標題: Titlebook: Handbook of Data Communications and Networks; Bill Buchanan Book 1999 Springer Science+Business Media Dordrecht 1999 UNIX.coding.communica [打印本頁] 作者: ergonomics 時間: 2025-3-21 18:21
書目名稱Handbook of Data Communications and Networks影響因子(影響力)
書目名稱Handbook of Data Communications and Networks影響因子(影響力)學科排名
書目名稱Handbook of Data Communications and Networks網(wǎng)絡(luò)公開度
書目名稱Handbook of Data Communications and Networks網(wǎng)絡(luò)公開度學科排名
書目名稱Handbook of Data Communications and Networks被引頻次
書目名稱Handbook of Data Communications and Networks被引頻次學科排名
書目名稱Handbook of Data Communications and Networks年度引用
書目名稱Handbook of Data Communications and Networks年度引用學科排名
書目名稱Handbook of Data Communications and Networks讀者反饋
書目名稱Handbook of Data Communications and Networks讀者反饋學科排名
作者: Conducive 時間: 2025-3-21 21:33
work Operating Systems (Chapters 31-34).LANs/WANs (Chapters 35, 38-46).Serial Communications (Chapters 47 and 48).Parallel Communications (Chapters 50-52).Local Communications (Chapters 53-57).Routing and Protocols (Chapters 36 and 37).Cables and connectors (Chapters 58--60)..Many handbooks and reference guid978-1-4757-0907-0978-1-4757-0905-6作者: Inelasticity 時間: 2025-3-22 02:54
s protocols (especially TCP/IP).Networking (especially in Ethernet, Fast Ethernet, FDDI and ATM).Networking operating systems (especially in Windows NT, Novell NetWare and UNIX).Communications programs (especially in serial communications, parallel communications and TCP/IP).Computer hardware (espec作者: Decibel 時間: 2025-3-22 05:56 作者: 大量殺死 時間: 2025-3-22 12:06 作者: scrutiny 時間: 2025-3-22 14:21 作者: glacial 時間: 2025-3-22 20:23
https://doi.org/10.1007/978-3-322-88392-6 or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).作者: 細查 時間: 2025-3-22 21:41 作者: 顯示 時間: 2025-3-23 03:02 作者: 驕傲 時間: 2025-3-23 07:25
Book 1999s (especially TCP/IP).Networking (especially in Ethernet, Fast Ethernet, FDDI and ATM).Networking operating systems (especially in Windows NT, Novell NetWare and UNIX).Communications programs (especially in serial communications, parallel communications and TCP/IP).Computer hardware (especially in P作者: Arctic 時間: 2025-3-23 12:46
Error Coding Principles, request a retransmission or discard the data. With error correction the receiver detects an error and tries to correct as many error bits as possible. Again, the more error coding bits are used, the more bits can be corrected. An error correction code is normally used when the receiver cannot request a retransmission.作者: perimenopause 時間: 2025-3-23 14:15 作者: Vsd168 時間: 2025-3-23 20:23
Data Encryption Principles, as they are normally taken by a courier or postal service and transported in a secure environment from source to destination. Over the coming years more individuals and companies will be using electronic mail systems and these must be totally secure.作者: Trabeculoplasty 時間: 2025-3-23 23:28
Data Encryption, or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) and a popular public-key technique is RSA (named after its inventors, Rivest, Shamir and Adleman).作者: 的染料 時間: 2025-3-24 03:06 作者: Toxoid-Vaccines 時間: 2025-3-24 09:16 作者: 一再困擾 時間: 2025-3-24 13:34 作者: gregarious 時間: 2025-3-24 18:47 作者: Calibrate 時間: 2025-3-24 20:35
http://image.papertrans.cn/h/image/421131.jpg作者: 鋼筆記下懲罰 時間: 2025-3-24 23:19
Part III: Changes in Unfavourable Behaviour,Most sources of information contain redundant information or information that adds little to the stored data. An example of this might be the storage of a rectangular image.作者: ANTI 時間: 2025-3-25 04:29 作者: 偏離 時間: 2025-3-25 11:11 作者: 同位素 時間: 2025-3-25 12:30
5GtoB Market Space and OpportunitiesComposite video signals must be sampled at twice the highest frequency of the signal. To standardize this sampling, the ITU CCIR-601 (often known as ITU-R) has been devised. It defines three signal components: . (for luminance), .. (for .) and .. (for .).作者: Keratectomy 時間: 2025-3-25 18:50 作者: Ossification 時間: 2025-3-25 20:47 作者: 易發(fā)怒 時間: 2025-3-26 02:19
Applicability of Article 92 EC Treaty,The benefits of converting from analogue audio to digital audio are:作者: 拋媚眼 時間: 2025-3-26 05:26
Together in the Past and Future of the NowPublic-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own code whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.作者: finite 時間: 2025-3-26 12:21 作者: 符合國情 時間: 2025-3-26 14:37 作者: entice 時間: 2025-3-26 20:01
Video Signals,This chapter and the next chapter discuss the main technologies using in TV signals and outlines the usage of digital TV. The five main classes of motion video are:作者: fetter 時間: 2025-3-27 00:52 作者: aplomb 時間: 2025-3-27 05:04
Motion Video Compression,Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes from one image to the next.作者: ODIUM 時間: 2025-3-27 08:01
Speech and Audio Signals,Speech and audio signals are normally converted into PCM, which can be stored or transmitted as a PCM code, or compressed to reduce the number of bits used to code the samples. Speech generally has a much smaller bandwidth than audio.作者: 沒有準備 時間: 2025-3-27 10:14
Audio Signals,The benefits of converting from analogue audio to digital audio are:作者: 不能平靜 時間: 2025-3-27 14:12 作者: NUL 時間: 2025-3-27 17:46 作者: 表皮 時間: 2025-3-27 23:19
978-1-4757-0907-0Springer Science+Business Media Dordrecht 1999作者: rods366 時間: 2025-3-28 02:29
Erratum to: Unkrautschadwirkungen,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.作者: BRINK 時間: 2025-3-28 06:47
Concurrency and Declarative Programming,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.作者: interrupt 時間: 2025-3-28 14:14
Real-World Applications for ChatGPT,t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widely used standards for image compression.作者: Obstacle 時間: 2025-3-28 16:12 作者: disparage 時間: 2025-3-28 21:30 作者: inundate 時間: 2025-3-28 22:54
Huffman/Lempel-Ziv Compression Methods,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.作者: Sinus-Rhythm 時間: 2025-3-29 04:05 作者: arrogant 時間: 2025-3-29 10:38 作者: Trypsin 時間: 2025-3-29 11:59
Erratum to: Unkrautschadwirkungen,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.作者: 嫻熟 時間: 2025-3-29 16:31
Concurrency and Declarative Programming,r data files, documents, images, and so on. The two main techniques are statistical coding and repetitive sequence suppression. This chapter discusses two of the most widely used methods for general data compression: Huffman coding and Lempel-Ziv coding.作者: 思考而得 時間: 2025-3-29 19:46
Real-World Applications for ChatGPT,t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widel作者: ICLE 時間: 2025-3-30 00:47
Safe and Reliable AI for Autonomous Systemsnd this rate must include both audio and video. Thus, there is a great need for compression of both the video and audio data. The need to compress high-quality audio is also an increasing need as consumers expect higher-quality sound from TV systems and the increasing usage of digital audio radio.作者: BILIO 時間: 2025-3-30 06:58
Blockchains: The Complete Picture,detection. Error detection allows the receiver to determine if there has been a transmission error. It cannot rebuild the correct data and must either request a retransmission or discard the data. With error correction the receiver detects an error and tries to correct as many error bits as possible作者: 沉思的魚 時間: 2025-3-30 10:16 作者: anthesis 時間: 2025-3-30 13:12 作者: phase-2-enzyme 時間: 2025-3-30 20:16 作者: 生氣的邊緣 時間: 2025-3-30 21:48
https://doi.org/10.1007/978-3-322-88392-6unicating parities. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The two most popular private-key techniques are DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) 作者: JOG 時間: 2025-3-31 04:38
Pegah Hashemvand Khiabani,Wataru Takeuchine node and another on the same network. They do not provide for inter-networking where data can be transferred from one network to another or one network segment to another. For data to be transmitted across networks requires an addressing scheme which is read by a bridge, gateway or router. The in作者: 婚姻生活 時間: 2025-3-31 06:25
Nicolás Pe?a,David Scarlatti,Aníbal Ollero two hosts and supports error handling. This chapter discusses TCP in more detail and shows how a connection is established then maintained. An important concept of TCP/IP communications is the usage of ports and sockets. A port identifies the process type (such as FTP, TELNET, and so on) and the so作者: Stagger 時間: 2025-3-31 13:06
Introduction,he countries and the peoples of the world. Without it, many industries could not exist. It is the objective of this book to discuss data communications in a readable form that both students and professionals all over the world can understand.作者: Substance 時間: 2025-3-31 16:37 作者: 拔出 時間: 2025-3-31 19:26
Image Compression (JPEG),t has excellent compression ratio when applied to a color image. This chapter introduces the JPEG standard and the method used to compress an image. It also discusses the JFIF file standard which defines the file format for JPEG encoded images. Along with GIF files, JPEG is now one of the most widel作者: 反抗者 時間: 2025-3-31 23:21 作者: 預(yù)防注射 時間: 2025-4-1 05:07 作者: Breach 時間: 2025-4-1 10:01
Error Coding (Detection), order for a code word to be received as another code word. The more bits that are added, the greater the Hamming distance can be, and the objective of a good error detecting code is to be able to maximize the minimum Hamming distance between codes. For example, a code which has a minimum Hamming di作者: 折磨 時間: 2025-4-1 10:57