亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Two-level

  • virtual decomposition control

    obot control, a subject aimed at making robots behave as desired, has been extensively developed for more than two decades. Among many books being published on this subject, a common feature is to treat a robot as a single system that is to be controlled by a variety of control algorithms depending on different scenarios and control objectives. However, when a robot becomes more complex and its degrees of freedom of motion increase substantially, the needed control computation can easily go beyond the scope a modern computer can handle within a pre-specified sampling period. A solution is to base the control on subsystem dynamics.

    標簽: decomposition virtual control

    上傳時間: 2019-09-04

    上傳用戶:txb96

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Microwave+Radiometer+Systems

    Two important microwave remote sensors are the radar and the radiometer. There have been a number of books written on various aspects of radar, but there have been only a few written on microwave radiometers, especially on sub- jects of how to design and build radiometer systems. This book, which is the second edition of a book originally published in 1989, attempts to fill this void.

    標簽: Radiometer Microwave Systems

    上傳時間: 2020-05-23

    上傳用戶:shancjb

  • Millimeter+Wave+V2V+Communications

    Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level. However, the literature is particularly scarce in regards to principled resource allocation schemes that deal with the challenging radio conditions posed by the high mobility of vehicular scenarios

    標簽: Communications Millimeter Wave V2V

    上傳時間: 2020-05-23

    上傳用戶:shancjb

  • Crime+and+Intelligence+Analysis

    In the hit CBS crime show Person of Interest, which debuted in 2011, the two heroes—one a former Central Intelligence Agency agent and the other a billionaire technology genius—work together using the ubiquitous surveillance system in New York City to try to stop violent crime. It’s referred to by some as a science fiction cop show. But the use of advanced technology for crime analysis in almost every major police department in the United States may surpass what’s depicted on TV crime dramas such as Person of Interest. Real-time crime cen- ters (RTCCs) are a vital aspect of intelligent policing. Crime analysis is no longer the stuff of science fiction. It’s real.

    標簽: Intelligence Analysis Crime

    上傳時間: 2020-05-25

    上傳用戶:shancjb

  • Microwave+Radiometer+Systems Design and Analysis

    Two important microwave remote sensors are the radar and the radiometer. There have been a number of books written on various aspects of radar, but there have been only a few written on microwave radiometers, especially on sub- jects of how to design and build radiometer systems. This book, which is the second edition of a book originally published in 1989, attempts to fill this void.

    標簽: Radiometer Microwave Analysis Systems Design

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Millimeter+Wave+V2V+Communications

    Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level.

    標簽: Millimeter Wave V2V Communications

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • SmartCitiesTheInternetofThings,PeopleandSystems

    The contemporary view of the Smart City is very much static and infrastructure- centric, focusing on installation and subsequent management of Edge devices and analytics of data provided by these devices. While this still allows a more efficient management of the city’s infrastructure, optimizations and savings in different do- mains, the existing architectures are currently designed as single-purpose, vertically siloed solutions. This hinders active involvement of a variety of stakeholders (e.g., citizens and businesses) who naturally form part of the city’s ecosystem and have an inherent interest in jointly coordinating and influencing city-level activities.

    標簽: Internet Systems Cities People Things Smart The and of

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Web Data Mining

    The rapid growth of the Web in the past two decades has made it the larg- est publicly accessible data source in the world. Web mining aims to dis- cover useful information or knowledge from Web hyperlinks, page con- tents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized into three main types: Web structure mining, Web content mining and Web usage mining.

    標簽: Mining Data Web

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • 2015_01_3GPP_unlicensed_Dino_Flore

    Licensed spectrum remains 3GPP operators’ top priority to deliver advanced services and user experience Opportunistic use of unlicensed spectrum is becoming an important complement for operators to meet the growing traffic demand Moving forward 3GPP operators will have two options to offload traffic to unlicensed spectrum: 1. Wi-Fi (via LTE/Wi-Fi interworking) 2. LTE over unlicensed It will then be up to each individual operator to choose which approach to use, which will depend on a number of factors

    標簽: 3GPP_unlicensed_Dino_Flore 2015 01

    上傳時間: 2020-05-26

    上傳用戶:shancjb

主站蜘蛛池模板: 筠连县| 康定县| 隆德县| 乐陵市| 宣威市| 内黄县| 师宗县| 哈尔滨市| 星子县| 麻城市| 灌阳县| 温宿县| 将乐县| 铜陵市| 家居| 县级市| 高要市| 阆中市| 阳城县| 柯坪县| 漯河市| 平武县| 河北区| 乌鲁木齐县| 宁海县| 阜康市| 莫力| 深水埗区| 皋兰县| 乡城县| 安远县| 万荣县| 宜春市| 新泰市| 沙田区| 平阳县| 娱乐| 平阴县| 泰来县| 甘肃省| 安丘市|