Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Information Engineering University
1671-0673
2016 Issue 1
Research on Non-Linear Companding Transform of PAPR Reduction in Visible Light Communication OFDM System
ZHANG Jun;,ZHANG Jian;
..............
page:1-5
Passive Source Localization Algorithm of Using Multiple Receivers from TDOA and FDOA Measurements with a Calibration Emitter
WU Wei;,YU Hongyi;,XIAN Ming;,JIA Fangsheng;
..............
page:6-10,16
Compressed Sensing Based on Random Projection of Observation Nodes with Unequal Probabilities
LI Dan;,LI Ou;,ZHANG Xiang;
..............
page:11-16
Research on GMSK Mixing Signals Separation Algorithm Based on BCJR
DU Sen;,YANG Yuhong;,XIN Gang;
..............
page:17-20
Dynamic Service Request-Based Reconfigurable Service Carrying Network Construction
LIANG Ningning;,LAN Julong;,ZHANG Zhen;
..............
page:21-25
Method of Multiple Parameters Estimation for the Distributed MIMO-OFDM System
HUANG Yanyan;,PENG Hua;
..............
page:26-29
Adaptive Blind Equalization Algorithm for Continuous Phase Modulation Signals over Time-Varying Channels
ZHONG Kai;,PENG Hua;,GE Lindong;
..............
page:30-33,47
Modulation Recognition for Time-Frequency Overlapped Signals in Single-Channel under Blind Reception Conditions
ZHANG Hongchao;,OUYANG Xi;,ZHANG Dongling;
..............
page:34-40
Modulation Recognition Methods Based on Real Normalized Compression Cyclic Statistics
KONG Yujing;,HUANG Yan;,MA Jinquan;
..............
page:41-47
Semantic Search of Local Records Data Based on Solr and Ontology
HAN Xueren;,WANG Qingshan;,GUO Yong;,ZHAO Ying;
..............
page:48-52
Congestion Control Mechanism of Inter-Satellite Link Based on Session Management
ZHANG Yi;,ZHAI Xiujun;,DU Xuehui;,XU Guoyu;
..............
page:53-58
Code Reuse Attack Mitigation Based on Unreadable Property of Executable Memory
YANG Chao;,WANG Qingxian;,WEI Qiang;
..............
page:59-64
Design and Immplementation of Authentication System Based on USB Key
WANG Feilong;,YIN Qing;,GUO Yudong;,ZHUANG Kuan;
..............
page:65-70
Dynamic Routing Mechanism in Network Simulation Based on Topology-Aware Time Series
SUN Leigang;,ZHANG Mingqing;,DONG Shuqin;,LIU Xiangjun;
..............
page:71-76
Testing Method of Binary Codes Based on Abstract Interpretation
ZHOU Lin;,SUN Yulong;,GAN Shuitao;,QIN Xiaojun;
..............
page:77-82
Dynamic Scheduling Algorithm for Reduce Task in Hadoop
SUI Ran;,DU Jiang;,TAI Ming;,ZHANG Yong;,ZHANG Weihua;
..............
page:83-87,96
Review of Big Data Stream Computing System Study
LI Sheng;,HUANG Yongzhong;,CHEN Haiyong;
..............
page:88-92
Forward-Secure Ring Signature Scheme from Lattices
WANG Qingbin;,CHEN Shaozhen;,REN Jiongjiong;
..............
page:93-96
Research on Risk Evaluation of Airborne Area Selection Based on Probability Influence Diagram
ZHAO Fei;,WANG Qingshan;,REN Liucheng;
..............
page:97-101
xin xi gong cheng da xue xue bao zheng gao jian ze
..............
page:封3
SIP Authentication Key Agreement Protocol Based on ECDLP
CAO Yang;
..............
page:102-105
Emergency Thematic Map Design Based on the Eye Tracking Experiments and Template Technologies
ZHENG Shulei;,LI Ying;,FANG Xiao;,QIAN Lingtao;
..............
page:106-111
Inspection of Robot Route Angle Detection Based on LSD
ZHU Yongfeng;,CAO Wen;,ZHU Shulong;,ZHANG Jingjing;,WANG Xiaopan;
..............
page:112-116
Work Performance Evaluation Model of Student's Camp under the Company Management
WEN Chengyu;,LIU Lei;,ZOU Hong;
..............
page:117-122
Automatic Detecting and Processing Method Dealing with Requirement Conflict of Control and Command Information System
SHU Zhen;,LIU Junxian;,CHEN Honghui;
..............
page:123-128