Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Chih-Yao Wu"'
Autor:
Chih-yao Wu, 巫智堯
100
In Taiwan, bimodal distribution has been a prevalent phenomenon in English education for many years. The need of the low achievers, therefore, deserves much attention. However, school teachers usually express the difficulty in offering usefu
In Taiwan, bimodal distribution has been a prevalent phenomenon in English education for many years. The need of the low achievers, therefore, deserves much attention. However, school teachers usually express the difficulty in offering usefu
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/99392664108947177244
Autor:
Chih-Yao Wu, 吳之堯
99
Wireless communication networks become increasingly pervasive in our daily life. But the broadcasting nature makes wireless communication networks vulnerable to eavesdropping. Any receivers receive the transmitted signals are able to analyze
Wireless communication networks become increasingly pervasive in our daily life. But the broadcasting nature makes wireless communication networks vulnerable to eavesdropping. Any receivers receive the transmitted signals are able to analyze
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/75483761266059787680
Autor:
Shakil N. Afraj, Meng-Hao Lin, Chih-Yao Wu, Arulmozhi Velusamy, Ping-Yu Huang, Tzu-Yu Peng, Jui-Chen Fu, Shih-Hung Tung, Ming-Chou Chen, Cheng-Liang Liu
Publikováno v:
Journal of Materials Chemistry C. 10:14496-14507
A series of dithioalkylated methylidenyl cyclopentadithiophene-based quinoidal small molecules (CDTSQs) with different side chain lengths were designed for n-type OFETs, reaching electron mobility of 0.14 cm2 V−1 s−1 with good ambient stability.
Autor:
Yen-Ting Lin, Chia-Yu Lee, Chih-Yao Wu, Jhih-Min Lin, Tai-Chou Lee, Shih-Huang Tung, Cheng-Liang Liu
Publikováno v:
SSRN Electronic Journal.
Autor:
Afraj, Shakil N., Meng-Hao Lin, Chih-Yao Wu, Velusamy, Arulmozhi, Ping-Yu Huang, Tzu-Yu Peng, Jui-Chen Fu, Shih-Hung Tung, Ming-Chou Chen, Cheng-Liang Liu
Publikováno v:
Journal of Materials Chemistry C; 10/21/2022, Vol. 10 Issue 39, p14496-14507, 12p
Publikováno v:
IEEE Journal on Selected Areas in Communications. 31:1687-1700
In physical-layer security, secret bits are extracted from wireless channels. With the assumption of channel reciprocity, the legitimate users share the same channel which is independent of the channels between the legitimate users and the eavesdropp