Based on a non-repudiation protocol NRPUM, which provides point-to-point non-repudiation services, this paper proposes a non-repudiation solution to secure emai
When applied to mobile computing systems, checkpoint protocols for distributed computing systems would face many new challenges, such as low wireless bandwidth,
This article proposes a dynamic subcarrier and power allocation algorithm for multicell orthogonal frequency division multiple access (OFDMA) downlink system, b
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication betw
Liquids to be broken up using a prefilming airblast atomizer are usually Newton liquids with relatively low viscosities. While in some industrial processes, suc
A pressure force control system for hot embossing of microfluidic chips is designed with a moment motor and a ball bearing lead screw. Based on the numeric PID