International Journal of Wireless and Microwave Technologies
International Journal of Wireless and Microwave Technologies (IJWMT) is a peer reviewed journal in the field of Wireless and Microwave Technologies. The journal is published quarterly by the MECS Publisher. All papers will be blind reviewed. Accepted papers will be available on line (free access) and in printed version. No publication fee.
IJWMT is publishing refereed, high quality original research papers in all areas of Wireless and Microwave Technologies. IJWMT is also an open access product focusing on publishing conference proceedings, enabling fast dissemination so that conference delegates can publish their papers in a dedicated online issue.
IJWMT has been indexed by several world class databases: Google Scholar, Microsoft Academic Search, DOAJ, Open Access Articles, CNKI, Scirus, GetInfo, WordCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc...
The journal publishes original papers in the field of Wireless and Microwave Technologies which covers, but not limited to the following scope:
Wireless & Mobile Networking
Wireless Sensor Networks
Cognitive Radio Networks
Ad Hoc, Sensor and Mesh Networking
Next-Generation Networking and Internet
Wireless Network Security and Privacy
Networking and Information Security
Network Protocol and Congestion Control
QoS, Reliability & Performance Modeling
Mobility, Location and Handoff Management
Capacity, Throughput, Outage and Coverage
Multimedia in Wireless Networks
Optical Networks and Systems
Space-Time, MIMO and Adaptive Antennas
OFDM, CDMA and Spread Spectrum
Modulation, Coding and Diversity
Wireless Systems and Signal Processing (SDR, MIMO, UWB, etc.)
B3G/4G Systems, WiMAX, WLAN and WPAN
Channel Model and Characterization
Multi-Hop and Cooperative Communications
Interference Cancellation and MUD
Radio Resource Management and Allocation
Cognitive Radio and Software Defined Radio
Satellite & Space Communications
Multiple Access Techniques
Active Array Antennas and Components
Antenna Design, Modelling and Measurements
Antennas and Propagation for Wireless Systems
Applications and Standards (Mobile, Wireless, networks)
Characterization of Material Parameters
Circuit Design and Applications
EM Field Theory and Numerical Techniques
Hybrid and Multi-Chip Modules
Linear and Non-linear CAD Techniques
Low Noise and Communication Receivers
Medical and Biological Effects
Meta-materials and Photonic Bandgap Structures
Modelling, Simulation and characterizations of devices and circuits
New and Emerging Technologies and Materials
Passive Components and Circuits
Power Amplifiers and Linearizers
Quality of Life / Medical Diagnosis and Imaging Systems
Radar and Homeland Security
Radar Architecture and Systems
Radar Signal Processing and System Modelling
RFID and Sensors
RF-MEMS and MOEMS
Si-based Devices and IC Technologies
Modern Education and Computer Science Press
This paper analyzes and researches the theories of the encryption communications and identities authentication over the Internet banking based on the PKI technology. Combined with the specific Internet banking system, this research tries to design Internet banking system communication encryption and identities verification and the workflow and main functions. Implementing application to enhance confidentiality of the information transferred by the network communication, this research solves the problems of encrypting Internet banking data and verifying the identities of users and Internet banking. Finally, this paper explores the key technology more in-depth in the designing.
Digital simulation design is one of the mechanical product modern design methods. We have introduced the concept and meaning of digital mockup technology in mechanical design and its architecture, design cycle, which are concerned multi-domain UML, multi-body dynamics and multidisciplinary design. We also have analyzed the automobile digital simulation design method and digital mockup technology.
Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly adopted to construct control flow graph, then both symbolic execution and taint analysis are used to detect exploit payloads, at last predefined length of NOOP instruction sequence is recognized to help detection. Experimental results show that the approach is capable of correctly distinguishing the exploit codes from regular network flows.
This paper introduces the structure of linear motor in mines. Analyze the power relation of power-AC -linear motor – vibrant machine, based on this, count the power factor; and make mechanical analysis to the vibrancy, get the power factor, which should be: in the precondition of without collision for the top and bottom magnet, do best to decrease the δ_0 to close to ΔΧ_m (ΔΧ_m depends on the technique of the vibrant load), make Κ_δ close to 1 and λ_e close to critical maximum λ_(em) . It is significantly useful to design linear motor.