Ara
Toplam kayıt 77, listelenen: 31-40
Characterization of Bulgarian oil shale kerogen revealed by oxidative degradation
(Elsevier GMBH, Urban & Fischer Verlag, 2009)
A 13-step alkaline permanganate degradation of Bulgarian oil shale kerogen concentrate at ambient temperature was carried out. A high yield of oxidation products (90.1%) and a low yield of gaseous products (2.79%) were ...
NFC Research framework: A literature review and future research directions
(Int Business Information Management Assoc-IBIMA, 2010)
Near Field Communication (NFC) is one of the emerging and promising technological developments, provides means to short range contactless communication for mobile phones and other devices alike. NFC has become an attractive ...
Generating multi-photon W-like states for perfect quantum teleportation and superdense coding
(Springer New York LLC, 2016-05-06)
An interesting aspect of multipartite entanglement is that for perfect teleportation and superdense coding, not the maximally entangled W states but a special class of non-maximally entangled W-like states are required. ...
A novel method to design wideband power amplifier for wireless communication
(IEEE, 2013)
A new approach is presented to design microwave amplifiers to deliver maximum output power using Simplified Real Frequency Technique (SRFT). Proposed method tracks the maximum stable gain (MSG) curve of the active device ...
Design of a key exchange protocol between SIM card and service provider
(Institute of Electrical and Electronics Engineers Inc., 2015-11-05)
Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider ...
SIMSec: A key exchange protocol between SIM card and service provider
(Springer New York LLC, 2016-08-01)
Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure ...
Energy load balancing for fixed clustering in wireless sensor networks
(IEEE, 2012-05-07)
Clustering can be used as an effective technique to achieve both energy load balancing and an extended lifetime for a wireless sensor network (WSN). This paper presents a novel approach that first creates energy balanced ...
Freezing optical rogue waves by Zeno dynamics
(Elsevier Science BV, 2018-04-15)
We investigate the Zeno dynamics of the optical rogue waves. Considering their usage in modeling rogue wave dynamics, we analyze the Zeno dynamics of the Akhmediev breathers, Peregrine and Akhmediev-Peregrine soliton ...
Algorithmic modifications to SPIHT
(IEEE, 2001)
This paper proposes several low complexity algorithmic modifications to the SPIHT (Set Partitioning in Hierarchical Trees) image coding method of [3] The modifications exploit universal traits common to the real world ...
Incremental reasoning on monadic second-order logics with logic programming
(Elsevier Science Inc, 2016-02)
Data streams occur widely in various real world applications. The research on streaming data mainly focuses on the data management, query evaluation and optimization on data, but the work on incremental reasoning procedures ...