不確定規劃 遺傳算法 multilevel Programming算法程序
標簽: Programming multilevel 算法 程序
上傳時間: 2014-01-22
上傳用戶:拔絲土豆
OFDM digital modulation for wireless communications systems. multilevel quadrature modulation with constellation with m symbol
標簽: modulation communications multilevel quadrature
上傳時間: 2017-05-11
上傳用戶:天誠24
pulse width modulation pwm of multilevel inverter
標簽: modulation multilevel inverter pulse
上傳時間: 2017-07-30
上傳用戶:xlcky
pwm of multilevel inverter poulse width modulation
標簽: multilevel modulation inverter poulse
上傳時間: 2014-01-01
上傳用戶:czl10052678
The main purpose of this project is to add a new scheduling algorithm to GeekOS and to implement a simple synchronization primitive (semaphore). As you might have already noticed, GeekOS uses a simple priority based preemptive Round Robin algorithm. In this project, you will change this to a multilevel feedback scheduling. In addition, you will provide user programs with semaphores, a means to check the system s current time and a mechanism for passing command-line arguments
標簽: scheduling algorithm implement to
上傳時間: 2013-11-27
上傳用戶:Late_Li
這個軟件包(C++)是我尋找電磁學代碼無意中找到了,功能相當強大(并行計算,快速多極子等)。缺點是安裝相當麻煩,需要若干個其他軟件包。我在Fedora Core9下編譯其中所需blitz++時出錯,在 ubuntu下可以所有均編譯通過,運行時出現一個錯誤,我找不到原因(本人水平有限),但從學習電磁學有關算法/程序設計來說,已經是相當了不起的開源軟件了。parallel unified multipole algorithm for Electromagnetics (Puma-EM). Aim is providing surface Method of Moments for Electromagnetics, enhanced by using the multilevel Fast Multipole Method. Code is parallelized and runs on Desktops and clusters.
上傳時間: 2013-12-26
上傳用戶:lanjisu111
Combinatorial Preconditioners and multilevel Solvers for Problems in Computer Vision and Image Processing
標簽: image processing
上傳時間: 2016-03-28
上傳用戶:hzcloudy
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
標簽: Fundamental Limits Secure Class on of
上傳時間: 2020-01-04
上傳用戶:kddlas