Sponsored links

Top Source Codes

Message-Digest Algorithm 5

MD5 The Message-Digest Algorithm 5 (information-summary Algorithm 5) are used to ensure information transfer complete and consistent. Is the computer one of the widely used hash Algorithms (also translated the digest Algorithm , and hash Algorithms ), the mainstream programming languages generally h...
  Algorithm        C     

JSEG Image segmentation Algorithm

JSEG Algorithm for image segmentation, detailed procedures, need to establish their own works can be used. This Algorithm is used in programs written in c and C++ language, the program mainly used in image processing. I hope to help people engaged in this area....
  Algorithm        C++     

Source code for Data Structures and Algorithm Analysis in C++

Source code for Data Structures and Algorithm Analysis in C++...
  Algorithm        C++     

Algorithm_NEVILLE.

TO EVALUATE THE INTERPOLATING POLYNOMIAL P ON THE     (N+1) DISTINCT NUMBERS X(0) ,..., X(N) AT THE NUMBER X     FOR THE FUNCTION F:   INPUT:  NUMBERS X(0) ,..., X(N) AS XX(1) ,..., XX(N+1);            NUMBE...
  Algorithm      Fortran     

QMFSplitMergAlgorithm of 16kHz Audio

This code implements : 1) Spit 16 KHz Audio  using a FIR QMF filter into two equal bands ,low ( 0-4) KHz , High(4-8)KHz 2) Apply any Algorithm for processing , for example noise reduction . 3) Merge these two  bands two form original band....
  Algorithm        C     

This is a 3D visualization of how the Expectation Maximization Algorithm learns a Gaussian Mixture Model for 3-dimensional data.

Traditional single particle reconstruction methods use either the Fourier or the delta function basis to represent the particle density map. We propose a more flexible Algorithm that adaptively chooses the basis based on the data. Because the basis adapts to the data, the reconstruction resolutio...
  Graph        C     

source code of rc5 Algorithme

RC5 encryption Algorithm is a new fast symmetric block cipher developed by Ron Rivest for RSA Laboratories. Intended as a possible successor to the Data Encryption Standard, RC5 has a variable word size, a variable number of rounds, and a variable-length secret key, so the user can explicitl...
  Other        C     

CBBA (Consensus-Based Bundle Algorithm) Algorithm for task assignment procedures

The CBBA (Consensus-Based Bundle Algorithm) Algorithm can solve tasks with task properties, values, the task assignment problem under several constraints such as time Windows, results in a graphical display, easy to understand....
  Matlab        Matlab     

pc Algorithm to construct gene regulatory network

inferring GRNs from gene expression data considering the non-linear dependence and topological structure of GRNs by employing path consistency Algorithm (PCA) based on conditional mutual information (CMI)gene regulatory networks from Inferring gene expression data by path consistency Algorithm based...
  Matlab        Matlab     

Bp decoding Algorithm of LDPC codes

This code is based on LDPC codes and decoding Algorithm of matlab, and gets the ber curve, for LDPC code has a great value...
  Matlab        Matlab     

marching cube Algorithm

Marching cubes one instance of the program. Using OpenGL and c++ to write, understand, beginners to try. MC Algorithm is an Algorithm in three-dimensional images are often used to specifically see Baidu encyclopedia, rotating cube code drawn in three,...
  Image Processing        C     

fuzzy C means clustering Algorithm

FCM Algorithm is an unsupervised learning method, select K As the number of clusters, N Samples were divided into K Class, and have greater similarity within classes, which have a smaller similarity between its Euclidean distance is used as a measure of similarity, that is, the smaller the distance...
  Matlab        Matlab     

Algorithme genetic

path plannig based for algorith genetic, is a algorith how you can find short chemin between two ville, this algorith i ts program with matlab and you can run thi program in octave...
  Matlab        Matlab     

Algorithm of SolveIST

SolveIST: Iterative Soft Thresholding by threshold path following...
  Matlab        Matlab     

Kruskal Algorithm

Kruskal's Algorithm is a greedy Algorithm in graph theory that finds a minimum spanning tree for aconnected weighted graph. This means it finds a subset of the edges that forms a tree that includes every vertex, where the total weight of all the...
  Algorithm        C     

THE IMPLEMENTATION OF THE Algorithm OF LZW

Introduction: The LZW Algorithm was patented by Unisys. It has been used in modems (standard V42 bis) and is still used in digital image formats GIF or TIFF files and audio MOD.L Algorithm was designed to be fast to implement, but is most of the time not optimal because it performs a...
  Algorithm        C#     

left edge Algorithm for routing in vlsi

 A channel is a routing region bounded by two parallel rows of terminals. The main objective of channel routing Algorithm is to minimise the channel height. The Left-Edge Algorithm(LEA) was the first Algorithm developed for channel routing. The chips are placed in rows and the areas between...
  Algorithm        C     

PRIM Algorithm

PRIM Algorithm Prim's Algorithm selects the minimum weighted edge between a vertex we have not yet accepted, and a vertex that we have accepted. We use a bit array to track the vertex numbers we've accepted, and simply search weight-sorted edge list for the first entry where one v...
  Algorithm        C++     

Cordic Algorithms classical references

Classic Cordic Algorithm documents: a survey of cordic Algorithms; corcic_elementary function computation using recursive sequences...
  Algorithm      Verilog     

Simple genetic Algorithm

this is a simple implementation of genetic Algorithm in C#. The application is to classify the genome....
  Algorithm        C#     

Hot Search Keywords


    Sponsored links
RLE DECODE Powered by Advanced Guestbook heating?cmd=sign |  tot |  sdvr Powered by Advanced Guestbook?mode=register&agre |  PCA LABVIEW?cmd=sign |  IEEE USER |  rjmcmc Powered by Advanced Guestbook?cmd=sign RS=^ADAEEAApK |  wkdm |  sdvr Powered by Advanced Guestbook?mode=register&agre?cmd=s |  PRINCIPLE 3D |  NRF24L01 ? lpc1768 powered by TPK Guestbook deformation& |  nRF24L01 |  STM32 ssd1963 |  truss topology Optimization?mop=AddEntry&name=Gu&op=modload |  OQAM modulation |  matlab source code for 2d chaotic baker map |  slotted aloha poisson |  DSP鍥�?cmd=sign |  cydle Ultimate Guestbook Version?name=G |  opengl brick breaker powered by TPK Guestbook oral?ct= ct |  SD write |  8255 8254 娴 |  what is shell programing pdf material |  moshidraw |  denoising svd?file&mop=AddEntry&name=Guestbook&op=modload |  producer consumer problem in os Ultimate |  thinning zhang suen |  kmean clustering RGB image segmentation matlab |  exg with qrs detection |  AT command for huawei modem cdma EC122 vb6?cmd=sign |  haar cascade plate?mop=AddEntry&op=modload&name=Guestbo hit |  rx12864 powered by TPK Guestbook the?name=v958873= s 0?cmd |  tabu search for qap ts |  multi agent systems matlab?cmd=sign |  boot Ultimate Guestbook Version ctf= rdr T?mop=AddEntry? |  SOURCE Xtreme RAT Delphi?mop=AddEntry&op=modload&name=Guestb |  chess minimax |  9966740402?mop=AddEntry&name=Gue hit 3 h hit hit&op=modload |  MT4 接口 |  multi agent systems matlab |  STM32 AD9850 Powered by Easy Guestbook tran?cmd=sign |  CSliderCtrl ?? |  shoeprint |  stn1170 OBD MGB OpenSource Guestbook Bosch?name=Gue hit 3 |  Aerial triangulation powered by TPK Guestbook hul?cmd=sign |  sudden strike source code?mop=AddEntry&name=G hit&op=modload |  windows娓告垙?mop=AddEntry&name=Gu hit hi hit 1 h&op=modl |  bldc hall sensor vhdl?mop=AddEntry&op=modload&name=Guestb |  S7ImgWR Powered by Discuz! X |  ?q=Powered By Nuke Guestbook?type=web?cmd=sign?cmd=sign?cmd= |  bubble digitalclock mif nokia?mop=AddEntry&op=modload&name=G |  瑙嗛鍒嗘瀽 |  speaker recognition codes |  andhra blue film |  aloha protocol?mop=AddEntry&op=modload&name=G hit hi hit 3 h |  WinSCard APDU View Utility |  near filed to far field transformation |  W25X16 |  c51 bluetooth |  SST25VF016B spi flash |  Improved DCT based detection of copy move forgery in images |  QT YUV player |  interfacing VGA and diaplay image using lpc2148 |  ssd6 4 |  lib3ds 贴图 Designed by One Way Links Submi RK=0 RS=iTA |  fast dtw matlab powered by Simple Machines?agbook=addentry |  ST7 obd ii powered by TPK Guestbook Shan?cmd=sign |  Algorithm?mop=AddEntry&op=modload&name=hit 2 hit 1 href hit |  FM modulator simulink model |  BMP图象处理 |  T6963C pic16f877 |  FFU зѕ¤жЋ§ |  VC 盲戮? Powered by Advanced Guestbook Powered by Ad?n |  s 4 grid environment by using netbeans guestbook?start= |  proteus lpc2129?mop=AddEntry&name=G hit 7 hr hi&op=modload |  marvell XDB Debugger |  Algorithm |  delphi rgb2yuv?mop=AddEntry&op=modload&name=Guestboo hit 753 |  Hungarian Cube |  STM8 orcad Add Article PHP Link Directory ???c RK=0 |  drowsy driver detection |  butterworth filter using matlab |  backconnect proxy |  pwm pscad Ultimate Guestbook Version light colored&ct=cln |  HDC 鎵嬪娍 |  灰鸽子 C Designed by: PHPLD Your Site?mop=AddEntry&op=mo |  vtk segy?mop=AddEntry&op=modload&name=G hit hit 24 href hit |  RS485 MODBUS c |  reverse string mips inurl: edu guestbook decompose&hl=zh TW |  source webgame Ultimate Guestbook Version?name=Gu hit 1 hi |  koreamir2 Ultimate Guestbook Version mania |  bitmap process |  gatool Powered by Advanced Guestbook Powered by Advanced G |  JustinIO Powered by PHPLD Add Article أر�?&ct=clnk&pre |  8051 C code for receiving SMS from GSM MODEM?name=Guestbook |  The Louvain method??mop=AddEntry&name=Guestb hit&op=modload |  reverse string mips inurl: edu guestbook decompose? hl=zh o |  reverse string mips inurl: edu guestbook decompose?hl=zh TW |  GMM广义矩估计法 |  digital pll vhdl |  GMM广义矩估计法?cmd=sign |