A series of .c and .m files which allow one to perform univariate and bivariate wavelet analysis of discrete time series. Noother wavelet package is necessary -- everything is contained in this archive. The C-code computes the DWT and maximal overlap DWT. MATLAB routines are then used to compute such quantities as the wavelet variance, covariance, correlation, cross-covariance and cross-correlation. Approximate confidence intervals are available for all quantities except the cross-covariance and cross-correlation.
A set of commands is provided. For a description of this example, please see http://www.eurandom.tue.nl/whitcher/software/.
Person-to-person realtime IP communications, like presence, VoIP and video applications, offer
clear benefits for the enterprise as time- and money-savers. Unified functionality is now available,
where all of the above are integrated into one streamlined application and interconnect with other
networks. This creates a very important business tool and usage is increasing.
dvbsnoop is a DVB/MPEG stream analyzer program.
The program can be used to sniff, monitor, debug, dump
or view DVB/MPEG/DSM-CC/MHP stream information (digital
television or data broadcasts) sent via satellite, cable
or terrestrial.
This program is using Genetic Algorithm to solve the Travlling
Salesman Problem. It gives the best path route within a specified
time.
usage: java Evolver <seconds> <city file> <config file>
Author: Liu Yang
The J2000 codec was written in an effort to produce the cleanest and simplest implementation possible of the JPEG-2000 standard. We have put a particular emphasis on good architecture design and code simplicity, while at the same time providing an implementation as complete and efficient as possible. The source code for the codec is freely available for anyone to study or even for use in commercial programs. We hope that our open development process and our focus on clean, straightforward code will help make the J2000 codec become a reference implementation of the JPEG-2000 standard
DIGITAL IMAGERY is pervasive in our world today. Consequently,
standards for the efficient representation and
interchange of digital images are essential. To date, some of
the most successful still image compression standards have resulted
from the ongoing work of the Joint Photographic Experts
Group (JPEG). This group operates under the auspices of Joint
Technical Committee 1, Subcommittee 29, Working Group 1
(JTC 1/SC 29/WG 1), a collaborative effort between the International
Organization for Standardization (ISO) and International
Telecommunication Union Standardization Sector (ITUT).
Both the JPEG [1–3] and JPEG-LS [4–6] standards were
born from the work of the JPEG committee. For the last few
years, the JPEG committee has been working towards the establishment
of a new standard known as JPEG 2000 (i.e., ISO/IEC
15444). The fruits of these labors are now coming to bear, as
JPEG-2000 Part 1 (i.e., ISO/IEC 15444-1 [7]) has recently been
approved as a new international standard.
Welcome to PMOS. PMOS is a set of modules, mostly written in Modula-2,
to support multitasking. PMOS was designed primarily with real-time
applications in mind. It is not an operating system in the conventional
sense rather, it is a collection of modules which you can import
into your own programs, and which in particular allow you to write
multi-threaded programs.
Automate Oracle—and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs...concise, straightforward, and incredibly easy to use. Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery,
Example of a digital data transmission implementing GMSK modulation
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel
加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-EDE in CBC mode:
cryptest t
- To encrypt or decrypt a file
cryptest e|d input output
- To share a file into shadows:
cryptest s <pieces> <pieces-needed> file
(make sure file has no extension, if you re running this under DOS)
- To reconstruct a file from shadows:
cryptest j output file1 file2 [....]
- To gzip a file:
cryptest z <compression-level> input output
- To gunzip a file:
cryptest u input output
- To run validation tests:
cryptest v
- To run benchmarks:
cryptest b [time for each benchmark in seconds]