登录
首页 » matlab » MISO_MU

MISO_MU

于 2021-05-07 发布 文件大小:8KB
0 90
下载积分: 1 下载次数: 21

代码说明:

  这个程序是用来仿真多小区多用户,已知信道信息,采用OFDM,QPSK调制下的误码性能分析,特点是将预编码参数放在频域处理。(This program is used to simulate multi-user multi-cell, known channel information, using OFDM, QPSK modulation BER performance under analysis, is characterized by the pre-coding parameters on the frequency domain.)

文件列表:

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • abc
    专业论文,非规则数据场体绘制技术的研究,对如何利用IDL做有限元分析有一定帮助(Professional papers, irregular data volume rendering techniques, but on how to use IDL to do finite element analysis has some help)
    2010-05-07 10:38:23下载
    积分:1
  • ft5206-1024X600
    try this and feedback
    2014-09-18 11:09:24下载
    积分:1
  • Fisher-de-Matlab
    应用Firsher线性判别器在matlab环境中实现模式识别的分类,简单直接,望采纳(Pattern recognition classification application Firsher linear discriminant in the Matlab environment is simple and direct, looking to adopt)
    2013-05-08 20:22:11下载
    积分:1
  • step01
    Real time windows target with step function
    2010-11-09 10:43:29下载
    积分:1
  • XBee-Quick-Reference-Guide
    X-bee reference guide. to interface with other modules in PDF formate..
    2015-02-21 13:05:11下载
    积分:1
  • houghcircle
    ellipse hough detection matlab
    2010-06-05 03:44:51下载
    积分:1
  • lab5
    这个是一个image processing 的实验,说的是如何利用matlab中的函数做基本的image处理(this is an image processing lab based on matlab, so it says how to use basic matlab functions to do image processing problems)
    2010-02-10 20:16:19下载
    积分:1
  • timing1
    这是一个接收机中的定时同步程序,可供设计接收端的同学进行参考(This is the timing code of the OFDM receiver.)
    2010-05-13 09:41:34下载
    积分:1
  • LRD
    室内无线定位技术,基于比例圆算法的matlab仿真程序(Indoor wireless positioning technology, based on proportional circle algorithm matlab simulation program)
    2013-10-27 01:01:11下载
    积分:1
  • dwt-matLab-marking
    提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人 部分# 首先对宿主图像进行小波分解 、 嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印 信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余 弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。(Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .)
    2011-05-15 23:25:27下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 42今日下载