硬件设计指南(PDF格式),主要包括:Low Voltage Interfaces;Grounding in Mixed Signal Systems;Digital Isolation Techniques; Power Supply Noise Reduction and Filtering; Dealing with High Speed Logic
上传时间: 2015-08-31
上传用户:阿四AIR
This paper deals with the problem of speech enhancement when a corrupted speech signal with an additive colored noise is the only information available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as autoregressive (AR) process and represented in the state-space domain.
标签: speech with enhancement corrupted
上传时间: 2015-09-07
上传用户:zhangyi99104144
The standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the measurements and the filter residuals.
标签: parameters knowledge the standard
上传时间: 2013-12-17
上传用户:541657925
Hard-decision decoding scheme Codeword length (n) : 31 symbols. Message length (k) : 19 symbols. Error correction capability (t) : 6 symbols One symbol represents 5 bit. Uses GF(2^5) with primitive polynomial p(x) = X^5 X^2 + 1 Generator polynomial, g(x) = a^15 a^21*X + a^6*X^2 + a^15*X^3 + a^25*X^4 + a^17*X^5 + a^18*X^6 + a^30*X^7 + a^20*X^8 + a^23*X^9 + a^27*X^10 + a^24*X^11 + X^12. Note: a = alpha, primitive element in GF(2^5) and a^i is root of g(x) for i = 19, 20, ..., 30. Uses Verilog description with synthesizable RTL modelling. Consists of 5 main blocks: SC (Syndrome Computation), KES (Key Equation Solver), CSEE (Chien Search and Error Evaluator), Controller and FIFO Register.
标签: symbols length Hard-decision Codeword
上传时间: 2014-07-08
上传用户:曹云鹏
his packet is a IS-95 baseband simulation for 1 data channel of 9.6 KBps rate. The simulation is written for static channel and AWGN noise. The packet include: 1) Packet Builder (Viterbi Encoding, Interleaver, PN generation) 2) Modulator (RRC filter) 3) Demodulator (Matched Filter, RAKE receiver) 4) Receiver (HD or SD) (Deinterleaver, Viterbi Decoder). You should run "Simulation.m" function that include all modules.
标签: simulation baseband channel packet
上传时间: 2013-12-23
上传用户:zhangyigenius
Prony算法工具箱。Prony方法是用一组指数项的线性组合来拟和等间距采样数据的方法,可以从中分析出信号的幅值、相位、阻尼因子、频率等信息。considerations including data preprocessing, model order selection, model order selection criteria, signal subspace selection, signal and noise separation, root inspection and assessing residuals. The PTbox provides flexibility to compare and display analysis results simultaneously for several parameter variations.
标签: Prony considerations including data
上传时间: 2015-09-11
上传用户:lizhizheng88
Robustnesstochangesinilluminationconditionsaswellas viewing perspectives is an important requirement formany computer vision applications. One of the key fac-ors in enhancing the robustness of dynamic scene analy-sis that of accurate and reliable means for shadow de-ection. Shadowdetectioniscriticalforcorrectobjectde-ection in image sequences. Many algorithms have beenproposed in the literature that deal with shadows. How-ever,acomparativeevaluationoftheexistingapproachesisstill lacking. In this paper, the full range of problems un-derlyingtheshadowdetectionareidenti?edanddiscussed.Weclassifytheproposedsolutionstothisproblemusingaaxonomyoffourmainclasses, calleddeterministicmodeland non-model based and statistical parametric and non-parametric. Novelquantitative(detectionanddiscrimina-ionaccuracy)andqualitativemetrics(sceneandobjectin-dependence,?exibilitytoshadowsituationsandrobustnesso noise) are proposed to evaluate these classes of algo-rithms on a benchmark suite of indoor and outdoor videosequences.
标签: Robustnesstochangesinillumination conditionsaswellas perspectives requirement
上传时间: 2014-01-23
上传用户:whenfly
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
This lab exercise will introduce you to the AccelWare IP generators. AccelWare is a library of over fifty IP generators, available in the form of three toolkits that produce synthesizable MATLAB for common MATLAB built in and toolbox functions. Each generator offers macro and micro-architecture selections that allow full customization of the generated model to the target application requirements.
标签: AccelWare generators introduce exercise
上传时间: 2013-12-16
上传用户:2467478207
Embest Arm EduKit II Evaluation Board External Interrupt Test Example Please Select the trigger: 1 - Falling trigger 2 - Rising trigger 3 - Both Edge trigger 4 - Low level trigger 5 - High level trigger any key to exit... Press the buttons push buttons may have glitch noise problem EINT6 had been occured... LED1 (D1204) on
标签: Evaluation Interrupt External Example
上传时间: 2015-10-08
上传用户:Altman