blackjack online game |
Thesis name |
The first author in the school |
Author sort |
Other author |
Paper carrier form |
Paper carrier name |
Post time |
belonging to the type |
Whether to level first |
Whether to retrieve |
Is the core |
1 |
A method with less ε-nfa in regular expressions |
Jingmaohua |
1 |
Yang Yixian, Yu Changyong, Xinyang |
Domestic journal |
Journal of Northeast University (Natural Science Edition) |
blackjack casino 2013.09 |
Technology |
No |
Yes |
Yes |
2 |
DSP undergraduate experimental teaching research and practice based on TMS320VC5402 |
Cao Yali |
1 |
Management, |
Domestic conference paper |
Ninth China Communications Society Academic Annual Conference Paper Collection |
2012.12 |
Technology |
No |
No |
No |
3 |
Fiber Grating Based 64-Channel Interleavers with 25GHz Channel Spacing and Flat-Top PassBands |
Huangliqun |
1 |
Yang Guang |
International Conference Papers |
Applied Mechanics and Materials v 347-350, p 1251-1255 |
2013.05 |
Technology |
No |
Yes |
No |
4 |
Optical Spectrum Characteristics of Phase-only Sampled Chirp Gratings with ManuoFacturing Error |
Huangliqun |
1 |
Yang Guang |
International Conference Papers |
Applied Mechanics and Materials v 263-266, n part 1, p 1067-1070 |
2013.01 |
Technology |
No |
Yes |
No |
5 |
CS -DOA algorithm based on the weighted L1 model |
Liu Fulai |
1 |
Peng Yan, Wang Jinguan, Du Ruiyan |
Domestic journal |
Journal of Northeast University |
2013-05 |
Technology |
No |
Yes |
Yes |
6 |
Primary User Signal Detection Based On Virtual Multiple Antennas for Cognitive Radio Networks |
Liu Fulai |
1 |
Shouming Guo, yixiao sun |
International Journal |
Pierc |
2013-08 |
Technology |
No |
Yes |
Yes |
7 |
RTX_PW:A CMT re -transmission strategy based on path power |
Liu Jiemin |
1 |
Wang Xingwei |
Domestic journal |
Electronic Journal |
2013.06 |
Technology |
Yes |
Yes |
Yes |
8 |
A improvement strategy based on RTX-CWND |
Liu Jiemin |
1 |
White Cedar, Wang Xingwei |
Domestic journal |
Small micro -computer system |
2013.11 |
Technology |
Yes |
No |
Yes |
9 |
Vehicle Anti-theft Tracking System Based on Internet of Things |
Liu Zhigang |
1 |
Zhang Anqi, Li Shaojun |
International Conference Papers |
Proceedings of icves 2013 |
2013.07 |
Technology |
No |
No |
No |
10 |
Interacting Multiple Sensor Filter |
Liu Zhigang |
1 |
Wang Jinkuan |
International Journal |
Signal Processing |
2012.09 |
Technology |
Yes |
Yes |
Yes |
11 |
Interacting Multiple Sensor Filter |
Liu Zhigang |
1 |
Wang Jinkuan |
International Journal |
Signal Processing |
2012.10 |
Technology |
Yes |
Yes |
Yes |
12 |
The Optimal Synchronizability of a Class Network |
qiu xinyun |
1 |
WANG LIFU, Gaoyuan, Wu yaping |
Domestic conference paper |
2013 25th Chinese Control and DECISION Conference,CCDC2013 PP3414-3418 (CCDC 2013,Guiyang,China) |
2013.05 |
Technology |
No |
Yes |
No |
13 |
An Efficient RSA-BASED Remote User Authentication scheme |
Shi Wenbo |
1 |
Yitao Chen |
International Journal |
Romanian Journal of Information Science and Technology |
2012.12 |
Technology |
No |
Yes |
No |
14 |
An Efficient RSA-BASED Remote User Authentication scheme |
Shi Wenbo |
1 |
Yitao Chen |
International Journal |
Romanian Journal of Information Science and Technology |
2012.12 |
Technology |
No |
Yes |
No |
15 |
A New User Authentication Protocol For Wireless Sensor Networks USIPTIC CRYPTOGRAPHY |
Shi Wenbo |
1 |
peng gong |
International Journal |
International Journal of Distributed Sensor Networks |
2013.04 |
Technology |
No |
Yes |
No |
16 |
On the Security of a Certificateless Proxy Signature Scheme with Message Recovery |
Shi Wenbo |
1 |
Debiao He, Peng Gong |
International Journal |
Mathematical Privems in Engineering |
2013.05 |
Technology |
No |
Yes |
No |
17 |
a Sealed-Bid Multi-ATRIBUTE Auction Protocol with Strong Bid Privacy and Bidder Privacy |
Shi Wenbo |
1 |
No |
International Journal |
Security and Communication Networks |
2013.02 |
Technology |
No |
Yes |
No |
18 |
A Provable Secure Sealed-Bid Multi-AUCIBUTE AUCTION SCHEME Under SEMI-HODEL |
Shi Wenbo |
1 |
No |
International Journal |
International Journal of Communication Systems |
2013.06 |
Technology |
No |
Yes |
No |
19 |
Robust Least Squares Constant Modulus Algorithm to Signal Steering Vector Mismatcher |
Song Xin |
1 |
Wang Jinkuan, Wang Bin |
International Journal |
Wireless Personal Communications |
2013.01 |
Technology |
No |
Yes |
No |
20 |
Robust Blind Adaptive BeamForming Under Double Constrains |
Song Xin |
1 |
Wang Jinguan, Li Qiuming |
International Journal |
Neural Computing & Applications |
2013.02 |
Technology |
No |
Yes |
No |
21 |
Robust Constrained Constant Modulus Algorithm for Signal Steering Vector Mismatches |
Song Xin |
1 |
Wang Jinguan, Li Qiuming |
International Conference Papers |
WICOM2013 |
2012.10 |
Technology |
No |
Yes |
No |
22 |
A Pattern Based Incremental Model In K-I-A-Download Games |
Xu Changming |
1 |
MA, z.m.; Yu Chang-Yong; xu xin-he |
Conference Paper Collection |
2013 25th Chinese Control and DECISION Conference |
2013.05 |
Technology |
No |
Yes |
No |
23 |
Generalized TSS and Its Optimization |
Xu Changming |
1 |
MA, Z.M. ; MA, hai-tao; yu, Chang-Yong; xu, xin-he |
Conference Paper Collection |
2013 25th Chinese Control and DECISION Conference |
2013.05 |
Technology |
No |
Yes |
No |
24 |
SVM Parameter Optimization Based on Immune Memory |
Zhu Fang 1 |
1 |
Wei Yifang 2 |
International Conference Papers |
International Conference on Machine Learning and Cybernetics2013 |
2013.07 |
Technology |
No |
No |
No |
25 |
A New SVM Reduction Strategy of Large-SCALE Training Sample Sets |
Zhu Fang 1 |
1 |
Wei Yifang 2 |
International Conference Papers |
Advanced Materials Research |
2013.08 |
Technology |
No |
Yes |
No |
26 |
Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks |
Li Guorui |
1 |
Wang Ying |
International Conference Papers |
2013 International Conference on Cyber-Enabled Distributed blackjack live Computing and Knowledge Discovery |
2013.10 |
Technology |
No |
Yes |
No |
27 |
A Compressive Sensing Based Secure Data Transmission Scheme |
Li Guorui |
1 |
Wang Ying |
International Conference Papers |
IEEE International Conference on cyber, PHYSICAL and Social Computing |
2013.08 |
Technology |
No |
Yes |
No |
28 |
Design of coal mine positioning and monitoring system based on IoT technology |
Huang Caimei |
1 |
Xinle Huang Dan Cheng Yajian |
Domestic journal |
Sensor and micro system |
2013.10 |
Technology |
Yes |
No |
Yes |
29 |
Object Detection Based on Combination of Visible and Thermal VideoS USING A Joint Sample Consensus Background Model |
Han Guang 1 |
1 |
Caixi 2, Wang Jinguan 3 |
International Journal |
Journal of Software |
2013.04 |
Technology |
No |
Yes |
No |
30 |
Novel Band-Pass Filters using E-Shape Resonators |
Ladongsheng |
2 |
Lu Jinquan |
International Journal |
Journal of Electromagnetic Waves And Applications |
2013.03 |
Technology |
Yes |
Yes |
Yes |
31 |
A Dynamic Trust Evaluation Model For Internet Computing |
Li Feng |
1 |
Siyoli |
International Journal |
Applied Mechanics and Materials |
2013.07 |
Technology |
No |
Yes |
Yes |
32 |
an approach to estimating Acceleration Information for Longitudinal Control |
li zhigang |
1 |
zhang Hanlin |
International Conference Papers |
Thesis set |
2013.08 |
Technology |
Yes |
Yes |
No |
33 |
Target Range and Velocity Measurement to Reduce False Targets in FMCW Automotive Anti-COLLISION RADAR |
li zhigang |
1 |
Gu qiongchan |
International Conference Papers |
Thesis set |
2013.02 |
Technology |
Yes |
Yes |
No |
34 |
CS -DOA algorithm based on the weighted L1 model |
Liu Fulai |
1 |
Peng Yan, Wang Jinguan, Du Ruiyan |
Domestic journal |
Journal of Northeast University |
2013-05 |
Technology |
Yes |
Yes |
Yes |
35 |
Primary User Signal Detection Based On Virtual Multiple Antennas for Cognitive Radio Networks |
Liu Fulai |
1 |
Shouming Guo, yixiao sun |
International Journal |
Pierc |
2013-08 |
Technology |
Yes |
Yes |
Yes |
36 |
Game-Based Scheduling Algorithm to Achieve Optimize Profit in MapReduce Environment |
Wancong |
1 |
Wang Cuirong, Yuan Ying, Wang Haiming |
International Journal |
Lecture Notes in Computer Science |
2013year7month |
Technology |
Yes |
Yes |
No |