The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper briefs the recent research activities in microwave antenna applications that make use of metasurfaces. The interesting design initiatives including the grating lobes and sidelobes suppression of circularly-polarized patch subarray, and beam-steering control using active metasurface are presented.
This paper addresses the automatic building extraction problem from high-resolution remote sensing images. The buildings in remote sensing images generally represent different shapes (i.e., simple rectangular or complex hybrid shape), it is intractable to extract all the buildings with different shapes once. Therefore, we adopt a hierarchical extraction style with a visual graphical topic model embedded,...
With the increasing risk of IP reuse in System on Chip (SoC) design, intellectual property (IP) techniques becomes one of the most important issues. Compare with watermarking, fingerprinting is a more effective method because is not only protects the IP owner's benefits but also user's rights. In this paper, we firstly propose a multilevel fingerprinting method for IP protection. In the typical field...
With the rapid application growing of internet and wireless network, information security becomes significant to protect commerce secret and personal privacy. Encryption algorithm plays a crucial role for information security guarantee. In this paper, we evaluate the performance of two symmetric key encryption algorithms: CAST and RC5 commonly used for network data encryption. We analyzed the encryption...
With the increasing complexity of integrated circuits, system-on-chip (SoC) design is proved an effective design method due to intellectual property (IP) reuse. To protect IPs from piracy, watermarking techniques have significantly advanced as an IP protection (IPP) technique. It is an important work to judge the watermarking solutions achieve the goals or not. In this paper, we analyze several representative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.