1 |
The Shortcomings of Ipv6 and Upgrade of Ipv4 |
1 |
¡¡ |
Wang Tao, Gao Jiaqiong ¡¡ |
¡¡ |
2 |
Research and
Design of Next Generation Internet (IPV9)
Datagram |
10 |
¡¡ |
Wang Zhongsheng, Xie
Jianping, Lin
Zhao and Zhong
Wei ¡¡ |
¡¡ |
3 |
Design and Research of New Network Address
Coding |
29 |
¡¡ |
Lai Yufeng, Xie Jianping, Cheng
Xiaowei and Li Yuyu ¡¡ |
¡¡ |
4 |
Research of New Network Address Structure |
39 |
¡¡ |
Chong Jiao, Xie Jianping, Xu
Yinqiu and Zhao Hongwen ¡¡ |
¡¡ |
5 |
Rotation center
calibration based on line laser rotating
platform |
48 |
¡¡ |
Lei Doudou, Liu Baolong and Yao Huimin ¡¡ |
¡¡ |
6 |
A Full Decimal
Method of Address Assignment for Networked
Computer |
53 |
¡¡ |
Zhan Xin, Xie Jianping, Jin
Liming and Lai Jiawen ¡¡ |
¡¡ |
7 |
From Network Security to Network Autonomous |
61 |
¡¡ |
Wang Yubian*, Yuri Shebzukhov ¡¡ |
¡¡ |
8 |
A Survey of
Calibration Methods for Traditional Cameras
Based on Line Structure Light |
66 |
¡¡ |
Wu Ruixia, Liu Baolong and Yao Huimin ¡¡ |
¡¡ |
9 |
Research on
Harris Corner Detection Method in Palmprint
Recognition System |
72 |
¡¡ |
Wu Hejing ¡¡ |
¡¡ |
10 |
Research on
Digital Camouflage Design and Camouflage
Material of Tent Cloth |
77 |
¡¡ |
Hu Zhiyi, Xian Tong, YU
Jun and Su
Haitao ¡¡ |
¡¡ |
11 |
The Researchof
a New Iteration of the Circular Algorithm |
83 |
¡¡ |
Xu Shuping, Huang Menyao, Chen
Li and Xu
Pei ¡¡ |
¡¡ |
12 |
Application of
Chaotic Encryption in RFID Data Transmission
Security |
90 |
¡¡ |
Yang Jianfang, Liu Baolong and Yao
Huimin |
¡¡ |