Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Systems and Communications

High Performance Zno Varistors Prepared From Nanocrystalline Precursors For Miniaturised Electronic Devices, Suresh Pillai, Declan Mccormack, John Kelly, Raghavendra Ramesh Jan 2008

High Performance Zno Varistors Prepared From Nanocrystalline Precursors For Miniaturised Electronic Devices, Suresh Pillai, Declan Mccormack, John Kelly, Raghavendra Ramesh

Articles

An industrially viable solution-based processing route using minimal amounts of solvent has been used to prepare bulk quantity nanopowders (average particle size 15.3 nm) for the fabrication of ZnO varistors. The xerogels, calcined powders and sintered materials were fully characterised. The preparation of varistors from nanopowders has been optimised by studying the effect of temperature on grain growth, densification and breakdown voltage. The varistors are prepared by sintering at 1050 C for 2 hours, a temperature that is significantly lower than that used in the current industrial process. Highly dense varistor discs prepared from the sintered material produce devices, with …


Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot Jan 2008

Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot

Articles

With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation. In this paper , a new approach to digital watermarking is presented and a range of possible applications are considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a 'scramble image' by …