虫虫首页|资源下载|资源专辑|精品软件
登录|注册

question

  • Because WDM networks are circuit switched loss networks blocking may occur because of lack of resour

    Because WDM networks are circuit switched loss networks blocking may occur because of lack of resources. Also in circuit switched networks many paths use the same links. This toolbox answers the question how different paths with different loads influence on each other and what is the blocking on each of the defined path. Toolbox is capable of computing blocking for three different WDM network types: with no wavelength conversion, with full wavelength conversion and with limited range wavelength conversion. It is worth noting that case for full conversion can be usefull for any circuit switched network without additional constraints (i.e. wavelength continuity constraint in WDM), for example telephone network. Toolbox contains also scripts for defining network structures (random networks, user defined networks) and traffic matrixes. Three graph algorithms for shortest path computation are also in this toolbox (they are used for traffic matrix creation).

    标签: networks blocking switched Because

    上传时间: 2017-07-27

    上传用户:zhangzhenyu

  • This is svd source code implementation in c++ , the zip file contain the ap file ,more detail ,plea

    This is svd source code implementation in c++ , the zip file contain the ap file ,more detail ,please see the ap library adapted for c++ in the zip file.also there is faq to answer your question.

    标签: file implementation the contain

    上传时间: 2013-12-27

    上传用户:aappkkee

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Communication+Systems+Simulation

    The genesis for this book was my involvement with the development of the SystemView (now SystemVue) simulation program at Elanix, Inc. Over several years of development, technical support, and seminars, several issues kept recur- ring. One common question was, “How do you simulate (such and such)?” The sec- ond set of issues was based on modern communication systems, and why particular developers did what they did. This book is an attempt to gather these issues into a single comprehensive source.

    标签: Communication Simulation Systems

    上传时间: 2020-05-26

    上传用户:shancjb

  • Continuous-Time+Digital+Front-Ends

    The book you’re holding, physically or electronically, is the result of a very interesting, challenging but also rewarding research project. The research was carried out in different contexts and cooperations but it was centered around the following question: how can we make the RF transmitters of our modern com- munication systems (WiFi, GSM, LTE, and so on) more flexible and more efficient at the same time.

    标签: Continuous-Time Front-Ends Digital

    上传时间: 2020-05-26

    上传用户:shancjb

  • Introduction+to+Communication+Systems

    The genesis for this book was my involvement with the development of the SystemView (now SystemVue) simulation program at Elanix, Inc. Over several years of development, technical support, and seminars, several issues kept recur- ring. One common question was, “How do you simulate (such and such)?” The sec- ond set of issues was based on modern communication systems, and why particular developers did what they did. This book is an attempt to gather these issues into a single comprehensive source.

    标签: Communication Introduction Systems to

    上传时间: 2020-05-27

    上传用户:shancjb

  • SDN Software Defined Networks

    The first question most readers of an O’Reilly book might ask is about the choice of the cover animal. In this case, “why a duck?” Well, for the record, our first choice was a unicorn decked out in glitter and a rainbow sash. That response always gets a laugh (we are sure you just giggled a little), but it also brings to the surface a common perception of software-defined networks among many expe‐ rienced network professionals. Although we think there is some truth to this perception, there is certainly more meat than myth to this unicorn.

    标签: Networks Software Defined SDN

    上传时间: 2020-05-31

    上传用户:shancjb