-
BLIND_EUQALIZATION
THIS IS A BLIND QUALIZATION ALGORITHM.
2BPSK MODULATION
3 MUTIPATH
- 2009-03-28 07:39:50下载
- 积分:1
-
Speech-Processing-using-MATLAB
speech signal processing toolbox
- 2012-05-15 01:33:59下载
- 积分:1
-
single
单级矩阵变换器的仿真模型,经过试验是可以进行成功的仿真的(simulation modelssssssssssssssssssssssssssssssssssssssssssssssssssss)
- 2013-05-09 15:50:34下载
- 积分:1
-
Compressive-Spectrum-Sensing
认知网中协作感知程序 仿真程序 matlab(Collaborative Research Compressive Spectrum Sensing in Cognitive Radio Networks)
- 2014-01-15 10:25:55下载
- 积分:1
-
TEEN
wsn的TEEN算法,自己加入了相应的注释,相信大家会看的很轻松(wsn the leach method, its accession to the corresponding note, I believe we will see very easily)
- 2010-08-04 09:50:55下载
- 积分:1
-
GUITechnicalAnalysisTool
A GUI financial technical analysis toolbox. (A GUI financial technical analysis toolbox.)
- 2008-01-15 06:25:38下载
- 积分:1
-
rcs_frustum
雷达截面积————————平截体后向散射RCS(Truncated body backscatter RCS
)
- 2011-05-10 17:48:49下载
- 积分:1
-
libsvm-3.18
matlab的libsvm工具箱,内附详细教程。只要复制到toolbox工具箱下,就可以使用。(The libsvm matlab toolbox, containing detailed tutorial. Just copy the toolbox toolbox under, it can be used.)
- 2014-11-06 11:01:37下载
- 积分:1
-
92912322resonator
One dimensional interpolation Fourier transform to realize data sampling
- 2015-01-27 21:03:38下载
- 积分:1
-
paper2
digital watermarking is a process by which a user-specified
signal is hidden or embedded into another signal , for
example digital content such as electronic documents, images,
sounds and video [2]. The use of digital video applications
such as video-conferencing, digital television, digital cinema,
distance learning, videophone, and video-on-demand has
grown very rapidly over the last few years. Today it is much
easier for the digital data owners to transfer multimedia data
over the internet, and hence the data could be perfectly
duplicated and rapidly redistributed on a large scale. Thus, the
importance of copyright protection for multimedia data has
become more critical. Digital watermarking is an effective way
to protect the copyright of multimedia data even after its
transmission there is urgent demand for techniques to protect
the original digital data and to prevent unauthorized
duplication or tampering.
- 2013-05-01 17:48:29下载
- 积分:1