搜索结果

找到约 2,092 项符合 Data Science 的查询结果

3G开发 gmsk modulation of numerical data generated by a random source, the output of the modulator give two

gmsk modulation of numerical data generated by a random source, the output of the modulator give two signals, the first is gmsk signal and the other is gaussien frequency pulse shape
https://www.eeworm.com/dl/701/470850.html
下载: 180
查看: 1034

3G开发 This Simulink model simulates as an example the transmission and reception of random digital data mo

This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel.
https://www.eeworm.com/dl/701/470851.html
下载: 121
查看: 1084

matlab例程 Written for engineering and computer science students and practicing engineers, this book provides t

Written for engineering and computer science students and practicing engineers, this book provides the fundamental applications and mathematical techniques of signal processing. Topics covered include programming in MATLAB, filters, networking, and parallel processing. MATLAB is introduced and use ...
https://www.eeworm.com/dl/665/470886.html
下载: 135
查看: 1055

matlab例程 This M-File imports data from binary *.dat files, created with PSpice 6.0 (DOS), 9.1 (Student), and

This M-File imports data from binary *.dat files, created with PSpice 6.0 (DOS), 9.1 (Student), and 10.0.3. If you are using newer versions of PSpice, you might need to adjust the code.
https://www.eeworm.com/dl/665/470900.html
下载: 128
查看: 1063

软件设计/软件工程 Steganography is the art of communicating a message by embedding it into multimedia data. It is desi

Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has ...
https://www.eeworm.com/dl/684/471185.html
下载: 51
查看: 1049

其他 remote control ir data transmittion

remote control ir data transmittion
https://www.eeworm.com/dl/534/471591.html
下载: 181
查看: 1019

其他书籍 This document is furnished for the customers of Delta Tau Data Systems, Inc

This document is furnished for the customers of Delta Tau Data Systems, Inc
https://www.eeworm.com/dl/542/472065.html
下载: 191
查看: 1049

其他 msp430f2013 sample and save in vector data.

msp430f2013 sample and save in vector data.
https://www.eeworm.com/dl/534/472273.html
下载: 47
查看: 1011

软件设计/软件工程 Learn how to leverage a key Java technology used to access relational data from Java programs, in

Learn how to leverage a key Java technology used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue SQL queries and get results back. You ll move on to advanced to ...
https://www.eeworm.com/dl/684/472671.html
下载: 23
查看: 1150

VHDL/FPGA/Verilog This file is used to transfer p2s data in a Spartan 3e

This file is used to transfer p2s data in a Spartan 3e
https://www.eeworm.com/dl/663/472693.html
下载: 89
查看: 1084