Search

Results 11-20 of 1939 (Search time: 0.007 seconds).

Cyber-attack vulnerability analysis of communication based train control

  • Park, In-Hee
  • 2018
  • Park, In-Hee. (2018). Cyber-attack vulnerability analysis of communication based train control. doi: 10.22677/thesis.200000005296
  • DGIST
  • View : 676
  • Download : 225

Bandit Parameter Estimation

  • Cha, Sungmin
  • 2018
  • Cha, Sungmin. (2018). Bandit Parameter Estimation. doi: 10.22677/thesis.200000007744
  • DGIST
  • View : 714
  • Download : 234

Deep Neural Networks for Assessing Functional Connectivity: an fNIRS Study

  • BAHAREH BEHBOODI
  • 2018
  • BAHAREH BEHBOODI. (2018). Deep Neural Networks for Assessing Functional Connectivity: an fNIRS Study. doi: 10.22677/thesis.200000003742
  • DGIST
  • View : 879
  • Download : 306

The Study of Vertical TFT System with Stress Release Structure for Flexible Electronics

  • Lee, Seungchul
  • 2018
  • Lee, Seungchul. (2018). The Study of Vertical TFT System with Stress Release Structure for Flexible Electronics. doi: 10.22677/thesis.200000007552
  • DGIST
  • View : 4541
  • Download : 1600

The Study of Thin Film Coil with Thin Film Capacitor for Wireless Power Transmission based on Impedance Matching

  • Kim, Jong-Hyeun
  • 2018
  • Kim, Jong-Hyeun. (2018). The Study of Thin Film Coil with Thin Film Capacitor for Wireless Power Transmission based on Impedance Matching. doi: 10.22677/thesis.200000008261
  • DGIST
  • View : 718
  • Download : 269

The study of sensor structure to distinguish a surface morphology for psychological tactile sensor

  • Park, Hyunchul
  • 2018
  • Park, Hyunchul. (2018). The study of sensor structure to distinguish a surface morphology for psychological tactile sensor. doi: 10.22677/thesis.200000007562
  • DGIST
  • View : 1015
  • Download : 435

Transceiver Optimization of Wireless Power Transfer System with Multiple Transmitters to Single Receiver

  • Kim, Kyungtae
  • 2018
  • Kim, Kyungtae. (2018). Transceiver Optimization of Wireless Power Transfer System with Multiple Transmitters to Single Receiver. doi: 10.22677/thesis.200000008438
  • DGIST
  • View : 799
  • Download : 429

Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles

  • Kwon, Young-Min
  • 2018
  • Kwon, Young-Min. (2018). Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles. doi: 10.22677/thesis.200000005425
  • DGIST
  • View : 5864
  • Download : 2012
  • Shin, Jongho
  • 2018
  • Shin, Jongho. (2018). Intelligent Sensor Attack Detection for High Integrity in Automotive Cyber-Physical Systems. doi: 10.22677/thesis.200000008852
  • DGIST
  • View : 658
  • Download : 0
  • Lee, Jihye
  • 2018
  • Lee, Jihye. (2018). A large-scale sparse matrix multiplication method based on streaming matrices to GPUs. doi: 10.22677/thesis.200000006343
  • DGIST
  • View : 843
  • Download : 0