- 2013-07-02 11:28:01The Design of a NPVR System for an IPTV Platform
- 2013-07-02 11:15:35A System-Level SOC Verification Method based on Hardware Accelerator
- 2013-07-02 11:09:06Design and Automatic System Verification of Digital Baseband for UHF RFID Tag
- 2013-07-02 11:05:29Long Term Multi-Target Tracking based on Detection and Data Association
- 2013-07-02 11:01:51Experiment Performance of DOA Estimators Based on Fourth-order Cumulants
- 2013-07-02 10:55:23Randomized Replication based on Multilevel of Security for Opportunistic Network
- 2013-07-02 10:48:41Development of Verification Environment for AXI Bus Using SystemVerilog
- 2013-07-02 10:44:21A Nonlinear Observer via Augmented Linear System based on Formal Linearization using Discrete Fourier Expansion
- 2013-07-02 10:41:34Image Edge Detection Based On Opencv
- 2013-07-02 10:37:53An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold
- 2013-07-02 10:34:25Stroke Area Detection using Texture Feature and iFuzzyLDA Algorithm
- 2013-07-02 10:31:19The Integration of RF Front-End Device with Embedded Antenna
- 2013-07-02 10:26:45Adaptive Modulation Using Neuro-Fuzzy (N-F) Controller for OFDM System
- 2013-07-02 10:18:17The 3D Passive Position Research for Three-Element Array in 0~359°
- 2013-07-02 10:05:10Small Target Segmentation Algorithm Based on Wavelet Transform and Mathematics Morphologic