中国科学F辑英文版

时间:2022-08-12 01:28:42

中国科学F辑英文版

1.Identification of Wiener systems with nonlinearity being piecewise-linear function HUANG YiQing,CHEN HanFu,FANG HaiTao

2.A novel algorithm for explicit optimal multi-degree reduction of triangular surfaces HU QianQian,WANG GuoJin

3.New approach to the automatic segmentation of coronary artery in X-ray angiograms ZHOU ShouJun,YANG Jun,CHEN WuFan,WANG YongTian

4.Novel Ω-protocols for NP DENG Yi,LIN DongDai

5.Non-coherent space-time code based on full diversity space-time block coding GUO YongLiang,ZHU ShiHua

6.Recursive algorithm and accurate computation of dyadic Green's functions for stratified uniaxial anisotropic media WEI BaoJun,ZHANG GengJi,LIU QingHuo

7.A blind separation method of overlapped multi-components based on time varying AR model CAI QuanWei,WEI Ping,XIAO XianCi

8.Joint multiple parameters estimation for coherent chirp signals using vector sensor array WEN Zhong,LI LiPing,CHEN TianQi,ZHANG XiXiang

9.Vision implants: An electrical device will bring light to the blind NIU JinHai,LIU YiFei,REN QiuShi,ZHOU Yang,ZHOU Ye,NIU Shuai

bining search space partition and search Space partition and abstraction for LTL model checking PU Fei,ZHANG WenHui

2.Dynamic replication of Web contents Amjad Mahmood

3.On global controllability of affine nonlinear systems with a triangular-like structure SUN YiMin,MEI ShengWei,LU Qiang

4.A fuzzy model of predicting RNA secondary structure SONG DanDan,DENG ZhiDong

5.Randomization of classical inference patterns and its application WANG GuoJun,HUI XiaoJing

6.Pulse shaping method to compensate for antenna distortion in ultra-wideband communications WU XuanLi,SHA XueJun,ZHANG NaiTong

7.Study on modulation techniques free of orthogonality restriction CAO QiSheng,LIANG DeQun

8.Joint-state differential detection algorithm and its application in UWB wireless communication systems ZHANG Peng,BI GuangGuo,CAO XiuYing

9.Accurate and robust estimation of phase error and its uncertainty of 50 GHz bandwidth sampling circuit ZHANG Zhe,LIN MaoLiu,XU QingHua,TAN JiuBin

10.Solving SAT problem by heuristic polarity decision-making algorithm JING MingE,ZHOU Dian,TANG PuShan,ZHOU XiaoFang,ZHANG Hua

1.A novel formal approach to program slicing ZHANG YingZhou

2.On Hamiltonian realization of time-varying nonlinear systems WANG YuZhen,Ge S. S.,CHENG DaiZhan

3.Primary exploration of nonlinear information fusion control theory WANG ZhiSheng,WANG DaoBo,ZHEN ZiYang 4.Center-configuration selection technique for the reconfigurable modular robot LIU JinGuo,WANG YueChao,LI Bin,MA ShuGen,TAN DaLong

5.Stabilization of switched linear systems with bounded disturbances and unobservable switchings LIU Feng

6.Solution to the Generalized Champagne Problem on simultaneous stabilization of linear systems GUAN Qiang,WANG Long,XIA BiCan,YANG Lu,YU WenSheng,ZENG ZhenBing

7.Supporting service differentiation with enhancements of the IEEE 802.11 MAC protocol: Models and analysis LI Bo,LI JianDong,Roberto Battiti

8.Differential space-time block-diagonal codes LUO ZhenDong,LIU YuanAn,GAO JinChun

9.Cross-layer optimization in ultra wideband networks WU Qi,BI JingPing,GUO ZiHua,XIONG YongQiang,ZHANG Qian,LI ZhongCheng

10.Searching-and-averaging method of underdetermined blind speech signal separation in time domain XIAO Ming,XIE ShengLi,FU YuLi

11.New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities WANG Jian,ZHANG Lin,SHAN XiuMing,REN Yong

1.Fractional Fourier domain analysis of decimation and interpolation MENG XiangYi,TAO Ran,WANG Yue

2.A reduced state SISO iterative decoding algorithm for serially concatenated continuous phase modulation SUN JinHua,LI JianDong,JIN LiJun

3.On the linear span of the p-ary cascaded GMW sequences TANG XiaoHu

4.De-interlacing technique based on total variation with spatial-temporal smoothness constraint YIN XueMin,YUAN JianHua,LU XiaoPeng,ZOU MouYan

5.Constrained total least squares algorithm for passive location based on bearing-only measurements WANG Ding,ZHANG Li,WU Ying

6.Phase noise analysis of oscillators with Sylvester representation for periodic time-varying modulus matrix by regular perturbations FAN JianXing,YANG HuaZhong,WANG Hui,YAN XiaoLang,HOU ChaoHuan

7.New optimal algorithm of data association for multi-passive-sensor location system ZHOU Li,HE You,ZHANG WeiHua

8.Application research on the chaos synchronization self-maintenance characteristic to secret communication WU DanHui,ZHAO ChenFei,ZHANG YuJie

9.The changes on synchronizing ability of coupled networks from ring networks to chain networks HAN XiuPing,LU JunAn

10.A new approach to consensus problems in discrete-time multiagent systems with time-delays WANG Long,XIAO Feng

11.Unified stabilizing controller synthesis approach for discrete-time intelligent systems with time delays by dynamic output feedback LIU MeiQin

1.Survey of information security SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu

2.Analysis of affinely equivalent Boolean functions MENG QingShu,ZHANG HuanGuo,YANG Min,WANG ZhangYi

3.Boolean functions of an odd number of variables with maximum algebraic immunity LI Na,QI WenFeng

4.Pirate decoder for the broadcast encryption schemes from Crypto 2005 WENG Jian,LIU ShengLi,CHEN KeFei

5.Symmetric-key cryptosystem with DNA technology LU MingXin,LAI XueJia,XIAO GuoZhen,QIN Lei

6.A chaos-based image encryption algorithm using alternate structure ZHANG YiWei,WANG YuMin,SHEN XuBang

7.Impossible differential cryptanalysis of advanced encryption standard CHEN Jie,HU YuPu,ZHANG YueYu

8.Classification and counting on multi-continued fractions and its application to multi-sequences DAI ZongDuo,FENG XiuTao

9.A trinomial type of σ-LFSR oriented toward software implementation ZENG Guang,HE KaiCheng,HAN WenBao

10.Identity-based signature scheme based on quadratic residues CHAI ZhenChuan,CAO ZhenFu,DONG XiaoLei

11.Modular approach to the design and analysis of password-based security protocols FENG DengGuo,CHEN WeiDong

12.Design of secure operating systems with high security levels QING SiHan,SHEN ChangXiang

13.A formal model for access control with supporting spatial context ZHANG Hong,HE YePing,SHI ZhiGuo

14.Universally composable anonymous Hash certification model ZHANG Fan,MA JianFeng,SangJae MOON

15.Trusted dynamic level scheduling based on Bayes trust model WANG Wei,ZENG GuoSun

16.Log-scaling magnitude modulated watermarking scheme LING HeFei,YUAN WuGang,ZOU FuHao,LU ZhengDing

17.A digital authentication watermarking scheme for JPEG images with superior localization and security YU Miao,HE HongJie,ZHANG JiaShu

18.Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR HUANG XianGao,HUANG Wei,WANG Chao,L(U) ZeJun,HU YanHua

1.Analysis of security protocols based on challenge-response LUO JunZhou,YANG Ming

2.Notes on automata theory based on quantum logic QIU DaoWen

3.Optimality analysis of one-step OOSM filtering algorithms in target tracking ZHOU WenHui,LI Lin,CHEN GuoHai,YU AnXi

4.A general approach to attribute reduction in rough set theory ZHANG WenXiuiu,QIU GuoFang,WU WeiZhi

5.Multiscale stochastic hierarchical image segmentation by spectral clustering LI XiaoBin,TIAN Zheng

6.Energy-based adaptive orthogonal FRIT and its application in image denoising LIU YunXia,PENG YuHua,QU HuaiJing,YiN Yong

7.Remote sensing image fusion based on Bayesian linear estimation GE ZhiRong,WANG Bin,ZHANG LiMing

8.Fiber soliton-form 3R regenerator and its performance analysis ZHU Bo,YANG XiangLin

9.Study on relationships of electromagnetic band structures and left/right handed structures GAO Chu,CHEN ZhiNing,WANG YunYi,YANG Ning

10.Study on joint Bayesian model selection and parameter estimation method of GTD model SHI ZhiGuang,ZHOU JianXiong,ZHAO HongZhong,FU Qiang

上一篇:中国气象科学研究院年报 下一篇:中国科学D辑英文版