期刊: IETE TECHNICAL REVIEW, 0; ()
Data hiding in the compression domain is a very common method. Nowadays, the images to be transferred are usually compressed first. Therefore, data hi......
期刊: IETE TECHNICAL REVIEW, 0; ()
This paper reviews the AlGaN/GaN HEMT devices with electric field modulation effects and proposes a uniform two-dimensional model of this type of devi......
期刊: IETE TECHNICAL REVIEW, 2019; 36 (1)
A novel chaotic image encryption scheme based on hash function and cyclic shift is designed. The key streams are dependent on the hash value of the pl......
期刊: IETE TECHNICAL REVIEW, 2019; 36 (2)
This paper reports the emergence of bi-stability in a third-order memristive Wien-bridge oscillator. By transforming the parallel RC feedback network ......
期刊: IETE TECHNICAL REVIEW, 2019; 36 (3)
This paper reviews the physical breakdown mechanisms of Si-, SiC- and GaN-based power semiconductor devices. In the off-state in which Si-based Latera......
期刊: IETE TECHNICAL REVIEW, 0; ()
It's a challenging task to recognize facial expression in video sequences due to the gap between the hand-crafted features and the subjective emotions......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (2)
With high speed and broad view, airborne radar has a great advantage in moving vehicle tracing, recognition and strike. The high speed also causes com......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (3)
Sparse coding is currently an active subject in signal processing, computer vision, pattern recognition, etc. Fisher discrimination dictionary learnin......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (6)
Multiuser diversity (MUD) can be exploited in multiuser networks to improve performance. In this paper, the outage probability (OP) of amplify-and-for......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (4)
In this technical review, several superjunction (SJ) power MOSFETs based on the novel terminal technologies have been discussed. The electric field di......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (4)
This paper presents a newly developed compressive sensing (CS), maximum likelihood (ML), and rule-based method for classification of power quality dis......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (4)
This paper proposes a novel distortion function for JPEG steganography, which depends on the magnitude of discrete cosine transformation (DCT) coeffic......
期刊: IETE TECHNICAL REVIEW, 2018; 35 (4)
An ultra-low specific on-resistance (R-on,R-sp) trench silicon-on-insulator (SOI) LDMOS is proposed in this paper. In this novel structure, a floating......
期刊: IETE TECHNICAL REVIEW, 2018; 35 ()
Speculative execution and branch prediction are techniques that are widely used in modern superscalar processors to exploit instruction-level parallel......