نتایج جستجو برای: series stub
تعداد نتایج: 352132 فیلتر نتایج به سال:
Dr Jeffrey Wigand is delivering an anti-smoking message to children and young people. He talked to Ben Jones about his work.
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of packets between domains. In this paper, we focus on the needs of stub ISPs that compose 80% of the global Internet. We first describe the typical traffic pattern of such a stub ISP. Then we briefly describe the methods tha...
Differentiated Services (DiffServ) are seen as the technology to support Quality of Service (QoS) in IP networks in a scalable manner by allowing traffic aggregation within the engineered traffic classes. In DiffServ domains, admission control additionally needs to be employed in order to control the amount of traffic into the engineered traffic classes so as to prevent overloads that can lead ...
In this paper, various topologies of feeding structures are comparatively evaluated for 60 GHz three dimensional (3D) integrated cavity resonators used in 3D integrated RF modules. Three excitation techniques (slot excitation with a shorting via, slot excitation with a λg/4 open stub, probe excitation) have been evaluated using simulated and measured data. The probe excitation is demonstrated a...
The frozen code compression technique divides the unexecuted kernel code into single-entry partitions that are stored in compressed form, and replaced by stubs in the code. When control flow enters a stub, a special routine is invoked that allocates space and expands the corresponding code fragment, after which the stub is overwritten with a direct jump to the decompressed code. Once decompress...
In this paper, a compact notched ultra-wideband (UWB) bandpass filter with improved out-of-band performance using quasi electromagnetic bandgap (EBG) structure is proposed. Firstly, a UWB bandpass filter based on a stepped-impedance stub-loaded resonator (SISLR) is combined with quasi-EBG structures, which suppress the undesired spurious bands to improve the out-of-band performance. In order to...
A detailed nonlinear finite element model was established based on completed experiments to investigate the behavior of a blind-bolted T-stub composite joint that connects beam concrete-filled square tube column. This accomplished by comparing experimental results and simulation using hysteresis curve, failure mode, plastic deformation strain development ensure reliability accuracy model. param...
An object can be effectively characterized by its contour. Caselles et al. [1] introduced the concept of geodesic active contours, which applies the energy reducing form to acquire contours. Shape priors are great helpful to obtaining more accurate contours. Leventon [6] utilized the curvature prior as the shape prior for different classes of objects to guide contour evolution. Etyngier et al. ...
3 Availability techniques 3 3.1 Detection approaches . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.1 Distributed and Cooperative Intrusion Detection . . . 3 3.1.2 Watchdog and Pathrater . . . . . . . . . . . . . . . . . 4 3.1.3 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) . . . . . . . . . . . . . . . . 5 3.1.4 CORE (Collaborative Reputation) . . . . . . . . . . ....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید