-
subcarrier_allocation
子载波的分配 考虑每个带宽的大小 及子信道的噪声 最后得出每个基站到用户的分配(Consider the allocation of subcarriers for each channel size and bandwidth of the noise and came to the conclusion of each base station to the user' s allocation)
- 2009-05-08 16:45:23下载
- 积分:1
-
kalman
利用kalman实现目标跟踪的MATLAB源代码,能够实现。(Target tracking using kalman the MATLAB source code, can be achieved.)
- 2010-05-14 10:20:43下载
- 积分:1
-
2
说明: salam man hamid hastam in file matlab
- 2012-04-09 12:28:20下载
- 积分:1
-
4781_6994_DC-SS501_Ver1.0_EN
TCS 230 color sensor user guide.
- 2014-08-07 18:42:29下载
- 积分:1
-
field-distribution-fdtd
this code is for calculation the field distribution in 2D photonic crystals with FDTD method
- 2012-07-27 03:10:33下载
- 积分:1
-
PE
说明: 排列熵可以很好的区分信号和噪声。可以用做优化算法的适应度函数(Permutation entropy can distinguish signal from noise. Can be used as fitness function of optimization algorithm)
- 2020-05-30 08:15:30下载
- 积分:1
-
RLS
说明: RLS算法
简单的介绍了RLS算法的使用,便于大家理解RLS算法。(RLS algorithm is simple introduction to the use of RLS algorithm, facilitate better understanding of RLS algorithm.)
- 2010-04-21 13:10:31下载
- 积分:1
-
4176code_network_sybex
In short, to-the-point chapters, Practical C++ Programming covers all aspects of programming including style, software engineering, programming design, object-oriented design, and debugging. It also covers common mistakes and how to find (and avoid) them. End of chapter exercises help you ensure you ve mastered the material. Steve Oualline s clear, easy-going writing style and hands-on approach to learning make Practical C++ Programming a nearly painless way to master this complex but powerful programming language.
- 2014-10-10 10:33:00下载
- 积分:1
-
DEMOD
MATLAB DEMOD PARAMETER,MATLAB DEMOD PARAMETER,MATLAB DEMOD PARAMETER
- 2013-03-11 11:09:53下载
- 积分:1
-
TAODV-LATEST-CODE
The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks.
- 2021-02-14 22:49:48下载
- 积分:1