Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network withouT additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).
标签: networks blocking switched Because
上传时间: 2017-07-28
上传用户:zhangzhenyu
In 揚erformance of multi-carrier DS CDMA Systems?we apply a multi-carrier signaling technique to a direct-sequence CDMA system, where a data sequence multiplied by a spreading sequence modulates multiple carriers, rather than a single carrier. The receiver provides a correlator for each carrier, and the outputs of the correlators are combined with a maximal-ratio combiner. This type of signaling has the desirable properties of exhibiting a narrowband interference suppression effect, along with robustness to fading, withouT requiring the use of either an explicit RAKE structure or an interference suppression filter.
标签: multi-carrier erformance signaling technique
上传时间: 2017-07-31
上传用户:宋桃子
Using Trolltech s Qt you can build industrial-strength C++ applications that run natively on Windows, Linux/Unix, Mac OS X, and embedded Linux--withouT making source code changes. With this book Trolltech insiders have written a start-to-finish guide to getting great results with the most powerful version of Qt ever created: Qt 4.1.
标签: industrial-strength applications Trolltech natively
上传时间: 2017-08-11
上传用户:邶刖
Hardware random number generators attempt to extract randomness directly from complex physical systems. In this way they create random outputs withouT requiring any seed inputs. In this paper we describe how to use Physical Random Functions (or Physical Unclonable Functions, PUFs) to create a candidate hardware random number generator.
标签: generators randomness Hardware directly
上传时间: 2013-12-20
上传用户:缥缈
Information in this document is provided in connection with Intel products. No license, express or implied, by estoppels or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. ALL INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED “AS IS.” Intel may make changes to specifications and product descriptions at any time, withouT notice. “WiMAX,” “Mobile WiMAX,” “WiMAX Forum,” “WiMAX Forum Certified” and the WiMAX Forum and WiMAX Forum Certified logo are trademarks of the WiMAX
标签: Information connection document provided
上传时间: 2017-08-25
上传用户:songyue1991
This document explains the pulse compression technique. Why it is required and how can it be used effectively. The pulse compression technique helps to increase the maximum range withouT sacrificing the range resolution and still the power requirement remains low.
标签: compression technique document explains
上传时间: 2013-12-18
上传用户:fnhhs
The running time of quicksort can be improved in practice by taking advantage of the fast running time of insertion sort when its input is “nearly” sorted. When quicksort is called on a subarray with fewer than k elements, let it simply return withouT sorting the subarray. After the top-level call to quicksort returns, run insertion sort on the entire array to finish the sorting process.
标签: running advantage quicksort improved
上传时间: 2013-12-01
上传用户:梧桐
Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm when simulating high density crowds, withouT compromising significantly the original crowd behavior.
标签: Behavioral simulation realistic computer
上传时间: 2017-09-08
上传用户:hanli8870
水平集代码及文章(李春明):Level Set Evolution withouT Re-initialization: A New Variational Formulation
标签: 水平集代码及文章(李春明)
上传时间: 2015-03-16
上传用户:FQ967
SharpPcap c#抓包实现时时获取网卡信息 SharpPcap tutorial: a step by step guide to using SharpPcap The text of this tutorial is taken directly from WinPcap's official tutorial but is modified to show the C# use of the SharpPcap library. All examples can be downloaded together with SharpPcap source code from SharpPcap 's homepage. The WinPcap library must be installed before attempting to run any of these examples, so please download and install the latest version from WinPcap's download page. SharpPcap was written and tested using .NET v1.1 and Windows 2000/XP. I have no idea about other .NET and Windows versions. If you do try it, please report your results. The following topics are covered in this tutorial: Obtaining the device list Obtaining advanced information about installed devices Opening an adapter and capturing packets Capturing packets withouT the event handler Filtering the traffic Interpreting the packets Handling offline dump files Sending Packets Gathering Statistics on the network traffic 1. Obtaining the device list
上传时间: 2015-07-06
上传用户:muzongda