基于DSP的任意波形合成技術,單片機,d/c轉換
上傳時間: 2013-11-25
上傳用戶:陽光少年2016
一種基于分塊 D C T的混沌半脆弱圖像水印技術,半脆弱數字水印;混沌理論
上傳時間: 2014-01-17
上傳用戶:gundan
FDTD 1-d C++ sourece
上傳時間: 2014-01-27
上傳用戶:zhengjian
Mega16 + MCP3208 12bit A/D >> C-source code >> AVRSTUDIO project >> WinAVR
標簽: gt AVRSTUDIO C-source project
上傳時間: 2013-12-26
上傳用戶:weixiao99
一、 一元三次回歸方程 CubicMultinomialRegress.cs 方程模型為Y=a*X(3)+b*X(2)+c*X(1)+d public override double[] buildFormula() 得到系數數組,存放順序與模型系數相反,即該數組中系數的值依次是d,c,b,a。 以后所述所有模型的系數存放均與此相同(多元線性回歸方程除外)。 public override double forecast(double x) 預測函數,根據模型得到預測結果 public override double computeR2() 計算相關系數(決定系數),系數越接近1,數據越滿足該模型。
標簽: CubicMultinomialRegress override public double
上傳時間: 2015-11-25
上傳用戶:13215175592
Description: S-ISOMAP is a manifold learning algorithm, which is a supervised variant of ISOMAP. Reference: X. Geng, D.-C. Zhan, and Z.-H. Zhou. Supervised nonlinear dimensionality reduction for visualization and classification. IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, 2005, vol.35, no.6, pp.1098-1107.
標簽: Description supervised algorithm S-ISOMAP
上傳時間: 2015-04-10
上傳用戶:wfeel
該源碼是一個問題的解決方法。問題是給你個長為L的串,串中可以出現n種字符,還給出m個子串,求有多少個長為n的只由這些字串組成的串。輸入例子:4 5 6 ABB BCA BCD CAB CDD DDA 結果為2.而5 4 5 E D C B A的結果為625
標簽: 源碼
上傳時間: 2014-01-12
上傳用戶:水中浮云
/*** *** *** *** *** *** *** *** *** *** *** *** **/ //**此映射表用來映射LED模塊不譯碼時,顯示的字符和必須輸入的數據的關系 //**每段和對應比特位的關系見示意圖 // g // --- --- // b | a |f | | <---顯示0時點亮的段為gfedcb // --- // c | |e | | 那么寫入數據為0x7e // --- --- // d // bit: 7 6 5 4 3 2 1 0 // 段位: g f e d c b a
上傳時間: 2013-11-25
上傳用戶:
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
標簽: crypthograph information Adleman Rivest
上傳時間: 2017-09-01
上傳用戶:chfanjiang
Two 2D phase unwrapping approaches are included: 1. Phase quality guided path following method. 2. Goldstein's branch cut method. The algorithms are described in: D. C. Ghiglia and M. D. Pritt, Two-Dimensional Phase Unwrapping: Theory, Algorithms and Software. New York: Wiley-Interscience, 1998.
標簽: Unwrapping Phase 2D
上傳時間: 2016-04-30
上傳用戶:seanjsj