gmsk modulation of numerical data generated by a random source, the output of the modulator give two signals, the first is gmsk signal and the other is gaussien frequency pulse shape
資源簡(jiǎn)介:gmsk modulation of numerical data generated by a random source, the output of the modulator give two signals, the first is gmsk signal and the other is gaussien frequency pulse shape
上傳時(shí)間: 2014-01-19
上傳用戶:dongbaobao
資源簡(jiǎn)介:Process a binary data stream using a communication system that consists of a baseband modulator, channel, and demodulator. Compute the system s bit error rate (BER). Also, display the transmitted and received signals in a scatter plot...
上傳時(shí)間: 2017-01-08
上傳用戶:ardager
資源簡(jiǎn)介:Non maxima suppression and thresholding for points generated by a feature or corner detector.
上傳時(shí)間: 2013-12-06
上傳用戶:as275944189
資源簡(jiǎn)介:As all of you know, MATLAB is a powerful engineering language. Because of some limitation, some tasks take very long time to proceed. Also MATLAB is an interpreter not a compiler. For this reason, executing a MATLAB program (m file) is time...
上傳時(shí)間: 2013-12-06
上傳用戶:huql11633
資源簡(jiǎn)介:Quality control of production has always been a necessity in stainless steel mills. The users of stainless steel set ever-increasing requirements on product quality. Many material properties can still only be measured in laboratory but ...
上傳時(shí)間: 2014-11-18
上傳用戶:baiom
資源簡(jiǎn)介:This code takes data received from a bearing and converts it from the time domain to the frequency domain in order to determine bearing defect size.
上傳時(shí)間: 2017-03-11
上傳用戶:sunjet
資源簡(jiǎn)介:4. If a modified source code is distributed, the original unmodified -- source code must also be included (or a link to the Free IP web -- site). In the modified source code there must be clear -- identification of the modified version.
上傳時(shí)間: 2013-12-14
上傳用戶:qq1604324866
資源簡(jiǎn)介:A VHDL source code for testing the digits and the switches on a spartan 3 basys board
上傳時(shí)間: 2013-12-29
上傳用戶:問題問題
資源簡(jiǎn)介:Fir verilog code implemented to find out the output of fir filter
上傳時(shí)間: 2017-08-06
上傳用戶:zhliu007
資源簡(jiǎn)介:An object-oriented C++ implementation of Davidson method for finding a few selected extreme eigenpairs of a large, sparse, real, symmetric matrix
上傳時(shí)間: 2014-01-09
上傳用戶:TRIFCT
資源簡(jiǎn)介:Example of a digital data transmission implementing GMSK modulation This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part ...
上傳時(shí)間: 2015-07-12
上傳用戶:jiahao131
資源簡(jiǎn)介:Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An a...
上傳時(shí)間: 2017-07-29
上傳用戶:
資源簡(jiǎn)介:a function for fitting a set of data by a curve with degree n
上傳時(shí)間: 2017-09-21
上傳用戶:lacsx
資源簡(jiǎn)介:A new interface, extending the TreeModel interface, which describes the kind of data that can be drawn by a TreeTable.
上傳時(shí)間: 2015-05-04
上傳用戶:fredguo
資源簡(jiǎn)介:十部經(jīng)典算法合集 .chm Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni PREFACE CHAPTER 1: INTRODUCTION CHAPTER 2: ARRAYS CHAPTER 3: STACKS AND QUEUES CHAPTER 4: LINKED LISTS CHAPTER 5: TREES CHAPTE...
上傳時(shí)間: 2015-05-19
上傳用戶:維子哥哥
資源簡(jiǎn)介:The development of a data acquisition card based on USB bus is introduced in this article.It first describes the configuration and principle of this card in the part of hardware design,and then the application program and device driver in t...
上傳時(shí)間: 2015-12-07
上傳用戶:lijianyu172
資源簡(jiǎn)介:This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied...
上傳時(shí)間: 2017-03-08
上傳用戶:xuanchangri
資源簡(jiǎn)介:This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied...
上傳時(shí)間: 2014-01-10
上傳用戶:yyq123456789
資源簡(jiǎn)介:In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets...
上傳時(shí)間: 2013-12-28
上傳用戶:來茴
資源簡(jiǎn)介:Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety...
上傳時(shí)間: 2017-06-06
上傳用戶:royzhangsz
資源簡(jiǎn)介:Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth exa...
上傳時(shí)間: 2014-01-02
上傳用戶:Late_Li
資源簡(jiǎn)介:Title : Implementation of quadrature modulation and demodulation Design Object : By implementing quadrature modulation and demodulation of analog signals in digital signal processing, students will have better understanding of sampling and...
上傳時(shí)間: 2013-12-09
上傳用戶:蠢蠢66
資源簡(jiǎn)介:A Library of Efficient Data Types and Algorithms,封裝了常用的ADT及其相關(guān)算法的軟件包
上傳時(shí)間: 2014-01-10
上傳用戶:fhzm5658
資源簡(jiǎn)介:Conservator extends on the concept of a Flyweight Factory by allowing shared Flyweight objects to be mutated after creation without undesired side effects.
上傳時(shí)間: 2014-01-06
上傳用戶:cuibaigao
資源簡(jiǎn)介:QR ALGORITHM To obtain the eigenvalues of a symmetric, tridiagonal n by n matrix
上傳時(shí)間: 2014-01-15
上傳用戶:凌云御清風(fēng)
資源簡(jiǎn)介:Addressbook using double-linked list. This example shows the use of a double-linked list by implementing an addressbook for the console. It has features like inserting, searching(linear), sorting(bubble sort), deleting and load/save to a fi...
上傳時(shí)間: 2014-01-24
上傳用戶:asddsd
資源簡(jiǎn)介:算法ebook(10部算法經(jīng)典著作的合集) 算法ebook> 10部算法經(jīng)典著作的合集 chm格式 (1)Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni (2)Data Structures, Algorithms and Program Style Using C by James F. Korsh and Leonard J. Garr...
上傳時(shí)間: 2015-04-04
上傳用戶:tfyt
資源簡(jiǎn)介:* A ncurses user interface. * Network statistics to view the amount of packets and data in many different protocols, interfaces and hosts. * View what active TCP connections are on the network. * View UDP packets. * View and log ICM...
上傳時(shí)間: 2015-04-20
上傳用戶:bjgaofei
資源簡(jiǎn)介:For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine if two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. h...
上傳時(shí)間: 2015-05-05
上傳用戶:1159797854
資源簡(jiǎn)介:Toggle P1.0 by xor ing P1.0 inside of a software loop.
上傳時(shí)間: 2015-05-27
上傳用戶:wxhwjf