Where results make sense
 About us   |   Why use us?   |   Reviews   |   PR   |   Contact us

# Topic: Net (topology)

###### In the News (Sun 19 May 13)

 Net (mathematics) - Wikipedia, the free encyclopedia In topology and related areas of mathematics a net or Moore-Smith sequence is a generalization of a sequence, intended to unify the various notions of limit and generalize them to arbitrary topological spaces. Nets generalize this concept by weakening the order relation on the index set to that of a directed set. In general, a net in a space X can have more than one limit, but if X is a Hausdorff space, the limit of a net, if it exists, is unique. en.wikipedia.org /wiki/Net_(topology)   (1155 words)

 Crystallographic Topology - Critical Nets 2 The arrows denote the down density critical net paths leading from the peak at (a) to the pit at (b). Critical nets are actually Morse functions that are defined in terms of a mathematical mapping from Euclidean 3-space to Euclidean 1-space (i.e., a single valued 3-dimensional function). However, local topology may not be adequate to differentiate two closely related structures, such as fcc and hcp. www.ornl.gov /sci/ortep/topology/critnet2.html   (2301 words)

 LTM - Why Use Neural Nets Neural nets begin training by assigning randow weights between nodes in the input layer and nodes in the hidden layer and between nodes in the hidden layer and the nodes of the output layer. As the net cycles through this process, a learning algorithm, often called the delta function, is used to determine the difference of errors between the last two cycles. For example, we have tested whether a neural net model that is built to simulate land use change in the Detroit area can be used to predict historical changes in the Twin Cities metropolitan area, and visa versa. ltm.agriculture.purdue.edu /neuralnets.htm   (537 words)

 Challenges of CAD Development for Datapath Design Such techniques are based on a set of rules, such as default routing layers, widths, and spacing, and on net topology generation algorithms such as a minimum spanning tree or Steiner tree (minimum length routing tree with horizontal and vertical wires). An extensive net specification system is an integral part of the design tool suite, providing designers the ability to specify a wide range of properties on the nets in the design. These net specifications are used by the parasitic estimation capability to ensure that the parasitic estimates accurately reflect the designer's intentions. developer.intel.com /technology/itj/q11999/articles/art_3f.htm   (1081 words)

 Si-Lab Films - Signal Consulting, Inc. Characterize the daisy-chain net in terms of the ratio of delay to risetime. Characterize the hairball net in terms of the ratio of delay to risetime. Characterize the point-to-point net in terms of the ratio of delay to risetime. www.sigcon.com /SiLab/silablist.htm   (4209 words)

 Chapter 5: Topology Physical topology should not be confused with logical topology which is the method used to pass information between workstations. A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator (See fig. A star-wired ring topology may appear (externally) to be the same as a star topology. fcit.usf.edu /network/chap5/chap5.htm   (718 words)

 Some Remarks on Network Models of Music Still, it is interesting to think of a space as a rigidly structured, non-deformable net with infinitely many nodes and infinite density (with respect to its metric), and to think of a net as a plastic, deformable space without a metric. The difference between the situations of the first net for pitch perception and this one for musical analysis is that in the case of pitch perception, the human process being modelled may usually not involve much human representation or conscious thought. The net processes this input representation and outputs a vector of values, one for each output node; this vector is also a representation. faculty.washington.edu /jrahn/Networks.html   (4287 words)

 MG-SOFT Corporation: MG-SOFT Net Inspector - Network Manager Displayed alarms are colored according to their severity levels (critical, major, minor, warning, etc.) allowing network operators to have a clear overview of open alarms and to focus on most relevant alarms first (screen shot). Net Inspector is based on the Client/Server architecture, where the Net Inspector Server (Engine) runs as a system (NT) service application without user interface (on MS Windows 2000, Windows XP or Windows Server 2003) and performs all network monitoring and management operations. Compiled MIB files can then be loaded and utilized by Net Inspector to allow you perform SNMP monitoring activities in a user-friendly manner (e.g., query particular OIDs, resolve queried OIDs to names, identify and display SNMP Trap and Inform notifications messages by their names, etc.)(screen shot). www.mg-soft.com /netinsp-features.html   (1088 words)

 Net Integrator Server Features. Net Integration Technologies Net Integrator File Server, Mail Server, FTP Server ... The Nitix-powered Net Integrator Mark I and Mark II servers have high-performance AMD Athlonâ„˘ 64 processors, dual channel memory and gigabit Ethernet controllers, all of which contribute to provide efficient, high-performance networking services. Net Integrator acts as a central, integrated file server, allowing a user on any kind of workstation to share files with any other workstation. Net Integrator supports CIFS/SMB (Windows File Sharing), Appleshare IP (for Macintosh systems), and NFS (for Unix systems), and all the files accessible from one type of computer are accessible from all the others. www.doubleeagleservicesinc.com /NIservers.html   (994 words)

 An Atlas of Cyberspaces - Topology Maps It was created using an automatic network discovery tool called Mercator developed as part of the Scan project by Ramesh Govindan, Anoop Reddy and colleagues, at the Information Sciences Institute, USA. The map above left shows the ATM network circa September 1996, while the map on the right is a schematic map of the backbone topology of SuperJANET III from early 1998. The topology map below shows the new SuperJANET4 backbone, as of March 2001. www.cybergeography.org /atlas/topology.html   (668 words)

 Introduction to Document Clustering The number of input, hidden, and output nodes is referred to as the neural net topology or the network architecture. Neural net algorithms usually restrict weights to a narrow range such as between plus and minus 1 or between plus and minus 10. The heart of the neural net algorithm involves a series of mathematical operations that use the weights to compute a weighted sum of the inputs at each node. www.jatit.org /research/document_clustering19.htm   (397 words)

 CTheory.net Naxsmash is a work, or series of net based projects, scenarios that try to disclose this kind of psychic topology, so that the 'slipstream' relationship between body and machine generates this uncanny place, as if I am trying to describe what it is like inside the area of negative pressure, inside the stream/screen. The sonic topology performs through play on and through the carbon data, so that data and the net sound are in a musical self-reflexive loop, remediating, through a flexible action-scripted Flash interface, photosynthesis. Writing on net architecture and the poetics of virtual space is found at arch.virose.pt. www.ctheory.net /articles.aspx?id=485   (6738 words)

 Ethernet Topology A network's logical topology is not necessarily the same as its physical topology. For example, twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a logical ring topology, it is physically set up in a star topology. www.localtech.us /topology.htm   (290 words)

 To Tee or Not To Tee The basic problem with this topology is that all three branches are long compared to the length of a rising edge. It’s their job to hook up the net list, with the part footprints in their database, and the standard design rules enforced in their shop at the time of layout. This dual-driver topology is the kind of design that will work now, and in the future, when some kid who doesn’t know an ohm from a hole in the ground picks up your design and tries to figure out what you did. www.sigcon.com /Pubs/edn/tee.htm   (871 words)

 Signal path modeling For optimal speed, net topologies are usually point-to-point, i.e., one source and one destination. The data rate over point-to-point nets is typically limited by frequency-dependent losses in the interconnecting media. In many cases the net topology must be designed to work with the output buffers. advancedsidesign.com /signal_path_modeling.html   (368 words)

 Webopedia: Network Topologies Topology refers to the shape of a network, or the network's layout. How different nodes in a network are connected to each other and how they communicate are determined by the network's topology. In a true mesh topology every node has a connection to every other node in the network. www.webopedia.com /quick_ref/topologies.asp   (160 words)

 Influencing Global Situations: This techniques, known as Influence Net modeling, is a combination of two established methods of decision analysis: Bayesian inference net analysis originally employed by the mathematical community; and influence diagramming techniques originally employed by operations researchers. The topology of the Influence Net model, constructed for a specified situation by the domain experts themselves, is only one result of this collaborative technique. These action influences and their causal connections are constructed in the same manner as described in Sections 4 and 5.) In this manner, the addition of action influences to the Influence Net topology supports the collaborative analysis required to determine the efficacy of implementing the identified course of action. www.airpower.maxwell.af.mil /airchronicles/cc/julie.html   (6081 words)

 OAS Casestudy: The IEEE P1394.1 FireWire Net Update Protocol Both 1394 buses and P1394.1 nets are supposed to work in a plug-and-play fashion, which means that devices may be plugged in and out, or switched on and off while remaining bus/net continues to operate without too much disruption. Undetected loops Multiple, rapid changes to the net topology may cause a loops that does not meet the loop criterion, hence is not detected and may cause net update to not terminate. A separate net reset protocol called net panic has been introduced to remedy this situation, which is described here. www.win.tue.nl /oas/demo/casestudy.html   (733 words)

 Specifying DDR and high speed timing requirements using PCB routing tools The signal net classes are then associated with their clock net class. The net class routing rules establish clear requirements on the routing of the nets contained within. The lengths and configuration of the net topology segments are also clearly defined. www.embedded.com /shared/printableArticle.jhtml?articleID=193004417   (2916 words)

 Precience - PCBNavigator Analyze drivers/receivers on a node: net topology spreadsheet viewer, transfer to HyperLynx (optional). Using the PCBNavigator solution, designers are able to accurately assign board, net, net class, component, component class, clusters, and placement rules at the schematic level. The user may select a net in a design, and complete receivers/drivers are listed, with attributes on each pin node. www.precience.com /pages/PCBNavigator.asp   (1004 words)

 Emulab.Net - Emulab Documentation Part of Emulab's power lies in its ability to assume many different topologies; the description of a such a topology is a necessary part of an experiment. In a topology like this, you will likely want to communicate between all the nodes, including nodes that aren't directly connected, like A and C. In order for that to happen, we must enable routing in our experiment, so B can route packets for the other nodes. However, the control net must be visible to nodes for several practical reasons, most notably allowing login from remote sites and the ability of the node to access the shared NFS /proj and /users filesystems. www.emulab.net /tutorial/docwrapper.php3?docname=tutorial.html   (6115 words)

 4-WIRE P-NET 4-WIRE P-NET is always installed as a bus topology and must be terminated at both ends by a PD 990 4-WIRE P-NET Conditioner connected as a termination. If the device cabinet is isolated from ground, the connection terminal area must ensure a good connection between the shields of the two bus cables. Termination is achieved by connecting a PD 990 4-WIRE P-NET Conditioner to the first and last node in the network. www.proces-data.com /50/00602K4MVH/SEMLU-01/Description_ENG.htm   (523 words)

 Forums - Need Neural Network Solution On the software side I think you are going to find that most packages require you to select the inputs to the neural net and once you know that (what inputs are correlated with future prices) you don't really need the neural net at all. As Semper was looking for a 'turnkey' solution, I don't think that selecting inputs to the net and defining net topology is what he would go for. To speak the truth, in any event, provided the technology is applied correctly, you will gain more than you will lose, but you will be a real success with neural nets only when you stop looking for the best and, naturally, non-existing net. www.elitetrader.com /vb/printthread.php?threadid=48401   (677 words)

 forum - Guest Feature: Cautionary Tales: Stealth Coordinated Attack HOWTO   (Site not responding. Last check: 2007-11-03) The first part of a successful attack is to get to know the network topology in the region surrounding your target and the parties it communicates to. People complain about the lack of anonymity on the net, but for those that cross that line into unauthorized systems use, there is altogether too much anonymity. As we are discovering, it's the law of the jungle out there on the Net, and there are few places to turn to for assistance in case you get some malicious bozo attacking you. www.nswc.navy.mil /ISSEC/CID/Stealth_Coordinated_Attack.html   (6809 words)

 PlanetMath: proof of Banach-Alaoglu theorem is compact in product topology by Tychonoff theorem. We prove the theorem by finding a homeomorphism that maps the closed unit ball Cross-references: linear functional, point, inverse, continuous, iff, weak-* topology, converges, net, one-to-one, closed subset, onto, unit ball, closed, maps, homeomorphism, Tychonoff theorem, product topology, compact, compact subset planetmath.org /encyclopedia/ProofOfBanachAlaogluTheorem.html   (104 words)

 EETimes.com - Rivals vie to reshape net topology SAN JOSE, Calif. — The topology of metropolitan networks could get turned on its head when an industry working group gathers Monday (Sept. 10) to hash out a draft standard for resilient packet rings, an emerging technology to improve bandwidth in the crowded metropolitan market. Resilient packet rings are a way of sending traffic on physical rings — the topology most commonly used in metropolitan areas — while preserving the reliability of Sonet but discarding its inefficiencies. Where Sonet keeps a backup ring free in case of catastrophe, RPR would use the backup ring in addition to the primary ring, theoretically doubling the available bandwidth. www.eetimes.com /story/OEG20010907S0106   (1808 words)

 Issues when Implementing MPOA Sample Net's network consists of an ATM LANE backbone with six LS1010 switches, approximately 50 Catalyst Switches, and approximately ten routers. If standard routers were in use in Sample Net's topology instead of the RSMs, the ATM interface would need to be configured as MPS with an IP address and as a LANE client. A close examination of Sample Net's topology below shows that that there is no cut-through switching path available between the PC and the server. www.cisco.com /warp/public/121/mpoa_implement_issues.html   (2248 words)

 Overview (Clack v1.0.0 API Specification) Examples of both static and dynamic checks that can be used to validate router correctness and diagnose problems. Core classes for parsing topology information from VNS and loading a Clack topology configuration from file. Provides visual graph components and handling for the "zoomed out" topology view. klamath.stanford.edu /vns/clack/javadoc/overview-summary.html   (289 words)

 TransPAC2.net Topology The T320 maintains a 10GigE connection to the Pacific Wave switch at 1 Wilshire Blvd. It maintains BGP peerings with North American RandE networks across this 10G link. The diagram below illustrates the topology and a portion of the network interconnects available at each location. For a complete listing of available networks, please refer to the APAN and Pacific Wave webpages. www.transpac2.net /topology.php   (179 words)

Try your search on: Qwika (all wikis)

About us   |   Why use us?   |   Reviews   |   Press   |   Contact us