prajansid

积分:645
上传文件:51
下载次数:1736
注册日期:2012-11-19 02:36:17

上传列表
recentcurve.rar - ADVANTAGE: The main advantage of the NLMS algorithm over the LMS algorithm is the faster convergence for correlated[11] and whitened input and the stableness of the output with the varying range of values independent input data[12]. And to implement a shift input of data the NLMS require additional addition, Multiplication and division over the LMS algorithm. ,2015-12-07 23:07:43,下载2次
pendingcurve.rar - The NLMS (normalized least mean square algorithm) is used in number of signal processing and control applications. It works by adapting the finite impulse response filters co-efficient. The weight vector can be calculated easily by using NLMS the values are stable and faster in convergence[9]. NLMS is the modification of the LMD algorithm.,2015-12-07 23:05:57,下载4次
fastserve.rar - ADVANTAGE: The Main advantage of the LMD is the low computational complexity which is O(L), L is the number of tap weight. DISADVANTAGE: The main disadvantage is low convergence rate and fluctuation which creates problem in tracking and acquisition. ,2015-12-07 23:05:19,下载2次
delayspre.rar - required by the algorithm[8]. The step size parameter controls the convergence speed. Hence the algorithm depends on the step size. The step size is a positive constant value which control the size of increment applied in one iteration to the next. Three factors determines the response of the LMD algorithm they are A. Number of weight B. Step size parameter C. Eigen value of the correlation matrix ,2015-12-07 23:04:41,下载2次
delayreduction.rar - The gradient value changes randomly as per the input vector. When the rate of convergence U is slow, then it will gives good estimation of large amount of data. By sending known pilot sequence to the transmitter the knowledge of the transmitter signal is measured, which re,2015-12-07 23:03:52,下载1次
dealwithit.rar - W(n) represents the weight vector at n, W(n+1) represent weight vector at n+1. U represents the step size which control the convergence speed. The value for the gradient vector is calculated through covariance matrix R and cross-correlation r.,2015-12-07 23:03:27,下载3次
curvedde.rar - Where H represents the hermitian transpose. The complex vector of weight adjust the amplitude and phase. The desired beam can be produced by adding together the MMSE weight adaptation with the steepest decent algorithm produces LMS algorithm[7]. For each new samples the weight vectors are updated, this process is called sample by sample techniques. Because of the successive correction the gradient vector leads to the MMSE. ,2015-12-07 23:01:31,下载5次
DELAY-CAL.rar - The antenna is customize by combining the output of individual sensors and they are scaled based on the corresponding weight. And with the help of minimum squared error the LMS can compute the weight . Spatial filtering involves the signal estimation in receiver by reducing the error with the help of reference signal d(t)[5]. And it has some correlation with desired signal and beam former output y(t). The solution is obtained by iteration using LMS algorithm.,2015-12-07 22:54:54,下载1次
image-processing-(3).rar - The antenna is customize by combining the output of individual sensors and they are scaled based on the corresponding weight. And with the help of minimum squared error the LMS can compute the weight . Spatial filtering involves the signal estimation in receiver by reducing the error with the help of reference signal d(t)[5]. And it has some correlation with desired signal and beam former output y(t). The solution is obtained by iteration using LMS algorithm.,2015-12-07 22:53:42,下载2次
image-processing-(1).rar - . Types of Beamforing Algorithm: The algorithm of the adaptive antenna is classified based on whether training signal is used and not used[1]. It is classified as blind and non-blind algorithm[2]. B. Non-Blind Algorithm: In this algorithm, the training signal is known to both transmitter and receiver the receiver received it transmitter during training period[3] with the training signal the beam former in the receiver can calculate the optimal weight vector. ,2015-12-07 22:52:01,下载2次
Copy-(2)-of-image-processing-(5).rar - The demand in communication capacity is achieved by the employment of the space division multiple access technique. The signal transmitted on the same frequencies can be separated by the smart antenna array and they are separated in spatial domain. Which increase the performance and improved network efficiency of the mobile system. The features of a wireless channels are thin. Hence for some region the characteristics are zero. Since in spatial domain it varies with DOA. For reducing the bandwidth requirement sparsely spaced element is needed for ,2015-12-07 22:46:56,下载3次
1MIMOOFDMestimation.rar - MC-CDMA with SFBC In the next subsections, we describe the architecture of an SFBC MIMO MC-CDMA transmitter, and define the basic terms related to the PAPR of the involved signals. System model In an MC-CDMA system, a block of M information symbols each active user are spread in the frequency domain into N = LM subcarriers, where L represents the spreading factor. This is accomplished by multiplying every symbol of the block for user k, where k ∈ {0,1,..., L - 1}, by a spreading code , ,2015-07-21 02:40:16,下载9次
1MIMO-downlinked.rar - However, to the authors knowledge, the implementation of this idea in the context of MIMO MC-CDMA communications has never been addressed. In this study, our aim is also to develop strategies to alleviate the inherent complexity of the underlying minimization problem. The rest of the article is structured as follows: Section MC-CDMA with SFBC defines basic concepts related to SFBC MC-CDMA. Section PAPR reduction via UR describes the UR technique. Section Dimension reduction is devoted to explore the possibility of reducing the complexity of the optimization problem,2015-07-21 02:39:37,下载14次
1mimo_channel_capacity_simulation.rar - these peak-reducing signals are built by using spreading codes that are either dynamically selected those users that are known to be idle, or deliberately reserved a priorifor PAPR reduction purposes. The concept of adding orthogonal signals for peak power mitigation has been previously proposed to reduce PAPR in Discrete MultiTone and OFDM transmissions[13,27], and also in CDMA downlink systems [28]. ,2015-07-21 02:38:39,下载7次
Channel_MIMO-OFDM_system.rar - CDMA (OFDM-CDMA), offers several key advantages such as immunity against narrowband interference and robustness in frequency-selective fading channels[2]. Such desirable properties make MC-CDMA an attractive choice for the present and future radio-communication systems among these, we have satellite communications,2015-07-21 02:23:32,下载10次
_order_estimation.rar - Several approaches to combine multicarrier modulation with code-division multiple access (CDMA) techniques have been proposed with the aim of bringing the best of both worlds to wireless communications [1]. Among these, multi-carrier CDMA (MC-CDMA), also known as orthogonal frequency division multiplexing ,2015-07-21 02:22:46,下载6次
tryfinalLMS_Equalizer.rar - 4. 16QAM uses a mix of amplitudes and phases to achieve 4 bits/Hz. In this example, there are three amplitudes and 12 phase shifts. While QAM is enormously efficient of spectrum, it is more difficult to demodulate in the presence of noise, which is mostly random amplitude variations. Linear power amplification is also required. QAM is very widely used in cable TV, Wi-Fi wireless local-area networks (LANs), satellites, and cellular telephone systems to produce maximum data rate in limited bandwidths. ,2015-07-04 19:58:33,下载4次
satellite.rar - Quadrature Amplitude Modulation (QAM) The creation of symbols that are some combination of amplitude and phase can carry the concept of transmitting more bits per symbol further. This method is called quadrature amplitude modulation (QAM). For example, 8QAM uses four carrier phases plus two amplitude levels to transmit 3 bits per symbol. ,2015-07-04 19:58:00,下载1次
QpskinRayleighfading.rar - While Multiple Phase Shift Keying (M-PSK) is much more spectrally efficient, the greater the number of smaller phase shifts, the more difficult the signal is to demodulate in the presence of noise. The benefit of M-PSK is that the constant carrier amplitude means that more efficient nonlinear power amplification can be used. ,2015-07-04 19:57:26,下载1次
Microwave.rar - 8-PSK uses eight symbols with constant carrier amplitude 45° shifts between them, enabling three bits to be transmitted for each symbol. 16-PSK uses 22.5° shifts of constant amplitude carrier signals. This arrangement results in a transmission of 4 bits per symbol. ,2015-07-04 19:55:10,下载1次
comparison.rar - QPSK produces two bits per symbol, making it very spectrally efficient. QPSK can be referred to as 4-PSK because there are four amplitude-phase combinations. By using smaller phase shifts, more bits can be transmitted per symbol. Some popular variations are 8-PSK and 16-PSK.,2015-07-04 19:53:47,下载2次
ALL-LAB-EXP.rar - all m.tech lap experiment are available in this zip file.. un compress to use that... thank you,2015-06-20 20:00:35,下载1次
security-key.rar - Multi-carrier modulation (MCM) is a method of transmitting data by splitting it into several components, and sending each of these components over separate carrier signals,2015-06-20 19:58:42,下载1次
QpskinRayleighfading.rar - MCM was first used in analog military communications in the 1950s. Recently, MCM has attracted attention as a means of enhancing the bandwidth of digital communications over media with physical ,2015-06-20 19:58:01,下载1次
finalLMS_Equalizer.rar - Also see orthogonal frequency-division multiplexing ( OFDM ), frequency-division multiplexing ( FDM ), and time-division multiplexing ( TDM ).,2015-06-20 19:57:05,下载4次
4-BIT-ADDITION.rar - 4 bit addition, 4 bit multiplication , 4 bit substraction , 4 bit division,2015-06-20 19:53:29,下载1次
Journal1.rar - journal one for the UPFC voltage profile and power measurement,2015-02-26 01:43:51,下载10次
topsis.rar - topsis college selection,2015-02-26 01:22:48,下载15次
Hamming_Code.zip - This code is very useful to find the hamming distance ,2015-01-11 14:56:31,下载5次
fingerprint_recog.rar - fingerprint recognization with more dip results,2014-11-05 00:20:25,下载7次
An-Efficient-and-Robust-Addressing-Protocol.rar - Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure. Autonomous addressing protocols require a distributed and self-managed mechanism to avoid address collisions in a dynamic network with fading channels, frequent partitions, and joining/leaving nodes. We propose and analyze a lightweight protocol that configures mobile ad hoc nodes based on a distributed address stored in filters that reduces the control load and makes the proposal robust to packet losses and network partitions. We evaluate the performance of our protocol, considering joining nodes, partition merging events, and network initialization. Simulation results show that our protocol resolves all the address collisions and also reduces the control traffic when compared to previously proposed protocols.,2014-10-09 18:15:21,下载1次
Importance-of-Coherence-Protocols-with.rar - As Internet and information technology have continued developing, the necessity for fast packet processing in computer networks has also grown in importance. All emerging network applications require deep packet classification as well as security-related processing and they should be run at line rates. Hence, network speed and the complexity of network applications will continue increasing and future network processors should simultaneously meet two requirements: high performance and high programmability. We will show that the performance of single processors will not be sufficient to support future demands. Instead, we will have to turn to multicore processors, which can exploit the parallelism in network workloads. In this paper, we focus on the cache coherence protocols which are central to the design of multicore-based network processors. We investigate the effects of two main categories of various cache coherence protocols with several network workloads on multicore processors.,2014-10-09 16:38:45,下载2次
duty_cycle.rar - DOWNLINK SCHEDULING FOR THE BETTER OUTPUT ON DOWNLINK SCHEDULING OF DOWNLINK SCHEDULING BASED DOWNLINK SCHEDULING PAPERS,2014-08-01 12:23:40,下载6次
bldc-MOTOR-SPEED.rar - THE MOTOR SPEED CAN BE CONTROLLED AND FORWARD AND REVERSE DIRECTION CAN ALSO BE MENTIONED,2014-08-01 12:20:32,下载16次
examples.rar - Patch-Based Image Warping for Content-Aware Retargeting using seam carving image retargeting ,2014-07-07 19:45:37,下载25次
xml-ree-pattern.rar - With XML becoming a ubiquitous language for data interoperability purposes in various domains, efficiently querying XML data is a critical issue. This has lead to the design of algebraic frameworks based on tree-shaped patterns akin to the tree-structured data model of XML. Tree patterns are graphic representations of queries over data trees. They are actually matched against an input data tree to answer a query. Since the turn of the 21st century, an astounding research effort has been focusing on tree pattern models and matching optimization (a primordial issue). This paper is a comprehensive survey of these topics, in which we outline and compare the various features of tree patterns. We also review and discuss the two main families of approaches for optimizing tree pattern matching, namely pattern tree minimization and holistic matching. We finally present actual tree pattern-based developments, to provide a global overview of this significant research topic.,2014-03-22 16:01:10,下载4次
Matlab62.zip - MATLAB CODING ELECTRICAL SYSTEM POWER ELECTRONICS ,2014-03-21 22:26:02,下载5次
evaluating-data-reliability.rar - There are many available methods to integrate information source reliability in an uncertainty representation, but there are only a few works focusing on the problem of evaluating this reliability. However, data reliability and confidence are essential components of a data warehousing system, as they influence subsequent retrieval and analysis. In this paper, we propose a generic method to assess data reliability from a set of criteria using the theory of belief functions. Customizable criteria and insightful decisions are provided. The chosen illustrative example comes from real-world data issued from the Sym’Previus predictive microbiology oriented data warehouse. ,2014-02-08 18:21:29,下载5次
attribute-based.rar - This project presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. The scheme is efficient and flexible because MCP-ABE allows a content provider to specify an access policy and encrypt multiple messages within one ciphertext such that only the users whose attributes satisfy the access policy can decrypt the ciphertext. Moreover, the paper shows how to support resource-limited mobile devices by offloading computational intensive operations to cloud servers while without compromising data privacy,2014-02-08 18:13:52,下载11次
Enabling-dynamic-data-and-mutual-trust.rar - Ad hoc networks are new paradigm of networks offering unrestricted mobility without any underlying infrastructure. ROUTING is one of the most basic networking functions in mobile ad hoc networks. In partitioned networks, same addresses can exist between partitioned networks. Therefore, when several partitioned networks or independent networks merge into one network, potential address conflicts must be resolved. The address conflicts are detected through a DAD (Duplicate Address Detection) procedure. In reference 1, authors introduced three schemes: PDAD-RREQ Never- Sent (RNS), PDAD-RREP-Without-RREQ (RwR), and PDAD-2RREPs-on-RREQ (2RoR). These schemes can detect conflicts of a set of nodes but not all the duplicates and with a higher scope of false positives. This paper presents an adaptive version of PDAD. ,2013-12-22 19:26:04,下载2次
AML-Efficient-Approximate-Membership.rar - AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.,2013-12-15 16:45:53,下载4次
38524738image_restore.rar - E-Cruitment Solutions is an ISO 9001:2008 certified HR & Software Development Company growing irreversibly in the field of Human Resource ,Web Design, Software Development, E-Commerce and Search Engine Optimization. We provide solutions for complete online presence using ASP.NET, HTML & PHP. We are an India’s Most Trusted Company with ISO 9001:2008 Certification. We also provide all the services that a company needs to get online, from web designing to development & to web hosting and above all website promotion in Google, Yahoo, MSN, AOL, Bing and other search engines. We have highly satisfied clients that are being serviced 24x7 by our team of over 30+ experienced and dedicated professionals. So you can deal with just one supplier and leave the rest to us - freeing you to focus on your business. ,2013-06-21 01:37:33,下载4次
dengu-project-(2).zip - E-Cruitment Solutions is an ISO 9001:2008 certified HR & Software Development Company growing irreversibly in the field of Human Resource ,Web Design, Software Development, E-Commerce and Search Engine Optimization. We provide solutions for complete online presence using ASP.NET, HTML & PHP. We are an India’s Most Trusted Company with ISO 9001:2008 Certification. We also provide all the services that a company needs to get online, from web designing to development & to web hosting and above all website promotion in Google, Yahoo, MSN, AOL, Bing and other search engines. We have highly satisfied clients that are being serviced 24x7 by our team of over 30+ experienced and dedicated professionals. So you can deal with just one supplier and leave the rest to us - freeing you to focus on your business. ,2013-06-21 01:31:50,下载7次
hybrid.zip - E-Cruitment Solutions is an ISO 9001:2008 certified HR & Software Development Company growing irreversibly in the field of Human Resource ,Web Design, Software Development, E-Commerce and Search Engine Optimization. We provide solutions for complete online presence using ASP.NET, HTML & PHP. We are an India’s Most Trusted Company with ISO 9001:2008 Certification. We also provide all the services that a company needs to get online, from web designing to development & to web hosting and above all website promotion in Google, Yahoo, MSN, AOL, Bing and other search engines. We have highly satisfied clients that are being serviced 24x7 by our team of over 30+ experienced and dedicated professionals. So you can deal with just one supplier and leave the rest to us - freeing you to focus on your business. ,2013-06-21 01:25:45,下载4次
A-Dual-Framework-and-Algorithms-for-Targeted-Onli - java coding for data leakage dtection,2013-03-18 17:14:55,下载3次
2004.rar - matlab coding for dip,2012-11-19 03:16:52,下载4次
watershade-based-edge-detection.rar - MATLAB CODING FOR EDGE DETECTION,2012-11-19 03:14:37,下载4次
switching.rar - MATLAB CODING FOR SWITCHING BILATERAL,2012-11-19 03:06:35,下载7次
43124971SPIHT(Matlab).rar - MATLAB CODING FOR IMAGE PROCESS,2012-11-19 02:56:52,下载6次
code.rar - JAVA CODING FOR ENABLING PUBLIC AUDITING ,2012-11-19 02:54:30,下载4次
JPDCS2--Data-integrity-proofs-in-cloud-storage.ra - DOT SOURCE CODE FOR IEEE PROJECT,2012-11-19 02:50:12,下载38次

近期下载

收藏