Search
Now showing items 21-30 of 112
A Parallel Implementation of the Electric Field Integral Equation for an Arbitrary Terrain Profile
(2014)
In this paper a parallel implementation of the Electric Field Integral Equation is introduced. By this means, the otherwise slow computation time of signal coverage over terrain can be cut to an arbitrarily small figure ...
The syntax of concealment: reliable methods for plain text information hiding
(2007)
Many plain text information hiding techniques demand deep semantic processing, and so suffer in reliability. In contrast,
syntactic processing is a more mature and reliable technology. Assuming a perfect parser, this paper ...
Directional Modulation from a Wrist-Wearable Compact Antenna
(IEEE, 2022)
This work proposes compact multiport antennas for directional modulation (DM) on wrist-wearable devices to improve the secrecy and privacy of the transmitted data. The DM performance is investigated using the antenna in ...
Applying Blockchain Layer2 Technology to Mass E-Commerce
(International Association for Cryptologic Research, 2020)
The emergence of e-commerce has changed the way people trade. However, merchants are charged high fees for their use of the platform and for payment services. These costs are passed on to customers in the form of higher ...
Statistically-constrained shallow text marking: techniques, evaluation paradigm and results
(International Society for Optical Engineering, 2007)
We present three natural language marking strategies based on fast and reliable shallow parsing techniques, and on widely
available lexical resources: lexical substitution, adjective conjunction swaps, and relativiser ...
A Convex-Space Discretization of a Building, Designed for Indoor Resource Optimisation using Ray-Tracing Techniques
(2014)
The purpose of this work is to provide a fast
multipoint ray-tracing algorithm when the location of many transmitters is not fixed. When optimising the location of multiple transmitters numerically using an optimization ...
Beyond the Role Model: Organisational modelling in policy based management systems
(2003)
In this paper, we discuss recent developments in the field of Policy Based Management (PBM) and Role Based Access Control (RBAC).We postulate that PBM tends towards a total description of an organisation?s operations. We ...