Showing 61 - 80 results of 11,699 for search '(((link OR (ming OR aina)) OR (spike OR shing)) OR (((pick OR spink) OR (pine OR five)) OR pin))', query time: 0.12s Refine Results
  1. 61
  2. 62
  3. 63

    Performance evaluation of Free-Space-Optic (FSO) links by Alma, Husagic, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2011
    “…Knowing the losses or attenuation within the channel it is then possible to evaluate received power level and link margin, the main figures needed in order to evaluate the performance ofFSO links…”
    Get full text
    Book Chapter
  4. 64
  5. 65
  6. 66

    Performance metrics for the prediction of link and path availability in VANETs by Muhammed Yusof, Zulkefli, Flint, James A.

    Published 2009
    “…The method described makes use of the concept of link availability estimates which are produced on an individual link basis and which may be combined by multiplication to produce a quality metric for the whole route. …”
    Get full text
    Proceeding Paper
  7. 67

    Reward management: linking employee motivation and organizational performance by Antoni, Conny H., Baeten, Xavier, Perkins, Stephen J., Shaw, Jason D., Vartiainen, Matti

    Published 2017
    “…They also illustrate the need to understand the underlying mediating and moderating mechanisms linking reward systems and practices to individual, team, and organizational behavior and outcomes. …”
    Get full text
    Article
  8. 68

    An improved functional link neural network for data classification by Iqbal, Umer

    Published 2018
    “…Accordingly, two alternative models namely; Genocchi Functional Link Neural Network (GFLNN) and Chebyshev Wavelets Functional Link Neural Network (CWFLNN) are proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 69
  10. 70
  11. 71

    Achieving security for images by LSB and MD5 by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, O. Alhussainan, Sondos

    Published 2012
    “…This method creates a random dispersion of bits of the message in the picture, and it would be difficult to extract the message without the password key .After creation of the hidden message, the image will pass it in hash function to obtain hashing value using the MD5 technique. This value will be fixed as long as there has been no change to the picture. …”
    Get full text
    Article
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80