Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xidian University(Natural Science)
1001-2400
2012 Issue 1
yi zhong dian da chi cun shen qiang san she de you xiao ji suan fang fa
zhang hong xia zou yan lin su dong lin
..............page:175-182
ji yu duo biao pai mai de hfc jie ru wang dai kuan fen pei suan fa
han rui zeng xue wen sun peng
..............page:147-153
Detection and control of the node capture attack in WSN
ZHOU Jie1;GUO Yuanbo1;HU Lingyan2
..............page:185-190
yi zhong jie he chuan ran lu you de huan cun diao du suan fa
tang li jun li yun chai yi wang xiang
..............page:169-174
Quantized optimal throughput analysis model of wireless multi-hop Ad hoc networks
SU Jingfang1;2;WU Muqing2;ZHANG Qinjuan2
..............page:128-134
Trust model of software behaviors based on check point risk assessment
LIU Yuling;DU Ruizhong;FENG Jianlei;TIAN Junfeng
..............page:179-184,190
wen wu jian ce zhong wu xian chuan gan qi wang luo shu ju ya suo suan fa yan jiu
wang ju fang ding yi chen xiao jiang xing tian zuo zhang yuan gao bao jian
..............page:191-196
fu hao jiao zhi sccpm de she ji yu xing neng fen xi
sun jin hua wu xiao jun xiang zuo
..............page:29-35
Recognition and localization of car whistles using the microphone array
LIU Jianping;ZHANG Yiwen;LIU Ying
..............page:163-167
yi zhong wu xian chuan gan qi wang luo neng liang you xiao suan fa yan jiu
li yan xiao zhang yue ling guan zuo liu dong yang
..............page:203-208
yi zhong bu chang hong mo xing wu yuan xing de kuai su tu you hua fang fa
gao zuo li yu shan yan xu
..............page:76-81
yi zhong ji yu gu you shi jian chi du fen jie de ofdm xin hao mang shi bie suan fa
zhu yan rui tian bin an jin kun sun yong jun yi ke chu
..............page:22-28
gao jie fei ju bu bian fen mo xing
li ya feng feng xiang chu
..............page:104-112
Bandwidth allocation based on multi-bid auction in HFC access networks
HAN Rui1;2;ZENG Xuewen2;SUN Peng2
..............page:122-127
Stable and efficient NURBS MOM-PO method
HE Zhili1;HUANG Kai1;JIANG Xiaobo2;LIANG Changhong1
..............page:56-61
huan xing qiang ji guang qi jia su shou ming shi yan he te zheng shou ming de ji suan
wu xin shi shun xiang liu ji fang ma lin sun yan ling
..............page:8-12
bei ye si lei da zi shi ying jian ce suan fa yan jiu
zhou yu zhang lin rang liu zuo
..............page:36-42
Buffer schedule algorithm combined with epidemic routing
TANG Lijun1;LI Yun2;CHAI Yi1;WANG Xiang2
..............page:141-145
yi zhong yong yu pian shang wang luo de yan shi wu guan yi bu dong tai you xian ji zhong cai qi
yang yan fei zhu zhang ming zhou duan yang yin tang
..............page:53-60
pmipv6 ben di hua lu you ji zhi yan jiu
tang jun pei chang xing su bo
..............page:120-126
mom-po hun he fang fa zhong yi zhong zhe dang xiao ying de xin suan fa
dang xiao jie yuan hao bo wang zuo liang chang hong
..............page:48-52
yi zhong xin ying de shou bu yun dong gen zong xi tong
ma ying hong yang jia zuo hui lei fang li zuo maozhihong sunmingui
..............page:96-103
Effective method for RCS computation of large and deep cavities
ZHANG Hongxia1;2;ZOU Yanlin3;SU Donglin1
..............page:146-150
Fast OFDM modulated signal recognition algorithm
ZHU Yanrui;TIAN Bin;AN Jinkun;SUN Yongjun;YI Kechu
..............page:17-22
New image super-resolution restoration method by NSCT
YANG Zhenping;NIU Haijun;DING Lei
..............page:34-37,85
li yong wo er shi ma kuo pin de mc-cdma xi tong pin pian gu ji suan fa
liu li cheng hu rui
..............page:163-168
Data compression of wireless sensor networks in the heritage monitor
WANG Ju1;3;FANG Dingyi1;3;CHEN Xiaojiang1;2;3;XING Tianzhang1;3 ZHANG Yuan1;3;GAO Baojian1
..............page:157-162
Definition and construction of K-time programs
MA Guojun1;2;PEI Qingqi2;CHEN Yuan2;JIANG Xiaohong1
..............page:111-114,127
yi zhong wen ding gao xiao de nurbs jian mo mom-po fa
he zhi li huang zuo jiang xiao bo liang chang hong
..............page:70-75
shan yu xie zuo pin pu gan zhi xing neng fen xi ji you hua
li mei ling yuan chao wei tian xin ji li lin
..............page:140-146
wsn zhong zhen dui jie dian bo huo gong ji de jian ce yu kong zhi
zhou jie guo yuan bo hu ling yan
..............page:225-230
yi zhong xin de shu ju rong he hang ji guan lian suan fa yan jiu
quan yi ning jiang zhen huang xiao dong li wei feng
..............page:82-90
ju you sui ji wei yi de duo zheng tu xiang chao fen bian zhong jian kuai su suan fa
ning bei jia ji feng li ying
..............page:127-132
yi zhong gai jin de shui sheng xin dao zai bo hui fu mang jun heng suan fa
ning xiao ling liu zhong luo ya song gong li fu xue zhi
..............page:183-190
New method for removing the hidden face in the MOM-PO hybrid method
DANG Xiaojie;YUAN Haobo;WANG Nan;LIANG Changhong
..............page:38-41
mimo kong jian xiang guan xin dao xia ge gui yue fu zhu de xin hao jian ce
li jian dong chen zuo li chang le liu wei chen dan
..............page:13-21
Study of a new track correlation algorithm in data fusion
QUAN Yining1;JIANG Zhen1;HUANG Xiaodong2;LI Weifeng3
..............page:67-74
Delay-independent asynchronous dynamic priority arbiter for the network on chips
YANG Yanfei1;ZHU Zhangming1;ZHOU Duan2;YANG Yintang1
..............page:42-48,110
ji yu mo shi fen jie fang fa de guo kong chuan rao ji zhi yan jiu
shen zhen ning zhuang zuo zuo zeng zhi bin
..............page:61-69
Fast convex optimization method for passivity enforcement of macromodels
GAO Song;LI Yushan;YAN Xu
..............page:62-66,121
Accelerated life testing for the ring laser and the method for calculating the characteristic life
WU Xin;SHI Shunxiang;LIU Jifang;MA Lin;SUN Yanling
..............page:7-10,97
Novel hand motion tracking system
MA Yinghong1;2;3;YANG Jiawei1;HUI Leifang1;LI Ye1; MAO Zhihong3;SUN Mingui2;3
..............page:79-85
Research on Bayesian radar adaptive detection
ZHOU Yu;ZHANG Linrang;LIU Nan
..............page:28-33
Lattice-reduction-aided detection in spatial correlated MIMO channels
LI Jiandong;CHEN Rui;LI Changle;LIU Wei;CHEN Dan
..............page:11-16,22
Method for extracting the tumor gene based on the support vector machine
QIN Chuandong1;LIU Sanyang2;ZHANG Shifang1
..............page:191-196
Modeling and optimization of access opportunity in cognitive radio
HAN Weijia;LI Jiandong;YAO Junliang;LI Zan
..............page:1-6
Routing algorithm for deep space networks with a maximum throughput
LI Hongyan;YANG Guangxiang;WANG Wenlong
..............page:92-97
New model decomposed method to simulate the crosstalk between vias
SHEN Zhenning1;2;ZHUANG Yiqi1;ZENG Zhibin1
..............page:49-55,104
ji yu jian cha dian xing wei feng xian ping gu de xin ren mo xing
liu yu ling du rui zhong feng jian lei tian jun feng
..............page:217-224
kci cheng xu de ding yi he gou zao
ma guo jun pei qing zuo chen yuan jiang xiao hong
..............page:133-139
Higher-order nonlocal variational model
LI Yafeng1;2;FENG Xiangchu1
..............page:86-91
duo tiao ad hoc wang luo zui jia tun tu lv liang hua fen xi mo xing
su jing fang wu mu qing zhang qin juan
..............page:154-162
Performance analysis and optimization of censoring based cooperative spectrum sensing
LI Meiling1;2;YUAN Chaowei1;TIAN Xinji1;LI Lin1
..............page:115-121
ji yu mai ke feng zhen lie de qi che di yu shi bie ji di sheng ding wei
liu jian ping zhang yi wen liu ying
..............page:197-202
yi zhong xin de nsct chao fen bian lv tu xiang fu yuan ji shu
yang zhen ping niu hai jun ding lei
..............page:43-47
Research on the localized routing mechanism for the PMIPv6
TANG Jun;PEI Changxing;SU Bo
..............page:98-104
Novel low energy consumption MAC protocol for the wireless sensor networks
LI Yanxiao;ZHANG Yueling;GUAN Hua;LIU Dongyang
..............page:168-171
yi zhong zui da tun tu liang de shen kong tong xin wang luo lu you suan fa
li hong yan yang guang xiang wang wen long
..............page:113-119