虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

File<b>SySTem</b>Object

  • to show the waveform of audio file and play it on computer Purpose: Familiar with WAV file format a

    to show the waveform of audio file and play it on computer Purpose: Familiar with WAV file format and UI design It should have the following functions: Provide a Graphic User Interface for user to browse the file system and select one WAV file Show the waveform of input audio signal Play the selected WAV file Print the parameters of WAV file such as sampling rate, bit-depth, etc

    标签: file Familiar computer waveform

    上传时间: 2015-05-07

    上传用户:l254587896

  • Models UWB TX and RX using BPSK fifth derivative. MATLAB Release: R13 Description: This m file

    Models UWB TX and RX using BPSK fifth derivative. MATLAB Release: R13 Description: This m file models a UWB system using BPSK with the fifth order derivative of the gaussian pulse with correlation receiver and intgrator.

    标签: Description derivative Release Models

    上传时间: 2015-05-08

    上传用户:zhliu007

  • This m-file displays the time waveform for the Gaussian pulse function and the first and second deri

    This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.

    标签: the and Gaussian displays

    上传时间: 2015-05-08

    上传用户:leixinzhuo

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) the text of Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    标签: L. published Schwartz Edition

    上传时间: 2014-11-29

    上传用户:kr770906

  • by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See

    by Randal L. Schwartz and Tom Phoenix ISBN 0-596-00132-0 Third Edition, published July 2001. (See the catalog page for this book.) Learning Perl, 3rd Edition. Table of Contents Copyright Page Preface Chapter 1: Introduction Chapter 2: Scalar Data Chapter 3: Lists and Arrays Chapter 4: Subroutines Chapter 5: Hashes Chapter 6: I/O Basics Chapter 7: Concepts of Regular Expressions Chapter 8: More About Regular Expressions Chapter 9: Using Regular Expressions Chapter 10: More Control Structures Chapter 11: Filehandles and File Tests Chapter 12: Directory Operations Chapter 13: Manipulating Files and Directories Chapter 14: Process Management Chapter 15: Strings and Sorting Chapter 16: Simple Databases Chapter 17: Some Advanced Perl Techniques Appendix A: Exercise Answers Appendix B: Beyond the Llama Index Colophon

    标签: L. published Schwartz Edition

    上传时间: 2015-09-03

    上传用户:lifangyuan12

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    标签: Implemented following compile command

    上传时间: 2014-01-01

    上传用户:lhc9102

  • Data Structures And Algorithms With Object-Oriented Design Patterns In Python (2003) source code and

    Data Structures And Algorithms With Object-Oriented Design Patterns In Python (2003) source code and html file

    标签: Object-Oriented Algorithms Structures Patterns

    上传时间: 2014-01-25

    上传用户:dbs012280

  • This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm

    This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) communication system. The receiver uses a correlator(mixer-integrator[LPF]) configuration with BER measurements comparing measured and theoretical results. The bandpass and low pass used in the receiver are constructed using z transforms.

    标签: keyed shift amplitude analyzes

    上传时间: 2015-09-26

    上传用户:liuchee

  • 本文件描述了一个基于串口实现文件传输的协议eXmodem

    本文件描述了一个基于串口实现文件传输的协议eXmodem,该协议基于标准Xmodem File Transfer Protocol,是一个独立标准,完全功能,全新的文件传输协议。 1)该协议除实现Xmodem File Transfer基本功能,即已实现了在两个设备相互之间,通过串口把一个设备内文件传输至另一个设备内;其增强功能所列参考如下: a)两个设备相互之间传输文件能够以一致的文件目录存放; b)两个设备相互之间可以传输任意大小的文件,而Xmodem File Transfer只能传送128 *n字节大小的文件; c)具备避免一个文件在两个设备相互之间重复传输的功能,提高了文件传输的效率。

    标签: eXmodem 文件描述 串口实现 文件传输

    上传时间: 2015-09-30

    上传用户:LouieWu