-
mfsk_table
This MATLAB Code plot the BER Vs Eb/No for M_ary FSK for differnt values of M. The user can choose the desired BER and the code will tell what is the required Eb/No to achieve this BER for differnt values of M. In addition, a plot of the shannon limit is available.
- 2011-05-26 16:11:05下载
- 积分:1
-
scaleif
matlab函数scaleif,用于改变度量,详见英文描述( function sim = scaleif(im, newMin, newMax, oldMin, oldMax)
Scales an image such that its lowest value attains newMin and
it highest value attains newMax. OldMin and oldMax are not
necessary but are useful when you don t want to use the true
min or max value.)
- 2020-12-15 17:19:15下载
- 积分:1
-
xsldemo_solvers
This model simulates a Foucault pendulum (a stiff system).
The model calculates the normalized pendulum energy
- 2013-07-31 21:05:36下载
- 积分:1
-
BPSKinAWGN
用matlab实现AWGN信道下BPSK调制方式(Matlab 实现 AWGN channel with BPSK modulation under)
- 2010-05-20 11:04:18下载
- 积分:1
-
NR_PowerFlow
Newton-Raphson Power Flow Algorithm
- 2013-10-06 08:54:27下载
- 积分:1
-
Li2_1
KF在应用实例,这是一个比较实用的例子,对于初学在跟踪上的应用比较有效(kalman Filter)
- 2014-12-05 21:14:17下载
- 积分:1
-
frac-wth-single
FRACTIONAL FOURIER TRANSFORM USING ALTERNATE PIXELS
- 2013-05-06 18:08:41下载
- 积分:1
-
OPTICS for EO
Among other applications, CRC-based techniques are used to verify data transmission or storage integrity. In the scope of the EN/IEC 60335-1 standard, they offer a means of verifying the Flash memory integrity. The CRC calculation unit helps compute a signature of the software during runtime, to be compared with a reference signature generated at linktime and stored at a given memory location.
- 2017-12-27 22:47:13下载
- 积分:1
-
SVR
A matlab implementation on SVR
- 2010-10-10 05:55:19下载
- 积分:1
-
leach_for_wireless_network
无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement
energy saving and flexible management.To improve security and lifetime of clustering network,a secure
clustering was pro—
posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical
network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni—
cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be
prolonged.)
- 2010-05-14 15:52:16下载
- 积分:1