虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

third-party

  • Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/

    Generate Possion Dis. step1:Generate a random number between [0,1] step2:Let u=F(x)=1-[(1/e)x] step3:Slove x=1/F(u) step4:Repeat Step1~Step3 by using different u,you can get x1,x2,x3,...,xn step5:If the first packet was generated at time [0], than the second packet will be generated at time [0+x1],The third packet will be generated at time [0+x1+x2], and so on …. Random-number generation 1.static method random from class Math -Returns doubles in the range 0.0 <= x < 1.0 2.class Random from package java.util -Can produce pseudorandom boolean, byte, float, double, int, long and Gaussian values -Is seeded with the current time of day to generate different sequences of numbers each time the program executes

    标签: Generate Possion between random

    上传时间: 2017-05-25

    上传用户:bibirnovis

  • The book consists of three sections. The first, foundations, provides a tutorial overview of the pri

    The book consists of three sections. The first, foundations, provides a tutorial overview of the principles underlying data mining algorithms and their application. The presentation emphasizes intuition rather than rigor. The second section, data mining algorithms, shows how algorithms are constructed to solve specific problems in a principled manner. The algorithms covered include trees and rules for classification and regression, association rules, belief networks, classical statistical models, nonlinear models such as neural networks, and local memory-based models. The third section shows how all of the preceding analysis fits together when applied to real-world data mining problems. Topics include the role of metadata, how to handle missing data, and data preprocessing.

    标签: foundations The consists sections

    上传时间: 2017-06-22

    上传用户:lps11188

  • A certification path is an ordered list of certificates starting with a certificate issued by the re

    A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.

    标签: certification certificates certificate starting

    上传时间: 2017-07-31

    上传用户:清风冷雨

  • The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at

    The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.

    标签: cryptographic applications attractive for

    上传时间: 2013-12-07

    上传用户:zhuimenghuadie

  • Image processing

    Image processing third edition

    标签: processing Image

    上传时间: 2017-02-17

    上传用户:BIWE

  • Heterogeneous Wireless Access Networks

    With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third gener- ation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. The next genera- tion wireless systems (also sometimes referred to as Fourth generation (4G) systems) are being devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. 

    标签: Heterogeneous Wireless Networks Access

    上传时间: 2020-05-27

    上传用户:shancjb

  • HSDPAHSUPA+for+UMTS+High+Speed+Radio+Access

    The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were launched during 2002. By the end of 2005 there were 100 open WCDMA networks and a total of over 150 operators having frequency licenses for WCDMA operation. Currently, the WCDMA networks are deployedinUniversalMobileTelecommunicationsSystem(UMTS)bandaround2GHz in Europe and Asia including Japan and Korea. WCDMA in America is deployed in the existing 850 and 1900 spectrum allocations while the new 3G band at 1700/2100 is expected to be available in the near future. 3GPP has defined the WCDMA operation also for several additional bands, which are expected to be taken into use during the coming years.

    标签: HSDPAHSUPA Access Speed Radio UMTS High for

    上传时间: 2020-05-27

    上传用户:shancjb

  • Introduction+to+3G+Mobile+Communications

    The third generation (3G) mobile communication system is the next big thing in the world of mobile telecommunications. The first generation included analog mobile phones [e.g., Total Access Communications Systems (TACS), Nordic Mobile Telephone (NMT), and Advanced Mobile Phone Service (AMPS)], and the second generation (2G) included digital mobile phones [e.g., global system for mobile communications (GSM), personal digital cellular (PDC), and digital AMPS (D-AMPS)]. The 3G will bring digital multimedia handsets with high data transmission rates, capable of providing much more than basic voice calls.

    标签: Communications Introduction Mobile 3G to

    上传时间: 2020-05-27

    上传用户:shancjb

  • Multicarrier+Techniques+for+4G

    At recent major international conferences on wireless communications, there have been several sessions on beyond third generation (3G) or fourth generation(4G)mobilecommunicationssystems,wheremodulation/demod- ulation and multiplexing/multiple access schemes related to multicarrier techniques have drawn a lot of attention. We often met at the conference venuesandrealizedthatnobookcoveredthebasicsofmulticarriertechniques to recent applications aiming at the 4G systems. Therefore, we decided to write a book on multicarrier techniques for 4G mobile communications systems.

    标签: Communications Multicarrier Techniques Mobile for 4G

    上传时间: 2020-05-31

    上传用户:shancjb

  • RISK+COMMUNICATION

    The fi rst edition of this book came about because Regina Lundgren had always been fascinated with communication. She started writing novels in the third grade. When she was asked on her fi rst day at the University of Washington what she hoped to do with her degree in scientifi c and technical communication, she replied, “I want to write environ- mental impact statements.” When Patricia Clark hired her to work at the Pacifi c Northwest National Laboratory to do just that, she was overjoyed.

    标签: COMMUNICATION RISK

    上传时间: 2020-06-01

    上传用户:shancjb