亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Cyber-Physical

  • Professional+Live+Communications+Server

    If you would like to follow along with some of the steps outlined in this book, we recommend that you deploy Live Communications Server 2005 SP1 on a physical or virtual server running Microsoft Windows Server 2003. To run Communicator 2005, you will need a physical or virtual PC running Windows XP or Windows Server 2003. To fully test Microsoft Office integration with Communicator 2005, you need to be running Microsoft Office 2003 with Service Pack 2.

    標簽: Communications Professional Server Live

    上傳時間: 2020-05-31

    上傳用戶:shancjb

  • Propagation Channel Characterization

    The investigation of the propagation channel is becoming more and more important in mod- ern wireless communication. The demand for spectral efficiency motivates exploitation of all channels that can possibly be used for communications. Nowadays, a common trend for designing physical layer algorithms is to adapt the transceiving strategy, either by maximizing the diversity gains or by utilizing the coherence of the channels to improve the signal-to-noise power ratio.

    標簽: Characterization Propagation Channel

    上傳時間: 2020-05-31

    上傳用戶:shancjb

  • Propagation Handbook for Wireless Communication

    Wireless means different things to different people. For this book, it refers to the radio systems that provide point-to-point, point-to-multipoint, and Earth-space communications over transmission links that propagate outside buildings through the lower atmosphere. Wireless systems are being built that provide data transmission between computers and other devices on one’s own desk. These are part of the wireless world but not the part where, except for interference perhaps, the atmosphere has any influence. The intent of this book is to provide a description of the physical phenomena that can affect propagation through the atmosphere, present sample measurements and statistics, and provide models that system designers can use to calculate their link budgets and estimate the limitations the atmosphere may place on their design.

    標簽: Communication Propagation Handbook Wireless for

    上傳時間: 2020-05-31

    上傳用戶:shancjb

  • Telecommunications Essentials

    I love telecommunications. It is powerful and it empowers, with far-reaching consequences. It has demonstrated the potential to transform society and business, and the revolution has only just begun. With the invention of the telephone, human communications and commerce were forever changed: Time and distance began to melt away as a barrier to doing business, keeping in touch with loved ones, and being able to immediately respond to major world events. Through the use of computers and telecommunications networks, humans have been able to extend their powers of thinking, influence, and productivity, just as those in the Industrial Age were able to extend the power of their muscles, or physical self, through use of heavy machinery. 

    標簽: Telecommunications Essentials

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Time-Varying Channels

    Wireless communications has become a field of enormous scientific and economic interest. Recent success stories include 2G and 3G cellular voice and data services (e.g., GSM and UMTS), wireless local area networks (WiFi/IEEE 802.11x), wireless broadband access (WiMAX/IEEE 802.16x), and digital broadcast systems (DVB, DAB, DRM). On the physical layer side, traditional designs typically assume that the radio channel remains constant for the duration of a data block. However, researchers and system designers are increasingly shifting their attention to channels that may vary within a block. In addition to time dispersion caused by multipath propagation, these rapidly time-varying channels feature frequency dispersion resulting from the Doppler effect. They are, thus, often referred to as being “doubly dispersive.”

    標簽: Time-Varying Channels

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Smart Grid Security

    The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to know what he or she is protecting and where to pri- oritize. Just as someone should not spend $100 to protect something worth $10, one cannot be blind to the other disciplines.

    標簽: Security Smart Grid

    上傳時間: 2020-06-07

    上傳用戶:shancjb

  • Computational+RFID

    Sensors are points ofcontact betweenthe material world ofatoms, mass, andenergy and the seemingly immaterial world of information, computation, and cognition. Linking these two domains more tightly yields all sorts of practical benefits, such as improvedinputdevicesforcomputers,moreeffectivemedicaldevices(implantedor worn), more precise agricultural operations, better monitored buildings or bridges, more secure payment systems, and more reliable sensor–actuator control systems. There are many settings in which tighter coupling between digital and physical planes can enhance safety, security, performance, and reliability.

    標簽: Computational RFID

    上傳時間: 2020-06-08

    上傳用戶:shancjb

  • Design and Construction of an RFID Infrastructure

    The next avatar of the Internet will revolutionize our world. In time, it will provide us a universal remote control, enabling us to monitor and control physical objects located anywhere on the planet, using a smart phone. It will make the universe around us programmable, allowing us to script the behav- ior of physical objects with electronic commands. This book is about such an emerging new version of the Internet.

    標簽: Infrastructure Construction Design RFID and an of

    上傳時間: 2020-06-08

    上傳用戶:shancjb

  • RFID+Security

    Radio frequency identification (RFID) is a type of automatic identification systems which has gained popularity in recent years for being fast and reliable in keeping track of the individual objects. In RFID systems, contactless object identification is achieved using radio signals without the need for physical contact as the case with other existing identification technologies such as barcodes. Therefore, a huge number of items can be identified in a short amount of time with high reliability and low cost which makes the RFID technology very attractive for a wide range of applications such as supply chain management, e-health, monitoring humans, pets, animals, and many other objects, toll control, and electrical tagging. Furthermore, RFID technology eliminates the human error and reduces the total cost of the products.

    標簽: Security RFID

    上傳時間: 2020-06-08

    上傳用戶:shancjb

  • RFID-WSN+Integrated+Architecture

    Radio frequency identification (RFID) and Wireless sensor networks (WSN) are the two key wireless technologies that have diversified applications in the present and the upcoming systems in this area. RFID is a wireless automated recognition technology which is primarily used to recognize objects or to follow their posi- tion without providing any sign about the physical form of the substance. On the other hand, WSN not only offers information about the state of the substance and environment but also enables multi-hop wireless communications.

    標簽: Architecture Integrated RFID-WSN

    上傳時間: 2020-06-08

    上傳用戶:shancjb

主站蜘蛛池模板: 康平县| 喀什市| 建德市| 徐汇区| 车致| 肥西县| 宣城市| 农安县| 华阴市| 绥江县| 卢氏县| 和平区| 锡林浩特市| 丹棱县| 旬阳县| 南阳市| 贺兰县| 安西县| 黔西| 临朐县| 安多县| 壤塘县| 清河县| 清丰县| 江津市| 大姚县| 海淀区| 托里县| 壶关县| 荆州市| 祁阳县| 涡阳县| 白沙| 洪雅县| 江永县| 高陵县| 彩票| 深州市| 周至县| 璧山县| 观塘区|