Ontology based personalized search A master thesis
标签: personalized Ontology master search
上传时间: 2015-09-18
上传用户:阿四AIR
Gabor Transformation based on a Exocortex dsp d
标签: Transformation Exocortex Gabor based
上传时间: 2013-12-17
上传用户:xwd2010
There is an example of how to use the LDPC encode/decode with AWGN channel model in files .\ldpc_decode.m and .\GFq\ldpc_decode.m. There are a few parity check matrices available in the code but you can use other matrices provided you have enough memory to load them. I suggest checking out matrices in Alist format available on David MacKay s web site.You will need to have access to a MEX compiler to be able to use a few functions written in C. LDPC的仿真代码
标签: example channel ldpc_de encode
上传时间: 2013-12-03
上传用户:lili123
Second and Higher-Order Statistics based Multiple-Input-Multiple-Output System Blind Identification Matlab Code
标签: Multiple-Input-Multiple-Output Identification Higher-Order Statistics
上传时间: 2013-12-24
上传用户:wpt
The function conload takes a dataset and a model (PCA, PLS, PARAFAC etc.) and calculates congruence loadings which is the extension of correlation loadings to uncentered and multi-way models
标签: calculates congruence and function
上传时间: 2014-01-08
上传用户:sz_hjbf
JVT-T206 contains the reference software of the Joint 4:4:4 Verification Model (JFVM) 4 in the directory JVT-T206_jfvm_1_11 as described in JVT-T205
标签: the Verification reference contains
上传时间: 2015-09-24
上传用户:TF2015
Session Initiation Protocol (SIP) [1] is fast becoming the protocol of choice for IP based communication – specifically telephony (Voice over Internet Protocol - VoIP), video, and instant messaging.
标签: Initiation communica Protocol becoming
上传时间: 2015-09-25
上传用户:hanli8870
Stack-based sequential decoder for M-QAM modulated MIMO-type problems, i.e., of fixed tree depth.
标签: Stack-based sequential MIMO-type modulated
上传时间: 2014-01-25
上传用户:515414293
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
Lab 2 – Synthesizable MATLAB This lab exercise will explore the effects that different MATLAB coding styles have on hardware. The lab has two parts, each of which begins with a short introduction. This lab exercise is based on the simple MATLAB FIR filter model shown below:
标签: MATLAB Synthesizable different exercise
上传时间: 2015-09-28
上传用户:sammi