Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Information Engineering University
1671-0673
2002 Issue 2
Application of Wavelet Transform in Doppler Technology
lu zuo
..............
page:79-80
Analysis to Security Mechanism of Bluetooth
tan feng lin ; ge lin dong
..............
page:76-78
Grain Online Trade System Based on CA
zhang zhen ; li dong hong ; zhang bo tao ; dong chun li
..............
page:72-75
Analysis of the Characteristics of the New Generation of Network Virus
shen ling ; zuo yang
..............
page:68-71
Approaches of Data Sharing Between the Driver and the Application
liu jun ; xiao zuo xiang
..............
page:65-67
Implementation of Dynamically Monitoring Multi-Web Page
li shen tang ; wang zhen xing ; hu hong xia
..............
page:61-64
A Security Solution to Defending New Kinds of Trojan Horse
song wei ; zuo zuo ; wu zuo
..............
page:58-60
The Design and Implementation of a Performance Measurement System of Parallel Applications
zhang hui cheng ; wang qing xian ; du zhu ping ; cao rong rong ; li xia ; su ming
..............
page:54-57
The New Techniques in Modern Microwave Network Analysis
zhang guang qiu ; ma jin quan ; lei xue ; li zhi gang
..............
page:50-53
Application of Turbo Codes in the Third Mobile Communication System
qi sai ; zhang shui lian ; ma xiao jun
..............
page:46-49
A Study on Speaker Recognition Using Orthogonal Gaussian Mixture Models
hou feng lei ; zhang kun fan ; wang bing xi
..............
page:43-45
QCELP Vocoders Design in CDMA System
qi yong jie ; zhang li zhi ; lu jie qing ; wei yong gao
..............
page:39-42
Peak-to-Average Power Ratio in Higher-Order MC-CDMA
zhang li zhi ; qi yong jie ; lu jie qing ; li tong
..............
page:36-38
The Design and Performance Emulation of 2GHz~25GHz Conical Log-spiral Antenna
zhang de wei ; xing feng ; zhu guo liang ; niu zhong xia
..............
page:32-35
The Optimization Method of Evaluating the Value in a Field Based on Partial Distribution
dai feng ; sun ke wei ; lv liang
..............
page:28-31
Cell Search Algorithm Analysis in WCDMA Systems
liu zheng jun ; ran chong sen ; hu han ying ; zhang xiao yi
..............
page:23-27
Impoved Algorithm Based on NLN Nine_Clipping Algorithm
zhao ren cai ; tang cai yun
..............
page:20-22
On Chinese Complementary Remainder Theorem Ⅰ
lin bai gang
..............
page:17-19
Conditional Correlation Properties of Combiners with 1 Bit Memory
zhang wei ming ; li shi qu
..............
page:13-16
H.235-Recommendation of Security and Encryption for H-Series Multimedia Terminals
liu zuo fang ; zhang ya juan
..............
page:9-12
A Class of Ideal Multi-Secret Sharing Schemes Having the Associated Matroid
gao feng xiu ; huang gen xun ; zhang li min
..............
page:6-8
Recursive Construction Methods of the 4-valued Generalized Bent Functions
liu wen fen ; wang zuo ; li shi qu
..............
page:1-5