Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2004 Issue 3
Pseudolites and Their Applications
shao gao ping
..............page:98-102
The Method of Geostationary Satellite Positioning Based on Road and its Developing Foreground
yin xiao long ; liu li ; qin yong zhi ; zhang hong wei
..............page:94-97
The Iterative Decoding Principle of Convolutional Codes
li zhi yong ; wang yun he ; liu yu jun
..............page:89-93
Study of Information Hiding Based on RS Code in Noise Channel Technology
wang tian yu ; liu yu jun ; tang dong ming ; liu cui qing
..............page:85-88
Address Group Convolutional Interleaving Encoding of Block Code
liu cui qing ; wang yun he ; liu yu jun ; wang tian yu ; yang zhong li
..............page:82-84
A New Variable-Length Receiving Window Based Demodulation Method for OFDM
chen chao ; ge lin dong
..............page:75-77
An Auto Multi-Threshold Cancerous Cell Image Segmentation Based On Iteration
guo ge ; ping xi jian ; hu min ; zhou li li
..............page:72-74
Moving Objects Detection Based On Background Reconstruction
shen hai lang ; ping xi jian ; xu zhi yong
..............page:69-71
Design and Implementation of MPEG4 PCI Board
lu hong hai ; guo juan ; qi wen ya
..............page:66-68
The Design and EDA Simulation of Microwave Broadband Amplifier
wang xian fu ; niu zhong xia
..............page:63-65
Design of Date Collection and Transfer System Based on GSM
zheng bin ; liu jian zhou ; zhou wei
..............page:60-62
The Statistic Relativities of Random Variable Sequences on Z4 and Those on GF(2)
liu wen fen ; liu qing hai ; zhang zuo ru
..............page:10-13
Information Flow Models Based on Security Process Algebra
yin qing ; zhou wei ; guo jin geng
..............page:5-9
Linear Recurring Sequences with Cycle Shift Operator over F4
shen yong ; he kai cheng ; han wen bao
..............page:1-4
A PCA Based Unsupervised Anomaly Detection Approach
wang kun ; pan ji nong ; zhang peng ; guo yun fei
..............page:56-59
Electric Power Marketing Management Information System Based on J2EE
zhu wei hua ; yao chun yu ; li lei
..............page:53-55
Design Principle and Implementation Technology of ISUP
chen fu cai ; liu wen bo ; wei hong quan
..............page:46-49
Feature Analysis and Defence Policy of New Network Worm
jia xue dong ; chen ; zhang xiao yan ; meng jian
..............page:42-45
The Design of Database Based on Expert System of Radar Radiating-Source Recognizing
wang quan xiang ; huang jie ; zhao yong jun
..............page:38-41
Message Communication Model and Monitoring Perturbation Compensation Algorithm Analysis
zhang hui cheng ; wei hong ; du zhu ping
..............page:33-37
The Component and Vista of the Key Element of Information Security System
yang jin yin ; li de zhou
..............page:29-32
Application Research on XKMS-Based Security Service Mechanism
chen li ; zhang hao jun
..............page:25-28
A Comprehensive Evaluating Model of the National Defense Security
qin zi fu ; you chun ting ; dai feng
..............page:22-24
The Optimum Route Algorithm for Dynamic Network Based on Genetic Algorithms
liu jian qiang ; liu fen lin
..............page:14-18