Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2011 Issue 4
Frame Selection Research of the Turbulence Degraded Images
SONG Xiang;WANG Lan;ZHANG Ling-kui;WANG Luo-fei;WEI Xiao-feng
..............page:488-493
New Hierarchical Secure Access Authentication Scheme in Mobile IPv6 Networks
WANG Gang;GUO Yuan-bo;LIU Wei
..............page:396-399,403
NLOS Error Mitigation Algorithm Based on Third-Order Cumulant and Its Application in WCDMA System
WANG Jian-hui;HU Han-ying;REN Xiu-kun
..............page:409-413,421
Electromagnetic Pulse Effects and Protection Analysis of Microstrip Line on Printed Circuit Board
YU Qun;WANG Ya-di;HAN Ji-hong;HAN Dong;HOU Wei
..............page:432-436
Fast Link State Estimation Algorithm
WAN Cheng-wei
..............page:414-417
Method for Content Redirection Based on Traffic Management in Multimedia Distribution System
HU Yu-xiang;DONG Fang;WAN Cheng-wei
..............page:418-421
Implementation of Fisher Classification with Kernels in PolSAR Images
HE Zheng-rong;WANG Gang;WANG Fan
..............page:473-477,499
Wavelet Threshold De-Noising of FOG Dynamic Signal Based on Generalized Cross-Validation
DONG Ming;JIA Xue-dong;CHEN Po;LV Jing
..............page:482-487
Research on Optimization Algorithm of Layered Muiticast Throughput with Multiple Source Media Based on Network Coding
WU Jun-ting;JI Xin-sheng;DU Yong-zhe;WANG Ting
..............page:422-427,451
Grid Computing on Large-Scale Geodetic Network Adjustment
CHEN Zheng-sheng;LV Zhi-ping;XU Lin-lin;CUI Yang
..............page:463-467
Password-Based Authenticated Key Exchange Protocol Based on Chameleon Hash Function
WEI Fu-shan;LIU Ying;MA Chuan-gui
..............page:385-390
State Machine Skip Fault Attacks on Elliptic Curve Scalar Multiplication
ZHU Wei-wei;YAN Ying-jian
..............page:404-408
New Method of Compensation for Profile
ZHANG Kun-fan;MA De-bao;WANG Feng;LI Bing-ning
..............page:452-457
Application of Genetic Simulated Annealing Algorithm in Military Geography Information Service Composition
HUANG Wei-jie;WANG Qing-shan;WEN Bo;ZHANG ling-kui
..............page:468-472
Research on Dimensionality Reduction for Speech Retrieval
CHEN Hong-chang;QI Xiao-qian;HUANG Hai
..............page:441-446
Research on Trust Model Based on Security Evaluation
LIU Fei;CHANG Chao-wen
..............page:504-508
Spatial Cognition Oriented Contour-Tree Building
ZHU Qiang;WU Fang;QIAN Hai-zhong;XIONG Yuan-yuan
..............page:458-462
Study on Some Key Techniques of Thick Cloud Removal in Panchromatic Remote Sensing Image
DONG Bao-gen;QIN Zhi-yuan;ZHOU Li-ya;LI He
..............page:494-499
Research on Hardware-in-the-Loop Simulation Mechanism in OPNET
LI Hong-xin;ZHANG Chuan-fu;FAN Chao
..............page:509-512
Further Research on the Linear Complexity Profile for Binary Sequences
TAN Lin;QI Wen-feng
..............page:400-403
Design and Arithmetic Realization of the Urban Antiterrorism Rescue Model
YUAN Jia-yong;GONG Mao-yu;SONG Liu-yong;YANG Sen
..............page:478-481
Signcryption Scheme with Proxy Unsigncryption
YU Gang;HAN Wen-bao
..............page:391-395
Cross-Layer Based on Anomaly Detection in Wireless Mesh Networks
WANG Hong-yu;LI Mei-hu;HE Yan
..............page:500-503,508
Scattering Property Analysis of High Power Microwave at PEC Rough Surface Based on the Method of Moment
WEI Jin-jin;ZHOU Dong-fang;HOU De-ting;YU Dao-jie
..............page:428-431,467
Space Model of the Optimal Jamming Area for Countermeasure to Satellite Uplink
NIU Chao-yang;SHENG Guang-ming;ZHU Jian-dong;MA De-bao;ZHAO Hui-wen
..............page:447-451