—This paper presents an application of fuzzy logic theory to the reconstruction of solid models from engineering drawings. In engineering drawing, two-dimensional (2D) orthograph...
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
In the present study a set of first order correlation functions are proposed to examine the quality of a wide class of identified nonlinear models. The first order correlation ...
The problem of distinguishing density-independent (DI) from density-dependent (DD) demographic time series is important for understanding the mechanisms that regulate populations ...