亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

entities

  • Java Application using EJB 3.0 for renting a car - entities : Car, User, Renting Business Logic. Ne

    Java Application using EJB 3.0 for renting a car - entities : Car, User, Renting Business Logic. Needs Glassfish v2, mysql DB

    標(biāo)簽: Application Business entities Renting

    上傳時間: 2017-07-27

    上傳用戶:aa17807091

  • A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

    A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.

    標(biāo)簽: Infrastructure cryptographic entities physical

    上傳時間: 2017-07-31

    上傳用戶:561596

  • 通信的數(shù)學(xué)理論

    The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point. Frequently the messages have meaning; that is they refer to or are correlated according to some system with certain physical or conceptual entities.

    標(biāo)簽: 通信

    上傳時間: 2013-10-31

    上傳用戶:liuxinyu2016

  • 通信的數(shù)學(xué)理論

    The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point. Frequently the messages have meaning; that is they refer to or are correlated according to some system with certain physical or conceptual entities.

    標(biāo)簽: 通信

    上傳時間: 2013-11-11

    上傳用戶:xy@1314

  • 基于"trace transform"的識別2D圖像的C++源程序

    基于"trace transform"的識別2D圖像的C++源程序, 主文件是tt.cpp, 在LINUX下可以用 g++ tt.cpp -o tt -O3進(jìn)行編繹, 而且最后的結(jié)果也可以在MATLAB下顯示出來, This package presents C++ tools to the trace transform of a 2D image, and related objects, i.e. circuses and triple features, matlab tools to visualise these entities, and tools to check newly coded functionals. This version is released with a small number of functionals only.

    標(biāo)簽: transform trace 識別 圖像

    上傳時間: 2013-12-23

    上傳用戶:redmoons

  • DDA使用教程

    DDSCAT 7.3 is a freely available open-source Fortran-90 software package applying the “discrete dipole approximation” (DDA) to calculate scattering and absorption of electromagnetic waves by targets with arbitrary geometries and complex refractive index. The targets may be isolated entities (e.g., dust particles), but may also be 1-d or 2-d periodic arrays of “target unit cells”, which can be used to study absorption, scattering, and electric ?elds around arrays of nanostructures.

    標(biāo)簽: userguide

    上傳時間: 2015-04-29

    上傳用戶:499689361

  • Cooperative+Communications

    Cooperation is not a natural characteristic attributed to humans. The typical human horizon is focused on short-term gains, which might be due to our instinct-driven subconscious occupying a grander importance than we dare to admit [1]. Cooperating with other individuals or entities, however, usually means that short-term losses may translate into long-term gains – something history has proved to hold true but humans for some reason rarely ever understand. 

    標(biāo)簽: Communications Cooperative

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • UMTS+Performance+Measurement+A+Practical+Guide

    Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor UTRAN interfaces approximately four years ago. Monitoring interfaces means decoding the data captured on the links and analysing how the different data segments and messages are related to each other. In general I wanted to trace all messages belonging to a single call to prove if the network elements and protocol entities involved worked fine or if there had been failures or if any kind of suspicious events had influenced the normal call proceeding or the call’s quality of service. Cases showing normal network behaviour have been documented in Kreher and Ruedebusch (UMTS Signaling. John Wiley & Sons, Ltd, 2005), which provides examples for technical experts investigating call flows and network procedures.

    標(biāo)簽: Performance Measurement Practical Guide UMTS

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • Industrial+Control+Systems

    This book is either ambitious, brave, or reckless approaching a topic as rapidly evolving as industrial control system (ICS) security. From the advent of ICS-targeted malicious software such as Stuxnet to the advanced persistent threats posed by organized crime and state-sponsored entities, ICS is in the crosshairs and practices and controls considered safe today may be obsolete tomorrow. Possibly more so than in more traditional IT security, because of the differences inherent in ICS.

    標(biāo)簽: Industrial Control Systems

    上傳時間: 2020-06-10

    上傳用戶:shancjb

主站蜘蛛池模板: 台南县| 城口县| 额尔古纳市| 盘山县| 英超| 罗定市| 万全县| 台山市| 湘阴县| 永康市| 庆元县| 南陵县| 芷江| 广汉市| 扎赉特旗| 桐庐县| 永福县| 利辛县| 滨州市| 马关县| 文山县| 明光市| 巴东县| 利川市| 阜宁县| 章丘市| 定陶县| 福建省| 静海县| 门源| 彭山县| 敦化市| 讷河市| 洞口县| 自治县| 乡宁县| 杭锦旗| 靖州| 武威市| 温宿县| 青河县|