Matlab Algorithm Collection

Matlab Algorithm Collection

1.Gaussian Elimination: function (x,det,flag)=Gauss(A,b), where A is the coefficient matrix of the equations; b is the right-hand side; det is the value of the determinant of the coefficient matrix; x is the solution of the equations. 2.Gaussian-Jordan Elimination: function (x,flag)=Gau_Jor(A,b), where flag=’ok’ indicates successful computation. 3.The syntax for plotting function graphs is: (1).plot——Utilize points to … Read more

Unexpected Ways to Open MATLAB

Unexpected Ways to Open MATLAB

Unexpected Ways to Open MATLAB · From October 29 to 31, 2019, the Information Construction Management Service Center of Nanjing University will invite the MATLAB team to bring a series of special lectures to the faculty and students. What is MATLAB? What can MATLAB be used for? Let this article tell you! MATLAB, short for … Read more

Introduction to Object-Oriented Programming in Matlab

Introduction to Object-Oriented Programming in Matlab

In the preface, this course does not provide PPT materials. Please reply “Simulation Control Materials” in the WeChat public account “GuYueJu” to obtain the course materials. Course Introduction In the current era of rapid information technology development, using computer programs to solve computational and research problems has become an important working method for many researchers. … Read more

How to Program in MATLAB for Mathematical Modeling?

How to Program in MATLAB for Mathematical Modeling?

897110540 – END – Copyright Statement:The content is from Gao Shu Shu’s original work, and the text, images, and videos have been applied for copyright protection. According to the “Copyright Law of the People’s Republic of China”, “Regulations for the Implementation of the Copyright Law of the People’s Republic of China”, and “Regulations on the … Read more

How to Perform High-Precision Calculations with MATLAB?

How to Perform High-Precision Calculations with MATLAB?

High-precision calculation is an algorithm for programming design. Due to the word length limits of the central processing unit, for example, in a 32-bit CPU, an integer can only take a maximum value of 4,294,967,295 (=2^32-1). Therefore, in out-of-range numerical calculations, simulation methods are often required. Typically, the method of separating characters is used to … Read more

Introduction to Matlab Functions

Introduction to Matlab Functions

Click the blue text / Follow us 1. Introduction to Matlab Matlab, short for matrix laboratory, is a high-tech computing environment primarily aimed at scientific computing, visualization, and interactive program design. It integrates powerful functions such as numerical analysis, matrix computation, scientific data visualization, and modeling and simulation of nonlinear dynamic systems into an easy-to-use … Read more

A Brief History of Cryptography: From Art to Science

A Brief History of Cryptography: From Art to Science

In May 2017, the WannaCry ransomware virus broke out globally, with some university students in mainland China reporting that their computers were attacked by the virus and documents were maliciously encrypted. The ransomware wreaked havoc, resembling a global internet disaster, causing significant losses to computer users. According to the latest statistics, over 100 countries and … Read more

Course Notes: Theory and Basics of Homomorphic Encryption

Course Notes: Theory and Basics of Homomorphic Encryption

Abstract:This article is the course notes from Professor Yu Yu’s summer class on homomorphic encryption. Professor Yu is a professor in the Department of Computer Science and Engineering at Shanghai Jiao Tong University, mainly engaged in research related to cryptography. The course first introduces some basic concepts of cryptography, and then discusses some fundamental theories … Read more

Cryptography: Understanding the Mysteries of Codes

Cryptography: Understanding the Mysteries of Codes

Of course, this behavior is very unethical, hiding behind a screen and trampling on education and law at will. However, the relevant departments have also taken timely measures to prevent such incidents from occurring frequently. Back to the point, if an intruder directly cracks passwords through technical means to disrupt classes, does this “password” have … Read more