Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Embedded signal processing systems are usually associated with real-time constraints and/or high data rates so that fully software implementation are often not satisfactory. In th...
Does there exist a compact set of visual topics in form of keyword clusters capable to represent all images visual content within an acceptable error? In this paper, we answer thi...
Abstract— This paper presents a novel application of the twotime scale controller for the full envelop flight control of a Rotary wing Unmanned Aerial Vehicle (RUAV). In this pa...
— A CP-assisted (Cyclic Prefix) block transmission is widely accepted as a good choice for future mobile systems, taking advantage of low-cost, flexible, FFT-based (Fast Fourie...