虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

pseudo-Random

  • B树算法实现

    B树算法实现,非常难得!btree implementation for random lookups, transaction handling, sequential access methods, and a small embeddable footprint.

    标签: 算法

    上传时间: 2014-01-10

    上传用户:王小奇

  • Sherwood算法消除最坏实例

    Sherwood算法消除最坏实例,以达到对任何实例都能有好的性能的效果 文件: rd_list.c --> create a random sequence of n integers not equal to each other list.c --> create a descending sequence of n integers not equal to each other sherwood.c --> 就是该算法,静态链表的长度默认设为1000,可在宏定义处修改 用法: gcc -o sherwood sherwood.c gcc -o rd_list rd_list.c gcc -o list list.c ./rd_list s.txt 1000 产生一个长度为1000的互不相等的随机序列,保存在s.txt中 ./list s1.txt 1000 产生一个长度为1000的互不相等的降序序列,保存杂s1.txt中 ./sherwood s1.txt 运行算法,比较其中的4个算法的性能差异

    标签: Sherwood 算法

    上传时间: 2016-01-20

    上传用户:ainimao

  • RAM

    RAM, Random-access memory,Verilog code

    标签: RAM

    上传时间: 2016-01-27

    上传用户:WMC_geophy

  • This code implements the shortest path algorithm via the simple scheme and fibonacci heap data struc

    This code implements the shortest path algorithm via the simple scheme and fibonacci heap data structure. It has 3 kinds of testing data input method : random input by computer, reading from the file, reading from the key board.

    标签: implements algorithm fibonacci the

    上传时间: 2013-12-23

    上传用户:ynzfm

  • matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique fo

    matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique for Wavelet Estimation and Decomposition of Random Signals.pdf [DIP_dg.rar] - JPEG图像压缩像素之扫描方法之一(zigzag scan)这是用的循环法 [imagethreshold.zip] - 老外编写的阈值分割代码,非常的好,强烈推荐下载 [contour.rar] - 利用OpenCV进行轮廓提取,很好用!对于初学openCv的人来说是个很好的入门例程 [lu.rar] - 路径识别

    标签: Filtering Technique Kalman Filter-Bank-Based

    上传时间: 2013-12-26

    上传用户:417313137

  • This program shows the distributions of the co-channel interference in forward and reverse link in t

    This program shows the distributions of the co-channel interference in forward and reverse link in the cellular mobile system with cluster size N, when the mobile subscriber (MS) is at random positions of a cell.

    标签: distributions interference co-channel the

    上传时间: 2014-01-15

    上传用户:z754970244

  • The UCL common multimedia library implements a number of algorithms and protocols needed by a number

    The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding Binary tree Random number HMAC authentication MD5 DES RTP MBus SAP

    标签: number algorithms multimedia implements

    上传时间: 2014-11-16

    上传用户:hoperingcong

  • 伪随机数生成器

    伪随机数生成器,Implementation of the Quasi-Random Number generator currently hardwired to no more than 52 dimensions

    标签: 伪随机 生成器

    上传时间: 2013-12-20

    上传用户:teddysha

  • This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hier

    This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hierarchical full Bayesian model for neural networks. This model treats the model dimension (number of neurons), model parameters, regularisation parameters and noise parameters as random variables that need to be estimated. The derivations and proof of geometric convergence are presented, in detail, in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Robust Full Bayesian Learning for Neural Networks. Technical report CUED/F-INFENG/TR 343, Cambridge University Department of Engineering, May 1999. After downloading the file, type "tar -xf rjMCMC.tar" to uncompress it. This creates the directory rjMCMC containing the required m files. Go to this directory, load matlab5 and type "rjdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.

    标签: reversible algorithm the nstrates

    上传时间: 2014-01-08

    上传用户:cuibaigao

  • Obtain the CDF plots of PAPR from an OFDM BPSK transmission specified per IEEE 802.11a specification

    Obtain the CDF plots of PAPR from an OFDM BPSK transmission specified per IEEE 802.11a specification Per the IEEE 802.11a specifications, we 52 have used subcarriers. Given so, the theoretical maximum expected PAPR is 52 (around 17dB). However, thanks to the scrambler, all the subcarriers in an OFDM symbol being equally modulated is unlikely. Using a small script, the cumulative distribution of PAPR from each OFDM symbol, modulated by a random BPSK signal is obtained

    标签: specification transmission specified Obtain

    上传时间: 2016-04-24

    上传用户:haoxiyizhong