The software implements particle filtering and Rao Blackwellised particle filtering for conditionally Gaussian Models. The RB algorithm can be interpreted as an efficient stochastic mixture of Kalman filters. The software also includes efficient state-of-the-art resampling RoutINes. These are generic and suitable for any application. For details, please refer to Rao-Blackwellised Particle Filtering for Fault Diagnosis and On Sequential Simulation-Based Methods for Bayesian Filtering After downloading the file, type "tar -xf demo_rbpf_gauss.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab and run the demo.
The algorithms are coded in a way that makes it trivial to apply them to other problems. Several generic RoutINes for resampling are provided. The derivation and details are presented in: Rudolph van der Merwe, Arnaud Doucet, Nando de Freitas and Eric Wan. The Unscented Particle Filter. Technical report CUED/F-INFENG/TR 380, Cambridge University Department of Engineering, May 2000. After downloading the file, type "tar -xf upf_demos.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type "demo_MC" for the demo.
Real-Time Digital Signal Processing
Implementations, Applications, and Experiments with the TMS320C55x
John Wiley & Sons, Inc. 2001
By Sen M. Kuo and Bob H. Lee
4.6.1 Experiment 4A - Twiddle Factor Generation
4.6.2 Experiment 4B - Complex Data Operation
4.6.3 IExperiment 4C - mplementation of DFT
4.6.4 Experiment 4D - Experiment Using Assembly RoutINes
Enclosed in this distribution are four projects:
MD5DLLTest: Visual basic project which runs the MD5 test suite against a
MD5 DLL (see below).
VbMD5: A Visual Basic native MD5 message digest class based on the
RSA reference implementation.
md5DLL: A C project which generates a simple Win32 DLL with
the MD5 message digest RoutINes using the RSA reference
implementation.
MD5Java: A Java implementation of the MD5 message digest algorithm based
on the RSA reference implmentation.
Let me know if this has any use!
Robert M. Hubley
hubley@u.washington.edu
C51源程序集錦 This a demo program showing a way to perform simultaneous RS-232
transmit and receive using only one hardware timer.
The transmit and receive RoutINes divide each bit time into 4 slices to
allow synchronizing to incoming data that may be out of synch with outgoing
data.
SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library RoutINes will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization RoutINes can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied RoutINes. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subRoutINes are provided for improved backward stability. RoutINes are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.
*** HyperString v6.0 ***
(c)1996-2000 EFD Systems, All rights reserved
efd@mindspring.com
*** THIS IS NOT PUBLIC DOMAIN SOFTWARE ***
See below for license agreement, disclaimer, installation and use.
Introduction ---------------------------------------------------------
Welcome to HyperString!
One of the most significant new features with Delphi32 is long dynamic
strings. However, the built-in functions don t really exploit the full
potential of these new strings. HyperString provides over 400 fast,
efficient string management RoutINes to help you realize the full power
of this highly versatile new data type.
軟件開發人員必備工具書,,目錄如下Welcome to Software Construction [1]1.1 What Is Software Construction?1.2 Why Is Software Construction Important?1.3 How to Read This Book......7.1 Valid Reasons to Create a Routine7.2 Design at the Routine Level7.3 Good Routine Names7.4 How Long Can a Routine Be?7.5 How to Use Routine Parameters7.6 Special Considerations in the Use of Functions7.7 Macro RoutINes and Inline RoutINesDefensive Programming [5.6 + new material]8.1 Protecting Your Program From Invalid Inputs8.2 Assertions8.3 Error Handling Techniques8.4 Exceptions8.5 Barricade Your Program to Contain the Damage Caused by Errors8.6 Debugging Aids8.7 Determining How Much Defensive Programming to Leave in Production Code8.8 Being Defensive About Defensive ProgrammingThe Pseudocode Programming Process [4+new material]9.1 Summary of Steps in Building Classes and RoutINes9.2 Pseudocode for Pros9.3 Constructing RoutINes Using the PPP9.4 Alternatives to the PPP......