亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

FIRST-ever

  • We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude mo

    We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude modulation, phase-shift keying, and pulse amplitude modulation communications systems.We study the performance of a standard CFO estimate, which consists of first raising the received signal to the Mth power, where M is an integer depending on the type and size of the symbol constellation, and then applying the nonlinear least squares (NLLS) estimation approach. At low signal-to noise ratio (SNR), the NLLS method fails to provide an accurate CFO estimate because of the presence of outliers. In this letter, we derive an approximate closed-form expression for the outlier probability. This enables us to predict the mean-square error (MSE) on CFO estimation for all SNR values. For a given SNR, the new results also give insight into the minimum number of samples required in the CFO estimation procedure, in order to ensure that the MSE on estimation is not significantly affected by the outliers.

    標簽: frequency-offset estimation quadrature amplitude

    上傳時間: 2014-01-22

    上傳用戶:牛布牛

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • This forced me to write about more interesting and comprehensive sorting methods, the result of whic

    This forced me to write about more interesting and comprehensive sorting methods, the result of which is this one. Through this writing I have tried to give in-depth coverage of the entire sort algorithm I hope Peter wouldn t mind reading it. This article assumes that you really don t know about the iterations, looping, and so forth hence, it explains these in detail first.

    標簽: comprehensive interesting methods sorting

    上傳時間: 2016-01-10

    上傳用戶:athjac

  • ICA介紹課件。There has been a wide discussion about the application of Independence Component Analysis (I

    ICA介紹課件。There has been a wide discussion about the application of Independence Component Analysis (ICA) in Signal Processing, Neural Computation and Finance, first introduced as a novel tool to separate blind sources in a mixed signal. The Basic idea of ICA is to reconstruct from observation sequences the hypothesized independent original sequences

    標簽: Independence application discussion Component

    上傳時間: 2016-01-12

    上傳用戶:AbuGe

  • This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose

    This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose of this software is to test the different memory segments in the Ez-Usb chip. This example will output the string "good" on the 7 segment LED if the mem test passes, or it will output the first address where the memtest fails.

    標簽: directory the contains firmware

    上傳時間: 2013-12-16

    上傳用戶:gdgzhym

  • To date tests are still the best solution mankind has found to deliver working software. This book

    To date tests are still the best solution mankind has found to deliver working software. This book is the sum of four years of research and practice in the testing field. The practice comes from my IT consulting background, first at Octo Technology and then at Pivolis the research comes from my involvement with open source development at night and on weekends.

    標簽: solution software mankind deliver

    上傳時間: 2014-01-11

    上傳用戶:sclyutian

  • This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest i

    This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles will be to build up little by little the knowledge needed to write device drivers. In this article, we will be building on the same example source code used in part one. In this article, we will expand on that code to include Read functionality, Handle Input/Ouput Controls also known as IOCTLs, and learn a bit more about IRPs.

    標簽: the interest tutorial Drivers

    上傳時間: 2016-01-28

    上傳用戶:lmeeworm

  • How the K-mean Cluster work Step 1. Begin with a decision the value of k = number of clusters S

    How the K-mean Cluster work Step 1. Begin with a decision the value of k = number of clusters Step 2. Put any initial partition that classifies the data into k clusters. You may assign the training samples randomly, or systematically as the following: Take the first k training sample as single-element clusters Assign each of the remaining (N-k) training sample to the cluster with the nearest centroid. After each assignment, recomputed the centroid of the gaining cluster. Step 3 . Take each sample in sequence and compute its distance from the centroid of each of the clusters. If a sample is not currently in the cluster with the closest centroid, switch this sample to that cluster and update the centroid of the cluster gaining the new sample and the cluster losing the sample. Step 4 . Repeat step 3 until convergence is achieved, that is until a pass through the training sample causes no new assignments.

    標簽: the decision clusters Cluster

    上傳時間: 2013-12-21

    上傳用戶:gxmm

  • This handbook is a concise guide to architecting, designing, and building J2EE applications. Whether

    This handbook is a concise guide to architecting, designing, and building J2EE applications. Whether you re architect your first J2EE application or looking to keep your projects on-time and on-budget, you will refer to this handbook again and again.

    標簽: architecting applications designing handbook

    上傳時間: 2016-02-10

    上傳用戶:zhoujunzhen

  • 此范例可在window的DOS上執行.有9各TASK分別秀出時間.執行方式解壓鎖COPY到C碟然后BC45SOURCE下修改TEST.C在BC45TEST下執行MAKETEST.BAT就可編繹出執行檔

    此范例可在window的DOS上執行.有9各TASK分別秀出時間.執行方式解壓鎖COPY到C碟然后BC45\SOURCE下修改TEST.C在BC45\TEST下執行MAKETEST.BAT就可編繹出執行檔 to show the starting time and completion time of each task in the first round.

    標簽: TEST MAKETEST window SOURCE

    上傳時間: 2016-02-14

    上傳用戶:zhouchang199

主站蜘蛛池模板: 泰兴市| 东兰县| 北票市| 古丈县| 谢通门县| 清苑县| 崇左市| 佛教| 兴安盟| 福安市| 灵寿县| 平顺县| 饶阳县| 自贡市| 巴林左旗| 崇礼县| 舞阳县| 鄄城县| 封开县| 宁德市| 宜城市| 曲靖市| 龙口市| 永丰县| 馆陶县| 江永县| 银川市| 稷山县| 玉环县| 崇礼县| 台湾省| 绥宁县| 沈丘县| 宕昌县| 娄底市| 镇远县| 博兴县| 仁化县| 富宁县| 屏东市| 长葛市|