亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

matrix-vector

  • DEV C++ 寫的一個矩陣類

    DEV C++ 寫的一個矩陣類,用列主元消去法求模的。類的構造函數接收矩陣的行列值或者是一個vector<vector<double> >類型的變量。沒有用模板,數據類型是double.

    標簽: DEV 矩陣

    上傳時間: 2017-06-14

    上傳用戶:lht618

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    標簽: implementation twofish cipher VHDL

    上傳時間: 2017-06-25

    上傳用戶:王小奇

  • NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vect

    NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vector X and weight vector W. Calculate weighted sum XW. Transform this using signal or activation functions like logistic, threshold, hyperbolic-tangent, linear, exponential, sigmoid or some other functions (syntax provided) and display the output).

    標簽: demonstrate artificial Functions program

    上傳時間: 2013-12-30

    上傳用戶:hfmm633

  • This functions computes SARMA or multiplicative (p,q) x (P,Q) models for (p,q,P,Q) in (pvec x qv

    This functions computes SARMA or multiplicative (p,q) x (P,Q) models for (p,q,P,Q) in (pvec x qvec x Pvec x Qvec) it returns the best according to AIC where AIC has been modified to account for fixed parameters x = input data pvec = vector of p s set pvec=[0] for no AR qvec = vector of q s set qvec=0[] for no MA Pvec = vector of P s Qvec = vector of Q s T period for multiplicative model

    標簽: multiplicative functions computes models

    上傳時間: 2017-06-30

    上傳用戶:Breathe0125

  • 關于矢量網絡的分析基礎和測量

    關于矢量網絡的分析基礎和測量,pdf文檔。The basis of vector network analysis and measurement

    標簽: 矢量 測量 網絡

    上傳時間: 2014-07-04

    上傳用戶:頂得柱

  • Two scripts are included here. 1. convsys.m - combines the state space representation of two syst

    Two scripts are included here. 1. convsys.m - combines the state space representation of two systems connected in series. [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) This algorithm gives the convolution of two state space representations | A1 B1 | | A2 B2 | u ==> | | ==> | | ==> y | C1 D1 | | C2 D2 | The algorithm also accepts state space objects as inputs and gives out a state space object as output. 2. sysfeedbk.m [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) Gives the closed loop state space representation for two systems connected with negative feedback in the following manner. | A1 B1 | u ==> | | ==> y + o | C1 D1 | | - | | | | A2 B2 | | |= | |= | | C2 D2 | The zip file also contains checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.

    標簽: representation included combines scripts

    上傳時間: 2017-07-25

    上傳用戶:semi1981

  • Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

    Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).

    標簽: networks blocking switched Because

    上傳時間: 2017-07-28

    上傳用戶:zhangzhenyu

  • base implementaion of the protein (starting from the amino acid sequence) feature extractor used in

    base implementaion of the protein (starting from the amino acid sequence) feature extractor used in "L. Nanni and A. Lumini, An ensemble of Support Vector Machines for predicting virulent proteins, Expert Systems With Applications, vol.36, no.4, pp.7458-7462, May 2009. "

    標簽: implementaion extractor the starting

    上傳時間: 2017-08-02

    上傳用戶:wqxstar

  • DSP2407比較全的源程序 包括SPI設計

    DSP2407比較全的源程序 包括SPI設計,AD,DA,ramtest, SCI,CAN,PWM,key,EXINT,24C02,VECTOR等

    標簽: 2407 DSP SPI 比較

    上傳時間: 2017-08-13

    上傳用戶:aa54

  • ESRIMapObjectsLT 2 and MicrosoftVisual Basic6 to build an application that uses maps. Display a map

    ESRIMapObjectsLT 2 and MicrosoftVisual Basic6 to build an application that uses maps. Display a map with multiple layers. Control panning and zooming. Create a toolbar control. Base the display of map layers on scale. Perform spatial and logical queries. Display features with thematic renderers. Add vector data and images to a map programmatically.

    標簽: ESRIMapObjectsLT MicrosoftVisual application Display

    上傳時間: 2013-12-18

    上傳用戶:dbs012280

主站蜘蛛池模板: 若羌县| 侯马市| 托克逊县| 永靖县| 新龙县| 拜泉县| 天长市| 宜章县| 黔南| 平武县| 酒泉市| 永济市| 冷水江市| 城口县| 上饶市| 隆德县| 界首市| 青川县| 昌乐县| 新安县| 姜堰市| 怀远县| 哈密市| 当涂县| 冷水江市| 黔江区| 喀喇沁旗| 静乐县| 裕民县| 化德县| 漯河市| 东辽县| 柳林县| 枣强县| 吉木萨尔县| 庆阳市| 江华| 梅州市| 廉江市| 伊金霍洛旗| 桐柏县|