International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449(Print),ISSN: 2076-9539(Online)
DOI: 10.5815/ijwmt

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems

GAO Shou-ping,WANG Lu-da

Abstract | References | Full Paper: PDF (Size:168KB), PP.1-7, Pub. Date: 2011-4-15

DOI: 10.5815/ijwmt.2011.02.01


 

Demand-Driven Dynamic Spectrum Allocation in Heterogeneous Cellular Networks

Li Wang,Huiyue Yi,Honglin Hu,Jianan Liu,Bin Chen

Abstract | References | Full Paper: PDF (Size:237KB), PP.8-15, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.02

 

 

A Weighed Least Square TDOA Location Algorithm for TDMA Multi-target

WANG XU,HE ZI-SHU

Abstract | References | Full Paper: PDF (Size:226KB), PP.16-25, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.03

 

 

Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability

Hengrong LU

Abstract | References | Full Paper: PDF (Size:166KB), PP.26-32, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.04

 

 

A Novel Approach to Simulate DDoS Attack

Qing LI,LeJun CHI,ZhaoXin ZHANG

Abstract | References | Full Paper: PDF (Size:619KB), PP.33-40, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.05

 

 

Fast Matching Algorithm Based on Fingerprint Classification Information

Na Li,Wenbi Rao,Tiecheng Xu

Abstract | References | Full Paper: PDF (Size:202KB), PP.41-46, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.06

 

 

Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton

Sheng LU,Chuan WEN

Abstract | References | Full Paper: PDF (Size:204KB), PP.47-54, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.07

 

 

A Speech Enhancement Method Based on Kalman Filtering

Chaogang Wu,Bo Li,Jin Zheng

Abstract | References | Full Paper: PDF (Size:178KB), PP.55-61, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.08

 

 

An Incentive Compatible Reputation Model for P2P Networks

Jianli Hu,Bin Zhou

Abstract | References | Full Paper: PDF (Size:451KB), PP.62-69, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.09

 

 

A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

Wenbing Wang,Zhifeng Zhang

Abstract | References | Full Paper: PDF (Size:159KB), PP.70-74, Pub. Date: 2011-4-15
DOI: 10.5815/ijwmt.2011.02.10