Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: November 2010
Authors: Yong Yi Mao, Zi Chao Deng
References
[1] YU Wanbo, “Calculation and analysis of chaos,” Beijing, Science Press, p.16–30, june 2008
A, "A novel algorithm for image encryption based on mixture of chaotic maps," Chaos solitons & fractals, vol. 35, January. 2008, p. 408-419
[4] Wong K-W, Kwok B S-H, Law W-S, "A fast image encryption scheme based on chaotic standard map," Physics Letters A, vol. 372, 2008, p. 2645-2652
A, "A novel algorithm for image encryption based on mixture of chaotic maps," Chaos solitons & fractals, vol. 35, January. 2008, p. 408-419
[4] Wong K-W, Kwok B S-H, Law W-S, "A fast image encryption scheme based on chaotic standard map," Physics Letters A, vol. 372, 2008, p. 2645-2652
Online since: July 2011
Authors: Yan Hui Liu, Jing Long Gao
Composites Science and Technology Vol. 68 (2008), p.2858
[5] O.
Applied Surface Science Vol.254 (2008), p.3745 [7] Z.
Wong and S.
Polymer Vol.49 (2008), p.1356
Applied Surface Science Vol.254 (2008), p.3745 [7] Z.
Wong and S.
Polymer Vol.49 (2008), p.1356
Online since: May 2011
Authors: Jin Ping Peng, Yi Hua Cui, Chu Fen Yang, Hua Zhu, Jian Wei Guo, Sa Liu
., Vol. 196(2007), p. 249
[4] Pabbaraju, K; Ho, KCY; Wong, S, et al.
Antiviral Reserch, Vol. 79(2008), p. 81 [5] Y.
Grownth Des., Vol. 8(2008), p.1399 [10] E.
Chem., Vol. 21(2008), p. 299 [12] P.
Antiviral Reserch, Vol. 79(2008), p. 81 [5] Y.
Grownth Des., Vol. 8(2008), p.1399 [10] E.
Chem., Vol. 21(2008), p. 299 [12] P.
Online since: April 2014
Authors: Meng Ran Liu, Ze Ming Jian, Hong Liu, Xiao Peng Song, Guo Jun Zhang
References
[1]Chen Shang,Xue Chenyang,Zhang Binzhen.Research on a new kind of MEMS single vector hydrophone[J]. 2008,29(6):673-677
IEEE SENSORS JOURNAL,2008,8(4):401-402 [5]XIE Bin, XUE Chen-Yang, ZHANG Wen-Dong.Design of a Bionic Vector Hydrophone Based on Silicon.Chinese Journal of Sensors and Actuators,2006,19(5):2300-2303 [6]WONG K T, ZOLTOWSKI M D.
IEEE SENSORS JOURNAL,2008,8(4):401-402 [5]XIE Bin, XUE Chen-Yang, ZHANG Wen-Dong.Design of a Bionic Vector Hydrophone Based on Silicon.Chinese Journal of Sensors and Actuators,2006,19(5):2300-2303 [6]WONG K T, ZOLTOWSKI M D.
Online since: February 2015
Authors: Hong Di Zhang, Yi Chen Liu, Xu Yan, Wen-Peng Han, Yun-Ze Long
Wong, P.
Cryst, Growth, Vol. 310 (2008), p. 2627 [7] W.
Vol. 112 (2008), p. 4049
Cryst, Growth, Vol. 310 (2008), p. 2627 [7] W.
Vol. 112 (2008), p. 4049
Online since: May 2014
Authors: Ai Juan Song, Jiang Tao Lv
:Remote Medical Monitoring, Computer Vol.41 , Issue: 4( 2008), p.96 -99
Iliescu: Ubiquitous wireless telemedicine, IET Communications, Vol. 2, no. 2(2008), p. 237-254
Wong, and G.
Iliescu: Ubiquitous wireless telemedicine, IET Communications, Vol. 2, no. 2(2008), p. 237-254
Wong, and G.
Online since: March 2015
Authors: G.Z. Xu
Wong.
Grid Computing Environments Workshop, 2008
Apadmana, 2008
Grid Computing Environments Workshop, 2008
Apadmana, 2008
Online since: August 2013
Authors: Ryo Fukuoka, Yuuki Kabeya, Katsunori Makihara, Hai Zhang, Seiichi Miyazaki
Wong and S.R.P.
J. 39 (2008) 1060
Phys. 47 (2008) 3099
J. 39 (2008) 1060
Phys. 47 (2008) 3099
Online since: November 2011
Authors: Chun Yang Chen, Yan Xia Lu, Rui Kuo Liu
Southwest Jiaotong University,2008
Passenger Dedicated Line’s Traction Power Supply System modeling based on MATLAB/Simulink[J].Railway Computer Application,2008,(10)
[7] Hamoud O,Barnes R,Wong K T.Unbalance and harmonic studies, for Channel Tunnel railway system[J].
Passenger Dedicated Line’s Traction Power Supply System modeling based on MATLAB/Simulink[J].Railway Computer Application,2008,(10)
[7] Hamoud O,Barnes R,Wong K T.Unbalance and harmonic studies, for Channel Tunnel railway system[J].
Online since: September 2013
Authors: Chuan Mu Li
Memon and Wong [1] established a scheme in which an image is divided into blocks and each block contains the hash value calculated from the MSB’s of the pixels forming that block.
Murat Tekalp, “Hierarchical watermarking for secure image authentication with localization,” Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June 2008 [10] Phen-Lan Lin, Po-Whei Huang, An-Wei Peng, “A Fragile Watermarking Scheme for Image Authentication with Localization and Recover,” Multimedia Software Engineering, 2007.
Int J Bifurcat Chaos 2008;8(6):1259–84
Murat Tekalp, “Hierarchical watermarking for secure image authentication with localization,” Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June 2008 [10] Phen-Lan Lin, Po-Whei Huang, An-Wei Peng, “A Fragile Watermarking Scheme for Image Authentication with Localization and Recover,” Multimedia Software Engineering, 2007.
Int J Bifurcat Chaos 2008;8(6):1259–84