搜索结果
找到约 257 项符合
loop-back 的查询结果
书籍 The Mobile Multimedia Business
The first practical examples of mobile communications were used in many countries like
the USA, the UK and Germany in military services, and played a significant role in the
First World War to transfer important information from the front to headquarters to take
further actions. Good and secure wire ...
书籍 Transmission+Systems+Design+Handbooks
Public telephone operators and new independent wireless operators through-
out the world are deploying wireless access in an effort to drastically reduce
delivery costs in the most expensive part of the network?the local loop.
Available radio technology enables both existing and new entrants to acce ...
书籍 Wireless Networking Technology
Although the origins of radio frequency based wireless networking can be
traced back to the University of Hawaii’s ALOHANET research project
in the 1970s, the key events that led to wireless networking becoming
one of the fastest growing technologies of the early 21st century have
been the ratifica ...
书籍 Digital+Home
It has been said that the move from narrowband to broadband access is the second
revolution for the Internet — ‘broadband is more bandwidth than you can use’.
Once users have experienced broadband access there is no turning back. A whole
new world of applications and services becomes possible. No ...
书籍 Power Over Ethernet
December 2007, San Jose, California: It seems a long time ago.
I walked into a big networking company to head their small
Power over Ethernet (PoE) applications team. Surprisingly,
I hardly knew anything about PoE prior to that day, having been a
switching-power conversion engineer almost all my lif ...
书籍 RFID+as+an+Infrastructure
RFID (radio-frequency identification) is the use of a wireless non-contact system
that uses radio-frequencyelectromagnetic fields to transfer datafrom a tag attached
to an object, for the purposes of automatic identification and tracking [38]. The
basic technologies for RFID have been around for a l ...
书籍 Wireless Identification
We are in the era of ubiquitous computing in which the use and development of Radio Frequency Iden-
tification (RFID) is becoming more widespread. RFID systems have three main components: readers,
tags, and database. An RFID tag is composed of a small microchip, limited logical functionality, and an ...
书籍 Beginning+C+for+Arduino
I can remember buying my first electronic calculator. I was teaching a graduate level statistics course and I
had to have a calculator with a square root function. Back in the late 1960s, that was a pretty high-end
requirement for a calculator. I managed to purchase one at the “educational discount ...
书籍 Deep Learning---1
Inventors have long dreamed of creating machines that think. This desire dates
back to at least the time of ancient Greece. The mythical figures Pygmalion,
Daedalus, and Hephaestus may all be interpreted as legendary inventors, and
Galatea, Talos, and Pandora may all be regarded as artificial life ( ...