pdf格式的英文文献,是关于认知无线电网络的,编者是加拿大桂尔夫大学的Qusay H. Mahmoud。ISBN:978-0-470-06196-1 章节内容: 1 Biologically Inspired Networking 2 The Role of Autonomic Networking in Cognitive NETWORKs 3 Adaptive NETWORKs 4 Self-Managing NETWORKs 5 Machine Learning for Cognitive NETWORKs: Technology Assessment and Research Challenges 6 Cross-Layer Design and Optimization in Wireless NETWORKs 等,共计13章,全书348页,pdf文件383页。
标签: 英文
上传时间: 2014-01-27
上传用户:daguda
L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless NETWORKs,擨EEE Trans. on Signal ProcessingJanuary 2008. (MATLAB Code)
标签: L. A. P. Cross-layer
上传时间: 2014-01-18
上传用户:kr770906
L. Dong and A. P. Petropulu, 揗ultichannel ALLIANCES: A Cross-layer Cooperative Scheme for Wireless NETWORKs,擨EEE Trans. on Signal ProcessingJanuary 2008.
标签: L. A. P. Cross-layer
上传时间: 2013-11-28
上传用户:zhanditian
A paper that I presented on Supervisory Control and Data Acquisition (SCADA) won the second prize at the symposium conducted by the Electrical and Electronics Engineering department of the SRM University. Other topics on which I presented papers were Performance enhancement of wireless sensor NETWORKs using directional antennas, Smart card application and wireless communication. Also my research idea titled “Wavelet Based Image Compression Using SPIHT Algorithm “secured third prize in a technical festival.
标签: Supervisory Acquisition presented Control
上传时间: 2014-01-12
上传用户:zhouli
The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief NETWORKs, classical statistical models, nonlinear models such as neural NETWORKs, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.
标签: foundations The consists sections
上传时间: 2017-06-22
上传用户:lps11188
SensorSimII is the framework of a simulator that I have been working on to study how future sensor NETWORKs should operate. the simulator is written in a modular fashion so that it can be adapted to serve a number of needs. However, please remember that it is still a work in progress. This web page is here just to give a glimpse of the approach we ve taken with this simulator. Likewise this web page is simply preliminary information to attempt to answer some of the questions that researchers might have about this project.
标签: SensorSimII framework simulator working
上传时间: 2013-12-26
上传用户:wsf950131
Programming language: Developed in Omnet++. Comment: The model implements the AntNet routing algorithm proposed in: G. Di Caro and M. Dorigo. AntNet: Distributed Stigmergetic Control for Communications NETWORKs. Journal of Artificial Intelligence Research, 9:317-365, 1998. It reqires OMNeT++ 2.3 or later.
标签: Programming implements Developed language
上传时间: 2014-11-30
上传用户:nanfeicui
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless NETWORKs.
标签: keys Aircrack-ng cracking WPA-PSK
上传时间: 2013-12-25
上传用户:bruce
FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open NETWORKs. This tool captures and organizes this information. This code is extremely low quality, hacked together in order to demonstrate the problem at the BlackHat Federal 2007 conference. Higher quality code should be available around May 2007 on our website at http://www.erratasec.com.
标签: tool demonstrate broadcast analysis
上传时间: 2013-11-30
上传用户:1101055045
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the NETWORKs to mimic traffic patterns and represent background loading on a network
标签: destination generate between traffic
上传时间: 2017-08-06
上传用户:gaome