1 |
Young Jin Kang et al., "An Experimental CPA Attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures", International Journal of Security and Its Applications, Vol. 8, No.2, pp. 261-270, Apr. 2014.
|
2 |
Matthew N. O. Sadiku, Numerical techniques in electromagnetics (2nd ed.), CRC Press, 2001.
|
3 |
K. S. Kunz and R. J. Luebbers, The Finite Difference Time Domain Method for Electromagnetics, CRC Press, 1993.
|
4 |
Allen Taflove, Susan C. Hagness, Computational Electromagnetics, Artech House, 2000.
|
5 |
Hasegawa Satomi et al., Templates for the solution of linear systems: Building blocks for iterative methods (Japanese ed.), Asakura Press, 1994.
|
6 |
Eric L. Miller and W. Clem Karl, Fundamentals of Inverse Problems, Not yet published, Sept. 2003.
|
7 |
Musha Toshimitu and Okamoto Yosio, Inverse problem and its solving method(Japanese ed.), Ohm Press, 1992.
|
8 |
Fatih Yaman et al., "A survey on inverse problems for applied sciences", Mathematical problems in engineering, Vol. 2013, pp. 1-19, 2013.
|
9 |
Kiran Thapaliya and Goo-Rak Kwon, "Morphological Operations to Segment a Tumor from a Magnetic Resonance Image", Journal of Information and Communication Convergence Engineering, Vol. 12, No.1, pp. 60-65, Mar. 2014.
DOI
ScienceOn
|
10 |
Tae Yong Kim and Hoon-Jae Lee, "Inverse Problem: 2-Dimensional Electromegnetic Scattering Problem," Conference Proc. of the Korea Institute of Information and Communication Engineering, vol. 18, no. 1, pp. 47-48, May. 2014.
|
11 |
Tae Yong Kim and Hoon-Jae Lee, "Source Estimation in Near-Field by 2-Dimensional EM Scattering," Conference Proc. of the Korea Institute of Information and Communication Engineering, vol. 18, no. 1, pp. 57-58, May. 2014.
|