Hierarchical semi-frigile watermarking based on the reconstruction of DCT coefficients
The infrared image enhancement and the correlative technique based on the parallel genetic algorithm
Research on optimal scheduling of hybrid production processes
The process capability index analysis of non-normal distribution parameters
The design of 32×32-b multiplier
Image information fusion and synthesis display of medical images
A secret sharing RSA digital signature scheme based on the vector space access structure
The calculation of thermal radiaiton distortion for large deployable antennas in satellites
New design method for the optimal energy delay product of FPGA based on the interconnect
The anti-cheating property of the Asmuth-Bloom secret sharing system
Output feedback control of the nonlinear various structure unctertain system: its application to fuzzy adaption
Relationship between performance and structural parameters of a metering pump with an adjustable stroke
Design and implementation of a software quality evaluation system based on ISO/IEC 9126
A unified percolation model for gate oxide breakdown
Characteristics of the Ni/4H-SiC Schottky barrier diode at high temperatures
The correctional Square-6 attack
Estimation of the operation range of the active laser surveillance
A novel genetic algorithm based on the quantum chromosome
Application of wavelet analysis in medical image fusion
Research on the protocol of the subliminal-free channel in digital signatures
Application of data fusion in SAR image denoising
Design o space-time block codes with pre-coding
Angular resolution of jammers of the passive monopulse seeker
Oblivious transfer with extractors
Recent developments of consumer behavior stochastic models
Effect of the cell culture dish configuration on the millimeter-wave irradiation dose
Compact space-like hypersurfaces with constant scalar curvature in locally symmetric de Sitter space
An AKE protocol for mobile networks
Hedging strategy of a contingent claim as the price of the underlying asset follow jump-diffusion process
PKC and chosen ciphertext security
A cut-plane algorithm for semidefinite programming and its application
Theoretical frameworks for KDD based on intelligence
Euclid algorithm for finding the inverse and generalized inverse of the permutation factor circulant matrix
A dynamic secret sharing scheme to identify cheaters
Principle of the reconfiguration expert system for a reconfigurable manufacturing system
An undeniable cryptographic protocol for both the sender and the receiver