移動ip書籍,很有用。 Third Generation (3G) mobile offers access to broadband multimedia services - and in the future most of these, even voice and video, will be IP-based. However 3G networks are not based on IP technologies, rather they are an evolution from existing 2G networks. Much work needs to be done to IP QoS and mobility protocols and architectures for them to be able to provide the functionality 3G requires.
上傳時間: 2013-12-16
上傳用戶:moerwang
Space-Time Processing for CDMA Mobile Communications.Written for research students and design engineers, this book addresses many basic questions related to the use of space-time processing in CDMA-based Third-generation systems
標簽: Communications Space-Time Processing for
上傳時間: 2014-01-13
上傳用戶:cooran
Already the industry standard for Python users, Programming Python from O Reilly just got even better. This Third edition has been updated to reflect current best practices and the abundance of changes introduced by the latest version of the language, Python 2.5
標簽: Python Programming industry standard
上傳時間: 2013-12-13
上傳用戶:zgu489
采用MATLAB編寫的最新三維數據圖形界面,運用GUI編程,輸入函數名:volumization (data, n )即可。其中DATA的格式為:[n x m x p];n表示顯示方式: 1 - all, 2 - every second, 3 - every Third。
上傳時間: 2014-11-22
上傳用戶:縹緲
用20個示例項目的方式介紹Matlab/Simulink。內容包括: *Contains over 20 hands-on projects in MATLAB(with code) integrated throughout the book *Includes a complete introduction to Simulink *Accompanied by a CD-ROM containing MATLAB examples, source code, Third party simulations & projects *Suitable for self-study and professional licensing exams *Designed for the reader who does not have extensive math and programming experience *Contains many practical applications of MATLAB and Simulink
標簽: Contains Simulink hands-on projects
上傳時間: 2014-01-03
上傳用戶:hj_18
C語言編程經典教程,The.C...Programming.Language.Third.Edition.Addison.Wesley.Bjarne.Stroustrup
上傳時間: 2016-10-22
上傳用戶:cx111111
After the successful global introduction during the past decade of the second generation (2G) digital mobile communications systems, it seems that the Third generation (3G) Universal Mobile Communication System (UMTS) has finally taken off, at least in some regions. The plethora of new services that are expected to be offered by this system requires the development of new paradigms in the way scarce radio resources should be managed. The Quality of Service (QoS) concept, which introduces in a natural way the service differentiation and the possibility of adapting the resource consumption to the specific service requirements, will open the door for the provision of advanced wireless services to the mass market.
標簽: the introduction successful generation
上傳時間: 2013-12-30
上傳用戶:qq21508895
Z是模型一單位雨衰值,也是不考慮衰減因子的單位雨衰值 F是First,即第一模型的情況 F16 F165 F17分別是16GHz 16.5GHz 17GHz的情況,是模型一大氣層下總雨衰值 F18km是模型一下18km實例的雨衰值 S是Second,即第二模型的情況 S16 S165 S17分別是16GHz 16.5GHz 17GHz的情況,是模型二大氣層下總雨衰值 S16m S165m S17m分別是16GHz 16.5GHz 17GHz在模型二下每公里雨衰值 S1618km S16518km S1718km分別是16GHz 16.5GHz 17GHz在模型二下18km實例的雨衰值 T是Third,即第三模型的情況 T16 T165 T17分別是16GHz 16.5GHz 17GHz的情況,是模型三大氣層下總雨衰值 T16m T165m T17m分別是16GHz 16.5GHz 17GHz在模型三下每公里雨衰值 T1618km T16518km T1718km分別是16GHz 16.5GHz 17GHz在模型三下18km實例的雨衰值 zhaosheng是只考慮天線噪聲溫度對雷達最大探測距離的影響 yushuai是綜合考慮天線噪聲溫度和雨衰減對雷達最大探測距離的影響 其中,參數情況在各個程序中都有說明
上傳時間: 2013-12-25
上傳用戶:songrui
This program is about Compilers.A source routine that need to be compiled need process three sections.It is about the Third section.
標簽: need Compilers compiled program
上傳時間: 2016-12-01
上傳用戶:zm7516678
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving Third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211