CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - Unknown
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - Unknown - List
[
Industry research
]
On the Energy Detection of Unknown Signals Over Fading Channels
DL : 0
On the Energy Detection of Unknown Signals Over Fading ChannelsAbstract—This letter addresses the problem of energy detection of an unknown signal over a multipath channel. It starts with the no-diversity case, and presents some alternative closed-form expressions for the probability of detection to those recently reported in the literature. Detection capability is boosted by implementing both square-law combining and square-law selection diversity schemes. Index Terms—Diversity schemes, energy detection, fading channels, low-power applications, square-law detector, unknown signal detection.
Date
: 2012-02-22
Size
: 170.36kb
User
:
chenpeng3361
[
Industry research
]
RobustadaptiveKalmanfilteringwithunknowninputs
DL : 0
The standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the measurements and the filter residuals.-The optimum standard Kalman filter demand 's complete knowledge of the system parameters. the input forcing functions. and the noise statistics. Several adaptive met hods have already been devised to obtain the unk nown information using the measurements and th e filter residuals.
Date
: 2025-12-29
Size
: 927kb
User
:
rifer
[
Industry research
]
AnAnomalyBasedApproachforIntrusion
DL : 0
A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML file, which is built from only normal traffic, contains a description of the normal behavior of the target web application statistically characterized. Any request which deviates from the normal behavior is considered an attack. The system has been applied to protect a real web application. An increasing number of training requests have been used to train the system. Experiments show that when the XML file has enough information to closely characterize the normal behavior of the target web application, a very high detection rate is reached while the false alarm rate remains very low.
Date
: 2025-12-29
Size
: 672kb
User
:
keerthi
[
Industry research
]
ausws
DL : 0
Adapting to Unknown Smoothness via Wavelet Shrinkage
Date
: 2025-12-29
Size
: 204kb
User
:
rsram
[
Industry research
]
elfind.5
DL : 0
Creates a TLE from two or three observations of a satellite on a single pass. Useful for initial orbit parameters and for unknown satellite identification. This fifth version improves convergence characteristics for the three point fit via F and G series. If more than three points are available, use ELFIND for the initial orbit, then use SATFIT and/or ELCORD to refine the orbit using all the observations.-Creates a TLE from two or three observations of a satellite on a single pass. Useful for initial orbit parameters and for unknown satellite identification. This fifth version improves convergence characteristics for the three point fit via F and G series. If more than three points are available, use ELFIND for the initial orbit, then use SATFIT and/or ELCORD to refine the orbit using all the observations.
Date
: 2025-12-29
Size
: 73kb
User
:
971205021
[
Industry research
]
2010_AES_Estimating-unknown-clutter-intensity-for
DL : 0
Estimating unknown clutter intensity for PHD filter
Date
: 2025-12-29
Size
: 2.1mb
User
:
wang
[
Industry research
]
The-progress-of-text-mining-research
DL : 0
挖掘又称为文本数据挖掘或文本知识发现,是指在大规模文本集合中发现隐含的、以前未知的、潜在有用的模式的过程.-Text mining,also known as text data mining or text knowledge discovery,means discovering implicit,previously unknown,and potentially useful patterns in large amounts of text.
Date
: 2025-12-29
Size
: 810kb
User
:
李婷
[
Industry research
]
Diagnosis-and-Fault-Tolerant-Control
DL : 0
In this work we introduce a recent implicit fault tolerant control technique for the permanent magnet synchronous machine. After a state of the art in the FTC domain, we elaborate the complete model of the machine witch allow to study its behavior in different cases. The unknown torque load and parametric variations are compensated by the robust backstepping control low but in order to detect and compensate faults, we use this technique witch we study in detail. We also propose a new method for generating compensation terms in the control low.
Date
: 2025-12-29
Size
: 20.92mb
User
:
abaidia mourad
[
Industry research
]
Energy-Detection-of-Unknown-Deterministic-Signals
DL : 0
most important paper in energy detection and alla paper refer to it
Date
: 2025-12-29
Size
: 743kb
User
:
hasan
[
Industry research
]
thresholding_2006-6pp
DL : 0
image segmentation in matlab ppt.. source unknown
Date
: 2025-12-29
Size
: 232kb
User
:
Janani
[
Industry research
]
SFS_2
DL : 0
SFS算法的一篇文章,针对传统SFS( shape fr om shading ) 必须已知光源参数的缺陷, 提出了一种新的使用神经网络恢复单幅未知光源参数环境中物体三维形状的方法。-SFS algorithm an article, in view of the traditional SFS (shape fr om shading) must be known source parameters of defects, this paper proposes a new environment using neural network to restore a single light source unknown parameters in the method of 3 d shapes.
Date
: 2025-12-29
Size
: 168kb
User
:
qirong
[
Industry research
]
Black-hat-SEO
DL : 0
黑帽seo视频教程,黑帽seo技巧自我介绍: 大家好,我是落月,★ QQ 935432468 加好友请注明一下是黑帽seo ★,做互联网6年,一个无名菜鸟. 今天主要是带大家简单了解各种黑帽劫持手法 及SEO中端系列-★黑帽SEO蜘蛛劫持快速抢占流量(asp版带程序)(这段我会放在视频的前面给大家演示,需要用到的劫持代码我会打包给大家)★ 本视频是语音加文字教程,请戴好耳机或开启音响;视频会很详细的讲解初中高级黑帽手法,可能会有点长,请耐心观看每个步骤。 本来打算出套白帽seo做淘宝客实现半自动化赚钱的教程,但是我自己也在操作竞价做暴利产品,没这么多时间,只能先录制一些简单的黑帽seo的东西;-Introduction: Hello everyone, I was sangrakwol, 鈽� QQ 935432468 add friends please indicate what is black hat seo 鈽� , do the Internet six years, an unknown rookie. Bring you today is a simple understanding of a variety of black hat SEO practices and hijacking mid-range series- 鈽� black hat SEO Traffic Spider hijacked quick to seize (asp version with the program) (I will put this video on the front for everyone to demonstrate the need to use the hijacking code I will give you package) 鈽� This video is a voice add text tutorials, please wear headphones or turn sound video will be very detailed explanation of junior senior black hat techniques, may be a bit longer, please be patient to watch every step. Had intended to do a set of white hat seo Taobao customers to achieve semi-automated tutorials to make money, but I do also operate auction profits products, not so much time, only the first record some simple black hat seo stuff
Date
: 2025-12-29
Size
: 3kb
User
:
落月
[
Industry research
]
distributedtar-eusipco-2008
DL : 0
We propose an approximation framework for distributed target localization in sensor networks. We represent the unknown target positions on a location grid as a sparse vector, whose support encodes the multiple target locations. The location vector is linearly related to multiple sensor measurements through a sensing matrix, which can be locally estimated at each sensor. We show that we can successfully determine multiple target locations by using linear dimensionality-reducing projections of sensor measurements. The overall communication bandwidth requirement per sensor is logarithmic in the number of grid points and linear in the number of targets, ameliorating the communication requirements. Simulations results demonstrate the performance of the proposed framework.
Date
: 2025-12-29
Size
: 1.03mb
User
:
saeede abbasi
[
Industry research
]
ekf-y-ukf
DL : 0
The Simultaneous Localisation and Mapping (SLAM) problem asks if it is possible for a mobile robot to be placed at an unknown location in an unknown environment and for the robot to incrementally build a consistent map of this environment while simultaneously determining its lo- cation within this map. A solution to the SLAM problem has been seen as a `holy grail for the mobile robotics com- munity as it would provide the means to make a robot truly autonomous.-The Simultaneous Localisation and Mapping (SLAM) problem asks if it is possible for a mobile robot to be placed at an unknown location in an unknown environment and for the robot to incrementally build a consistent map of this environment while simultaneously determining its lo- cation within this map. A solution to the SLAM problem has been seen as a `holy grail for the mobile robotics com- munity as it would provide the means to make a robot truly autonomous.
Date
: 2025-12-29
Size
: 502kb
User
:
sthepany07
[
Industry research
]
ACM
DL : 0
本人总结的一些ACM竞赛资料,希望大家给出指正意见,大家共同进步。- the ACM reference,written by someone unknown,welcome any agreement,goes well,reach the same goal
Date
: 2025-12-29
Size
: 298kb
User
:
王丹
[
Industry research
]
robot-navigation
DL : 0
未知环境中移动机器人导航控制的一些文章,对研究机器人自主导航具有一定的参考价值-Some articles unknown environment mobile robot navigation control, the study of autonomous navigation has a certain reference value
Date
: 2025-12-29
Size
: 2.48mb
User
:
a32818
[
Industry research
]
GPS-based-deals-locator
DL : 0
comprehensive geographical search system where in if user is in an unknown city and wants know if there is a lodge in that are within his budget or he wants to buy a pen drive and don’t know in which shop its available then this application will guide him.
Date
: 2025-12-29
Size
: 185kb
User
:
asif
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.