搜索结果
找到约 13 项符合
Examine 的查询结果
按分类筛选
电子书籍 we shall examine nonparametric procedures that can be used with arbitrary distributions and without
we shall examine nonparametric procedures that can be used with arbitrary distributions and without the assumption that the forms of theunderlying densities are known.
文件格式 How to Examine the HTTP Header + Body for a POST to be sent
How to Examine the HTTP Header + Body for a POST to be sent
系统设计方案 The main function of the traffic detection system is to examine the speed, the flow, the vehicle typ
The main function of the traffic detection system is to examine the speed, the flow, the vehicle type and the lane occupancy of the motor vehicles. The method based on ARM embedded system in this paper provides a new means for the traffic detection system research.
模拟电子 模拟IC性能的权衡 模拟到数字化设计的挑战
Abstract: Many digital devices incorporate analog circuits. For instance, microprocessors, applicationspecificintegrated circuits (ASICs), and field-programmable gate arrays (FPGAs) may have internalvoltage references, analog-to-digital converters (ADCs) or digital-to-analog converters (DACs). How ...
电源技术 智能电网安全性
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid di ...
电子书籍 This book is about the management of business processes. This is certainly not a new topic. Since t
This book is about the management of business processes. This is certainly
not a new topic. Since the beginning of the Industrial Revolution, it
has been written about from every possible point of view—economic,
sociological, psychological, accountancy, mechanical engineering and
business administr ...
其他 Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents
行业发展研究 Our approach to understanding mobile learning begins by describing a dialectical approach to the de
Our approach to understanding mobile learning begins by describing a dialectical
approach to the development and presentation of a task model using the sociocognitive
engineering design method. This analysis synthesises relevant theoretical
approaches. We then examine two field studies which feed in ...
其他书籍 This book is concerned with the description and analysis of the global second generation (2G) mobil
This book is concerned with the description and analysis of the global second generation
(2G) mobile radio systems: the Global System of Mobile Communications (GSM) and
cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third
generation (3G) ones with their requirement t ...
其他书籍 This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s
This Handbook, published under the auspices of the Senior NATO
Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n
NATO. It does not attempt to examine current i ssues or provide answers to the
problems that logisticians will face, but i t rather aims at i ntroducing t ...