派博傳思國際中心

標題: Titlebook: Handbook of Data Communications and Networks; Bill Buchanan Book 1999 Springer Science+Business Media Dordrecht 1999 UNIX.coding.communica [打印本頁]

作者: ergonomics    時間: 2025-3-21 18:21
書目名稱Handbook of Data Communications and Networks影響因子(影響力)




書目名稱Handbook of Data Communications and Networks影響因子(影響力)學科排名




書目名稱Handbook of Data Communications and Networks網(wǎng)絡(luò)公開度




書目名稱Handbook of Data Communications and Networks網(wǎng)絡(luò)公開度學科排名




書目名稱Handbook of Data Communications and Networks被引頻次




書目名稱Handbook of Data Communications and Networks被引頻次學科排名




書目名稱Handbook of Data Communications and Networks年度引用




書目名稱Handbook of Data Communications and Networks年度引用學科排名




書目名稱Handbook of Data Communications and Networks讀者反饋




書目名稱Handbook of Data Communications and Networks讀者反饋學科排名





作者: Conducive    時間: 2025-3-21 21:33
work Operating Systems (Chapters 31-34).LANs/WANs (Chapters 35, 38-46).Serial Communications (Chapters 47 and 48).Parallel Communications (Chapters 50-52).Local Communications (Chapters 53-57).Routing and Protocols (Chapters 36 and 37).Cables and connectors (Chapters 58--60)..Many handbooks and reference guid978-1-4757-0907-0978-1-4757-0905-6
作者: Inelasticity    時間: 2025-3-22 02:54
s protocols (especially TCP/IP).Networking (especially in Ethernet, Fast Ethernet, FDDI and ATM).Networking operating systems (especially in Windows NT, Novell NetWare and UNIX).Communications programs (especially in serial communications, parallel communications and TCP/IP).Computer hardware (espec
作者: Decibel    時間: 2025-3-22 05:56

作者: 大量殺死    時間: 2025-3-22 12:06

作者: scrutiny    時間: 2025-3-22 14:21

作者: glacial    時間: 2025-3-22 20:23
https://doi.org/10.1007/978-3-322-88392-6 or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).
作者: 細查    時間: 2025-3-22 21:41

作者: 顯示    時間: 2025-3-23 03:02

作者: 驕傲    時間: 2025-3-23 07:25
Book 1999s (especially TCP/IP).Networking (especially in Ethernet, Fast Ethernet, FDDI and ATM).Networking operating systems (especially in Windows NT, Novell NetWare and UNIX).Communications programs (especially in serial communications, parallel communications and TCP/IP).Computer hardware (especially in P
作者: Arctic    時間: 2025-3-23 12:46
Error Coding Principles, request a retransmission or discard the data. With error correction the receiver detects an error and tries to correct as many error bits as possible. Again, the more error coding bits are used, the more bits can be corrected. An error correction code is normally used when the receiver cannot request a retransmission.
作者: perimenopause    時間: 2025-3-23 14:15

作者: Vsd168    時間: 2025-3-23 20:23
Data Encryption Principles, as they are normally taken by a courier or postal service and transported in a secure environment from source to destination. Over the coming years more individuals and companies will be using electronic mail systems and these must be totally secure.
作者: Trabeculoplasty    時間: 2025-3-23 23:28
Data Encryption, or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).
作者: 的染料    時間: 2025-3-24 03:06

作者: Toxoid-Vaccines    時間: 2025-3-24 09:16

作者: 一再困擾    時間: 2025-3-24 13:34

作者: gregarious    時間: 2025-3-24 18:47

作者: Calibrate    時間: 2025-3-24 20:35
http://image.papertrans.cn/h/image/421131.jpg
作者: 鋼筆記下懲罰    時間: 2025-3-24 23:19
Part III: Changes in Unfavourable Behaviour,Most sources of information contain redundant information or information that adds little to the stored data. An example of this might be the storage of a rectangular image.
作者: ANTI    時間: 2025-3-25 04:29

作者: 偏離    時間: 2025-3-25 11:11

作者: 同位素    時間: 2025-3-25 12:30
5GtoB Market Space and OpportunitiesComposite video signals must be sampled at twice the highest frequency of the signal. To standardize this sampling, the ITU CCIR-601 (often known as ITU-R) has been devised. It defines three signal components: . (for luminance), .. (for .) and .. (for .).
作者: Keratectomy    時間: 2025-3-25 18:50

作者: Ossification    時間: 2025-3-25 20:47

作者: 易發(fā)怒    時間: 2025-3-26 02:19
Applicability of Article 92 EC Treaty,The benefits of converting from analogue audio to digital audio are:
作者: 拋媚眼    時間: 2025-3-26 05:26
Together in the Past and Future of the NowPublic-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own code whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
作者: finite    時間: 2025-3-26 12:21

作者: 符合國情    時間: 2025-3-26 14:37

作者: entice    時間: 2025-3-26 20:01
Video Signals,This chapter and the next chapter discuss the main technologies using in TV signals and outlines the usage of digital TV. The five main classes of motion video are:
作者: fetter    時間: 2025-3-27 00:52

作者: aplomb    時間: 2025-3-27 05:04
Motion Video Compression,Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes from one image to the next.
作者: ODIUM    時間: 2025-3-27 08:01
Speech and Audio Signals,Speech and audio signals are normally converted into PCM, which can be stored or transmitted as a PCM code, or compressed to reduce the number of bits used to code the samples. Speech generally has a much smaller bandwidth than audio.
作者: 沒有準備    時間: 2025-3-27 10:14
Audio Signals,The benefits of converting from analogue audio to digital audio are:
作者: 不能平靜    時間: 2025-3-27 14:12

作者: NUL    時間: 2025-3-27 17:46

作者: 表皮    時間: 2025-3-27 23:19
978-1-4757-0907-0Springer Science+Business Media Dordrecht 1999
作者: rods366    時間: 2025-3-28 02:29
Erratum to: Unkrautschadwirkungen,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.
作者: BRINK    時間: 2025-3-28 06:47
Concurrency and Declarative Programming,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.
作者: interrupt    時間: 2025-3-28 14:14
Real-World Applications for ChatGPT,t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widely used standards for image compression.
作者: Obstacle    時間: 2025-3-28 16:12

作者: disparage    時間: 2025-3-28 21:30

作者: inundate    時間: 2025-3-28 22:54
Huffman/Lempel-Ziv Compression Methods,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.
作者: Sinus-Rhythm    時間: 2025-3-29 04:05

作者: arrogant    時間: 2025-3-29 10:38

作者: Trypsin    時間: 2025-3-29 11:59
Erratum to: Unkrautschadwirkungen,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.
作者: 嫻熟    時間: 2025-3-29 16:31
Concurrency and Declarative Programming,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.
作者: 思考而得    時間: 2025-3-29 19:46
Real-World Applications for ChatGPT,t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widel
作者: ICLE    時間: 2025-3-30 00:47
Safe and Reliable AI for Autonomous Systemsnd this rate must include both audio and video. Thus, there is a great need for compression of both the video and audio data. The need to compress high-quality audio is also an increasing need as consumers expect higher-quality sound from TV systems and the increasing usage of digital audio radio.
作者: BILIO    時間: 2025-3-30 06:58
Blockchains: The Complete Picture,detection. Error detection allows the receiver to determine if there has been a transmission error. It cannot rebuild the correct data and must either request a retransmission or discard the data. With error correction the receiver detects an error and tries to correct as many error bits as possible
作者: 沉思的魚    時間: 2025-3-30 10:16

作者: anthesis    時間: 2025-3-30 13:12

作者: phase-2-enzyme    時間: 2025-3-30 20:16

作者: 生氣的邊緣    時間: 2025-3-30 21:48
https://doi.org/10.1007/978-3-322-88392-6unicating parities. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm)
作者: JOG    時間: 2025-3-31 04:38
Pegah Hashemvand Khiabani,Wataru Takeuchine node and another on the same network. They do not provide for inter-networking where data can be transferred from one network to another or one network segment to another. For data to be transmitted across networks requires an addressing scheme which is read by a bridge, gateway or router. The in
作者: 婚姻生活    時間: 2025-3-31 06:25
Nicolás Pe?a,David Scarlatti,Aníbal Ollero two hosts and supports error handling. This chapter discusses TCP in more detail and shows how a connection is established then maintained. An important concept of TCP/IP communications is the usage of ports and sockets. A port identifies the process type (such as FTP, TELNET, and so on) and the so
作者: Stagger    時間: 2025-3-31 13:06
Introduction,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.
作者: Substance    時間: 2025-3-31 16:37

作者: 拔出    時間: 2025-3-31 19:26
Image Compression (JPEG),t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widel
作者: 反抗者    時間: 2025-3-31 23:21

作者: 預(yù)防注射    時間: 2025-4-1 05:07

作者: Breach    時間: 2025-4-1 10:01
Error Coding (Detection), order for a code word to be received as another code word. The more bits that are added, the greater the Hamming distance can be, and the objective of a good error detecting code is to be able to maximize the minimum Hamming distance between codes. For example, a code which has a minimum Hamming di
作者: 折磨    時間: 2025-4-1 10:57





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
城口县| 华安县| 滦平县| 红河县| 屯昌县| 云霄县| 富民县| 衡阳县| 额尔古纳市| 五常市| 东莞市| 遵化市| 从江县| 尚义县| 上饶县| 公安县| 大关县| 泾阳县| 文化| 望都县| 土默特右旗| 梨树县| 建湖县| 突泉县| 清原| 锡林浩特市| 东源县| 东平县| 无棣县| 如东县| 阿拉尔市| 台南市| 韶山市| 大化| 河池市| 白城市| 黄冈市| 江城| 舞阳县| 呼图壁县| 宣恩县|