您现在的位置: 首页> 研究主题> Packet

Packet

Packet的相关文献在2000年到2022年内共计172篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、肿瘤学 等领域,其中期刊论文165篇、专利文献7篇;相关期刊93种,包括浙江万里学院学报、数字技术与应用、软件导刊等; Packet的相关文献由375位作者贡献,包括Antony J. Bourdillon、姜恩华、张梁斌等。

Packet—发文量

期刊论文>

论文:165 占比:95.93%

专利文献>

论文:7 占比:4.07%

总计:172篇

Packet—发文趋势图

Packet

-研究学者

  • Antony J. Bourdillon
  • 姜恩华
  • 张梁斌
  • 梁世斌
  • 高昆
  • Akira Suzuki
  • Jayashree Santhosh
  • Manvir Bhatia
  • Shigeji Fujita
  • Sneh Anand
  • 期刊论文
  • 专利文献

搜索

排序:

年份

关键词

    • 胡元闯
    • 摘要: 随着地方本科院校逐步向应用技术型大学转型,计算机网络实践课程传统的教学模式难以满足当今行业对人才的需求.根据应用技术性型大学对人才培养的需求,以贺州学院为例,结合作者多年从事计算机网络实践课程教学的经验,总结传统计算机网络实验教学模式存在的弊端,基于Packet Tracer平台对教学方式和考核方式进行改革探索,给出利用Packet Tracer平台制作实验课素材的方法和实践,考核方式更注重过程.结果表明,该方案能显著提高学生的学习效果.
    • 胡燕
    • 摘要: 思科模拟器是有Cisco公司发布的一款网络辅助学习工具,它可以很快捷的模拟网络中的各种设备,搭建各种网络环境,模拟拓扑结构等.在网络课程教学中,使用该辅助工具可以很好的弥补教学中设备不够用的困境,同时配置简单,操作方便,学生易于理解.实践中证明,考试中使用该软件的活动向导自动评分功能可以很直观的显示最终成绩,减轻了教师的期末改卷工作,同时在平时的学生自测中,学生可以很直观的跟踪到自己的出错点,及时改正.
    • 万晓林
    • 摘要: 点到点协议PPP(Point-to-Point Protocol)是一种提供点到点链路上传输,封装网络层数据包的数据链路层协议,是目前应用最广泛的广域网协议。PPP提供了一整套链路建立,维护和拆除的机制,提供了在点对点的链路上封装多协议数据报(如IP、IPX和AppleTalk)的标准方法,支持IP地址的动态分配和管理以及身份认证协议。经过多年的发展与扩充, PPP已经发展成为一个功能强大的协议族,并且产生了许多基于PPP的应用如MP,PPPoE,PPPoA等。通用路由平台是为3Com公司数据通信产品的通用网络操作系统平台,将各种协议实现集于一体,由于PPP有许多应用协议,功能较为复杂,因此需要建立一个可扩充的,有较强移植性的PPP实现。为了增加带宽,可以将多个PPP链路捆绑使用,称为多链路(PPP MP)。本文通过模拟软件PACKET TRACER实现了PPP MP的通信过程。
    • 胡斌; 张波
    • 摘要: 计算机网络课程作为电子商务专业的一门专业基础课,具有较强的理论性,使学生的学习难度增加。本文提出了在计算机网络课程教学中应用Cisco Packet Tracer网络模拟软件,来帮助学生理解抽象的网络理论。通过结合具体教学案例,详细讨论了Packet Tracer的具体应用。通过将Packet Tracer引入到教学中,能使学生更好的对网络理论的掌握和理解。
    • Antony J. Bourdillon
    • 摘要: Because magnetic moment is spatial in classical magnetostatics, we progress beyond the axiomatic concept of the point particle electron in physics. Orbital magnetic moment is well grounded in spherical harmonics in a central field. There, quantum numbers are integral. The half-integral spinor moment appears to be due to cylindrical motion in an external applied magnetic field;when this is zero , the spin states are degenerate. Consider lifting the degeneracy by diamagnetism in the cylindrical magnetic field: a uniquely derived electronic magnetic radius shares the identical value to the Compton wavelength.
    • 钟橙; 陆烽; 钱力
    • 摘要: 在5G演进过程中,语音业务仍然是十分重要的业务之一,5G发展需要更多优质的低频谱资源,但是目前这些优质资源却被2/3G用作语音通话占用,因此对传统的语音业务继承面临很多挑战,是全球运营商需要把语音业务从2/3G转移到4G或者5G上来部署,成为焦点问题。本文概述了5G网络语音解决方案,探析如何将语音服务纳入5G网络中。
    • Gensheng Hu; Min Li; Dong Liang; Mingzhu Wan; Wenxia Bao
    • 摘要: A group activity recognition algorithm is proposed to improve the recognition accuracy in video surveillance by using complex wavelet domain based Cayley-Klein metric learning.Non-sampled dual-tree complex wavelet packet transform(NS-DTCWPT)is used to decompose the human images in videos into multi-scale and multi-resolution.An improved local binary pattern(ILBP)and an inner-distance shape context(IDSC)combined with bag-of-words model is adopted to extract the decomposed high and low frequency coefficient features.The extracted coefficient features of the training samples are used to optimize Cayley-Klein metric matrix by solving a nonlinear optimization problem.The group activities in videos are recognized by using the method of feature extraction and Cayley-Klein metric learning.Experimental results on behave video set,group activity video set,and self-built video set show that the proposed algorithm has higher recognition accuracy than the existing algorithms.
    • Mubashir Hussain; Hui Guo; Sri Parameswaran
    • 摘要: Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be unleashed in a NoC (Network on Chip) based system where the NoC comes from a third-party vendor and can be engrafted with hardware Trojans. Unlike the attackers on a traditional network, those Trojans are usually small and have limited capacity. This paper targets such a hardware Trojan;Specifically, the Trojan aims to divert traffic packets to unauthorized locations on the NoC. To detect this kind of traffic hijacking, we propose an authentication scheme in which the source and destination addresses are tagged. We develop a custom design for the packet tagging and authentication such that the implementation costs can be greatly reduced. Our experiments on a set of applications show that on average the detection circuitry incurs about 3.37% overhead in area, 2.61% in power, and 0.097% in performance when compared to the baseline design.
    • Dadi Bi; Peng Ren; Zheng Xiang
    • 摘要: In this paper, we present a novel signal candidate generation method and propose a new joint coding and probability peak to average power ratio (PAPR) reduction scheme for a Luby transform (LT) coded orthogonal frequency division multiplexing (OFDM) system. When a few LT packets are mapped into an OFDM symbol, all subcarriers are automatically divided into several blocks. We permutate this packets and assign them different subcarrier blocks to generate different signal candidates instead of multiplying by many phase rotation vectors and using active constellation extension, and the transmitted symbol will be the one whose PAPR is the smallest. Also, we introduce one phase rotation vector to further reduce PAPR. Simulation results prove that our proposed scheme can obtain effective PAPR reduction performance. Since the permutation operation does not change the degree value of each packet, the new scheme can still maintain good decoding performance.
    • 高圣国; 田书格
    • 摘要: 计算机网络课程涉及通信过程的很多细节,仅仅通过文字描述来理解有一定难度,所以教学过程中需要通过演示来进行说明和讲解.Packet Tracer是教学演示的理想工具之一.本文介绍了Packet Tracer软件的功能和特点,并以访问网页为例演示了多个协议的工作过程,帮助学生准确的理解这一通信过程.教学实践表明,该软件易学易用,能帮助学生理解相关原理,解释学生的一些疑惑,同时能提高学生的学习兴趣.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号