we shall examine nonparametric procedures that can be used with arbitrary distributions and without the assumption that the forms of theunderlying densities are known.
标签: distributions nonparametric procedures arbitrary
上传时间: 2016-02-27
上传用户:songnanhua
How to examine the HTTP Header + Body for a POST to be sent
上传时间: 2014-01-05
上传用户:cuiyashuo
The main function of the traffic detection system is to examine the speed, the flow, the vehicle type and the lane occupancy of the motor vehicles. The method based on ARM embedded system in this paper provides a new means for the traffic detection system research.
标签: the detection function examine
上传时间: 2013-12-18
上传用户:busterman
Abstract: Many digital devices incorporate analog circuits. For instance, microprocessors, applicationspecificintegrated circuits (ASICs), and field-programmable gate arrays (FPGAs) may have internalvoltage references, analog-to-digital converters (ADCs) or digital-to-analog converters (DACs). However,there are challenges when you integrate more analog onto a digital design. As with all things in life, inelectronics we must always trade one parameter for another, with the application dictating the propertrade-off of analog function. In this application note, we examine how the demand for economy of spaceand cost pushes analog circuits onto digital substrates, and what design challenges emerge.
上传时间: 2013-11-17
上传用户:菁菁聆听
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.
上传时间: 2013-10-27
上传用户:tecman
This book is about the management of business processes. This is certainly not a new topic. Since the beginning of the Industrial Revolution, it has been written about from every possible point of view—economic, sociological, psychological, accountancy, mechanical engineering and business administration. In this book, we examine the management of business processes from the perspective of computing, or—to put it more broadly—of information technology. The reason is that information technology has made huge leaps forward in recent years, resulting in the creation of completely new ways of organizing business processes. The development of generic software packages for managing business processes—so-called workflow management systems (WFMS)—is particularly important in this respect.
标签: This management certainly processes
上传时间: 2013-11-29
上传用户:shus521
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – examine contents
标签: Intrusion Detection Host-based Network
上传时间: 2014-01-11
上传用户:ikemada
Our approach to understanding mobile learning begins by describing a dialectical approach to the development and presentation of a task model using the sociocognitive engineering design method. This analysis synthesises relevant theoretical approaches. We then examine two field studies which feed into the development of the task model.
标签: approach understanding dialectical describing
上传时间: 2014-11-28
上传用户:comua
This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third generation (3G) ones with their requirement to support multimedia mobile radio communications.
标签: description generation concerned the
上传时间: 2014-01-14
上传用户:2467478207
This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather aims at i ntroducing them to some of the basic principles, policies, concepts and organisations with which they will work.
标签: Logisticians Conference published the
上传时间: 2014-12-07
上传用户:www240697738