This function calculates the ergodic and outage capacity of a MIMO Rayleigh channel considering no CSIT (equal power allocation) and perfect CSIT (waterfilling power allocation). In both cases perfect CSIR is assumed. The channel is assumed to be spatially correlated according to a Kronecker model but temporally uncorrelated.
资源简介:This function calculates the ergodic and outage capacity of a MIMO Rayleigh channel considering no CSIT (equal power allocation) and perfect CSIT (waterfilling power allocation). In both cases perfect CSIR is assumed. The channel ...
上传时间: 2014-12-02
上传用户:pompey
资源简介:it has been designed to calculate the ergodic and outage capacity of a MIMO Rayleigh channel considering no CSIT and perfect CSIT The channel is assumed to be spatially correlated according to a Kronecker model but temporally uncorrelated...
上传时间: 2013-12-20
上传用户:trepb001
资源简介:This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.
上传时间: 2014-01-05
上传用户:zm7516678
资源简介:The Capacity of a MIMO channel with nt transmit antenna and nr recieve antenna is analyzed. The power in parallel channel (after decomposition) is distributed as water-filling algorithm
上传时间: 2016-02-01
上传用户:225588
资源简介:Capacity of a MIMO channel with nt transmit antenna and nr recieve antenna is analyzed. The power in parallel channel (after decomposition) is distributed as water-filling algorithm
上传时间: 2016-07-13
上传用户:zhichenglu
资源简介:This note introduces the two main user adjustments of a video monitor, BRIGHTNESS and CONTRAST . I explain the effect that these controls have on picture reproduction, and I explain how to set them. This note applies to computer monit...
上传时间: 2016-11-13
上传用户:xyipie
资源简介:基于C++阐述虚拟机编程原理 This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.
上传时间: 2017-02-12
上传用户:nanxia
资源简介:This program plot the Bistatic Radar Cross Section of a dielectric sphere as a function of theta.(Analytic Method)
上传时间: 2017-03-30
上传用户:凤临西北
资源简介:This paper examines the asymptotic (large sample) performance of a family of non-data aided feedforward (NDA FF) nonlinear least-squares (NLS) type carrier frequency estimators for burst-mode phase shift keying (PSK) modulations transmit...
上传时间: 2015-12-30
上传用户:225588
资源简介:This function calculates Akaike s final prediction error % estimate of the average generalization error. % % [FPE,deff,varest,H] = fpe(NetDef,W1,W2,PHI,Y,trparms) produces the % final prediction error estimate (fpe), the effective n...
上传时间: 2014-12-03
上传用户:maizezhen
资源简介:This function calculates Akaike s final prediction error % estimate of the average generalization error for network % models generated by NNARX, NNOE, NNARMAX1+2, or their recursive % counterparts. % % [FPE,deff,varest,H] = nnfpe(...
上传时间: 2016-12-27
上传用户:脚趾头
资源简介:This function performs the ASK,BPSK and 8PSK modulations.
上传时间: 2017-03-22
上传用户:epson850
资源简介:PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consi...
上传时间: 2014-01-16
上传用户:moerwang
资源简介:DESCRIPTION This function initializes the pointers in the _pid structure to the process variable and the setpoint. *pv and *sp are integer pointers.
上传时间: 2014-01-15
上传用户:邶刖
资源简介:* This function positions the cursor at the specified * x,y coordinate. It uses the ANSI standard ESCAPE * * sequence to produce the desired effect. Its not the * * fastest way to position the cursor, but perhaps the * * most portable. *
上传时间: 2015-02-24
上传用户:chenjjer
资源简介:This program queries the network and shows the Domains/Servers/Workstations structure. It also shows the users of each Server or Workstation and can send messages to the selected PC. This programs works only on a Windows NT 4.0 Machine! 查...
上传时间: 2015-04-13
上传用户:sclyutian
资源简介:This document describes the MPI and MPI standards They are both extensions to the MPI standard The MPI part of the document contains clarications and corrections to the MPI standard and denes MPI The MPI part ...
上传时间: 2015-05-15
上传用户:CHENKAI
资源简介:This book provides information about the concepts and procedures needed by a developer of messaging applications in a Sun™ ONE Message Queue (MQ) environment. This preface contains the following sections: • Audience for This G...
上传时间: 2013-12-14
上传用户:netwolf
资源简介:this progam calculates the optimum laser powers at different rod lengths
上传时间: 2014-12-08
上传用户:一诺88
资源简介:MATLAB source code: This function implements the *(int*)(&float_var).
上传时间: 2014-01-09
上传用户:tb_6877751
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2013-12-28
上传用户:离殇
资源简介:This submission includes the presentation and model files that were used in delivering a webinar on 12-15-05 that covered the topic of modeling Hybrid Electric Vehicles. Hybrid electric vehicles (HEVs) have proven they can substantially im...
上传时间: 2015-12-24
上传用户:zl5712176
资源简介:This guide reviews the rules and syntax of the principle commands that comprise C and its object-oriented cousin, C++. The reference consists of 19 chapters that define operators and the standard input/output, string, character, and more.
上传时间: 2014-01-15
上传用户:ve3344
资源简介:This m file plots the time and frequency domain of UWB PPM(pulse position modulated) waveforms(monocycles and doublets) with different pulse recurring frequency (PRF)and information rates.
上传时间: 2016-06-28
上传用户:亚亚娟娟123
资源简介:Abstract: This thesis describes the incremental development and main features of a synthetic multi-agent system called UvA Trilearn 2001. UvA Trilearn 2001 is a robotic soccer simulation team that consists of eleven autonomous software agen...
上传时间: 2016-07-25
上传用户:zaizaibang
资源简介:This program uses the waterfilling to compute capacity
上传时间: 2013-12-31
上传用户:yzy6007
资源简介:This computes an in-place complex-to-complex FFT x and y are the real and imaginary arrays of 2^m points. dir = 1 gives forward transform dir = -1 gives reverse transform
上传时间: 2013-12-18
上传用户:huql11633
资源简介:This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
上传时间: 2013-12-19
上传用户:ma1301115706
资源简介:This function checks the mailbox to see if a message is available. Unlike OSMboxPend(), OSMboxAccept() does not suspend the calling task if a message is not available.
上传时间: 2014-12-04
上传用户:hphh
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2014-08-14
上传用户:Breathe0125