搜索结果

找到约 150 项符合 third-Party 的查询结果

Java编程 Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time ...
https://www.eeworm.com/dl/633/444481.html
下载: 109
查看: 1142

其他书籍 The book consists of three sections. The first, foundations, provides a tutorial overview of the pri

The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are construct ...
https://www.eeworm.com/dl/542/456029.html
下载: 123
查看: 1048

行业发展研究 A certification path is an ordered list of certificates starting with a certificate issued by the re

A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 ...
https://www.eeworm.com/dl/692/472162.html
下载: 199
查看: 1063

加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
https://www.eeworm.com/dl/519/481913.html
下载: 120
查看: 1035

书籍 Image processing

Image processing third edition
https://www.eeworm.com/dl/514139.html
下载: 2
查看: 12

书籍 Heterogeneous Wireless Access Networks

With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third gener- ation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile us ...
https://www.eeworm.com/dl/521922.html
查看: 38

书籍 HSDPAHSUPA+for+UMTS+High+Speed+Radio+Access

The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were launched during 2002. By the end of 2005 there were 100 open WCDMA networks and a total of over 150 operators having frequency licenses for WCDMA operation. Currently, the WCDMA network ...
https://www.eeworm.com/dl/521927.html
查看: 41

书籍 Introduction+to+3G+Mobile+Communications

The third generation (3G) mobile communication system is the next big thing in the world of mobile telecommunications. The first generation included analog mobile phones [e.g., Total Access Communications Systems (TACS), Nordic Mobile Telephone (NMT), and Advanced Mobile Phone Service (AMPS)], and t ...
https://www.eeworm.com/dl/521941.html
查看: 84

书籍 Multicarrier+Techniques+for+4G

At recent major international conferences on wireless communications, there have been several sessions on beyond third generation (3G) or fourth generation(4G)mobilecommunicationssystems,wheremodulation/demod- ulation and multiplexing/multiple access schemes related to multicarrier techniques have d ...
https://www.eeworm.com/dl/522014.html
查看: 45

书籍 RISK+COMMUNICATION

The fi rst edition of this book came about because Regina Lundgren had always been fascinated with communication. She started writing novels in the third grade. When she was asked on her fi rst day at the University of Washington what she hoped to do with her degree in scientifi c and technical comm ...
https://www.eeworm.com/dl/522101.html
下载: 1
查看: 35