搜索资源列表
dymoum-0.3
- dymoum-0.3 ns-2 add can do research on dymo traffic
manet-2
- ns-3 introduction & MANET WG implementation
wireless-4.4
- 利用NS-2进行无线网络模拟 采用一个有3个节点的实例来说明利用NS-2进行无线网络模拟的具体流程,场景设置为一个500m*400m的矩形区域中。-Using NS-2 wireless network simulation using a three node example to illustrate the use of NS-2 wireless network simulation of specific processes, the scene is set to a 500m* 4
NSCT
- 1.分析研究了基于内容的图像检索系统的工作原理,关键技术如:纹 理、形状等图像底层特征的描述方法, 图像间的相似性度量方法, 图像库索引机制等。 2.研究了基于纹理特征的图像检索方法,并提出了一种基于NSCT 变 换的纹理特征提取方法。通过对SAR 图像及相关图像进行NSCT 分解,计算不同尺度不同方向上的系数幅度序列的均值,标准方差 和三阶中心矩,以此构成特征向量来描述图像的纹理。实验证明本 文提出的采用NSCT 算法有较好的特征提取效果,引入三阶中心矩 作为特
dojo-release-1.0.3.tar
- dns query lib for linux kernel-ns query lib for linux kernel
NS_WiMAX_module-1.02
- 1. Download the software ns-allinone-2.28 package 2. Download the latest ns-2 WiMAX module source code. 3. Unzip the ns-2 WiMAX module source code file. 4. Put the files from "mac" directory into ns-allinone-2.28\ns-2.28\mac. 5. Put the
tutorial
- This an ns-3 tutorial.-This is an ns-3 tutorial.
testing
- ns-3 Testing and Validation
ns-Lab-3
- Programs to analyse a simulation in ns.
ns-3-tutorial.tar
- ns3 tutorial good one
7-3
- ns中用于无线网络的仿真,并求得了无线网络的丢包率,延时时间等性能指标。-ns in the simulation for wireless networks and obtain a wireless network packet loss rate, delay time and other performance indicators.
ns-3-nsc
- ns3_netwrk simulation cradle_tutorial
ns-3-tutorial-slides
- tutorial on ns3 simulation
olsr-0.2.3-ns-2.34.tar
- OLSR protocol for ns-2.33
ppl-devel-0.10-3.1.i586
- c library which is required for ns patch to enable mpls module
mpfr-debuginfo-3.0.1-18.1.i586
- c library which is required for ns patch to enable mpls module
4.7.3
- solution to problems in this book http://www-sop.inria.fr/members/Eitan.Altman/COURS-NS/n3.pdf PS: the output traces .tr and .nam are not included but you can generate them using the existing files
ns-234-leach_Modified
- Modified MIT code: Manual how to use modified LEACH,LEACH-C and PEGASIS 1. In folder mit/uAMPS are files ns-leach_2.tcl and ns-bsapp_2.tcl 2. You have to rename file to ns-leach_2 to ns-leach.tcl and you can simulate modified protocol LEACH 3
NS-(3)
- it is a security based in adhoc network
ns-default
- Some operating systems support more than one type of hash. In fact, sometimes the standard DES-based algorithm is replaced by an MD5-based algorithm. The hash type is triggered by the salt argument. Prior to 5.3, PHP would determine the available alg