搜索结果
找到约 199 项符合
pseudo-random 的查询结果
matlab例程 Fast DOA Estimation Algorithm using Pseudo Covariance Matrix的程序
Fast DOA Estimation Algorithm using Pseudo Covariance Matrix的程序
通讯编程文档 It is a crc ieee 802.3 random data gen
It is a crc ieee 802.3 random data gen
matlab例程 A code for pseudo coloring the images
A code for pseudo coloring the images
数学计算 Another generator of uniformly distributed random numbers
Another generator of uniformly distributed random numbers
3G开发 gmsk modulation of numerical data generated by a random source, the output of the modulator give two
gmsk modulation of numerical data generated by a random source, the output of the modulator give two signals, the first is gmsk signal and the other is gaussien frequency pulse shape
3G开发 This Simulink model simulates as an example the transmission and reception of random digital data mo
This Simulink model simulates as an example the transmission and reception of random digital data modulated with GMSK. The purpose of this model is to illustrate how part of the GSM transmission and reception works. It also measures the BER, affected by an AWGN channel.
编辑器/阅读器 Let X1,X2,...X10 be independent uniformly distributed Random vari- ables over [0 1] andY = X1 + X2
Let X1,X2,...X10 be independent uniformly distributed Random vari-
ables over [0 1] andY = X1 + X2 +.....+ X10.Generate the PDF and
pdf of Y
VC书籍 walk random process programmed in visual c++ 0.6
walk random process programmed in visual c++ 0.6
DSP编程 Hardware random number generators attempt to extract randomness directly from complex physical syst
Hardware random number generators attempt to extract
randomness directly from complex physical systems. In this way they create random outputs without requiring any seed inputs. In this paper we describe how to use Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candid ...
加密解密 a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asym ...