簡單混合衰落信道
This mfile inputs an unmodulated sinewave through a simple Rayleigh two path fading channel and shows the output with phase, gain, and attenuation characteristics via animation.
Simple SunPlus SP54 codec converter and a more playable mode MJPG.
untar the archive
go to the relevant directory
to compile:
just do make
to install:
with root account
cp sp54convert /usr/local/bin
to use:
sp54convert infile outfile
Enjoy !!
Michel Xhaard <mxhaard@users.sourceforge.net>
Till Adam <till@hubbahubba.de>
Windows port:
Piotr Pawlow <pp@siedziba.pl>
YSS915 (KP2V2) is an LSI for processing Karaoke voice signals.
This LSI has an A/D converter (1 channel) for the microphone echo, and a memory for the microphone echo and
key control. These features allow achieving the functions needed for the Karaoke system by using only one LSI
chip. As for the microphone echoes, many other types of echoes are available in addition to ordinary ones so that
YSS915 is applicable to various uses.
In addition to these Karaoke programs, YSS915 is able to provide the Movie & Music programs, with which the
surround effect is applied to the movie and music sources for giving the users more enjoyment.
YSS915 is pin compatible with and register compatible with YSS903 (KP2V).
本附錄介紹一些新的A P I函數,有了這些函數,便可在自己的計算機上對I P協議統計情況
進行查詢和管理。它們有助于獲得下面的能力:
■ I p c o n f i g . e x e(或適用于微軟Windows 95的Wi n i p c f g . e x e):顯示I P配置信息,允許釋放
和更新D H C P分配的I P地址。
■ N e t s t a t . e x e:顯示T C P連接表、U D P監聽者表以及I P協議統計情況。
■ R o u t e . e x e:顯示并處理網絡路由表。
■ A r p . e x e:顯示并修改供“地址解析協議”(A R P)使用的I P到物理地址翻譯表。
Example of a digital data transmission implementing GMSK modulation
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel
加密算法
Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives:
- To generate an RSA key
cryptest g
- To encrypt and decrypt a string using RSA
cryptest r
- To calculate MD5, SHS, and RIPEMD-160 message digests:
cryptest m file
- To encrypt and decrypt a string using DES-EDE in CBC mode:
cryptest t
- To encrypt or decrypt a file
cryptest e|d input output
- To share a file into shadows:
cryptest s <pieces> <pieces-needed> file
(make sure file has no extension, if you re running this under DOS)
- To reconstruct a file from shadows:
cryptest j output file1 file2 [....]
- To gzip a file:
cryptest z <compression-level> input output
- To gunzip a file:
cryptest u input output
- To run validation tests:
cryptest v
- To run benchmarks:
cryptest b [time for each benchmark in seconds]
zemax源碼:
This DLL models a standard ZEMAX surface type, either plane, sphere, or conic
The surface also demonstrates a user-defined apodization filter
The filter is defined as part of the real ray trace, case 5
The filter can be used at the stop to produce x-y Gaussian apodization similar to the Gaussian pupil apodization in ZEMAX but separate in x and y.
The amplitude apodization is of the form EXP[-(Gx(x/R)^2 + Gy(y/R)^2)]
The transmission is of the form EXP[-2(Gx(x/R)^2 + Gy(y/R)^2)]
where
x^2 + y^2 = r^2
R = semi-diameter
The tranmitted intensity is maximum in the center.
T is set to 0 if semi-diameter < 1e-10 to avoid division by zero.
There is an example of how to use the LDPC encode/decode with AWGN
channel model in files .\ldpc_decode.m and .\GFq\ldpc_decode.m.
There are a few parity check matrices available in the code but
you can use other matrices provided you have enough memory to load
them. I suggest checking out matrices in Alist format available on
David MacKay s web site.You will need to have access to a MEX compiler
to be able to use a few functions written in C.
LDPC的仿真代碼