Example of a digital data transmission implementing GMSK modulation
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel
Simulator for a GSM traffic channel transmission and reception
This Simulink model simulates the entire transmission and reception of voice data of a traffic channel for GSM (TCH/FS)over a multipath fading channel, and it calculates the BER of the received signal
關于NETFLOW信息分析的軟件。 is a netflow analyzer. It uses MySQL database to store accounting information. Filters, used in the JFlowAnalyzer, allows very flexible classificate any kind of traffic and store it in the differend fields in database
介紹一個基于U S B 2 . 0 接口和D S P 的高速數(shù)據(jù)采集處理系統(tǒng)的工作原理設計及實現(xiàn)該高速數(shù)據(jù)
采集處理系統(tǒng)采用TI 公司的TMS320C6000 數(shù)字信號處理器和Cypress 公司的USB2.0 接口芯片可
以實現(xiàn)高速采集和實時處理有著廣泛的應用前景
加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-EDE in CBC mode:
cryptest t
- To encrypt or decrypt a file
cryptest e|d input output
- To share a file into shadows:
cryptest s <pieces> <pieces-needed> file
(make sure file has no extension, if you re running this under DOS)
- To reconstruct a file from shadows:
cryptest j output file1 file2 [....]
- To gzip a file:
cryptest z <compression-level> input output
- To gunzip a file:
cryptest u input output
- To run validation tests:
cryptest v
- To run benchmarks:
cryptest b [time for each benchmark in seconds]