Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Nanjing University of Posts and Telecommunications(Natural Science)
1673-5439
2016 Issue 5
Financial industry reform driven by block chain
YAO Guozhang;,WU Chunhu;,YU Xing;
..............page:1-9
Advances in stochastic resonance in statistical signal processing
WANG Youguo;,ZHAI Qiqing;,LIU Jian;
..............page:10-17
Multi-authority and hierarchical weighted attribute-based encryption scheme
CHEN Danwei;,LIU Shuya;,LI Qi;
..............page:18-23
Survey of implication authentication of smart mobile devices in mobile Internet environment
HUANG Haiping;,XU Ning;,WANG Ruchuan;,QI Lingtao;
..............page:24-29
Coupled total variation algorithm based on Prewitt operator for image colorization
JIN Zhengmeng;,LI Peng;,MIN Lihua;,YANG Zhenzhen;
..............page:30-35
Device discovery scheme with social awareness for D2D communications underlaying celluar networks
WEN Kai;,GONG Zihui;,REN Zhaojun;,ZHUANG Yuan;
..............page:36-42
Two-level distributed multi-channel MAC protocol for vehicular networks
JI Chengchao;,MI Zhengkun;,WANG Wennai;
..............page:43-49
Fast denoising algorithm based on adaptive total variation of B ultrasonic image
CHANG Lulu;,ZHANG Huapeng;
..............page:50-55
Improved minimum weighted clustering algorithm in wireless sensor networks
XU Jingjing;,XU Bixiao;,ZHANG Xinhui;,SUN Zhixin;
..............page:56-63
Two-way relaying system performance based on wireless energy harvesting
CAO Kunrui;,DING Haiyang;,LIU Wulin;
..............page:64-69
Multi-channel wireless network coding method with global heuristics
ZHAO Qisheng;,ZHU Huisheng;,LIU Xiaoming;,LI Cunhua;
..............page:76-82
Stochastic time-to-digital converter based on edge-interchanging technique
WANG Zixuan;,CAI Zhikuang;,HU Shanwen;,ZHOU Bo;,YANG Hengxin;
..............page:90-95
Data publishing method based on differential privacy-preserving in D-ProPer protection framework
SHAO Rongmin;,ZHANG Lin;,WANG Ruchuan;
..............page:96-104
Anomaly detection based intrusion-tolerant data aggregation scheme in sensor networks
DING Chao;,YANG Lijun;,WU Meng;
..............page:105-113
IoT end-to-end security mechanism based on DTLS
ZHAO Min;,JIANG Lingyun;,LI Zhanjun;
..............page:114-119,126