There are two files in the zip folder. bpsk_spread.m and jakesmodel.m
Steps for simulation:
1] Run jakesmodel.m first
2] Then run bpsk_spread.m .
3] Note that during the first run bpsk_spread.m has no rayleigh fading.This is because the corresponding code has been commented
4] The resulting performance is stored in BER_awgn.
5] Now uncomment the Rayleigh Fading code in bpsk_spread.m file.
6] Same time comment BER_awgn (line 112) and uncomment BER_ray variable.
7] Run the simulation.
To compare the perfromances of the receiver using DSSS plot the BER_awgn and BER_ray
// This Communications Component is implemented using separate Read and Write
// threads. Messages from the threads are posted to the Comm control which is
// an invisible window. To handle data from the comm port, simply
// attach a handler to OnReceiveData . There is no need to free the memory
// buffer passed to this handler. If TAPI is used to open the comm port, some
// changes to this component are needed ( StartComm currently opens the comm
// port). The OnRequestHangup event is included to assist this.
//
// David Wann
// Stamina Software
// 28/02/96
// davidwann@hunterlink.net.au
% EM algorithm for k multidimensional Gaussian mixture estimation
%
% Inputs:
% X(n,d) - input data, n=number of observations, d=dimension of variable
% k - maximum number of Gaussian components allowed
% ltol - percentage of the log likelihood difference between 2 iterations ([] for none)
% maxiter - maximum number of iteration allowed ([] for none)
% pflag - 1 for plotting GM for 1D or 2D cases only, 0 otherwise ([] for none)
% Init - structure of initial W, M, V: Init.W, Init.M, Init.V ([] for none)
%
% Ouputs:
% W(1,k) - estimated weights of GM
% M(d,k) - estimated mean vectors of GM
% V(d,d,k) - estimated covariance matrices of GM
% L - log likelihood of estimates
%
linux下用C語言寫的聊天程序!/*BUG and NOTE:
Not join protect to Shared Memory Segments,example Semaphore Arrays.
Not check the parameters validity.
When transmit may be error.
If the client program no right exit,others cannot know,the service program shouldbe check the client program whether exist timing.
The program when exit(), it do not delete the Shared Memory Segments,you maybe use atexit() but the program have some processes.
When one process is exit(),others is continue.
The service program s action is few.
And so on. */
The Internet is bigger and better than what a mere browser allows. Webbots, Spiders, and Screen Scrapers is for programmers and businesspeople who want to take full advantage of the vast resources available on the Web. There s no reason to let browsers limit your online experience-especially when you can easily automate online tasks to suit your individual needs.
Addfilter is a command-line application which adds and removes filter drivers for a given drive or volume. It is intended to demonstrate how to insert a filter driver into the driver stack of a device. The sample illustrates how to do this by using the SetupDi APIs. The sample works on the x86 platform. It has only been tested in a 32-bit environment. Since Addfilter is not a driver, it does not deal with Plug and Play or Power Management.
No INF file is needed to install this application.
The CD Audio sample allows some non-SCSI2 CD ROMs to support audio operations by intercepting the relevant audio ioctls and translating them into the command block(s) expected by the non-compliant cdroms. It supports Plug and Play and Power Management, and is 64-bit compliant.
No INF file is needed to install this driver.