Permission Analysis Based Detection Method for Android Malicious Application of Privacy Leakage
Zheling Zeng*, Bogang Lin, Yitao Ni, Yongjia Chen
Abstract | References | PDF | HTML | Pub. Date: May 15, 2017
DOI: 10.23977/jeis.2017.21007 | Downloads: 8 | Views: 3671
Thermal Management Roadmap for Energy Efficient Next Generation Telecommunications Equipment
Lian-Tuu Yeh*
Abstract | References | PDF | HTML | Pub. Date: Jan 31, 2017
DOI: 10.23977/jeis.2017.21001 | Downloads: 91 | Views: 7342
Detection Criterion on Airborne Sensor Measure Information Effectiveness
Weijia Wang, Bo Liu, Bingsong Xiao*, Zhiying Peng
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11001 | Downloads: 38 | Views: 5898
Research and application of medical management information technology in tobacco enterprise
Min Zhang, Jin Xu*, Wei Cheng, Jinxing Zhang, Jiulian Luo, Hui Lou
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11002 | Downloads: 32 | Views: 6135
A no-reference image quality measure based on CPBD and noise
Yufeng Gu*, Kejian Yang
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11003 | Downloads: 79 | Views: 7460
The Analysis Meteorological Satellite Software Based on Principal Component
Lizi Xie, Manyun Lin, Xiangang Zhao, Lan Wei, Cunqun Fan*
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11004 | Downloads: 40 | Views: 6154
A Dual Quaternion Based Fusion Framework for IMU Data with 6 DOF Pose
Wang Yuyang*, Yan Peiyi, Liu Zheming, Zhang Chunyang
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11005 | Downloads: 112 | Views: 8202
An IMA Static Load Balancing Strategy Optimization Method Based on Graph Theory
Shihai Wang, Qing Zhou, Zhijuan Zhan*, Siyuan Zhou
Abstract | References | PDF | HTML | Pub. Date: Dec 31, 2016
DOI: 10.23977/jeis.2016.11006 | Downloads: 54 | Views: 6564