• 5000 từ tiếng Anh phổ biến nhất

    5000 từ tiếng Anh phổ biến nhất

    Toàn bộ những từ vụng phổ biến nhất mà bạn cần phải biết. rất hay

     184 p mku 20/03/2012 253 7

  • Acquisition probability of multi-user UWB systems in the presence of a novel synchronization approach

    Acquisition probability of multi-user UWB systems in the presence of a novel synchronization approach

    In this paper, to synchronize Ultra Wideband (UWB) systems in ad-hoc multi-user environments, we propose a new timing acquisition approach for achieving a good performance despite the difficulties to get there. Synchronization constraints are caused by the ultra-short emitted waveforms nature of UWB signals. Used in [1, 2] for single-user environments, our timing acquisition approach is based on two successive stages or floors. Extended for...

     9 p mku 26/09/2012 232 1

  • Comparative analysis of ADTCP and M-ADTCP: Congestion Control Techniques for improving TCP performance over Ad-hoc Networks

    Comparative analysis of ADTCP and M-ADTCP: Congestion Control Techniques for improving TCP performance over Ad-hoc Networks

    Identifying the occurrence of congestion in a Mobile Ad-hoc Network (MANET) is a major task. The inbuilt congestion control techniques of existing Transmission Control Protocol (TCP) designed for wired networks do not handle the unique properties of shared wireless multi-hop link. There are several approaches proposed for detecting and overcoming the congestion in the mobile ad-hoc network. In this paper we present a Modified AD-hoc...

     9 p mku 26/09/2012 235 1

  • ENERGY AWARE ROUTING SCHEME FOR MOBILE AD HOC NETWORK USING VARIABLE RANGE TRANSMISSION

    ENERGY AWARE ROUTING SCHEME FOR MOBILE AD HOC NETWORK USING VARIABLE RANGE TRANSMISSION

    This paper discusses a new energy aware routing scheme which uses variable transmission range. The protocol has been incorporated along with the route discovery procedure of AODV as a case study. Both the protocols are simulated using Network Simulator and comparisons are made to analyze their performance based on energy consumption, network lifetime and number of alive nodes metrics for different network scenarios. The results show that EAR...

     11 p mku 26/09/2012 203 1

  • The 8051 Microcontroller

    The 8051 Microcontroller

    A microcontroller is an economical computer-on-a-chip built for dealing with specific tasks, such as displaying or receiving information through LEDs or remote controlled devices. The most commonly used set of microcontrollers belong to 8051 Family. 8051 Microcontrollers continue to remain a preferred choice for a vast community of hobbyists and professionals. Through 8051, the world became witness to the most revolutionary set of...

     20 p mku 05/10/2012 220 1

  • Tiểu luận Advantages and disadvantages of credits cards to the customer

    Tiểu luận Advantages and disadvantages of credits cards to the customer

    Credit cards are a risky part of banking. Banks have set this up very well in away to profit both them and the customer. There is not a perfect thing in thisworld and that includes credit card handling. Most people are often terrifiedof using credit cards, but there is nothing in this world that does not requirerisk taking.The credit card has only been a terror to those who have not handled it verywell and carefully enough. Just as other...

     8 p mku 03/07/2019 127 1

  • International Standard Banking Practice for the Examination of Documents under Documentary Credits subject to UCP 600 (ISBP)

    International Standard Banking Practice for the Examination of Documents under Documentary Credits subject to UCP 600 (ISBP)

    Since the approval of International Standard Banking Practice (ISBP) by the ICC Banking Commission in 2002, ICC Publication 645 has become an invaluable aid to banks, corporates, logistics specialists and insurance companies alike, on a global basis. Since the approval of international standard banking practive by the ICC banking.

     36 p mku 02/06/2012 161 1

  • Red Hat Linux Security and Optimization

    Red Hat Linux Security and Optimization

    Mohammed Kabir is the founder and CEO of Evoknow, Inc. His company specializes in open-source solutions and customer relationship management software development. When he is not busy managing software projects or writing books, he enjoys traveling around the world. Kabir studied computer engineering at California State University, Sacramento. He is also the author of Red Hat Linux Server and Apache Server Bible. He can be reached at...

     721 p mku 02/06/2012 155 1

  • Anroid 2.2 user guide

    Anroid 2.2 user guide

    Computer software (English: Computer Software) or referred to as Software (Software) is a set of statements or instructions (Instruction) is written in a programming language or in a specified order, and other data or documents related to automatically perform some task or function or solve a particular problem

     354 p mku 02/06/2012 133 1

  • International Standard Banking Practice for the Examination of Documents under Documentary Credits subject to UCP 600 (ISBP)

    International Standard Banking Practice for the Examination of Documents under Documentary Credits subject to UCP 600 (ISBP)

    Since the approval of International Standard Banking Practice (ISBP) by the ICC Banking Commission in 2002, ICC Publication 645 has become an invaluable aid to banks, corporates, logistics specialists and insurance companies alike, on a global basis. Since the approval of international standard banking practive by the ICC banking.

     36 p mku 08/06/2012 200 1

  • Implementing a greedy chain routing technique with spread spectrum on gridbased WSNS

    Implementing a greedy chain routing technique with spread spectrum on gridbased WSNS

    Wireless Sensor Networks (WSN) are set of energy-limited sensors, which recently have been point of interest due to their vast applications. One of the efficient ways to consume energy in these networks is to utilize optimal routing protocols. In this approach, we proposed a greedy hierarchical chain-based routing method, named, PGC (stands for Persian Greedy Chain) which route the network applying Spread Spectrum codes as a mask given to the...

     8 p mku 26/09/2012 208 1

Hướng dẫn khai thác thư viện số