137 | -- | 153 | Junzhou Luo, Ming Yang. Analysis of security protocols based on challenge-response |
154 | -- | 169 | Daowen Qiu. Notes on automata theory based on quantum logic |
170 | -- | 187 | WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu. Optimality analysis of one-step OOSM filtering algorithms in target tracking |
188 | -- | 197 | Wenxiu Zhang, GuoFang Qiu, Weizhi Wu. A general approach to attribute reduction in rough set theory |
198 | -- | 211 | Xiaobin Li, Zheng Tian. Multiscale stochastic hierarchical image segmentation by spectral clustering |
212 | -- | 226 | Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin. Energy-based adaptive orthogonal FRIT and its application in image denoising |
227 | -- | 240 | Zhirong Ge, Bin Wang, LiMing Zhang. Remote sensing image fusion based on Bayesian linear estimation |
241 | -- | 250 | Bo Zhu, XiangLin Yang. Fiber soliton-form 3R regenerator and its performance analysis |
251 | -- | 260 | Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang. Study on relationships of electromagnetic band gap structures and left/right handed structures |
261 | -- | 272 | ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu. Study on joint Bayesian model selection and parameter estimation method of GTD model |