calculation of the autocorrelation peak sidelobe levels and corsscorrelation. CE sequence, frank autocorrelation, P4 sequence,
資源簡介:calculation of the autocorrelation peak sidelobe levels and corsscorrelation. CE sequence, frank autocorrelation, P4 sequence,
上傳時間: 2013-12-21
上傳用戶:czl10052678
資源簡介:fast calculation of image moments based on Fluss and Tuk s method described in "On the calculation of Moments"
上傳時間: 2013-12-24
上傳用戶:515414293
資源簡介:For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine if two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. h...
上傳時間: 2015-05-05
上傳用戶:1159797854
資源簡介:The subject which is to us propos¨¦ is as follows: calculation of the degr¨¦ d¡ ¯ inconsistance d¡ ¯ un logical program possibilist in C++. We thus work on a logical program possibilist, it be-¨¤-statement ...
上傳時間: 2013-12-18
上傳用戶:yulg
資源簡介:Excel spreadsheet allowing calculation of the best R-C-C component values on the PLL Loop Back Filter.
上傳時間: 2014-01-14
上傳用戶:冇尾飛鉈
資源簡介:vs.net技術內幕 The release of the Microsoft Visual Studio .NET (and Visual C++ .NET in particular) has underscored Microsoft’s increasing focus on Internet technologies, which are at the heart of the Microsoft .NET architecture. In additi...
上傳時間: 2015-12-26
上傳用戶:qweqweqwe
資源簡介:Excel spreadsheet allowing calculation of the best R-C-C component values on the PLL Loop Back Filter
上傳時間: 2014-10-14
上傳用戶:saharawalker
資源簡介:Excel spreadsheet allowing calculation of the best R-C-C component values on the PLL Loop Back Filter.
上傳時間: 2016-05-29
上傳用戶:plsee
資源簡介:Accurate estimates of the autocorrelation or power spectrum can be obtained with a parametric model (AR, MA or ARMA). With automatic inference, not only the model parameters but also the model structure are determined from the data. It is a...
上傳時間: 2013-12-29
上傳用戶:3到15
資源簡介:Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for ...
上傳時間: 2016-09-01
上傳用戶:皇族傳媒
資源簡介:The release of the Microsoft Visual Studio .NET (and Visual C++ .NET in particular) has underscored Microsoft’s increasing focus on Internet technologies, which are at the heart of the Microsoft .NET architecture. In addition to supporting...
上傳時間: 2014-11-23
上傳用戶:dbs012280
資源簡介:C Programming Language through the calculation of the calculator computing involution
上傳時間: 2016-11-07
上傳用戶:woshini123456
資源簡介:model OF the OFDM communication in simulink. And I was successful in completing it using a Bernoulli binary generator as the input source (Basic_OFDM.mdl).
上傳時間: 2014-01-10
上傳用戶:13188549192
資源簡介:Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designat...
上傳時間: 2017-01-23
上傳用戶:woshiayin
資源簡介:Resolution of the Cronig-Penney s predator and victim problem wrote in Matlab v6.5.
上傳時間: 2014-01-05
上傳用戶:陽光少年2016
資源簡介:These Release Notes describe the functionality of the AudioCodes’ TrunkPack Series Boards and Digital Media Gateways supported by Software Release 4.8. Information contained in this document is believed to be accurate and reliable at the...
上傳時間: 2017-08-08
上傳用戶:wuyuying
資源簡介:This text surrounds the development of the electric power SCADA system exactly, aiming at the present condition of the our country electric power charged barbed wire net currently, according to the oneself at the e- lectric power protect th...
上傳時間: 2014-10-28
上傳用戶:liuchee
資源簡介:This research project evaluates startup times of the linux boot process from power-on until user login. Time consuming parts of the boot process are investigated and methods how to speed up the whole process are discussed.
上傳時間: 2013-12-18
上傳用戶:sqq
資源簡介:This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems tha...
上傳時間: 2014-12-07
上傳用戶:www240697738
資源簡介:The MIPS32® 4KEm™ core from MIPS® Technologies is a member of the MIPS32 4KE™ processor core family. It is a high-performance, low-power, 32-bit MIPS RISC core designed for custom system-on-silicon applications. The core ...
上傳時間: 2014-12-22
上傳用戶:semi1981
資源簡介:Abstract—The contourlet transform is a new two-dimensional extension of the wavelet transform using multiscale and direc- tional fi lter banks. The contourlet expansion is composed of basis images oriented at various directions in ...
上傳時間: 2014-01-18
上傳用戶:水中浮云
資源簡介:The objective of this projectis to design, model and simulate an autocorrelation generator circuit using 4-bit LFSR. the register and LFSR will used D flip-flop and some gates. By the autocorrelation concept, there should be 2 same length...
上傳時間: 2015-08-17
上傳用戶:ikemada
資源簡介:using Maple and Matlab to resolve the problems ofs cientific calculation in the way of examples
上傳時間: 2013-11-29
上傳用戶:yyq123456789
資源簡介:A Web Tutorial on Discrete Features of Bayes Decision Theory This applet allows for the calculation of the decision boundary given a three dimensional feature vector. Specifically, by stipulating the variables such as the priors, and the c...
上傳時間: 2013-12-22
上傳用戶:hxy200501
資源簡介:This section describes the development and extension of a basic power flow program in Matlab. To the extent feasible, complex vector operations are used, even for the calculation of the Jacobian matrix .
上傳時間: 2017-07-01
上傳用戶:caiiicc
資源簡介:Algorithm that find the peaks of a signal. You can choose the number of peaks you want to find and the valour of peak to begin to find.
上傳時間: 2013-12-24
上傳用戶:cc1915
資源簡介:This brief introduce a kind of the framework construction to materialize the system. And an example was given with the discussion on the performence.
上傳時間: 2013-08-17
上傳用戶:ysystc699
資源簡介:OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port.
上傳時間: 2014-01-13
上傳用戶:hzy5825468
資源簡介:example of communication between the Cerebellum 16f877 pic board and the CMUcam
上傳時間: 2014-07-29
上傳用戶:gtf1207
資源簡介:read the network addresses from a named Directory Services object and display all parts of the address.
上傳時間: 2013-12-13
上傳用戶:nanxia