虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

pre-CODING

  • Open-source, free, multi-platform BASIC compiler, with syntax similar MS-QuickBASIC (including the G

    Open-source, free, multi-platform BASIC compiler, with syntax similar MS-QuickBASIC (including the GFX statements), that adds new features such as pointers, unsigned data types, inline assembly, a pre-processor and many others.

    标签: multi-platform MS-QuickBASIC Open-source including

    上传时间: 2017-05-06

    上传用户:cursor

  • This thesis is devoted to several efficient VLSI architecture design issues in errorcorrecting codi

    This thesis is devoted to several efficient VLSI architecture design issues in errorcorrecting coding, including finite field arithmetic, (Generalized) Low-Density Parity- Check (LDPC) codes, and Reed-Solomon codes.

    标签: errorcorrecting architecture efficient devoted

    上传时间: 2017-05-08

    上传用户:康郎

  • Compression using lempel-ziv -for a dictionary size of 2k -provide dictionary

    Compression using lempel-ziv -for a dictionary size of 2k -provide dictionary Lempel ziv algorithm is a dictionary based algorithm that addresses byte sequences from former contents instead of the original data. This algorithm consists of a rule for parsing strings of symbols from a finite alphabet into substrings, whose lengths do not exceed a prescribed integer and a coding scheme which maps these substrings sequentially into uniquely decipherable code words of fixed length. The strings are selected so that they have nearly equal probability of occurrence. Frequently-occurring symbols are grouped into longer strings while occasional symbols appear in short strings.

    标签: dictionary Compression lempel-ziv provide

    上传时间: 2014-01-07

    上传用户:我们的船长

  • ) Compression using huffman code -with a number of bits k per code word -provide huffma

    ) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.

    标签: code Compression huffman provide

    上传时间: 2017-05-30

    上传用户:yuchunhai1990

  • This is a simple algorithm that downloads trading data from yahoo database. It is basically a large

    This is a simple algorithm that downloads trading data from yahoo database. It is basically a large scale application of sqq.m which was originally submitted by Michael Boldin, link at acknowledgements. Some of the functionalities of the package: - User defined ticker list. - Function for downloading most recent SP500 composition in ticker list. - Control for bad data (e.g. a certain percentage of prices missing). - Choice of frequency of data (e.g. weekly prices). - Choice of starting and ending data. - Function for saving the whole data in a pre-formatted excel file together with a full reports on missing data.

    标签: algorithm downloads basically database

    上传时间: 2017-06-03

    上传用户:啊飒飒大师的

  • Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of oth

    Exceptional C++ shows by example how to go about solid software engineering. Along with a lot of other material, this book includes expanded versions of the first 30 issues of the popular Internet C++ feature Guru of the Week (or, in its short form, GotW), a series of self-contained C++ engineering problems and solutions that illustrate specific design and coding techniques.

    标签: Exceptional engineering software example

    上传时间: 2017-06-07

    上传用户:yt1993410

  • This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3

    This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3-link robot arm. The objective function for the proposed GA is to minimizing traveling time and space, while not exceeding a maximum pre-defined torque, without collision with any obstacle in the robot workspace.

    标签: point-to-point trajectory algorithm proposes

    上传时间: 2013-12-21

    上传用户:chenxichenyue

  • 生成Trick文件工具 1.Open command line 2.input tricktest Usage: TrickTest -f -o -i -f source mpeg2 fil

    生成Trick文件工具 1.Open command line 2.input tricktest Usage: TrickTest -f -o -i -f source mpeg2 file to trick -o trick output directory -i output file id -m max coding error, default 0 -b max bitrate for trick generate, default 0 mean no limit -s trick buffer block size, must be n*188 -l log file, default c:\tricktest.log example: tricktest -f 黑鹰行动.mpg -o c:\temp -i A -m 1000 -b 3750000 soure file: 黑鹰行动.mpg output directory: c:\temp filename: 000000A,000000A.ff,000000A.fr,000000A.vvx max coding error: 1000 trick generation speed: 3750000 bps a

    标签: TrickTest tricktest command source

    上传时间: 2014-01-23

    上传用户:水口鸿胜电器

  • During the past four years, most of our research activities have been focused on image but also vide

    During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can be found at http://www.eurecom.fr/~image. Our research activities are conducted with the backing of several industrials, in particular France Telecom Research and STMicroelectronics. For the past few years, we have had a regular scientific collaboration on Fractal Image Coding, Watermarking and Biometrics with the University of California, Santa Barbara (UCSB), in particular with Prof. K. Ros

    标签: activities research focused During

    上传时间: 2014-11-26

    上传用户:123啊

  • Text mining tries to solve the crisis of information overload by combining techniques from data mini

    Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.

    标签: information techniques combining overload

    上传时间: 2014-01-02

    上传用户:Late_Li