Zobrazeno 1 - 9
of 9
pro vyhledávání: '"HUANG Sheng-ye"'
Publikováno v:
Tongxin xuebao, Pp 15-21 (2007)
A systematic research on the performance analysis on the call level and the packet level in a system with multi-rate VBR services was made.According to the global balance condition of a multi-dimensional Markov chain,an algorithm of accurately evalua
Externí odkaz:
https://doaj.org/article/c60a05b6be6449fa92dab8560701bb35
Autor:
Huang, Sheng-Ye, 黃陞曄
107
In this study, SnO2 films and SnO2-TiO2 composite films were fabricated by atomic layer deposition. The hydrogen and alcohol gas sensing properties of the fabricated films were investigated. It was found that the hydrogen and alcohol sensing
In this study, SnO2 films and SnO2-TiO2 composite films were fabricated by atomic layer deposition. The hydrogen and alcohol gas sensing properties of the fabricated films were investigated. It was found that the hydrogen and alcohol sensing
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/u27v43
Publikováno v:
ACTA PHOTONICA SINICA. 41:1059-1064
In order to calibrate the sensitivity of fiber grating hydrophone,a calibration technique of fiber grating hydrophone was studied.In this paper,the working principle of fiber grating hydrophone was introduced firstly.Secondly,using tunable laser and
Publikováno v:
OME Information. 28:22-26
Publikováno v:
Computer Communications. 27:70-80
In this paper, the authors propose a new optimization method of path bandwidth allocation for large-scale telecommunication networks. By using the decomposition-coordination method to get an optimal solution of path bandwidth allocation for large-sca
Publikováno v:
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
A queueing model for performance analysis of goback- N (GBN) automatic repeat request (ARQ) protocols in wireless networks using dynamic radio link adaptation with fixed feedback was proposed. Firstly, the paper analyzes the major factors affecting r
Publikováno v:
2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
It is difficult to implement a mature cryptography mechanism in the low-cost RFID system because of the limitation of available resources. Following the analysis of several kinds of typical authentication protocols, an enhanced authentication protoco
Publikováno v:
2009 5th International Conference on Wireless Communications, Networking & Mobile Computing; 2009, p1-4, 4p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.