We propose and analyze several timestamping of an MPEG-2 Transport Stream transmitted strategies for performing over a packet-switched network using the PCR-unaware encapsulation scheme, and analyze their effect on the quality of the recovered clock at the MPEG-2 Systems decoder.
標簽: timestamping transmitted strategies Transport
上傳時間: 2014-12-05
上傳用戶:450976175
Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a public network resource unless some type of encryption is being used, secure socket layer is one example. Most FTP sites also use plaintext passwords.
標簽: demonstrates plaintext passwords usernames
上傳時間: 2013-12-04
上傳用戶:aeiouetla
測試Linux從2.4內核開始就非常好的支持了網橋,并且還支持生成樹協議等高級應用。加入網橋的物理 端口將不分配IP地址,只有網橋虛擬端口可以分配IP ... 4,修改/etc/sysconfig/network
上傳時間: 2013-12-26
上傳用戶:13188549192
VHDL 關于2DFFT設計程序 u scinode1 ∼ scinode9.vhd: Every SCI node RTL vhdl code. The details can be seen in the following section. u 2dfft.vhd: The top module includes these scinodes and form a 3x3 SCI Torus network, and it support these sub-modules scinode1∼ scinode9 reset and clk and global_cnt signals to synchronous the sub-modules to simplify the overall design. u proj2.wfc: VSS simulation result that is the same as the ModelSim simulation result. u Pro2_2.wfc: VSS simulation result of another test pattern can’t cause overflow situation.
標簽: scinode1 scinode details 2DFFT
上傳時間: 2014-12-02
上傳用戶:15071087253
物流分析工具包。Facility location: Continuous minisum facility location, alternate location-allocation (ALA) procedure, discrete uncapacitated facility location Vehicle routing: VRP, VRP with time windows, traveling salesman problem (TSP) Networks: Shortest path, min cost network flow, minimum spanning tree problems Geocoding: U.S. city or ZIP code to longitude and latitude, longitude and latitude to nearest city, Mercator projection plotting Layout: Steepest descent pairwise interchange (SDPI) heuristic for QAP Material handling: Equipment selection General purpose: Linear programming using the revised simplex method, mixed-integer linear programming (MILP) branch and bound procedure Data: U.S. cities with populations of at least 10,000, U.S. highway network (Oak Ridge National Highway Network), U.S. 3- and 5-digit ZIP codes
標簽: location location-allocation Continuous alternate
上傳時間: 2015-05-17
上傳用戶:kikye
ITU-T Recommendation V.90 98年9月版本 A DIGITAL MODEM AND ANALOGUE MODEM PAIR FOR USE ON THE PUBLIC SWITCHED TELEPHONE NETWORK (PSTN) AT DATA SIGNALLING RATES OF UP TO 56 000 bit/s DOWNSTREAM AND UP TO 33 600 bit/s UPSTREAM
標簽: MODEM Recommendation ANALOGUE DIGITAL
上傳時間: 2014-01-17
上傳用戶:hn891122
一個很棒的網絡控制系統仿真軟件,truetime工具箱包括TrueTime Computer與Truetime Network 兩個接口模塊。計算機模塊具有靈活的實時內核,A/D和D/A轉換器,網絡接口和外部通道。計算機模塊按照用戶定義的任務執行,代碼采用Matlab或C++編寫。
上傳時間: 2015-06-03
上傳用戶:ruixue198909
ITU-T Recommendation T.30(2005 09) SERIES T: TERMINALS FOR TELEMATIC SERVICES Procedures for document facsimile transmission in the general switched telephone network
標簽: Recommendation Procedures TERMINALS TELEMATIC
上傳時間: 2015-06-04
上傳用戶:shizhanincc
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
標簽: 802.11 introduction Beginning Security
上傳時間: 2013-12-04
上傳用戶:CHINA526
This program demonstrates some function approximation capabilities of a Radial Basis Function Network. The user supplies a set of training points which represent some "sample" points for some arbitrary curve. Next, the user specifies the number of equally spaced gaussian centers and the variance for the network. Using the training samples, the weights multiplying each of the gaussian basis functions arecalculated using the pseudo-inverse (yielding the minimum least-squares solution). The resulting network is then used to approximate the function between the given "sample" points.
標簽: approximation demonstrates capabilities Function
上傳時間: 2014-01-01
上傳用戶:zjf3110