虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

cal

  • 提供了几种数据拟合的c++代码:1 直线拟合(FIT);2 线性最小二乘法((LFIT, COVSRT), (SVDFIT, SVDVAR)(oddity), (FPOLY, FLEG)(exampl

    提供了几种数据拟合的c++代码:1 直线拟合(FIT);2 线性最小二乘法((LFIT, COVSRT), (SVDFIT, SVDVAR)(oddity), (FPOLY, FLEG)(example));3 非线性最小二乘法((MRQMIN(Levenberg-Marguardt), MRQCOF(evaluation)), FGAUSS(example));4 绝对值偏差最小的直线拟合(MEDFIT(cal para), ROFUNC(example))。

    标签: COVSRT SVDFIT SVDVAR oddity

    上传时间: 2014-01-09

    上传用户:bjgaofei

  • 一个命令行运算器源代码 用C++写的命令行运算器

    一个命令行运算器源代码 用C++写的命令行运算器,支持加、减、乘、除、乘方和小括号(可嵌套),乘方的符号是^^,因为在WINDOWS的命令行模式下^是一个连接符。 用法:cal expression expression = expression op expression expression = (expression) op = + | - | * | / | ^^

    标签: 命令行 运算器 源代码

    上传时间: 2013-12-24

    上传用户:gxmm

  • GSM+to+LTE-Advanced

    Wireless technologies like GSM, UMTS, LTE, Wireless LAN and Bluetooth have revolu- tionized the way we communicate and exchange data by making services like telephony and Internet access available anytime and from almost anywhere. Today, a great variety of techni- cal publications offer background information about these technologies but they all fall short in one way or another. Books covering these technologies usually describe only one of the systems in detail and are generally too complex as a first introduction. The Internet is also a good source, but the articles one finds are usually too short and superficial or only deal with a specific mechanism of one of the systems. For this reason, it was difficult for me to recom- mend a single publication to students in my telecommunication classes, which I have been teaching in addition to my work in the wireless telecommunication industry. This book aims to change this.

    标签: GSM LTE-Advanced

    上传时间: 2020-05-27

    上传用户:shancjb

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb

  • Queueing Theory with Packet Telecommunication

    Soon after Samuel Morse’s telegraphing device led to a deployed electri- cal telecommunications system in 1843, waiting lines began to form by those wanting to use the system. At this writing queueing is still a significant factor in designing and operating communications services, whether they are provided over the Internet or by other means, such as circuit switched networks.

    标签: Telecommunication Queueing Packet Theory with

    上传时间: 2020-05-31

    上传用户:shancjb