References
- G. Chang et al. (2019). Guest Editorial Introduction to the Special Issue on Advances in Condition Monitoring and Assessment of Power Equipment. IEEE Transactions on Power Delivery, 34(4), 1219. https://doi.org/10.1109/TPWRD.2019.2926168
- A. J. Adams, J. N. Johansen, M. Ogrinz, H. Dolan, W. P. Jacobson & M. J. Kurian. (2020). U.S. Patent No. 10,607,230. Washington, DC: U.S. Patent and Trademark Office.
- A. Pande, D. Y. Joshi, D. Joshi & D. Wadhwa. (2020). Analysis of Tree Structure for Secure Group Communication Using LKH Approach. Lalitkumar, Analysis of Tree Structure for Secure Group Communication Using LKH Approach (June 1, 2020).
- H. Kimata, W. Xiaojun & R. Tanida. (2020, June). Hierarchical and Compact Bitmap Based Data Structure of Human Dynamics Data for Visualization. In Proceedings of the 2020 The 4th International Conference on Graphics and Signal Processing (pp. 98-102).
- R. Bhardwaj & A. Aggarwal. (2020). Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding. Multidimensional Systems and Signal Processing, 1-24.
- N. Hammler, A. Cathelin, P. Cathelin & B. Murmann. (2019). A Spectrum-Sensing DPD Feedback Receiver With $30\times $ Reduction in ADC Acquisition Bandwidth and Sample Rate. IEEE Transactions on Circuits and Systems I: Regular Papers, 66(9), 3340-3351. https://doi.org/10.1109/TCSI.2019.2920828
- M. Perez-Patricio & A. Aguilar-Gonzalez. (2019). FPGA implementation of an efficient similarity-based adaptive window algorithm for real-time stereo matching. Journal of Real-Time Image Processing, 16(2), 271-287. https://doi.org/10.1007/s11554-015-0530-6
- A. Nejati, Y. Bastan, P. Amiri & M. H. Maghami. (2019). A low-voltage bulk-driven differential CMOS Schmitt trigger with tunable hysteresis. Journal of Circuits, Systems and Computers, 28(07), 1920004. https://doi.org/10.1142/S0218126619200044
- D. Valencia & A. Alimohammad. (2019). An efficient hardware architecture for template matching-based spike sorting. IEEE transactions on biomedical circuits and systems, 13(3), 481-492. https://doi.org/10.1109/TBCAS.2019.2907882
- B. Bhandari & G. Park. (2020). Development of a real-time security management system for restricted access areas using computer vision and deep learning. Journal of Transportation Safety & Security, 1-16.
- Jeong, W. C., Jun, M. S., & Choi, D. H. (2020). AMI Network Failure Analysis based on Graph Database. Journal of Convergence for Information Technology, 10(7), 41-48. https://doi.org/10.22156/CS4SMB.2020.10.07.041
- J. O. Park. (2020). A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment. Journal of Convergence for Information Technology, 10(7), 7-13. DOi : 10.22156/CS4SMB.2020.10.07.007
- S. Kanai, H. Date & T. Kishinami. (1998). Digital watermarking for 3D polygons using multiresolution wavelet decomposition. In Proc. Sixth IFIP WG, 5, 296-307.
- E. Damiani, S. Vimercati, S. Parabosch & P. Samarati. (2000, March). Securing XML documents. In International Conference on Extending Database Technology (pp. 121-135). Springer : Berlin, Heidelberg.