-
OFDM1
这个matlab程序主要介绍的而是OFDM调制过程,主要设置了符号数,载波数,循环前缀大小,对信号进行了IFFT变换,串并转换等。(The matlab program introduces the OFDM modulation process but the main set of symbols, the number of carriers, cyclic prefix size, the signal of the IFFT transform, string and conversion)
- 2014-05-07 09:04:07下载
- 积分:1
-
chuojuwajujishusuanfamatlab
数据挖掘部分算法的matlab实现 C4_5
大家可以共同研究研究(Data mining algorithm matlab part we will be able to realize C4_5 Research)
- 2008-03-01 13:39:37下载
- 积分:1
-
arithmetic
这是xilinx的FPGA实现各种算数运算的全部基于MATLAB的模型文件,包括加减乘除等(This is the xilinx arithmetic FPGA to achieve the full range of MATLAB-based model of documents, including multiplication and division, such as addition and subtraction)
- 2009-06-24 13:40:21下载
- 积分:1
-
Arithmetic_Coding_and_Decoding
encoding and decoding based on arithmatic operators may be used for compression
- 2011-11-17 12:15:02下载
- 积分:1
-
CameraFingerprint_1.0
My demonstration program is coded by MATLAB. For the program, some optimization at coding level and algorithm level are proposed to improve the performance of my fingerprint recognition system. These performance enhancements are shown by experiments conducted upon a variety of fingerprint images. Also, the experiments illustrate the key issues of fingerprint recognition that are consistent with what the available literatures say.
- 2013-08-15 13:51:07下载
- 积分:1
-
Vfocus_MVDR1
MVDR聚焦波束形成,进场条件下利波束形成用MVDR算法实现聚焦,得到空间普(MVDR beam_forming)
- 2010-06-08 16:48:51下载
- 积分:1
-
4
说明: matlab电机仿真精华50例\异步电机dq0仿真模型(matlab simulation of the essence of 50 cases of electric induction motor simulation model dq0)
- 2008-07-24 12:12:13下载
- 积分:1
-
Digital-Signal-Processing-[Schaum_s]
digital signal processing
- 2013-04-08 16:33:49下载
- 积分:1
-
coe_spwm6
实现spwm的fft频谱分析,数据计算的范例程式。(Achieve spwm FFT spectrum analysis, data sample program.)
- 2013-04-14 17:32:55下载
- 积分:1
-
RS
说明: RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.A user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message
- 2015-02-27 14:59:22下载
- 积分:1