Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xi'an Jiaotong University
0253-987X
2004 Issue 12
Iterative Blind Decoding and Carrier Frequency Offsets Estimation for a Space-Time Block Code
luo ming ; yin qin ye ; deng ke
..............page:1319-1320
Navigation Algorithms Using Magnetometers and Augmented Kalman Filtering
zhao min hua ; shi meng ; zeng yu lian ; huang yong xuan ; li ji sheng
..............page:1315-1318
Recording and Transmission Techniques of Electrocardiograph for High Sample Rate Holter System
zuo xiang guo ; zheng chong xun ; kang yu
..............page:1310-1314
Method of Electrooculogram Artifacts Elimination in Electroencephalogram
liu ming yu ; wang zuo ; wei na ; yan zuo ; zheng chong xun
..............page:1306-1309
Application of Short-Time Energy Analysis in Condition Monitoring of Circuit Breakers
meng yong peng ; jia shen li ; rong ming zhe
..............page:1301-1305
Real-Time Pricing of Reactive Power Based on Reactive Power Value
ding yong ; wang xiu li
..............page:1296-1300
Analysis on Running Process of Permanent Linear Synchronous Motors with Discontinuous Stators
shang guan zuo feng ; li qing zuo ; yuan shi ying ; jiao liu cheng
..............page:1292-1295,1300
Charging Mechanism of Metallic Conducting Particle on a Dielectrically Coated Electrode in Gas Insulated System
zhang qiao gen ; jia jiang bo ; yang lan jun ; yuan ya ze
..............page:1287-1291
Automatic Recognition of Airfield Runway in Synthetic Aperture Radar Images
bao fu min ; li ai guo ; zuo zheng
..............page:1243-1246
Approach to Construct a Rough Neural Networks Based on Rough Set
he ming ; feng bo qin ; ma zhao feng ; fu xiang hua
..............page:1240-1242,1246
Software Architecture Description Language Based on Object-Oriented Petri Nets
yu zhen hua ; cai yuan li
..............page:1236-1239,1275
Research on Adaptive Hash Mapping of Weak Hop Integrity
gao lei ; zhang de yun ; zhao dong ping ; zheng wei bin
..............page:1232-1235
Approach to Security Evaluation Based on Rough Set Theory for Host Computer
chen xiu zhen ; zheng qing hua ; guan xiao hong ; lin chen guang
..............page:1228-1231,1255
ASN.1 Solution of Asymmetrical Data Access in Isomer Systems
zuo xiang lin ; chen kai ; wang jun min ; zuo ya lin ; sun chao
..............page:1224-1227
Adaptive Passivity-Based Control Strategies of Induction Motors Using dSPACE
ji zhi cheng ; xue hua
..............page:1220-1223,1291
Novel Scheme for JPEG2000 Rate Control Based on Number of Coding Passes
wu zong ze ; zheng nan ning ; huang yu ; zhu yue xin ; zhang jing
..............page:1216-1219
Selection of Optimal Over-Sampling Rate in Close-Loop Identification with Output Over-Sampling
hu huai zhong ; sun lian ming ; liu wen jiang
..............page:1211-1215
Research and Design of Embedded High-Speed and Low-Power ROM
hu zuo ; shao zhi biao
..............page:1284-1286,1318
New Method for Measuring the Wall Charge of AC Plasma Display Panel under Arbitrary Driving Waveform
liang zhi hu ; liu chun liang ; liu zu jun
..............page:1280-1283
Study on Synthesis and Photoluminescence Performance of Biphenyl Substituted Polythiophene Derivatives
gao chao ; wu hong cai ; yi wen hui ; li bao ming ; dong fa zuo
..............page:1276-1279
Study on Frequency Band Continuity for Surface Acoustic Waves' Wavelets Transform Array Device
wen chang bao ; zhu chang chun ; lu wen ke ; liu jun hua
..............page:1272-1275
Blind Space-Time Multi-User Detection for Dual-Rate Multicarrier Code Division Multiple Access Systems
zhang yi wen ; yin qin ye ; zeng yan xing
..............page:1268-1271
New Moving Object Segmentation Algorithm in MPEG Compressed Domain
liu long ; liu gui zhong ; liu jie zuo ; wang zhan hui
..............page:1264-1267
Driving Behavior Modeling During an Amber Light under the Mixed and Disordered Traffic Micro-Simulation
sun zhi qiang ; yang jian guo ; wang zhong min ; xiao yong jian ; yue chao ; deng zuo
..............page:1260-1263
Method of Embedding Digital Watermark into the Green Component of Color Image
liu lian shan ; li ren hou ; gao zuo
..............page:1256-1259
Roughness of Choquet Fuzzy Integral and Information Fusion
guan tao ; feng bo qin
..............page:1251-1255
Automatic Detection of Distributed Denial of Service Attacks Based on Time-Frequency Analysis
sun qin dong ; zhang de yun ; zheng wei bin ; hu guo dong
..............page:1247-1250,1255