资源列表
OffComputer
- 关闭计算机程序原代码,通过调用windows系统的API函数来关闭计算机。-closed computer program source code, called the Windows system through API functions to shut down the computer.
test_ipv6
- LINUX内核编程,可以截获网络上IPV6数据包文-Linux kernel programming, the network can be intercepted data packets text IPV6
WEPCrack-0.0.10.tar
- wlan的WEP密钥系统的解密,WEP为共享加密系统。更新的加密系统为WPA2,中国的WAPI很遗憾没有纳入标准。-wlan the WEP key of the decryption system, WEP encryption system for sharing. Updated to WPA2 encryption system, China's WAPI regret not included in the standard.
Example18
- 网络性能监控与流量统计系统,能实现大部分监测与统计-network performance monitoring and traffic statistics system can achieve most of the monitoring and statistics
Example05
- 因为本系统在写成电子稿件的时候,界面是英文的,因此在书中介绍代码的时候,都是采用英文界面名称,如“\"Encrypt\"按钮单击事件代码”,但是书上的界面后来被汉化,导致文本和图不一致,因此在此提供英文界面和中文界面两个版本的系统。-because of the system of electronic articles written in a time when the interface is in English, the book on the code, are English in
tcm_8psk
- The Viterbi algorithm is the same as the binary case with one main difference: The survivor sequences include the uncoded bits, which are decided at each trellis stage when selecting one of two parallel branches with the largest correlation metric.
golay24
- Encoding and decoding of the binary extended (24,12,8) Golay code: An arithmetic decoding algorithm. It is a very close relative of the error-trapping decoding algorithms developed by Kasami in the 1960s.-Encoding and decoding of the binary extend
rm13_awgn
- Simulation of RM(1,3), equivalent to the (8,4,4) extended Hamming code. Soft-decision decoding performed by the Green machine-Simulation of RM (1,3). equivalent to the (8,4, 4) extended Hamming code. Soft-decision decod ing performed by the Green m
rs_eedec_euc
- The Reed-Somolon code is specified by the finite field, the length (length <= 2^m-1), the number of redundant symbols (length-k), and the initial zero of the code, init_zero, such that the zeros are: init_zero, init_zero+1, ..., init_zero
tc-8psk-sect
- The same two-stage decoder as above. However, when transforming the symbols prior to Viterbi decoding, the amplitude information is ignored and only the phase of the received symbol is employed in the metric computation stage. -The same two-stage
RBDS
- The decoding algorithm used in RBDS.c is based on error trapping. The program emulates the operation of the encoder and decoder of a binary cyclic codes, using bitwise shifts and xor for modulo g(x) operations. -The decoding algorithm used in RBDS.c
bch_awgn
- The intention is to show you how to incorporate the AWGN/Rayleigh fading models in the basic decoding program. -The intention is to show you how to incorpor ate the AWGN / Rayleigh fading models in the basi c decoding program.