نتایج جستجو برای: wi is operating weight

تعداد نتایج: 7426434  

2001
Fred Diamond Matthias Flach Li Guo

This paper concerns the Tamagawa number conjecture of Bloch and Kato [B-K] for adjoint motives of modular forms of weight k ≥ 2. The conjecture relates the value at 0 of the associated L-function to arithmetic invariants of the motive. We prove that it holds up to powers of certain “bad primes.” The strategy for achieving this is essentially due to Wiles [Wi], as completed with Taylor in [T-W]....

2001
LI GUO

This paper concerns the Tamagawa number conjecture of Bloch and Kato [B-K] for adjoint motives of modular forms of weight k ≥ 2. The conjecture relates the value at 0 of the associated L-function to arithmetic invariants of the motive. We prove that it holds up to powers of certain “bad primes.” The strategy for achieving this is essentially due to Wiles [Wi], as completed with Taylor in [T-W]....

Journal: :CoRR 2013
Sourangsu Banerji Rahul SinghaChowdhury

Usually broadband wireless access networks are considered to be enterprise level networks providing us with more capacity as well as coverage. We have seen that in remote inaccessible areas wired networks are not at all cost effective. Wireless networking has offered us an alternative solution for such problem of information access. They have definitely changed the way people communicate and sh...

Journal: :CoRR 2017
Mohamed Abudulaziz Ali Haseeb Ramviyas Parasuraman

This paper introduces Wisture, a new online machine learning solution for recognizing touch-less dynamic hand gestures on a smartphone. Wisture relies on the standard WiFi Received Signal Strength (RSS) using a Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN), thresholding filters and traffic induction. Unlike other Wi-Fi based gesture recognition methods, the proposed method does n...

2016
Muhamad Erza Aminanto Paul D. Yoo Harry Chandra Tanuwidjaja Kwangjo Kim

As Internet-of-Things (IoT) devices enable pervasive computing in our daily lives, more and more devices are connected to Wi-Fi networks. The public access to Wi-Fi network leads to exploitable vulnerabilities that can be inverted as attacks. Impersonation attack is an active malicious action where unauthorized users masquerade themself as authorized to gain privileges. Detecting impersonation ...

2015
Saeed Shokri Aiob Soltani Mahsa Kazemi Dariush Sardari Farshid Babapoor Mofrad

OBJECTIVE In today's world, 2.45-GHz radio-frequency radiation (RFR) from industrial, scientific, medical, military and domestic applications is the main part of indoor-outdoor electromagnetic field exposure. Long-term effects of 2.45-GHz Wi-Fi radiation on male reproductive system was not known completely. Therefore, this study aimed to investigate the major cause of male infertility during sh...

2005
Dimitris Achlioptas Frank McSherry

We consider the problem of learning mixtures of distributions via spectral methods and derive a tight characterization of when such methods are useful. Specifically, given a mixture-sample, let μi, Ci, wi denote the empirical mean, covariance matrix, and mixing weight of the i-th component. We prove that a very simple algorithm, namely spectral projection followed by single-linkage clustering, ...

Journal: :CoRR 2014
V. C. K. P. Arul Oli Elayaraja Ponram

This paper describes about how you can secure your Wireless Network from hackers about various threats to wireless networks, How hackers makes most use of it and what are the security steps one should take to avoid becoming victim of such attacks. There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airport...

The present study is focused on biodesulfurization of natural gas in a batch culture using active microorganisms. The microorganisms used for the removal of hydrogen sulfide were obtained from a hot spring. The experiments were conducted with mixed gas at operating temperatures of 25 to 45°C with a time interval of 5h. Two kinetic models included Logistic and Monod models in a batch culture wer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید