资源列表

« 1 2 ... .85 .86 .87 .88 .89 13590.91 .92 .93 .94 .95 ... 16924 »

[行业发展研究48pulse

说明:this code is used to generate 48 pulse for renewable energy soures
<mdeep> 在 2025-10-10 上传 | 大小:171kb | 下载:0

[编程文档A-new-TDOA-algorithm-based-on-Taylor-series-expan

说明:this paper describe the TDOA for locating unknow transmitter
<walid> 在 2025-10-10 上传 | 大小:69kb | 下载:0

[编程文档A-New-Source-and-Receiver-Localization-Method-wit

说明:time differance of arrival is localization technique
<walid> 在 2025-10-10 上传 | 大小:203kb | 下载:0

[编程文档An-Importance-Sampling-Method-for

说明:We consider the source localization problem using time-difference-of-arrival (TDOA) measurements in sensor networks. The maximum likelihood (ML) estimation of the source location can be cast as a nonlinear/nonconvex optimization problem,
<walid> 在 2025-10-10 上传 | 大小:430kb | 下载:0

[编程文档Analysis-of-Primary-User-Emulation-Attack-with-Mo

说明:study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
<walid> 在 2025-10-10 上传 | 大小:328kb | 下载:0

[编程文档Resource-allocation-for-multiuser-cognitive-OFDM-

说明:we study the resource allocation problem for the multiuser orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems with proportional rate constraints.
<walid> 在 2025-10-10 上传 | 大小:848kb | 下载:0

[编程文档Defense-Against-Primary-User-Emulation-Attacks-in

说明:This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
<walid> 在 2025-10-10 上传 | 大小:1.11mb | 下载:0

[编程文档DIRECTION-OF-ARRIVAL-ESTIMATION-USING-MUSIC-ALGOR

说明:The performance of smart antenna greatly depends on the effectiveness of DOA estimation algorithm
<walid> 在 2025-10-10 上传 | 大小:434kb | 下载:0

[编程文档Detecting-Primary-User-Emulation-Attacks-in-Cogni

说明:Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
<walid> 在 2025-10-10 上传 | 大小:2.07mb | 下载:0

[软件工程Optimal_World_Models.pdf

说明:does it pay to extend the perimeter of a world model
<asdf12341234> 在 2025-10-10 上传 | 大小:1.91mb | 下载:0

[软件工程modDRF.pdf

说明:In this paper we present Discriminative Random Fields (DRF), a discrim- inative fr a mework for the classification of natural image regions by incor- porating neighborhood spatial dependencies in the labels as well as the observed data. The proposed
<asdf12341234> 在 2025-10-10 上传 | 大小:148kb | 下载:0

[软件工程IS081113.PDF

说明:Text Dependent (TD) Speaker Recognition systems assume that the password to be uttered by the speaker is known to the system. As the password is known, the system can apply a password-specific model capturing the speaker dynamics well. This enables T
<asdf12341234> 在 2025-10-10 上传 | 大小:218kb | 下载:0
« 1 2 ... .85 .86 .87 .88 .89 13590.91 .92 .93 .94 .95 ... 16924 »

源码中国 www.ymcn.org