Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.
标签: penetrating technology well-known wideband
上传时间: 2014-01-22
上传用户:edisonfather
Ultra wideband (UWB) technology, well-known for its use in ground penetrating radar, has also been of considerable interest in communications and radar applications demanding low probability of intercept and detection (LPI/D), multipath immunity, high data throughput, precision ranging and localization.
标签: penetrating technology well-known wideband
上传时间: 2013-12-11
上传用户:aysyzxzm
The exercise should be finished in English. 2. According to Prof. Zhang s requirement, this exercise mainly focuses on the BER performance of some wireless communication system using specific coding and modulation type through the AWGN channel. Signal-to-Noise ration (SNR) varies from 5dB to 20dB.
标签: requirement According exercise finished
上传时间: 2014-01-06
上传用户:zhangyigenius
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such as Kernel Configuration, Networking, User Administration, and File Management are covered extensively for the administrator who wants a variety of options to choose from for best performance. The book also provides in-depth coverage of configuring and optimizing mail, DNS, HTTP and other services many companies deploy across their intranet and on the Internet
标签: administrator Unleashed Edition written
上传时间: 2017-01-13
上传用户:来茴
Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Management Mechanisms Chapter 2 - Memory Management Policies Chapter 3 - High-Level Services Chapter 4 - Manual Memory Management Chapter 5 - Automatic Memory Management Chapter 6 - Miscellaneous Topics Index List of Figures List of Tables List of Case Studies List of Sidebars
标签: Memory implementation Introduction Management
上传时间: 2013-12-25
上传用户:541657925
This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and
标签: processing ballistic the tracking
上传时间: 2014-10-31
上传用户:yyyyyyyyyy
This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and
标签: processing ballistic the tracking
上传时间: 2014-01-14
上传用户:奇奇奔奔
This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and
标签: processing ballistic the tracking
上传时间: 2013-12-22
上传用户:asddsd
Description: Microsoft?Windows?HTTP Services (WinHTTP) provides developers with a server-supported, high-level interface to the HTTP/1.1 Internet protocol. WinHTTP is designed to be used primarily in server-based scenarios by server applications that communicate with HTTP servers. WinHTTP is also designed for use in system services and HTTP-based client applications. WinHTTP is more secure and robust than WinInet. However, single-user applications that need FTP or gopher functionality, cookie persistence, caching, automatic credential dialog handling, Internet Explorer compatibility, or downlevel platform support should still consider using WinInet.
标签: server-supported Description developers Microsoft
上传时间: 2017-02-07
上传用户:refent