Thls paper proposes a new perceptual approach to noisy X-ray image segmentation. It consistsof the five major step :(1)Pre -segmentation, (2)Improved region growing, (3 ) Object de...
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
As technologies evolve and computer systems shrink to the size of matchboxes, also their field of application shifts in new directions. Our permanent companions, mobile phones, p...
Christian Bertelsmeyer, Erik Koch, Alexander H. Sc...
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
— The paper presents a new approach to rejection of sinusoidal disturbances acting at the output of a discrete-time linear stable plant with unknown dynamics. It is assumed that ...