The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
The study proposes a novel scheme to extract and recognize the caption contents of various sports captions. A caption extraction process based on an iteratively temporal averaging...
In order to achieve awareness of collision during teleoperation and to support operator with valuable information (object stiffness and shape), we elaborated approaches to object ...
This paper presents an efficient algorithm for the generation of diagnostic test patterns which distinguish between two arbitrary single stuck-at faults. The algorithm is able to ...