虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Parity-codes

  • An application on Hotel Management System. I developed it for my project during exam time. Any how i

    An application on Hotel Management System. I developed it for my project during exam time. Any how it rewarded as best project. my other source codes are at: http://www.developerssourcecode.com Thanks Shyam Singh Chandel

    标签: application Management developed project

    上传时间: 2014-01-20

    上传用户:alan-ee

  • This project solves the purpose of creating vb6 application using oracle database in back end. It sh

    This project solves the purpose of creating vb6 application using oracle database in back end. It shows how to handle the record with the oracle. my other source codes are at: http://www.developerssourcecode.com Shyam Singh Chandel

    标签: application creating database project

    上传时间: 2013-12-18

    上传用户:清风冷雨

  • this is a gcc file, you can download it and learn its usetility, for further detail please look at t

    this is a gcc file, you can download it and learn its usetility, for further detail please look at the source codes

    标签: usetility download further detail

    上传时间: 2014-11-21

    上传用户:ywqaxiwang

  • Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pse

    Some thesis studies about wireless sensor network algorithms. Algorithms are considered and some pseudo codes are shown.

    标签: Algorithms algorithms considered wireless

    上传时间: 2013-11-27

    上传用户:luopoguixiong

  • Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Lan

    Basicaly,a chatterbot is a computer program that when you provide it with some inputs in Natural Language (English, French ...) responds with something meaningful in that same language. Which means that the strength of a chatterbot could be directly measured by the quality of the output selected by the Bot in response to the user. By the previous description,we could deduce that a very basic chatterbot can be written in a few lines of code in a given specific programming language. Lets make our first chatterbot (notice that all the codes that will be used in this tutorial will be written in C++. Also, it is assumed that the reader is familiar wih the STL library)

    标签: chatterbot Basicaly computer Natural

    上传时间: 2017-07-30

    上传用户:小宝爱考拉

  • boost代码

    boost的matlab代码, Matlab source codes for the Boosting of the J-DLDA learner(B-JDLDA) 

    标签: boostcode

    上传时间: 2015-03-23

    上传用户:52086

  • 16进制转十进制

    DATAS SEGMENT w dw 0 keybuf db 255      db 0      db 255 dup(0)      ;定义键盘输入需要的缓冲区 DATAS ENDS STACKS SEGMENT db 200 dup(?) STACKS ENDS CODES SEGMENT ASSUME CS:CODES,DS:DATAS,SS:STACKS START: MOV AX,DATAS MOV DS,AX mov dx,offset keybuf     ;用0a号功能,输入一个字符串 mov ah,0ah               ;用回车结束 int 21h mov dl,0ah               ;再进行换行,以便在下一行显示转换后的字符串  mov ah,2     int 21h ;  push ax ;   push dx ;      mov dl,cl ;     mov ah,02 ;     int 21h   ;   pop dx ;  pop ax mov bx,offset keybuf+1   ;取出字符串的字符个数,作为循环的次数 mov cl,[bx] mov ch,0     mov ax,0             again:  inc bx mov ax,[w] push bx mov bx,16 mul bx pop bx            ;是小写字母,则转换为大写字母 mov [w],ax mov dl,[bx]             ;取出一个字符, cmp dl,'9' jbe lab1 cmp dl,'F' jbe lab2 sub dl,32 lab2: sub dl ,07h lab1:  sub dl,30h add [w],dx  loop again   mov ax,[w]  mov bx,-1 push bx mov bx,10 lab3 :mov dx,0 div bx  push dx cmp ax,0 jnz lab3 lab5: pop dx cmp dx,-1 jz lab4 add dl,30h mov ah,02 int 21h        jmp  lab5            ;循环,处理完整个字符串 lab4:  MOV AH,4CH INT 21H CODES ENDS END START

    标签: 汇编

    上传时间: 2015-04-02

    上传用户:wcc0310

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Complex Orthogonal Space-Time Processing

    Multiple-Input Multiple-Output (MIMO) systems have recently been the subject of intensive consideration in modem wireless communications as they offer the potential of providing high capacity, thus unleashing a wide range of applications in the wireless domain. The main feature of MIMO systems is the use of space-time processing and Space-Time Codes (STCs). Among a variety of STCs, orthogonal Space-Time Block Codes (STBCs) have a much simpler decoding method, compared to other STCs

    标签: Orthogonal Space-Time Processing Complex

    上传时间: 2020-05-26

    上传用户:shancjb

  • Detection Algorithms for Wireless Communications

    This book presents, in a unitary and novel perspective, some of the research work the authors have carried out over the last decade, along with several collaborators and students. The roots of this book can be traced back to the design of adaptive sequence detection algorithms for channels with parametric uncertainty. The explosion of turbo codes and iterative decoding around the middle of the Nineties has motivated the design of iterative (turbo and graph-based) detection algorithms.

    标签: Communications Algorithms Detection Wireless for

    上传时间: 2020-05-27

    上传用户:shancjb