Linked e-resources

Details

Organization; Contents; Maneuvering Target Tracking Algorithm for Adaptive Estimation on Measurement Noise Variance Matrix; 1 Introduction; 2 The "Current" Statistical Model of Adaptive Filtering Algorithm; 3 An Adaptive Estimation Based on the Innovation Adjustment; 4 Simulation Results and Analysis; 5 Conclusion; References; Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking against Signal Processing Attacks; 1 Introduction; 2 Literature Review; 3 Proposed DCT-SVD Watermarking Method; 4 Simulation Results; 5 Conclusions; References

A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman Filter1 Introduction; 2 Development of Hybrid Navigation System; 3 Result; 4 Conclusion; References; Proposal for Easily Detachable Proxy for Personal Information Leakage Detection; 1 Introduction; 2 Design of Proposed Method; 3 Implementation of Proposed Method; 4 Evaluation of Proposed Method; 5 Related Work; 6 Conclusion; References; Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices; 1 Introduction; 2 Adaptive Transformation Engine (ATE); 3 ATE-Enabled Remote Home Control Service

4 Implementation and Result5 Conclusions; References; The Improved 16th-Order Differential Attack on 10- Round Variant of Block Cipher PRESENT; 1 Introduction; 2 Specification Outline of PRESENT; 3 The 16th-Order Differential Property and Attack Equation; 4 Conclusions; References; Implementation of Stereo Camera Module for Hand Gesture Recognition; 1 Introduction; 2 Stereo Camera Module Design and Implementation; 3 Implementation of Hand Gesture Recognition; 4 Control of the Mouse Cursor; 5 Conclusion; References; Social Network Recommendation Based on Hybrid Suffix Tree Clustering

1 Introduction2 STC Based Hybrid Clustering Algorithm Structure; 3 Hybrid STC Based Social Network Recommendation; 4 Evaluation Experiment and Analysis; 5 Conclusion; References; A Reputation-Based Adaptive Trust Management System for Vehicular Clouds; 1 Introduction; 2 Related Works; 3 RA-VTrust System; 4 Performance Evaluation; 5 Conclusion; References; Semi-automatic Construction of a Named Entity Dictionary Based on Active Learning; 1 Introduction; 2 Semi-automatic Construction of a Named Entity Dictionary; 3 Experiments; 4 Conclusion; References

Research on Privacy Protection of WHOIS Information in DNS1 Introduction; 2 WHOIS Protocol; 3 WHOIS Privacy Collection; 4 WHOIS Privacy Protection; 5 The Experimental Results; 6 Conclusion; References; Fuzzy Logic-Driven Resource Evaluation Method for Automated Negotiation with Resource Allocation in Distributed Environment; 1 Introduction; 2 Related Works; 3 Fuzzy-Based Distributed Resource Allocation Management; 4 Simulation; 5 Conclusion; References; ERAGHC: Enhanced Reliable Authenticated Group Head Communication; 1 Introduction; 2 Literature Survey; 3 Design and Topology

Browse Subjects

Show more subjects...

Statistics

from
to
Export