Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program
OS program list
Sort by :
« 1 2 ... .39 .40 .41 .42 .43 15844.45 .46 .47 .48 .49 ... 16274 »
Downloaded:0
The decoding algorithm used in RBDS.c is ba sed on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g (x) ope rations.
Date : 2008-10-13 Size : 2.56kb User : 里海

Downloaded:0
The same two-stage decoder as above. Howev er, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only t he phase of the received symbol is employed in th e metric computati
Date : 2008-10-13 Size : 5.72kb User : 里海

Downloaded:0
The Reed-Somolon code is specified by the f inite field, the length (length
Date : 2008-10-13 Size : 5.9kb User : 里海

Downloaded:0
Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision decod ing performed by the Green machine
Date : 2008-10-13 Size : 2.25kb User : 里海

Downloaded:0
Encoding and decoding of the binary extend ed (24,12,8) Golay code : An arithmetic decoding algorithm. It is a very c lose relative of the error-trapping decoding a lgorithms developed by Kasami in the 1960s.
Date : 2008-10-13 Size : 2.06kb User : 里海

Downloaded:0
The Viterbi algorithm is the same as the bin Indigenous case with one main difference : The survivor sequences include the uncoded bit s, which are decided at each trellis stage when sel ecting one of two parallel branch
Date : 2008-10-13 Size : 5.25kb User : 里海

Downloaded:0
because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English interface names, such as "the" Encrypt "button click event code", But the book was finish
Date : 2008-10-13 Size : 28kb User : yxs3658

Downloaded:0
network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
Date : 2008-10-13 Size : 155.81kb User : yxs3658

Downloaded:0
wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the standard.
Date : 2008-10-13 Size : 4.55kb User : raosiyong

Downloaded:0
Linux kernel programming, the network can be intercepted data packets text IPV6
Date : 2008-10-13 Size : 1.06kb User : sunxpa

Downloaded:0
closed computer program source code, called the Windows system through API functions to shut down the computer.
Date : 2008-10-13 Size : 36.73kb User : 赵利存

on Windows network programming tutorial for beginners, Windows display a variety of I/O methods, a detailed description of high-performance, scalable server development process, and gives detailed codes. Will be programm
Date : 2008-10-13 Size : 475.11kb User : 王勇
« 1 2 ... .39 .40 .41 .42 .43 15844.45 .46 .47 .48 .49 ... 16274 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.