Search
Now showing items 1-10 of 10
Examination of the vulnerable levels of user groups based on an IT security model
Publisher: IEEE
Year: 2014
Gibbs sampling based parameter estimation for RSC sub-codes of turbo codes
Publisher: IEEE
Year: 2014
An algorithm for clustering and aggregation of Wireless Mesh Network's topology
Publisher: IEEE
Year: 2014
Design of a broadband dual-polarization antenna
Publisher: IEEE
Year: 2014
Section 2: Control, adaptation, self-organization in infocommunication systems, software-defined networking
Publisher: IEEE
Year: 2014
Image acquistion with Linux on FPGA
Publisher: IEEE
Year: 2014
Multi-channel collaborative spectrum sensing in cognitive radio networks
Publisher: IEEE
Year: 2014
Channel estimation using data embedded pilot in underwater acoustic communication
Publisher: IEEE
Year: 2014
An automated flood detection framework for very high spatial resolution imagery
Publisher: IEEE
Year: 2014
High spectral quality sinusoidal oscillator with energy based amplitude control
Publisher: IEEE
Year: 2014