B树算法实现,非常难得!btree implementation for random lookups, transaction handling, sequential access methods, and a small embeddable footprint.
上传时间: 2014-01-10
上传用户:王小奇
Sherwood算法消除最坏实例,以达到对任何实例都能有好的性能的效果 文件: rd_list.c --> create a random sequence of n integers not equal to each other list.c --> create a descending sequence of n integers not equal to each other sherwood.c --> 就是该算法,静态链表的长度默认设为1000,可在宏定义处修改 用法: gcc -o sherwood sherwood.c gcc -o rd_list rd_list.c gcc -o list list.c ./rd_list s.txt 1000 产生一个长度为1000的互不相等的随机序列,保存在s.txt中 ./list s1.txt 1000 产生一个长度为1000的互不相等的降序序列,保存杂s1.txt中 ./sherwood s1.txt 运行算法,比较其中的4个算法的性能差异
上传时间: 2016-01-20
上传用户:ainimao
RAM, Random-access memory,Verilog code
标签: RAM
上传时间: 2016-01-27
上传用户:WMC_geophy
This code implements the shortest path algorithm via the simple scheme and fibonacci heap data structure. It has 3 kinds of testing data input method : random input by computer, reading from the file, reading from the key board.
标签: implements algorithm fibonacci the
上传时间: 2013-12-23
上传用户:ynzfm
matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique for Wavelet Estimation and Decomposition of Random Signals.pdf [DIP_dg.rar] - JPEG图像压缩像素之扫描方法之一(zigzag scan)这是用的循环法 [imagethreshold.zip] - 老外编写的阈值分割代码,非常的好,强烈推荐下载 [contour.rar] - 利用OpenCV进行轮廓提取,很好用!对于初学openCv的人来说是个很好的入门例程 [lu.rar] - 路径识别
标签: Filtering Technique Kalman Filter-Bank-Based
上传时间: 2013-12-26
上传用户:417313137
This program shows the distributions of the co-channel interference in forward and reverse link in the cellular mobile system with cluster size N, when the mobile subscriber (MS) is at random positions of a cell.
标签: distributions interference co-channel the
上传时间: 2014-01-15
上传用户:z754970244
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding Binary tree Random number HMAC authentication MD5 DES RTP MBus SAP
标签: number algorithms multimedia implements
上传时间: 2014-11-16
上传用户:hoperingcong
伪随机数生成器,Implementation of the Quasi-Random Number generator currently hardwired to no more than 52 dimensions
上传时间: 2013-12-20
上传用户:teddysha
This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hierarchical full Bayesian model for neural networks. This model treats the model dimension (number of neurons), model parameters, regularisation parameters and noise parameters as random variables that need to be estimated. The derivations and proof of geometric convergence are presented, in detail, in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Robust Full Bayesian Learning for Neural Networks. Technical report CUED/F-INFENG/TR 343, Cambridge University Department of Engineering, May 1999. After downloading the file, type "tar -xf rjMCMC.tar" to uncompress it. This creates the directory rjMCMC containing the required m files. Go to this directory, load matlab5 and type "rjdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.
标签: reversible algorithm the nstrates
上传时间: 2014-01-08
上传用户:cuibaigao
Obtain the CDF plots of PAPR from an OFDM BPSK transmission specified per IEEE 802.11a specification Per the IEEE 802.11a specifications, we 52 have used subcarriers. Given so, the theoretical maximum expected PAPR is 52 (around 17dB). However, thanks to the scrambler, all the subcarriers in an OFDM symbol being equally modulated is unlikely. Using a small script, the cumulative distribution of PAPR from each OFDM symbol, modulated by a random BPSK signal is obtained
标签: specification transmission specified Obtain
上传时间: 2016-04-24
上传用户:haoxiyizhong