搜索资源列表
report
- Network Quality Assurance and Simulation
linux
- linux ssh配置,vsftp下载,网络配置,配置Apache Mysql 和php的组合,tomcat配置,Ftp,phpMyAdmin配置,pppoe配置VNC桌面配置,这里全是我整理的文本和word文件,里面有我自己写的,全部是我亲自试验成功的服务器配置-configure linux ssh, vsftp download, network configuration, configure Apache Mysql and PHP combination, tomcat config
sanjiaowang
- 用于构建海量地形三角网,东西很不错,具有很大借鉴意义-Used to build the massive terrain triangulation network, something very good, has a great significance
1000-3428(2008)22-0231-03
- 针对传统的PID 控制器参数固定而导致在控制中效果差的问题,提出一种基于模糊RBF 神经网络智能PID 控制器的设计方法。 该方法结合了模糊控制的推理能力强与神经网络学习能力强的特点,将模糊控制与RBF 神经网络相结合以在线调整PID 控制器参数,整 定出一组适合于控制对象的kp. ki. kd 参数。将算法运用到电机控制系统的PID 参数寻优中,仿真结果表明基于此算法设计的PID 控制器改善了电机控制系统的动态性能和稳定性。-Fixed for the traditional PID
Rockwell-entry-guide-book
- 现场总线(罗克韦尔)入门实验指导书,主要介绍罗克韦尔三层网络人通信以及编程方式。-Fieldbus (Rockwell) entry guide, the book introduces the Rockwell three-tier network communication and programming.
zigbee
- 这是我们毕业论文的资料,基于zigbee无线网络技术的现代温室环境监测系统研究-This is our thesis, modern greenhouse environment monitoring system based on ZigBee wireless network technology
ICN-application-layer
- Introduce the application layer. the application layer is an abstraction layer reserved for communications protocols and methods designed for process-to-process communications across an Internet Protocol (IP) computer network. Application layer proto
cacti-introducation
- 本内容对开源网管cacti进行了详细的介绍,包括cacti的特征以及它的安装部署的方式,和数据采集的种类-The content of open-source network cacti has carried on the detailed introduction, including features of cacti and its installation deployment approach, and the kinds of data acquisition
seven-computer-virus-killer-help
- 网络病毒为什么用单机版无法彻底清除?主要因为网络病毒有着其特有的网络特性。-Why use standalone network virus can not be completely removed? Mainly because the network has its own network virus characteristics.
Firewall-and-router-security-set
- 防火墙与路由器的安全配置,希望对从事网络安全的人员有好处-Firewall and router security configuration, we want to engage in network security personnel benefits
Information-encryption
- 本文基于对计算机安全方面存在的问题,通过对信息泄露的途径、网络攻击手段的分析,探讨了计算机的安全管理,提出了计算机安全防范的措施。-This article based on the question which exists to the computer network security aspect, through to the information revelation s way, the network attack method s analysis, has discusse
0032
- wireless sensor network localization matlab source code-matlab source code
GB28181_SIP
- 安全防范视频监控联网系统 信息传输、交换、控制技术要求 GB28181补充汇编,GB28181拓展协议汇总, 贵州公安厅的安防通讯协议,自动归位扩展协议-Security video surveillance network system of information transmission, switching, control technology requirements of GB28181 added assembly, GB28181 expansion protoco
Doc_FMX_0911_VA
- With many peripheral units, FMX enables the network operator to deliver all services directly to the end user : digital and analog leased line services, PSTN and ISDN services.-Multiplexing, drop/insert and cross-connect functions Wide range of a
12000topographicsurveydocument
- 1:2000地形图测量项目技术设计书,技术很新颖,推荐给大家,用到cors网技术。-1:2000 topographic survey project technical design document, technology is novel and recommend it to everyone, used cors network technology.
PESGM2008-000038
- ITS an IEEE paper about Network Security Management Tool for Distribution Systems.
Mohamad-suhail_Body
- Robotic systems have brought significant socioeconomic impacts to human lives over the past few decades. Cloud Robotics is the latest existing idea tapping into the Internet s vast and rapidly expanding network of computing and data resources. Cloud
cisco
- 思科最佳校园网设计方案,校园网设计方案大赛获奖作品-Best Cisco campus network design, campus network design contest winners
topo
- 自己收集整理的网络拓扑设计方案,主要是拓扑图,都比较经典.-collection of network topology design, mainly topology, are more classic.
Internet
- 这是我们网络安全课程最后的总结性大作业,word形式的,希望对各位网友有用。-This is our final summary of network security course large operations, word forms, and I hope useful to you friends.