نتایج جستجو برای: based switching

تعداد نتایج: 2985832  

Journal: :IEEE Trans. Computers 2003
Bertrand Emako Roch H. Glitho Samuel Pierre

Internet Telephony can be defined as real-time voice or multimedia communications over packet switched networks, including the Internet. The advent of third generation, wireless telecommunications networks will make it much more popular by adding the wireless dimension. Millions of end-users will access Internet Telephony services using wireless devices. These end-users will be highly mobile an...

2007
Aldo Campi Walter Cerroni Franco Callegati Georgios Zervas Reza Nejabati Dimitra Simeonidou

In this paper we discuss the use of the Session Initiation Protocol (SIP) as part of the control plane of an application aware Optical Burst Switching (OBS) network, able to support Grid computing applications. The paper presents the possible alternatives for the architecture of such control plane and reports of an experiment in an existing OBS test-bed where this approach was successfully test...

Journal: :Computer Communications 2018
Benjamin Finley Arturo Basaure

Mobile users have not been able to exploit spatio-temporal differences between individual mobile networks operators for a variety of reasons. End user network switching and multihoming are two promising mechanisms that could allow such exploitation. However these mechanisms have not been thoroughly explored at a general system level with QoE metrics. Therefore, in this work we analyze these mec...

Journal: :J. Comput. Physics 2015
Bijan Goshayeshi Ehsan Roohi Stefan K. Stefanov

Article history: Received 18 February 2015 Received in revised form 10 July 2015 Accepted 4 September 2015 Available online 25 September 2015

2010
Radek Erban Jan Haškovec

Abstract. A class of stochastic individual-based models, written in terms of coupled velocity jump processes, is presented and analysed. This modelling approach incorporates recent experimental findings on behaviour of locusts. It exhibits nontrivial dynamics with a “phase change” behaviour and recovers the observed group directional switching. Estimates of the expected switching times, in term...

Journal: :Mathematics and Computers in Simulation 2010
Shan Mei Peter M. A. Sloot Rick Quax David A. van de Vijver Yifan Zhu

Simulating the evolution of the Human Immunodeficiency Virus (HIV) epidemic requires a detailed description of the population network, especially for small populations in which individuals can be represented in detail and accuracy. In this paper, we introduce the concept of a Complex Agent Network(CAN) to model the HIV epidemics by combining agent-based modelling and complex networks, in which ...

Reliability is one of the fundamental considerations in the design of industrial control equipment. The microprocessor-based Hybrid Duplex fault-tolerant System (HDS) proposed in this paper has high reliability to meet this demand although its hardware structure is simple. The hardware configuration of HDS and the fault tolerance of this system are described. The switching control strategies in...

In this paper, we proposed an all optical 4-to-2 encoder that has 4 input and 3 output ports. This device generates a 2 bit binary code based on which input port is active. We used nonlinear photonic crystal ring resonators along with optical power splitter for realizing the proposed encoder. In this device the switching rate and area are obtained about 333 GHz and 612µm2 respectively.

A major problem in an isolated DC/DC converters operating at high switching frequencies is the attendant switching losses in the semiconductor devices. This can be reduced by introducing either zero-voltage switching (ZVS) or zero-current switching (ZCS) of the semiconductor switches. This paper deals with the simulation, design, fabrication and experimental evaluation of a novel soft-switching...

Journal: :Journal of Systems and Software 2023

Software vulnerabilities can affect critical systems within an organization impacting processes, workflows, privacy, and safety. When a software vulnerability becomes known, affected are at risk until appropriate updates become available eventually deployed. This period last from few days to several months, during which attackers develop exploits take advantage of the vulnerability. It is tedio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید