资源列表

« 1 2 ... .40 .41 .42 .43 .44 445.46 .47 .48 .49 .50 ... 2190 »

[编程文档LOCK

说明:电子密码锁,北京邮电大学,数字电路综合实验,大三下学期-Electronic locks, Beijing University of Posts and Telecommunications, an integrated digital circuit experiment, junior next semester
<米彦> 在 2024-11-17 上传 | 大小:2.37mb | 下载:0

[编程文档100proteus

说明:100个proteus运行文件,完美运行,课件可用-100 proteus run files, perfect run, courseware available
<杨举华> 在 2024-11-17 上传 | 大小:3.53mb | 下载:0

[编程文档wannianli45648

说明:PROTEUS万年历设计,可运行,基于AT89C51单片机设计程序-PROTEUS calendar designed to run, based on AT89C51 microcontroller design process
<杨举华> 在 2024-11-17 上传 | 大小:77kb | 下载:0

[编程文档Sampling-of-a-Signal

说明:For a function that varying with time s(t) be a continuous function to be sampled, and sampling be performed by measuring the value of continuous function every T seconds, which is called sampling interval. This sampled
<Shahbaz Badr> 在 2024-11-17 上传 | 大小:10kb | 下载:0

[编程文档A-new-TDOA-algorithm-based-on-Taylor-series-expan

说明:this paper describe the TDOA for locating unknow transmitter
<walid> 在 2024-11-17 上传 | 大小:69kb | 下载:0

[编程文档A-New-Source-and-Receiver-Localization-Method-wit

说明:time differance of arrival is localization technique
<walid> 在 2024-11-17 上传 | 大小:203kb | 下载:0

[编程文档An-Importance-Sampling-Method-for

说明:We consider the source localization problem using time-difference-of-arrival (TDOA) measurements in sensor networks. The maximum likelihood (ML) estimation of the source location can be cast as a nonlinear/nonconve
<walid> 在 2024-11-17 上传 | 大小:430kb | 下载:0

[编程文档Analysis-of-Primary-User-Emulation-Attack-with-Mo

说明:study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user a
<walid> 在 2024-11-17 上传 | 大小:328kb | 下载:0

[编程文档Resource-allocation-for-multiuser-cognitive-OFDM-

说明:we study the resource allocation problem for the multiuser orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems with proportional rate constraints.
<walid> 在 2024-11-17 上传 | 大小:848kb | 下载:0

[编程文档Defense-Against-Primary-User-Emulation-Attacks-in

说明:This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
<walid> 在 2024-11-17 上传 | 大小:1.11mb | 下载:0

[编程文档DIRECTION-OF-ARRIVAL-ESTIMATION-USING-MUSIC-ALGOR

说明:The performance of smart antenna greatly depends on the effectiveness of DOA estimation algorithm
<walid> 在 2024-11-17 上传 | 大小:434kb | 下载:0

[编程文档Detecting-Primary-User-Emulation-Attacks-in-Cogni

说明:Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) me
<walid> 在 2024-11-17 上传 | 大小:2.07mb | 下载:0
« 1 2 ... .40 .41 .42 .43 .44 445.46 .47 .48 .49 .50 ... 2190 »

源码中国 www.ymcn.org