DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Sub Category
Linux-Unix
Exploit
Scanner
Crack Hack
CA auth
Linux driver
Search in result
Search
OS program list
Sort by :
«
1
2
...
.46
.47
.48
.49
.50
15851
.52
.53
.54
.55
.56
...
16281
»
bch_awgn
Downloaded:0
The intention is to show you how to incorpor ate the AWGN/Rayleigh fading models in the basi c decoding program.
Update
: 2008-10-13
Size
: 5.69kb
Publisher
:
里海
RBDS
Downloaded:0
The decoding algorithm used in RBDS.c is ba sed on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g (x) ope rations.
Update
: 2008-10-13
Size
: 2.56kb
Publisher
:
里海
tc-8psk-sect
Downloaded:0
The same two-stage decoder as above. Howev er, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only t he phase of the received symbol is employed in th e metric computati
Update
: 2008-10-13
Size
: 5.72kb
Publisher
:
里海
rs_eedec_euc
Downloaded:0
The Reed-Somolon code is specified by the f inite field, the length (length
Update
: 2008-10-13
Size
: 5.9kb
Publisher
:
里海
rm13_awgn
Downloaded:0
Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision decod ing performed by the Green machine
Update
: 2008-10-13
Size
: 2.25kb
Publisher
:
里海
golay24
Downloaded:0
Encoding and decoding of the binary extend ed (24,12,8) Golay code : An arithmetic decoding algorithm. It is a very c lose relative of the error-trapping decoding a lgorithms developed by Kasami in the 1960s.
Update
: 2008-10-13
Size
: 2.06kb
Publisher
:
里海
tcm_8psk
Downloaded:0
The Viterbi algorithm is the same as the bin Indigenous case with one main difference : The survivor sequences include the uncoded bit s, which are decided at each trellis stage when sel ecting one of two parallel branch
Update
: 2008-10-13
Size
: 5.25kb
Publisher
:
里海
Example05
Downloaded:0
because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English interface names, such as "the" Encrypt "button click event code", But the book was finish
Update
: 2008-10-13
Size
: 28kb
Publisher
:
yxs3658
Example18
Downloaded:0
network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
Update
: 2008-10-13
Size
: 155.81kb
Publisher
:
yxs3658
WEPCrack-0.0.10.tar
Downloaded:0
wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the standard.
Update
: 2008-10-13
Size
: 4.55kb
Publisher
:
raosiyong
test_ipv6
Downloaded:0
Linux kernel programming, the network can be intercepted data packets text IPV6
Update
: 2008-10-13
Size
: 1.06kb
Publisher
:
sunxpa
OffComputer
Downloaded:0
closed computer program source code, called the Windows system through API functions to shut down the computer.
Update
: 2008-10-13
Size
: 36.73kb
Publisher
:
赵利存
«
1
2
...
.46
.47
.48
.49
.50
15851
.52
.53
.54
.55
.56
...
16281
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.