implEMent a Rayleigh fading channel simulator based on the Filtered Gaussian Noise method
标签: implEMent simulator Filtered Gaussian
上传时间: 2013-12-20
上传用户:1159797854
This toolbox contains Matlab files that implEMent the Laplacian pyramid (LP) decomposition and the new reconstruction method
标签: decomposition Laplacian implEMent the
上传时间: 2014-01-22
上传用户:曹云鹏
This toolbox contains Matlab files that implEMent the nonsubsample contourlet transform and its utility functions. Some Matlab files are the same as those in Contourlet Toolbox.
标签: nonsubsample contourlet implEMent transform
上传时间: 2017-01-14
上传用户:lunshaomo
自行implEMent的k-mean(含fuzzy c mean),可以直接於vc++針對大量數據進行分群的動作
标签: implEMent k-mean fuzzy mean
上传时间: 2017-02-04
上传用户:woshini123456
An Empirical Study on Effectiveness and Impact Factors Analysis of Enterprise implEMent ERP System
标签: Effectiveness Enterprise Empirical implEMent
上传时间: 2014-01-11
上传用户:silenthink
implEMent the Matrix function about 16bits on FPGA BOARD
标签: implEMent function Matrix BOARD
上传时间: 2014-01-01
上传用户:fxf126@126.com
The files included implEMent the M3 Enigma machine. Rotors.m implEMents the GUI and enigma.m implEMents the cipher substitutions. The implEMentation can be used as an aid to teaching the enigma machine. Also, the source can be used to show how to implEMent an enigma machine. The files are thoroughly commented and the application can run in MATLAB by just typing rotors
标签: implEMents implEMent the included
上传时间: 2017-02-24
上传用户:lixinxiang
Banker s Algorithm implEMent by Java
标签: Algorithm implEMent Banker Java
上传时间: 2013-12-22
上传用户:aeiouetla
Producer Consumer Algorithm implEMent by Java
标签: Algorithm implEMent Producer Consumer
上传时间: 2017-03-07
上传用户:sdq_123
This project demonstrates the use of secure hash functions technique to implEMent a file encryption / decryption system. This implEMented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implEMent
上传时间: 2017-03-08
上传用户:xuanchangri