this file is leverage algorithm written in matlab as m-file and tested in matlab.so anyone can ue this algorithm and any bug can be reported
标签: matlab algorithm leverage written
上传时间: 2017-09-28
上传用户:zhaoq123
模糊神经网络采用matlab编程 o install NEFCON follow these steps: 1. Unpack the tar file NEFCON.TAR into your MATLAB working directory: tar xf NEFCON.TAR 2. Start MATLAB 3. Change to the installation directory. 4. Change to the NEFCON directory. 5. Start the STARTUP m-file to initialize NEFCON.
标签: NEFCON install matlab follow
上传时间: 2014-01-10
上传用户:qiao8960
This code converts a Galois Field array created usin GF(2^m) for a given primitive polynomial into a decimal array that can be used within typical .m file coding.
标签: polynomial primitive converts created
上传时间: 2015-09-26
上传用户:wang5829
There are two files in the zip folder. bpsk_spread.m and jakesmodel.m Steps for simulation: 1] Run jakesmodel.m first 2] Then run bpsk_spread.m . 3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented 4] The resulting performance is stored in BER_awgn. 5] Now uncomment the Rayleigh Fading code in bpsk_spread.m file. 6] Same time comment BER_awgn (line 112) and uncomment BER_ray variable. 7] Run the simulation. To compare the perfromances of the receiver using DSSS plot the BER_awgn and BER_ray
标签: bpsk_spread jakesmodel simulation folder
上传时间: 2016-05-19
上传用户:ynsnjs
Windowed-Burg method is made in order to improve the Clasical Burg method. Previously, I send the PBURGW.m file, but now I include also the ARBURGW.m algorithm and some NOTES-EXAMPLES to explain it and compare with the pburg.m algorithm from MATLAB.
标签: method Windowed-Burg Previously the
上传时间: 2013-12-22
上传用户:familiarsmile
加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]
标签: Cryptographic Primitives generate Library
上传时间: 2015-07-16
上传用户:wqxstar
本书对simulink做了简单的介绍,并给出了许多m-file,且予以解释说明
标签: simulink
上传时间: 2014-01-12
上传用户:xmsmh
As all of you know, MATLAB is a powerful engineering language. Because of some limitation, some tasks take very long time to proceed. Also MATLAB is an interpreter not a compiler. For this reason, executing a MATLAB program (m file) is time consuming. For solving this problem, Mathworks provides us C Math Library or in common language, MATLAB API. A developer can employ these APIs to solve engineering problems very fast and easy. This article is about how can use these APIs.
标签: some engineering limitation language
上传时间: 2013-12-06
上传用户:huql11633
Summary: Newton-Raphson method for all real roots of the polynomial. MATLAB Release: R11 Description: This m-file calculates all the real roots of the given polynomial. It calls syn_division, a synthetic division function, and derivate, differentiation function.
标签: Newton-Raphson polynomial Summary Descrip
上传时间: 2013-12-24
上传用户:cccole0605
一个UWB仿真程序包,里面包含信号生成,信道模拟,Tx/Rx等模块。m-file
上传时间: 2016-05-22
上传用户:xiaoxiang