column
A Method of Seam Carving Forensics Based on LBP and Markov Features
GUO Ji-chang, WANG Qiu-zi, ZHAO Jie, QI Qing
2018, 47(4): 481-485. DOI: 10.3969/j.issn.1001-0548.2018.04.001
Abstract PDF
Time Division Multiplexing Elastic Waveband Switching Algorithm Based on Markov Prediction
MENG Fan-bo, GONG Xiao-xue, GUO Lei, ZHANG Xu
2018, 47(4): 486-490. DOI: 10.3969/j.issn.1001-0548.2018.04.002
Abstract PDF
A New Alternating Iteration Recovery Algorithm for Compressed Channel Estimation with Basis Mismatch
YU Fang-yuan
2018, 47(4): 491-496. DOI: 10.3969/j.issn.1001-0548.2018.04.003
Abstract FullText HTML PDF
Scattering of Multiple Objects Based on Adaptive Multilevel Complex Source Beam Method
SONG Lian-ning, YE Yu-nong, RONG Zhi, HU Jun, NIE Zai-ping
2018, 47(4): 497-501. DOI: 10.3969/j.issn.1001-0548.2018.04.004
Abstract PDF
Anisotropic Scattering Characteristics of an Inhomogeneous Gyromagnetic Sphere
CAO Lei, KANG Kai
2018, 47(4): 502-507. DOI: 10.3969/j.issn.1001-0548.2018.04.005
Abstract PDF
WSN Link Quality Estimation Based on Ornstein-Uhlenbeck Model
YE Run, YAN Bin
2018, 47(4): 508-515. DOI: 10.3969/j.issn.1001-0548.2018.04.006
Abstract PDF
Optimization Synthesis Technique for Cross-Coupled Filter with Frequency Dependent Couplings
ZHANG Yong-liang, SU Tao, WU Bian, ZHOU Run-jing
2018, 47(4): 516-520. DOI: 10.3969/j.issn.1001-0548.2018.04.007
Abstract PDF
Fast Analysis of EM Scattering from PEC Bodies Straddling a Half-Space Interface
QI Xin, NIE Zai-ping, QUE Xiao-feng, HU Jun, WANG Yue
2018, 47(4): 521-525. DOI: 10.3969/j.issn.1001-0548.2018.04.008
Abstract PDF
Output Optimization Control Strategy for Wireless Power Transfer System with Multiple Pickups Using Knapsack Algorithm
DAI Cai-li, DAI Xin
2018, 47(4): 526-531. DOI: 10.3969/j.issn.1001-0548.2018.04.009
Abstract PDF
Research on Location and Contact Control of Heterogeneous Teleoperation Systems
LIU Xia, PAN Cheng-wei
2018, 47(4): 532-538. DOI: 10.3969/j.issn.1001-0548.2018.04.010
Abstract PDF
Estimation of Soil Moisture Based on Bayesian Assimilation
TAN Long-fei, TONG Ling, CHEN Yan
2018, 47(4): 539-544. DOI: 10.3969/j.issn.1001-0548.2018.04.011
Abstract PDF
Measurement of Quartz Crystal Resonator Parameters Based on the Precise Derivation of Zero Phase Frequency
LIU Dong, HUANG Xian-he, TANG Yuan-lin, WANG Yan
2018, 47(4): 545-549. DOI: 10.3969/j.issn.1001-0548.2018.04.012
Abstract PDF
Carbon-Aware Power Optimal Online Algorithm for Green Cloud Data Center
HE Huai-wen, XIAO Tao, CHENG Dong, PENG Zheng, FU Yu
2018, 47(4): 550-557. DOI: 10.3969/j.issn.1001-0548.2018.04.013
Abstract PDF
Survival Situation Awareness Model Based on Survival Cluster Recognition and Prediction
ZHAO Guo-sheng, SHAO Zi-hao, WANG Jian, REN Meng-qi
2018, 47(4): 558-565. DOI: 10.3969/j.issn.1001-0548.2018.04.014
Abstract PDF
Collaborative Parked Vehicle Based Multimedia Content Distribution in Vehicular Ad Hoc Networks
ZHU Jin-qi, SUN Hua-zhi, LIU Nian-bo, MA Chun-mei
2018, 47(4): 566-572, 620. DOI: 10.3969/j.issn.1001-0548.2018.04.015
Abstract PDF
Research and Implementation of Coupling Simulation between MD and KMC
LI Jian-jiang, WEI Peng, YANG Shao-feng, HE Xin-fu, HU Chang-jun
2018, 47(4): 573-579. DOI: 10.3969/j.issn.1001-0548.2018.04.016
Abstract PDF
Proxy Encryption Fuzzy Retrieval Algorithm Based on Local Sensitive Hashing in Cloud Computing
LI Tao-shen, WANG Yi, HUANG Ru-wei
2018, 47(4): 580-587. DOI: 10.3969/j.issn.1001-0548.2018.04.017
Abstract PDF
A Cluster Correlation Power Analysis Attack against Modular Exponentiation Algorithm Based on Double Masking Scheme
WAN Wu-nan, CHEN Jun
2018, 47(4): 588-594. DOI: 10.3969/j.issn.1001-0548.2018.04.018
Abstract PDF
ACHO: An Access Control Scheme Based on Full Homomorphic Encryption for Publish-Subscribe System
WANG Qi-xu, DING Zhe, CHEN Da-jiang, QIN Zhen, QIN Zhi-guang
2018, 47(4): 595-600. DOI: 10.3969/j.issn.1001-0548.2018.04.019
Abstract PDF
Differential Fault Attack on Block Cipher MIBS
WANG Yong-juan, ZHANG Shi-yi, WANG Tao, GAO Yang
2018, 47(4): 601-605. DOI: 10.3969/j.issn.1001-0548.2018.04.020
Abstract PDF
An Efficient Key-Insulated Proxy Re-Encryption Scheme in Certificateless Cryptography
HE Li-bo, LU Zhen-yu, GENG Zhen-wei, QIN Zhi-guang
2018, 47(4): 606-612. DOI: 10.3969/j.issn.1001-0548.2018.04.021
Abstract PDF
A Wavelet Ridge Extraction Algorithm Combined with Spatial Noise Information
WANG Yong, ZOU Hui, RAO Qin-fei, WANG Li-fu
2018, 47(4): 613-620. DOI: 10.3969/j.issn.1001-0548.2018.04.022
Abstract PDF
Deduplication Performance Analysis Based on FSL Dataset
CAO Hui, ZHANG Qin-zheng
2018, 47(4): 621-625. DOI: 10.3969/j.issn.1001-0548.2018.04.023
Abstract PDF
Personalized Micro-Blog Search Model Considering User-Publisher Relationship
ZHANG Yong-tang, LUO Hai-bo
2018, 47(4): 626-632. DOI: 10.3969/j.issn.1001-0548.2018.04.024
Abstract PDF
A Method of Micro-Blog Users' Interests Topic Extraction
YANG Ren-feng, CHEN Duan-bing, XIE Wen-bo
2018, 47(4): 633-640. DOI: 10.3969/j.issn.1001-0548.2018.04.025
Abstract PDF