—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
While the dynamic linking mechanism of modern programming languages, such as Java, allows loading of classes dynamically, it does not allow class reloading. Hence, dynamic linking...
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...