified Enterprise Architect (“SCEA”) for Java 2 Platform. This book, the Sun Certified Enterprise Architect for J2EE Study Guide (Exam 310-051), provides all the information that you may need to prepare for the SCEA. It has detailed chapters and a CD covering all the topics of the SCEA exam. To pass the certification, the candidate should be familiar with the fundamentals of Java applications programming and should have skill in Java programming. Additionally, There are some specific technologies that the candidate should know we
标签: certification Enterprise technology Sun
上传时间: 2016-07-27
上传用户:李梦晗
A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are a significant problem, and can be exceedingly difficult to identify in the field. These types of quality problems can be addressed in the design phase with relatively little effort, and with far less expense than will be incurred later in the process. Unfortunately, There are many hardware designers and organizations that, for various reasons, do not understand the significance and expense of an unreliable design. The design methodology presented in this text is intended to address this problem.
标签: inherently reliable devices design
上传时间: 2016-07-30
上传用户:xiaodu1124
Advanced UNIX Programming is the long-awaited (19 years!) update to the 1985 original. Maybe "update" isn t the right word--of the 750-or-so pages in the new book, There are maybe two dozen paragraphs that are unchanged. The original covered about 70 system calls, and the new one covers about 300. (这是Advanced UNIX Programming的附书源码)
标签: update long-awaited Programming the
上传时间: 2013-12-19
上传用户:xiaoxiang
This is the source for a C compiler that generates 386 or m68K code. Code generation is fairly good although the optimizer is a little naive... the code itself should be highly portable although There are some issues involved with porting from MSDOS that have to be resolved for example the size of LONG on unix machines is so big some of the code generated gets messed up. Code generation requires TASM to assemble the compiler output you can use the borland TLINK to produce executables, or the Watcom WLINK can also be used. PMODE systems written by TRAN are used for the DPMI interface.
标签: generation generates compiler fairly
上传时间: 2016-08-01
上传用户:sxdtlqqjl
The task of clustering Web sessions is to group Web sessions based on similarity and consists of maximizing the intra- group similarity while minimizing the inter-group similarity. The first and foremost question needed to be considered in clustering W b sessions is how to measure the similarity between Web sessions.However.There are many shortcomings in traditiona1 measurements.This paper introduces a new method for measuring similarities between Web pages that takes into account not only the URL but also the viewing time of the visited web page.Yhen we give a new method to measure the similarity of Web sessions using sequence alignment and the similarity of W eb page access in detail Experiments have proved that our method is valid and e币cient.
标签: sessions clustering similarity Web
上传时间: 2014-01-11
上传用户:songrui
Linux_v1.0 source code, was applicable to study Linux software the personnel of the development in the early years, There is detailed code annotation.
标签: development applicable personnel the
上传时间: 2013-12-22
上传用户:zhuyibin
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, There is no need to re-establish a secure tunnel.
标签: Identity Protocol Host implemetation
上传时间: 2016-09-01
上传用户:皇族传媒
The toolbox solves a variety of approximate modeling problems for linear static models. The model can be parameterized in kernel, image, or input/output form and the approximation criterion, called misfit, is a weighted norm between the given data and data that is consistent with the model. There are three main classes of functions in the toolbox: transformation functions, misfit computation functions, and approximation functions. The approximation functions derive an approximate model from data, the misfit computation functions are used for validation and comparison of models, and the transformation functions are used for deriving one model representation from another. KEYWORDS: Total least squares, generalized total least squares, software implementation.
标签: approximate The modeling problems
上传时间: 2013-12-20
上传用户:15071087253