Results 251 to 260 of about 5,130,317 (287)
Some of the next articles are maybe not open access.
'Patch' improvements to COM model for leaky waves
Proceedings of IEEE Ultrasonics Symposium ULTSYM-94, 1994Coupling-of-modes (COM) model is known to be very accurate and easy to use for the design of narrow band SAW filters and resonators. The use of the model is so successful that there is a temptation to expand the application of the model to other types of SAW,like leaky SAW, and to use it for the design of relatively wide band devices.
null Plessky, null Chen, null Hartmann
openaire +1 more source
COM Model Characterization for RF SAW Devices
2010The coupling-of-modes (COM) model was applied to the analysis of surface acoustic wave (SAW) devices in the 1980's. At that time, the COM parameters were calculated using perturbation techniques or extracted from experimental data. With the improvements in computational resources it became possible to characterize the COM model's parameters using this ...
Ben Abbott +4 more
openaire +1 more source
Network model versus COM description of SAW devices
IEEE Symposium on Ultrasonics, 2002A network model for SAW (surface acoustic wave) structures fabricated along arbitrary, and hence asymmetric, orientations is described. The model includes NSPUDT (natural single-phase unidirectional transducer) directions. From the predictions of this model for SAW gratings, the coupling-of-modes (COM) phenomenological description is evaluated.
E.L. Adler, M.P. da Cunha, O. Schwelb
openaire +1 more source
Next Generation Internet and P2P E-com Model
2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006Initiation of Next Generation Internet (NGI) will make e-commerce face a new challenge and open a new way for P2P model of e-commerce. P2P?s Concept, peculiarities, techniques, and P2P e-com models are expounded in this paper. It also explores an application of P2P ecommerce model for P2P model?s perspective.
Fang Zhiyuan, Zheng Ruiqi
openaire +1 more source
Transduction magnitude and phase for COM modeling of SAW devices
IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, 1992An analytic formulation for transduction parameter required by the coupling-of-modes analysis of surface acoustic wave (SAW) transducers is derived by comparing solutions obtained using the coupling-of-modes analysis and an equivalent quasi-static analysis using the Green function method.
Abbott, Benjamin P. +2 more
openaire +3 more sources
Entity Matching com Large Language Models: estudo comparativo com abordagem de Entity Blocking
Anais do XL Simpósio Brasileiro de Banco de Dados (SBBD 2025)Entity Matching é fundamental para integrar dados de diferentes fontes que se referem à mesma entidade. Embora modelos Pré-Treinados que adotam técnicas de Entity Blocking sejam amplamente utilizados nessa tarefa, o avanço dos Large Language Models (LLMs) sugere novas possibilidades.
Rodolfo Bolconte Donato +1 more
openaire +1 more source
Research on the COM-based reusability of evaluating models
2008 IEEE International Conference on Information Reuse and Integration, 2008Evaluation on system effectiveness takes a very important role in many applications, such as manufacture of large-scale equipments. As the core of effectiveness evaluation, the evaluating model defines the data abstractions and running rules for evaluation procedures.
null Xujian Zhao +2 more
openaire +1 more source
Formalization of Component Object Model (COM) - The COMEL Language
1998Microsoft’s OLE provides an application integration framework for Microsoft Windows. OLE rests on the Component Object Model (COM), which specifies a programming language independent binary standard for object invocations, plus a number of interfaces for foundational services.
Rosziati Ibrahim, Clemens Szyperski
openaire +1 more source
Proteção em hardware com Security Protocol and Data Model
Anais Estendidos do XXV Simpósio Brasileiro de Cibersegurança (SBSeg 2025)Uma ameaça crítica à segurança de sistemas computacionais modernos envolve ataques em nível de hardware, como a manipulação de firmware. Esses ataques são particularmente perigosos pois permitem acesso não autorizado a dados no nível do barramento, dificultando a detecção de eavesdropping ou adulteração de dados.
Gustavo C. Bastos +2 more
openaire +1 more source
Behavioural factors that drive stacking with traditional cooking fuels using the COM-B model
Nature Energy, 2022Tash Perros +2 more
exaly

