intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Independent access technique

Xem 1-6 trên 6 kết quả Independent access technique
  • Thoroughly revised, the second edition of Software Testing: A Craftsman's Approach reflects the recent growth and changes in software standards and development. Outdated material has been deleted and new topics, figures, case studies now complement its solid, accessible treatment of the mathematics and techniques of software testing. Foremost among this edition's refinements is the definition of a generalized pseudocode that replaces the outdated Pascal code used in the examples. The text is now independent of any particular programming language.

    pdf190p zizaybay1103 29-05-2024 2 2   Download

  • Lecture Advanced computer architecture: Lesson 33. The main topics covered in this chapter include: operating system interface, parity check code, hamming code, redundant array of independence disk, CRC generator based on the polynomial, performance of RAID levels,...

    ppt29p wangziyi_1307 26-04-2022 13 3   Download

  • Given that social media applications and services have only recently become available, these high usage rates indicate a surprisingly rapid take up among large parts of the European population. These findings are confirmed by a recent IPTS assessment of social computing (Ala-Mutka et al. 2009b) and by figures from other independent sources. Nielsen Online (2009) estimates that, globally, 67% of Internet users accessed social networking sites or blogs in 2008.

    pdf16p docvachiase 03-05-2013 61 7   Download

  • The International Biological Programme (IPB), a world-wide plan of coordinated research on the biological basis of productivity and human welfare, covered terrestrial and aquatic environments, and ran for almost a decade from 1964. Recognising the need for guidance in methodology, the IBP arranged for the publication of a series of handbooks on techniques with the aim of achieving comparability of results all over theworld. One of these handbooks dealt with the study of marine benthos.

    pdf442p japet75 30-01-2013 56 5   Download

  • Telecommunications This chapter deals with applications of independent component analysis (ICA) and blind source separation (BSS) methods to telecommunications. In the following, we concentrate on code division multiple access (CDMA) techniques, because this specific branch of telecommunications provides several possibilities for applying ICA and BSS in a meaningful way. After an introduction to multiuser detection and CDMA communications, we present mathematically the CDMA signal model and show that it can be cast in the form of a noisy matrix ICA model.

    pdf24p khinhkha 29-07-2010 76 3   Download

  • This chapter deals with applications of independent component analysis (ICA) and blind source separation (BSS) methods to telecommunications. In the following, we concentrate on code division multiple access (CDMA) techniques, because this specific branch of telecommunications provides several possibilities for applying ICA and BSS in a meaningful way.

    pdf24p duongph05 09-06-2010 109 13   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
5=>2