While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
資源簡介:While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
上傳時間: 2013-12-09
上傳用戶:xc216
資源簡介:the aim of this book is to provide the reader with a thorough grounding in the General Packet Radio Service – GPRS.the introduction contains a basic review of GSM to ensure that the reader is clear on the main aspects of circuit switched ...
上傳時間: 2016-03-30
上傳用戶:康郎
資源簡介:the production of this book required the efforts of many people, but two in particular deserve to be singled out for their diligent, sustained, and unselfish efforts. Sally Stickney, the book s principal editor, navigated me through that mi...
上傳時間: 2016-07-15
上傳用戶:ve3344
資源簡介:the purpose of this book is to provide experienced software developers with the means to quickly become productive in Microsoft s Visual Basic .NET development environment.
上傳時間: 2013-12-22
上傳用戶:Ants
資源簡介:the emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Si...
上傳時間: 2017-07-05
上傳用戶:waitingfy
資源簡介:IBM MQ  Introduction and overview This chapter describes the scope of this book and introduces WebSphere Business Integration Message Broker, WebSphere Business Integration Event Broker, and their main components.
上傳時間: 2015-05-13
上傳用戶:xuanjie
資源簡介:Getting Started with JBoss 4.0 Release 5 the goal of this book is to get you up and running J2EE 1.4 applications on JBoss 4.0 as quickly as possible.
上傳時間: 2014-01-26
上傳用戶:ynzfm
資源簡介:A large body of computer-aided techniques has been developed in recent years to assist in the process of modeling, analyzing, and designing communication systems . these computer-aided techniques fall into two categories: formula-based ap...
上傳時間: 2014-01-01
上傳用戶:541657925
資源簡介:the neuro-fuzzy software for identification and data analysis has been implemented in the MATLAB language ver. 4.2. the software trains a fuzzy architecture, inspired to Takagi-Sugeno approach, on the basis of a training set of N (singl...
上傳時間: 2014-01-12
上傳用戶:zgu489
資源簡介:This is a boiler test system,has been use in factory
上傳時間: 2015-09-24
上傳用戶:許小華
資源簡介:A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after ...
上傳時間: 2016-07-30
上傳用戶:xiaodu1124
資源簡介:fuzzy systems for wind has been described in this controller run using matlab
上傳時間: 2017-07-05
上傳用戶:亞亞娟娟123
資源簡介:Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designat...
上傳時間: 2017-01-23
上傳用戶:woshiayin
資源簡介:phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields
上傳時間: 2015-10-30
上傳用戶:時代電子小智
資源簡介:2D Collsion Detection in Real-time Demonstration This is the sample application that accompanies Game Developer magazine. It is meant as a demonstration of a method for 2D collision detection.
上傳時間: 2016-01-17
上傳用戶:sardinescn
資源簡介:this a sample about the VGA COLORBAR,the function of this code is show eight different colour in VGA,it s default installation is D:\RedLogic\RCII_samples, and the software environment is quatrusII 5.0,it is usefull for studying hardware.
上傳時間: 2016-03-12
上傳用戶:shawvi
資源簡介:this a sample about the VGA BLUE,the function of this code is show blue in VGA,it s default installation is D:\RedLogic\RCII_samples, and the software environment is quatrusII 5.0,it is usefull for studying hardware.
上傳時間: 2014-01-03
上傳用戶:xwd2010
資源簡介:the goal of this exercise is to understand the concept of Carrier-Sensing in IEEE 802.11 standard and compare Physical Carrier Sense and Virtual Carrier Sense mechanisms.
上傳時間: 2014-01-10
上傳用戶:ljt101007
資源簡介:the goal of this exercise is to understand the concept of starvation and unfairness in IEEE 802.11 standard.
上傳時間: 2016-05-07
上傳用戶:www240697738
資源簡介:the purpose of this code is to demonstrate how to get started using the GPIFTool utility in EZUSB FX2 GPIF applications
上傳時間: 2016-10-10
上傳用戶:rocwangdp
資源簡介:Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time hobby of a Finnish computer scientist by the name of Linus Torvalds, Linux was at first accessible only in software source code form to th...
上傳時間: 2013-12-12
上傳用戶:dianxin61
資源簡介:the purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and packaging servlets and JSPs. If you have never developed a servlet or JSP before, or just need to brush up on the technology to jumpstart your...
上傳時間: 2014-01-13
上傳用戶:541657925
資源簡介:QAM for WCDMA in wireless comunication for the implementation of WCDMA over the 2G
上傳時間: 2013-12-14
上傳用戶:sz_hjbf
資源簡介:It is not the intention of this application note to illustrate usage of the part in either of operational modes. the application note does not cover details on setting up for data transfers. After having reviewed this application note, t...
上傳時間: 2013-12-09
上傳用戶:qoovoop
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2017-05-17
上傳用戶:日光微瀾
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2017-05-17
上傳用戶:teddysha
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2013-12-12
上傳用戶:15736969615
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2013-11-28
上傳用戶:maizezhen
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2013-11-28
上傳用戶:784533221
資源簡介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上傳時間: 2017-05-17
上傳用戶:chens000