GNU_Radio GNU radio is a free/open-source software toolkit for and the content is controlled by a handful of organizations. Cell building software radios, in which software defines the phones are a great convenience, but the features your phone transmitted waveforms and demodulates the received supports are determined by the operator s interests, not yours. waveforms. Software radio is the technique of getting code A centralized system limits the rate of innovation. Instead of as close to the antenna as possible. It turns radio hardware cell phones being second-class citizens, usable only if problems into software problems.
标签: open-source GNU_Radio software toolkit
上传时间: 2017-06-27
上传用户:拔丝土豆
linux book, this book is about linux programing. i hope it will help you. i am glad to share my files. thanks :) Moving to Linux Second Edition
标签: linux book programing about
上传时间: 2014-11-30
上传用户:wfl_yy
The code for this article was written for version 1.0 of the Active Template Library (ATL). The current version of the code (in SieveATL) was built with Visual C++ 6.0 and the ATL provided with that compiler. It may be slightly different than the code shown in the article. The directory SieveMFC contains an MFC version of a component equivalent to the ATL version discussed in the article. It was built with version 5 of the C++ compiler and the MFC version provided with it. The code discussed in the article was later adapted for Hardcore Visual Basic, Second Edition. Comparable Visual Basic versions are discussed in Chapter 10 of the book. Bruce McKinney
上传时间: 2013-12-01
上传用户:古谷仁美
This software is developed to provide ease with controller design. For PID control, options are given to design and analyse the compensated and uncompensated system. You are free to choice among Proportional PI, PD and PID mode of control. Both frequency and time domain characteristics can be observed. Special Menus are given to observe time and frequency response plots. For Statefeedback controller similar options are given. But this is limited to second order system only.
标签: controller developed software control
上传时间: 2017-07-25
上传用户:aysyzxzm
Those who are working on power system optimisatio, for them here is all the load flow programs from book hadi sadat. It i the 1st part. Second part is also uploaded in this site by me
标签: optimisatio programs working system
上传时间: 2017-07-30
上传用户:xymbian
When trying to extract information from SAR images, we need to distinguish two types of image property. The more important is where properties of the scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects in the image measurements or examination of the image then can provide information about the scene. The second is generated purely by the system and the signal processing.
标签: distinguish information extract trying
上传时间: 2014-01-09
上传用户:huyiming139
Robot tool box - provides many functions that are useful in robotics including such things as kinematics, dynamics, and trajectory generation
标签: functions including provides robotics
上传时间: 2014-11-27
上传用户:dongqiangqiang
simple clock display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number ,Color of main hands and dial,Color of second hand and numbers
标签: clock Dimensions the Formats
上传时间: 2014-11-24
上传用户:wanqunsheng
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.
标签: FPGA-based generator embedded hardware
上传时间: 2014-01-09
上传用户:一诺88
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
标签: cryptographic applications attractive for
上传时间: 2013-12-07
上传用户:zhuimenghuadie