搜索资源列表
hownarrow
- the paper I uploaded was submitted in my DSP2 class. The paper discusses the results of the simulation based on the paper of Zatman on "How Narrow is Narrowband?" It investigates the second eigenvalue parameter of the received signal that determines
QuantizationEffect
- this document investigates on the quantization effect of implementing the adaptive algorithms for echo cancellers in fixedpoint DSP. Results show that the theoretical error is manifested at the ERLE of the canceller.-this document investigates on the
On.Capacity.Under.Received-Signal.Constraints
- this paper speaks about spectrum-sharing approach, this paper investigates the behavior of capacity under received-power constraints, modeling for example the maximum interference that one system may inflict on another.
ThesuitabilityofOFDMasamodulation
- This thesis investigates the effectiveness of Orthogonal Frequency Division Multiplexing (OFDM) as a modulation technique for wireless radio applications. The main aim was to assess the suitability of OFDM as a modulation technique for a fixed
Investigation_on_Model_Selection_Criteria_for_Spe
- Speaker recognition is the task of validating individual s identity using invariant features extracted from their voices print. Speaker recognition technology common applications include authentication, surveillance and forensic applications. This Pa
Nouveau-WinRAR-archive
- This paper proposes a new fast packet-scheduling algorithm based on instantaneous received signal to-interference power ratio (SIR) with a constraint condition that assures a minimum throughput (Minimum Throughput Assured instantaneous SIR (MTA-ISI
anquanduofangjisuan
- 本文调查的办法是给出了一个方法,即一个有效的协议,为双方使用不受信任的第三方,可用于构建一个高效率的同辈对同辈安全的多方协议。-This paper investigates ways to give a method, that is a valid agreement for both parties to use an untrusted third party can be used to build a high-efficiency multi-protocol peer-to-pe
IEEE
- This paper investigates the use of different techniques for fault detection in voltage-fed asynchronous machine drive systems.
Tunnel-based-on-http
- 本文详细研究了HTTP协议报文的内容,对于HTTP协议 有了全面深入的了解;在此基础上,本文给出了构建HTTP隐蔽通道 的三种通用模型(简单HTTP模型、代理模型、CGI模型)和四种常用 的方法(GET方法、HEAD方法、POST方法、PUT方法)- The thesis structure is as follows: Firstly, this dissertation not only investigates the message structure of
Cadence-secondary-development
- skill Language Reference skill语言在Cadence平台二次开发中大量使用,在IC设计中也有应用,本文探讨通过VC调用skill语言的开发过程-skill Language Reference skill in the second Cadence platform language used extensively in IC design is also applied, this paper investigates VC call through the de
Comparison-Based-Analysis-of-Different-Cryptograp
- Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
Insider-threat-mitigation--preventing-unauthorize
- This paper investigates insider threat in relational database systems. It discusses the problem of inferring unauthorized information by insiders and proposes methods to prevent such threats. The paper defines various types of dependencies as
The-Multikernel-A-New-OS-Architecture-For-Scalabl
- By Andrew Baumann,Simon Peter,Timothy Roscoe,Adrian Schüpbach, and Akhilesh Singhania, Systems Group ETH Zurich By Paul Barham,Tim Harris, and Rebecca Isaacs, Microsoft Research By Pierre-Evariste Dagand, ENS Cachan Bretagne 2009 Investiga
PCA
- 比较深入的分析了PCA人脸识别方法的原理,并对PCA在应用过程中遇到的特征值选择和距离准则问题进行了研究,实现了基于PCA算法的人脸识别。 -First, the thesis investigates principle component analysis (PCA) approachdeeply, and then the choice of feature vector of sample s covariance matrix anddistance measure criteri
39378
- This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
Yang_nature_book_part
- This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
39326
- This work investigates the practical application of support vector machine (SVM) to power transformer condition assessment. Partiuclarly, this paper proposes to integrate the SVM algorithm with two heuristic optimization algorithms which are
Bezier.pdf
- The Bézier curve is one of the most commonly used parametric curves in CAGD and Computer Graphics and has many good properties for shape design. Developing more convenient techniques for designing and modifying Bézier curve is an im- portant prob
AES-FPGA
- 本文介绍了AES加密算法通过不同的功能结构的FPGA实现,语言背景为VHDL-This paper details Implementation of the Encryption algorithm AES under VHDL language In FPGA by using different architecture of mixcolumn. We then review this research investigates the AES algorithm in FPGA
3A64P0821
- This paper investigates the feasibility of Orthogonal Frequency Division Multiplexing (OFDM) as a modulation technique for a ROF.