Sponsored links

Top Source Codes

Message-Digest algorithm 5

MD5 The Message-Digest algorithm 5 (information-summary algorithm 5) are used to ensure information transfer complete and consistent. Is the computer one of the widely used hash algorithms (also translated the digest algorithm , and hash algorithms ), the mainstream programming languages generally h...
  Algorithm        C     

JSEG Image segmentation algorithm

JSEG algorithm for image segmentation, detailed procedures, need to establish their own works can be used. This algorithm is used in programs written in c and C++ language, the program mainly used in image processing. I hope to help people engaged in this area....
  Algorithm        C++     

Source code for Data Structures and algorithm Analysis in C++

Source code for Data Structures and algorithm Analysis in C++...
  Algorithm        C++     

algorithm_NEVILLE.

TO EVALUATE THE INTERPOLATING POLYNOMIAL P ON THE     (N+1) DISTINCT NUMBERS X(0) ,..., X(N) AT THE NUMBER X     FOR THE FUNCTION F:   INPUT:  NUMBERS X(0) ,..., X(N) AS XX(1) ,..., XX(N+1);            NUMBE...
  Algorithm      Fortran     

QMFSplitMergalgorithm of 16kHz Audio

This code implements : 1) Spit 16 KHz Audio  using a FIR QMF filter into two equal bands ,low ( 0-4) KHz , High(4-8)KHz 2) Apply any algorithm for processing , for example noise reduction . 3) Merge these two  bands two form original band....
  Algorithm        C     

This is a 3D visualization of how the Expectation Maximization algorithm learns a Gaussian Mixture Model for 3-dimensional data.

Traditional single particle reconstruction methods use either the Fourier or the delta function basis to represent the particle density map. We propose a more flexible algorithm that adaptively chooses the basis based on the data. Because the basis adapts to the data, the reconstruction resolutio...
  Graph        C     

source code of rc5 algorithme

RC5 encryption algorithm is a new fast symmetric block cipher developed by Ron Rivest for RSA Laboratories. Intended as a possible successor to the Data Encryption Standard, RC5 has a variable word size, a variable number of rounds, and a variable-length secret key, so the user can explicitl...
  Other        C     

CBBA (Consensus-Based Bundle algorithm) algorithm for task assignment procedures

The CBBA (Consensus-Based Bundle algorithm) algorithm can solve tasks with task properties, values, the task assignment problem under several constraints such as time Windows, results in a graphical display, easy to understand....
  Matlab        Matlab     

pc algorithm to construct gene regulatory network

inferring GRNs from gene expression data considering the non-linear dependence and topological structure of GRNs by employing path consistency algorithm (PCA) based on conditional mutual information (CMI)gene regulatory networks from Inferring gene expression data by path consistency algorithm based...
  Matlab        Matlab     

Bp decoding algorithm of LDPC codes

This code is based on LDPC codes and decoding algorithm of matlab, and gets the ber curve, for LDPC code has a great value...
  Matlab        Matlab     

marching cube algorithm

Marching cubes one instance of the program. Using OpenGL and c++ to write, understand, beginners to try. MC algorithm is an algorithm in three-dimensional images are often used to specifically see Baidu encyclopedia, rotating cube code drawn in three,...
  Image Processing        C     

fuzzy C means clustering algorithm

FCM algorithm is an unsupervised learning method, select K As the number of clusters, N Samples were divided into K Class, and have greater similarity within classes, which have a smaller similarity between its Euclidean distance is used as a measure of similarity, that is, the smaller the distance...
  Matlab        Matlab     

algorithme genetic

path plannig based for algorith genetic, is a algorith how you can find short chemin between two ville, this algorith i ts program with matlab and you can run thi program in octave...
  Matlab        Matlab     

algorithm of SolveIST

SolveIST: Iterative Soft Thresholding by threshold path following...
  Matlab        Matlab     

Kruskal algorithm

Kruskal's algorithm is a greedy algorithm in graph theory that finds a minimum spanning tree for aconnected weighted graph. This means it finds a subset of the edges that forms a tree that includes every vertex, where the total weight of all the...
  Algorithm        C     

THE IMPLEMENTATION OF THE algorithm OF LZW

Introduction: The LZW algorithm was patented by Unisys. It has been used in modems (standard V42 bis) and is still used in digital image formats GIF or TIFF files and audio MOD.L algorithm was designed to be fast to implement, but is most of the time not optimal because it performs a...
  Algorithm        C#     

left edge algorithm for routing in vlsi

 A channel is a routing region bounded by two parallel rows of terminals. The main objective of channel routing algorithm is to minimise the channel height. The Left-Edge algorithm(LEA) was the first algorithm developed for channel routing. The chips are placed in rows and the areas between...
  Algorithm        C     

PRIM algorithm

PRIM algorithm Prim's algorithm selects the minimum weighted edge between a vertex we have not yet accepted, and a vertex that we have accepted. We use a bit array to track the vertex numbers we've accepted, and simply search weight-sorted edge list for the first entry where one v...
  Algorithm        C++     

Cordic algorithms classical references

Classic Cordic algorithm documents: a survey of cordic algorithms; corcic_elementary function computation using recursive sequences...
  Algorithm      Verilog     

Simple genetic algorithm

this is a simple implementation of genetic algorithm in C#. The application is to classify the genome....
  Algorithm        C#     

Hot Search Keywords


    Sponsored links
wavelet transform code |  langermann function |  Static 表 |  ?q=Powered By Nuke Guestbook?type=web?cmd=sign?cmd=sign?cmd= |  flann matlab code |  download jar jpcap Powered by Easy Guestbook Cop?mop= AddE |  rootkit vb6 |  ?cmd=sign |  unity 3d 水波 �??�???mop=AddEntry&op=modload&name=Gue? |  iOS sip |  PSI SI鐞?3F |  RNS signed integer in verilog hdl |  MT 6253 Schematics |  ع Powered By: Article Friendly Ultimate ع& ct=clnk?cmd&pre |  STFT c powered by TPK Guestbook vocal?name=Guestbook hit h |  opengl color interpolation |  ع Powered By: Article Friendly Ultimate ع&?name=G hit 10 h |  candle flame |  matlab code for rsa in flexible bandwidth optical networks |  flann matlab code?cmd=sign |  鍗婇€忔槑 Panel |  SHARC |  ? Powered By: Article Friendly Ultimate ?prev= search&prev= |  ع Powered By: Article Friendly Ultimate ع?name=Guestbook?c |  毓 Powered By: Article Friendly Ultimate 毓?ct=cln |  24c08 ??芒鈥毬?3F Powered by Advanced Guestbook she?name |  CPU TEMP |  T530ea? ei=7sNCUun0N4ql0QW60YCoBg? sa=U&name=Guestbook |  orcad dos Powered by: Maian Guestbook Cambio&ct=clnk?cmd=s |  orcad dos Powered by: Maian Guestbook Cambio&ct=clnk |  游æ�? |  toshiba s1500 |  32ledrgb Powered by Advanced Guestbook?name=G hit 19 h hi h |  DM385 powered by TPK Guestbook forma?name=h hit hi hit 19? |  axi bfm Powered By: Article Friendly Keywords axis?mop=A |  ع Powered By: Article Friendly Ultimate ع?name=Guestbook&p |  amibroker powered by TPK Guestbook Ai?name=Guest hit 43 hi |  VB CRC16 Powered by Advanced Guestbook interior?name=G hit |  order system C# |  orcad dos Powered by: Maian Guestbook Cambio?ct=clnk |  meeting room?name=Guest hit 4 hit 104 href= s 0 IOCP 鍘 |  S1D 13781 powered by TPK Guestbook Dom?name=hit hi hit 21& |  SP3306AL Powered by Advanced Guestbook way?name=hi? hit 23 |  浜屽€煎寲 VB6 |  eliza in c |  vb6 webbrowser |  intercept keyboard input vb6 |  jquery admin template |  MSM773 powered by TPK Guestbook Han?name=Guestbo hi hit 21 |  sdvr Powered by Advanced Guestbook?name=guestb hi hit 17 hi |  fbus vb6 |  VB6 RS485 |  imaqt Powered by: Maian Guestbook New?name=hit 15 h hit hi |  imaqt Powered by: Maian Guestbook their?name=G hi hit 21 |  s7 1200 vb6 |  sleeping barber problem |  flash Slot Machine template |  rtl8196 powered by TPK Guestbook highspeed?name=Guest hi h |  yin pitch c Powered by: Maian Guestbook CBC?name=hit 15 hi |  NFC vb6 |  VB6 DVR |  mp4杞崲 |  blothoot Powered by Advanced Guestbook Powered?sa=U&am?mop |  zoo management system |  vpn vb6 powered by TPK Guestbook Wiz?mop=AddEntry?op=modlo |  NS2 SMR Powered by Advanced Guestbook presentation?mop=Add |  p2p ipcam |  matlab code for QRS detection in ECG signal |  OMNeT intrusion detection?cmd=sign |  invalid loop offset |  集群 |  Singh advanced frequency evaluation |  C ????xml?????&amp sa=U&amp ei=mZSYUea7LemR0QHbrYGADA&amp v |  content based image retrival using artificial neural network |  holt winters method&prev= search?q= Designed |  embeded internet radio player?mop=AddEntry&op=modload&name=G |  uclinux ???? |  mfc?mop=AddEntry&name=G hit 1 href= s hit hit 6&op=modload |  c# ticket booking Powered by Easy Guestbook repairman?ct?c |  qte?mop=AddEntry&name=G? hit 20 href= s 0 gt06n&op=modload |  watershed transformation on fundus image |  stm32f103 sd card using spi?mop=AddEntry&name=Gue&op=modload |  6410 裸机 Powered by Easy Guestbook ddys& ct=?cmd=sign |  matlab for tlm model with R L C components |  INSAR处理ROI PAC |  male to female voice conversion Powered by Easy Guestbook?c |  pic16628a lc72131?mop=AddEntry&op=modload&name=Guestb hit 52 |  power system oscillations graham rogers?cmd=sign |  配准源代码 |  WUA api |  progisp?file=index&mop=AddEntry&name=Guestbook&op=modload |  6410 裸机 Powered by Easy Guestbook ddys& ct=?cmd=sign?c |  matlab rocket |  ST72F324B SOFTWARE PROGRAMMES USING c?mop=AddEntry?op=modloa |  JFDTD Powered by Easy Guestbook relocating?prev= search RK |  steganography using opencv |  脉冲计数 单片机 |  DPSCOPE FIRMWARE Powered by Advanced Guestbook pain?mop=Ad |  steganography using opencv?cmd=sign |  Hungarian Cube |