Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xidian University(Natural Science)
1001-2400
2006 Issue 3
Joint subcarrier and power allocation algorithm for multiuser OFDM systems and its performance
LI Xiao-hui;LIU Nai-an;YI Ke-chu;GU Hua-xi;KOU Wei-dong
..............page:366-370
Research on the algorithm for channel estimation on the IMO-OFDM system in fast-moving environment
FU Wei-hong;SHI Fan;YANG Xiao-niu;LIU Nai-an
..............page:371-375
Running motion planning for the humanoid robot in the sagittal plane
WEI Hang-xin;LIU Ming-zhi
..............page:376-380
A new model for analyzing security protocols formally
MU Jian-jun
..............page:381-385
Method for geometric distortion correction of missile-borne SAR
YU Gen-miao;DENG Hai-tao;WU Shun-jun
..............page:386-389
A contract-based interprocedural safety analysis method
YANG Xiao-qi;LIU Jian
..............page:390-394
Study of the wideband phased array radar with transmitting null beamforming
CAO Yun-he;LI Qiang;WANG Sheng-hua;ZHANG Shou-hong
..............page:395-399
A DF method for the improved correlative interferometer
LI Chun;LIAO Gui-sheng;LI Yan-bin
..............page:400-403
Stability criterion for networked control systems based on the model of the time-delay system
ZHANG Xi-min;ZHOU Li-hua;CHE Xiang-quan
..............page:404-407
A new algorithm for infrared mono-station passive location based on a mobile platform
LI En-ke;YIN Shi-min;LIU Shang-qian;FU Xiao-ning
..............page:408-410,429
Combination of Turbo equalization and Turbo TCM with low-complexity
YANG Peng;GE Jian-hua
..............page:411-415
An improved algorithm for moitoring the network fault
ZHANG Xin;CHANG Yi-lin;SUN Fang-tao;SHEN Zhong;JIANG Li
..............page:416-421
An improved traitor tracing scheme based on modified RSA
MA Hua;YANG Bo
..............page:422-424
Study of the infinite element-domain decomposition method in electromagnetic scattering of cylinders
AN Xiang;L(U) Zhi-qing;LIANG Chang-hong
..............page:425-429
Study of the shadowing technique in the NURBS-PO method
CHEN Ming;ZHANG Yu;WANG Nan;LIANG Chang-hong
..............page:430-432,437
Estimation of yield associated with elliptical defect
WANG Jun-ping;HAO Yue;ZHANG Zhuo-kui;Ren Chun-li;LI Kang;FANG Jian-ping
..............page:433-437
A novel construction algorithm for symmetrical reversible variable length codes
HUO Jun-yan;CHANG Yi-lin;MA Lin-hua;LUO Zhong
..............page:438-441
On simplified liveness-enforcing Petri net supervisors for FMS
LI Zhi-wu;XU Ping-jiang;ZHU Rong-ming;WANG Xing-ping
..............page:442-447,465
A study of the security of a steganography method and security enhancement methods
LU Ming-xin;FU Xiao-tong;QIN Lei;XIAO Guozhen
..............page:448-452
The effect of the inaccuracy in line of fiber optic F-P sensing head on SNR in fabry-perot sensor
YANG Yao-en;LIU Ming-zhi;WANG Qing-min;SUN Bao-chen
..............page:462-465
A new information reconciliation protocol
WANG Bao-cang;YANG Bo;HU Yu-pu
..............page:486-490
Study of the construction and application of the DEM
LIU Nan-yan;ZHAI Ling
..............page:500-503
Automatic extraction of gullies and cliffs from topographic map
YANG Yun;ZHU Chang-qing;SUN Qun;ZHANG Zi-jing
..............page:504-508
A new feedback control scheme for media synchronization
WU Wei;CHANG Yi-lin;LUO Zhong
..............page:359-365
Distributed adaptive routing algorithms in Torus networks
GU Hua-xi;LIU Zeng-ji;WANG Kun;XIE Qi-ming
..............page:352-358
PAPR reduction for COFDM with Golay coding scheme and system implementation
LI Wei-ying;L(U) Zhuo;LI Jun-wei;CAI Feng
..............page:347-351
Study of the minimum-energy path-preserving topology control algorithm for wireless Ad Hoc networks
SHEN Zhong;CHANG Yi-lin;CUI Can;ZHANG Xin
..............page:341-346,351
A time series model for accurately predicting the WLAN traffic
CHEN Chen;PEI Chang-xing;ZHU Chang-hua;CHEN-Nan;YI Yun-hui
..............page:337-340
Detection of number of sources via exploitation of non-circular property
ZHENG Chun-di;FENG Da-zheng;ZHOU Yi
..............page:466-470
A multi-service oriented collusion-resistant asymmetric public-key traitor tracing scheme
ZHANG Xue-jun;ZENG Zhi-yong;ZHOU Li-hua
..............page:471-475
An algorithm for image enhancement based on shock filters and anisotropic diffusion
JIANG Ling-ling;YIN Hai-qing;FENG Xiang-chu
..............page:476-478,494
Reducing the RCS of the microstrip antenna by cutting slots and loading a shorting-post
RONG Feng-mei;GONG Shu-xi;HE Xiu-lian
..............page:479-481,508