xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661).
L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user
sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP
servers. Another important application is Virtual Private Networks where
the I ...
This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces.
Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combi ...
contains documents relating to improvement of adaptive beamforming using mixed norm algorithm, combination of lms with smi algorithm, sample code for implementation of lms in matlab
PseudoQ is an open source java application for creating, playing and solving SuDoku puzzles of various types. It features both a Swing GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute force search of every possible combination.
for entropy
H = entropy(S)
this command will evaluate the entropy of S, S should be row matrix
H = entropy([X Y Z])
this command will find the joint entropy for the 3 variables
H = entropy([X,Y],[Z,W])
this will find H(X,Y/Z,W).. you can use it for any combination of joint entropies
...
The 4.0 kbit/s speech codec described in this paper is based on a
Frequency Domain Interpolative (FDI) coding technique, which
belongs to the class of prototype waveform Interpolation (PWI)
coding techniques. The codec also has an integrated voice
activity detector (VAD) and a noise reduction capabi ...
The AZ1117 is a series of low dropout three-terminal regulators with a dropout of 1.15V at 1A output current.
The AZ1117 series provides current limiting and thermal shutdown. Its circuit includes a trimmed bandgap reference to assure output voltage accuracy to be within 1% for 1.5V, 1.8V, 2.5V, 2.8 ...
The recent developments in full duplex (FD) commu-
nication promise doubling the capacity of cellular networks using
self interference cancellation (SIC) techniques. FD small cells
with device-to-device (D2D) communication links could achieve
the expected capacity of the future cellular networks (5G ...
When we started thinking about writing the first edition of this book a few years ago, we had been
working together for more than five years on the borderline between propagation and signal processing.
Therefore, it is not surprising that this book deals with propagation models and design tools for ...
This paper presents a Hidden Markov Model (HMM)-based speech
enhancement method, aiming at reducing non-stationary noise from speech
signals. The system is based on the assumption that the speech and the noise
are additive and uncorrelated. Cepstral features are used to extract statistical
informati ...