B樹算法實現,非常難得!btree implementation for random lookups, transaction handling, sequential access methods, and a small embeddable footprint.
上傳時間: 2014-01-10
上傳用戶:王小奇
Sherwood算法消除最壞實例,以達到對任何實例都能有好的性能的效果 文件: rd_list.c --> create a random sequence of n integers not equal to each other list.c --> create a descending sequence of n integers not equal to each other sherwood.c --> 就是該算法,靜態鏈表的長度默認設為1000,可在宏定義處修改 用法: gcc -o sherwood sherwood.c gcc -o rd_list rd_list.c gcc -o list list.c ./rd_list s.txt 1000 產生一個長度為1000的互不相等的隨機序列,保存在s.txt中 ./list s1.txt 1000 產生一個長度為1000的互不相等的降序序列,保存雜s1.txt中 ./sherwood s1.txt 運行算法,比較其中的4個算法的性能差異
上傳時間: 2016-01-20
上傳用戶:ainimao
RAM, Random-access memory,Verilog code
標簽: RAM
上傳時間: 2016-01-27
上傳用戶:WMC_geophy
This code implements the shortest path algorithm via the simple scheme and fibonacci heap data structure. It has 3 kinds of testing data input method : random input by computer, reading from the file, reading from the key board.
標簽: implements algorithm fibonacci the
上傳時間: 2013-12-23
上傳用戶:ynzfm
matlabBank-Based Kalman Filtering Technique for] - A Filter-Bank-Based Kalman Filtering Technique for Wavelet Estimation and Decomposition of Random Signals.pdf [DIP_dg.rar] - JPEG圖像壓縮像素之掃描方法之一(zigzag scan)這是用的循環法 [imagethreshold.zip] - 老外編寫的閾值分割代碼,非常的好,強烈推薦下載 [contour.rar] - 利用OpenCV進行輪廓提取,很好用!對于初學openCv的人來說是個很好的入門例程 [lu.rar] - 路徑識別
標簽: Filtering Technique Kalman Filter-Bank-Based
上傳時間: 2013-12-26
上傳用戶:417313137
This program shows the distributions of the co-channel interference in forward and reverse link in the cellular mobile system with cluster size N, when the mobile subscriber (MS) is at random positions of a cell.
標簽: distributions interference co-channel the
上傳時間: 2014-01-15
上傳用戶:z754970244
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding Binary tree Random number HMAC authentication MD5 DES RTP MBus SAP
標簽: number algorithms multimedia implements
上傳時間: 2014-11-16
上傳用戶:hoperingcong
偽隨機數生成器,Implementation of the Quasi-Random Number generator currently hardwired to no more than 52 dimensions
上傳時間: 2013-12-20
上傳用戶:teddysha
This demo nstrates the use of the reversible jump MCMC algorithm for neural networks. It uses a hierarchical full Bayesian model for neural networks. This model treats the model dimension (number of neurons), model parameters, regularisation parameters and noise parameters as random variables that need to be estimated. The derivations and proof of geometric convergence are presented, in detail, in: Christophe Andrieu, Nando de Freitas and Arnaud Doucet. Robust Full Bayesian Learning for Neural Networks. Technical report CUED/F-INFENG/TR 343, Cambridge University Department of Engineering, May 1999. After downloading the file, type "tar -xf rjMCMC.tar" to uncompress it. This creates the directory rjMCMC containing the required m files. Go to this directory, load matlab5 and type "rjdemo1". In the header of the demo file, one can select to monitor the simulation progress (with par.doPlot=1) and modify the simulation parameters.
標簽: reversible algorithm the nstrates
上傳時間: 2014-01-08
上傳用戶:cuibaigao
Obtain the CDF plots of PAPR from an OFDM BPSK transmission specified per IEEE 802.11a specification Per the IEEE 802.11a specifications, we 52 have used subcarriers. Given so, the theoretical maximum expected PAPR is 52 (around 17dB). However, thanks to the scrambler, all the subcarriers in an OFDM symbol being equally modulated is unlikely. Using a small script, the cumulative distribution of PAPR from each OFDM symbol, modulated by a random BPSK signal is obtained
標簽: specification transmission specified Obtain
上傳時間: 2016-04-24
上傳用戶:haoxiyizhong