-
5
说明: matlab高效编程程序源代码第五章,可以运行。(efficient programming source code matlab chapter, you can run.)
- 2011-04-10 15:31:05下载
- 积分:1
-
matlabAWGNshibiesuanfa
主要用来进行MATLAB中AWGN的识别算法!(mainly used for MATLAB AWGN identification algorithm!)
- 2006-05-23 11:28:22下载
- 积分:1
-
CPML
the CPML ABC in the two-dimensional TEz FDTD grid.
- 2013-12-04 22:12:26下载
- 积分:1
-
spg_bp
利用basis pursuit算法计算图形重建,利用compressive sensing技术使用较少的数据进行图形恢复(Use basis pursuit graphic reconstruction algorithm using compressive sensing technology uses less data graphically recovery)
- 2014-02-24 05:28:23下载
- 积分:1
-
lm4
高斯线性调频信号的WVD;多普勒信号的WVD;计算WVD时,加窗和不加窗的影响 (Gauss linear frequency modulation signal WVD Doppler signal WVD calculate WVD adding windows and not the effects of window)
- 2007-12-12 09:52:42下载
- 积分:1
-
xiaobofenximaoyaobing
说明: 小波信号处理及其应用-茅耀斌,非常好的一本书,书中多分辨率分析写得很好(xiao bo fen xi ,mao yao bing,yi ben guan yu xiao bo ,bu cuo de shu ji. fei chang zhi de kan
)
- 2010-05-03 15:18:44下载
- 积分:1
-
subcarrierAlloc_1
多用户OFDM基本子载波分配MATLAB仿真程序(Multi-user OFDM subcarrier allocation)
- 2012-04-29 23:58:28下载
- 积分:1
-
chemical-elements
描述了化学元素对钢的性能的影响,值得一看,这是别人的资料(Description of the chemical elements in the performance of steel)
- 2012-10-15 13:46:07下载
- 积分:1
-
SDPAD-release
The time-independent behaviour of this approach is necessary to assure the
correct tracking
- 2020-08-23 15:08:17下载
- 积分:1
-
poly
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution ciphers are useful because the are less easily broken by frequency analysis, however if an attacker knows for instance that the message has a period n, then he simply can individually frequency analyze each cipher alphabet.
The number of letters encrypted before a polyalphabetic substitution cipher returns to its first cipher alphabet is called its period. The larger the period, the stronger the cipher. Of course, this method of encryption is certainly not secure by any definition and should not be applied to any real-life scenarios.
- 2015-02-27 14:52:28下载
- 积分:1