Showing 2,501 - 2,506 results of 2,506 for search '(((pinnau OR (shinae OR shinde)) OR spie) OR ((kind OR ching) OR (ming OR min)))', query time: 0.17s Refine Results
  1. 2501

    Harmonized co-existence with robust interference management in femto-macro cellular architectures by Ponnu Jacob

    Published 2015
    “…The HetNets that incorporate different kinds of small cells such as micro, pico, femto, metro cells, relays, and others, all integrated with Wi-Fi, are instrumental in meeting this anticipated performance enhancements. …”
    Get full text
    Thesis
  2. 2502

    Reverse mathematics in lattice theory by Ru, Junren

    Published 2018
    “…In Chapter 2, we first introduce three kinds of ideals in lattices: prime ideals, maximal ideals, relatively maximal ideals, respectively, and then we will investigate the logical strength of the existence of these ideals. …”
    Get full text
    Thesis
  3. 2503

    Tsewang Norbu NGB by Cantwell, C, Mayer, R

    Published 2025
    “…</p> <p>Along with the colophon(s), there may also be formulae for sealing the text, or various kinds of good wishes and aspirations expressed at the end. …”
    Dataset
  4. 2504

    Advanced data analytics for future smart grid stability assessment by Ren, Chao

    Published 2022
    “…Specific objectives of this Ph.D. research are to develop an intelligent system for the future smart grid. Based on several kinds of promising advanced data-analytics technologies, including randomized learning, incremental broad learning (BL), transfer learning (TL), adversarial machine learning (ML), and generative adversarial network (GAN), etc, an intelligent system will be developed to interpret the power grid stability characteristics, and to support stability-constrained operation control actions. …”
    Get full text
    Thesis-Doctor of Philosophy
  5. 2505

    Physical unclonable function based solutions to unification of user, device and data authentication by Zheng, Yue

    Published 2020
    “…These solutions are typically realized using conventional techniques that require the safekeeping of a secret binary key in the non-volatile memory, or battery-backed SRAM of some device, or a token owned by the user, which have been proven to be vulnerable to various kinds of invasive, semi-invasive and side channel attacks. …”
    Get full text
    Thesis-Doctor of Philosophy
  6. 2506

    Towards robust sensing and recognition : from statistical learning to transfer learning by Yang, Jianfei

    Published 2020
    “…In visual sensing, images are captured by kinds of cameras with different brands and parameters, which hinders the performance of visual recognition models even more severely. …”
    Get full text
    Thesis-Doctor of Philosophy