Ontology based personalized search A master thesis
標簽: personalized Ontology master search
上傳時間: 2015-09-18
上傳用戶:阿四AIR
Gabor Transformation based on a Exocortex dsp d
標簽: Transformation Exocortex Gabor based
上傳時間: 2013-12-17
上傳用戶:xwd2010
There is an example of how to use the LDPC encode/decode with AWGN channel model in files .\ldpc_decode.m and .\GFq\ldpc_decode.m. There are a few parity check matrices available in the code but you can use other matrices provided you have enough memory to load them. I suggest checking out matrices in Alist format available on David MacKay s web site.You will need to have access to a MEX compiler to be able to use a few functions written in C. LDPC的仿真代碼
標簽: example channel ldpc_de encode
上傳時間: 2013-12-03
上傳用戶:lili123
Second and Higher-Order Statistics based Multiple-Input-Multiple-Output System Blind Identification Matlab Code
標簽: Multiple-Input-Multiple-Output Identification Higher-Order Statistics
上傳時間: 2013-12-24
上傳用戶:wpt
The function conload takes a dataset and a model (PCA, PLS, PARAFAC etc.) and calculates congruence loadings which is the extension of correlation loadings to uncentered and multi-way models
標簽: calculates congruence and function
上傳時間: 2014-01-08
上傳用戶:sz_hjbf
JVT-T206 contains the reference software of the Joint 4:4:4 Verification Model (JFVM) 4 in the directory JVT-T206_jfvm_1_11 as described in JVT-T205
標簽: the Verification reference contains
上傳時間: 2015-09-24
上傳用戶:TF2015
Session Initiation Protocol (SIP) [1] is fast becoming the protocol of choice for IP based communication – specifically telephony (Voice over Internet Protocol - VoIP), video, and instant messaging.
標簽: Initiation communica Protocol becoming
上傳時間: 2015-09-25
上傳用戶:hanli8870
Stack-based sequential decoder for M-QAM modulated MIMO-type problems, i.e., of fixed tree depth.
標簽: Stack-based sequential MIMO-type modulated
上傳時間: 2014-01-25
上傳用戶:515414293
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
標簽: WepDecrypt Wepdecrypt Wireless guesses
上傳時間: 2013-12-25
上傳用戶:6546544
Lab 2 – Synthesizable MATLAB This lab exercise will explore the effects that different MATLAB coding styles have on hardware. The lab has two parts, each of which begins with a short introduction. This lab exercise is based on the simple MATLAB FIR filter model shown below:
標簽: MATLAB Synthesizable different exercise
上傳時間: 2015-09-28
上傳用戶:sammi