Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2007 Issue 3
Research on Frequency-Domain Equalizing Filter in Underwater Communication
XU Xinyi;ZHU Qiuping;WANG Weibing;LIU Kegang
..............page:379-382
An Improved Realization Structure for Goertzel Algorithm
WANG Weibing;ZHU Qiuping;XU Xinyi;DAI Jialiang;LIU Kegang
..............page:375-378
Design and Implement of Pulse Modulation Controller IP Core
CAO Yang;LI Xiaohui;WANG Liwei;YANG Yuanyuan
..............page:369-374
Design of LXIbus Interface Circuit for HF Ground Wave Radar
CHEN Zezong;WU Gongcheng;XU Chao;KE Hengyu
..............page:365-368
Error Analyze of Current Measurements by HF Surface Wave Radar
GONG Ziping;KE Hengyu;HOU Jiechang;WU Xiongbin;CHENG Feng
..............page:356-360
Observation and Analysis of the Ionosphere Response to Substorms by GPS
YUAN Zhigang;TIAN Anmin;DENG Xiaohua
..............page:351-355
Controllable Growth of ZnO Nanostructures Via Electrochemical Route and Mechanism Research
LI Jinchai;ZHU Yu;LU Hongbing;TIAN Yu
..............page:337-341
An Ionized Cluster Beam (ICB) Deposition Equipment Used to Make c-Axis Oriented ZnO Thin Films
YANG Zhongtian;KE Xianwen;LIU Chuansheng;GUO Liping;FU Dejun
..............page:333-336
Calculating Electronic Structure in Quantum Dot with B-spline Function
MENG Xianquan;LIU Wei;WANG Dong;QIAO Haoxue
..............page:328-332
Gaussian Sum Rules and Ds(0+) Meson
LIU Jueping;WEN Shuiguo
..............page:319-322
A Robust, Restorable Dual Watermarking Technology
QU Zhiguo;JIN Cong
..............page:314-318
An Adaptive Watermark Algorithm Based on the Relativity of Coefficients
ZHANG Zhongmei;JIN Cong
..............page:309-313
A Wavelet Packet Blind Watermarking Algorithm Based on Chaos Encryption
JIANG Yan;JIN Cong
..............page:305-308
Recognition-Based Method for Handwritten Numerical Strings Segmentation Trained with Negative Data
SONG Wanjuan;DONG Cailin;CHEN Zengzhao;ZHANG Jian
..............page:301-304
Database Watermark Security Protocol Based on Trusted Third Party
HUANG Min;CAO Jiaheng;PENG Zhiyong
..............page:297-300
B-Valued Martingale Ergodic Theorems and Maximal Inequalities
LUO Guangzhou;LIU Peide
..............page:255-258
A Remark on Adjoint Equations of Characteristic Singular Integral Equations
LI Weifeng;DU Jinyuan
..............page:259-261
On Mutitype Branching Random Walk in Random Environments
L(U) Ping;HU Dihe
..............page:262-266
The Structures of Groups of Order 2·11·pn
LI Shengguo;HUANG Benwen
..............page:271-273
Across-Chain Inventory Control of Cluster Supply Chains Based on E-Business
LIU Chunling;LI Jizi;MENG Bo
..............page:274-278
On Cryptanalysis of the Inversive Generator
ZHAO Yaodong;QI Wenfeng
..............page:279-282
A Design of Low Latency Multiplier/Mac Unit for Public-Key Cryptography
ZHANG Jiahong;CHEN Jianhua;ZHANG Lina
..............page:283-286
On the Neighbor Selection Mechanism in Content Distribution Protocol-ShareStorm
LEI Yingchun;YANG Litang;JIANG Qi;WU Chanle
..............page:287-292
Self-Adaptive Management Policy for Scale-Free Networks
CUI Jianqun;HE Yanxiang;WU Libing;PENG Xi
..............page:293-296