基于DSP的任意波形合成技术,单片机,d/c转换
上传时间: 2013-11-25
上传用户:阳光少年2016
一种基于分块 D C T的混沌半脆弱图像水印技术,半脆弱数字水印;混沌理论
上传时间: 2014-01-17
上传用户:gundan
FDTD 1-d C++ sourece
上传时间: 2014-01-27
上传用户:zhengjian
Mega16 + MCP3208 12bit A/D >> C-source code >> AVRSTUDIO project >> WinAVR
标签: gt AVRSTUDIO C-source project
上传时间: 2013-12-26
上传用户:weixiao99
一、 一元三次回归方程 CubicMultinomialRegress.cs 方程模型为Y=a*X(3)+b*X(2)+c*X(1)+d public override double[] buildFormula() 得到系数数组,存放顺序与模型系数相反,即该数组中系数的值依次是d,c,b,a。 以后所述所有模型的系数存放均与此相同(多元线性回归方程除外)。 public override double forecast(double x) 预测函数,根据模型得到预测结果 public override double computeR2() 计算相关系数(决定系数),系数越接近1,数据越满足该模型。
标签: CubicMultinomialRegress override public double
上传时间: 2015-11-25
上传用户:13215175592
Description: S-ISOMAP is a manifold learning algorithm, which is a supervised variant of ISOMAP. Reference: X. Geng, D.-C. Zhan, and Z.-H. Zhou. Supervised nonlinear dimensionality reduction for visualization and classification. IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 2005, vol.35, no.6, pp.1098-1107.
标签: Description supervised algorithm S-ISOMAP
上传时间: 2015-04-10
上传用户:wfeel
该源码是一个问题的解决方法。问题是给你个长为L的串,串中可以出现n种字符,还给出m个子串,求有多少个长为n的只由这些字串组成的串。输入例子:4 5 6 ABB BCA BCD CAB CDD DDA 结果为2.而5 4 5 E D C B A的结果为625
标签: 源码
上传时间: 2014-01-12
上传用户:水中浮云
/*** *** *** *** *** *** *** *** *** *** *** *** **/ //**此映射表用来映射LED模块不译码时,显示的字符和必须输入的数据的关系 //**每段和对应比特位的关系见示意图 // g // --- --- // b | a |f | | <---显示0时点亮的段为gfedcb // --- // c | |e | | 那么写入数据为0x7e // --- --- // d // bit: 7 6 5 4 3 2 1 0 // 段位: g f e d c b a
上传时间: 2013-11-25
上传用户:
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
标签: crypthograph information Adleman Rivest
上传时间: 2017-09-01
上传用户:chfanjiang
Two 2D phase unwrapping approaches are included: 1. Phase quality guided path following method. 2. Goldstein's branch cut method. The algorithms are described in: D. C. Ghiglia and M. D. Pritt, Two-Dimensional Phase Unwrapping: Theory, Algorithms and Software. New York: Wiley-Interscience, 1998.
标签: Unwrapping Phase 2D
上传时间: 2016-04-30
上传用户:seanjsj