This paper presents a new approach based on morphological operators for application of biometric identification of individuals by segmentation and analysis of the iris. Algorithms ...
When both TCP and UDP sessions co-exist in the Internet, the performance of TCP sessions easily deteriorate because of congestion incurred by UDP sessions of real-time multimedia ...
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Java provides a program-level exception handling mechanism in response to error conditions (that are translated into exceptions by Java VM). However, exception handling code is of...
We present a multistage model for allocation of financial resources to bond indices in different currencies. The model was tested on historical data of interest and exchange rates...