音频传输FPGA代码。。。。。。。。。咋这个规则这么多麻烦
标签: fpga-coding
上传时间: 2016-05-15
上传用户:DKCJ02
32feet.NET is a shared-source project to make personal area networking technologies such as Bluetooth, Infrared (IrDA) and more, easily accessible from .NET code. Supports desktop, mobile or embedded systems. 32feet.NET is free for commercial or non-commercial use. If you use the binaries you can just use the library as-is, if you make modifications to the source you need to include the 32feet.NET License.txt document and ensure the file headers are not modified/removed. The project currently consists of the following libraries:- Bluetooth IrDA Object Exchange Bluetooth support requires a device with either the Microsoft, Widcomm, BlueSoleil, or Stonestreet One Bluetopia Bluetooth stack. Requires .NET Compact Framework v3.5 or above and Windows CE.NET 4.2 or above, or .NET Framework v3.5 for desktop Windows XP, Vista, 7 and 8. A subset of functionality is available for Windows Phone 8 and Windows Embedded Handheld 8 in the InTheHand.Phone.Bluetooth.dll library.
上传时间: 2016-07-06
上传用户:magister2016
一本难得得关于通信纠错码得好书。对原文件进行了优化----添加了目录,链接,大大缩小了体积。
标签: mathmatical Correction algorithms Coding method Error and
上传时间: 2017-10-08
上传用户:jinnmy
The 4.0 kbit/s speech codec described in this paper is based on a Frequency Domain Interpolative (FDI) coding technique, which belongs to the class of prototype waveform Interpolation (PWI) coding techniques. The codec also has an integrated voice activity detector (VAD) and a noise reduction capability. The input signal is subjected to LPC analysis and the prediction residual is separated into a slowly evolving waveform (SEW) and a rapidly evolving waveform (REW) components. The SEW magnitude component is quantized using a hierarchical predictive vector quantization approach. The REW magnitude is quantized using a gain and a sub-band based shape. SEW and REW phases are derived at the decoder using a phase model, based on a transmitted measure of voice periodicity. The spectral (LSP) parameters are quantized using a combination of scalar and vector quantizers. The 4.0 kbits/s coder has an algorithmic delay of 60 ms and an estimated floating point complexity of 21.5 MIPS. The performance of this coder has been evaluated using in-house MOS tests under various conditions such as background noise. channel errors, self-tandem. and DTX mode of operation, and has been shown to be statistically equivalent to ITU-T (3.729 8 kbps codec across all conditions tested.
标签: frequency-domain interpolation performance Design kbit_s speech coder based and of
上传时间: 2018-04-08
上传用户:kilohorse
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
不同于传统秘钥加密技术,无线物理层安全理论技术是根据主窃信道传输速率的差值等特征信息来从信息论的角度降低窃听者获取的有用信息量。 在理想的窃听信道模型中,只要保密容量(主窃听信道容量差)大于0,系统就可以达到保密通信。%在引入信号衰落之后,保密通信只以一定的概率实现。 本文通过建立中断概率模型来对通信系统的保密性进行仿真。 本文主要研究性能中的保密速率和主窃信道信噪比这两个指标。在系统所需保密速率是定值的条件下,主窃信道信噪比之差越低,通信的保密性越好。通过采用MIMO技术中的波速成形技术,合法信道中的信道容量可以被大幅度提高,进而大幅度降低中断概率。环形干扰技术不仅可以降低窃听信道信噪比,而且对主信道的传输速率不会产生负面影响。经过使用Alamouti编码技术,可以很好的解决由于天线数量增多而导致译码复杂度增加的问题。
上传时间: 2020-03-17
上传用户:成成爱吃鱼
When we started thinking about writing this book, we had been working together for more than five years on the borderline between propagation and signal processing.Therefore, it is not surprising that this book deals with propagation models and design tools for MIMO wirelesscommunications.Yet, thisbookshouldconstitutemorethanasimplecombination of these two domains. It hopefully conveys our integrated understanding of MIMO, which results from endless controversial discussions on various multi-antenna related issues, as well as various interactions with numerous colleagues. Obviously, this area of technology is so large that it was beyond our aim to cover all aspects in details. Rather, our goal has been to provide researchers, R&D engineers and graduate students with a comprehensive coverage of radio propagation models and space–time coding techniques.
标签: Communications5 Wireless MIMO
上传时间: 2020-05-28
上传用户:shancjb
Communication protocols – for short protocols – form the basis for the opera- tion of computer networks and telecommunication systems. They are behavior conventions which describe how communication systems interact with each other in computer networks. Protocols define the temporal order of the interactions and the formats of the data units exchanged. Communication protocols comprise a wide range of different functions and mechanisms, such as the sending and receiv- ing of data units, their coding/decoding, error control mechanisms, timer control, flow control, and many others.
标签: Engineering Protocol
上传时间: 2020-05-31
上传用户:shancjb
The idea for this book was born during one of my project-related trips to the beautiful city of Hangzhou in China, where in the role of Chief Architect I had to guide a team of very young, very smart and extremely dedicated software developers and verification engineers. Soon it became clear that as eager as the team was to jump into the coding, it did not have any experience in system architecture and design and if I did not want to spend all my time in constant travel between San Francisco and Hangzhou, the only option was to groom a number of local junior architects. Logically, one of the first questions being asked by these carefully selected future architects was whether I could recommend a book or other learning material that could speed up the learning cycle. I could not. Of course, there were many books on various related topics, but many of them were too old and most of the updated information was either somewhere on the Internet dispersed between many sites and online magazines, or buried in my brain along with many years of experience of system architecture.
标签: Telecommunication Gateways System Design for
上传时间: 2020-06-01
上传用户:shancjb
MIT App Inventor is an innovative beginner’s introduction to programming and app creation that transforms the complex language of text-based coding into visual, drag-and- drop building blocks. The simple graphical interface grants even an inexperienced novice the ability to create a basic, fully functional app within an hour or less.
标签: Arduino Android using and MIT app
上传时间: 2020-06-09
上传用户:shancjb