Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Nanjing University of Science and Technology
1005-9830
2015 Issue 1
Vibration control of shipborn multiple launch rocket systems
Xin Song;,Rui Xiaoting;,Wang Guoping;,Zhang Jianshu;,Yang Fufeng;
..............
page:1-6
Influence of spoiler on overturning angular rate of submunition
Zhang Bozi;,Wang Shanshan;,Huang Bei;,Wang Hao;
..............
page:7-14
Simulation on effect of high voltage pulse on rock mixed materials breakdown
Li Hongda;,Li Xin;,Meng Xianjiang;,Yang Qingchuan;,Zhan Yanyan;,Zhao Hongyang;,Che Long;
..............
page:15-19
Terminals-facing visualization analysis for behaviors of cellphone users
Dai Qitao;,Deng Beixing;
..............
page:20-26
Fault-tolerance of unidirectional file transmission system based on Cauchy Reed-Solomon code
Zhou Yi;,Pang Lihui;,Peng Wei;
..............
page:27-33
Intrusion-tolerant proxy blind signature scheme based on discrete logarithm
Liu Fenghua;,Mi Junli;,Ding Enjie;
..............
page:34-38
Performance of media access control protocol for ZigBee network based on Markov chain
Cheng Hongbin;,Sun Xia;,Dong Ruizhi;
..............
page:39-44
High capacity information hiding based on PE file format
Wei Weimin;,Liu Kun;,Wan Xiaopeng;
..............
page:45-49
Normed centre of gravity based blind adaptively quantized audio watermarking algorithm
Cui Delong;,Gong Yunfeng;,Yu Guilan;
..............
page:50-55
Method for provable data possession under distributed storage system
Liu Huixia;
..............
page:56-62
Trust mechanism of mobile social network
Zhang Lin;,Zhang Jin;,Li Xinyu;
..............
page:63-69
User behavioral authentication mechanism and analysis based on IOT
Wang Xiaoju;,Tian Liqin;,Zhao Jingxiong;
..............
page:70-77
Secure transmission test method of ZigBee protocol based on randomness detection
Tang Yongli;,Zhao Wenjing;,Liang Bo;,Zhao Zhangjie;
..............
page:78-83
Research and implementation of cloud data sharing mechanism based on proxy re-encryption
Pang Yanmei;,Li Xiaodong;,Ye Sishui;
..............
page:84-88
Elastic resource adjustment method for cloud computing data center
Shen Jing;,Wu Chenguang;,Hao Yang;,Yin Bo;,Lin Yanfei;
..............
page:89-93
Multiuser scheduling and Tomlinson-Harashima precoding scheme for multiuser MIMO downlink systems
Yu Xiangzhen;
..............
page:94-101
Frequency-domain blind separation of convolutive mixtures based on Parseval’s theorem
Yang Qingchuan;,Zang Chuanxia;,Li Tianlei;,Hu Yulan;,Mei Tiemin;
..............
page:102-107
Adaptive Kalman filter combined with prediction and fault tolerance for target tracking
Dai Hongde;,Zou Jie;,Xu Shenghong;,Wang Yongting;,Wu Xiaonan;,Wu Guangbin;
..............
page:108-114
Data-driven constant power control of variable speed variable pitch wind energy conversion system
Pan Tinglong;,Sun Chengqi;,Ji Zhicheng;,Xu Lili;
..............
page:115-121
Application of nonlinear programming for simulation of binary distillation column
Pan Duotao;,Huang Mingzhong;,Jin Hui;,Yuan Decheng;
..............
page:122-126