column
    Engineering Design of the Transient Back-Cavity Bowtie Antenna
    ZHOU You, PAN Jin, NIE Zai-ping
    2005, 34(1): 1-3,7.
    Abstract PDF
    Current Statistical Probabilistic Data Association Algorithm
    ZHANG Jing-wei, XIONG Wei, HE You
    2005, 34(1): 4-7.
    Abstract PDF
    Edge Clone of Medical Image
    ZHANG Guang-yu, ZHU Wei-le
    2005, 34(1): 8-11.
    Abstract PDF
    A FPGA-Base High-Speed Image Pre-Processing System Design
    WANG Yu-zhou, JIN Sheng-zhen
    2005, 34(1): 12-15.
    Abstract PDF
    A Digital Multi-Beams Algorithm of DOA Estimation Based on FFT
    LONG Ning, ZHANG Feng-li
    2005, 34(1): 16-18.
    Abstract PDF
    Near-Zone Field Strength of Aperture Antenna
    ZHANG Jia-kun, HU Hao-quan, YANG Xian-qing, ZHAO Jia-sheng
    2005, 34(1): 19-21,52.
    Abstract PDF
    A Study on Measurement of “Cold Test Parameters” of TWT
    GUO Gao-feng, LI En, ZHANG Qi-shao, LI Hong-fu
    2005, 34(1): 22-25.
    Abstract PDF
    A Simple Trimming Method Used in Power IC
    LI Yong-hong, LAN Jia-long, HANG Shun-kang, ZHANG Yun-chao
    2005, 34(1): 26-28.
    Abstract PDF
    A Practical Method of Chaos Secret Coding
    ZHANG Yong, CHEN Tian-qi, CHEN Bin
    2005, 34(1): 29-32.
    Abstract PDF
    Design of Suspended Interdigital Bandpass Filter
    HUANG Wei, FENG Quan-yuan
    2005, 34(1): 33-35.
    Abstract PDF
    An Application of Simulated Annealing Algorithm in Model-Based Reasoning Intrusion Detection
    CHEN Bo, YU Ling, XIAO Jun-mo
    2005, 34(1): 36-39.
    Abstract PDF
    Reduced Complexity Decoding Algorithms for Irregular Repeat Accumulate Codes
    GAO Hong-feng, XU Zong-ze, WU Yuan-ming
    2005, 34(1): 40-43.
    Abstract PDF
    Extraction of Comprehensive Information of Multi-Station Monitoring Data of Landslide
    GUO Ke, PENG Ji-bing, XU Qiang
    2005, 34(1): 44-47.
    Abstract PDF
    Research on Synchronization Technique for a High-Speed FH Communication System
    JIANG Ding-shun, JIN Li-jun
    2005, 34(1): 48-52.
    Abstract PDF
    A Software Reliability Model with Exponential Repair Time
    SUN Jing, LIU Xiao-ming
    2005, 34(1): 53-56.
    Abstract PDF
    A New Call Admission Control Scheme in Mobile Networks and Its Performance Analysis
    ZHANG Xin, LU Jun
    2005, 34(1): 57-60,72.
    Abstract PDF
    An Efficient Anonymity Mutual Authentication Protocol
    WAN Ren-fu, LI Fang-wei, ZHU Jiang
    2005, 34(1): 61-64.
    Abstract PDF
    Practical Scheme for Multi-Step JD Technology in SCDMA System
    YANG Feng-rui
    2005, 34(1): 65-68.
    Abstract PDF
    Characteristics of Open-Type LHM Microwave Filter and Its Design
    GAO Zheng-ping, LIU Xue-qing, FAN Yu
    2005, 34(1): 69-72.
    Abstract PDF
    Design of High Efficient Low-Voltage Negative Voltage Tripler
    XU Jun-yu, GAO Zheng-ping
    2005, 34(1): 73-76.
    Abstract PDF
    Design and Implementation of a New High-Frame Rate PA Camera
    GUO Ming-an, LI Bin-kang, HAO Wen-xi, RUAN Lin-bo, FENG Bing
    2005, 34(1): 77-80.
    Abstract PDF
    Dynamic Tracking Algorithm of the Parameters of the Moving Camera
    LUO De-yuan, QIN Dong-xing, HUANG Da-gui
    2005, 34(1): 81-84.
    Abstract PDF
    Design Method for Servo-System Based on Disturbance Observer
    ZHANG Shao-de, CHEN Zhu-cheng
    2005, 34(1): 85-88.
    Abstract PDF
    A Fast Search Algorithm For Carrier Phase Integer Ambiguity
    FAN Sheng-lin, ZHAO Wei, YUAN Xin
    2005, 34(1): 89-93.
    Abstract PDF
    An Analysis of Netfilter and Its Implementation in Active Response
    GAN Ying-hui, LIU Yong, QIN Zhi-guang
    2005, 34(1): 94-96.
    Abstract PDF
    Type of Architecture of QoS-Capable IPSec Security Device
    HE Jun, TAN Xing-lie, LI Xin, XIE Jing-tao, ZHOU Ming-tian
    2005, 34(1): 97-100.
    Abstract PDF
    GMPLS Recovery Algorithm Based on Constrained
    ZHAO Ji-hong, Qu HUA
    2005, 34(1): 101-104.
    Abstract PDF
    New Route Algorithms of Unstructured P2P Systems
    HOU Meng-shu, LU Xian-liang, ZHOU Xu, ZHAN Chuan
    2005, 34(1): 105-108.
    Abstract PDF
    Threshold Digital Signature Scheme Based on ECC and Its Security
    QIN Zhi-guang, ZHANG Xian-feng, ZHOU Shi-jie, LIU Jin-de
    2005, 34(1): 109-112.
    Abstract PDF
    Role Based and Service Unit Based Network Architecture
    YE Ya-lan, ZENG Jia-zhi, YANG Guo-wei
    2005, 34(1): 113-116.
    Abstract PDF
    Development of PLX 9050 PCI Device Driver on Windows 2000
    BIE Qi-zhang
    2005, 34(1): 117-120.
    Abstract PDF
    Arbitrary Perturbation Bounds on Diagonalizable Matrix
    CHEN Jian-xin
    2005, 34(1): 121-123.
    Abstract PDF
    Fuzziness in Rough Sets
    SHU Lan, ZHAO Lei
    2005, 34(1): 124-126.
    Abstract PDF
    Detection of Outliers from the Two-Parameter Exponential Distribution
    LI Yun-fei, HUANG Ji-wei, ZHU Hong
    2005, 34(1): 127-130.
    Abstract PDF
    Fixed Point of Mixed Type Monotone Operator and Its Application
    WANG Yan-yuan, GAO Li-feng
    2005, 34(1): 131-133.
    Abstract PDF
    Stability Analysis of Periodic Solution of Variable Coefficient and Time-Delay Hopfield Neural Networks
    ZHU Wen-li, ZHANG Jie
    2005, 34(1): 134-136.
    Abstract PDF
    A Study on the Economic Mechanism of the Bullwhip Effect in Supply Chain
    LIU Yu-hai, TANG Xiao-wo, NI De-bing
    2005, 34(1): 137-140.
    Abstract PDF
    Study of Customer Service Level Based on Customer Demand Not Lost Completely
    LIU Lei, TANG Xiao-wo
    2005, 34(1): 141-144.
    Abstract PDF
    Baidu
    map