Computes BER v EbNo curve for convolutional encoding / soft decision Viterbi decoding scheme assuming BPSK. Brute force Monte Carlo approach is unsatisfactory (takes too long) to find the BER curve. The computation uses a quasi-analytic (QA) technique that relies on the estimation (approximate one) of the information-bits Weight Enumerating Function (WEF) using A simulation of the convolutional encoder. Once the WEF is estimated, the analytic formula for the BER is used.
標簽: convolutional Computes encoding decision
上傳時間: 2013-12-24
上傳用戶:咔樂塢
北京大學ACM比賽題目 In 1742, Christian Goldbach, a German amateur mathematician, sent a letter to Leonhard Euler in which he made the following conjecture: Every even number greater than 4 can be written as the sum of two odd prime numbers. For example: 8 = 3 + 5. Both 3 and 5 are odd prime numbers. 20 = 3 + 17 = 7 + 13. 42 = 5 + 37 = 11 + 31 = 13 + 29 = 19 + 23. Today it is still unproven whether the conjecture is right. (Oh wait, I have the proof of course, but it is too long to write it on the margin of this page.) Anyway, your task is now to verify Goldbach s conjecture for all even numbers less than a million.
標簽: mathematician Christian Goldbach Leonhard
上傳時間: 2016-04-22
上傳用戶:wangchong
Microsoft .net IL 匯編語言程序設計指南. To tell the truth, I don t think I had much choice in this matter. Let me explain. With Microsoft .NET technology taking the world by storm, with more and more information professionals getting involved, large numbers of books covering various aspects of this technology have started to arrive—and none too soon. Alas, virtually all of these books are dedicated to .NET-based programming in high-level languages and rapid application development (RAD) environments. No doubt this is extremely important, and I am sure all these books will have to be reprinted to satisfy the demand. But what about the plumbing?
標簽: Microsoft choice matter truth
上傳時間: 2014-11-06
上傳用戶:二驅蚊器
/* * The internal form of a hash table. * * The table is an array indexed by the hash of the key collisions * are resolved by hanging a linked list of hash entries off each * element of the array. Although this is a really simple design it * isn t too bad given that pools have a low allocation overhead. */ split from apache for general usage
上傳時間: 2014-01-07
上傳用戶:gtf1207
This version of the book is a DRAFT! The chapters are mostly complete, but not carefully edited. Some of the debugging sections are not done, and not all chapters have exercises. If you have high-level comments about the organization of the book or the topics covered, please send me email at feedback{at}thinkpython{dot}com. It is probably too early for detailed comments like spelling errors.
標簽: carefully chapters complete version
上傳時間: 2014-08-29
上傳用戶:ayfeixiao
This a simple database management system. It doesn t use any other code (i.e. ODBC, ADO, etc.) and has it s own database file format. I wrote it because I found the other DBMSs code too bulky and hard to debug. It s designed for small applications and I doubt it could handle anything on a large scale. A sample program included in the .zip shows how everything works. The database project is a library project, so you ll have to compile and link with the .lib file to get everything working. Pros: - You have the source code so you know exactly what it is doing - Database files are very small - Small and fast code Cons: - Can t handle large amounts of records (more than 65000ish) - Doesn t support SQL (you have to search the database by cycling through the records and testing them against your constraints) - Each database file can only have one table.
標簽: i.e. management database simple
上傳時間: 2016-10-02
上傳用戶:851197153
PRINCIPLE: The UVE algorithm detects and eliminates from a PLS model (including from 1 to A components) those variables that do not carry any relevant information to model Y. The criterion used to trace the un-informative variables is the reliability of the regression coefficients: c_j=mean(b_j)/std(b_j), obtained by jackknifing. The cutoff level, below which c_j is considered to be too small, indicating that the variable j should be removed, is estimated using a matrix of random variables.The predictive power of PLS models built on the retained variables only is evaluated over all 1-a dimensions =(yielding RMSECVnew).
標簽: from eliminates PRINCIPLE algorithm
上傳時間: 2016-11-27
上傳用戶:凌云御清風
1. 輸入caculator,程序開始執行,繼續輸入3*4+5,回車后輸出17,繼續下一個計算或Ctrl+C退出。 2. 輸入caculator 3*4+5,程序執行輸出結果17。 3. 輸入caculator 3*4+5 33,程序執行輸出結果error: too many arguments。
上傳時間: 2014-01-22
上傳用戶:weiwolkt
The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judging of the project, since it states in the competition rules that the author s name can not be present during their inspection. * The included source files are the ones that were submitted for the entry into the Circuit Cellar contest. I have continued to develop the AVRcam, and have added several new features (such as ignoring objects that aren t larger than a minimum size, removing tracked objects that overlap with each, and some general optimizations). If you are interested in the latest source, email me at john@jrobot.net * For more info about the AVRcam, check out http://www.jrobot.net John Orlando August 20, 2004
標簽: distribution version AVRcam source
上傳時間: 2016-12-30
上傳用戶:GavinNeko
給出一個非負小數,找出分子不超過M,分母不超過N的最簡分數或整數, 使其最接近給出的小數。如果這個分數不唯一,輸出‘too MANY’。 輸入文件格式(closest.in) 第一行,M,N(1<=M,N<=10^9) 第二行,即小數R,(0<R 輸出文件格式(closest.out) 僅一行,若解唯一輸出 分子 / 分母(整數K寫成K/1),否則輸出too MANY 樣例輸入: 360 120 3.1415926536 樣例輸出: 355/113
標簽:
上傳時間: 2017-01-08
上傳用戶:iswlkje