Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Unknown
Search - Unknown - List
On the Energy Detection of Unknown Signals Over Fading ChannelsAbstract—This letter addresses the problem of energy detection of an unknown signal over a multipath channel. It starts with the no-diversity case, and presents some alternative closed-form expressions for the probability of detection to those recently reported in the literature. Detection capability is boosted by implementing both square-law combining and square-law selection diversity schemes. Index Terms—Diversity schemes, energy detection, fading channels, low-power applications, square-law detector, unknown signal detection.
Date : 2012-02-22 Size : 170.36kb User : chenpeng3361

The standard optimum Kalman filter demands complete knowledge of the system parameters, the input forcing functions, and the noise statistics. Several adaptive methods have already been devised to obtain the unknown information using the measurements and the filter residuals.-The optimum standard Kalman filter demand 's complete knowledge of the system parameters. the input forcing functions. and the noise statistics. Several adaptive met hods have already been devised to obtain the unk nown information using the measurements and th e filter residuals.
Date : 2025-12-29 Size : 927kb User : rifer

A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML file, which is built from only normal traffic, contains a description of the normal behavior of the target web application statistically characterized. Any request which deviates from the normal behavior is considered an attack. The system has been applied to protect a real web application. An increasing number of training requests have been used to train the system. Experiments show that when the XML file has enough information to closely characterize the normal behavior of the target web application, a very high detection rate is reached while the false alarm rate remains very low.
Date : 2025-12-29 Size : 672kb User : keerthi

Adapting to Unknown Smoothness via Wavelet Shrinkage
Date : 2025-12-29 Size : 204kb User : rsram

Creates a TLE from two or three observations of a satellite on a single pass. Useful for initial orbit parameters and for unknown satellite identification. This fifth version improves convergence characteristics for the three point fit via F and G series. If more than three points are available, use ELFIND for the initial orbit, then use SATFIT and/or ELCORD to refine the orbit using all the observations.-Creates a TLE from two or three observations of a satellite on a single pass. Useful for initial orbit parameters and for unknown satellite identification. This fifth version improves convergence characteristics for the three point fit via F and G series. If more than three points are available, use ELFIND for the initial orbit, then use SATFIT and/or ELCORD to refine the orbit using all the observations.
Date : 2025-12-29 Size : 73kb User : 971205021

Estimating unknown clutter intensity for PHD filter
Date : 2025-12-29 Size : 2.1mb User : wang

挖掘又称为文本数据挖掘或文本知识发现,是指在大规模文本集合中发现隐含的、以前未知的、潜在有用的模式的过程.-Text mining,also known as text data mining or text knowledge discovery,means discovering implicit,previously unknown,and potentially useful patterns in large amounts of text.
Date : 2025-12-29 Size : 810kb User : 李婷

In this work we introduce a recent implicit fault tolerant control technique for the permanent magnet synchronous machine. After a state of the art in the FTC domain, we elaborate the complete model of the machine witch allow to study its behavior in different cases. The unknown torque load and parametric variations are compensated by the robust backstepping control low but in order to detect and compensate faults, we use this technique witch we study in detail. We also propose a new method for generating compensation terms in the control low.
Date : 2025-12-29 Size : 20.92mb User : abaidia mourad

most important paper in energy detection and alla paper refer to it
Date : 2025-12-29 Size : 743kb User : hasan

image segmentation in matlab ppt.. source unknown
Date : 2025-12-29 Size : 232kb User : Janani

SFS算法的一篇文章,针对传统SFS( shape fr om shading ) 必须已知光源参数的缺陷, 提出了一种新的使用神经网络恢复单幅未知光源参数环境中物体三维形状的方法。-SFS algorithm an article, in view of the traditional SFS (shape fr om shading) must be known source parameters of defects, this paper proposes a new environment using neural network to restore a single light source unknown parameters in the method of 3 d shapes.
Date : 2025-12-29 Size : 168kb User : qirong

黑帽seo视频教程,黑帽seo技巧自我介绍: 大家好,我是落月,★ QQ 935432468 加好友请注明一下是黑帽seo ★,做互联网6年,一个无名菜鸟. 今天主要是带大家简单了解各种黑帽劫持手法 及SEO中端系列-★黑帽SEO蜘蛛劫持快速抢占流量(asp版带程序)(这段我会放在视频的前面给大家演示,需要用到的劫持代码我会打包给大家)★ 本视频是语音加文字教程,请戴好耳机或开启音响;视频会很详细的讲解初中高级黑帽手法,可能会有点长,请耐心观看每个步骤。 本来打算出套白帽seo做淘宝客实现半自动化赚钱的教程,但是我自己也在操作竞价做暴利产品,没这么多时间,只能先录制一些简单的黑帽seo的东西;-Introduction: Hello everyone, I was sangrakwol, 鈽� QQ 935432468 add friends please indicate what is black hat seo 鈽� , do the Internet six years, an unknown rookie. Bring you today is a simple understanding of a variety of black hat SEO practices and hijacking mid-range series- 鈽� black hat SEO Traffic Spider hijacked quick to seize (asp version with the program) (I will put this video on the front for everyone to demonstrate the need to use the hijacking code I will give you package) 鈽� This video is a voice add text tutorials, please wear headphones or turn sound video will be very detailed explanation of junior senior black hat techniques, may be a bit longer, please be patient to watch every step. Had intended to do a set of white hat seo Taobao customers to achieve semi-automated tutorials to make money, but I do also operate auction profits products, not so much time, only the first record some simple black hat seo stuff
Date : 2025-12-29 Size : 3kb User : 落月

We propose an approximation framework for distributed target localization in sensor networks. We represent the unknown target positions on a location grid as a sparse vector, whose support encodes the multiple target locations. The location vector is linearly related to multiple sensor measurements through a sensing matrix, which can be locally estimated at each sensor. We show that we can successfully determine multiple target locations by using linear dimensionality-reducing projections of sensor measurements. The overall communication bandwidth requirement per sensor is logarithmic in the number of grid points and linear in the number of targets, ameliorating the communication requirements. Simulations results demonstrate the performance of the proposed framework.
Date : 2025-12-29 Size : 1.03mb User : saeede abbasi

The Simultaneous Localisation and Mapping (SLAM) problem asks if it is possible for a mobile robot to be placed at an unknown location in an unknown environment and for the robot to incrementally build a consistent map of this environment while simultaneously determining its lo- cation within this map. A solution to the SLAM problem has been seen as a `holy grail for the mobile robotics com- munity as it would provide the means to make a robot truly autonomous.-The Simultaneous Localisation and Mapping (SLAM) problem asks if it is possible for a mobile robot to be placed at an unknown location in an unknown environment and for the robot to incrementally build a consistent map of this environment while simultaneously determining its lo- cation within this map. A solution to the SLAM problem has been seen as a `holy grail for the mobile robotics com- munity as it would provide the means to make a robot truly autonomous.
Date : 2025-12-29 Size : 502kb User : sthepany07

本人总结的一些ACM竞赛资料,希望大家给出指正意见,大家共同进步。- the ACM reference,written by someone unknown,welcome any agreement,goes well,reach the same goal
Date : 2025-12-29 Size : 298kb User : 王丹

未知环境中移动机器人导航控制的一些文章,对研究机器人自主导航具有一定的参考价值-Some articles unknown environment mobile robot navigation control, the study of autonomous navigation has a certain reference value
Date : 2025-12-29 Size : 2.48mb User : a32818

comprehensive geographical search system where in if user is in an unknown city and wants know if there is a lodge in that are within his budget or he wants to buy a pen drive and don’t know in which shop its available then this application will guide him.
Date : 2025-12-29 Size : 185kb User : asif
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.