Generate the digital AWGN signal n[k] (sampled n(t)) by generating zero mean
Gaussian random variables independently (separately) for each k MATLAB function random.
This folder has some scritps that you may find usefull.
All of it comes from questions that I ve received in my email.
If you have a new request/question, feel free to send it to marceloperlin@gmail.com.
But please, don t ask me to do your homework.
Passing_your_param0
This folder contains instructions (and m files) for passing you own initial parameters to the fitting function.
I also included a simple simulation script that will create random initial coefficients
(under the proper bounds) and fit the model to the data.
Image Compression
A collection of simple routines for image compression using different techniques.
圖象壓縮的不同方法
BTCODE:
Image compression Using Block Truncation Coding.
PYRAMID:
Image compression based on Gaussian Pyramids.
DCTCOMPR:
Image compression based on Discrete Cosine Transform.
IMCOMPR:
Image compression based on Singular Value Decomposition.
The given codes can be also used in 2D noise suppression.
Notes:
The function "conv2fft" performs a 2D FFT-based convolution.
Type "help conv2fft" on Matlab command window for more informations.
Abstract:This article elaborats the RFID system,multianalysised the concrete function of RFID middleware,and proposed a kind of
RFID data transmission design model with news transmission mechanism,for realizing data transmission more effectively,
RFID data transmission design model with news transmission mechanism,for realizing data transmission more effectively,
I made a lot of changed on this object,such as *
// 1.Encapsulates all code in one userobjet,since PB does not *
// support "Address of Function" , so we can not set new *
// WndProc, just makes the object more easy to use. *
// 2.Uses structure array instead of Datastore *
// 3.Calc width of menuitem at runtime(MEASUREITEM) *
// 4.Draw disabled status
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC depends on the properties of the
underlying hash function. The HMAC specification in this standard is a generalization of
Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI
X9.71, Keyed Hash Message Authentication Code.
This file contains a C++Builder 4 project called SimplyChaos-X ver 3.1 (SCX31).
SCX31 is an encryption tool. I designed it as my graduation paper work. SCX31 is a symmetric stream cipher built on chaos function, one time pad cipher and inspiration from Ground Effect (aviation). The key length can be up to 40 characters (320 bits).