虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Multi-Level

  • JAVA SMPP 源码

    Introduction jSMPP is a java implementation (SMPP API) of the SMPP protocol (currently supports SMPP v3.4). It provides interfaces to communicate with a Message Center or an ESME (External Short Message Entity) and is able to handle traffic of 3000-5000 messages per second. jSMPP is not a high-level library. People looking for a quick way to get started with SMPP may be better of using an abstraction layer such as the Apache Camel SMPP component: http://camel.apache.org/smpp.html Travis-CI status: History The project started on Google Code: http://code.google.com/p/jsmpp/ It was maintained by uudashr on Github until 2013. It is now a community project maintained at http://jsmpp.org Release procedure mvn deploy -DperformRelease=true -Durl=https://oss.sonatype.org/service/local/staging/deploy/maven2/ -DrepositoryId=sonatype-nexus-staging -Dgpg.passphrase=<yourpassphrase> log in here: https://oss.sonatype.org click the 'Staging Repositories' link select the repository and click close select the repository and click release License Copyright (C) 2007-2013, Nuruddin Ashr uudashr@gmail.com Copyright (C) 2012-2013, Denis Kostousov denis.kostousov@gmail.com Copyright (C) 2014, Daniel Pocock http://danielpocock.com Copyright (C) 2016, Pim Moerenhout pim.moerenhout@gmail.com This project is licensed under the Apache Software License 2.0.

    标签: JAVA SMPP 源码

    上传时间: 2019-01-25

    上传用户:dragon_longer

  • 基于多尺度字典的图像超分辨率重建

    Reconstruction- and example-based super-resolution (SR) methods are promising for restoring a high-resolution (HR) image from low-resolution (LR) image(s). Under large magnification, reconstruction-based methods usually fail to hallucinate visual details while example-based methods sometimes introduce unexpected details. Given a generic LR image, to reconstruct a photo-realistic SR image and to suppress artifacts in the reconstructed SR image, we introduce a multi-scale dictionary to a novel SR method that simultaneously integrates local and non-local priors. The local prior suppresses artifacts by using steering kernel regression to predict the target pixel from a small local area. The non-local prior enriches visual details by taking a weighted average of a large neighborhood as an estimate of the target pixel. Essentially, these two priors are complementary to each other. Experimental results demonstrate that the proposed method can produce high quality SR recovery both quantitatively and perceptually.

    标签: Super-resolution Multi-scale Dictionary Single Image for

    上传时间: 2019-03-28

    上传用户:fullout

  • QuasarRAT-1.3.0.0

    C#远控源代码 * TCP network stream (IPv4 & IPv6 support) * Fast network serialization (NetSerializer) * Compressed (QuickLZ) & Encrypted (AES-128) communication * Multi-Threaded * UPnP Support * No-Ip.com Support * Visit Website (hidden & visible) * Show Messagebox * Task Manager * File Manager * Startup Manager * Remote Desktop * Remote Webcam * Remote Shell * Download & Execute * Upload & Execute * System Information * Computer Commands (Restart, Shutdown, Standby) * Keylogger (Unicode Support) * Reverse Proxy (SOCKS5) * Password Recovery (Common Browsers and FTP Clients) * Registry Editor

    标签: QuasarRAT

    上传时间: 2019-04-21

    上传用户:netangels

  • Cyber-Physical Systems

    This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

    标签: Cyber-Physical Systems

    上传时间: 2019-04-21

    上传用户:danyun

  • 基于模糊聚类分析与模型识别的微电网多目标优化方法

    在微电网调度过程中综合考虑经济、环境、蓄电池的 循环电量,建立多目标优化数学模型。针对传统多目标粒子 群算法(multi-objective particle swarm optimization,MOPSO) 的不足,提出引入模糊聚类分析的多目标粒子群算法 (multi-objective particle swarm optimization algorithm based on fuzzy clustering,FCMOPSO),在迭代过程中引入模糊聚 类分析来寻找每代的集群最优解。与 MOPSO 相比, FCMOPSO 增强了算法的稳定性与全局搜索能力,同时使优 化结果中 Pareto 前沿分布更均匀。在求得 Pareto 最优解集 后,再根据各目标的重要程度,用模糊模型识别从最优解集 中找出不同情况下的最优方案。最后以一欧洲典型微电网为 例,验证算法的有效性和可行性。

    标签: 模糊 模型识别 微电网 多目标优化 聚类分析

    上传时间: 2019-11-11

    上传用户:Dr.赵劲帅

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Millimeter+Wave+V2V+Communications

    Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level. However, the literature is particularly scarce in regards to principled resource allocation schemes that deal with the challenging radio conditions posed by the high mobility of vehicular scenarios

    标签: Communications Millimeter Wave V2V

    上传时间: 2020-05-23

    上传用户:shancjb

  • Millimeter+Wave+V2V+Communications

    Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level.

    标签: Millimeter Wave V2V Communications

    上传时间: 2020-05-26

    上传用户:shancjb

  • SmartCitiesTheInternetofThings,PeopleandSystems

    The contemporary view of the Smart City is very much static and infrastructure- centric, focusing on installation and subsequent management of Edge devices and analytics of data provided by these devices. While this still allows a more efficient management of the city’s infrastructure, optimizations and savings in different do- mains, the existing architectures are currently designed as single-purpose, vertically siloed solutions. This hinders active involvement of a variety of stakeholders (e.g., citizens and businesses) who naturally form part of the city’s ecosystem and have an inherent interest in jointly coordinating and influencing city-level activities.

    标签: Internet Systems Cities People Things Smart The and of

    上传时间: 2020-05-26

    上传用户:shancjb

  • Active+and+Programmable+Networks

    New applications such as video conferencing, video on demand, multi- media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. 

    标签: Programmable Networks Active and

    上传时间: 2020-05-26

    上传用户:shancjb