Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .20 .21 .22 .23 .24 27225.26 .27 .28 .29 .30 ... 28522 »
Downloaded:1
in front of one-dimensional, two-dimensional basis continue to offer three-dimensional FDTD procedures, which can help to solve the complex three-dimensional electromagnetic scattering problems, which have wider applicab
Update : 2025-02-26 Size : 2kb Publisher : 张洪欣

Downloaded:1
given by using OFDM UWB achieve the source code and examples. Letter from the source, channel, the receiver, is a complete system interface easy to learn to use.
Update : 2025-02-26 Size : 51kb Publisher : 张洪欣

Downloaded:0
given fractal calculation of the source code Matlab procedures, we can quickly help fractal analysis and calculation of parameters easy to set up
Update : 2025-02-26 Size : 2kb Publisher : 张洪欣

Downloaded:0
given FIR filter design in C language program, according to the design requirements, flexibility to adjust parameters and the filter parameters.
Update : 2025-02-26 Size : 1kb Publisher : 张洪欣

Butterworth filter based on the frequency of 50Hz- risk devices, procedures given the filter coefficient and made spectrum analysis
Update : 2025-02-26 Size : 1kb Publisher : 白应奎

CDMA frequency-hopping communications subroutine, the book calculation procedures CDMA frequency-hopping communications BER
Update : 2025-02-26 Size : 1kb Publisher : 白应奎

two set points CDMA frequency-hopping communications subroutine to calculate two set points Hopping CDMA communication system BER
Update : 2025-02-26 Size : 1kb Publisher : 白应奎

four band PSK simulation subroutine, the four band calculation subroutine PSK modulation BER
Update : 2025-02-26 Size : 1kb Publisher : 白应奎

Downloaded:0
differential coding subroutine, prior to the modulating signal differential coding
Update : 2025-02-26 Size : 1kb Publisher : 白应奎

Downloaded:0
ICA can be used in brain activation studies to reduce the number of dimension and filter out independent and interesting activations. This demonstration shows two studies. One provided by Hvidovre Universitets Hospital,
Update : 2025-02-26 Size : 2.64mb Publisher : 海心

Downloaded:0
ICA is used to classify text in extension to the latent semantic indexing framework. ICA show to align the context grouping structure well in a human sense [1], thus can be used for unsupervised classification. The demon
Update : 2025-02-26 Size : 2.38mb Publisher : 海心

Downloaded:0
The Molgedey and Schuster decorrelation algorithm, having square mixing matrix and no noise . Truncation is used for the time shifted matrix, and it is forced to be symmetric . The delay Tau is estimated . The number of
Update : 2025-02-26 Size : 12kb Publisher : 海心
« 1 2 ... .20 .21 .22 .23 .24 27225.26 .27 .28 .29 .30 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.