虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Scenario

  • Broadband Access Scenario 使用学习方法来进行无线链路的自适应

    Broadband Access Scenario 使用学习方法来进行无线链路的自适应,包含信道编码,交织,信道建模,ofdm调制,解码,解交织,解调等等, 一个完整的无线物理层试验环境

    标签: Broadband Scenario Access 无线链路

    上传时间: 2013-12-18

    上传用户:chongcongying

  • As an alternate to the migration Scenario, Microsoft offers some interoperation solutions (in an int

    As an alternate to the migration Scenario, Microsoft offers some interoperation solutions (in an interoperation Scenario, you don t try to turn the MFC code into .NET automatically, you just try to ensure that they can work together):

    标签: interoperation alternate Microsoft migration

    上传时间: 2017-07-01

    上传用户:wys0120

  • Program that demonstrates a socket connection in a mobile phone Scenario.

    Program that demonstrates a socket connection in a mobile phone Scenario.

    标签: demonstrates connection Scenario Program

    上传时间: 2017-08-31

    上传用户:源码3

  • 基于OFDM的无线宽带系统仿真It contains mainly two parts, i.e. link-level simulator and system-level simulator.

    基于OFDM的无线宽带系统仿真It contains mainly two parts, i.e. link-level simulator and system-level simulator. Link-level simulator focus on a single-cell single-user Scenario, where signal is transmitted from tx, and estimated at rx. Comparing the difference in tx/rx signal, the error rate can be found out. The output of the link-level simulator is the BLER/BER vs. SNR mapping table, that can be used for the system-level simulation. System-level simulator focus on a multi-cell multi-user Scenario. For the sake of simplicity, it takes the mapping table aquired in the link-level simulation, measure the actural SNR, and finds the corresponding error rate.

    标签: simulator i.e. system-level link-level

    上传时间: 2016-03-15

    上传用户:xsnjzljj

  • Imagine that you are a web developer (which is probably not a stretch if you are reading this book)

    Imagine that you are a web developer (which is probably not a stretch if you are reading this book) and you are being encouraged to add some Ajax features to a site you’re working on. Maybe the originator of this request is your boss or your boss’s boss, who is not even sure what Ajax is, let alone what kinds of features might be useful.And maybe you’re not sure yourself. Imagine that your prior experience has mostly been on the server-side, developing in Java or some other server-side technology, and your experience with HTML and JavaScript has been fairly limited.This is the Scenario we will explore over the next several chapters as you are introduced to the Dojo Toolkit.

    标签: are developer you probably

    上传时间: 2013-11-27

    上传用户:凤临西北

  • Performance Evaluation in a two lane and four lane traffic environment in case of a highway, urb

    Performance Evaluation in a two lane and four lane traffic environment in case of a highway, urban congested traffic Scenario and in a traffic jam

    标签: lane Performance environment Evaluation

    上传时间: 2017-09-20

    上传用户:xaijhqx

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This Scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Interference+Cancellation6

    In this book, we study the interference cancellation and detection problem in multiantenna multi-user Scenario using precoders. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or the com- plexity of the system.

    标签: Cancellation6 Interference

    上传时间: 2020-05-27

    上传用户:shancjb

  • MEMS+Lorentz+Force+Magnetometers

    Nowadays sensors are part of everyday life in a wide variety of fields: scientific applications, medical instrumentation, industrial field, ...and, last but not least, popular mass production and low-cost goods, like smartphones and other mobile devices. Markets and business behind the field of sensors are quite impressive. A common trend for consumer applications is miniaturization which requires, on one side, a lot of research, development efforts, and resources but, on the other hand, allows costs and final application size reduction. In this Scenario scientific community and industries are very active to drive innovation.

    标签: Magnetometers Lorentz Force MEMS

    上传时间: 2020-06-06

    上传用户:shancjb

  • The Internet of Things From RFI

    With more than two billion terminals in commercial operation world-wide, wire- less and mobile technologies have enabled a first wave of pervasive communication systems and applications. Still, this is only the beginning as wireless technologies such as RFID are currently contemplated with a deployment potential of tens of billions of tags and a virtually unlimited application potential. A recent ITU report depicts a Scenario of “Internet of things” — a world in which billions of objects will report their location, identity, and history over wireless connections.

    标签: Internet Things From The RFI of

    上传时间: 2020-06-08

    上传用户:shancjb