It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, ar ...
-The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, a ...
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
The Schumann resonance frequencies are a set of eigenmodes in the extremely low frequency (ELF) portion of the electromagnetic field spectrum. These frequencies are only present for planetary-like bodies with a substantial ionosphere acting as a perfect electric conductor, thus forming a resonance c ...
Most satellite dish actuators send a series of pulses to indicate their position. By counting pulses the positioner knows where the dish is pointing. It is possible to use a serial port and Linux with RTAI patches in order to count these pulses, thus minimising the external hardware required for a ...
data are often used interchangeably, they are actually very different. Data is a set of unrelated information, and as such is of no use until it is properly evaluated. Upon evaluation, once there is some significant relation between data, and they show some relevance, then they are converted into in ...
In recent years, cellular voice networks have transformed into powerful packet-switched
access networks for both voice communication and Internet access. Evolving Universal
Mobile Telecommunication System (UMTS) networks and first Long Term Evolution
(LTE) installations now deliver bandwidths of sev ...
The surge of mobile data traffic forces network
operators to cope with capacity shortage. The deployment of
small cells in 5G networks is meant to reduce latency, backhaul
traffic and increase radio access capacity. In this context, mobile
edge computing technology will be used to manage dedicated
c ...
Multiple-Input Multiple-Output (MIMO) systems have recently been the
subject of intensive consideration in modem wireless communications as they
offer the potential of providing high capacity, thus unleashing a wide range of
applications in the wireless domain. The main feature of MIMO systems is th ...