亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

COMPUTER-controlled

  • Numerical Techniques in Electromagnetics

    Theartofcomputationofelectromagnetic(EM)problemshasgrownexponentially for three decades due to the availability of powerful computer resources. In spite of this, the EM community has suffered without a suitable text on the computational techniques commonly used in solving EM-related problems. Although there have been monographs on one particular technique or another, the monographs are written for the experts rather than students. Only a few texts cover the major techniques and dothatinamannersuitableforclassroomuse.Itseemsexpertsinthisareaarefamiliar with one or a few techniques but not many seem to be familiar with all the common techniques. This text attempts to fill that gap.

    標(biāo)簽: Electromagnetics Techniques Numerical in

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Optical Wireless Communication Systems

    Optical wireless communication is an emerging and dynamic research and development area that has generated a vast number of interesting solutions to very complicated communication challenges. For example, high data rate, high capacity and minimum interference links for short-range communication for inter-building communication, computer-to-computer communication, or sensor networks. At the opposite extreme is a long-range link in the order of millions of kilometers in the new mission to Mars and other solar system planets.

    標(biāo)簽: Communication Wireless Optical Systems

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    標(biāo)簽: Communications Physical Security Wireless Layer in

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Principles+of+Communication+Systems+Simulation

    This book is a result of the recent rapid advances in two related technologies: com- munications and computers. Over the past few decades, communication systems have increased in complexity to the point where system design and performance analysis can no longer be conducted without a significant level of computer sup- port. Many of the communication systems of fifty years ago were either power or noise limited. A significant degrading effect in many of these systems was thermal noise, which was modeled using the additive Gaussian noise channel. 

    標(biāo)簽: Communication Principles Simulation Systems of

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Principles+of+digital+communication

    Communication has been one of the deepest needs of the human race throughout recorded history. It is essential to forming social unions, to educating the young, and to expressing a myriad of emotions and needs. Good communication is central to a civilized society. The various communication disciplines in engineering have the purpose of providing technological aids to human communication. One could view the smoke signals and drum rolls of primitive societies as being technological aids to communication, but communication technology as we view it today became important with telegraphy, then telephony, then video, then computer communication, and today the amazing mixture of all of these in inexpensive, small portable devices.

    標(biāo)簽: communication Principles digital of

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Protocol Engineering

    Communication protocols – for short protocols – form the basis for the opera- tion of computer networks and telecommunication systems. They are behavior conventions which describe how communication systems interact with each other in computer networks. Protocols define the temporal order of the interactions and the formats of the data units exchanged. Communication protocols comprise a wide range of different functions and mechanisms, such as the sending and receiv- ing of data units, their coding/decoding, error control mechanisms, timer control, flow control, and many others. 

    標(biāo)簽: Engineering Protocol

    上傳時(shí)間: 2020-05-31

    上傳用戶:shancjb

  • Simulation of Communication Systems

    Since the first edition of the book was published, the field of modeling and simulation of communication systems has grown and matured in many ways, and the use of simulation as a day-to-day tool is now even more common practice. Many new modeling and simulation approaches have been developed in the recent years, many more commercial simulation packages are available, and the evolution of powerful general mathematical applications packages has provided still more options for computer-aided design and analysis. With the current interest in digital mobile communications, a primary area of application of modeling and simulation is now to wireless systems of a different flavor than the traditional ones.

    標(biāo)簽: Communication Simulation Systems of

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

  • Virtualization Essentials

    The information age is exploding around us, giving us access to dizzying amounts of data the instant it becomes available. Smart phones and tablets provide an untethered experience that offers stream- ing video, audio, and other media formats to just about any place on the planet. Even people who are not “computer literate” use Facebook to catch up with friends and family, use Google to research a new restaurant choice and print directions to get there, or Tweet their reactions once they have sampled the fare. The budding Internet-of-things will only catalyze this data eruption. The infrastructure supporting these services is also growing exponentially, and the technology that facilitates this rapid growth is virtualization.

    標(biāo)簽: Virtualization Essentials

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

  • Wireless+Communications+Resource+Management

    Wirelesscommunications,especiallyinitsmobileform,hasbroughtusthefreedomofmobility andhaschangedthelifestylesofmodernpeople.Waitingatafixedlocationtoreceiveormakea phone call, or sitting in front of a personal computer to send an e-mail or download a video program, has become an old story. Nowadays it is commonplace for people to talk over a cell phonewhilewalkingonthestreet,ortodownloadandwatchamoviewhiletravelingonatrain. Thisisthebenefitmadeavailabletousbythesuccessfulevolutionofwirelesscommunications over three generations, with the fourth generation being under way.

    標(biāo)簽: Communications Management Wireless Resource

    上傳時(shí)間: 2020-06-01

    上傳用戶:shancjb

  • ESD - Failure Mechanisms and Models

    Failure analysis is invaluable in the learning process of electrostatic discharge (ESD) and electrical overstress (EOS) protection design and development [1–8]. In the failure analysis of EOS, ESD, and latchup events, there are a number of unique failure analysis processes andinformationthatcanprovidesignificantunderstandingandillumination[4].Today,thereis still no design methodology or computer-aided design (CAD) tool which will predict EOS, ESDprotectionlevels,andlatchupinasemiconductorchip;thisisoneofthesignificantreasons why failure analysis is critical to the ESD design discipline.

    標(biāo)簽: Mechanisms Failure Models ESD and

    上傳時(shí)間: 2020-06-05

    上傳用戶:shancjb

主站蜘蛛池模板: 黑龙江省| 大连市| 恭城| 盐亭县| 巍山| 湟中县| 龙泉市| 万州区| 治县。| 大荔县| 靖江市| 灵山县| 鸡西市| 原阳县| 文成县| 抚远县| 方山县| 南华县| 夹江县| 永昌县| 秀山| 通辽市| 宜昌市| 东丽区| 双城市| 昔阳县| 来宾市| 周宁县| 罗平县| 黄石市| 宁城县| 昭通市| 焉耆| 镇巴县| 黔西县| 若羌县| 平安县| 秦皇岛市| 泽库县| 会昌县| 商南县|