Welcome![Sign In][Sign Up]
Location:
SourceCode OS program

OS program List Page 15851

« 1 2 ... .46 .47 .48 .49 .50 15851.52 .53 .54 .55 .56 ... 16281 »

[Linux-Unixbch_awgn

Description: The intention is to show you how to incorpor ate the AWGN/Rayleigh fading models in the basi c decoding program.
Platform: | Size: 5822 | Author: 里海 | Hits:

[Linux-UnixRBDS

Description: The decoding algorithm used in RBDS.c is ba sed on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g (x) ope rations.
Platform: | Size: 2624 | Author: 里海 | Hits:

[Linux-Unixtc-8psk-sect

Description: The same two-stage decoder as above. Howev er, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only t he phase of the received symbol is employed in th e metric computati
Platform: | Size: 5856 | Author: 里海 | Hits:

[Linux-Unixrs_eedec_euc

Description: The Reed-Somolon code is specified by the f inite field, the length (length
Platform: | Size: 6037 | Author: 里海 | Hits:

[Linux-Unixrm13_awgn

Description: Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision decod ing performed by the Green machine
Platform: | Size: 2299 | Author: 里海 | Hits:

[Linux-Unixgolay24

Description: Encoding and decoding of the binary extend ed (24,12,8) Golay code : An arithmetic decoding algorithm. It is a very c lose relative of the error-trapping decoding a lgorithms developed by Kasami in the 1960s.
Platform: | Size: 2113 | Author: 里海 | Hits:

[Linux-Unixtcm_8psk

Description: The Viterbi algorithm is the same as the bin Indigenous case with one main difference : The survivor sequences include the uncoded bit s, which are decided at each trellis stage when sel ecting one of two parallel branch
Platform: | Size: 5377 | Author: 里海 | Hits:

[Crack HackExample05

Description: because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English interface names, such as "the" Encrypt "button click event code", But the book was finish
Platform: | Size: 28671 | Author: yxs3658 | Hits:

[OS programExample18

Description: network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
Platform: | Size: 159547 | Author: yxs3658 | Hits:

[Crack HackWEPCrack-0.0.10.tar

Description: wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the standard.
Platform: | Size: 4660 | Author: raosiyong | Hits:

[Linux-Unixtest_ipv6

Description: Linux kernel programming, the network can be intercepted data packets text IPV6
Platform: | Size: 1090 | Author: sunxpa | Hits:

[OS programOffComputer

Description: closed computer program source code, called the Windows system through API functions to shut down the computer.
Platform: | Size: 37616 | Author: 赵利存 | Hits:
« 1 2 ... .46 .47 .48 .49 .50 15851.52 .53 .54 .55 .56 ... 16281 »

CodeBus www.codebus.net