security patterns and a weighting scheme for mobile agents

Novel design of a compacted micro-structured air-breathing PEM fuel cell as a power source for mobile phones

Novel design of a compacted micro-structured air-breathing PEM fuel cell as a power source for mobile phones

... > phase m & and condensation )0( < phase m & is assumed. Where phase m & is mass transfer: for evaporation ( evapphase mm && = ) and for condensation ( condphase mm && = ) ... Computational mesh of the planar compacted -design micro-structured air-breathing PEM fuel cell (quadratic) The values of the electrochemical transport para...
Ngày tải lên : 05/09/2013, 14:58
  • 18
  • 549
  • 0
Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property doc

Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property doc

... Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property Table of Contents Preface v Chapter I Digital Watermarking for Protection of Intellectual Property 1 Mohamed ... background and history of digital watermarking. The chapter gave an extensive and deep literature review of the field of digital D...
Ngày tải lên : 07/03/2014, 11:20
  • 268
  • 467
  • 0
USAID Supported a Wide Range of Child and Maternal Health Activities, but Lacked Detailed Spending Data and a Proven Method for Sharing Best Practices pptx

USAID Supported a Wide Range of Child and Maternal Health Activities, but Lacked Detailed Spending Data and a Proven Method for Sharing Best Practices pptx

... for disseminating innovations and best practices. As a result, USAID health officers may not learn of new innovations and advances in the maternal and child health fields in a consistent and ... dissemination of information to USAID mission health officers about innovations and best practices in child survival and maternal health in a timel...
Ngày tải lên : 28/03/2014, 09:20
  • 64
  • 379
  • 0
RBF Neurals Networks and a new algorithm for training RBF networks

RBF Neurals Networks and a new algorithm for training RBF networks

... Bromhead and D. Lowe, “Multivariable functional interpolation and adaptive networks , Complex Systems, vol. 2, 1988, pp 321-355. 6. J.Park and I.W. Sandberg. “Approximation and radial-basis-function ... the total squared error E the smallest. 3.3 Algorithm for training Interpolation RBF Networks: HDH and QHDH a) Two-phase Algorithm for training HDH We denote inden...
Ngày tải lên : 12/04/2014, 15:40
  • 22
  • 270
  • 0
Báo cáo hóa học: " An efficient and secure anonymous authentication scheme for mobile satellite communication systems" doc

Báo cáo hóa học: " An efficient and secure anonymous authentication scheme for mobile satellite communication systems" doc

... (2000) 14. MS Hwang, CC Yang, CY Shiu, An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper Syst Rev. 145(2-3), 42–47 (2003) 15. YF Chang, CC Chang, An efficient authentication ... Communications and Networking 2011, 2011:86 http://jwcn.eurasipjournals.com/content/2011/1/86 Page 10 of 10 RESEARCH Open Access An efficient and secure...
Ngày tải lên : 21/06/2014, 00:20
  • 10
  • 285
  • 0
Báo cáo hóa học: " Research Article AWPP: A New Scheme for Wireless Access Control Proportional to Traffic Priority and Rate" pdf

Báo cáo hóa học: " Research Article AWPP: A New Scheme for Wireless Access Control Proportional to Traffic Priority and Rate" pdf

... 2011, Article ID 925165, 11 pages doi:10.1155/2011/925165 Research Article AWPP: A New Scheme for Wireless Access Control Proportional to Traffic Priority and Rate Thomas Lagkas 1 and Periklis Chatzimisios 2 1 Department ... Communications and Networking 7 Since POLL packet total size is equal to 272 bits, DATA packet total size is equal to 10192 bits, S...
Ngày tải lên : 21/06/2014, 05:20
  • 11
  • 516
  • 0
Báo cáo hóa học: " Research Article A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data" doc

Báo cáo hóa học: " Research Article A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data" doc

... considerations. Notice also that these numbers are very close to the numbers that are asymptotically attained and have a simple formal expression. 6.AVariantoftheVerificationScheme Based on Balancing For ... Thus, we assume that A t,1 and A t,2 are inde- pendent random variables that contain information about the number of repeats of the tth motif in the maternal and the paternal all...
Ngày tải lên : 21/06/2014, 11:20
  • 11
  • 334
  • 0
báo cáo hóa học:" Research Article Rate Distortion Analysis and Bit Allocation Scheme for Wavelet Lifting-Based Multiview Image Coding" potx

báo cáo hóa học:" Research Article Rate Distortion Analysis and Bit Allocation Scheme for Wavelet Lifting-Based Multiview Image Coding" potx

... 2009, Article ID 394065, 13 pages doi:10.1155/2009/394065 Research Article Rate Distortion Analysis and Bit Allocation Scheme for Wavelet Lifting-Based Multiview Image Coding Pongsak Lasang 1 and ... use in the bit allocation and to code multiview images. In this paper, we derive the distortion and present the model-based bit allocation scheme...
Ngày tải lên : 21/06/2014, 20:20
  • 13
  • 219
  • 0
Báo cáo hóa học: "A CLASSIFICATION SCHEME FOR NONOSCILLATORY SOLUTIONS OF A HIGHER ORDER NEUTRAL DIFFERENCE EQUATION" ppt

Báo cáo hóa học: "A CLASSIFICATION SCHEME FOR NONOSCILLATORY SOLUTIONS OF A HIGHER ORDER NEUTRAL DIFFERENCE EQUATION" ppt

... Cheng, and G. Zhang, A classification scheme for nonoscillatory solutions of a higher order neutral nonlinear difference equation, Journal of the Australian Mathematical Society. Series A 67 (1999), ... Cheng, Partial Difference Equations, Taylor & Francis, London, 2003. [4] S. S. Cheng, G. Zhang, and W T. Li, On a higher order neutral difference equation, Math...
Ngày tải lên : 22/06/2014, 22:20
  • 19
  • 290
  • 0
Báo cáo hóa học: " Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis" pot

Báo cáo hóa học: " Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis" pot

... 2005 Deepti Joshi et al. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis Deepti Joshi Department of Electrical and Computer Engineering, ... services, poli- cies for the network and predistribution of keys to all the par- ticipants. The nodes in an ad hoc network are assumed to be energy-constrained...
Ngày tải lên : 23/06/2014, 00:20
  • 11
  • 298
  • 0
Báo cáo hóa học: " Flat Zone Analysis and a Sharpening Operation for Gradual Transition Detection on Video Images" pdf

Báo cáo hóa học: " Flat Zone Analysis and a Sharpening Operation for Gradual Transition Detection on Video Images" pdf

... 2004 Hindawi Publishing Corporation Flat Zone Analysis and a Sharpening Operation for Gradual Transition Detection on Video Images Silvio J. F. Guimar ˜ aes Laboratoire Algorithmique et Architecture ... Quebec, Canada, August 2002. [14] S. J. F. Guimar ˜ aes,M.Couprie,N.J.Leite,andA.deA.Ara ´ ujo, Video transition sharpening based on flat zone analysis, ” i...
Ngày tải lên : 23/06/2014, 01:20
  • 11
  • 222
  • 0
Báo cáo y học: "Protein C: a potential biomarker in severe sepsis and a possible tool for monitoring treatment with drotrecogin alfa (activated)" pptx

Báo cáo y học: "Protein C: a potential biomarker in severe sepsis and a possible tool for monitoring treatment with drotrecogin alfa (activated)" pptx

... legal representatives. Biomarker evaluations In the PROWESS trial, plasma samples were obtained at baseline (day of randomization) and daily through to study day 7. A central laboratory (Covance ... Central Laboratory Services, Indianapolis, IN, USA) performed all assays. The PC activity assay was performed on a STA đ coagulation analyzer using the STA đ -Staclot đ Protein C kit...
Ngày tải lên : 13/08/2014, 08:21
  • 11
  • 343
  • 0
a novel scheme for human-friendly and time-delays robust neuropredictive teleoperation

a novel scheme for human-friendly and time-delays robust neuropredictive teleoperation

... time index as the local master variables. This way the “feel” of teleoperation is natural and human-friendly, since the variables are simultaneous, and also not altered by the algorithm, as in existing ... rehabilitation and secure a greater and sooner impact on the life of many impaired persons. However, an important drawback for such applications lays in that, although curren...
optimization of protein and rna detection methodologies and a new approach for manipulating protein activity in living cells

optimization of protein and rna detection methodologies and a new approach for manipulating protein activity in living cells

... OF CALIFORNIA, SAN DIEGO Optimization of protein and RNA detection methodologies and a new approach for manipulating protein activity in living cells A dissertation submitted in partial ... xiii ABSTRACT OF THE DISSERATION Optimization of protein and RNA detection methodologies and a new approach for manipulating...
Ngày tải lên : 13/11/2014, 10:46
  • 144
  • 306
  • 0
Từ khóa: