Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
NS-2 is the most famous simulator among other network simulators. Most of researchers use NS-2 to evaluate their new protocols/architectures. Although NS-2 has much resource and many available tools to generate different characteristics and network scenarios, source codes created on NS-2 is not able to be reused for real implementation. The releasing of NS-3 changes the way researchers work. NS-3...
In this paper we present a novel reversible implementation of a square-root circuit with an array structure. In scientific computations such as numerical analysis, computer graphics, complex number computations, square root is an important operation. In classical irreversible arena we find different realizations of square root circuit. Since reversible circuit is emerging as an alternative to classical...
Reduction of power consumption for any computer system is now an important issue, although this should be done in a manner that is not detrimental to the user base. We present a number of policies that can be applied to multi-use clusters where computers are shared between interactive users and high-throughput computing. We evaluate policies by trace-driven simulations in order to determine the effects...
The development of urban public service (such as education) is usually uneven in the space in metropolitan region. This phenomenon has a profound impact on urban economy. This paper bases study on the New Economic Geography and urban economics theories, after structuring the conceptual model of the public service system in a monocentric metropolitan region, using simulation to realize the basic operation...
Entropy is defined as a measure of how much information can be retrieved from a message or information sources. In data communications, entropy from information sources is described in the form of bits and closely related to the probability of arriving message to receiver and depends on the period of light spectrum, therefore information source rates affected. The problem faced is how to describe...
We introduced the localization algorithm to find the coordinates of nodes in WSN. The proposed algorithm starts at measuring the angle and distance at the landmark and their neighbors and then finding their azimuths and incident angles. In this paper, four kinds of the method to calculate and update the coordinates of nodes are proposed. The simulation results show that to utilize more data obtained...
Nowadays the use of the Internet has become something massive and indispensable. But, how protected are internet users from cyber attacks? It is very difficult to see the impact of worm viruses in real networks. One of the best ways is to run attacking tools for intruding real networks and to get sufficient information on phenomena occurred in the networks during the attacks. However, it is impossible...
Iterative learning control (ILC), an approach to achieve perfect trajectory tracking for uncertain dynamic systems that are periodic or repetitive, can be viewed as a kind of coordination or planning algorithm. This paper exploits this view to provide two coordination algorithms for distributed multi-agent systems. First we show how to achieve formation control for a class of nonholonomic mobile agents...
The aim of this work is to describe the design, implementation and evaluation of an e-learning course focused on scheduling jobs in a computer grid. These topics belong to applied informatics master's study program. Themes of grid scheduling are part of courses, term and research projects. Our course titled Research project uses inter-subject relations among distributed operating systems, optimization,...
One dimensional SIMD array which is PIM-based data parallel computer architectural has been proposed for multimedia processing application. This paper describes the implementation of a controller for one dimensional SIMD array. The main components of the controller and the instruction format are presented. PE array control is introduced in detail. Finally, the results of simulation are given to show...
This paper compares two different approaches, followed by our research group, to efficiently run NEPs on parallel platforms, as general and transparent as possible. The vague results of jNEP (our multithreaded Java simulator for multicore desktop computers) suggests the use of massively parallel platforms (clusters of computers). The good results obtained show the scalability and viability of this...
With the development of computer science, large-scale distributed simulation is becoming mature. As an outstanding network simulation software, OPNET can simulate on single machine. In order to be one of large-scale distributed simulation,it need to be controlled. HLA can construct new complicated simulation applications with the reusable simulation module conveniently according to communication simulation...
This paper is a study of the “Character and Object Repetition” problem in crowded scenes. A detailed technique is presented in comparison to alternative previous solutions from different researchers.
Testability is a significant design feature for system, which has gong through five stages such as External Test, BIT (Build-in Test), Intelligent BIT, Comprehensive Diagnosis and PHM (Prognostics and Health Management), has greatly improved the maintainability, reliability and availability of the modern weapons especially in electronic systems [1]. Meanwhile, in the process of the researches on systems...
The experimental simulation system is visually modeled and designed with UML, and realized on DOTNET development platform. Practice shows that the use of Unified Modeling Language not only can have good system scalability and reusability, but also can improve the efficiency of the system.
Fault tolerance is a central issue in the design and implementation of interconnection networks for large parallel systems. Connection probability of a network is a good network fault tolerance measure. For a mesh of given size and node failure probability, the gap between the known upper and lower bounds on the connection probability is often very large. In this paper we design algorithms to estimate...
Based on the heralded pair-coherent states sources, the Vacuum+Weak decoy state protocol focused on BB84 is presented. Combining the passive decoy state method and the active decoy state method, we use the triggered and nontriggered components to estimate the fraction of single-photon counts and quantum bit-error rate of single-photon and to generate the secure key. From the simulation results of...
Since Gode and Sunder had introduced zero intelligence with budget constraint (ZI-C) agents in the double auction experiments, there has much controversy in whether the pure market discipline in ZI-C system has the ability to let the transaction prices converge to the competitive equilibrium. In this paper, we introduce a probability model to simulate the ZI experiences and try to gauge the power...
In this paper, snoopy cache coherence protocols with update strategy have been studied, since description of protocols is apparently different in references, so we offer a common description in order to show simplicity and comparability protocols. Evaluating of protocols is in simulation level By limes simulator tools. Limes includes dragon protocol [1], that we added WTU and firefly protocols to...
In the area of computer game, Amazons game is a relatively new one whose rules stand between the game of Chess and Go. Its move rule is simple but apt to generate tremendous move branches. Based on the UCT searching algorithm, this paper presents an idea that the whole process of Amazons game can be divided into three phases, which are the Opening, Middle game and Endgame, then different strategies...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.