Sponsored links

Top Source Codes

Message-Digest algorithm 5

MD5 The Message-Digest algorithm 5 (information-summary algorithm 5) are used to ensure information transfer complete and consistent. Is the computer one of the widely used hash algorithms (also translated the digest algorithm , and hash algorithms ), the mainstream programming languages generally h...
  Algorithm        C     

JSEG Image segmentation algorithm

JSEG algorithm for image segmentation, detailed procedures, need to establish their own works can be used. This algorithm is used in programs written in c and C++ language, the program mainly used in image processing. I hope to help people engaged in this area....
  Algorithm        C++     

Source code for Data Structures and algorithm Analysis in C++

Source code for Data Structures and algorithm Analysis in C++...
  Algorithm        C++     

algorithm_NEVILLE.

TO EVALUATE THE INTERPOLATING POLYNOMIAL P ON THE     (N+1) DISTINCT NUMBERS X(0) ,..., X(N) AT THE NUMBER X     FOR THE FUNCTION F:   INPUT:  NUMBERS X(0) ,..., X(N) AS XX(1) ,..., XX(N+1);            NUMBE...
  Algorithm      Fortran     

QMFSplitMergalgorithm of 16kHz Audio

This code implements : 1) Spit 16 KHz Audio  using a FIR QMF filter into two equal bands ,low ( 0-4) KHz , High(4-8)KHz 2) Apply any algorithm for processing , for example noise reduction . 3) Merge these two  bands two form original band....
  Algorithm        C     

This is a 3D visualization of how the Expectation Maximization algorithm learns a Gaussian Mixture Model for 3-dimensional data.

Traditional single particle reconstruction methods use either the Fourier or the delta function basis to represent the particle density map. We propose a more flexible algorithm that adaptively chooses the basis based on the data. Because the basis adapts to the data, the reconstruction resolutio...
  Graph        C     

source code of rc5 algorithme

RC5 encryption algorithm is a new fast symmetric block cipher developed by Ron Rivest for RSA Laboratories. Intended as a possible successor to the Data Encryption Standard, RC5 has a variable word size, a variable number of rounds, and a variable-length secret key, so the user can explicitl...
  Other        C     

CBBA (Consensus-Based Bundle algorithm) algorithm for task assignment procedures

The CBBA (Consensus-Based Bundle algorithm) algorithm can solve tasks with task properties, values, the task assignment problem under several constraints such as time Windows, results in a graphical display, easy to understand....
  Matlab        Matlab     

pc algorithm to construct gene regulatory network

inferring GRNs from gene expression data considering the non-linear dependence and topological structure of GRNs by employing path consistency algorithm (PCA) based on conditional mutual information (CMI)gene regulatory networks from Inferring gene expression data by path consistency algorithm based...
  Matlab        Matlab     

Bp decoding algorithm of LDPC codes

This code is based on LDPC codes and decoding algorithm of matlab, and gets the ber curve, for LDPC code has a great value...
  Matlab        Matlab     

marching cube algorithm

Marching cubes one instance of the program. Using OpenGL and c++ to write, understand, beginners to try. MC algorithm is an algorithm in three-dimensional images are often used to specifically see Baidu encyclopedia, rotating cube code drawn in three,...
  Image Processing        C     

fuzzy C means clustering algorithm

FCM algorithm is an unsupervised learning method, select K As the number of clusters, N Samples were divided into K Class, and have greater similarity within classes, which have a smaller similarity between its Euclidean distance is used as a measure of similarity, that is, the smaller the distance...
  Matlab        Matlab     

algorithme genetic

path plannig based for algorith genetic, is a algorith how you can find short chemin between two ville, this algorith i ts program with matlab and you can run thi program in octave...
  Matlab        Matlab     

algorithm of SolveIST

SolveIST: Iterative Soft Thresholding by threshold path following...
  Matlab        Matlab     

Kruskal algorithm

Kruskal's algorithm is a greedy algorithm in graph theory that finds a minimum spanning tree for aconnected weighted graph. This means it finds a subset of the edges that forms a tree that includes every vertex, where the total weight of all the...
  Algorithm        C     

THE IMPLEMENTATION OF THE algorithm OF LZW

Introduction: The LZW algorithm was patented by Unisys. It has been used in modems (standard V42 bis) and is still used in digital image formats GIF or TIFF files and audio MOD.L algorithm was designed to be fast to implement, but is most of the time not optimal because it performs a...
  Algorithm        C#     

left edge algorithm for routing in vlsi

 A channel is a routing region bounded by two parallel rows of terminals. The main objective of channel routing algorithm is to minimise the channel height. The Left-Edge algorithm(LEA) was the first algorithm developed for channel routing. The chips are placed in rows and the areas between...
  Algorithm        C     

PRIM algorithm

PRIM algorithm Prim's algorithm selects the minimum weighted edge between a vertex we have not yet accepted, and a vertex that we have accepted. We use a bit array to track the vertex numbers we've accepted, and simply search weight-sorted edge list for the first entry where one v...
  Algorithm        C++     

Cordic algorithms classical references

Classic Cordic algorithm documents: a survey of cordic algorithms; corcic_elementary function computation using recursive sequences...
  Algorithm      Verilog     

Simple genetic algorithm

this is a simple implementation of genetic algorithm in C#. The application is to classify the genome....
  Algorithm        C#     

Hot Search Keywords


    Sponsored links
dace tracking opencv |  MFC 绉戝璁$畻鍣? |  line follower robot code using atmega 16 |  forum |  opencv tracking klt Ultimate Guestbook Version book downl |  Speech disfluency detection with the correlative method in m |  enc28j60 arduino |  web spider delphi |  红外检测滤波 matlab |  exercise 2 ssd 6 |  atmel 89c52 example programs powered by advanced guestbook? |  s 0 rtmx enter word verification in box below guestbook?pr |  16F877 ccs regulator pid motor |  ucos ii 驱动 |  playfair cipher program in c language |  Algorithm?mop=AddEntry&name=guestbook h hit 134 h&op=modload |  createdibsection例子 画透明图?mop=AddEntry&op=modlo |  HEVC H265?cmd=sign |  遗传算法优化模糊控制器 |  person tracking using dwt?mop=AddEntry&op=modload&name=guest |  HEVC H265 |  digital clock by using verilog |  satellite beamforming |  pic12f629 hex |  ATMEGA 128 LED MATRIX WITH PS2 KEYBOARD |  VC RGB转Hbitmap Powered by PHPLD Add Article أرم |  nrf24l01 8051 asm |  ?cmd=sign&mop=AddEntry&q=Powered By Nuke Guestbook&type=web |  iocp delphi |  matlab implementation of cook toom algorithm |  interprete |  rtl8196 powered by PHP Weby ~face?ct=clnk powered b RK=0 |  sms pdu decode |  ??? Powered by Advanced Guestbook ?mode=register&agr?cmd=s |  ?cmd=sign&VC Powered by Advanced Guestbook |  d flipflop circuit architecture |  ssd7 exam 3 Multiple Choice |  175918 enter word verification in box below guestbook?name |  蒸气 |  鏈€浣虫崟楸肩瓥鐣? |  cypress canbus |  hardy cross |  content based video retrieval matlab |  s 0 pitch smoother powered by php melody ã „ã ªã ?=?mo |  cyclostationary |  matlab coding to find iris and pupil radius |  2D ?????mop=AddEntry&file=&name=Guestbook&op=modload |  motion tracking as3 |  STM32f2 usart |  mimo ofdm vhdl |  stm32 EFSL |  s 13 awgn enter word verification in box below guestbook?a |  phonegap for j2me |  量子进化算法(QEA)?mop=AddEntry&name=Gue&op=modload |  AT91SAM7S64 音频驱动 |  NFA to Verilog |  cview jpg mfc |  first order autoregressive model |  MPOE Ultimate Guestbook Version?action=sign&amp s |  opencv adaboost 训练 |  labveiw based sdr |  cuda toolkit 4 aco |  sparse representation for multi view face recognition |  89c52 digital voltmeter |  Other |  web远程视频监控?mop=AddEntry&op=modload&name=Gu hit 27 |  uc1601 i2c |  ns2 codes for mean field game theory |  csharp proxy |  ssd4 exam practical 3 |  取词111 |  IF IDF |  STM32 K9F2G08 Powered by PHPLD Add Article RK=0 RS=jhcC7A3 |  k means algorithms in weka |  QAM equalizer Powered by: Maian Guestbook statement&c?nam |  atmega16 gsm gps vehicle tracking system?cmd=sign |  OPENGL 椭圆弧 |  csharp 3 tier generator trackback |  sound source localization Matlab code |  Apache Velocity in drag and drop java |  VRP tabu powered by TPK Guestbook 1986&ct=clnk?mop=AddEntr |  IODBPMC Powered by Advanced Guestbook registrar?ct=clnk?mo |  lasso Ultimate Guestbook Version repeated&ct=clnk |  Java Development?mop=AddEntry&name=guestbook h h &op=modload |  ant system vrp |  KDD CUP java NIDs?mop=AddEntry&op=modload&name=guestbook h h |  Using WMI Demo |  32ledrgb Powered by Advanced Guestbook?mode=register?mop=Ad |  mbi5031 powered by advanced guestbook ship?mop=AddEntry&op |  hand gesture recognition opencv c |  VRP USING ACO powered by TPK Guestbook deposit&ct=clnk?op= |  plx 9030 Powered by Advanced Guestbook filmes&ct=clnk?mop |  GQC LDPC |  8051 interfacing adc 0808 Powered by: Maian Guestbook Sha |  VRP tabu powered by TPK Guestbook 1986?name=Guestb hit 117 |  stm32f103 SD FAT32 |  jennic 5139 powered by TPK Guestbook redouble?name=h hit 2 |  VRP tabu powered by TPK Guestbook 1986?cmd=sign?mop=AddEnt |  hopfield & |  apriori C# powered by TPK Guestbook hul?name=guestbook hi? |