当前位置:网站首页>[matlab] matlab simulation modulation system - DSB system
[matlab] matlab simulation modulation system - DSB system
2022-07-04 05:00:00 【Embedded workplace】
Catalog
1、DSB System
close all;
clear all;
clc;
fm = 1; % Maximum frequency of source
fc = 10; % Carrier center frequency
dt = 0.001; % Time sampling interval
T = 5; % Signal duration
t = 0:dt:T;
mt = cos(2*pi*fm*t); % baseband signal
%DSB Modulated signal
s_dsb = mt.*cos(2*pi*fc*t);
% % Generate narrow-band Gaussian white noise
% B = 2*fm;
% N0 = 0.01; % White noise unilateral power spectral density
% noise = noise_nb(fc,B,N0,t);
% s_dsb = s_dsb+noise;
figure(1);
subplot(2,1,1); plot(t,mt,'b-');
xlabel('t (s)'); title(' baseband signal ');
grid on;
subplot(2,1,2); plot(t,s_dsb,'b-');
hold on; plot(t,mt,'r:');
xlabel('t 边栏推荐
- 简单g++和gdb调试
- Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3
- Kivy tutorial custom fonts (tutorial with source code)
- 6-5 vulnerability exploitation SSH weak password cracking and utilization
- cmake
- Test cs4344 stereo DA converter
- Secondary vocational group network security - memory Forensics
- Introduction and application of rampax in unity: optimization of dissolution effect
- 附件六:防守工作简报.docx
- 在代碼中使用度量單比特,從而生活更美好
猜你喜欢
随机推荐
6-4漏洞利用-SSH Banner信息获取
6-4 vulnerability exploitation SSH banner information acquisition
附件六:防守工作簡報.docx
RPC - grpc simple demo - learn / practice
【MATLAB】MATLAB 仿真模拟调制系统 — FM 系统
网络设备应急响应指南
中科磐云—模块A 基础设施设置与安全加固 评分标准
Developing mqtt access program under QT
6-5 vulnerability exploitation SSH weak password cracking and utilization
Zkevm (12) state proof of appliedzkp
【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
@Feignclient comments and parameters
每日刷题记录 (十二)
A summary of the 8544 problem that SolidWorks Standard cannot obtain a license
Several smart watch related chips Bluetooth chip low power consumption
We believe that the development of consumer Internet will still be limited to the Internet industry itself
Introduction and application of rampax in unity: optimization of dissolution effect
Headache delayed double deletion
加密和解密
Annex 4: scoring criteria of the attacker docx









