Author: Ni Liang-Fang Wang Yi Li Wei-Xia Wang Pei-Zhen Zhang Jia-Yan
Publisher: MDPI
E-ISSN: 1099-4300|19|8|426-426
ISSN: 1099-4300
Source: Entropy, Vol.19, Iss.8, 2017-08, pp. : 426-426
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
By Wang Chundong Li Zhiyuan Gong Liangyi Mo Xiuliang Yang Hong Zhao Yi
Entropy, Vol. 19, Iss. 2, 2017-02 ,pp. :
Two Approaches to Obtaining the Space-Time Fractional Advection-Diffusion Equation
By Povstenko Yuriy Kyrylych Tamara
Entropy, Vol. 19, Iss. 7, 2017-06 ,pp. :
Multi-User Detection for Sporadic IDMA Transmission Based on Compressed Sensing
By Li Bo Du Rui Kang Wenjing Liu Gongliang
Entropy, Vol. 19, Iss. 7, 2017-07 ,pp. :