![](images/graphics/blank.gif)
Topological features
-
Wireless networks - Lecture 39: Bluetooth/Wireless personal area networks (WPAN). The main topics covered in this chapter include: bluetooth introduction; technical features; access technique; bluetooth topology/scenario; specifications; architecture; core protocols; packet format; link connections;...
34p
haoasakura
30-05-2022
11
3
Download
-
The Modular Multilevel Converter (MMC) is worldwide recognized as one of the most innovative converter topologies regarding renewable energy applications. The most significant features of using this configuration are less component count, less switching losses, and improved output voltage/current waveform.
4p
vistephenhawking
26-04-2022
18
2
Download
-
Chromosome conformation capture data, particularly from high-throughput approaches such as Hi-C, are typically very complex to analyse. Existing analysis tools are often single-purpose, or limited in compatibility to a small number of data formats, frequently making Hi-C analyses tedious and time-consuming.
19p
viarchimedes
26-01-2022
6
0
Download
-
The study of protein complexes and protein functional modules has become an important method to further understand the mechanism and organization of life activities. The clustering algorithms used to analyze the information contained in protein-protein interaction network are effective ways to explore the characteristics of protein functional modules.
14p
vilichoo2711
25-06-2021
8
1
Download
-
Because biological networks exhibit a high-degree of robustness, a systemic understanding of their architecture and function requires an appraisal of the network design principles that confer robustness.
12p
viwyoming2711
16-12-2020
6
1
Download
-
In the context of drug discovery, drug target interactions (DTIs) can be predicted based on observed topological features of a semantic network across the chemical and biological space. In a semantic network, the types of the nodes and links are different.
10p
vioklahoma2711
19-11-2020
7
1
Download
-
Direct volume rendering is one of flexible and effective approaches to inspect large volumetric data such as medical and biological images. In conventional volume rendering, it is often time consuming to set up a meaningful illumination environment.
17p
vioklahoma2711
19-11-2020
9
1
Download
-
In protein design, correct use of topology is among the initial and most critical feature. Meticulous selection of backbone topology aids in drastically reducing the structure search space. With ProLego, we present a server application to explore the component aspect of protein structures and provide an intuitive and efficient way to scan the protein topology space.
6p
viconnecticut2711
28-10-2020
15
1
Download
-
Community detection algorithms are fundamental tools to uncover important features in networks. There are several studies focused on social networks but only a few deal with biological networks. Directly or indirectly, most of the methods maximize modularity, a measure of the density of links within communities as compared to links between communities.
25p
vijisoo2711
27-10-2020
6
0
Download
-
Chapter 7 - The multilateral trade and investment framework. The main goals of this chapter are to: Provide a history of the development of the current world trading system, leading to a better understanding of the current international trade framework; explain the functioning, the achievements and the problems faced by the General Agreement on Tariffs and Trade (GATT); outline the new features of the World Trade Organisation (WTO).
34p
nanhankhuoctai1
29-05-2020
25
0
Download
-
This method combines several image features using Speedup Robust Features (SURF) by accumulating them into a union form of features inside each place cluster. In this method, the mobile robot captures omnidirectional visual information and converts them into topological place clusters.
5p
cathydoll5
27-02-2019
18
3
Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p
nhanmotchut_3
20-10-2016
65
4
Download
-
After this lecture you should be able to: Describe the primary Vector data models used in GIS and give examples, describe raster data models and give examples, describe TIN data models, explain “topology”, describe the main file formats used in GIS.
70p
hongmai1604
18-05-2014
41
4
Download
-
DBS3900 is a distributed BTS solution developed by Huawei Technologies Co.,Ltd. Its baseband part and radio part can be installed independently so that it can be used to various environments with wide coverage and low cost. Know the functions and features of DBS3900 Master the Hardware structure and function of DBS3900 Familiar with the Typical configuration and cable connection of DBS3900 Master the Network topologies of DBS3900
74p
daihocdientu4
20-05-2013
144
14
Download
-
When you create a geodatabase, as you did in Exercise Add a database server to the Catalog tree and create a geodatabase, there is no data in it. You must add data to new geodatabases either by creating new datasets, importing data, or copying data from one geodatabase and pasting it into another. In this exercise, you will create a feature dataset, then import data from a personal geodatabase to populate it. You will also copy data from a file geodatabase and paste it into your new geodatabase. After the data is loaded, you will update the database statistics....
37p
nhacsihuytuan
13-04-2013
78
3
Download
-
This paper introduces the notion of a stability condition on a triangulated category. The motivation comes from the study of Dirichlet branes in string theory, and especially from M.R. Douglas’s work on Π-stability. From a mathematical point of view, the most interesting feature of the definition is that the set of stability conditions Stab(D) on a fixed category D has a natural topology, thus defining a new invariant of triangulated categories.
30p
noel_noel
17-01-2013
47
6
Download
-
Our approach to defining a security protocol for sensor networks is resource driven and factors in the trade offs between levels of security and the requisite power and computational resources. Primarily, we envision a scenario where a protected perimeter based on sensors is dynamically deployed. However, similar scenarios could be envisioned in an environment where the topology is well known in advance and the sensor network is pre- configured. Our operating paradigm is where data is reported to a computationally robust central location such as a base station or network controller....
4p
khongmuonnghe
04-01-2013
88
2
Download
-
In this special feature, we examine how expected equity returns vary across a sample of globally active banks and over time in 11 countries. We estimate the determinants of the rate of return on bank stocks using a standard equity pricing framework that decomposes share price risk into a systematic and an idiosyncratic component. The systematic component cannot be diversified away, and it is priced in the market in the sense of commanding higher expected returns.
19p
quaivattim
04-12-2012
36
1
Download
-
Each router has a full picture of the network topology, including bandwidth information for links to remote networks. Therefore, each router is able to independently select a loop-free and efficient pathway, based on cost, to reach every network in the area.
31p
danhson1409
02-12-2010
65
6
Download
-
Link-State Routing Protocols. Objectives: Describe the basic features & concepts of link-state p routing protocols. Distance vector routing protocols are like road signs because routers must make preferred path decisions based on a distance or metric to a network. Link-state routing protocols are more like a road map because they create a topological map of the network and each router uses this map to determine the shortest path to each network. The ultimate objective is that every router receives all of the link-state information about all other routers in the routing area.
28p
thanhtung_hk
05-11-2010
105
24
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)