虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Networks-related

  • This book is about 3D math, the study of the mathematics behind the geometry of a 3D world. 3D math

    This book is about 3D math, the study of the mathematics behind the geometry of a 3D world. 3D math is related to computational geometry, which deals with solving geometric problems algorithmically. 3D math and computational geometry have applications in a wide variety of fields that use computers to model or reason about the world in 3D, such as graphics, games, simulation, robotics, virtual reality, and cinematography. This book covers theory and practice in C++.

    标签: the math mathematics 3D

    上传时间: 2014-01-23

    上传用户:xwd2010

  • Model for Opnet. Use this model to generate traffic between source and destination pairs. The resul

    Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network

    标签: destination generate between traffic

    上传时间: 2017-08-06

    上传用户:gaome

  • asp 客户关系管理系统的实际与实现

    asp 客户关系管理系统的实际与实现,包括源码和相关文档(论文)-asp customer relationship management system and implementation of practical, including source code and related documentation (Thesis)

    标签: asp 管理系统

    上传时间: 2014-10-13

    上传用户:qb1993225

  • Abstract—Stable direct and indirect decentralized adaptive radial basis neural network controllers

    Abstract—Stable direct and indirect decentralized adaptive radial basis neural network controllers are presented for a class of interconnected nonlinear systems. The feedback and adaptation mechanisms for each subsystem depend only upon local measurements to provide asymptotic tracking of a reference trajectory. Due to the functional approximation capabilities of radial basis neural networks, the dynamics for each subsystem are not required to be linear in a set of unknown coeffi cients as is typically required in decentralized adaptive schemes. In addition, each subsystem is able to adaptively compensate for disturbances and interconnections with unknown bounds.

    标签: decentralized controllers Abstract adaptive

    上传时间: 2017-08-17

    上传用户:gdgzhym

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie

  • Adaptive Coordinated Medium Access Control (AC-MAC), a contention-based Medium Access Control proto

    Adaptive Coordinated Medium Access Control (AC-MAC), a contention-based Medium Access Control protocol for wireless sensor networks. To handle the load variations in some real-time sensor applications, ACMAC introduces the adaptive duty cycle scheme within the framework of sensor-MAC (S-MAC).

    标签: Control Access Medium contention-based

    上传时间: 2014-12-22

    上传用户:gundan

  • Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. B

    Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.

    标签: investigated Abstract-In autonomous resistors

    上传时间: 2014-06-09

    上传用户:h886166

  • The goal of this thesis is the development of traffic engineering rules for cellular packet radio n

    The goal of this thesis is the development of traffic engineering rules for cellular packet radio networks based on GPRS and EDGE. They are based on traffic models for typical mobile applications. Load generators, representing these traffic models, are developed and integrated into a simulation environment with the prototypical implementation of the EGPRS protocols and models for the radio channel, which were also developed in the framework of this thesis. With this simulation tool a comprehensive performance evaluation is carried out that leads to the traffic engineering rules.

    标签: development engineering cellular traffic

    上传时间: 2014-01-11

    上传用户:Miyuki

  • Pattern Analysis is the process of fi nding general relations in a set of data, and forms the

    Pattern Analysis is the process of fi nding general relations in a set of data, and forms the core of many disciplines, from neural networks to so-called syn- tactical pattern recognition, from statistical pattern recognition to machine learning and data mining. Applications of pattern analysis range from bioin- formatics to document retrieval.

    标签: the relations Analysis Pattern

    上传时间: 2017-09-07

    上传用户:SimonQQ

  • 本书是英文版

    本书是英文版,但内容非常不错,本书目录如下: Table of Contents SIP—Understanding the Session Initiation Protocol, Second Edition Foreword to the First Edition Preface to - the Second Edition Preface to - the First Edition Chapter 1 - SIP and the Internet Chapter 2 - Introduction to SIP Chapter 3 - SIP Clients and Servers Chapter 4 - SIP Request Messages Chapter 5 - SIP Response Messages Chapter 6 - SIP Header Fields Chapter 7 - Related Protocols Chapter 8 - Comparison to H.323 Chapter 9 - Wireless and 3GPP Chapter 10 - Call Flow Examples Chapter 11 - Future Directions Appendix A - Changes in the SIP Specification from RFC 2543 to RFC 3261

    标签: 英文

    上传时间: 2014-01-06

    上传用户:爺的气质