提供了几种数据拟合的c++代码:1 直线拟合(FIT);2 线性最小二乘法((LFIT, COVSRT), (SVDFIT, SVDVAR)(oddity), (FPOLY, FLEG)(example));3 非线性最小二乘法((MRQMIN(Levenberg-Marguardt), MRQCOF(evaluation)), FGAUSS(example));4 绝对值偏差最小的直线拟合(MEDFIT(cal para), ROFUNC(example))。
标签: COVSRT SVDFIT SVDVAR oddity
上传时间: 2014-01-09
上传用户:bjgaofei
一个命令行运算器源代码 用C++写的命令行运算器,支持加、减、乘、除、乘方和小括号(可嵌套),乘方的符号是^^,因为在WINDOWS的命令行模式下^是一个连接符。 用法:cal expression expression = expression op expression expression = (expression) op = + | - | * | / | ^^
上传时间: 2013-12-24
上传用户:gxmm
Wireless technologies like GSM, UMTS, LTE, Wireless LAN and Bluetooth have revolu- tionized the way we communicate and exchange data by making services like telephony and Internet access available anytime and from almost anywhere. Today, a great variety of techni- cal publications offer background information about these technologies but they all fall short in one way or another. Books covering these technologies usually describe only one of the systems in detail and are generally too complex as a first introduction. The Internet is also a good source, but the articles one finds are usually too short and superficial or only deal with a specific mechanism of one of the systems. For this reason, it was difficult for me to recom- mend a single publication to students in my telecommunication classes, which I have been teaching in addition to my work in the wireless telecommunication industry. This book aims to change this.
标签: GSM LTE-Advanced
上传时间: 2020-05-27
上传用户:shancjb
The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.
标签: Communications Physical Security Wireless Layer in
上传时间: 2020-05-31
上传用户:shancjb
Soon after Samuel Morse’s telegraphing device led to a deployed electri- cal telecommunications system in 1843, waiting lines began to form by those wanting to use the system. At this writing queueing is still a significant factor in designing and operating communications services, whether they are provided over the Internet or by other means, such as circuit switched networks.
标签: Telecommunication Queueing Packet Theory with
上传时间: 2020-05-31
上传用户:shancjb