Abstract is missing.
- Choice of a model of the ionosphere to use in high latitudesOlga Maltseva. 5-12 [doi]
- Sigma shift keying (SSK): FPGA implementationMartin Kramer, Leon Reinschmidt. 13-18 [doi]
- Spectrum's definition, Fourier transform's cross-correlation and compensation properties in ISAR imagingAndon Lazarov, Dimitar Minchev, Atanas Dimitrov. 21-29 [doi]
- Pulsar signal detection and recognitionIvan Garvanov, Magdalena Garvanova, Christo A. Kabakchiev. 30-34 [doi]
- An approach for microscopy image restorationVeska Georgieva, Plamen Petrov, Rumen Mironov, Antonia Mihaylova. 35-39 [doi]
- Applying sparse based spatial super-resolution for Himawari-8 satellite imageShiori Ishikuro, Jun Hashimoto, Okuyama Yuichi, Xiang Li 0005. 40-46 [doi]
- Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosureAaron Yi Ding, Gianluca Limon De Jesus, Marijn Janssen. 49-55 [doi]
- Low cost V2X traffic lights and vehicles communication solution for dynamic routingKonstantinos Skoufas, Evangelos D. Spyrou, Dimitris K. Mitrakos. 56-65 [doi]
- Measuring and clustering moving objectsMagdalena Garvanova, Ivan Garvanov, Christo A. Kabakchiev, Boris Shishkov. 66-70 [doi]