Firstly, a method is introduced which uses Volterra series deploying technique to construct a nonlinear model based on OFS model. Then an improved novel incremental mode multiple s...
Haitao Zhang, Zonghai Chen, Ming Li, Wei Xiang, Ti...
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Subdivision schemes are commonly used to obtain dense or smooth data representations from sparse discrete data. E. g., B-splines are smooth curves or surfaces that can be construc...
This I)aper presents an implemented multi-tal)e twolevel model capable of describing Semitie non-linear morphology. The computational fl'arnework behind the ettrrcnt work is ...
In this paper, a new sufficient delay dependent exponential stability condition for a class of linear time-varying systems with nonlinear delayed perturbations is derived by using...