-
WAF
宽带模糊函数,用来分析带宽很宽的信号,像LFM等,这个例子对大家有帮助!(Wideband ambiguity function is used to analyze a wide-bandwidth signals, such as the LFM, the example of the help!)
- 2010-12-06 10:43:38下载
- 积分:1
-
LCS
使用贪心算法解决了图论算法中的最大点集覆盖问题 (Greedy algorithm using graph theory algorithms to solve the biggest point set covering problem)
- 2015-01-18 09:57:26下载
- 积分:1
-
poly
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution ciphers are useful because the are less easily broken by frequency analysis, however if an attacker knows for instance that the message has a period n, then he simply can individually frequency analyze each cipher alphabet.
The number of letters encrypted before a polyalphabetic substitution cipher returns to its first cipher alphabet is called its period. The larger the period, the stronger the cipher. Of course, this method of encryption is certainly not secure by any definition and should not be applied to any real-life scenarios.
- 2015-02-27 14:52:28下载
- 积分:1
-
Possion
使用matlab模拟、检验和估计泊松过程、(use Matlab simulation, test and the estimated Poisson process.)
- 2007-07-09 16:24:37下载
- 积分:1
-
pst
这个程序实现了OFDM利用多种PST方法进行减小PAR
(Use some method of PST to Reduce the PAR of OFDM
)
- 2011-05-09 21:13:00下载
- 积分:1
-
Vth
Vth system calculation
- 2013-08-21 04:12:02下载
- 积分:1
-
suspension
汽车被动悬架模型,半主动正在整,稍后上传(Car passive suspension model, semi-active being whole, later upload)
- 2014-01-12 15:21:47下载
- 积分:1
-
cluster
聚类问题的matlab程序,聚类问题在图像处理中有着广泛的应用(Clustering problem matlab procedures, clustering problem in image processing has a broad application)
- 2007-08-16 15:25:26下载
- 积分:1
-
circle-recognition
基于圆形比的圆的识别程序,使用matlab编制,简单易懂(Based on the ratio of a circle round the identification procedures, the use of matlab prepared, easy-to-read)
- 2008-02-27 12:26:26下载
- 积分:1
-
book3s_pr
Functions relating to running KVM on Book 3S processors where we don t have access to hypervisor mode, and we run the guest in problem state (user mode).
- 2014-08-20 11:23:07下载
- 积分:1