Mimo radar imaging model and algorithm Huaijun WangWentai LeiYi Su OriginalPaper 19 December 2009 Pages: 577 - 583
Clutter suppression method in GPR using particle clustering Cewu LuXiaojun LiuGuangyou Fang OriginalPaper 19 December 2009 Pages: 584 - 587
Spectrum sharing in iterated Prisoner’s Dilemma game based on evolutionary strategies for Cognitive Radios Feng TianZhen Yang OriginalPaper 19 December 2009 Pages: 588 - 599
Partially blind extraction of continuous chaotic signals from a linear mixture Wen HuZhong LiuGong Zhang OriginalPaper 19 December 2009 Pages: 600 - 607
Blind signal separation of linear mixture using trilinear decomposition Xiaofei ZhangDazhuan Xu OriginalPaper 19 December 2009 Pages: 608 - 613
Self-tuning measurement fusion Kalman filter with correlated measurement noises Yuan GaoChenjian RanZili Deng OriginalPaper 19 December 2009 Pages: 614 - 622
The TR-UWB receiver based on spatial diversity Feng WangChengqi XuYan Zhang OriginalPaper 19 December 2009 Pages: 623 - 630
A digital signature-based visual cryptography scheme for image discrimination and management Yanyan HanYupu HuWencai He OriginalPaper 19 December 2009 Pages: 631 - 636
Aggregate volumetric estimation based on PCA and momentum-enhanced BP neural network Ken ChenPan ZhaoYun Zhang OriginalPaper 19 December 2009 Pages: 637 - 643
An efficient approach to comment spam identification Yuhang YangTiejun ZhaoHao Yu OriginalPaper 19 December 2009 Pages: 644 - 650
Defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks Hongbing ChengXiao HuangGeng Yang OriginalPaper 19 December 2009 Pages: 651 - 658
Audio steganalysis of DSSS based on statistical moments of histogram Cuiping WangLi GuoYujie Wang OriginalPaper 19 December 2009 Pages: 659 - 665
Hybrid filter with predict-estimator and compensator for the linear time invariant delayed system Chenglin WenQuanbo GeXiaoliang Feng OriginalPaper 19 December 2009 Pages: 666 - 672
A new non-invasive method for valve stiction dection using wavelet technology Zhanyang XuCharles ZhanShunyi Zhang OriginalPaper 19 December 2009 Pages: 673 - 680
Research on color constancy under open illumination conditions Xiaozhao XuLi ZhuoLansun Shen OriginalPaper 19 December 2009 Pages: 681 - 686
Research on key thechnologies of pornographic image/video recognition in compressed domain Shiwei ZhaoLi ZhuoLansun Shen OriginalPaper 19 December 2009 Pages: 687 - 691
A function node-based Multiple Pairwise Keys Management protocol for Wireless Sensor Networks and energy consumption analysis Jiana BiHui WangZhenzhou Ji OriginalPaper 19 December 2009 Pages: 692 - 698
An accurate prediction model for computational overheads of security mechanisms in Wireless Sensor Networks Wei LiuRong LuoHuazhong Yang OriginalPaper 19 December 2009 Pages: 699 - 705
A novel research of confidential communication based on the elliptic curve and the combined chaotic mapping Chao GaoDongying LiangShanxue Zhou OriginalPaper 19 December 2009 Pages: 706 - 710
Logic structure of programmable instructions for Java processors Zhirui ChenHongzhou Tan OriginalPaper 19 December 2009 Pages: 711 - 714
Software tools for analyzing NBTI-induced digital circuit degradation Hong LuoYu WangHuazhong Yang OriginalPaper 19 December 2009 Pages: 715 - 719
Erratum to: Exact analysis of spurious signals in direct digital frequency synthesizers due to amplitude quantization Xinguang TianEryang Zhang Erratum 19 December 2009 Pages: 720 - 720