-
mpsk
用matlab编程实现多进制PSK,容易上手(modulation mpsk,using matlab)
- 2009-04-09 13:32:45下载
- 积分:1
-
first1
这是数字信号处理的作业的第一部分包括了lms算法的基本步骤(This is a digital signal processing operations, including the first part of the basic steps of the lms algorithm)
- 2009-04-28 19:14:37下载
- 积分:1
-
2
说明: To support wireless communication : MIMO
- 2013-12-24 21:50:25下载
- 积分:1
-
Ergodic_Capacity_CDF
MIMO的研究越来越成熟,而大规模MIMO在未来是研究的热点。了解一般MIMO的容量等特性,将有助于理解和掌握。(MIMO research and more mature, but large-scale study of MIMO is a hot spot in the future. For general MIMO capacity and other features, will help to understand and master.)
- 2015-03-25 10:10:08下载
- 积分:1
-
SelectPeak
对一有三个峰值信号的波形进行处理,选出三个峰值。(On the one the three peak waveform of a signal processing selected three peaks.)
- 2013-01-01 23:41:34下载
- 积分:1
-
STFT
信号的短时傅立叶变换,paper2_2_1为主程序,仿真不同窗长下短时傅立叶变换的时频聚集度。stftxz为修正的短时傅立叶变换。(Short-time Fourier transform signals, paper2_2_1 main program, the simulation under different window length short time Fourier transform of the frequency of aggregation. stftxz to correct short-time Fourier transform.)
- 2014-08-24 21:34:50下载
- 积分:1
-
2
说明: matlab 中很实用的源代码2:中值滤波器、用Sobel算子和拉普拉斯对图像锐化,梯度算子检测边缘(Practical source code of matlab)
- 2015-04-20 16:24:55下载
- 积分:1
-
J_Ward的经典文献STAP源代码
说明: 用于空时自适应处理,对J_Ward的空时自适应处理报告中的部分内容进行了仿真测试(For space-time adaptive processing, J_ward's space-time adaptive processing report is simulated and tested)
- 2020-08-15 18:39:34下载
- 积分:1
-
ch6
MATLAB科学计算与工程分析源代码源程序5(MATLAB scientific computing and engineering analysis of the source code source 5)
- 2009-03-24 11:16:57下载
- 积分:1
-
leach_for_wireless_network
无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement
energy saving and flexible management.To improve security and lifetime of clustering network,a secure
clustering was pro—
posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical
network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni—
cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be
prolonged.)
- 2010-05-14 15:52:16下载
- 积分:1