亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

wheTher

  • MMBT2907ALT1數據手冊

    This document describes the features of MMBT2907ALT1 silicon. You can check or search the characteristics of this transistor by this document and decide wheTher the transistor you need.

    標簽: MMBT 2907 ALT1 ALT 數據手冊 三極管

    上傳時間: 2016-07-19

    上傳用戶:hsuhueisan

  • MMBT4401數據手冊

    This document describes the features of MMBT4401 silicon. You can check or search the characteristics of this transistor by this document and decide wheTher the transistor you need.

    標簽: MMBT 4401 數據手冊 三極管

    上傳時間: 2016-07-19

    上傳用戶:hsuhueisan

  • C語言算法排序問題

    1.Describe a Θ(n lg n)-time algorithm that, given a set S of n integers and another integer x, determines wheTher or not there exist two elements in S whose sum is exactly x. (Implement exercise 2.3-7.)

    標簽: 算法 排序

    上傳時間: 2017-04-01

    上傳用戶:糖兒水嘻嘻

  • c語言算法排序

    1.Describe a Θ(n lg n)-time algorithm that, given a set S of n integers and another integer x, determines wheTher or not there exist two elements in S whose sum is exactly x. (Implement exercise 2.3-7.) #include<stdio.h> #include<stdlib.h> void merge(int arr[],int low,int mid,int high){      int i,k;      int *tmp=(int*)malloc((high-low+1)*sizeof(int));      int left_low=low;      int left_high=mid;      int right_low=mid+1;      int right_high=high;      for(k=0;left_low<=left_high&&right_low<=right_high;k++)      {      if(arr[left_low]<=arr[right_low]){                                        tmp[k]=arr[left_low++];                                        }      else{           tmp[k]=arr[right_low++];           } }             if(left_low<=left_high){                              for(i=left_low;i<=left_high;i++){                                                               tmp[k++]=arr[i];                                                               }                              }       if(right_low<=right_high){                              for(i=right_low;i<=right_high;i++)                                                                tmp[k++]=arr[i];                                                        }                              for(i=0;i<high-low+1;i++)                                                       arr[low+i]=tmp[i];       } void merge_sort(int a[],int p,int r){      int q;      if(p<r){              q=(p+r)/2;              merge_sort(a,p,q);              merge_sort(a,q+1,r);              merge(a,p,q,r);              }      } int main(){     int a[8]={3,5,8,6,4,1,1};     int i,j;     int x=10;     merge_sort(a,0,6);     printf("after Merging-Sort:\n");     for(i=0;i<7;i++){                      printf("%d",a[i]);                      }     printf("\n");     i=0;j=6;     do{                                    if(a[i]+a[j]==x){                                  printf("exist");                                  break;                                  }                  if(a[i]+a[j]>x)                                 j--;                  if(a[i]+a[j]<x)                                 i++;                       }while(i<=j);     if(i>j)              printf("not exist");     system("pause");     return 0;     }

    標簽: c語言 算法 排序

    上傳時間: 2017-04-01

    上傳用戶:糖兒水嘻嘻

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of wheTher superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    標簽: Fundamental Limits Secure Class on of

    上傳時間: 2020-01-04

    上傳用戶:kddlas

  • Essentials+of+Radio+Wave+Propagation

    The objective of this book is to allow the reader to predict the received signal power produced by a particular radio transmitter. The first two chapters examine propagation in free space for point-to-point and point-to-area transmission, respectively. This is combined with a dis- cussion regarding the characteristics of antennas for various purposes. In chapter 3, the effect of obstacles, wheTher buildings or mountains, is discussed and analytical methods, whereby the strength of a signal is the shadow of an obstacle can be predicted, are presented. 

    標簽: Propagation Essentials Radio Wave of

    上傳時間: 2020-05-27

    上傳用戶:shancjb

  • Queueing Theory with Packet Telecommunication

    Soon after Samuel Morse’s telegraphing device led to a deployed electri- cal telecommunications system in 1843, waiting lines began to form by those wanting to use the system. At this writing queueing is still a significant factor in designing and operating communications services, wheTher they are provided over the Internet or by other means, such as circuit switched networks.

    標簽: Telecommunication Queueing Packet Theory with

    上傳時間: 2020-05-31

    上傳用戶:shancjb

  • Sharing+RF+Spectrum

    This book was born from the perception that there is much more to spectrum use and sharing than one sees reflected in publications, wheTher academic, commercial or political. the former – in good research style – tend towards reductionism and concentrate on specific, detailed aspects. commercial publications tend to empha- size the positive aspects and they tend to put promise above practice. Given the ever increasing pace of technology development and recent successes of new wireless technologies, some pundits predict large-scale spectrum scarcity, potentially lead- ing to economic catastrophe. Although economic theory has a hard time explaining recent events that shook the world economy, the notion of spectrum scarcity is intui- tively acceptable, even if not correct or immediately relevant.

    標簽: Spectrum Sharing RF

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • System+Design+for+Telecommunication+Gateways

    The idea for this book was born during one of my project-related trips to the beautiful city of Hangzhou in China, where in the role of Chief Architect I had to guide a team of very young, very smart and extremely dedicated software developers and verification engineers. Soon it became clear that as eager as the team was to jump into the coding, it did not have any experience in system architecture and design and if I did not want to spend all my time in constant travel between San Francisco and Hangzhou, the only option was to groom a number of local junior architects. Logically, one of the first questions being asked by these carefully selected future architects was wheTher I could recommend a book or other learning material that could speed up the learning cycle. I could not. Of course, there were many books on various related topics, but many of them were too old and most of the updated information was either somewhere on the Internet dispersed between many sites and online magazines, or buried in my brain along with many years of experience of system architecture.

    標簽: Telecommunication Gateways System Design for

    上傳時間: 2020-06-01

    上傳用戶:shancjb

  • xinlinx-Spartan6開發板原理圖詳解

    The information disclosed to you hereunder (the Materials ) is provided solely for the selection and use of Xilinx products. To the maximum extent permitted by applicable law: (1) Materials are made available"AS IS"and with all faults, Xilinx hereby DISCLAIMS ALL WARRANTIES AND CONDITIONS, EXPRESS, IMPLIED, OR ST ATUTORY, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY NON-INFRINGEMENT, OR FITNESS FOR ANY PARTICULAR PURPOSE; and (2) Xilinx shall not be liable (wheTher in contract or tort. includina nealigence. or under anv other theorv of liabilitv) for any loss or damage of any kind or nature related to, arising under, or in connection with, the Materials (including vour use of the Materials), including for any direct, indirect, special, incidental, or consequential loss or damage (including loss of data, profits, qoodwill, or any type of loss or damage suffered as a result of anv action brought by a third party) 

    標簽: xinlinx spartan-6

    上傳時間: 2022-06-18

    上傳用戶:

主站蜘蛛池模板: 阳朔县| 大宁县| 峨山| 沁源县| 宿迁市| 长治市| 浮梁县| 乌兰察布市| 邵阳县| 西昌市| 嘉鱼县| 和平区| 莆田市| 绥江县| 五指山市| 哈巴河县| 抚顺县| 出国| 苏尼特右旗| 洪雅县| 大竹县| 云南省| 高陵县| 西林县| 汶川县| 上高县| 新丰县| 乌兰县| 通辽市| 昆山市| 垫江县| 太保市| 射阳县| 蕲春县| 康保县| 霍州市| 东丽区| 田林县| 永仁县| 封丘县| 和平县|