资源列表
06292878---7
- Energy Efficient Localization of Primary Users for Avoiding Interference in Cognitive Networks
Electronics-And-Circuit-Analysis-Using-MATLAB
- The goals of writing this book are (1) to provide the reader with simple, easy, hands-on introduction to MATLAB (2) to demonstrate the use of MATLAB for solving electronics problems (3) to show the various ways MATLAB can be used to solve circuit ana
Digital-Signal-Processing--System-Analysis-and-De
- Digital signal processing is the discipline that studies the rules governing the behavior of discrete signals, as well as the systems used to process them. It also deals with the issues involved in processing continuous signals using digital techniqu
Engineering-Noise-Control--Theory-and-Practice.ra
- The recognition of noise as a source of annoyance began in antiquity, but therelationship, sometimes subtle, that may exist between noise and money seems to be a development of more recent times. For example, the manager of a large wind tunnel once t
Adaptive-Digital-Filters
- The main idea behind this book, and the incentive for writing it, is that strong connections exist between adaptive filtering and signal analysis, to the extent that it is not realistic—at least from an engineering point of view—to separate them. In
an0055_efm32_speex_codec
- Speex ARM voice codec library
EPON-MAC
- 基于OPNET的EPON MAC仿真,文章建立了一个详细的EPON MAC协议模型-An paper that gives a detail analysis of the EPON MAC protocol
SPI_Bridge_Design_Example
- altera SPI_Bridge_Design_Example
DNP3-Primer-Rev-A
- dnp 3.0 primer with objec list and functions
[2]Data-Communications-and-Networking-By-Behrouz-
- This book is written for both an academic and a professional audience. The book can be used as a self-study guide for interested professionals. As a textbook, it can be used for a one-semester or one-quarter course. The following are some guideli
XAUI
- XAUI IP core for 10 GB ethernet or similar
Metasploit.Penetration.Testing
- Penetration testing is one of the core aspects of network security in today s scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system s major com
