

Author: Miley G. H. Wu L. Kim H. J.
Publisher: Springer Publishing Company
ISSN: 0236-5731
Source: Journal of Radioanalytical and Nuclear Chemistry, Vol.263, Iss.1, 2005-01, pp. : 159-164
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators
By Sung Yunsick
Entropy, Vol. 18, Iss. 10, 2016-10 ,pp. :


Protection Intensity Evaluation for a Security System Based on Entropy Theory
By Lv Haitao Hu Ruimin Chen Jun He Zheng Chen Shihong
Entropy, Vol. 15, Iss. 7, 2013-07 ,pp. :

