This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
标签: This deterministic concentrates guarantees
上传时间: 2017-05-17
上传用户:teddysha
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
标签: This deterministic concentrates guarantees
上传时间: 2013-12-12
上传用户:15736969615
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
标签: This deterministic concentrates guarantees
上传时间: 2013-11-28
上传用户:maizezhen
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
标签: This deterministic concentrates guarantees
上传时间: 2013-11-28
上传用户:784533221
This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
标签: This deterministic concentrates guarantees
上传时间: 2017-05-17
上传用户:chens000
Video-DVM is a very cheap DVM that shows how an output as complex as a videocomposite signal can be generated entirely in software: two I/O pins and three resistors are all the hardware required. Connected to any TV set it displays voltages, included max and min peaks, using both giant digits and an analog bar-display . A serial data output for computer data logging is provided, too.
标签: videocomposite Video-DVM complex output
上传时间: 2014-12-09
上传用户:xuan‘nian
This file is distributed in the hope that it will be useful, but WITHOUT WARRANTY OF ANY KIND. Author(s): Ole Saether DESCRIPTION: This example should be used together with ex2a-tx433.asm. One nRF9E5 evaluation board (receiver) should be programmed with the hex-file generated from assembling this file and the other evaluation board (transmitter) programmed with the hex-file generated from assembling ex2a-tx433.asm. All switches on the DIP-swith S206 on the receiver must be set to the "on" position and all switches on the DIP-swith S205 on the transmitter must be set to the "on" position. When one of the switched SW1-SW4 on the transmitter is pressed the corresponding LED on the receiver is turned on. The functionality is the same as in ex2c-rx.c.
标签: distributed WARRANTY WITHOUT useful
上传时间: 2017-05-17
上传用户:xieguodong1234
在J2ME中实现虚拟代理,然后过滤user-agent ,用于突破广东移动等的cmwap限制使用方法,启动后将相应软件(如Opera)的代理设成localhost 8080,即可-J2ME virtual agents, then filter user-agent, Guangdong Mobile breakthrough for the restrictions on the use of SMS, will start corresponding software (such as the Opera), the agent set to localhost 8080 can be
上传时间: 2017-05-22
上传用户:wuyuying
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides security
上传时间: 2017-05-25
上传用户:变形金刚
This experiment uses the Blackfi n BF533/BF537 EZ-KIT to run a simple FIR fi lter on stereo channels at a sampling frequency of 48 kHz. The CYCLE register is embedded in the main program ( process_data.c) to benchmark the time needed to process two FIR fi lters. A background telemetry channel (BTC) is set up to display the cycle count.
标签: experiment Blackfi EZ-KIT channe
上传时间: 2013-12-27
上传用户:baiom