スポンサーリンク
the Faculty of Engineering, Kobe University | 論文
- Magnetic Resonance Thermography Using Water Proton Chemical Shift : Preliminary Results on Self-referenced Technique for Motion Compensation(PROCEEDINGS OF THE SCHOOL OF INFORMATION TECHNOLOGY AND ELECTRONICS OF TOKAI UNIVERSITY)
- Efficient Relative Time-Stamping Scheme Based on the Ternary Link(Information Security)(Information Theory and Its Applications)
- Detection of Surging Sound with Wavelet Transform and Neural Networks
- Message Authentication for Stream(Special Section on Cryptography and Information Security)
- A New Method for Rotation and Brightness Invariant Pattern Recognition Based on Modified Multiple Circular Harmonic Expansions
- Stability Analysis of Multi-span Rotor System and its Application : Part III, Theory of multi-span rotor and its experiment
- Stability analysis of multi span rotor system and its application : part 2,Experiment for rotor system having two bearings and sensitivity analysis
- Stability analysis of multi span rotor system and its application : part l, Theory for rotor system having two bearings
- Voltage Analysis Considering Air-conditioner Load in Practical Power System
- Influence of Cross-Sectional Deformation on Coplanar Waveguide Characteristics for the Use of Optical Modulator (Special Issue on Electromagnetic Theory)
- The Balancing of Flexible Rotors : Theoretical Relation of Each Balancing Method and Accuracies
- A New Digital Watermarking Scheme Applying Locally the Wavelet Transform
- A Code Construction for M-Choose-T Communication over the Multiple-Access Adder Channel
- Equivalent Keys in RC6-32/20/176(Special Section on Information Theory and Its Applications)
- Preciseness of Discrete Time Verification (Special Section on VLSI Design and CAD Algorithms)
- Improvement on the Cheater Identifiable Threshold Scheme(Special Section on Fundamentals of Information and Communications)
- New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function(Special Section on Cryptography and Information Security)