Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Xi'an University of Post and Telecom
1007-3264
2015 Issue 2
3D graphics rendering on a polymorphic computer
HAN Jungang;,YAO Jing;,LI Tao;,HUANG Hucai;,QIAO Hong;,YAN Youmei;,WANG Pengbo;
..............
page:1-6,15
Parallel implementation of kernels of OpenVX based on PAAG
LI Tao;,SUN Jian;,WANG Pengbo;
..............
page:7-10
A parallel implementation of texture feature extraction algorithm based on PAAG
LI Tao;,LI Xuedan;
..............
page:11-15
Design and implementation of floating-point elementary functions
DU Huimin;,SHA Liang;,ZHANG Yanfang;,NIU Zhilu;
..............
page:16-20
A flat multipath routing protocol based on AODV
JI Xingmin;,LI Jinlong;,LU Guangyue;,FENG Jingyu;
..............
page:21-25
Modeling and analysis of WTLS handshake protocol based on applied Pi calculus
PAN Jin;,GU Xiang;,WANG Xiaoming;
..............
page:26-31
An improved ping-pong protocol in quantum secure direct communication
LIANG Yanxia;,NIU Jing;,NIE Min;
..............
page:32-35
3D localization algorithm based on 4-station time difference of arrival and Newton iteration
QU Junsuo;,HOU Xiaoning;,ZHANG Jirong;,FAN Yongjun;
..............
page:36-40
Design of the high-speed differential transmission line
GONG Jiamin;,HOU Bin;,YANG Yi;
..............
page:41-46
Wireless resource allocation algorithm for LTE-Advanced system with carrier aggregation
ZHU Guohui;,ZHOU Guangtan;,XUE Qian;
..............
page:47-51
Image super-resolution via kernel canonical correlation analysis
FAN Jiulun;,WANG Yanzi;,XU Jian;,WU Xiaomin;
..............
page:52-57,76
Color image enhancement based on bi-histogram equalization
TIAN Xiaoping;,QIAO Dong;,WU Chengmao;
..............
page:58-63
Real-time crowd anomaly detection based on spatio-temporal texture model
WANG Jing;,XU Zhijie;
..............
page:64-76
Threshold segmentation algorithm based on the average of membership functions
LAN Rong;,SHEN Wenwen;
..............
page:77-82
A DRM model based on digital watermarking and anonymous fingerprinting
YU Haiyan;,FAN Jiulun;
..............
page:83-87
A DWT-domain watermarking algorithm against geometric attacks based on SIFT
LYU Jianping;,PENG Shu;
..............
page:88-92
Design of exchange management of virtual instrument based on IVI engine technology
LI Youmou;,ZHAO Mengyi;,WANG Meng;
..............
page:93-97,104
Improvement of cache coherence for multi-core processors
LIU Ke;
..............
page:98-104
zheng gao qi shi
..............
page:封3
An event-driven wireless sensor network data fetching strategy
HE Junlei;
..............
page:105-108
A risk sensation research of college students based on cross-border and mobile payment
GUO Jianfeng;,LI Yan;,CHEN Youwei;
..............
page:109-114
Security accessing and detection of cloud frontend device based on smart card
YANG Xiaobao;,WANG Pei;,LI Xiaolun;
..............
page:115-120
Security mechanisms of personnel information management in universities
SU Ziwei;
..............
page:121-124