Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Raja Ghosal"'
Publikováno v:
RFID Handbook ISBN: 9781315219325
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1bdab4a9d0286dc21f6128acd345567a
https://doi.org/10.1201/9781420055009-31
https://doi.org/10.1201/9781420055009-31
Autor:
Raja Ghosal, Amitava Ghosal
Publikováno v:
Kybernetes. 20:16-28
Computer networks are very complex and somewhat unpredictable systems in dynamic operations. Cybernetic modelling, incorporating stochastic, fuzzy variables, wherever appropriate, approximating interactions not easily tractable via a black‐box syst
Publikováno v:
Networked RFID Systems and Lightweight Cryptography ISBN: 9783540716402
This paper presents an overview of modern cryptography. As the title of this paper suggests this paper is a primer, and provides background information that can assist other researchers in further study, and in developing security mechanisms suitable
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2650f7f1395f9d027f6140de8124d36a
https://doi.org/10.1007/978-3-540-71641-9_5
https://doi.org/10.1007/978-3-540-71641-9_5
Autor:
Raja Ghosal, Amitava Ghosal
Publikováno v:
International Journal of Systems Science. 15:293-300
In a system of single-server queues in series, a customer enters the first queue ; he waits till he is served, enters the second queue, and so on. A heuristic method of approximating the distribution function of the inter-departure time through erlan
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
VISWANADHAM, NUKALA
Publikováno v:
IEEE Transactions on Automation Science & Engineering; Oct2008, Vol. 5 Issue 4, p708-712, 5p
Publikováno v:
Knowledge Engineering Review; Mar1992, Vol. 7 Issue 1, p85-93, 9p
Autor:
author unknown
'This book is the best source for the most current, relevant, cutting edge research in the field of industrial informatics focusing on different methodologies of information technologies to enhance industrial fabrication, intelligence, and manufactur
Autor:
Peter H. Cole, Damith C. Ranasinghe
The rapid growth of RFID use in various supply chain operations, which has arisen from the development of Electronic Product Code (EPC) technology, has created a need for the consideration of security issues in the adoption of that technology. As the