標(biāo)題: Titlebook: Data Transportation and Protection; John E. Hershey,R. K. Rao Yarlagadda Book 1986 Plenum Press, New York 1986 ISDN.Protection.communicati [打印本頁(yè)] 作者: Encounter 時(shí)間: 2025-3-21 19:11
書目名稱Data Transportation and Protection影響因子(影響力)
書目名稱Data Transportation and Protection影響因子(影響力)學(xué)科排名
書目名稱Data Transportation and Protection網(wǎng)絡(luò)公開(kāi)度
書目名稱Data Transportation and Protection網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Data Transportation and Protection被引頻次
書目名稱Data Transportation and Protection被引頻次學(xué)科排名
書目名稱Data Transportation and Protection年度引用
書目名稱Data Transportation and Protection年度引用學(xué)科排名
書目名稱Data Transportation and Protection讀者反饋
書目名稱Data Transportation and Protection讀者反饋學(xué)科排名
作者: exceptional 時(shí)間: 2025-3-21 22:19 作者: UTTER 時(shí)間: 2025-3-22 02:39 作者: Peristalsis 時(shí)間: 2025-3-22 04:38
Applications of Matrices to Discrete Data System Analysis, the process we show that matrix analysis is a logical tool to use for solving discrete data problems. The major topics of this chapter are convolution, deconvolution, and difference equations. In an earlier chapter we pointed out that matrix transformations can be visualized as converting one set o作者: 仔細(xì)檢查 時(shí)間: 2025-3-22 12:48
Source Encoding, and appropriately model the data source. Is it English text? A Markov source? Facsimile? Each source is unique and so are its output statistics. There is often great opportunity to remove redundancy from a source by using simple encoding methods and doing so may result in an appreciable savings in 作者: Fibrinogen 時(shí)間: 2025-3-22 16:04 作者: Fibrinogen 時(shí)間: 2025-3-22 20:59
The Channel and Error Control, waveforms and then either put directly onto a medium, as is the case with many local area networks, or sent through a modem (modulator/ demodulator) which generates and resolves waveforms designed for use on a specific channel. A communications engineer characterizes the behavior, not of bits throu作者: In-Situ 時(shí)間: 2025-3-22 22:54 作者: 遺棄 時(shí)間: 2025-3-23 02:23 作者: 鞭子 時(shí)間: 2025-3-23 06:45
Matrix Representations,d in a form that is amenable for such a procedure. In this chapter we discuss a matrix representation in terms of its eigenvalues and eigenvectors (Wilkinson, 1965). This approach is valid for real or complex field applications. In the later part of the chapter we discuss different approaches that allow for finite field matrix representations.作者: 引水渠 時(shí)間: 2025-3-23 13:37 作者: 為現(xiàn)場(chǎng) 時(shí)間: 2025-3-23 16:35
Computational Science – ICCS 2020f numbers to another set of numbers. For discrete data systems, we need to identify the order of these numbers, that is, the time these numbers appear before we process. In the next section we discuss discrete signals in terms of some special functions.作者: hangdog 時(shí)間: 2025-3-23 19:48
Rafa? Grzeszczuk,Marcin Kurdzielired of . and . with l and that . wished to discourse with . and. with .. If so, we would have to disconnect these nodes and then reconnect them. This is motivation for considering the network shown in Figure 13.1.作者: fidelity 時(shí)間: 2025-3-24 00:54 作者: 浪費(fèi)時(shí)間 時(shí)間: 2025-3-24 04:37 作者: packet 時(shí)間: 2025-3-24 10:14 作者: Tincture 時(shí)間: 2025-3-24 13:42 作者: 范圍廣 時(shí)間: 2025-3-24 17:11
Book 1986lation. These new engineers apply themselves to data-to its pack- aging, transmission, and protection. They are data engineers. Formal curricula do not yet exist for their dedicated development. Rather they learn most of their tools "on the job" and their roots are in computer engineering, communica作者: Presbyopia 時(shí)間: 2025-3-24 18:59 作者: dialect 時(shí)間: 2025-3-25 01:30 作者: DIKE 時(shí)間: 2025-3-25 06:11
Pawe? Forczmański,Anton Smolińskiof a cyclic (steady-state deterministic) digital process. We consider a variety of epoch and phase synchronization methods, starting with epoch synchronization followed by the phase synchronization types.作者: 音樂(lè)會(huì) 時(shí)間: 2025-3-25 09:04
Ewa Juralewicz,Urszula Markowska-Kaczmarses, of course, because of noise on the channel. Here we are concerned only with the bit stream as it is presented to us after the modem, after all the decisions regarding received waveform processing have been made.作者: 占線 時(shí)間: 2025-3-25 13:36
The Channel and Error Control,ses, of course, because of noise on the channel. Here we are concerned only with the bit stream as it is presented to us after the modem, after all the decisions regarding received waveform processing have been made.作者: Hypopnea 時(shí)間: 2025-3-25 19:33
Book 1986 been written with that goal in mind. Today numerous signs encourage us to expect broader information exchange in the years to come. The movement toward a true Integrated Services Digital Network (ISDN) is perhaps the clearest of these. Also, the development offormal protocol layers reflects both a 作者: 勉強(qiáng) 時(shí)間: 2025-3-25 23:50 作者: exostosis 時(shí)間: 2025-3-26 03:35 作者: 戰(zhàn)勝 時(shí)間: 2025-3-26 06:20
Andrey Epikhin,Matvey KraposhinIn this chapter we consider some of the basic concepts associated with matrix theory and its applications to digital communications, signal processing, and many others.作者: BALK 時(shí)間: 2025-3-26 12:29
Computational Science – ICCS 2020In this chapter we consider solutions of a linear set of equations using some of the concepts discussed in Chapter 4. In addition, we introduce the concepts of a vector space, rank of a matrix, and so on. We end the chapter with a discussion of various transformations that are popular in the digital signal processing area.作者: avulsion 時(shí)間: 2025-3-26 15:47
Sparse Matrix-Based HPC TomographyThe study of random sequences is required by many aspects of data transmission. Synchronization and privacy are but two of these. In this chapter we examine the behavior of random sequences and conclude with a study of the .-sequence—an often used approximation to a random sequence.作者: Arbitrary 時(shí)間: 2025-3-26 20:44
Computational Science – ICCS 2021Modern (substitution) cryptography depends on a very simple concept—modular addition of unpredictable, noiselike quantities to plaintext elements. What do we mean by this and, understanding it, how do we implement it? The following example is intended to motivate the question and lead us to the answer.作者: Protein 時(shí)間: 2025-3-26 20:57
Counting and Probability,Counting, or more formally the mathematics of combinatorics, comprises some of the most difficult and intriguing problems in all of mathematics. It is the essential tool of discrete probability theory as well as serving in other fields of interest to data engineers such as fault isolation, cryptography, and network reliability and survivability.作者: Middle-Ear 時(shí)間: 2025-3-27 01:55 作者: 體貼 時(shí)間: 2025-3-27 08:17
Matrix Equations and Transformations,In this chapter we consider solutions of a linear set of equations using some of the concepts discussed in Chapter 4. In addition, we introduce the concepts of a vector space, rank of a matrix, and so on. We end the chapter with a discussion of various transformations that are popular in the digital signal processing area.作者: SSRIS 時(shí)間: 2025-3-27 12:27
Random and Pseudorandom Sequences,The study of random sequences is required by many aspects of data transmission. Synchronization and privacy are but two of these. In this chapter we examine the behavior of random sequences and conclude with a study of the .-sequence—an often used approximation to a random sequence.作者: assail 時(shí)間: 2025-3-27 14:13 作者: intricacy 時(shí)間: 2025-3-27 19:01 作者: AVERT 時(shí)間: 2025-3-27 22:36 作者: Negotiate 時(shí)間: 2025-3-28 04:00
Computational Science – ICCS 2021 and appropriately model the data source. Is it English text? A Markov source? Facsimile? Each source is unique and so are its output statistics. There is often great opportunity to remove redundancy from a source by using simple encoding methods and doing so may result in an appreciable savings in bits sent.作者: 樂(lè)器演奏者 時(shí)間: 2025-3-28 09:13 作者: 牽連 時(shí)間: 2025-3-28 10:54 作者: Banister 時(shí)間: 2025-3-28 15:22 作者: Infusion 時(shí)間: 2025-3-28 20:09 作者: 變態(tài) 時(shí)間: 2025-3-28 23:15
Computational Science – ICCS 2020 proof is by induction and contradiction. Consider that the first natural number, unity, divides all the natural numbers. It is therefore “interesting.” Now let . be the least natural number that is not “interesting.” Is it then not “interesting” that . is the first noninteresting of the natural num作者: 貿(mào)易 時(shí)間: 2025-3-29 03:18 作者: mitten 時(shí)間: 2025-3-29 07:16 作者: 一大群 時(shí)間: 2025-3-29 14:53
Computational Science – ICCS 2021 and appropriately model the data source. Is it English text? A Markov source? Facsimile? Each source is unique and so are its output statistics. There is often great opportunity to remove redundancy from a source by using simple encoding methods and doing so may result in an appreciable savings in 作者: dithiolethione 時(shí)間: 2025-3-29 19:16
Pawe? Forczmański,Anton Smolińskiment on the epoch or occurrence of a particular instant of time. Phase synchronization comprises those processes that endeavor to determine the phase of a cyclic (steady-state deterministic) digital process. We consider a variety of epoch and phase synchronization methods, starting with epoch synchr作者: 人類學(xué)家 時(shí)間: 2025-3-29 21:18
Ewa Juralewicz,Urszula Markowska-Kaczmar waveforms and then either put directly onto a medium, as is the case with many local area networks, or sent through a modem (modulator/ demodulator) which generates and resolves waveforms designed for use on a specific channel. A communications engineer characterizes the behavior, not of bits throu作者: Project 時(shí)間: 2025-3-30 00:24 作者: 窒息 時(shí)間: 2025-3-30 06:00
Lecture Notes in Computer Sciencendividual component survivabilities. The most basic of the topological questions is node “connectivity.” Node connectivity means simply the linking together of centers that can originate or receive messages by means of pathways or, as they are more appropriately termed, “l(fā)inks.” We will at first ass作者: 代理人 時(shí)間: 2025-3-30 08:51
,Data—Its Representation and Manipulation,oncept—number systems. The number systems considered are those common ones of “normal binary representation,” negabinary, and Gray coding. We also introduce a less well known “mixed-radix system,” based on the factorials. This representation will be of use to us later on when we look at combinatorics.作者: 發(fā)現(xiàn) 時(shí)間: 2025-3-30 14:04 作者: 偽造者 時(shí)間: 2025-3-30 17:07
Source Encoding, and appropriately model the data source. Is it English text? A Markov source? Facsimile? Each source is unique and so are its output statistics. There is often great opportunity to remove redundancy from a source by using simple encoding methods and doing so may result in an appreciable savings in bits sent.