نتایج جستجو برای: کنترل trms

تعداد نتایج: 86259  

Journal: :Applied sciences 2021

This paper discusses how to optimize the weighting of individual subarrays derive low sidelobe level (SLL) based on quadratic programming (QP) and QP parameters ensure that objective function is composed form, with actual number identical standard QP. Next, in order analyze SLL, a 24 × phased array antenna was compared 96 transmit–receive modules (TRMs) attached only subarray stage 576 TRMs all...

Journal: :International Journal of Electronics and Electical Engineering 2014

2005
Lih-Chung Wang Yuh-Hua Hu Feipei Lai Chun-yen Chou Bo-Yin Yang

Digital signature schemes are crucial for applications in electronic commerce. The effectiveness and security of a digital signature scheme rely on its underlying public key cryptosystem. Trapdoor functions are central to public key cryptosystems. However, the modular exponentiation for RSA or the discrete logarithms for ElGamal/DSA/ECC, as the choice of the trapdoor functions, are relatively s...

Journal: :Materials and Structures 2021

Abstract This paper presents a multi-level experimental and analytical investigation on the mechanical performance of TRM composites used for strengthening existing masonry structures. Micro (fabric-to-mortar bond), meso (TRM-to-substrate macro (TRM tensile response in-plane out-of-plane ressponse TRM-strengthened masonry) TRMs are combined investigated in-depth this reason. These results help ...

Journal: : 2022

هدف: پژوهش حاضر با هدف بررسی مقایسه اثربخشی گروه درمانی شناختی – رفتاری و ذهن ­آگاهی مبتنی بر شناخت کاهش رفتارهای پرخطر در معتادان ترک افیونی صورت گرفت. روش: روش این شبه آزمایشی طرح پیش آزمون پس همراه کنترل است. جامعه­ی آماری شامل کلیه افراد وابسته به مواد مراجعه کننده مرکز اعتیاد شبکه بهداشت درمان شهرستان سرپل ذهاب نیمه اول سال 1396 بود، نمونه­ گیری دسترس تعداد 36 نفر تشخیص وابستگی اساس معیاره...

Journal: :Security and Communication Networks 2013
Osman Khalid Samee Ullah Khan Sajjad Ahmad Madani Khizar Hayat Majid Iqbal Khan Nasro Min-Allah Joanna Kolodziej Lizhe Wang Sherali Zeadally Dan Chen

Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید