To improve the performance of the 2 m telescope,the optimum design is applied to the telescope assemble.Referring to the telescope assemble with the dimetric tr
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive t
The energy model was founded to calculate the critical power of keyhole formation by using the limit principle in CW (continuous wave) Nd:YAG laser deep penetra
Reconfigurable products and manufacturing systems have enabled manufacturers to provide “cost effective” variety to the market. In spite of these new technolo