News
A method is presented for automated segmentation of vessels in two-dimensional color images of the retina. This method can be used in computer analyses of retinal images, e.g., in automated screening ...
Photovoltaic (PV) energy has grown at an average annual rate of 60% in the last five years, surpassing one third of the cumulative wind energy installed capacity, and is quickly becoming an important ...
Faster-than-Nyquist (FTN) signaling can improve the bandwidth utilization. In this paper, we will provide a comprehensive survey on the topic. The history and the applications of FTN signaling are ...
SiC materials are currently metamorphosing from research and development into a market driven manufacturing product. SiC substrates are currently used as the base for a large fraction of the world ...
Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state responses. This paper presents a deep observation on and a comparison ...
This paper describes a project to create a novel design and simulation tool for quantum-dot cellular automata (QCA), namely QCADesigner. QCA logic and circuit designers require a rapid and accurate ...
This article summarizes an autonomous driving project by musculoskeletal humanoids. The musculoskeletal humanoid, which mimics the human body in detail, has redundant sensors and a flexible body ...
The Lifelog Search Challenge (LSC) is an interactive benchmarking evaluation workshop for lifelog retrieval systems. The challenge was first organised in 2018 aiming to find the system that can ...
This article presents a four-level pulse-amplitude modulation (PAM4) quarter-rate clock and data recovery circuit (CDR). A quarter-rate linear phase detector (QLPD) is proposed to reduce the recovered ...
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering.
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and ...
In this paper, a class of two-weight and three-weight linear codes over GF(p) is constructed, and their application in secret sharing is investigated. Some of the linear codes obtained are optimal in ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results