Hot Search : Source embeded web remote control p2p game More...
Location : Home Documents Program doc

Search in result

Program doc list
Sort by :
« 1 2 ... .99 .00 .01 .02 .03 604.05 .06 .07 .08 .09 ... 2190 »
Downloaded:0
This the one for embedded Huawei GSM/GPRS module driven explanation.
Update : 2025-01-25 Size : 112kb Publisher : 夏灿

Research jamming GPS receiver space-time filtering technology
Update : 2025-01-25 Size : 1.03mb Publisher : 夏灿

Discussion 3G wireless communications system a key part of
Update : 2025-01-25 Size : 221kb Publisher : 夏灿

This protocol presents a mathematical formulation and a heuristic to support connectivity, flow conservation constraints, data capacity per link, constraints related with communication and sensing range of sensors, and s
Update : 2025-01-25 Size : 192kb Publisher : nassouma

By using these matlab codes one can generate any noise with mean X and variance Y . Useful for analysis of signals in noisy environment
Update : 2025-01-25 Size : 10kb Publisher : aknigin

With this matlab codes one can simulate BER for BPSK Modulation with added noise in various steps
Update : 2025-01-25 Size : 9kb Publisher : aknigin

Downloaded:0
hamming codes and RS codes in AWGN performance
Update : 2025-01-25 Size : 13kb Publisher : 周薇

Downloaded:0
4PAM and 8PAM in AWGN channel wave modulation performance analysis download
Update : 2025-01-25 Size : 14kb Publisher : 周薇

Downloaded:0
After continuous noise signal superimposed image analysis and simulink simulation module in a variety of ways
Update : 2025-01-25 Size : 36kb Publisher : 周薇

Downloaded:0
Discrete convolution function matlab basic usage and circular convolution description and continuous signal amplitude spectral envelope
Update : 2025-01-25 Size : 66kb Publisher : 周薇

Downloaded:0
Continuous function matlab basic usage and various simple form description
Update : 2025-01-25 Size : 15kb Publisher : 周薇

this protocol proposes a energy efficient multipath data transfer scheme in wireless sensor networks to address the troubles caused by false data injection attack. This can be done by early detection and filtering of inj
Update : 2025-01-25 Size : 620kb Publisher : nassouma
« 1 2 ... .99 .00 .01 .02 .03 604.05 .06 .07 .08 .09 ... 2190 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.