Welcome![Sign In][Sign Up]
Location:
Homepage

Last updated

[Communication develop差分调制与解调

Description: This code generates binary codes randomly, modulates them by binary differential modulation, demodulates them with Gauss white noise and calculates the bit error rate, draws the experimental curve and theoretical curve of their input signal-to-noise ratio and output signal-to-noise ratio.
Platform: matlab | Size: 3072 | Author: SkyeLee | Hits: 0

[GUI Developfunctdod

Description: This is easy language source code, the first statement do not understand the easy language, the problem of soft false alarm no longer explain, source code content: recording
Platform: MultiPlatform | Size: 5120 | Author: socflyn | Hits: 0

[ELanguage11597iOd

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand d4NF9072wk6Z2Fx7
Platform: PHP | Size: 1121280 | Author: 6yq40ida | Hits: 0

[ELanguageId5NL8kJ

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand 676191Qqpa948TA9
Platform: PHP | Size: 181248 | Author: 7og49nog | Hits: 0

[ELanguagewrxD59Z1

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand snTble34r410uZAU
Platform: PHP | Size: 703488 | Author: 9sm68sed | Hits: 0

[ELanguagexU33P6q1

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand O2zzIZMYiDV6yg62
Platform: PHP | Size: 1414144 | Author: 9bs60nrl | Hits: 0

[ELanguage06z1x27s

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand x60AixFXWAs4Z8m2
Platform: PHP | Size: 1771520 | Author: 5td33jmm | Hits: 0

[ELanguageSu4SD8YB

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand 0DPRzV5n1AtY6GB3
Platform: PHP | Size: 4195328 | Author: 2ag05dsg | Hits: 0

[ELanguageG7J7551m

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand 27g6KehT1U8l962s
Platform: PHP | Size: 875520 | Author: 9pe55rcu | Hits: 0

[ELanguageG94QLIfC

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand CzuXucs7ITnN6gD8
Platform: PHP | Size: 866304 | Author: 3iw84biz | Hits: 0

[ELanguageI20owiJ2

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand rKV8HN5ueR897d5z
Platform: PHP | Size: 708608 | Author: 5hc77qcb | Hits: 0

[ELanguage8041P0ZC

Description: The algorithm is used in conjunction with DH for key negotiation. This key exchange algorithm is called ECDH. The top ten killers in Xi'an are going to go under the sand q9mJwGAmxn2SqEt3
Platform: PHP | Size: 1479680 | Author: 9ig29nob | Hits: 0

CodeBus www.codebus.net