In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Most physically implemented multi-robot controllers are based on extensions of behavior-based systems. While efficient, such techniques suffer from weak representational power. Sy...
A new VLSI architecture for real-time pipeline FFT processor is proposed. A hardware oriented radix-22 algorithm is derived by integrating a twiddle factor decomposition technique ...
A new hybrid scheme (LEA) that combines the advantages of Eulerian and Lagrangian frameworks is applied to the visualization of dense representations of time-dependent vector field...
Bruno Jobard, Gordon Erlebacher, M. Yousuff Hussai...