搜索结果
找到约 1,528 项符合
psk-based 的查询结果
行业发展研究 A new blind adaptive multiuser detection scheme based on a hybrid of Kalman filter and subspace est
A new blind adaptive multiuser detection scheme based on a hybrid of Kalman filter and
subspace estimation is proposed. It is shown that the detector can be expressed as an anchored
signal in the signal subspace and the coefficients can be estimated by the Kalman filter using only
the signature wave ...
其他书籍 J. Mark Steber的psk解调的经典文章中第一部分
J. Mark Steber的psk解调的经典文章中第一部分,希望堆大家有帮助
其他书籍 J. Mark Steber的psk解调的经典文章中的第二部分的源程序
J. Mark Steber的psk解调的经典文章中的第二部分的源程序,希望对大家有所帮助。
Java编程 A Java web application, based on Struts and Hibernate, that serves as an online running log. Users m
A Java web application, based on Struts and Hibernate, that serves as an online running log. Users may enter information about workouts, and can track historical performance and data using web-based charts.
网络 This documentation is based on the following versions:- pre-release of the wimax model developed by
This documentation is based on the following versions:- pre-release of the wimax model developed by NIST (file patch-wimax-prerelease-092206)- ns-2.29
此程序是NS2下用C、C++编写的,主要对Wimax 802.16d和802.16e的MAC层协议的仿真,压缩文件内部有详细的说明。
由于NS2运行在Linux下而且是对网络的模拟,因此 ...
其他书籍 Assertion based design_and:Including:Assertion methdology,Specifyingg RTL Properties, PLI-Based Ass
Assertion based design_and:Including:Assertion methdology,Specifyingg RTL Properties,
PLI-Based Assertions Functional coverage
其他 "poco" (Spanish & Italian for "little") OLAP provides a web-based, crosstab reporting tool for your
"poco" (Spanish & Italian for "little") OLAP provides a web-based, crosstab reporting tool for your datawarehouse. While it s not an OLAP server or full fledged data mining solution, pocOLAP makes your data easy to use and understand ... for free!
matlab例程 这是QAM信号和PSK信号产生程序
这是QAM信号和PSK信号产生程序,可以生成16-QAM,32-QAM,64-QAM和M进制psk信号。
matlab例程 这是QAM信号和PSK信号的解调程序
这是QAM信号和PSK信号的解调程序,其中包括16-QAM,32QAM,64-QAM和M进制PSK信号。
其他 Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents