Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Network-on-Chip (NoC) architectures represent a promising design paradigm to cope with increasing co..
Steganography is the method of hiding a secret information in a specified medium like image, video, ..
Mitigation of Interference for multi-cell multi-user in multi-input single-output interference netwo..
Energy efficiency and Spectral efficiency are plays an important role in wireless communication syst..
Performing wireless communication into vehicles which are equipped with hardware devices. Here propo..
With the rapid development of Internet technology and socialization, people are increasingly accusto..
The ability to record and keep account of the usage of cloud resources in a credible and verifiable ..
Classification of benign or malignant micro-calcification clusters in mammograms is a major diagnost..
We derive closed-form outage probability expressions
for fixed-gain (FG) and variable-gain (VG) tw..
We consider the two-way relaying of the data of two
earth stations (ESs) via satellite links. The ..
In many process Wireless Sensor Networks (WSNs) are based on received signal strength indication (RS..
Most VANET applications are built upon the data push communication model, where information is disse..
A novel algorithm to remove rain or snow streaks from a video sequence using temporal correlation an..
Optimal resource management for smart grid powered
multi-input multi-output (MIMO) systems is of g..