登录
首页 » matlab » LTE_System_Level_1.1_r295

LTE_System_Level_1.1_r295

于 2010-07-27 发布 文件大小:60129KB
0 221
下载积分: 1 下载次数: 533

代码说明:

  LTE 链路级仿真代码,其中还包含经典的跨层调度算法,非常实用。(LTE link level simulation code, which also includes classical cross-layer scheduling algorithm is very practical.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ofdm-program()
    仿真参数:800个载波,1024点IFFT,载波间频1,无多径和有延迟个码片仿真。调制方式是BPSK和QPSK(simulation parameters : 800 Carrier, the 1024-point IFFT, a carrier frequency between, No multi-path and the delay-chip simulation. BPSK modulation is QPSK)
    2007-05-09 09:44:50下载
    积分:1
  • AM_0
    数字加网有调幅和调频两大类,而这是一个0度调幅加网。(The digital screening two major categories of AM and FM, which is a 0 AM screening.)
    2013-03-25 09:22:34下载
    积分:1
  • ABC_Free_Space
    FDTD一维吸收边界条件MATLAB代码(One-dimensional FDTD absorbing boundary conditions MATLAB code)
    2009-10-16 09:45:44下载
    积分:1
  • matlab
    说明:  最完整MATLAB工具箱,包含各种工具箱的下载地址(The most complete MATLAB toolbox, the toolbox contains a variety of download Address)
    2008-11-26 15:08:56下载
    积分:1
  • MatLab
    很好的Matlab入门教程,非常适合初学者!(Matlab Tutorial good, very suitable for beginners!)
    2010-05-23 08:51:17下载
    积分:1
  • fvm1
    FVM算法解RTE方程,在热辐射传输领域有重要应用。(Solution of RTE equation with FVM method, which is of great helpful in thermal radiation transition field.)
    2021-04-13 03:28:56下载
    积分:1
  • simplex2p
    Solving the LP problem using Simplex method
    2010-06-26 19:00:45下载
    积分:1
  • Iteration_Image_Jacobian_robot_kalman
    Kalman Example for robotics Visual Servoing(Kalman Example for robotics Visual Servoi Vi)
    2006-09-08 01:51:23下载
    积分:1
  • BlowfishEncryption
    Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors. Blowfish is a variable-length key block cipher. It is suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than most encryption algorithms when implemented on 32-bit microprocessors with large data caches.
    2011-06-09 18:03:09下载
    积分:1
  • foldingLH
    Folding coefficient technique for DWT
    2011-08-06 16:25:07下载
    积分:1
  • 696516资源总数
  • 106913会员总数
  • 8今日下载