移動(dòng)ip書(shū)籍,很有用。 THIRD Generation (3G) mobile offers access to broadband multimedia services - and in the future most of these, even voice and video, will be IP-based. However 3G networks are not based on IP technologies, rather they are an evolution from existing 2G networks. Much work needs to be done to IP QoS and mobility protocols and architectures for them to be able to provide the functionality 3G requires.
上傳時(shí)間: 2013-12-16
上傳用戶:moerwang
Space-Time Processing for CDMA Mobile Communications.Written for research students and design engineers, this book addresses many basic questions related to the use of space-time processing in CDMA-based THIRD-generation systems
標(biāo)簽: Communications Space-Time Processing for
上傳時(shí)間: 2014-01-13
上傳用戶:cooran
Already the industry standard for Python users, Programming Python from O Reilly just got even better. This THIRD edition has been updated to reflect current best practices and the abundance of changes introduced by the latest version of the language, Python 2.5
標(biāo)簽: Python Programming industry standard
上傳時(shí)間: 2013-12-13
上傳用戶:zgu489
采用MATLAB編寫(xiě)的最新三維數(shù)據(jù)圖形界面,運(yùn)用GUI編程,輸入函數(shù)名:volumization (data, n )即可。其中DATA的格式為:[n x m x p];n表示顯示方式: 1 - all, 2 - every second, 3 - every THIRD。
標(biāo)簽: MATLAB 編寫(xiě) 數(shù)據(jù) 圖形
上傳時(shí)間: 2014-11-22
上傳用戶:縹緲
用20個(gè)示例項(xiàng)目的方式介紹Matlab/Simulink。內(nèi)容包括: *Contains over 20 hands-on projects in MATLAB(with code) integrated throughout the book *Includes a complete introduction to Simulink *Accompanied by a CD-ROM containing MATLAB examples, source code, THIRD party simulations & projects *Suitable for self-study and professional licensing exams *Designed for the reader who does not have extensive math and programming experience *Contains many practical applications of MATLAB and Simulink
標(biāo)簽: Contains Simulink hands-on projects
上傳時(shí)間: 2014-01-03
上傳用戶:hj_18
C語(yǔ)言編程經(jīng)典教程,The.C...Programming.Language.THIRD.Edition.Addison.Wesley.Bjarne.Stroustrup
上傳時(shí)間: 2016-10-22
上傳用戶:cx111111
After the successful global introduction during the past decade of the second generation (2G) digital mobile communications systems, it seems that the THIRD generation (3G) Universal Mobile Communication System (UMTS) has finally taken off, at least in some regions. The plethora of new services that are expected to be offered by this system requires the development of new paradigms in the way scarce radio resources should be managed. The Quality of Service (QoS) concept, which introduces in a natural way the service differentiation and the possibility of adapting the resource consumption to the specific service requirements, will open the door for the provision of advanced wireless services to the mass market.
標(biāo)簽: the introduction successful generation
上傳時(shí)間: 2013-12-30
上傳用戶:qq21508895
Z是模型一單位雨衰值,也是不考慮衰減因子的單位雨衰值 F是First,即第一模型的情況 F16 F165 F17分別是16GHz 16.5GHz 17GHz的情況,是模型一大氣層下總雨衰值 F18km是模型一下18km實(shí)例的雨衰值 S是Second,即第二模型的情況 S16 S165 S17分別是16GHz 16.5GHz 17GHz的情況,是模型二大氣層下總雨衰值 S16m S165m S17m分別是16GHz 16.5GHz 17GHz在模型二下每公里雨衰值 S1618km S16518km S1718km分別是16GHz 16.5GHz 17GHz在模型二下18km實(shí)例的雨衰值 T是THIRD,即第三模型的情況 T16 T165 T17分別是16GHz 16.5GHz 17GHz的情況,是模型三大氣層下總雨衰值 T16m T165m T17m分別是16GHz 16.5GHz 17GHz在模型三下每公里雨衰值 T1618km T16518km T1718km分別是16GHz 16.5GHz 17GHz在模型三下18km實(shí)例的雨衰值 zhaosheng是只考慮天線噪聲溫度對(duì)雷達(dá)最大探測(cè)距離的影響 yushuai是綜合考慮天線噪聲溫度和雨衰減對(duì)雷達(dá)最大探測(cè)距離的影響 其中,參數(shù)情況在各個(gè)程序中都有說(shuō)明
上傳時(shí)間: 2013-12-25
上傳用戶:songrui
This program is about Compilers.A source routine that need to be compiled need process three sections.It is about the THIRD section.
標(biāo)簽: need Compilers compiled program
上傳時(shí)間: 2016-12-01
上傳用戶:zm7516678
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving THIRD parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標(biāo)簽: vulnerabilities Introduction discovered undeniably
上傳時(shí)間: 2014-01-05
上傳用戶:yph853211
蟲(chóng)蟲(chóng)下載站版權(quán)所有 京ICP備2021023401號(hào)-1