[1] |
.
Wireless Localization Algorithm of Adaptive Levy Whale Based on Mapping Curve
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 0-0.
|
[2] |
HU Zhong-dong, WANG Jun-ling, WANG Zhen-dong, ZENG Ting.
Node Localization Algorithm of Wireless Sensor Networks for Complex Terrain in Mountain Areas
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(5): 113-118.
|
[3] |
LIU Yi-cheng, JIN Zhou, PU Ming.
A Finite-Time Back-Stepping Dynamic Surface Control
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 70-76.
|
[4] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[5] |
LÜ Na, SHI Dan, JIANG Wei, GAO You-gang, TANG Chao-han.
Application of Curved Surface Ray Tube in the Prediction of Complex Electromagnetic Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 103-108.
|
[6] |
FENG Jia-zhen, ZHANG Jian-guo, JIA Qing-xuan, CHEN Gang, SUN Jing-yi.
Automatic Updating Response Surface Method for Motion Trajectory Reliability Analysis of Manipulator
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(4): 35-40.
|
[7] |
REN Kan, WANG Wei-jie, QIAN Wei-xian, WANG Peng-cheng, CHEN Qian.
Segmentation Technology of Ground Motion Target Based on Moving Camera
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 42-45.
|
[8] |
HU Yan-zhu, LI Lei-yuan.
The Application of Kalman Filtering-BP Neural Network in Autonomous Positioning of End-Effector
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(6): 110-115.
|
[9] |
TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi.
Improved Provably Secure Certificateless Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 112-116.
|
[10] |
SUN Sheng-li, ZHENG Zhi-gao, WANG Ping, LIU Jing.
RTDP Network System Framework and Key Technologies
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 1-7.
|
[11] |
LI Zhan-hu, FAN Kai, LI Hui.
Efficient Multiple Signcryption Scheme Based on Two Hard Problems
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 23-26.
|
[12] |
.
Approximate Merging of a Pair of CEBézier Curves
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 76-80.
|
[13] |
.
Analysis on Strain Compensation in LongWavelength QDVCSELs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 84-87.
|
[14] |
.
A PasswordBased Authenticated Key Exchange Protocol for MobileCommerce Environments
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 64-67.
|
[15] |
LIU Nian ZHOU Ya-jian NIU Xin-xin YANG Yi-xian.
Study on Querying Encrypted XML Databases
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(2): 105-110.
|