We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
To reduce the effort spent on system comprehension during software maintenance, easy access to different type of information describing the system features is necessary. This is u...
Abstract: In this paper we examine the usefulness of optimisation methods for practical farm program decisions. We inspect three Brandenburg cash crop farms over the last five year...
Tomographic imaging is a technique for exploration of a cross-section of an inspected object without destruction. Normally, the input data, known as the projections, are gathered ...
S. Reruang, Withawat Withayachumnankul, Chuchart P...
Abstract--A method for the computation of nonlinear digital filter networks containing delay-free loops is proposed. By preserving the topology of the network this method permits t...