Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Mathimatics-Numerical algorithms
Mathimatics-Numerical algorithms list
Sort by :
« 1 2 ... .90 .91 .92 .93 .94 27895.96 .97 .98 .99 .00 ... 28522 »
Downloaded:0
an algorithm similar to the blast of genetic data Fast Search Algorithm
Date : 2008-10-13 Size : 89.44kb User : 董骝焕

Downloaded:0
Huffman coding is a variable word length coding (VLC) A is to remove redundant code of the most commonly used methods. It is Huffman in 1952 made a coding method, and its basic tenets are frequently used data with the co
Date : 2008-10-13 Size : 23.47kb User : 胡骥骏

Downloaded:0
use interpolation algorithm to achieve a smooth dogleg. This is a relatively simple algorithm.
Date : 2008-10-13 Size : 27.68kb User : 蒋利兵

Downloaded:0
back Schomburg iterative algorithm is quite commonly used computer algorithms, the procedure is a Queen's eight issues.
Date : 2008-10-13 Size : 5.73kb User : 金海建

Downloaded:0
latest time-frequency analysis software, and provides a variety of pseudo-WVD WVD algorithm. Hu-book prepared by the lt; Lt; Modern signal processing Guide gt; Gt; Example process needs to run its
Date : 2008-10-13 Size : 2.21mb User : 游庆瑜

Downloaded:0
a jpeg coding procedures, the effective realization of the jpeg image compression, is a very good coding test cases.
Date : 2008-10-13 Size : 10.62kb User : 寒塘

Downloaded:0
fractal image compression source code, achieving Fractal iterative algorithm, Fractal Image Compression, very suitable for studying the fractal algorithm.
Date : 2008-10-13 Size : 22.63kb User : 寒塘

VC source, including the jpeg compression coding entire process is learning value.
Date : 2008-10-13 Size : 681kb User : 寒塘

Downloaded:0
this procedure main right Huffman coding. Huffman is the data structure of the experimental aircraft, one very useful
Date : 2008-10-13 Size : 1.23kb User : 韦福勤

Downloaded:1
This is a peak on the ICA algorithm inside ica_kurt.m is the main document, pending input signal observation demands matrix form, the number of firms covered by the weight of several listed a number for each component co
Date : 2008-10-13 Size : 1.69kb User : 王斌

Downloaded:3
cryptapi algorithm in this era of information explosion, we had the right information security alert. Data encryption to protect information security as a way of increasing people's attention. Below, I will own right Mic
Date : 2008-10-13 Size : 137.39kb User : 张国立

Downloaded:0
the purpose of this design is : Chinese handwriting analysis specific to the gray images of the two-dimensional spatial distribution of statistical characteristics using 2D Run Hufman coding method for image compression
Date : 2008-10-13 Size : 11.92kb User : 黄宾
« 1 2 ... .90 .91 .92 .93 .94 27895.96 .97 .98 .99 .00 ... 28522 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.