Author:Labuschagne, WA; Veerasamy, NamoshaDate:Jul 2013The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user awareness to minimise ...Read more
Author:Litvin, IA; Forbes, ADate:2007The authors investigate the phase conjugating element of a two element Fourier transform beam shaping scheme and the impact this element has on the resulting propagation. It is shown that there are stricter limitations placed on the system ...Read more
Author:Lysko, Albert ADate:Jul 2011This paper discusses a numerical investigation in connection with the dependency of the condition number of the impedance matrix on the decomposition of current on a junction with several attached wires (multiplet). It is shown that the ...Read more