نتایج جستجو برای: stub node
تعداد نتایج: 171683 فیلتر نتایج به سال:
Implementation and investigation of circular slot UWB antenna with dual-band-notched characteristics
The design and analysis of an ultra wideband aperture antenna with dual-band-notched characteristics are presented. The proposed antenna consists of a circular ring exciting stub on the front side and a circular slot on the back ground plane. By utilizing a parasitic strip and a T-shaped stub on the antenna structure, two notched bands of 850 MHz (3.5-4.35 GHz) and 900 MHz (5.05-5.95 GHz) are a...
A compact printed wide-slot (PWS) antenna is proposed for UWB applications. The proposed UWB-PWS antenna basically consists of a stepped microstrip feed-line with a rectangular patch stub and a rectangular wide-slot element at the aperture. Additional parasitic split-ring elements are placed along the patch stub to achieve notch-band characteristics. As the proposed antenna in absence of the ri...
We redefine an address, which is location information within the Internet, as a locator, and propose a HANA protocol, which hierarchically and automatically allocates and assigns locators to network equipments. From the Internet core to stub networks, HANA can reduce manual configurations of network equipments related to locators as possible, and then can reduce network management costs. Even i...
Formal verification has been successfully applied to provide strong correctness guarantees of software systems, but its application to large code bases remains an open challenge. The technique of component-based software development, traditionally employed for engineering benefit, also aids reasoning about such systems. While there exist compositional verification techniques that leverage the s...
Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security arc...
Dr Jeffrey Wigand is delivering an anti-smoking message to children and young people. He talked to Ben Jones about his work.
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of packets between domains. In this paper, we focus on the needs of stub ISPs that compose 80% of the global Internet. We first describe the typical traffic pattern of such a stub ISP. Then we briefly describe the methods tha...
Differentiated Services (DiffServ) are seen as the technology to support Quality of Service (QoS) in IP networks in a scalable manner by allowing traffic aggregation within the engineered traffic classes. In DiffServ domains, admission control additionally needs to be employed in order to control the amount of traffic into the engineered traffic classes so as to prevent overloads that can lead ...
In this paper, various topologies of feeding structures are comparatively evaluated for 60 GHz three dimensional (3D) integrated cavity resonators used in 3D integrated RF modules. Three excitation techniques (slot excitation with a shorting via, slot excitation with a λg/4 open stub, probe excitation) have been evaluated using simulated and measured data. The probe excitation is demonstrated a...
The frozen code compression technique divides the unexecuted kernel code into single-entry partitions that are stored in compressed form, and replaced by stubs in the code. When control flow enters a stub, a special routine is invoked that allocates space and expands the corresponding code fragment, after which the stub is overwritten with a direct jump to the decompressed code. Once decompress...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید