Proceedings of the First International Conference on Information Science and Electronic Technology

182 authors
Rao, Wei
License Plate Location Using Feedback Control Technology in Complex Environment
Shan, Weijun
A First-Order Differential Power Analysis Attack on HMAC-SM3
Shan, Weijun
A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
Shan, Weijun
A Refined Simple Power Analysis Attack on ECC with Countermeasures
Shan, Weijun
A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
Shen, Zhibo
2-D DOA Estimation of LFM Signals Based on Sparse Representation in Fractional Fourier Domain
Shi, Hongxia
Improved Resource Search Strategy Using Random Walk Based on Node Reputation for Unstructured Mobile P2P Network
Shi, Yue
Improved B-spline Elastic Registration for Medical Image Based on Feature Extraction
Shi, Yue
Optimizing of Real-time Multi-scale Display of DICOM Image Based on CUDA
Tan, Hao
Particle Swarm Optimization with Comprehensive Learning & Self-adaptive Mutation
Tang, Haifeng
Constructing Open Teaching Platform Based on Internet
Teng, Lirong
Constructing Open Teaching Platform Based on Internet
Tian, Xiaochuan
Opinion Mining Research on Chinese Micro-blog
Tian, Xiaolin
3D Simulation Model of Lunar Crater Based on Single CCD Image
Wan, Zhiping
Multi-vehicle Ad-hoc Network Routing Algorithm with Ant and Quantum Particle Swarm Optimization Combined
Wang, Changzhi
Opinion Mining Research on Chinese Micro-blog
Wang, Deli
Constructing Open Teaching Platform Based on Internet
Wang, Haoxiang
An Improved K-means Clustering Algorithm for Complex Networks
Wang, Junlin
3D Simulation Model of Lunar Crater Based on Single CCD Image
Wang, Ke
The Synchronous Algorithm of FTN Signaling on Independent Pilot Symbols
Wang, Kuanquan
Multi-scale Cardiac Electrophysiological Simulation: A GPU-based System by Computational Steering
Wang, Lihui
A First-Order Differential Power Analysis Attack on HMAC-SM3
Wang, Lihui
A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
Wang, Lihui
A Refined Simple Power Analysis Attack on ECC with Countermeasures
Wang, Lihui
A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
Wang, Manxi
A Dual-Broadband Circularly Polarized Slot Antenna for RFID Reader Applications
Wang, Manxi
Tactical Data Link Communication System Performance in Severe Electromagnetic Environment
Wang, Shuihua
3D-DWT Improves Prediction of AD and MCI
Wang, Wei
A Similarity Based Community Division Algorithm
Wang, Xiaomei
Modification of Edon80 to Resist the Key Recovery Attack
Wang, Xue
An Energy Efficient Multipath Routing Algorithm in Wireless Sensor Network
Wang, Yangping
Improved B-spline Elastic Registration for Medical Image Based on Feature Extraction
Wang, Yangping
Optimizing of Real-time Multi-scale Display of DICOM Image Based on CUDA
Wang, Yu
Study About the Trusted and Controllable Technology of the Information Network
Wang, Zelong
Realization of Key Technology of Trusted Network Connect Based on IF-MAP Protocol
Wang, Zhenfei
Application Research of Iterative Detection Strategy in the Crowdsourcing Quality Evaluation
Wei, Wenyou
Primal-Dual Approach for Uniform Noise Removal
Wei, Xiaochuan
Analysis on the Factors Restricting the Development of Solar-thermal Power Generation Industry in China
Weng, Wendi
Detecting Pit Defects on Rail Surface Using A Fast Detection Algorithm Based on Relative Gray Value
Weng, Zhiyuan
An Accurate Diffraction Ultrasound Tomography Images Reconstruction Algorithm Based on LS_NUFFT
Wu, Guangmin
Application of Maxflow/Mincut Algorithm in Phase Unwrapping
Wu, Lu
License Plate Location Using Feedback Control Technology in Complex Environment
Xie, Hao
A Dual-Broadband Circularly Polarized Slot Antenna for RFID Reader Applications
Xie, Hao
Tactical Data Link Communication System Performance in Severe Electromagnetic Environment
Xie, Songjun
Multi-scale Cardiac Electrophysiological Simulation: A GPU-based System by Computational Steering
Xiu, Baoxin
The Robustness of Agile C2 Organizations
Xu, Feng
Coplanar-Waveguide Ultra-Wideband Bandpass Filter Based on Interdigital Structure
Xu, Yunqing
Modification of Edon80 to Resist the Key Recovery Attack
Xu, Yunqing
Stream Cipher Based on Latin Cubes
Xue, Dan
Detection of Sangeang Api Volcano Ash Cloud Based on Remote Sensing Image
Xue, Liang
Pump Fluence Dependence of Ultrafast Carrier Dynamics in Bulk ZnSe
Yang, Chuxi
Improving Location Algorithm Based on Fuzzy Cluster in WSN
Yang, Feng
A Transformation Method of OPM Model to CPN Model for System Concept Development
Yang, Tingting
The Robustness of Agile C2 Organizations
Yang, Yao
The Robustness of Agile C2 Organizations
Yin, Jingyuan
Detection of Sangeang Api Volcano Ash Cloud Based on Remote Sensing Image
Yin, Yuwei
Construct Scheme to Second-period of Headquarters Performance Management System in State Grid
Yu, Ping
An Accurate Diffraction Ultrasound Tomography Images Reconstruction Algorithm Based on LS_NUFFT
Yu, Yijun
Model Merging Method Based on Fast Topology Coloring and Device Fuzzy Matching
Yuan, Yongfeng
Multi-scale Cardiac Electrophysiological Simulation: A GPU-based System by Computational Steering
Zeng, Fanguang
Application of Maxflow/Mincut Algorithm in Phase Unwrapping
Zhang, Chengfang
Remote Estimation of Leaf Water Content Using Spectral Index Derived From Hyperspectral Data
Zhang, Davidwei
A Refined Simple Power Analysis Attack on ECC with Countermeasures
Zhang, Davidwei
A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
Zhang, Jian
Construct Scheme to Second-period of Headquarters Performance Management System in State Grid
Zhang, Ruihan
A Health Care Monitoring Terminal Based on Android Smart Phone
Zhang, Shanzhuo
Multi-scale Cardiac Electrophysiological Simulation: A GPU-based System by Computational Steering
Zhang, Weiming
The Robustness of Agile C2 Organizations
Zhang, Yudong
3D-DWT Improves Prediction of AD and MCI
Zhang, Zhan
Primal-Dual Approach for Uniform Noise Removal
Zhang, Zhimin
A First-Order Differential Power Analysis Attack on HMAC-SM3
Zhang, Zhimin
A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
Zhang, Zhimin
A Refined Simple Power Analysis Attack on ECC with Countermeasures
Zhang, Zhimin
A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
Zhao, Guoqing
2-D DOA Estimation of LFM Signals Based on Sparse Representation in Fractional Fourier Domain
Zhao, Huiqing
Neural Network Blind Equalization Algorithm Based on Feed Forward Neural Network
Zhao, Junjuan
Detection of Sangeang Api Volcano Ash Cloud Based on Remote Sensing Image
Zhao, Zhan
A Health Care Monitoring Terminal Based on Android Smart Phone
Zheng, Zhiyun
Application Research of Iterative Detection Strategy in the Crowdsourcing Quality Evaluation
Zhou, Wenlu
A Transformation Method of OPM Model to CPN Model for System Concept Development
Zhou, Zhen
Application of Maxflow/Mincut Algorithm in Phase Unwrapping
Zhu, Yifan
A Transformation Method of OPM Model to CPN Model for System Concept Development