Discrete event

Xem 1-20 trên 26 kết quả Discrete event
  • The Discrete Event Simulation (DES) method has received widespread attention and acceptance by both researchers and practitioners in recent years. The range of application of DES spans across many different disciplines and research fields. In research, further development and advancements of the basic DES algorithm continue to be sought while various hybrid methods derived by combining DES with other simulation techniques continue to be developed.

    pdf208p greengrass304 18-09-2012 19 5   Download

  • Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học quốc tế cung cấp cho các bạn kiến thức về ngành y đề tài: Two discrete events, human T-cell leukemia virus type I Tax oncoprotein expression and a separate stress stimulus, are required for induction of apoptosis in T-cells

    pdf12p toshiba16 27-10-2011 20 2   Download

  • Tham khảo tài liệu 'mechanical systems design c3 discrete event', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf21p 23919876 17-12-2011 25 2   Download

  • With rapid advancements in computing power, computer modeling and simulations have become an important complement to experimentations in many areas of research as well as industrial applications. The Discrete Event Simulation (DES) method has received widespread attention and acceptance by both researchers and practitioners in recent years. The range of application of DES spans across many different disciplines and research fields.

    pdf206p taurus23 27-09-2012 24 3   Download

  • A site plan is a map of the event and is essential for event planning and management. All key stakeholders can use it as part of the planning process, with consultation as to its final layout. The site plan must be easy to interpret and be posted strategically around the site for use by patrons. The site plan can be distributed for setting up the event and is also invaluable in an emergency. Use the checklist below to determine what must be shown on the site map. Use a simple grid format and include surrounding streets and landmarks. Entrances,...

    pdf538p nhacchovina 22-03-2013 40 12   Download

  • Considered by many authors as a technique for modelling stochastic, dynamic and discretely evolving systems, this technique has gained widespread acceptance among the practitioners who want to represent and improve complex systems. Since DES is a technique applied in incredibly different areas, this book reflects many different points of view about DES, thus, all authors describe how it is understood and applied within their context of work, providing an extensive understanding of what DES is.

    pdf338p cucdai_1 22-10-2012 36 12   Download

  • Here we study the architecture and characteristics of the broker network. We are using a particular internal structure for the events (defined in XML but currently implemented as a Java object). We assume a sophisticated matching of publishers and subscribers defined as general topic objects (defined by an XML Schema that we have designed). However these are not the central issues to be discussed here.

    pdf501p nhacchovina 22-03-2013 23 9   Download

  • In this section you should provide a general overview of your event and be as specific as possible about the activities you are proposing to conduct at the event. When selecting the dates for your event it is a good idea to check whether there are any other events already planned to avoid clashes in events. The timing of your event is also important to consider. Try not to plan your event during known quite periods when many people are out of town. Consider planning your event during the peak season to increase your...

    pdf33p nhacchovina 22-03-2013 30 7   Download

  • The justification for choosing this typing scheme is scalability. In other sys- tems, such as one finds for example in the Java Distributed Event Specifica- tion [SunMicrosystems 1998] andCORBANotification Service [ObjectManage- ment Group 1998b], a notification is a value of some named, explicit notification type. This implies a global authority formanaging and verifying the type space, something which is clearly not feasible at an Internet scale. On the other hand, we define a restricted set of attribute types from which to construct (arbitrary) notifications.

    pdf105p nhacchovina 22-03-2013 28 7   Download

  • There has been much previous work on node localization and event detection [6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16] , includ- ing foundational work on theoretical lower bounds [17, 18]. Sex- tant differentiates itself from this body of work in several ways. First, it does not assume uniform transmission radii (i.e.

    pdf27p nhacsihuytuan 06-04-2013 27 5   Download

  • As an example, consider the case where several net- work packets arrive for a socket. We could consider each incoming packet as a discrete event, recording one event for each packet. However, the number of incoming pack- ets is essentially unbounded, while the amount of mem- ory in the system is finite; we would be unable to provide a guarantee that no events would be lost. The result of the above scenario is that multiple pack- ets are coalesced into a single event.

    pdf0p nhacsihuytuan 06-04-2013 22 4   Download

  • Analyzing future distributed real-time systems, automotive and avionic systems, is requiring compositional hard real-time analysis techniques. Well known established techniques as SymTA/S and the real-time calculus are candidates solving the mentioned problem. However both techniques use quite simple event models. SymTA/S is based on discrete events the real-time calculus on continuous functions. Such simple models has been choosen because of the computational complexity of the considered mathematical operations required for real-time analysis.

    pdf10p giamdocamnhac 06-04-2013 21 3   Download

  • The ns-3 simulator is a discrete-event network simulator targeted primarily for research and educational use. The ns-3 project, started in 2006, is an open-source project developing ns-3. Primary documentation for the ns-3 project is available in four forms: ns-3 Doxygen/Manual: Documentation of the public APIs of the simulator. Tutorial (this document). Reference Manual: Reference Manual. ns-3 wiki.

    pdf119p hdan01 02-09-2010 132 45   Download

  • Probability and statistics are concerned with events which occur by chance. Examples include occurrence of accidents, errors of measurements, production of defective and nondefective items from a production line, and various games of chance, such as drawing a card from a well-mixed deck, flipping a coin, or throwing a symmetrical six-sided die. In each case we may have some knowledge of the likelihood of various possible results, but we cannot predict with any certainty the outcome of any particular trial....

    pdf417p sofia11 25-05-2012 71 33   Download

  • About the author. Andrew Moore is an experienced software developer with 12 years of pro-fessional experience in the fi elds of radar systems, air traffi c management, and discrete-event simulation. Most recently, Andrew has been working with Voice Over IP (VOIP) and business communications systems

    pdf916p sonphi1 11-01-2014 51 21   Download

  • Algorithms for Non-Product-Form Networks Although many algorithms are available for solving product-form queueing networks (see Chapters 8 and 9), most practical queueing problems lead to non-product-form networks. If the network is Markovian (or can be Markovized), automated generation and solution of the underlying CTMC via stochastic Petri nets (SPNs) is an option provided the number of states is fewer than a million. Instead of the costly alternative of a discrete-event simulation, approximate solution may be considered.

    pdf136p vaseline 23-08-2010 42 10   Download

  • Simulation of Wireless Network Systems This chapter deals with simulation of wireless network systems. We introduce the basics of discrete-event simulation as it is the simulation technique that is used for simulating wireless networks. We then review the main characteristics of the commonly used stochastic distributions used for the simulation of wireless networks. The techniques used to generate and test random number sequences are investigated. Then, we introduce the techniques used to generate random variates followed by performance metrics considerations.

    pdf39p tienvovan 18-09-2010 45 5   Download

  • Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com The First Edition Peter J. Ashenden .Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com The VHDL Cookbook First Edition July, 1990 Peter J. Ashenden Dept. Computer Science University of Adelaide South Australia © 1990, Peter J. Ashenden .Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com .Contents Simpo PDF Merge and Split Unregistered Version - http://www.simpopdf.com iii Contents 1. Introduction.......................................

    pdf111p beobobeo 01-08-2012 15 3   Download

  • This paper presents a detailed case study of the Clickbot.A botnet. The botnet consisted of over 100,000 machines and ex- hibited some novel characteristics while also taking advantage of some characteristics of existing, well-known botnets. One of the most novel characteristics of the clickbot is that it was built to conduct a low-noise click fraud attack against syndicated search engines. This paper focuses on describing the novel aspects of the Clickbot.A botnet, and describes parts of our experience in in- vestigating it.

    pdf27p giamdocamnhac 06-04-2013 16 3   Download

  • In this section we define the problem we address, state our assumptions, and describe our threat model. We address the problem of designing and implement- ing malicious processors that carry out high-level at- tacks. In this paper we focus on an attacker that adds additional circuits to carry out the attack. We consider analog circuit perturbations (both timing and power), as well as discrete perturbations. We do not consider at- tacks where the gate-level design is unmodified and the attacker uses physical phenomena (e.g.

    pdf10p nhacsihuytuan 06-04-2013 38 3   Download


Đồng bộ tài khoản