Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Northern Jiaotong University
1000-1506
2009 Issue 2
Simulation Analysis of OFDM Modulation in Mine Tunnels
LI Ying1;2;3;YANG Wei1;2;3;Beijing 100083;China;3.Henan Key Laboratory of Coal Mine Methane and Fire Prevention;Henan Polytechnic University;Henan Jiaozuo 454003;China)
..............page:67-72
Application of Trusted Computing Platform in Trust Management
GENG Xiuhua1;HAN Zhen1;JIN Li2;PENG Shuanghe1
..............page:11-16
A New Fuzzy Clustering Algorithm Based-on Adaptive Differential Evolution
WU Zhifeng1;2;HUANG Houkuan1;ZHANG Ying1;YANG Bei1
..............page:17-21
ATN Based Trust Mobile Code Verification
LIU Weiwei;HAN Zhen;LING Mingqing;GUO Yu
..............page:22-25,29
Time Delay Simulation Analysis of Electric Propulsion Load Simulation System
DIAO Lijun;MEI Ying;LIN Wenli;LIU Zhigang
..............page:34-38
A Two-Stage Authentication Approach for Low-Latency Handoff in WLANs
Yaw-Chang Chen1;Cheng-Hao Lin2
..............page:73-81
Intelligent Mobile Purchasing System with RFID Smart Phone and EPC Network
Yao-Chung Chang1;Jian-Liang Chen2;Han-Chien Zhao3;4;5;Cheng-Shiun Tsai1
..............page:82-87
A Cross-Entropy Method for Two-DimensionalPacking Problem with Rectangle Pieces
LU Shengping;LU Yiping;ZHA Jianzhong;LU Shengxiang
..............page:39-43
A CDMA-Assisted Seamless Handover Scheme for WLAN
YAN Zhiwei;ZHOU Huachun;GUAN Jianfeng;QIN Yajuan;ZHANG Sidong
..............page:58-62
Research About Security Auditing in Information System
PENG You;WANG Yanzhang
..............page:112-116
Research on Fuzzy Dynamical Dispatch Algorithm of Networked Control System
YIN Xunhe1;LI Bin1;CUI Qingquan1;JIA Lijun2
..............page:98-102
Composite Reconfigurable Multi-Clustering Ad Hoc Network
NI Minming;WU Hao;AI Bo;ZHONG Zhangdui
..............page:92-97
Improved Complete Graph Algorithm of Solve Frequency Assignment Problem
WANG Qiang;SHA Fei;WANG Guodong
..............page:63-66
Research and Improvement on Security of GSM-R System
WU Hao;SHI Xiaohua;GU Yonghao
..............page:127-130
An Universal Steganalysis Method for GIF Image Based on TSVM
ZHONG Shangping;LIN Jing
..............page:122-126
A New Access Mechanism in Universal Network Architecture
LU Ningning;ZHOU Huachun;ZHANG Hongke
..............page:44-49
Action Recognition Combined with Human Action Property
LI Ning;XU De;FU Xiaoying;YUAN Ling
..............page:6-10,16
Incorporating Corner Information for Mouth Feature Extraction
TAN Huachun1;ZHANG Yujin2;ZHAO Yanan1
..............page:30-33