登录
首页 » matlab » rayleigh

rayleigh

于 2013-12-07 发布 文件大小:2KB
0 179
下载积分: 1 下载次数: 4

代码说明:

  用MATLAB语言根据成形滤波器法实现通信环境中的瑞利信道的仿真(Realization of Rayleigh channel communication environment using MATLAB simulation language based on shape filter)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • jinhui0420
    说明:  对信号进行EMD分解后画出信号的希尔伯特包络谱程序,自己编写的,调试成功(EMD decomposition of the signal after the draw of the Hilbert envelope of the signal spectrum of procedures, I have written, debugging success)
    2009-08-23 16:43:03下载
    积分:1
  • cn-jingtai
    matlab机器人障碍物静态状态下的避障的仿真(Robot obstacle avoidance of static state)
    2014-08-14 12:30:50下载
    积分:1
  • MIMO-OFDM-
    关于MIMO-OFDM通信中信道、空时编码等MATLAB程序。集合了《MIMO-OFDM无线通信技术及MATLAB实现》里面所以MATLAB程序。(On the channel, space-time coding in MIMO-OFDM communication MATLAB program. A collection of MIMO-OFDM wireless communication technology and MATLAB to achieve which so MATLAB program.)
    2015-04-21 19:50:36下载
    积分:1
  • Warning_Light
    Peak to Peak Analysis
    2010-11-02 11:03:29下载
    积分:1
  • wuyueshuzuiyoukongzhi
    无约束最优控制无约束最优控制无约束最优控制无约束最优控制(wuyueshuzuiyoukongzhi)
    2010-05-23 12:21:20下载
    积分:1
  • Other-Project
    Aerospace engineering codes for low speed aerodynamics
    2015-03-17 16:13:56下载
    积分:1
  • RUTEO_REDES
    tutorial de ruteo de redes
    2010-12-06 10:37:37下载
    积分:1
  • decode
    应用遗传算法进行配电网故障后恢复重构,采用二进制编码对重构后结果进行解码的程序(After the application of genetic algorithms reconstruct distribution network fault recovery, using binary encoding to decode the results after reconstruction program)
    2020-12-28 22:19:03下载
    积分:1
  • finger-recong
    指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。 三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
    2007-05-02 23:49:15下载
    积分:1
  • WiMAX-RF-Planning-Guide
    Guide on the planification of a wimax network.
    2013-11-29 14:07:49下载
    积分:1
  • 696518资源总数
  • 106155会员总数
  • 8今日下载