this file is leverage algorithm written in matlab as M-File and tested in matlab.so anyone can ue this algorithm and any bug can be reported
標簽: matlab algorithm leverage written
上傳時間: 2017-09-28
上傳用戶:zhaoq123
模糊神經網絡采用matlab編程 o install NEFCON follow these steps: 1. Unpack the tar file NEFCON.TAR into your MATLAB working directory: tar xf NEFCON.TAR 2. Start MATLAB 3. Change to the installation directory. 4. Change to the NEFCON directory. 5. Start the STARTUP M-File to initialize NEFCON.
標簽: NEFCON install matlab follow
上傳時間: 2014-01-10
上傳用戶:qiao8960
This code converts a Galois Field array created usin GF(2^m) for a given primitive polynomial into a decimal array that can be used within typical .m file coding.
標簽: polynomial primitive converts created
上傳時間: 2015-09-26
上傳用戶:wang5829
There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run jakesmodel.m first 2] Then run bpsk_spread.m . 3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented 4] The resulting performance is stored in BER_awgn. 5] Now uncomment the Rayleigh Fading code in bpsk_spread.m file. 6] Same time comment BER_awgn (line 112) and uncomment BER_ray variable. 7] Run the simulation. To compare the perfromances of the receiver using DSSS plot the BER_awgn and BER_ray
標簽: bpsk_spread jakesmodel simulation folder
上傳時間: 2016-05-19
上傳用戶:ynsnjs
Windowed-Burg method is made in order to improve the Clasical Burg method. Previously, I send the PBURGW.m file, but now I include also the ARBURGW.m algorithm and some NOTES-EXAMPLES to explain it and compare with the pburg.m algorithm from MATLAB.
標簽: method Windowed-Burg Previously the
上傳時間: 2013-12-22
上傳用戶:familiarsmile
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
標簽: Cryptographic Primitives generate Library
上傳時間: 2015-07-16
上傳用戶:wqxstar
本書對simulink做了簡單的介紹,并給出了許多M-File,且予以解釋說明
標簽: simulink
上傳時間: 2014-01-12
上傳用戶:xmsmh
As all of you know, MATLAB is a powerful engineering language. Because of some limitation, some tasks take very long time to proceed. Also MATLAB is an interpreter not a compiler. For this reason, executing a MATLAB program (m file) is time consuming. For solving this problem, Mathworks provides us C Math Library or in common language, MATLAB API. A developer can employ these APIs to solve engineering problems very fast and easy. This article is about how can use these APIs.
標簽: some engineering limitation language
上傳時間: 2013-12-06
上傳用戶:huql11633
Summary: Newton-Raphson method for all real roots of the polynomial. MATLAB Release: R11 Description: This M-File calculates all the real roots of the given polynomial. It calls syn_division, a synthetic division function, and derivate, differentiation function.
標簽: Newton-Raphson polynomial Summary Descrip
上傳時間: 2013-12-24
上傳用戶:cccole0605
一個UWB仿真程序包,里面包含信號生成,信道模擬,Tx/Rx等模塊。M-File
上傳時間: 2016-05-22
上傳用戶:xiaoxiang