搜索结果
找到约 25 项符合
Exploit 的查询结果
按分类筛选
Delphi控件源码 *** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved
*** HyperString v6.0 ***
(c)1996-2000 EFD Systems, All rights reserved
efd@mindspring.com
*** THIS IS NOT PUBLIC DOMAIN SOFTWARE ***
See below for license agreement, disclaimer, installation and use.
Introduction ------------- ...
书籍 Amplify-and-Forward+Relaying
Relaying techniques, in which a source node communicates to a destination node
with the help of a relay, have been proposed as a cost-effective solution to address
the increasing demand for high data rates and reliable services over the air. As
such, it is crucial to design relay systems that are ab ...
书籍 Cognitive+Radio+Networks
According to the statistics of the Federal Communications Commission
(FCC), temporal and geographical variations in the utilization of the as-
signed spectrum range from 15% to 85%. The limited available radio spec-
trum and the inefficiency in spectrum usage necessitate a new commu-
nication paradi ...
书籍 Feedback+Strategies+for+Wireless+Communication
During the past decade, many wireless communication techniques have been
developedto achievevariousgoals suchas higherdata rate,morerobustlink quality,
and higher number of users in a given bandwidth. For wireless communication
systems, depending on the availability of a feedback link, two approache ...
论文 Large-scale+Antenna+Systems
To meet the future demand for huge traffic volume of wireless data service, the research on the fifth generation
(5G) mobile communication systems has been undertaken in recent years. It is expected that the spectral and energy
efficiencies in 5G mobile communication systems should be ten-fold highe ...