Showing 141 - 160 results of 388 for search 'computing reader', query time: 0.07s Refine Results
  1. 141

    Joint Active and Passive Beamforming for IRS-Assisted Monostatic Backscatter Systems: An Unsupervised Learning Approach by Sahar Idrees, Salman Durrani, Zhiwei Xu, Xiaolun Jia, Xiangyun Zhou

    Published 2024-01-01
    “…We propose a deep residual neural network (DRCNN) BackIRS-Net that exploits the unique coupling between the IRS phase shifts and the beamforming at the reader, to jointly optimize these quantities in order to maximize the effective signal to noise ratio (SNR) of the backscatter signal received at the reader. …”
    Get full text
    Article
  2. 142
  3. 143
  4. 144
  5. 145
  6. 146

    Cloud-based radio frequency identification authentication protocol with location privacy protection by Qingkuan Dong, Mengmeng Chen, Lulu Li, Kai Fan

    Published 2018-01-01
    “…It considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. …”
    Get full text
    Article
  7. 147
  8. 148

    Calculation of Expansibility Factor of Gas at Its Flow Through an Orifice Plate with Flange Pressure Tappings by Yevhen Pistun, Leonid Lesovoy

    Published 2016-12-01
    “…The equation in ISO 5167:2-2003 for computing the gas expansibility factor is developed for all three types of pressure tappings arrangement. …”
    Get full text
    Article
  9. 149

    Smart Attendance System for University Students Based on QR Code by ABU SNEINEH Anees, SALAH Wael A.

    Published 2025-05-01
    “…The PIC microcontroller and the QR reader are connected to the computer through Universal Serial Bus (USB). …”
    Get full text
    Article
  10. 150
  11. 151

    Study QoS Optimization and Energy Saving Techniques in Cloud, Fog, Edge, and IoT by Zhiguo Qu, Yilin Wang, Le Sun, Dandan Peng, Zheng Li

    Published 2020-01-01
    “…This survey aims to help readers have a deeper understanding on the concepts of different computing models and study the techniques of QoS optimization and energy saving in these models.…”
    Get full text
    Article
  12. 152

    CATPE protocol with capture effect for RFID tag anti-collision by Xi YANG, Hai-feng WU, Yu ZENG

    Published 2014-07-01
    “…In a passive RFID system, when multiple tags backscatter their signals to a reader simultaneously,capture ef-fect will make the reader successfully receive one of the tag signals.To enhance the identification efficiency with capture effect,a capture-aware and tag-population-estimation protocol (CATPE) for RFID tag anti-collision is proposed. …”
    Get full text
    Article
  13. 153

    An radio-frequency identification security authentication mechanism for Internet of things applications by Zhen-Yu Wu

    Published 2019-07-01
    “…Consequently, the analysis of computational complexity demonstrated that our scheme can handle the mass data from the reader, thereby achieving system extensibility.…”
    Get full text
    Article
  14. 154

    Shor's Factoring Algorithm and Modular Exponentiation Operators by Robert L. Singleton Jr

    Published 2023-09-01
    “…We assume no prior knowledge of Shor's algorithm beyond a basic familiarity with the circuit model of quantum computing. Shor's algorithm contains a number of moving parts, and can be rather daunting at first. …”
    Get full text
    Article
  15. 155
  16. 156
  17. 157
  18. 158

    Minimal and Simplified Analysis of Hierarchical Density-Based Spatial Clustering by Kayumov Abduaziz, Shukurillo Makhammadjonov, Ji Sun Shin

    Published 2025-01-01
    “…Specifically, we guide the reader through the example by illustrating the steps of density estimation, minimum spanning tree computation, hierarchy construction, and extraction of flat clustering results. …”
    Get full text
    Article
  19. 159

    ACADEMIC TEXTBOOKS AS A MEDIUM FOR STUDENTS’ INTELLECT DEVELOPMENT IN TEACHING MATHEMATICS by Emanuila G. Gelfman, Marina A. Kholodnaya

    Published 2015-03-01
    “…In the context of the reader-oriented theory, the author proves the advantages of special developmental materials complying with the enrichment model.Research results describe mathematical textbooks and learning materials development for secondary schools including students’ books, practicum and workbooks for independent study, and computer software for the 5 to 9th –year students. …”
    Get full text
    Article
  20. 160

    The Convergence of the Codex Book and the e-Book by Robert K. Logan

    Published 2009-08-01
    “…Because the “smart tag” directs the reader to a Web site with the digital text and room for comments by readers and updates by the author, the sBook is searchable, networkable and updatable. …”
    Get full text
    Article