A system simulation environment in Matlab/Simulink of RFID is constructed in this paper. Special attention is emphasized on the analog/RF circuit.Negative effects are concerned in the system model,such as phase noise of the local oscillator,TX-RX coupling,reflection of the environment, AWGN noise,DC offset,I/Q mismatch,etc.Performance of the whole system can be evaluated by changing the coding method,parameters of building blocks,and operation distance.Finally,some simulation results are presented in this paper.
标签: environment constructed simulation Simulink
上传时间: 2014-01-09
上传用户:zhangliming420
About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases. Release focus: Major feature enhancements Changes: This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download. Author: cruppstahl
标签: C. hamsterdb structure database
上传时间: 2013-12-11
上传用户:LouieWu
xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd". Release focus: Minor feature enhancements Changes: Support for passwordfd, a workaround for some Cisco routers, and extended logging.
标签: Tunneling reference Protocol supports
上传时间: 2014-01-20
上传用户:541657925
FLASH文件系统的源码,Flash memory is a nonvolatile memory, which allows the user to electrically program (write) and erase information. The exponential growth of flash memory has made this technology an indispensable part of hundreds of millions of electronic devices. Flash memory has several significant differences with volatile (RAM) memory and hard drive technologies which requires unique software drivers and file systems. This paper provides an overview of file systems for flash memory and focuses on the unique software requirements of flash memory devices.
上传时间: 2015-11-29
上传用户:问题问题
A fairly conventional 3D matrix object that can transform sets of 3D points and perform a variety of manipulations on the transform
标签: conventional transform perform variety
上传时间: 2015-12-04
上传用户:thesk123
SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
标签: 1590592190 Distilled Security Edition
上传时间: 2015-12-25
上传用户:hj_18
This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block into SDRAM from the ADC (an AD9244 in this example). The frames are then output with a one-frame delay to the DAC (an AD9744 in this example). In this example, no processing is done on the frames. They are passed unaltered.
标签: block-by-block acquired example streams
上传时间: 2015-12-29
上传用户:bjgaofei
VC6.0核心编程。主要涉及到windows消息,框架,mfc库以及相关编程,com,activex技术,数据库技术,网络编程技术。为英文版本。 The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
上传时间: 2016-01-02
上传用户:lmeeworm
《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
We have a group of N items (represented by integers from 1 to N), and we know that there is some total order defined for these items. You may assume that no two elements will be equal (for all a, b: a<b or b<a). However, it is expensive to compare two items. Your task is to make a number of comparisons, and then output the sorted order. The cost of determining if a < b is given by the bth integer of element a of costs (space delimited), which is the same as the ath integer of element b. Naturally, you will be judged on the total cost of the comparisons you make before outputting the sorted order. If your order is incorrect, you will receive a 0. Otherwise, your score will be opt/cost, where opt is the best cost anyone has achieved and cost is the total cost of the comparisons you make (so your score for a test case will be between 0 and 1). Your score for the problem will simply be the sum of your scores for the individual test cases.
标签: represented integers group items
上传时间: 2016-01-17
上传用户:jeffery