搜索资源列表
On-Access-Point-Selection-in-IEEE-802.11Wireless-
- In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select best from a list of candidate ones. In IEEE 802.11, the user
Videocodingwithh.264
- H.264/AVC, the result of the collaboration between the ISO/IEC Moving Picture Experts Group and the ITU-T Video Coding Experts Group, is the latest standard for video coding. The goals of this standardization effort were enhanced compression ef
ebooks
- Most e-book publishers do not warn their customers about the possible implications of the digital rights management tied to their products. Generally they claim that digital rights management is meant to prevent copying of the e-book. However in many
untitled1
- DPCM,由于语音信号的相邻抽样点之间有一定的幅度关联性,所以,可根据以前时刻的样值来预测现时刻的样值,只要传预测值和实际值之差,而不需要每个样值都传输。这种方法就是预测编码。-DPCM, as a result of voice signals between adjacent sampling rate of a certain relevance, we can kind of time based on previous values to predict the kind of val
boundsonLDPCandLDGM
- The paper is about bounds for LDPC and LDGM codes under MAP. A new method for analyzing low density parity check (LDPC) codes and low density generator matrix (LDGM) codes under bit maximum a posteriori probability (MAP) decoding is introduced. T
Achannelizeddigitalultrawidebandreceiver
- 这是一个uwb信道建模,并且分析,给出接收机的结构。-this is a uwb model,analysis and simulation its result.give a receiver architure.
LFMsignalpulsecompressionandthemodulationrealizati
- 本文结合L FM 信号脉冲压缩及旁瓣抑制,利用 GUIDE 制作线性调频信号脉冲压缩模块的图形用户界面,使利用此界面可以通过对雷达脉压模块输入参数的修改,对仿真结果给出图形显示和结果分析,界面友好,具有开放性,方便实用和完善及扩充其功能。-This article unifies L the FM signal pulse compression and side-lobe cancellation, uses the GUIDE manufacture linear frequency m
OFDMchannelestimate
- 书文提出了一种称为平均反馈(AF)的新算法.该算法利用两个相邻的 0FDM符号之间的荧联信息对LS算法的估计结果进行平均和反馈.以减少离斯白噪声岛子信道间干扰(1cI)对信道估计结 果的影囔。-The book article proposed one kind is called the average to feed back (AF) the new algorithm. This algorithm uses two neighboring between the 0FDM ma
stb3100trilogy
- Analysis of Card Log . Rev.C. By card log we mean the data captured using a logging program between the STB and the Card . The better logging programs to use are raw data loggers ( such as MacLog etc..) as they do not filter out anything as the
PARM_AINA_2006
- Current Peer-to-Peer (P2P) systems were developed and implemented as a result of a direct requirement/demand without an overall functional architecture. This makes the performance of the resulting systems far from optimal because other aspects
Topology_aware_ICC_2005
- One of the major weaknesses of existing peer-to-peer (P2P) networks is that their overlay structures do not correlate to the physical underlying network topology. As a result, the overlays waste network resources and introduce excessive end-toe
THE_FAST_HANDOVER_RESEARCH_of_wimax_network
- 本文正是在研究WIMAX/802.16e协议和FMIPv6协议的基础之 上,提出了基于FMIPv6的WIMAX网络快速切换机制,该方案采用跨 层切换的思想,MAC层联合网络层同时进行切换,在链路尚未断开 之前即完成新转交地址(NCOA)获取等功能,从而加快了切换进程, 减小了切换时延和切换时的丢包率。在提出本切换机制的基础上,本 文在NSZ仿真平台上对所提出的切换方案做了系统性的性能仿真,通 过仿真结果验证了方案的可行性和优越性。 - In this paper
ttye
- To improve network spect ral efficiency , a network coding2aware met rics for wireless routing expected coding2aware t ransmission count ( ECTX) is proposed. In general , there are two steps in cod2 ing2aware routing communication : one is findin
IT-Scenario-Analysis-Report
- Because of the role that Computing Professional holds in the information systems of an organization, which give them the right to access the highly confidential information stored in its information systems, because they often need to access it to ex
CBIR-document
- CBIR is retrieval of images based on some query or example images. It is also called Query based image retrieval. Firstly, this report outlines a descr iption of the primitive features of an image color and shape. These features are extracted and use
IEEEXplore(981)
- WiMAX and WiFi have emerged as promising broadband access solutions for the latest generation of wireless MANs and LANs, respectively. Their complementary features enable the use of WiMAX as a backhaul service to connect multiple dispersed Wi
05459892
- The cluster head is selected by the random number generated by nodes in the hierarchical routing protocol which is implementing Low Energy Adaptive Clustering Hierarchy (LEACH). As a result, the cluster head may be chosen randomly and be
05552317
- In wireless sensor networks, the power resource of each sensor node is limited. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of routing protocols for sensor networks. In this paper, Cluster
bishe
- 该程序用于测电网的交流电压有效值,最后的结果将在4个LED上显示,保留1位小数-The procedures used to measure the AC rms voltage of the grid, the final result will be displayed on the four LED to retain a decimal
search-jsp-search-result-60---www.pudn.com
- A TV network cynically exploits a deranged ex-TV anchor s ravings and revelations about the media for their own profit.