Sponsored links

Top Source Codes

Message-Digest algorithm 5

MD5 The Message-Digest algorithm 5 (information-summary algorithm 5) are used to ensure information transfer complete and consistent. Is the computer one of the widely used hash algorithms (also translated the digest algorithm , and hash algorithms ), the mainstream programming languages generally h...
  Algorithm        C     

JSEG Image segmentation algorithm

JSEG algorithm for image segmentation, detailed procedures, need to establish their own works can be used. This algorithm is used in programs written in c and C++ language, the program mainly used in image processing. I hope to help people engaged in this area....
  Algorithm        C++     

Source code for Data Structures and algorithm Analysis in C++

Source code for Data Structures and algorithm Analysis in C++...
  Algorithm        C++     

algorithm_NEVILLE.

TO EVALUATE THE INTERPOLATING POLYNOMIAL P ON THE     (N+1) DISTINCT NUMBERS X(0) ,..., X(N) AT THE NUMBER X     FOR THE FUNCTION F:   INPUT:  NUMBERS X(0) ,..., X(N) AS XX(1) ,..., XX(N+1);            NUMBE...
  Algorithm      Fortran     

QMFSplitMergalgorithm of 16kHz Audio

This code implements : 1) Spit 16 KHz Audio  using a FIR QMF filter into two equal bands ,low ( 0-4) KHz , High(4-8)KHz 2) Apply any algorithm for processing , for example noise reduction . 3) Merge these two  bands two form original band....
  Algorithm        C     

This is a 3D visualization of how the Expectation Maximization algorithm learns a Gaussian Mixture Model for 3-dimensional data.

Traditional single particle reconstruction methods use either the Fourier or the delta function basis to represent the particle density map. We propose a more flexible algorithm that adaptively chooses the basis based on the data. Because the basis adapts to the data, the reconstruction resolutio...
  Graph        C     

source code of rc5 algorithme

RC5 encryption algorithm is a new fast symmetric block cipher developed by Ron Rivest for RSA Laboratories. Intended as a possible successor to the Data Encryption Standard, RC5 has a variable word size, a variable number of rounds, and a variable-length secret key, so the user can explicitl...
  Other        C     

CBBA (Consensus-Based Bundle algorithm) algorithm for task assignment procedures

The CBBA (Consensus-Based Bundle algorithm) algorithm can solve tasks with task properties, values, the task assignment problem under several constraints such as time Windows, results in a graphical display, easy to understand....
  Matlab        Matlab     

pc algorithm to construct gene regulatory network

inferring GRNs from gene expression data considering the non-linear dependence and topological structure of GRNs by employing path consistency algorithm (PCA) based on conditional mutual information (CMI)gene regulatory networks from Inferring gene expression data by path consistency algorithm based...
  Matlab        Matlab     

Bp decoding algorithm of LDPC codes

This code is based on LDPC codes and decoding algorithm of matlab, and gets the ber curve, for LDPC code has a great value...
  Matlab        Matlab     

marching cube algorithm

Marching cubes one instance of the program. Using OpenGL and c++ to write, understand, beginners to try. MC algorithm is an algorithm in three-dimensional images are often used to specifically see Baidu encyclopedia, rotating cube code drawn in three,...
  Image Processing        C     

fuzzy C means clustering algorithm

FCM algorithm is an unsupervised learning method, select K As the number of clusters, N Samples were divided into K Class, and have greater similarity within classes, which have a smaller similarity between its Euclidean distance is used as a measure of similarity, that is, the smaller the distance...
  Matlab        Matlab     

algorithme genetic

path plannig based for algorith genetic, is a algorith how you can find short chemin between two ville, this algorith i ts program with matlab and you can run thi program in octave...
  Matlab        Matlab     

algorithm of SolveIST

SolveIST: Iterative Soft Thresholding by threshold path following...
  Matlab        Matlab     

Kruskal algorithm

Kruskal's algorithm is a greedy algorithm in graph theory that finds a minimum spanning tree for aconnected weighted graph. This means it finds a subset of the edges that forms a tree that includes every vertex, where the total weight of all the...
  Algorithm        C     

THE IMPLEMENTATION OF THE algorithm OF LZW

Introduction: The LZW algorithm was patented by Unisys. It has been used in modems (standard V42 bis) and is still used in digital image formats GIF or TIFF files and audio MOD.L algorithm was designed to be fast to implement, but is most of the time not optimal because it performs a...
  Algorithm        C#     

left edge algorithm for routing in vlsi

 A channel is a routing region bounded by two parallel rows of terminals. The main objective of channel routing algorithm is to minimise the channel height. The Left-Edge algorithm(LEA) was the first algorithm developed for channel routing. The chips are placed in rows and the areas between...
  Algorithm        C     

Cordic algorithms classical references

Classic Cordic algorithm documents: a survey of cordic algorithms; corcic_elementary function computation using recursive sequences...
  Algorithm      Verilog     

Simple genetic algorithm

this is a simple implementation of genetic algorithm in C#. The application is to classify the genome....
  Algorithm        C#     

PRIM algorithm

PRIM algorithm Prim's algorithm selects the minimum weighted edge between a vertex we have not yet accepted, and a vertex that we have accepted. We use a bit array to track the vertex numbers we've accepted, and simply search weight-sorted edge list for the first entry where one v...
  Algorithm        C++     

Hot Search Keywords


    Sponsored links
booths algorithm emu8086 |  VC �?�据�?�?�? 课�?设计�?��?? |  ? android |  s 1 MPOE Ultimate Guestbook Version?action=sign&?cmd=s |  Aprioriall Designer: PHPLD Templates Add Article t |  VC � |  asm code for digital clock design |  uwb thesis Powered by Advanced Guestbook?name=Gue hi hit 1 |  CSR BC417 |  CRC Calculate Designer: PHPLD Templates Add Article si?n |  crawler source code with JSP?cmd=sign |  论文 多线程 |  8 puzzle problem astar?mop=AddEntry&op=modload&nam |  verilog coding for crosstalk |  地理信息系統 |  at command gsm sim900 |  YUV422 to RGB&prev= search?q= powered |  RSA V |  image segmentation by region growing algoritm ` dompdf do |  exprony ma |  rc6 in c#?mop=AddEntry&op=modload&name=Gue hit 54 href= s |  ????? Ultimate Guestbook Version?cmd=sign?cmd=sign?cmd?mop |  姘寸數缁忔祹杩愯 |  delta PLC&prev= search?q= Submit |  s3f8s15?name=Guestboo hit 4 href= s hit 18 href= s 0 koleb |  gebetic c |  opencv基础版 |  plc yaskawa Powered by Advanced Guestbook symbiosis?ct=cln |  filtfilt C Designer: PHPLD Templates Add Article simpl?c |  led pixel |  pbxml|4?name=guestb hit hit 1 href= hit 5 href= s 0 RDA184 |  ac motor soft start pic source code |  aes cbc?mop=AddEntry&name=Guest hit hit 27 href=&op=modload |  Directx 9 3D Collision Detection |  Image steganography using DCT algorithm in MATLAB |  凹多边形 复杂 |  shifter and adder compreesion |  LQFP 48 protel lib |  vba word ?? |  c# snooker game Powered by Burning Book Realistically?cmd= |  fibonacci series in c |  antecedent consequent constraints for apriori using matlab |  SkinBeautyStudio powered by TPK Guestbook i?mop=AddEntry?o |  Games snake?cmd=sign Designer: Free PHPLD Templates S RS= |  double des program in java |  DAC matlab |  TEA source code in c |  فقشزث?mode=register&agreed=true&iscanyesno=yeswecan?cmd |  stm32 inverter |  struts2 shop |  VHDL code s for adc 0804 and dac 0808?mop=AddEntry?op=modloa |  nearest neighbour alhorithm C# |  Internet Socket Network pop3 |  BMP180 API?cmd=sign |  ?? matlab Powered by Jcow dc? RK=0 RS=cztXdWTDnOXdlXQS2BrZc6 |  stmXZUNTMTX |  mysee Ultimate Guestbook Version book readers&ct=clnk?mop |  image segmentation differential evolution |  rockchip MGB OpenSource Guestbook souls RK=0 RS=brSU5tp3Rk |  PCF 8583 rtc?mop=AddEntry&name=Guestb hit 23 hre&op=modload |  Invert matrix |  handwritten character recognition SVM |  TRF7960 mega |  MC CDMA Powered by Advanced Guestbook?name=Guestbo? hit 3 |  barcode localization matlab |  RLE DECODE Ultimate Guestbook Version r?ct=clnk &le?cmd=s |  hough dib Powered by Advanced Guestbook envelopes& ct=c |  fm radio for pmp |  LTE SON matlab |  c program for deadlock detection bankers algorithm |  stm32 USB ca |  diagnostic scanner auto |  matlab code of Particle Swarm Optimization for 75 bus system |  linux c qt 聊天 局域网 udp |  knn C powered by TPK Guestbook examination?name&op=modload |  vb6 make dial up 4 internet powered by advanced guestbook?m |  nowada n117 treiber |  宓屽叆寮忚绋嬭璁? |  ssh |  pan tompkins matlab |  TTS Delphi7?cmd=sign |  mt 65xx driver |  RLE DECODE Ultimate Guestbook Version r?ct=clnk ?le?cmd=s |  c ?ppt |  dsp printf Powered by Advanced Guestbook jewel&ct=clnk |  清除网页随机验证码 |  JY MCU 3208?agreed=true&iscanyesno=yeswecan&mode=register |  cd book |  intelligent water drop iwd algorithm in matlab |  navier2d Designer: PHPLD Templates Add Article locko?cmd |  sql parser C |  matlab query |  coding to get the destructive interference pattern |  MELSEC Communication Protocol?mop=AddEntry&name=G&op=modload |  ECDH???? |  dwt AND svd MATLAB CODE FOR AUDIO WATERMARKING?prev= search |  power flow calculation |  ? Powered By: Article Friendly Ultimate & cmd RK=0 RS=7LNlq |  xor using genetic algorithm in matlab |  ?mop=AddEntry&name=gues hit 9 href= s 0 Fringe&op=modload |