搜索资源列表
rach_72jilian
- 5G中的前导序列的生成和检测。对5G前导的学习具有非常大的意义-5G u4E2D u7284 u5B0 u5B0 u5B03 u5B03 u5B03 u5128 U7684 u610F u4E49
mobile-core-network
- 介绍2G 3G 4G 5G移动核心网的构成和主要协议和运行商的运营模式 很有参考价值-Introduction 2G 3G 4G 5G mobile core network composition and the main agreement and the operating mode of the operator is very valuable
OQAM_postprocessing
- 针对5G新波峰技术之一的FBMC技术的QAM调制例程-QAM modulation routines for FBMC technology, one of 5G s new peak technologies
qiandaoformat4chongfu
- 5G中前导方案中的format4方案,对于初学者可以参考,也可以了解新的前导设计方案。-5G u4E2 u5B0 u5B0 u5B0 u5B0 u8B0 u8B2 u4E2 U89E3 u65B0 u5B0
qd_lte_71_jc
- 5G中前导序列的生成,这是采用的71长的zc序列,并包含前导序列的检测部分-5G u4E2D u5B2 u5B05 u5B03 u5226 u5126 u7R09 U5E8F u5217 u7684 u68C0 u6D4B u90E8 u5206 uFF0C uFF0C uFF0C uFF0C
802.3协议
- 802.3相关协议,2.5G/5G/25G/40G/100G(802.3 related protocols, include 2.5G/5G/25G/40G/100G)
Bandwidth
- Expirmental Evaluation
BER&SIC
- Mathimatics calcuations on BER and SIC in 5G NOMA network
semi01
- LTE 5g simulations on matlab
From_1G_to_5G_Simon (1)
- from 1g to 5g mobile communication
CP FBMC.m
- Filter Bank Multi-carrier compressed Sensing MCSM
presentation 5G
- perfect presentation explained the fbmc modulations
DiskClear
- 磁盘自动清理工具...自动监测程序所在磁盘剩余空间小于5G时,自动删除备份...(Automatically clean the backup disk automatically when the remaining space of the disk is less than 5G...)
OSIC_detector4
- TECHNIQUE FOR MULTIPLE ACCESSING
FULLTEXT01
- understanding fifth generation
SCMA
- 5G通信系统中noma候选方案scma发送端和接收端设计(the matlab code for SCMA in 5G)
SCMA
- 华为的5G非正交多址(NOMA)方案SCMA的仿真(Huawei's 5G non-orthogonal multiple access scheme SCMA simulation)
polar code2
- 根据华为5G创新大赛polar code部分提供的材料编写的polar code仿真代码,包含SC、SCL、BP三种译码算法。代码实现过程和所提供的材料保持高度一致,便于理解。(According to the Huawei 5G Innovation Competition Polar Code part ,the code is including SC and SCL two decoding algorithms. The code implementation process is h
NOMA Presentation1
- Non orthogonal multiple access scheme, comparison between wave form candidates in 5G communiaction sysytems
5G evolution of user mobile security
- In this paper they have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabili