This toolbox was designed as a teaching aid, which matlab is particularly good for since source code is relatively legible and simple to modify. However, it is still reasonably fast if used with the supplied optimiser. However, if you really want to speed things up you should consider compiling the matrix composition routine for H into a mex function. Then again if you really want to speed things up you probably shouldn t be using matlab anyway... Get hold of a dedicated C program once you understand the algorithm.
标签: particularly designed teaching toolbox
上传时间: 2016-11-25
上传用户:hustfanenze
对应於codeworker的说明文档;CodeWorker is a versatile Open Source (GNU Lesser General Public License) parsing tool and a source code generator devoted to generative programming.
标签: codeworker CodeWorker versatile General
上传时间: 2014-08-14
上传用户:libenshu01
The Packet Debugger, pdb is a program which allows people to work with packet streams as if they were working with a source code debugger. Users can list, inspect, modify, and retransmit any packet from captured files as well as work with live packet capture.
标签: Debugger program streams Packet
上传时间: 2015-11-14
上传用户:三人用菜
These files contain all of the code listings in Java 2: The Complete Reference The source code is organized into files by chapter. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested. The code for Scrabblet is in its own ZIP file, called CHAP32.ZIP.
标签: The Reference Complete listings
上传时间: 2013-11-29
上传用户:3到15
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.
标签: code Compression huffman provide
上传时间: 2017-05-30
上传用户:yuchunhai1990
Base64 encoding and decoding functions coded in c sharp for simple encryption works. Also source code for increasing speed of asp.net apps by combining javascripts.
标签: encryption functions encoding decoding
上传时间: 2017-06-19
上传用户:hebmuljb
Modern electronic systems solve so many difficult problems that they often seem like magic. Nonetheless, these systems all have thesame basic limitation: they need a source of electrical power! Most of the time this is a straightforward challenge for the electronicdesigner, because there are many power-delivery solutions. Yet sometimes a device has no direct power source, and running wiresor replacing batteries is impractical. Even when long-life batteries are usable, they eventually need to be replaced, which requires aservice call.
标签: 能量收集
上传时间: 2015-01-03
上传用户:zukfu
This book provides technical information about all aspects of 3GPP LTE. The areas covered range from basic concepts to research-grade material, including future directions. The book captures the current state of 3GPP LTE technology and serves as a source of comprehensive reference material on this subject. It has a total of 12 chapters authored by 50 experts from around the world. The targeted audi- ence includes professionals who are designers or planners for 3GPP LTE systems, researchers (faculty members and graduate students), and those who would like to learn about this field.
标签: Technology Cellular Radio 3GPP LTE and
上传时间: 2020-05-26
上传用户:shancjb
Relaying techniques, in which a source node communicates to a destination node with the help of a relay, have been proposed as a cost-effective solution to address the increasing demand for high data rates and reliable services over the air. As such, it is crucial to design relay systems that are able to not only provide high spectral efficiency, but also fully exploit the diversity of the relay channel.
标签: Amplify-and-Forward Relaying
上传时间: 2020-05-26
上传用户:shancjb