Welcome![Sign In][Sign Up]
Location:
Search - nodes

Search list

[Other resourcefour-nodes-matlab-fem-program

Description: 四节点矩形单元matlab有限元程序,使用于一般通用程序-four nodes rectangular modules Matlab finite element program, the use of common procedures in
Platform: | Size: 22143 | Author: wenyue | Hits:

[Linux-Unixfam-latest.tar

Description: 好东东。linux下面的文件节点、文件状态的变化监听代码,可以用于开发Linux下面的热备,-good Dongdong. Linux nodes below the documents, documents the changes eavesdropping code that can be used in the development of Linux Below the heat up, huh
Platform: | Size: 282624 | Author: 张先生 | Hits:

[Internet-Networkcommmag

Description: 产生随机的网络拓扑(包括节点位置及流量),然后产生所有可能的进度表并计算其可达到的速率。另外,也可用更为精确的物理层模型来进行速率计算。-random network topology (including the location and flow nodes), and then have all the possible schedule and calculate the rate can be achieved. Besides, it also can be used for more accurate model of the physical layer for rate calculation.
Platform: | Size: 26624 | Author: | Hits:

[Internet-Networkns-example

Description: 无线网络模拟的程序源码,是移动节点的模拟情况-wireless network simulation procedures source, the mobile nodes simulations
Platform: | Size: 7168 | Author: 望者 | Hits:

[matlabfour-nodes-matlab-fem-program

Description: 四节点矩形单元matlab有限元程序,使用于一般通用程序-four nodes rectangular modules Matlab finite element program, the use of common procedures in
Platform: | Size: 21504 | Author: wenyue | Hits:

[Data structsbestroute

Description: 运行应用本程序,输入节点个数n以及m各个节点的三元组信息。 m个三元组(it,jt,ft),t=1、2、……、m,两个节点it和jt之间有双向连接的直接连接,其距离为ft。输入节点g(1≤g≤n),程序将计算出可以由g达到的每个节点的最佳路由。并在显示器上输出运行结果。-Run the application of this procedure, enter the node number n and m nodes in all three groups of information. m a triple (it, jt, ft), t = 1,2, ... ..., m, two nodes between it and jt direct connection bi-directional connections, the distance of ft. Enter the node g (1 ≤ g ≤ n), the procedure will be calculated by each node g to achieve the best routing. And display the output results.
Platform: | Size: 169984 | Author: 周钰川 | Hits:

[SCMmib_beacon_coordinator_save

Description: 无线传感器星型网络的节点的基站程序,采用802.15.4协议-Star-shaped network of wireless sensor nodes of the base station procedures, using 802.15.4
Platform: | Size: 534528 | Author: chenling | Hits:

[Linux-Unix2

Description: 看n2实例 #Create a simulator object set ns [new Simulator] #Define different colors for data flows #$ns color 1 Blue #$ns color 2 Red #Open the nam trace file set nf [open out-1.nam w] $ns namtrace-all $nf set f0 [open out0.tr w] set f1 [open out1.tr w] #Define a finish procedure proc finish {} { global ns nf $ns flush-trace #Close the trace file close $nf #Execute nam on the trace file exit 0 } #Create four nodes set n0 [$ns node] set n1 [$ns node] set n2 [$ns node] set n3 [$ns node] #Create links between the nodes $ns duplex-link $n0 $n2 1Mb 10ms -N2 examples look# Create a simulator objectset ns [new Simulator]# Define different colors for data flows# $ Ns color 1 Blue# $ Ns color 2 Red# Open the nam trace fileset nf [open out-1.nam w] $ ns namtrace-all $ nfset f0 [open out0.tr w] set f1 [open out1.tr w]# Define a finish procedureproc finish () (global ns nf $ ns flush-trace# Close the trace file close $ nf# Execute nam on the trace file exit 0)# Create four nodesset n0 [$ ns node] set n1 [$ ns node] set n2 [$ ns node] set n3 [$ ns node]# Create links between the nodes $ ns duplex-link $ n0 $ n2 1Mb 10ms
Platform: | Size: 3072 | Author: shilei | Hits:

[P2PANewTrustModelBasedonReputationandRiskEvaluation.r

Description: 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust.
Platform: | Size: 97280 | Author: 刘峰 | Hits:

[matlabsimulation

Description: 对一个50个结点(更多的节点的网络只需要修改模块中的标量维数就行)的复杂非线性耦合网络进行同步化仿真。首先生成K矩阵,然后运行simulink,即可得到50个洛仑兹混沌节点复杂网络的同步化曲线。-Of a 50-node (more network nodes only need to modify module scalar dimension on the line) the complexity of nonlinear coupling network synchronization simulation. First Generation K matrix, and then run the simulink, can be chaotic 50 Lorentz complex network node synchronization curve.
Platform: | Size: 9216 | Author: zhongsir | Hits:

[Othernode-degree

Description: 复杂网络 节点度统计程序 C++ 网络中的节点度指与节点相连的边的个数-Complex statistical procedures for network nodes C++ Network nodes and node degrees refers to the number of connected edge
Platform: | Size: 2048 | Author: owen | Hits:

[matlabgame1

Description: 最好邻居选择策略来改善移动自组织网络中自私节点的合作行为,通过matlab做的仿真实验。-Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
Platform: | Size: 319488 | Author: 郑湖湘 | Hits:

[matlabDVHOP

Description: 实现DV-Hop定位算法的仿真,自动生成一定节点数的随即分布图,给出仿真结果的各点定位误差,用曲线图形显示,并可以计算平均误差。-DV-Hop simulation. Produce a randomly distributed nodes and then simulate and give the location error of each node, showing it in figure, and calculate the average error.
Platform: | Size: 2048 | Author: sophia | Hits:

[SCMmobility

Description: Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends
Platform: | Size: 4096 | Author: Muni | Hits:

[Technology Management1

Description: 基于网格节点的分布计算策略分析 CAJ 格式-Grid-based distributed computing nodes CAJ format strategy analysis
Platform: | Size: 221184 | Author: jeer | Hits:

[CommunicationWSN

Description: 利用极大值估计法进行节点之间的定位。模拟真实环境进行仿真- Estimated using the maximum method of positioning between nodes. Simulate the real environment simulation
Platform: | Size: 2048 | Author: 何明坤 | Hits:

[Linux-UnixLinux_file_operate

Description: linux系统下的文件操作实验程序,完成的功能如下。 在一个半径为R的监测区域,随机分布有M个节点,每个节点的感应半径为r,请完成: (1)建立节点的位置信息文件 (2)建立网络的拓扑信息文件 -linux operating system files under the experimental procedures, the completion of the function as follows. Radius of R in a monitoring region, a random distribution of M nodes, each node of the sensor radius r, please complete: (1) to establish the location of the node information file (2) the establishment of the network topology information file
Platform: | Size: 1024 | Author: menchael | Hits:

[matlabSensor_air

Description: Matlab based wireless sensor network code for hetrogeneous application in Airports. This is based on clustering of nodes.
Platform: | Size: 2048 | Author: wireless | Hits:

[Communication-Mobilecompose_all

Description: 无线传感器网络的所有锚节点的能量分布的一个仿真,有详细的程序分析和解释。-Wireless sensor networks for all of the energy distribution of anchor nodes in a simulation, there is a detailed program analysis and interpretation.
Platform: | Size: 2048 | Author: Helen | Hits:

[OtherA Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves using radio

Description: A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves using radio signals, and deployed in quantity to sense, monitor and understand the physical world.
Platform: | Size: 397197 | Author: atrakpc@yahoo.com | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net