Search

Your search keyword '"Bing Yao"' showing total 147 results

Search Constraints

Start Over You searched for: Author "Bing Yao" Remove constraint Author: "Bing Yao" Publisher ieee Remove constraint Publisher: ieee
147 results on '"Bing Yao"'

Search Results

1. The Electromagnetic-Fluid-Temperature Field Analysis of Loss and Heat of Self-Cooling Separate-Phase Enclosed Bus of Large Generator

2. 3D Transient Electromagnetic-Temperature Field Analysis of the Loss and Heat of the Damper Bars of a Large Tubular Hydro-Generator During Short Circuit Faults

3. Analysis and Treatment of an Overheated Ablated Fault on the Pole Shoe Surface of a Large Tubular Hydro-Generator

4. Effect of Damper Winding and Stator Slot Skewing Structure on No-Load Voltage Waveform Distortion and Damper Bar Heat in Large Tubular Hydro Generator

5. Constrained Markov Decision Process Modeling for Sequential Optimization of Additive Manufacturing Build Quality

8. The Electromagnetic-Fluid-Temperature Field Analysis of Loss and Heat of Self-Cooling Separate-Phase Enclosed Bus of Large Generator

10. Graph Operations For Graphic Lattices and Graph Homomorphisms In Topological Cryptosystem

11. Degree-sequence Homomorphisms For Homomorphic Encryption Of Information

12. Integer-Decomposing Topological Authentication Problem For Post-Quantum Cryptosystem

13. Number-Based Strings/Passwords From Imaginary Graphs Of Topological Coding For Encryption

14. Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography

15. Number-Based Strings And Degree-sequences Of Topological Cryptography

16. New Encryption Techniques From Lattice Thought In Topological Cryptography

17. Optimal Design And Randomly Topological Coloring Of Dynamic Networks

18. Coding Techniques From Distinguishing Colorings In Topological Coding

19. Image-Type Labellings/Colorings In Graph Homomorphisms And Graphic Lattices

20. Sequence-type Colorings of Topological Coding Towards Information Security

21. A Reactive Power Coordination Control Scheme for Hybrid Multi-Infeed HVDC System

22. On Modular-$2q$ Graphic Groups Of Topological Coding For Graphic Passwords

23. Various Matchings of Graphic Groups For Graphic Lattices In Topological Coding

24. Topological Public-Key Cryptography Based On Graph Image-Labellings For Information Security

25. Graph Colorings Based On $n$-Dimension Digital-based Strings For Information Security

26. A New Password Authentication Based On The Dual Model Of Apollonian Network Model

27. Graphic Lattices for Constructing High-Quality Networks

28. Dynamic Network Models Made By Multiple Probabilistic Mechanism

29. The Construction of Odd-elegant Ring-based SDH Optical Networks

30. An Equivalent of Graceful Tree Conjecture

31. Graphic Groups Towards Cryptographic Systems Resisting Classical and Quantum Computers

32. Especial Total Colorings Towards Multiple Authentications In Network Encryption

33. On Real-Valued Total Colorings Towards Topological Authentication In Topological Coding

34. Matrices From Topological Graphic Coding of Network Security

35. A High-gain High-precision Dynamic Comparator with Dynamic Cascading Technique

36. Hanzi-TB-paws For Helping Chinese People To Memorize Their Passwords With Longer Bytes

37. Graphic Codes Made By Two Kinds Of Sun-graphs On Odd-elegant Labelling

38. Constrained Markov Decision Process Modeling for Sequential Optimization of Additive Manufacturing Build Quality

39. Self-similar Hanzi-networks Towards Cryptography

40. Topological Graphic Passwords Made By Series Sun-graphs On Odd-graceful Property

41. Topological Graphic Passwords Made By Two Sun-graphs On Odd-graceful Labelling

42. Construction Of Topological Graphic Passwords By Hanzi-gpws

43. On Topological Graphic Passwords Made By Hanzi-graphs

44. Mathematical Problems From Topological Graphic Passwords of Cryptography

45. New Techniques For Topological Graphic Passwords Made By Chinese Characters

46. On Space Of Topological Graphic Passwords Based On Chinese Characters

47. Connection Between Text-based Passwords and Topological Graphic Passwords

48. The Odd-Gracefulness for Ring-Based SDH Optical Networks

49. Algebraic Groups for Construction of Topological Graphic Passwords in Cryptography

50. The Gracefulness of Super Sun-Graphs

Catalog

Books, media, physical & digital resources