Most cited articles

  • Display Type:
  • Text List
  • Abstract List
  • 1  Hough Transform and Its Application in Declining License Plate
    WANG Liang-hong WANG Jin-ling LIANG Yan-hua
    2004, 2(1).
    [Abstract](7310) [HTML](0) [PDF 0.00 Byte](48) [Cited by](16)
    Abstract:
    A new usage of Hough Transform is introduced in this paper.Firstly,the position and scope of the license plate is located and the image that contains the license plate is picked up.Then, a two-stage Hough transform algorithm is applied to the image to cal
    2  A Forward Secure Strong Proxy Signature
    TAN Zuo-wen LIU Zhuo-jun
    2003, 1(4).
    [Abstract](6440) [HTML](0) [PDF 0.00 Byte](52) [Cited by](15)
    Abstract:
    A forward secure strong proxy signature scheme is proposed on the basis of the proxy signature schemes and forward secure schemes.The security of the proposed scheme relies on the difficulty of solving discrete logarithm problems and the difficulty of com
    3  The Definition and Research Status of Environmental Factor
    HU Bin
    2003, 1(1).
    [Abstract](6823) [HTML](0) [PDF 0.00 Byte](44) [Cited by](12)
    Abstract:
    Based on three generally accepted basic hypotheses, the definition of environmental factor and restricting conditions of constant failure mechanism are discussed.The research status and common study methods of environmental factor are reviewed. Finally, a
    4  Influencing Factor Analysis of Bullet Penetrating Performance and Study on hard target smart Fuze Scheme
    QU Xin-fen SHANG Shun-chang YANG Qing
    2003, 1(3).
    [Abstract](6671) [HTML](0) [PDF 0.00 Byte](41) [Cited by](12)
    Abstract:
    For completing the scheme of hard target smart fuze, several factors influencing the outputting acceleration of the high-G accelerometer such as target material, impact angle, impact velocity, the fixed position of accelerometer, carry plane etc., are put
    5  A Survey of Blind Source Separation
    LI Mu-sen MAO Jian-qin
    2003, 1(1).
    [Abstract](6668) [HTML](0) [PDF 0.00 Byte](56) [Cited by](11)
    Abstract:
    Blind source separation (BSS) is a recently developed methodology used to separate unknown source signals from their mixtures. It has been applied to many fields widely and effectively. The theory and two types of implementation methods-independent compon
    6  Digital Speckle Correlation and its Applications
    Li Ming;Zhang Jue;Wen MaoPing;Li JingMing;Hao Ying
    2005, 3(1)-39,80.
    [Abstract](6005) [HTML](0) [PDF 0.00 Byte](43) [Cited by](11)
    Abstract:
    A technique of full field deformation measuring,i.e.Digital Speckle Correlation (DSC) is introduced in this paper.DSC is utilized to investigate the mechanical failure behaviors of plastic bonded explosive (PBX) with preset crack subjected to compressive
    7  An Image Segmentation Algorithm Based on Maximal Variance Between-Class and Region Growing
    Zhang Ling;He Wei;Guo LeiMin;Chen LiMin
    2005, 3(2)-93,96.
    [Abstract](5488) [HTML](0) [PDF 0.00 Byte](45) [Cited by](11)
    Abstract:
    A segmentation algorithm based on the technique of one-dimension maximal variance between-class and region growing method is proposed in this paper.Firstly,the method of one-dimension maximal variance between-class is used to obtain the optimal segmenting
    8  Simulation of Wavelet Denoising Based on MATLAB
    WU Wei CAI Pei-sheng
    2008, 6(3).
    [Abstract](8065) [HTML](0) [PDF 0.00 Byte](54) [Cited by](11)
    Abstract:
    Wavelet denoising is an important application of wavelet analysis in engineering.The keys of wavelet denoising,namely how to select threshold and how to utilize the threshold to dispose wavelet coefficients,are introduced.Via the noised simulated signal e
    9  Analysis of Influence of Slot on Shielding Effectiveness
    XU Liang
    2008, 6(3).
    [Abstract](5532) [HTML](0) [PDF 0.00 Byte](58) [Cited by](8)
    Abstract:
    为了验证分析金属壳体上的缝隙对屏蔽效能的影响,在理论分析箱体谐振频率和屏蔽效能的基础上,利用全球领先的系统级电磁兼容性仿真分析软件对带缝隙金属箱体的电磁泄露进行了仿真计算,定量分析缝隙对箱体的屏蔽性能的影响,进而提出了缝隙尺寸的限制要求及处理方式。分析结果表明缝隙越短,屏蔽效能越好,也就是说同样的缝隙,用越多的装配螺钉来分断它,屏蔽效能越高。
    10  Survey of Adaptive Filtering Algorithms
    GENG Yan ZHANG Duan-jin
    2008, 6(4).
    [Abstract](5967) [HTML](0) [PDF 0.00 Byte](59) [Cited by](8)
    Abstract:
    On the basis of Least-Mean-Square(LMS) filtering and Recursive-Least-Square(RLS) filtering,the recently developed adaptive filtering algorithms such as the neural network approach,the QR decomposition approach,the unified model algorithm,the high-order cu
    11  Image Encryption Technology Based on DWT Domain
    Yin XianDong;Yao Jun;Tang Dan;Deng Jun;Ren KeYu
    2005, 3(1).
    [Abstract](5910) [HTML](0) [PDF 0.00 Byte](35) [Cited by](7)
    Abstract:
    How to ensure the safety of digital image/video information is the difficulty and hotspot in the domain of information processing technology nowadays. In this paper,the discrete wavelet transform coefficient matrix is adjusted and scrambling transformed b
    12  Design Improvement and Implementation of Authentication Technology Based on OTP
    SUI Zhe FANG Yong LI Min LIU Lin-chao
    2005, 3(4).
    [Abstract](4676) [HTML](0) [PDF 0.00 Byte](48) [Cited by](7)
    Abstract:
    To make authentication work more effective is an important subject in network safety.In this paper,the security of the One Time Password(OTP) is analyzed,the working mechanism of one advanced OTP is presented;the reformative OTP authentication system by P
    13  Application of DSP/BIOS in Video Processing Based on DM642
    HE Wei CHEN Bin ZHANG Ling
    2006, 4(1).
    [Abstract](4990) [HTML](0) [PDF 0.00 Byte](55) [Cited by](7)
    Abstract:
    The development of video processing is complex on DSP generally. In order to improve the performance of the application program and reduce the time of development, the DSP/B1OS multi-threading by DSP/BIOS kernel and the TMS320DM642 are introduced. By this
    14  Status Quo and Development of Stream Cipher
    LUO Qi-bin ZHANG Jian
    2006, 4(1).
    [Abstract](4812) [HTML](0) [PDF 0.00 Byte](57) [Cited by](7)
    Abstract:
    Technologies of cryptography, especially encryption technologies are the core of information security. At first, the principle and category of stream cipher is introduced briefly, then its designing rule and the testing criterion are addressed. Furthermor
    15  A Simple and Fast Image Skeleton Transform
    ZHANG Ruo-wen TENG Qi-zhi SUN Xiao-gang LONG Jianzhong
    2003, 1(1).
    [Abstract](12962) [HTML](0) [PDF 0.00 Byte](259) [Cited by](6)
    Abstract:
    Skeleton transform is an important operation in digital image processing. The existing methods for skeleton transform are either complicated or time consumed, so a simple and fast method is presented. It uses a landing and taking-off method to implement 2
    16  Research on the Architecture of the Software Radio
    CHEN Da-hai ZHANG Jian XIANG Jin-cheng
    2003, 1(4).
    [Abstract](3976) [HTML](0) [PDF 0.00 Byte](26) [Cited by](6)
    Abstract:
    The architecture of the software radio, including the software and hardware architecture, is one of the key techniques which realize the software radio. In this paper, some applied software and hardware architectures are discussed in detail, in addition,
    17  Current Status and Developing Tendency for High Frequency Communications
    DONG Bin-hong LI Shao-qian
    2007, 5(1).
    [Abstract](4811) [HTML](0) [PDF 0.00 Byte](55) [Cited by](6)
    Abstract:
    High frequency(HF) communications play an important role in the field of their communications because of their skywave propagation characteristics.In this paper,two advanced HF radios are selected to introduce the current status for HF communications.Afte
    18  Design and Implementation of Email Filter System
    SHEN Wei-chao
    2003, 1(2).
    [Abstract](3625) [HTML](0) [PDF 0.00 Byte](51) [Cited by](5)
    Abstract:
    Based on the comprehensive analysis of junk mail and defense techniques, an active defense way with which multi email addresses are classified for different people or group is proposed because of the passive defense and insufficient ability of traditional
    19  The Algorithm Implementation of ECDSA and Security Analysis
    ZHANG Wei
    2003, 1(2).
    [Abstract](4983) [HTML](0) [PDF 0.00 Byte](60) [Cited by](5)
    Abstract:
    The arithmetic rationale of ANSI X9.62 Elliptic Curve Digital Signature Algorithm (ECDSA) is presented and its security is discussed preliminary. Through its program implementation and relative analysis it can be found that this program realizes the basic
    20  Culture Grid of Information Communion
    LI You-ping
    2003, 1(4).
    [Abstract](4526) [HTML](0) [PDF 0.00 Byte](75) [Cited by](5)
    Abstract:
    随着存储技术的进步,利用直播卫星等数字广播通道和整合大量文化资源的内容定位技术,可以建立一个把信息送达全国城乡,任家庭自由收藏、取用的全民共享信息的人文环境:“文化网格”,它是实现大规模远程教育、终身教育和电子文化传媒发行的一种理想机制。

    Current Issue


    Volume , No.

    Table of Contents

    Archive

    Volume

    Issue

    Most Read

    Most Cited

    Most Downloaded