|
Issue |
Title |
|
Vol 12, No 6: June 2014 |
A Dual-Microphone Speech Enhancement Algorithm for Close-Talk System |
Abstract
PDF
|
Yi Jiang, Zhenming Feng, Yuanyuan Zu, Xi Lu |
|
Vol 11, No 6: June 2013 |
A Dynamic Hashing Algorithm Suitable for Embedded System |
Abstract
PDF
|
Li Jianwei, Chen Huijie |
|
Vol 11, No 3: March 2013 |
A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks |
Abstract
PDF
|
Enjian Bai, Xueqin Jiang |
|
Vol 12, No 3: March 2014 |
A Dynamic Multi-nest Ant Colony Algorithm for Aircraft Landing Problem |
Abstract
PDF
|
Feng Xiao-rong, Feng Xing-jie, Liu Dong |
|
Vol 12, No 1: January 2014 |
A Dynamic Non-interference Trust Chain Model Based on Security Process Algebra |
Abstract
PDF
|
Xiaoxing Wang, Xiangying Kong, Xuebing Chen |
|
Vol 12, No 8: August 2014 |
A Dynamic Selection Algorithm on Optimal Auto-Response for Network Survivability |
Abstract
PDF
|
Jinhui Zhao, Yujia Sun, Liangxun Shuo |
|
Vol 12, No 5: May 2014 |
A Fast Beef Marbling Segmentation Algorithm Based on Image Resampling |
Abstract
PDF
|
Bin Pang, Xiao Sun, Xin Sun, Kunjie Chen |
|
Vol 12, No 1: January 2014 |
A Fast Thresholding Technique in Image Binarization for Embedded System |
Abstract
PDF
|
Jinkun Dou, Weijun Zhang |
|
Vol 11, No 11: November 2013 |
A Fault Area Location Method in Distribution Network With DG |
Abstract
PDF
|
Zhongjian Kang, Aina Tian, Zhe Bai |
|
Vol 12, No 10: October 2014 |
A Fault Detection Mechanism Based on Artificial Neural Network Distributed in Tunnel |
Abstract
PDF
|
Liu Liu, Ma Chengqian |
|
Vol 12, No 9: September 2014 |
A Flux Weakening Control Algorithm Based on Notch Filter |
Abstract
PDF
|
Yu Jiabin, Wang Xiaoyi, Xu Jiping, Qin Xiaofei, Zheng Jun |
|
Vol 12, No 1: January 2014 |
A Formal Model of Trust Chain based on Multi-level Security Policy |
Abstract
PDF
|
Kong Xiangying, Zhuang Yi, Wang Xiaoxing |
|
Vol 11, No 11: November 2013 |
A Frame Synchronization Algorithm Based on LLR Threshold of LDPC Decoding Value |
Abstract
PDF
|
Zhixiong Chen, Dongsheng Han, Hongyin Xiang |
|
Vol 11, No 8: August 2013 |
A Framework For Concept Drifting P2P Traffic Identification |
Abstract
PDF
|
Guanghui Yan, Minghao Ai |
|
Vol 11, No 9: September 2013 |
A Framework of Concurrent Mechanism Based on Java Multithread |
Abstract
PDF
|
Wuxue Jiang, Qi Li, Zhiming Wang, Jianfeng Luo |
|
Vol 11, No 3: March 2013 |
A Framework of Fingerprint Scaling |
Abstract
PDF
|
Chunxiao Ren, Jianmin Guo, Dong Qiu, Guolei Chang, Yuxiao Wu |
|
Vol 11, No 12: December 2013 |
A Future Home Power System with Contactless Power Transmission Technologies |
Abstract
PDF
|
Lan Jian Yu, Tang Hou Jun |
|
Vol 15, No 3: September 2015 |
A Fuzzy Controller for Compensation of Voltage SAG/SWELL Problems Using Reduced Rating Dynamic Voltage Restorer |
Abstract
PDF
|
Rajesh Damaraju, S.V.N.L. Lalitha |
|
Vol 11, No 5: May 2013 |
A Fuzzy Self-tuning Controlled Feeding Servo System of Machine Tool |
Abstract
PDF
|
Yueshan Wang, Liwan Chen, Zenghan Chen |
|
Vol 11, No 10: October 2013 |
A Gait Recognition System using GA-based C-SVC and Plantar Pressure |
Abstract
PDF
|
Yanbei Li, Lei Yan, Hua Qian |
|
Vol 11, No 7: July 2013 |
A General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System |
Abstract
PDF
|
Yulian Shang, Wuyuan Jia, Lanhua Zhang, Yufei Zhang |
|
Vol 12, No 10: October 2014 |
A Geometric Invariants Approach for Molecular Docking |
Abstract
PDF
|
He Jinao, Fu Hongguang, Long Huan |
|
Vol 11, No 7: July 2013 |
A Gravitational Edge Detection for Multispectral Images |
Abstract
PDF
|
Genyun Sun, Zhenjie Wang |
|
Vol 12, No 8: August 2014 |
A Grey Relation Analysis Method to Vibration Fault Diagnosis of Hydroelectric Generating Set |
Abstract
PDF
|
Wang Ruilian, Gao Shengjian |
|
Vol 11, No 9: September 2013 |
A Hardware Time Stamping Method for PTP Messages Based on Linux system |
Abstract
PDF
|
Zhi Li, Zhen-lin Zhong, Wang-chun Zhu, Bin-yi Qin |
|
51 - 75 of 2337 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |