استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Ultra-wideband positioning systems : theoretical limits, ranging algorithms, and protocols /
Investigating wavelet transform technique for transmitting video information over mobile devices \
Mobile communications/
Optimizing wireless communication systems /
Wireless communications and networking /
Cognitive radio technology applications for wireless and mobile ad hoc networks
A distributed artificial intelligent scheme for channels allocation in cellular communication networks \
Data communication principles : for fixed and wireless networks /
Pulse and logic circuits /
Radio astronomy /
Wireless networking technology : from principles to successful implementation /
Fundamentals of wireless networking /
Introduction to wireless and mobile systems /
Femtosecond laser pulses : principles and experiments /
Rural radio : programme formats /
Fundamentals of pulse and digital circuits /
Interaction in communication technologies and virtual learning environments : human factors /
Radio transmitter design /
Writing for television and radio /
Ultra-wideband pulse-based radio : reliable communication over a wideband channel /
The RF in RFID : passive UHF RFID in practice /
Developing MMS applications : multimedia messaging services for wireless networks /
Modeling and analysis of TCP reno with packet-loss and long delay cycles in wireless networks /
Wireless multimedia network technologies
Broadband wireless access networks for 4G : theory, application, and experimentation /
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Distributed computing and networking : 8th international conference, ICDCN 2006, Guwahati, India, December 27 - 30, 2006 ; proceedings /
Mobile computing /
Fundamentals of WiMAX : understanding broadband wireless networking /
Optimal resource allocation in coordinated multi-cell systems /
Smart phone and next generation mobile computing /
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers /