Schematic diagram of a countercurrent-flow Frazier scheme. The Optimal Column Number for Deuterium Removal Rate from Water-Isotopes Mixture in the Frazier Scheme with the Total Sum of Column Heights Fixed
Yeh et al.’s remote user authentication scheme. Cryptanalysis of Yeh et al.’s Security-Enhanced Remote User Authentication Scheme with Smart Cards
Judging protocol. Non-Interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity
Configuration of the proposed system. Optimal Utilization of PV Solar System as DVR (PV-DVR) for a Residence or Small Industry
Hierarchical 64-QAM constellation map and Gray codes. Using Hierarchical Carrier Modulations in the Detection of Carrier Frequency Offset for OFDM Communications
Server counterfeit attack on Chang et al.’s scheme. Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
Example of image deblurring. An Adaptive Richardson-Lucy Algorithm for Single Image Deblurring Using Local Extrema Filtering
An autonomous home security robot. Circle Object Recognition Based on Monocular Vision for Home Security Robot
The flow chart of face detection algorithm. A Real-Time Skin Color Based Human Face Tracking System Using an Evolutionary Search Strategy
Seven feature points (F1~F7) we used. Real-Time Patients’ Face Tracking Based on Facial Feature Matching
Hardware setup of the LIDAR for 3D scene reconstruction. Large Scale 3D Scene Reconstruction with Improved Registration of Laser Range Data
The diagram of the proposed algorithm. A Novel Stereo Object Segmentation Algorithm Using Disparity and Temporal Information