Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
IT Age
1007-7820
2008 Issue 3
jian xun
..............
page:33,48,52,72
Overview of Modern DDS and Its Research Progress
Zhang Tao;Chen Liang
..............
page:73-78
A Novel Transform Matrix Used for Image Scrambling
Wu Yali
..............
page:69-72
Principles of Soft Decoding and Quantization Decoding of Low-Density Parity-Check Coooles
Ren Yuan;Luan Yingzi
..............
page:66-68,78
Image Inpainting Algorithm Based on TV-Stokes Equation
Wu Weiliang
..............
page:63-65
Application of Multiple-Parameter Discrete Fractional Fourier Transform
Zhou Meili;Bai Zongwen;Uu Shengchun
..............
page:59-62
Improvement of Algorithm in Correlating Interferometer Direction Finding
Dong Chuangang;Zhao Guoqing
..............
page:56-58
Performance Analysis of DSR Protocol in Large-scale Mobile Ad Hoc Networks
Zhang Zhetao;Xie Wei;Zhang Bei;Cao Yong
..............
page:53-55,58
A UWB Pulse Shapes Modulation Scheme Based on Modified Hermite Polynomials
Huang Ni;Zeng Yicheng
..............
page:49-52
A New Method for Constructing Families of Dyadic Complementary Sequences Pairs
Jin Huilong;Liu Yachuan
..............
page:46-48
The Application of Configurable Processor in SoC
Wan Min;Xie Jing;Quan Nanyi
..............
page:43-45
Research into the Technology of Modulation and Acquisition for CPM
He Wei;Du Shuanyi;Yu Jie
..............
page:38-42
Hardware Design and Implementation of Intelligent System for Automobile Guard and Navigation Based on NiosⅡ
Zhou Biao
..............
page:34-37,42
Design and Analysis of Planar Inverted-F Antenna for RFID Using FDTD Method
Yan Lifei;Yang Mingwu;Li Nan
..............
page:30-33
FA Case Study of the Application of EA-CVD Pt Technique in the DB-FIB System
Chen Qiang;Wang Hui;Li Ming
..............
page:26-29
The Design of Multifunctional Solar Power Supply System
Yang Guangsong;Liu Jirong
..............
page:21-25
Physical Verification in FFT Layout with Calibre
Wang Renping;Yu Ying
..............
page:16-20
Terminal Security Protection of Classified Intranets
Xiao Zhiting;Yue Yingying;Long Xinyu
..............
page:13-15,20
Study of the Detection of Variable or Polymorphic Viruses Based on Immune Principles
Zhang Qiuyu;Zhao Li
..............
page:9-12
Design for Information Security Risk Evaluation and Control Platform Based on Audit Methodology
Wei Zhong;Ye Ming;Chen Changsong
..............
page:4-8
Exploitation of a LAN Security Supervising System Based on C/S Model
Xiao Lijie;Zeng Ping
..............
page:1-3,8