资源列表

[Linux/Unix编程RBDS

说明:The decoding algorithm used in RBDS.c is based on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g(x) operations. -The deco
<里海> 在 2008-10-13 上传 | 大小:2624 | 下载:0

[Linux/Unix编程tc-8psk-sect

说明:The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation
<里海> 在 2008-10-13 上传 | 大小:5856 | 下载:0

[Linux/Unix编程rs_eedec_euc

说明:The Reed-Somolon code is specified by the finite field, the length (length <= 2^m-1), the number of redundant symbols (length-k), and the initial zero of the code, init_zero, such that the zeros are: init_zer
<里海> 在 2008-10-13 上传 | 大小:6037 | 下载:0

[Linux/Unix编程rm13_awgn

说明:Simulation of RM(1,3), equivalent to the (8,4,4) extended Hamming code. Soft-decision decoding performed by the Green machine-Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision deco
<里海> 在 2008-10-13 上传 | 大小:2299 | 下载:0

[Linux/Unix编程golay24

说明:Encoding and decoding of the binary extended (24,12,8) Golay code: An arithmetic decoding algorithm. It is a very close relative of the error-trapping decoding algorithms developed by Kasami in the 1960s.-Encoding and
<里海> 在 2008-10-13 上传 | 大小:2113 | 下载:0

[Linux/Unix编程tcm_8psk

说明:The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the
<里海> 在 2008-10-13 上传 | 大小:5377 | 下载:0

[加密解密Example05

说明:因为本系统在写成电子稿件的时候,界面是英文的,因此在书中介绍代码的时候,都是采用英文界面名称,如“\"Encrypt\"按钮单击事件代码”,但是书上的界面后来被汉化,导致文本和图不一致,因此在此提供英文界面和中文界面两个版本的系统。-because of the system of electronic articles written in a time when the interface is in English, the bo
<yxs3658> 在 2008-10-13 上传 | 大小:28671 | 下载:0

[系统编程Example18

说明:网络性能监控与流量统计系统,能实现大部分监测与统计-network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
<yxs3658> 在 2008-10-13 上传 | 大小:159547 | 下载:0

[加密解密WEPCrack-0.0.10.tar

说明:wlan的WEP密钥系统的解密,WEP为共享加密系统。更新的加密系统为WPA2,中国的WAPI很遗憾没有纳入标准。-wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the stand
<raosiyong> 在 2008-10-13 上传 | 大小:4660 | 下载:0

[Linux/Unix编程test_ipv6

说明:LINUX内核编程,可以截获网络上IPV6数据包文-Linux kernel programming, the network can be intercepted data packets text IPV6
<sunxpa> 在 2008-10-13 上传 | 大小:1090 | 下载:0

[系统编程OffComputer

说明:关闭计算机程序原代码,通过调用windows系统的API函数来关闭计算机。-closed computer program source code, called the Windows system through API functions to shut down the computer.
<赵利存> 在 2008-10-13 上传 | 大小:37616 | 下载:0

[系统编程WindowsNetAndConmunicationDesign

说明:讲述Windows网络程序设计的入门教程,展示了各种Windows I/O的方法,详细说明了高性能可伸缩性服务器的开发过程,并给出详细的实现代码。将编程方法、网络协议和应用实例有机组合起来,详细介绍了Internet广播和IP多播、原始套接字、SPI、LAN和WAN上的扫描和侦测技术、网络数据的窃取和保护、ARP欺骗、IP欺骗等。详细演示了协议驱动的开发过程,介绍了NDIS编程接口。在编程实践中学习P2P程序设计、讨论了穿透防火墙、NA
<王勇> 在 2008-10-13 上传 | 大小:486513 | 下载:0

源码中国 www.ymcn.org