𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Key technologies of new malicious code developments and defensive measures in communication networks

✍ Scribed by Peng LI; Ru-chuan WANG; Wei ZHANG


Book ID
108484829
Publisher
Chinese Electronic Periodical Services
Year
2010
Tongue
English
Weight
147 KB
Volume
17
Category
Article
ISSN
1005-8885

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


The key technology of offshore wind farm
✍ Wang Zhixin; Jiang Chuanwen; Ai Qian; Wang Chengmin πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 143 KB

The paper reviews characteristics and the developing state of abroad offshore wind farm briefly, and the key technology related to offshore wind farm. The optimization configuration and assessment of abroad offshore wind farm, and rational distribution assess, offshore wind farm electric transmissio

[Signals and Communication Technology] D
✍ Lindberg, Peter πŸ“‚ Article πŸ“… 2008 πŸ› Springer Netherlands 🌐 English βš– 991 KB

Design of Ultra Wideband Antenna Matching Networks: via Simplified Real Frequency Technique (SRFT) will open up a new horizon for design engineers, researchers, undergraduate and graduate students to construct multi-band and ultra wideband antenna matching networks for antennas which in turn will pu