搜索资源列表
lpc_2.4kbps
- LPC 2.4kbps codec meeting Federal Standard 1016 CELP implementation-LPC 2.4kbps codec meeting Federal Standar d 1016 CELP implementation
OWT_SURELET
- 速度非常块,效果接近blsgsm。堪称去噪的又一突破。 OWT SURE-LET SOFTWARE FOR MATLAB ******************************** Florian Luisier, Thierry Blu and Michael Unser Biomedical Imaging group Swiss Federal Institute of Technology Lausanne (EPFL), Switzerland.
uCOS-2
- μC/OS-II已经在世界范围内得到广泛使用,包括诸多领域,如手机、路由器、集线器、不间断电源、飞行器、医疗设备及工业控制等。实际上,μC/OS-II已经通过了非常严格的测试,并且得到了美国航空管理局(Federal Aviation Administration)的认证,可以用在飞行器上。这说明μC/OS-II是稳定可靠的,可用于与人性命攸关的安全紧要(safety critical)系统;当然,也可用于非安全紧要系统。
test
- SHA-1(Secure Hash Algorithm)是美国国家标准局(National Institute of Standard and Technology NIST)为了配合数位签章演算法(Digital Signature Algorithm DSA)的使用所发布的联邦资讯处理标准-FIPS PUB 180-1(Federal Information Processing Standard Publication 180-1),而SHA-1 则是SHA-1 (FIPS180)的改良版
Design of Systems on a Chip-Design and Test
- Design of Systems on a Chip: Design and Test Edited by Ricardo Reis Federal University of Rio Grande do Sul Marcelo Lubaszewski Federal University of Rio Grande do Sul and Jochen A.G. Jess Eidhoven University of Technology
lianbanglvbo.rar
- 一个联邦滤波的程序,可以实现比KF更高的滤波精度,A federal filtering program, can achieve a higher filtering accuracy than the KF
Chat.zip
- VC++开发的基于HLa的聊天控制台程序,在控制台中设置创建联邦,加入联邦及联邦成员互发消息,VC++ developers HLa chat console-based program, set the console to create the Federation to join the Federation and Federal members of the inter-send an announcement
celp48
- Visual C++ 6.0环境下的CELP48工程,是美国联邦标准FED-STD 1016的参考代码,可以进行语音信号的编码和解码。另外还可以方便地进行调试和跟踪。-Visual C++ 6.0 environment CELP48 project is the U.S. Federal Standard FED-STD 1016 reference code, voice encoding and decoding signals. It also can easily debug and
Melp_C.Code
- Melp Federal Vocoder 2.4 kbps low bit rate high qualitytexas instrument Melp encoder decoder c-code working great with good quality melp vocoding system
DES_report1
- The Data Encryption Standard (DES) is a published federal encryption standard created to protect unclassified computer data and communications. The DES algorithm is the most widely used encryption algorithm in the world
ferret
- FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information.
sha256.java
- Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
MELP
- MELP The New Federal Standard at 2400 Bps
05.maps-2582kk
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
232dd
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
(5)
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
(6)
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
(7)
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
(8)
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.
(16)
- What emerges on page after page of the federal government’s corruption investigation is that so many of the alleged deals happened in places that are almost visual clichés about New Jersey corruption.-What emerges on page after page of the federal go