虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Matrix-vector

  • DEV C++ 写的一个矩阵类

    DEV C++ 写的一个矩阵类,用列主元消去法求模的。类的构造函数接收矩阵的行列值或者是一个vector<vector<double> >类型的变量。没有用模板,数据类型是double.

    标签: DEV 矩阵

    上传时间: 2017-06-14

    上传用户:lht618

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    标签: implementation twofish cipher VHDL

    上传时间: 2017-06-25

    上传用户:王小奇

  • NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vect

    NN Functions a program in Lisp to demonstrate working of an artificial neuron. (Enter an input vector X and weight vector W. Calculate weighted sum XW. Transform this using signal or activation functions like logistic, threshold, hyperbolic-tangent, linear, exponential, sigmoid or some other functions (syntax provided) and display the output).

    标签: demonstrate artificial Functions program

    上传时间: 2013-12-30

    上传用户:hfmm633

  • This functions computes SARMA or multiplicative (p,q) x (P,Q) models for (p,q,P,Q) in (pvec x qv

    This functions computes SARMA or multiplicative (p,q) x (P,Q) models for (p,q,P,Q) in (pvec x qvec x Pvec x Qvec) it returns the best according to AIC where AIC has been modified to account for fixed parameters x = input data pvec = vector of p s set pvec=[0] for no AR qvec = vector of q s set qvec=0[] for no MA Pvec = vector of P s Qvec = vector of Q s T period for multiplicative model

    标签: multiplicative functions computes models

    上传时间: 2017-06-30

    上传用户:Breathe0125

  • 关于矢量网络的分析基础和测量

    关于矢量网络的分析基础和测量,pdf文档。The basis of vector network analysis and measurement

    标签: 矢量 测量 网络

    上传时间: 2014-07-04

    上传用户:顶得柱

  • Two scripts are included here. 1. convsys.m - combines the state space representation of two syst

    Two scripts are included here. 1. convsys.m - combines the state space representation of two systems connected in series. [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) This algorithm gives the convolution of two state space representations | A1 B1 | | A2 B2 | u ==> | | ==> | | ==> y | C1 D1 | | C2 D2 | The algorithm also accepts state space objects as inputs and gives out a state space object as output. 2. sysfeedbk.m [Ao,Bo,Co,Do]=convsys(A1,B1,C1,D1,A2,B2,C2,D2) Gives the closed loop state space representation for two systems connected with negative feedback in the following manner. | A1 B1 | u ==> | | ==> y + o | C1 D1 | | - | | | | A2 B2 | | |= | |= | | C2 D2 | The zip file also contains checkcompatibility.m , which checks the compatibility of matrix dimensions in the system and cleanss.m which can be used to clean a state space representation.

    标签: representation included combines scripts

    上传时间: 2017-07-25

    上传用户:semi1981

  • Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

    Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).

    标签: networks blocking switched Because

    上传时间: 2017-07-28

    上传用户:zhangzhenyu

  • base implementaion of the protein (starting from the amino acid sequence) feature extractor used in

    base implementaion of the protein (starting from the amino acid sequence) feature extractor used in "L. Nanni and A. Lumini, An ensemble of Support Vector Machines for predicting virulent proteins, Expert Systems With Applications, vol.36, no.4, pp.7458-7462, May 2009. "

    标签: implementaion extractor the starting

    上传时间: 2017-08-02

    上传用户:wqxstar

  • DSP2407比较全的源程序 包括SPI设计

    DSP2407比较全的源程序 包括SPI设计,AD,DA,ramtest, SCI,CAN,PWM,key,EXINT,24C02,VECTOR等

    标签: 2407 DSP SPI 比较

    上传时间: 2017-08-13

    上传用户:aa54

  • ESRIMapObjectsLT 2 and MicrosoftVisual Basic6 to build an application that uses maps. Display a map

    ESRIMapObjectsLT 2 and MicrosoftVisual Basic6 to build an application that uses maps. Display a map with multiple layers. Control panning and zooming. Create a toolbar control. Base the display of map layers on scale. Perform spatial and logical queries. Display features with thematic renderers. Add vector data and images to a map programmatically.

    标签: ESRIMapObjectsLT MicrosoftVisual application Display

    上传时间: 2013-12-18

    上传用户:dbs012280