CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 成功激励 搜索资源 - technique

搜索资源列表

  1. SIM900

    0下载:
  2. SIMCOM多路复用技术文档:具有GSM和GPRS功能的设备需要同时处理(发送和接受)各种数据流,例如AT指令,GPRS数据流,GSM线路交接数据流等,这些数据彼此独立。 SIM900硬件设计手册:本文档描述了SIM900s的硬件应用接口,包括相关应用场合的电路连接以及射频接口,接口定义,电气性能和结构尺寸的详细信息。-SIMCOM multiplexing technique document: with GSM and GPRS function equipment need to si
  3. 所属分类:IT Hero

    • 发布日期:2017-04-09
    • 文件大小:1261117
    • 提供者:susu
  1. AES_DPA_2_dummy

    0下载:
  2. Differential Power Analysis (DPA) is a kind of side channel attack that makes use of statistically analyzed power consumption records to find out secret cryptographic information. Many types Hardware and Software level countermeasure has been propose
  3. 所属分类:IT Hero

    • 发布日期:2017-03-30
    • 文件大小:105138
    • 提供者:rokeybul
  1. seminar-report-on-clustering

    0下载:
  2. this report for describing technique of improving the effectiveness of information retrieval and fusion-this is report for describing technique of improving the effectiveness of information retrieval and fusion
  3. 所属分类:IT Hero

    • 发布日期:2017-03-29
    • 文件大小:158700
    • 提供者:dippy
  1. finar-report

    0下载:
  2. this the report of normalization technique and also all codd rules-this is the report of normalization technique and also all codd rules...
  3. 所属分类:IT Hero

    • 发布日期:2017-12-07
    • 文件大小:51824
    • 提供者:avi
  1. rfid-anti-collision

    0下载:
  2. SDMA These consist of several dipole antennas, and therefore adaptive SDMA can only be used for RFID application at frequencies above 850MHz(typical 2.45 GHz) as result of size of the antennas. A disadvantage of the SDMA technique is the complica
  3. 所属分类:IT Hero

    • 发布日期:2017-04-16
    • 文件大小:147390
    • 提供者:JK
  1. ENERGY-DETECTION-TECHNIQUE-FOR-SPECTRUM-SENSING-I

    0下载:
  2. Energy Detection technique for spectrum sensing
  3. 所属分类:IT Hero

    • 发布日期:2017-04-24
    • 文件大小:382950
    • 提供者:neas
  1. whitepaper_antidebugging

    0下载:
  2. Abstract— Anti-debugging is the implementation of one or more techniques within computer code that hinders attempts at reverse engineering or debugging a target binary. Within this paper we will present a number of the known methods of antidebugging
  3. 所属分类:成功激励

搜珍网 www.dssz.com