Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xidian University(Natural Science)
1001-2400
2006 Issue 5
Edge extraction in SAR images using multidirection wavelet and fuzzy fusion
WU Yan;SHEN Bo;LIAO Gui-sheng
..............page:691-695
An error concealment algorithm based on Newton interpolation in the hybrid field
ZHANG Jian-long;WU Cheng-ke;SHI Yingbo;SONG Rui
..............page:687-690,708
Image denoising method using wavelet based on the multiscale geometrical directional windows
LI Wei;YANG Xiao-hui;SHI Guang-ming;JIAO Li-cheng
..............page:682-686
A baseline estimation method for INSAR based subspace projection
LIU Ying;LIAO Gui-sheng;MA Lun
..............page:678-681
Hybrid loss protection method based on the measurement of the effective expected quality for image transmission
YANG Yad-ong;WU Cheng-ke;XIAO Song;DU Jian-chao
..............page:696-699,744
Study of topology availability in wireless mobile communication networks
CHEN Yan-hui;KANG Jin;LI Jian-dong
..............page:700-702,828
A new multiple access protocol for WLAN based on adaptive token passing
CHEN Dong;LI Jian-dong;LI Wei-ying;SHENG Min;MA Jing
..............page:703-708
A MoM calculation of the lowest cutoff frequencies of uniform waveguides by conformal mapping
ZHU Man-zuo;LIANG Chang-hong
..............page:709-710,715
Dynamic analysis of the elastic linkage mechanism based on the artificial neural network
TUO Yao-fei;CHEN Jian-jun;CHEN Yong-qin;ZHANG Chi-jiang
..............page:711-715
A novel distributed algorithm for MAC address assignment in wireless sensor networks
tian ye ; sheng min ;li jian-dong; li jian dong
..............page:716-720
Modeling and simulation of the HCI degradation model for the NMOFET in deep submicron circuits
LI Kang;MA Xiao-hua;HAO Yue;CHEN Hai-feng;WANG Jun-ping
..............page:721-724,753
Optimal design of flexure-based compliant mechanisms based on probability
CUI Ming-tao;CHEN Jian-jun;MA Xiao-song;TUO Yao-fei
..............page:725-729
Analysis of reachable workspace of a wire driven parallel robot and its stiffness estimation
TANG Ao-fei;QIU Yuan-ying;DUAN Bao-yan
..............page:730-734,791
Reliability analysis of the deployment mechanism of a large satellite antenna based on the non-probabilistic model
ZHANG Jian-guo;CHEN Jian-jun;DUAN Bao-yan;HU Tai-bin
..............page:739-744
Hybrid algorithm based on ant colony optimization in continuous space optimization
KOU Xiao-li;LIU San-yang
..............page:745-747,758
The impact of OBS network's characteristic on TCP performance
WEN Ai-jun;JING Jie;LIU Jian-ping;ZHANG Wei-dong
..............page:748-753
A resource scheduling strategy based on the BD algorithm for MIMO systems
LI Xiao-hui;YI Ke-chu;LIU Nai-an;TIAN Bin
..............page:754-758
A window-based multi-rate multicast congestion control algorithm
ZHANG Bing;LIU Zeng-ji;YUAN Bing
..............page:768-772,781
Bayesian face detection algorithm based on skin segmentation
WEN Jing;GAO Xin-bo
..............page:773-777
An improved strong proxy signature schemes
MING Yang;JIANG Zheng-tao;WANG Yu-min
..............page:778-781
A space-time multiuser detection based on the RLS-LMF algorithm
ZHENG Lin;OUYANG Shan;QIU Hong-bing
..............page:782-787
Joint nominative proxy signature scheme
LEI Qiang;WANG Yu-min
..............page:788-791
Token-based single sign-on protocol and its formal analysis
SHEN Ting;LI Hui;YU Ming-zhe
..............page:792-796
Application of PSO and GA in beamforming of an array antenna
LIU Rui-bin;YAN Ze-hong;SUN Cong-wu;ZHANG Xiao-miao;WEI Wen-yuan
..............page:797-799,813
Research on computational soundness of formal attacker ability description
TIAN Hai-bo;DING Yong;WANG Yu-min
..............page:800-803,823
An access method of integrating WPA and WAPI protocols into the IEEE 802.11b adapter
DUAN Ning;MA Jian-feng
..............page:804-808,818
Fault analysis for self-shrinking generator
GAO Jun-tao;HU Yu-pu;LI Xue-lian
..............page:809-813
Optimal transmitter design in MIMO systems under correlated fading channels
ZHAO Zhen-shan;XU Guo-zhi;FAN Jing
..............page:814-818
A novel BIST technique for multipliers cores
LEI Shaoc-hong;SHAO Zhi-biao;LIANG Feng
..............page:819-823
Improved compressed edge fragment sampling algorithm
YAN Qiao;XIA Shu-tao;WU Jian-ping
..............page:824-828
Normal Filters of pseudo MTL-algebras (WPBL-algebras)
ZHANG Xiao-hong;LIU San-yang;LIU Yong-lin
..............page:829-832
Research on combining radar emitter recognition with a priori knowledge
GAI Ming-jiu;GUAN Xin;YI Xiao;SHI Bao
..............page:833-837