资源列表
deployment
- 这是一篇关于多传感器网络布站的研究文章,从原理、算法到具体实现,最后是仿真结果分析,层次清晰,分析得当,是一篇值得学习的文章-The prominent visions of wireless sensor networks that appeared about a decade ago have spurred enormous efforts in research and development of this new class of wireless networked em
watermarking34
- WATER MARKING DEscr iptION
1
- TCP/AQM router design
coal_mine_gambling
- 煤矿中的通信节点基于博弈论进行优化改进,进行了详细的描述和展望-The communication nodes in coal mines based on game theory to optimize the improvements carried out a detailed descr iption and Prospects
Network-Intelligence-Brochure
- Vistapointe Network Intelligence is a state of the art Cloud based Business Intelligence solution fo 3GPP 3G, 4G/LTE mobile networks, that non- intrusively taps into data and signaling layer interfaces in 3GPP networks to offer vital, act
W2SW0011u_Datasheet_Rev1.01
- wi2wi 88w8786 usb datasheet
EM-AVRISP-MKII-Clone-Drivers
- Atmel AVR Programmer GUI Tool
sensing-images
- 模糊分析的方法是用均一表面不确定性对原始图像进行模糊纹理滤波, 在滤波图像上计算空间均一不确定性,对不确定性进行模糊纹理光谱分析, 其光谱曲线直观地反映了多光谱遥感图像的纹理特征 通过采用不同的测量窗口,在不同的类别提取纹理样品进行实验。研究结果表明:多光谱遥感图像在小区域纹理特征不稳定,不同波段的纹理特征不同,不同类别的最小测量区域不同 模糊纹理分析的方法可用于图像分割。-Fuzzy analysis is to use a uniform surface uncertainty on the
11
- image restoration of old paintings
Microstrip
- Rectangular strip antenna design
Re_-Modbus-Communication
- modbus communication
shamir ID
- 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem -- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.