全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Satwant Kaur
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.360-364
摘要:In this, The First Lady of Emerging Technologies coins a new term - "Internet of 3D Printed Products". She is showing us a third kind emerging future she is coining as: "Internet of 3D Printed Products". Internet has given rise to two major changes in our lives. The real life col...
作者:Jai Tripathi , Raj Nagpal , Rakesh Malik
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.365-371
摘要:System-level signal integrity (SI) and power integrity (PI) problems are taken into account. System-level simulation of high-speed systems with effect of external environment is described. SI and PI issues with complete analysis of package, board, termination, squid card, and dec...
作者:Chandan Karfa
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.372-379
摘要:Application of behavioural transformations is a common practice during embedded system (ES) design. These transformations have one or more impact out of three important cost metrics: Area, performance, and power dissipation of the resulting implementation. A survey of the state-o...
作者:Fang Wei , Pan Wubin , Cui Zhiming
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.380-387
摘要:In recent years, cloud computing as a new Internet application pattern is changing the way that people access information and services. And, MapReduce, as a large-scale data processing and distributed computing model, attracts wide attention from academia and industry, and plays ...
作者:Xiaofen Wang , Tang Liu , Guozhen Xiao
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.388-393
摘要:Certificate-based Cryptography (CBC) combines the advantages of ID-based cryptography (implicit certification) and traditional PKI approach (no key escrow). Based on CBC, an anonymous authentication protocol featured with conditional privacy preservation and non-repudiation is pr...
作者:Mrinal Mandal , Gourab Banik , Debasish Chattopadhyay ...
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.395-404
摘要:This paper proposes a high security image encryption technique using logistic map. The proposed image encryption algorithm is described in detail along with its security analysis such as key space analysis, statistical analysis and differential analysis. A comparison in terms of ...
作者:Anusha Sivakumar , Ganesh Sankaran , Krishna Sivalingam
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.405-413
摘要:Passive Optical Networks (PON) have emerged as an important fiber-based access network alternative to DSL, Cable, and other access networks. Some of the limitations of PONs are that it can support only up to 64 subscribers and reach up to 20 km. Dynamic Bandwidth Allocation (DBA)...
作者:Megat Zuhairi , Haseeb Zafar , David Harle
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.414-420
摘要:A mobility model represents nodes distribution and movement over the network. Several research works have shown that a selection of mobility model can affect the outcome of routing performance simulation in Mobile Ad Hoc Networks. Thus, a routing protocol may only be effective in...
作者:Haneol Park , Joongho Song , Wada Hosny
来源:[J].IETE Technical Review(IF 0.705), 2012, Vol.29 (5), pp.421-431
摘要:AC electrified railway systems show power quality problems such as harmonic current pollution, feeder voltage perturbation, and reactive power demand. These power quality problems have a bad effect on the AC railway system itself as well as other electric systems connected togeth...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×