A program to find frequent molecular substructures and discriminative fragments in a database of molecule descriptions. The algorithm is based on the Eclat algorithm for frequent item set mining.
标签: discriminative substructures fragments molecular
上传时间: 2014-01-20
上传用户:龙飞艇
Example of a digital data transmission implementing GMSK modulation This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel
标签: implementing transmission modulation simulates
上传时间: 2015-07-12
上传用户:jiahao131
Simulator for a GSM traffic channel transmission and reception This Simulink model simulates the entire transmission and reception of voice data of a traffic channel for GSM (TCH/FS)over a multipath fading channel, and it calculates the BER of the received signal
标签: transmission Simulator reception simulates
上传时间: 2015-07-12
上传用户:BIBI
RAKE receiver for direct-sequence spread spectrum systems Simulink model of a simple direct-sequence spread spectrum system with RAKE reception
标签: direct-sequence direct-sequenc receiver Simulink
上传时间: 2014-01-05
上传用户:lunshaomo
关于NETFLOW信息分析的软件。 is a netflow analyzer. It uses MySQL database to store accounting information. Filters, used in the JFlowAnalyzer, allows very flexible classificate any kind of traffic and store it in the differend fields in database
标签: information accounting analyzer database
上传时间: 2014-01-27
上传用户:kr770906
介绍一个基于U S B 2 . 0 接口和D S P 的高速数据采集处理系统的工作原理设计及实现该高速数据 采集处理系统采用TI 公司的TMS320C6000 数字信号处理器和Cypress 公司的USB2.0 接口芯片可 以实现高速采集和实时处理有着广泛的应用前景
上传时间: 2013-11-27
上传用户:koulian
b tree how to operate on b tr
上传时间: 2014-01-20
上传用户:开怀常笑
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
B.Aazhang写的一篇论文,第一次提出了神经网络如何在应用多用户检测中。
上传时间: 2015-07-17
上传用户:ljmwh2000
实现一个B/S结构聊天室的基本功能。用法简单,适合上手。
标签:
上传时间: 2014-01-01
上传用户:bibirnovis