CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - investigates

搜索资源列表

  1. hownarrow

    0下载:
  2. the paper I uploaded was submitted in my DSP2 class. The paper discusses the results of the simulation based on the paper of Zatman on "How Narrow is Narrowband?" It investigates the second eigenvalue parameter of the received signal that determines
  3. 所属分类:Communication

    • 发布日期:2017-03-29
    • 文件大小:217.49kb
    • 提供者:mocordel
  1. QuantizationEffect

    0下载:
  2. this document investigates on the quantization effect of implementing the adaptive algorithms for echo cancellers in fixedpoint DSP. Results show that the theoretical error is manifested at the ERLE of the canceller.-this document investigates on the
  3. 所属分类:Development Research

    • 发布日期:2017-03-28
    • 文件大小:291.56kb
    • 提供者:mocordel
  1. On.Capacity.Under.Received-Signal.Constraints

    0下载:
  2. this paper speaks about spectrum-sharing approach, this paper investigates the behavior of capacity under received-power constraints, modeling for example the maximum interference that one system may inflict on another.
  3. 所属分类:Communication

    • 发布日期:2017-04-02
    • 文件大小:138.91kb
    • 提供者:Ayman
  1. ThesuitabilityofOFDMasamodulation

    0下载:
  2. This thesis investigates the effectiveness of Orthogonal Frequency Division Multiplexing (OFDM) as a modulation technique for wireless radio applications. The main aim was to assess the suitability of OFDM as a modulation technique for a fixed
  3. 所属分类:Communication

    • 发布日期:2017-04-04
    • 文件大小:445.54kb
    • 提供者:nurman
  1. Investigation_on_Model_Selection_Criteria_for_Spe

    0下载:
  2. Speaker recognition is the task of validating individual s identity using invariant features extracted from their voices print. Speaker recognition technology common applications include authentication, surveillance and forensic applications. This Pa
  3. 所属分类:Document

    • 发布日期:2017-03-28
    • 文件大小:238.37kb
    • 提供者:ZCEEE
  1. Nouveau-WinRAR-archive

    0下载:
  2. This paper proposes a new fast packet-scheduling algorithm based on instantaneous received signal to-interference power ratio (SIR) with a constraint condition that assures a minimum throughput (Minimum Throughput Assured instantaneous SIR (MTA-ISI
  3. 所属分类:Communication

    • 发布日期:2017-04-01
    • 文件大小:430.15kb
    • 提供者:kahou
  1. anquanduofangjisuan

    0下载:
  2. 本文调查的办法是给出了一个方法,即一个有效的协议,为双方使用不受信任的第三方,可用于构建一个高效率的同辈对同辈安全的多方协议。-This paper investigates ways to give a method, that is a valid agreement for both parties to use an untrusted third party can be used to build a high-efficiency multi-protocol peer-to-pe
  3. 所属分类:software engineering

    • 发布日期:2017-04-16
    • 文件大小:72.32kb
    • 提供者:wushan
  1. IEEE

    0下载:
  2. This paper investigates the use of different techniques for fault detection in voltage-fed asynchronous machine drive systems.
  3. 所属分类:software engineering

    • 发布日期:2017-04-17
    • 文件大小:276.94kb
    • 提供者:cyrus2011
  1. Tunnel-based-on-http

    0下载:
  2. 本文详细研究了HTTP协议报文的内容,对于HTTP协议 有了全面深入的了解;在此基础上,本文给出了构建HTTP隐蔽通道 的三种通用模型(简单HTTP模型、代理模型、CGI模型)和四种常用 的方法(GET方法、HEAD方法、POST方法、PUT方法)- The thesis structure is as follows: Firstly, this dissertation not only investigates the message structure of
  3. 所属分类:software engineering

    • 发布日期:2017-11-08
    • 文件大小:5mb
    • 提供者:张成武
  1. Cadence-secondary-development

    0下载:
  2. skill Language Reference skill语言在Cadence平台二次开发中大量使用,在IC设计中也有应用,本文探讨通过VC调用skill语言的开发过程-skill Language Reference skill in the second Cadence platform language used extensively in IC design is also applied, this paper investigates VC call through the de
  3. 所属分类:Document

    • 发布日期:2017-11-16
    • 文件大小:317.14kb
    • 提供者:lqm
  1. Comparison-Based-Analysis-of-Different-Cryptograp

    0下载:
  2. Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
  3. 所属分类:Communication

    • 发布日期:2017-11-06
    • 文件大小:729.79kb
    • 提供者:zu
  1. Insider-threat-mitigation--preventing-unauthorize

    0下载:
  2. This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:549.32kb
    • 提供者:ahmed
  1. The-Multikernel-A-New-OS-Architecture-For-Scalabl

    0下载:
  2. By Andrew Baumann,Simon Peter,Timothy Roscoe,Adrian Schüpbach, and Akhilesh Singhania, Systems Group ETH Zurich By Paul Barham,Tim Harris, and Rebecca Isaacs, Microsoft Research By Pierre-Evariste Dagand, ENS Cachan Bretagne 2009 Investiga
  3. 所属分类:Development Research

    • 发布日期:2017-03-30
    • 文件大小:254.49kb
    • 提供者:xyz
  1. PCA

    0下载:
  2. 比较深入的分析了PCA人脸识别方法的原理,并对PCA在应用过程中遇到的特征值选择和距离准则问题进行了研究,实现了基于PCA算法的人脸识别。 -First, the thesis investigates principle component analysis (PCA) approachdeeply, and then the choice of feature vector of sample s covariance matrix anddistance measure criteri
  3. 所属分类:software engineering

    • 发布日期:2017-05-19
    • 文件大小:5.37mb
    • 提供者:耿大达
  1. 39378

    0下载:
  2. This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
  3. 所属分类:Project Design

    • 发布日期:2017-05-09
    • 文件大小:1.8mb
    • 提供者:pse
  1. Yang_nature_book_part

    0下载:
  2. This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
  3. 所属分类:Project Design

    • 发布日期:2017-04-02
    • 文件大小:908.94kb
    • 提供者:pse
  1. 39326

    0下载:
  2. This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
  3. 所属分类:Project Design

    • 发布日期:2017-05-03
    • 文件大小:655.06kb
    • 提供者:pse
  1. Bezier.pdf

    0下载:
  2. The Bézier curve is one of the most commonly used parametric curves in CAGD and Computer Graphics and has many good properties for shape design. Developing more convenient techniques for designing and modifying Bézier curve is an im- portant prob
  3. 所属分类:Development Research

    • 发布日期:2017-04-16
    • 文件大小:233.9kb
    • 提供者:Joaquin Monleon
  1. AES-FPGA

    0下载:
  2. 本文介绍了AES加密算法通过不同的功能结构的FPGA实现,语言背景为VHDL-This paper details Implementation of the Encryption algorithm AES under VHDL language In FPGA by using different architecture of mixcolumn. We then review this research investigates the AES algorithm in FPGA
  3. 所属分类:File Formats

    • 发布日期:2017-04-24
    • 文件大小:187.48kb
    • 提供者:Eric
  1. 3A64P0821

    0下载:
  2. This paper investigates the feasibility of Orthogonal Frequency Division Multiplexing (OFDM) as a modulation technique for a ROF.
  3. 所属分类:Project Design

    • 发布日期:2017-04-29
    • 文件大小:319.9kb
    • 提供者:harry
« 12 »
搜珍网 www.dssz.com