This package contains the following source code files: - demo.c Demo application source, with message packing/unpacking example - benchmark.c Benchmark source, to benchmark pack/unpack operations - dl_c_iso8583_v0_0_3 (16th July 2008) DL ISO-8583 library source files - dl_c_common_v0_0_2 (14th October 2007) DL Common source files (used by DL ISO-8583) - benchmark / demo Sample MSVC 6.0 project files
标签: application following contains package
上传时间: 2013-12-19
上传用户:米卡
This is a code of Pseudo-Arc Length Continuation Method , the method can be used for solving the nonlinear equations, the principle can re found in some text books. In the code,I prove the agreement of the code with other methods
标签: Continuation Pseudo-Arc the solving
上传时间: 2013-12-03
上传用户:xzt
H. Yang, A.P. Petropulu, X. Yang and T. Camp, ?ALLIANCES with Optimal Relay Selection,"IEEE Trans. on Vehicular Technology, January 2008. (MATLAB Code)
上传时间: 2013-12-21
上传用户:star_in_rain
Huffman codes 1.In telecommunication, how do we represent a set of messages, each with an access frequency, by a sequence of 0 s and 1 s? 2.To minimize the transmission and decoding costs, we may use short strings to represent more frequently used messages. 3.This problem can be solved by using an extended binary tree which is used in the 2-way merging problem. the sourse code is to encode and decode the Huffman.
标签: telecommunication represent messages Huffman
上传时间: 2013-12-22
上传用户:ztj182002
This is full set of procedures used to communicate with any GSM module for SMS sending/receiving (it uses standard AT commands). Original code is for ATMega162 microcontroller, but code is general to be easy ported to others platforms. Code can be compiled with IAR AVR compiler.
标签: communicate procedures receiving sending
上传时间: 2017-05-30
上传用户:jiahao131
configure HID devices like USB mouse with A91SAM7SE CPU. Inlcude initilization for necessary peripherials. Developer can modify this piece code to do their development on HID devices. This is speically for GNU
标签: initilization configure necessary Inlcude
上传时间: 2017-06-02
上传用户:waitingfy
the second volume for intel processor documentation it continues first volume with more processor acces code and specs
标签: processor volume documentation continues
上传时间: 2017-06-05
上传用户:stewart·
This code proposes genetic algorithm (GA) to optimize the point-to-point trajectory planning for a 3-link robot arm. The objective function for the proposed GA is to minimizing traveling time and space, while not exceeding a maximum pre-defined torque, without collision with any obstacle in the robot workspace.
标签: point-to-point trajectory algorithm proposes
上传时间: 2013-12-21
上传用户:chenxichenyue
The code performs a number (ITERS) of iterations of the Bailey s 6-step FFT algorithm (following the ideas in the CMU Task parallel suite). 1.- Generates an input signal vector (dgen) with size n=n1xn2 stored in row major order In this code the size of the input signal is NN=NxN (n=NN, n1=n2=N) 2.- Transpose (tpose) A to have it stored in column major order 3.- Perform independent FFTs on the rows (cffts) 4.- Scale each element of the resulting array by a factor of w[n]**(p*q) 5.- Transpose (tpose) to prepair it for the next step 6.- Perform independent FFTs on the rows (cffts) 7.- Transpose the resulting matrix The code requires nested Parallelism.
标签: iterations performs Bailey number
上传时间: 2014-01-05
上传用户:libenshu01
A complete implementation of neural network with different example of training set generation. http://takinginitiative.wordpress.com/2008/04/23/basic-neural-network-tutorial-c-implementation-and-source-code/
标签: implementation generation different complete
上传时间: 2017-06-18
上传用户:zaizaibang