Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (5)
Gobang C program
no vote
GoMoKu
12193827
2020-01-18
0
1
Simulation of AODV protocol in NS2 environment and
4.0
Application background Simulation of AODV protocol in NS2 environment, and delay throughput analysis, two kinds of node simulation, the first manually set fifty nodes and dynamic, second kinds of random generation of topology and data flow
12193827
2016-08-23
0
1
FFT algorithm based on VC
no vote
Application background DesignProgram to implement the 1-D FFT algorithm. aInput:Vector. Get the testing data in file Project_2_test 'a'.Output:Vector which, is the discrete Fourier transform of the input. aForExample:Input:Three hundred and eighty-one thousand and twelveOutput:-7.0000+4.0000i -7.0000+0.0000i -7.0000-4.0000i 33.0000+0.0000iRequirements:PleaseThe project individually in C/C++/Java. completeYouSubmit your code and a report including theoretical analysis should,And running result. pseudo-code
12193827
2016-08-23
0
1
The minimum weight partition of convex polygon
no vote
Application background Minimum weight triangulation problem is to find a minimum total edge length triangulation problems. This is a polygon, and after you enter or input point set must be broken down into triangles, meeting edge to edge and vertex to vertex, in such a way to reduce the sum of the perimeter of the triangle.
12193827
2016-08-23
1
1
Attribute analysis of complex network
no vote
Application background 1 have done an investigation on the connections in our class and, three corresponding social WeUnder different conditions networks (knowing, someone s' name knowing, someone s' hometown i.e., andSomeone knowing 'dialect s formulated. Please download are the data from our assigned QQ group.(1) some computer simulations Perform (using whatever computer software programming or language by) onThree graphs to analyze the network properties such (as node-degree distribution average, shortest path- theLength, coefficient etc., clustering) dynamical behaviors and (as robustness against intentional attack and suchAttack etc., random).(2) the node coreness in the three graphs Calculate;
12193827
2015-11-13
0
1
No more~