Results 251 to 260 of about 5,130,317 (287)
Some of the next articles are maybe not open access.

'Patch' improvements to COM model for leaky waves

Proceedings of IEEE Ultrasonics Symposium ULTSYM-94, 1994
Coupling-of-modes (COM) model is known to be very accurate and easy to use for the design of narrow band SAW filters and resonators. The use of the model is so successful that there is a temptation to expand the application of the model to other types of SAW,like leaky SAW, and to use it for the design of relatively wide band devices.
null Plessky, null Chen, null Hartmann
openaire   +1 more source

COM Model Characterization for RF SAW Devices

2010
The coupling-of-modes (COM) model was applied to the analysis of surface acoustic wave (SAW) devices in the 1980's. At that time, the COM parameters were calculated using perturbation techniques or extracted from experimental data. With the improvements in computational resources it became possible to characterize the COM model's parameters using this ...
Ben Abbott   +4 more
openaire   +1 more source

Network model versus COM description of SAW devices

IEEE Symposium on Ultrasonics, 2002
A network model for SAW (surface acoustic wave) structures fabricated along arbitrary, and hence asymmetric, orientations is described. The model includes NSPUDT (natural single-phase unidirectional transducer) directions. From the predictions of this model for SAW gratings, the coupling-of-modes (COM) phenomenological description is evaluated.
E.L. Adler, M.P. da Cunha, O. Schwelb
openaire   +1 more source

Next Generation Internet and P2P E-com Model

2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006
Initiation of Next Generation Internet (NGI) will make e-commerce face a new challenge and open a new way for P2P model of e-commerce. P2P?s Concept, peculiarities, techniques, and P2P e-com models are expounded in this paper. It also explores an application of P2P ecommerce model for P2P model?s perspective.
Fang Zhiyuan, Zheng Ruiqi
openaire   +1 more source

Transduction magnitude and phase for COM modeling of SAW devices

IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, 1992
An analytic formulation for transduction parameter required by the coupling-of-modes analysis of surface acoustic wave (SAW) transducers is derived by comparing solutions obtained using the coupling-of-modes analysis and an equivalent quasi-static analysis using the Green function method.
Abbott, Benjamin P.   +2 more
openaire   +3 more sources

Entity Matching com Large Language Models: estudo comparativo com abordagem de Entity Blocking

Anais do XL Simpósio Brasileiro de Banco de Dados (SBBD 2025)
Entity Matching é fundamental para integrar dados de diferentes fontes que se referem à mesma entidade. Embora modelos Pré-Treinados que adotam técnicas de Entity Blocking sejam amplamente utilizados nessa tarefa, o avanço dos Large Language Models (LLMs) sugere novas possibilidades.
Rodolfo Bolconte Donato   +1 more
openaire   +1 more source

Research on the COM-based reusability of evaluating models

2008 IEEE International Conference on Information Reuse and Integration, 2008
Evaluation on system effectiveness takes a very important role in many applications, such as manufacture of large-scale equipments. As the core of effectiveness evaluation, the evaluating model defines the data abstractions and running rules for evaluation procedures.
null Xujian Zhao   +2 more
openaire   +1 more source

Formalization of Component Object Model (COM) - The COMEL Language

1998
Microsoft’s OLE provides an application integration framework for Microsoft Windows. OLE rests on the Component Object Model (COM), which specifies a programming language independent binary standard for object invocations, plus a number of interfaces for foundational services.
Rosziati Ibrahim, Clemens Szyperski
openaire   +1 more source

Proteção em hardware com Security Protocol and Data Model

Anais Estendidos do XXV Simpósio Brasileiro de Cibersegurança (SBSeg 2025)
Uma ameaça crítica à segurança de sistemas computacionais modernos envolve ataques em nível de hardware, como a manipulação de firmware. Esses ataques são particularmente perigosos pois permitem acesso não autorizado a dados no nível do barramento, dificultando a detecção de eavesdropping ou adulteração de dados.
Gustavo C. Bastos   +2 more
openaire   +1 more source

Behavioural factors that drive stacking with traditional cooking fuels using the COM-B model

Nature Energy, 2022
Tash Perros   +2 more
exaly  

Home - About - Disclaimer - Privacy