نتایج جستجو برای: windows dimensions
تعداد نتایج: 186217 فیلتر نتایج به سال:
Computer users are currently bound to the “desktop” metaphor. This metaphor’s longevity is a testament to the strength of its design. Of course, over twenty-some years improvements have been made to that original design, but the basic elements (e.g. icons, pop-up and pull-down menus) that implement the what-you-see-is-what-you-get idea have remained the same. Nevertheless, our everyday life is ...
<p>This study develops an analytical method with numerical results for the design of optical slab waveguides communication system applications. An waveguide structure made silicon on dioxide material is designed and analyzed. The effective index mode studied against variations in dimensions. Transmission reflection coefficients are compared to wavelength dimensions waveguide. Variations s...
Neural networks have been one of the main techniques used widely in data mining. There are a number of popular neural network architectures, e.g. multilayer perceptrons, self organising maps, support vector machines. However, most of these techniques have been applied to problems in which the inputs are vectors. In other words, the inputs to these neural network architectures are expressed in t...
Customer service level is of prime importance in today competitive world and has various dimensions with delivery quality being one of the most important ones. Delivery quality has several parameters such as deliver time window options, time window size, etc. In this paper we focus on one of these parameters, namely time window setting. It has a direct impact upon customer satisfaction and busi...
The timing behavior of the EDCA mechanism defined in the IEEE 802.11e standard is analyzed. More specifically, the target of this paper is to evaluate the limitations of the highest priority level of the EDCA mechanism (voice category) when supporting real-time (RT) communication. By RT communication, we mean small-sized packets generated in periodic intervals that must be delivered before the ...
Authentication protocols are known to be error prone. In this paper we identify non-methodical use of decryption as a typical design feature which is found in many published authentication protocols and is responsible for various problems in these protocols. We reason that authentication protocols can be greatly strengthened by the methodical use of decryption.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید