Need
共 452 篇文章
Need 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 452 篇文章,持续更新中。
Introduction+to+RF+Propagation
With the rapid expansion of wireless consumer products,there has been a con-<br />
siderable increase in the need for radio-frequency (RF) planning, link plan-<br />
ning, and propagation modeling.A n
High-Altitude+Platforms
This book was conceived in such a special way. From our experience, and despite the<br />
increasing interest that we perceived amongst the research community in HAPS,<br />
there was not any book in
Handbook of Mobile Ad Hoc Networks
Throughout the course of my work in multihop mobile ad hoc networks (MANET)<br />
over the last several years, I reached the conclusion that mobility models and perfor-<br />
mance metrics need to be
GSM+and+UMTS+The+Creation+of+
This book describes how global mobile communication was made. It is written for those who<br />
want or need to know how this was achieved e.g.:<br />
† Young professionals who want to build their car
Future+Mobile+Communications+LTE
Providing QoS while optimizing the LTE network in a cost efficient manner is<br />
very challenging. Thus, radio scheduling is one of the most important functions<br />
in mobile broadband networks. T
3G,+4G+and+Beyond–BRINGING NETWORKS
In recent years, cellular voice networks have transformed into powerful packet-switched<br />
access networks for both voice communication and Internet access. Evolving Universal<br />
Mobile Telecomm
WBA_FullIndustryReport
With billions of ‘people and things’ becoming increasingly connected, the need to combine the potential<br />
of unlicensed and licensed wireless services has become an imperative for the operators, c
Enablers for Smart Cities
The concept of smart cities emerged few years ago as a new vision for urban<br />
development that aims to integrate multiple information and communication<br />
technology (ICT) solutions in a secure
dummyfile
uploading because I need a file<br />
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized
An Overview of Smart Card Security.
The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but com
This definitive volume contains all the information you need to understand and use SQL and its imple
This definitive volume contains all the information you need to understand and use SQL and its implementations in accordance with the established SQL99 standard
If you need a simple program to time onscreen events this is it. Just click the window and it will
If you need a simple program to time onscreen events
this is it. Just click the window and it will start timing. Click again
and it will stop.
What happens with your machine when you need to move away from the computer for 10 or more minutes?
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play
A flasher for old nokia phones.you need to use a special interface for that not ptovided here in doc
A flasher for old nokia phones.you need to use a special interface for that not ptovided here in doc.But is proved to be a good source info for thouse who want to start comunicate with a gsm phone
This book is for someone who wants to quickly master the basics of how to install, run, and maintai
This book is for someone who wants to quickly master the basics of how to install, run, and
maintain Linux on an Intel-based personal computer. All of the tools you need are included.
Your computer
Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write
Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interactio
Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suit
Driver Virtual keyboard. Allows you to create programs that need to send a key to bypass Win32. Suitable for games where prohibited send key.
This M-File imports data from binary *.dat files, created with PSpice 6.0 (DOS), 9.1 (Student), and
This M-File imports data from binary *.dat files, created with PSpice 6.0 (DOS), 9.1 (Student), and 10.0.3. If you are using newer versions of PSpice, you might need to adjust the code.
this manual for pc3000 mrtool! special repair harddisk for maxtor!but i need software pc3000 mrtool!
this manual for pc3000 mrtool! special repair harddisk for maxtor!but i need software pc3000 mrtool!you won look site : http://space.doit.com.cn/viewthread-45664.html
i am from indonesia !i need software harddisk repair tool for maxtor!
i am from indonesia !i need software harddisk repair tool for maxtor!