Showing 161 - 180 results of 1,216 for search '(((spinkae OR (lin OR long)) OR (((spingg OR shing) OR like) OR sspinge)) OR (sspink OR pin))', query time: 0.08s Refine Results
  1. 161

    A Novel MIMO antenna integrated with a solar panel and employing AI-equalization for 5G wireless communication networks by Hussein, Humam, Elmunim, Nouf Abd, Atasoy, Ferhat, Virdee, Bal Singh, Elwi, Taha A., Rashid, Nasr, Jayanthi, Renu Karthick Rajaguru, Alibakhshikenari, Mohammad, Limiti, Ernesto

    Published 2024
    “…We demonstrate that the directivity of this antenna array can be precisely electronically reconfigured using PIN diode switches. Additionally, we show the feasibility of integrating solar panels with the proposed MIMO antenna array. …”
    Get full text
    Get full text
    Article
  2. 162

    Design of microstrip ultra wide band antenna with two notch filters for wireless communication by Abdulhasan, Raed Abdulkareem

    Published 2015
    “…In order to add reconfigurable characteristics to the patch antenna, two copper strips are putted on the slots to represent the ON and OFF switching status of an ideal Pin diode. By using this simple switching technique, the current distribution of the patch changes and enables the antenna to have four modes of operation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 163

    Theoretical analysis of photoparametric amplifier by Mohammed Elbireki, Majdi Farag

    Published 2010
    “…The second method is to use Optiwave software in implement is the photo parametric amplifier circuit. Photo diode PIN type has been used to detect any coming signal at the receiver circuit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 164
  5. 165

    Identification of a novel method for differentiating human monocytic cell line into macrophages by Jeddi, Marjan

    Published 2020
    “…This research developed a method for producing macrophage-like cells under conditions that may stimulate in vivo using a monocytic cell (THP-1) and a human liver cell (HUH7). …”
    Get full text
    Thesis
  6. 166
  7. 167
  8. 168

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  9. 169

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  10. 170

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  11. 171

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. …”
    Get full text
    Article
  12. 172

    Persistence and cycles in the US federal funds rate by Caporale, Guglielmo Maria, Gil-Alana, Luis A.

    Published 2012
    “…This paper uses long-range dependence techniques to analyse two important features of the US Federal Funds effective rate, namely its persistence and cyclical behaviour. …”
    Get full text
    Article
  13. 173

    A comprehensive survey on ‘‘various decoupling mechanisms with focus on metamaterial and metasurface principles applicable to SAR and MIMO antenna systems’’ by Alibakhshikenari, Mohammad, Babaeian, Fatemeh, Virdee, Bal Singh, Aïssa, Sonia, Azpilicueta, Leyre, See, Chan, Althuwayb, Ayman Abdulhadi, Huynen, Isabelle, Abd-Alhameed, Raed, Falcone, Francisco, Limiti, Ernesto

    Published 2020
    “…Such techniques include the use of defected ground structure (DGS), parasitic or slot element, dielectric resonator antenna (DRA), complementary split-ring resonators (CSRR), decoupling networks, P.I.N or varactor diodes, electromagnetic bandgap (EBG) structures, etc. …”
    Get full text
    Article
  14. 174

    Investigation of the pH effect in hydrothermal growth of zinc oxide nanostructures by Zulkifli, Nor Ashikin, Hasbullah, Nurul Eddahanie, Ameruddin, Amira Saryati, Awang, Noor Azura, Ahmad, Mohd. Khairul

    Published 2020
    “…Various ZnO structures of neuron-like, flowerlike, and urchin-like morphologies were obtained at alkaline pH (~8.00 to ~9.00) while for pH solution lower than ~8.00, rod-like nanostructures were obtained. …”
    Get full text
    Article
  15. 175

    Sustainable concrete partially comprised of supplementary cementitious material and alternative fine aggregate- a review by Ab Zail, Nurul Fazilah, Adnan, Suraya Hani

    Published 2021
    “…Furthermore, the high consumption of raw materials like sand in the construction sector led to a massive depletion in natural sources to meet the pressure demand in the future. …”
    Get full text
    Conference or Workshop Item
  16. 176
  17. 177

    Empirical analysis of rough set categorical clustering techniques based on rough purity and value set by Uddin, Jamal

    Published 2017
    “…Moreover, the recent rough categorical techniques like MDA, MSA, ITDR and classical clustering technique like simple K-mean are used for comparison and the results are presented in tabular and graphical forms. …”
    Get full text
    Get full text
    Thesis
  18. 178

    Multi-factor Gegenbauer processes and European inflation rates by Caporale, Guglielmo Maria, Gil-Alana, Luis A.

    Published 2009
    “…In this paper we specify a multi-factor long-memory process that enables us to estimate the fractional differencing parameters at each frequency separately, and adopt this framework to model quarterly prices in three European countries (France, Italy and the UK). …”
    Get full text
    Article
  19. 179

    A comparative study of NAK80 steel and beryllium copper moulds for injection moulding of polypropylene material by Abdul Rahman, Aliff, Ahmad, Aznizam

    Published 2024
    “…The experiment involved varying critical processing parameters like melting temperature and injection pressure, and considering design aspects like shrinkage level and weight of the mould part. …”
    Get full text
    Conference or Workshop Item
  20. 180

    Comparison of file sanitization techniques in USB based on average file entropy values by Onn, Nur Amanina

    Published 2018
    “…The fast growth of technology today gives the ability for digital devices like smartphones and laptops to have a huge size of storage which is letting people to keep many of their information like contact lists, photos, videos and even personal information. …”
    Get full text
    Get full text
    Get full text
    Thesis