نتایج جستجو برای: stub node

تعداد نتایج: 171683  

2012
J. F. Mao

In this paper, a compact notched ultra-wideband (UWB) bandpass filter with improved out-of-band performance using quasi electromagnetic bandgap (EBG) structure is proposed. Firstly, a UWB bandpass filter based on a stepped-impedance stub-loaded resonator (SISLR) is combined with quasi-EBG structures, which suppress the undesired spurious bands to improve the out-of-band performance. In order to...

Journal: :Progress In Electromagnetics Research C 2011

Journal: :journal of advances in computer engineering and technology 0
mehran pourmohammad abdollahi university of tabriz javad musevi niya university of tabriz payman mahmoudi biroun university of tabriz

designing wireless sensor networks should meet appropriate parameters such as quality of service (qos) defined by different users. the variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence qos parameters such as throughput, delay, reliability and network lifetime. the ...

Journal: :Sustainability 2023

A detailed nonlinear finite element model was established based on completed experiments to investigate the behavior of a blind-bolted T-stub composite joint that connects beam concrete-filled square tube column. This accomplished by comparing experimental results and simulation using hysteresis curve, failure mode, plastic deformation strain development ensure reliability accuracy model. param...

2012
Zhi Yang Yu Kong Yun Fu

An object can be effectively characterized by its contour. Caselles et al. [1] introduced the concept of geodesic active contours, which applies the energy reducing form to acquire contours. Shape priors are great helpful to obtaining more accurate contours. Leventon [6] utilized the curvature prior as the shape prior for different classes of objects to guide contour evolution. Etyngier et al. ...

2003
Stanley Gunawan

3 Availability techniques 3 3.1 Detection approaches . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.1 Distributed and Cooperative Intrusion Detection . . . 3 3.1.2 Watchdog and Pathrater . . . . . . . . . . . . . . . . . 4 3.1.3 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) . . . . . . . . . . . . . . . . 5 3.1.4 CORE (Collaborative Reputation) . . . . . . . . . . ....

Journal: :Journal of Structural and Construction Engineering (Transactions of AIJ) 1995

Journal: :IEEE Communications Letters 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید