The Gray Watson debugging malloc library is C source code for a drop in replacement for the system malloc & other memory manage ment routines. What is unique about this library is that it contains a number of powerful debugging facilities including very comprehensive heap testing and ex- cellent run-time debugging information.
标签: replacement debugging for library
上传时间: 2015-02-05
上传用户:TF2015
This a Bayesian ICA algorithm for the linear instantaneous mixing model with additive Gaussian noise [1]. The inference problem is solved by ML-II, i.e. the sources are found by integration over the source posterior and the noise covariance and mixing matrix are found by maximization of the marginal likelihood [1]. The sufficient statistics are estimated by either variational mean field theory with the linear response correction or by adaptive TAP mean field theory [2,3]. The mean field equations are solved by a belief propagation method [4] or sequential iteration. The computational complexity is N M^3, where N is the number of time samples and M the number of sources.
标签: instantaneous algorithm Bayesian Gaussian
上传时间: 2013-12-19
上传用户:jjj0202
This packet is a IS-95 baseband simulation for 1 data channel of 9.6 KBps rate. The simulation is written for static channel and AWGN noise. The packet include: 1) Packet Builder (Viterbi Encoding, Interleaver, PN generation) 2) Modulator (RRC filter) 3) Demodulator (Matched Filter, RAKE receiver) 4) Receiver (HD or SD) (Deinterleaver, Viterbi Decoder). You should run "Simulation.m" function that include all modules.
标签: simulation baseband channel packet
上传时间: 2014-11-09
上传用户:hwl453472107
Models UWB TX and RX using BPSK fifth derivative. MATLAB Release: R13 Description: This m file models a UWB system using BPSK with the fifth order derivative of the gaussian pulse with correlation receiver and intgrator.
标签: Description derivative Release Models
上传时间: 2015-05-08
上传用户:zhliu007
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
上传时间: 2015-05-08
上传用户:leixinzhuo
The IEEE Multipath Channel block simulates an indoor UWB channel as described in "A Channel Model for Ultrawideband Indoor Communications" by J.R. Foerster, M. Pendergrass and A.F. Molisch, November 2003, and attempts to incorporate the processes used in their MATLAB scripts.
标签: Channel Multipath simulates described
上传时间: 2015-05-08
上传用户:水中浮云
DOS XMS library is a DOS real mode and large memory model C library. Because DOS is ran under real mode, programmer only can access RAM under 1MB
上传时间: 2015-06-13
上传用户:ANRAN
//在tc3.0++在运行 //a数组用于随机产生1-6数表示每个方格后面的图形.用inita()函数来实现 //c数组用于记录方格的状态,用字符L(lock)表示没有打开的方格 //D(delete)表示已消去的方格.O(open)表示打开的方格. //变量m表示按回车键的有效次数.也是记忆力参数,越小记忆力越好 //变量xpos,ypos用于表示当前光标所在的位置 //(x1,y1),(x2,y2)用于记录打开的两个方格的位置 //judge()函数用于控制光标范围,使其不能移出长方形 //win()函数用于判断游戏是否过关,通过判断每个方格是否全是 D 状态 //xago,yago 用于记录移动前的位置 //ax,ay表示行列式的行与列,用它们来控制游戏的关数,ax位于3-6之间,ay位于4-7之间 //z来控制方格后的图形 //第一关后面的图形用1-6代表的图形.第二关后面的图形用0-9十个数。第三关后面的图形用A-O十五个字母, //第四关后面的图形用A-T二十一个字母
上传时间: 2015-06-19
上传用户:hgy9473
This file contains a new and improved version of the Huffman coder, (June 29. 2001). The name is Huff06.m. There are also some additional files which are helpful when using Matlab for data compression: quantizer, different variants of run-length-encoding and end-of-block coding in Mat2Vec, and a program which do JPEG-like entropy coding. A complete compression example is shown in TestMat2Vec.m. This file is all you need for Huffman coding in MatLab.
标签: contains improved Huffman version
上传时间: 2015-07-05
上传用户:jeffery
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar