The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Abstract—It is widely recognized that differential decode-andforward (DDF) cooperative transmission scheme is capable of providing a superior performance compared to classic dire...
Micro-blogging services provide platforms for users to share their feelings and ideas on the go. Desiging to produce information stream in almost micro-blogging services, although...