资源列表

« 1 2 ... .30 .31 .32 .33 .34 3335.36 .37 .38 .39 .40 ... 16925 »

[编程文档Sampling-of-a-Signal

说明:For a function that varying with time s(t) be a continuous function to be sampled, and sampling be performed by measuring the value of continuous function every T seconds, which is called sampling interval. This sampled function is given by S(nT),for
<Shahbaz Badr> 在 2025-06-18 上传 | 大小:10kb | 下载:0

[软件工程Texto-integral

说明:Paper Abstract – An adaptive control of Distributed Generation (DG) to provide predictable active power output at the primary distribution substation is described. Often, distribution networks accommodate renewable energy different energy sourc
<elshan.j> 在 2025-06-18 上传 | 大小:139kb | 下载:0

[行业发展研究48pulse

说明:this code is used to generate 48 pulse for renewable energy soures
<mdeep> 在 2025-06-18 上传 | 大小:171kb | 下载:0

[编程文档A-new-TDOA-algorithm-based-on-Taylor-series-expan

说明:this paper describe the TDOA for locating unknow transmitter
<walid> 在 2025-06-18 上传 | 大小:69kb | 下载:0

[编程文档A-New-Source-and-Receiver-Localization-Method-wit

说明:time differance of arrival is localization technique
<walid> 在 2025-06-18 上传 | 大小:203kb | 下载:0

[编程文档An-Importance-Sampling-Method-for

说明:We consider the source localization problem using time-difference-of-arrival (TDOA) measurements in sensor networks. The maximum likelihood (ML) estimation of the source location can be cast as a nonlinear/nonconvex optimization problem,
<walid> 在 2025-06-18 上传 | 大小:430kb | 下载:0

[编程文档Analysis-of-Primary-User-Emulation-Attack-with-Mo

说明:study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
<walid> 在 2025-06-18 上传 | 大小:328kb | 下载:0

[编程文档Resource-allocation-for-multiuser-cognitive-OFDM-

说明:we study the resource allocation problem for the multiuser orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems with proportional rate constraints.
<walid> 在 2025-06-18 上传 | 大小:848kb | 下载:0

[编程文档Defense-Against-Primary-User-Emulation-Attacks-in

说明:This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
<walid> 在 2025-06-18 上传 | 大小:1.11mb | 下载:0

[编程文档DIRECTION-OF-ARRIVAL-ESTIMATION-USING-MUSIC-ALGOR

说明:The performance of smart antenna greatly depends on the effectiveness of DOA estimation algorithm
<walid> 在 2025-06-18 上传 | 大小:434kb | 下载:0

[编程文档Detecting-Primary-User-Emulation-Attacks-in-Cogni

说明:Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
<walid> 在 2025-06-18 上传 | 大小:2.07mb | 下载:0

[软件工程Optimal_World_Models.pdf

说明:does it pay to extend the perimeter of a world model
<asdf12341234> 在 2025-06-18 上传 | 大小:1.91mb | 下载:0
« 1 2 ... .30 .31 .32 .33 .34 3335.36 .37 .38 .39 .40 ... 16925 »

源码中国 www.ymcn.org