Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program
OS program list
Sort by :
« 1 2 ... .46 .47 .48 .49 .50 15851.52 .53 .54 .55 .56 ... 16281 »
Downloaded:0
The intention is to show you how to incorpor ate the AWGN/Rayleigh fading models in the basi c decoding program.
Update : 2008-10-13 Size : 5.69kb Publisher : 里海

Downloaded:0
The decoding algorithm used in RBDS.c is ba sed on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g (x) ope rations.
Update : 2008-10-13 Size : 2.56kb Publisher : 里海

Downloaded:0
The same two-stage decoder as above. Howev er, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only t he phase of the received symbol is employed in th e metric computati
Update : 2008-10-13 Size : 5.72kb Publisher : 里海

Downloaded:0
The Reed-Somolon code is specified by the f inite field, the length (length
Update : 2008-10-13 Size : 5.9kb Publisher : 里海

Downloaded:0
Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision decod ing performed by the Green machine
Update : 2008-10-13 Size : 2.25kb Publisher : 里海

Downloaded:0
Encoding and decoding of the binary extend ed (24,12,8) Golay code : An arithmetic decoding algorithm. It is a very c lose relative of the error-trapping decoding a lgorithms developed by Kasami in the 1960s.
Update : 2008-10-13 Size : 2.06kb Publisher : 里海

Downloaded:0
The Viterbi algorithm is the same as the bin Indigenous case with one main difference : The survivor sequences include the uncoded bit s, which are decided at each trellis stage when sel ecting one of two parallel branch
Update : 2008-10-13 Size : 5.25kb Publisher : 里海

Downloaded:0
because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English interface names, such as "the" Encrypt "button click event code", But the book was finish
Update : 2008-10-13 Size : 28kb Publisher : yxs3658

Downloaded:0
network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
Update : 2008-10-13 Size : 155.81kb Publisher : yxs3658

Downloaded:0
wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the standard.
Update : 2008-10-13 Size : 4.55kb Publisher : raosiyong

Downloaded:0
Linux kernel programming, the network can be intercepted data packets text IPV6
Update : 2008-10-13 Size : 1.06kb Publisher : sunxpa

Downloaded:0
closed computer program source code, called the Windows system through API functions to shut down the computer.
Update : 2008-10-13 Size : 36.73kb Publisher : 赵利存
« 1 2 ... .46 .47 .48 .49 .50 15851.52 .53 .54 .55 .56 ... 16281 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.