While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
资源简介:While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
上传时间: 2013-12-09
上传用户:xc216
资源简介:the aim of this book is to provide the reader with a thorough grounding in the General Packet Radio Service – GPRS.the introduction contains a basic review of GSM to ensure that the reader is clear on the main aspects of circuit switched ...
上传时间: 2016-03-30
上传用户:康郎
资源简介:the production of this book required the efforts of many people, but two in particular deserve to be singled out for their diligent, sustained, and unselfish efforts. Sally Stickney, the book s principal editor, navigated me through that mi...
上传时间: 2016-07-15
上传用户:ve3344
资源简介:the purpose of this book is to provide experienced software developers with the means to quickly become productive in Microsoft s Visual Basic .NET development environment.
上传时间: 2013-12-22
上传用户:Ants
资源简介:the emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Si...
上传时间: 2017-07-05
上传用户:waitingfy
资源简介:IBM MQ  Introduction and overview This chapter describes the scope of this book and introduces WebSphere Business Integration Message Broker, WebSphere Business Integration Event Broker, and their main components.
上传时间: 2015-05-13
上传用户:xuanjie
资源简介:Getting Started with JBoss 4.0 Release 5 the goal of this book is to get you up and running J2EE 1.4 applications on JBoss 4.0 as quickly as possible.
上传时间: 2014-01-26
上传用户:ynzfm
资源简介:A large body of computer-aided techniques has been developed in recent years to assist in the process of modeling, analyzing, and designing communication systems . these computer-aided techniques fall into two categories: formula-based ap...
上传时间: 2014-01-01
上传用户:541657925
资源简介:the neuro-fuzzy software for identification and data analysis has been implemented in the MATLAB language ver. 4.2. the software trains a fuzzy architecture, inspired to Takagi-Sugeno approach, on the basis of a training set of N (singl...
上传时间: 2014-01-12
上传用户:zgu489
资源简介:This is a boiler test system,has been use in factory
上传时间: 2015-09-24
上传用户:许小华
资源简介:A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after ...
上传时间: 2016-07-30
上传用户:xiaodu1124
资源简介:fuzzy systems for wind has been described in this controller run using matlab
上传时间: 2017-07-05
上传用户:亚亚娟娟123
资源简介:Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designat...
上传时间: 2017-01-23
上传用户:woshiayin
资源简介:phpMyAdmin is a tool written in PHP intended to handle the administration of MySQL over the Web. Currently it can create and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields
上传时间: 2015-10-30
上传用户:时代电子小智
资源简介:2D Collsion Detection in Real-time Demonstration This is the sample application that accompanies Game Developer magazine. It is meant as a demonstration of a method for 2D collision detection.
上传时间: 2016-01-17
上传用户:sardinescn
资源简介:this a sample about the VGA COLORBAR,the function of this code is show eight different colour in VGA,it s default installation is D:\RedLogic\RCII_samples, and the software environment is quatrusII 5.0,it is usefull for studying hardware.
上传时间: 2016-03-12
上传用户:shawvi
资源简介:this a sample about the VGA BLUE,the function of this code is show blue in VGA,it s default installation is D:\RedLogic\RCII_samples, and the software environment is quatrusII 5.0,it is usefull for studying hardware.
上传时间: 2014-01-03
上传用户:xwd2010
资源简介:the goal of this exercise is to understand the concept of Carrier-Sensing in IEEE 802.11 standard and compare Physical Carrier Sense and Virtual Carrier Sense mechanisms.
上传时间: 2014-01-10
上传用户:ljt101007
资源简介:the goal of this exercise is to understand the concept of starvation and unfairness in IEEE 802.11 standard.
上传时间: 2016-05-07
上传用户:www240697738
资源简介:the purpose of this code is to demonstrate how to get started using the GPIFTool utility in EZUSB FX2 GPIF applications
上传时间: 2016-10-10
上传用户:rocwangdp
资源简介:Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time hobby of a Finnish computer scientist by the name of Linus Torvalds, Linux was at first accessible only in software source code form to th...
上传时间: 2013-12-12
上传用户:dianxin61
资源简介:the purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and packaging servlets and JSPs. If you have never developed a servlet or JSP before, or just need to brush up on the technology to jumpstart your...
上传时间: 2014-01-13
上传用户:541657925
资源简介:QAM for WCDMA in wireless comunication for the implementation of WCDMA over the 2G
上传时间: 2013-12-14
上传用户:sz_hjbf
资源简介:It is not the intention of this application note to illustrate usage of the part in either of operational modes. the application note does not cover details on setting up for data transfers. After having reviewed this application note, t...
上传时间: 2013-12-09
上传用户:qoovoop
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2017-05-17
上传用户:日光微澜
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2017-05-17
上传用户:teddysha
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2013-12-12
上传用户:15736969615
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2013-11-28
上传用户:maizezhen
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2013-11-28
上传用户:784533221
资源简介:This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
上传时间: 2017-05-17
上传用户:chens000