International Journal of Wireless and Microwave Technologies
Wireless and Microwave Technologies has been abstracted or indexed by several world class databases: Google Scholar, Microsoft Academic Search, Baidu Wenku, Open Access Articles, CNKI, GetInfo, WordCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc..
IJWMT is committed to bridge the theory and practice of wireless and microwave technologies. From innovative ideas to specific algorithms and full system implementations, IJWMT publishes original, peer-reviewed, and high quality articles in the areas of wireless and microwave technologies. IJWMT is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of wireless and microwave technology applications.
The journal publishes original papers in the field of Wireless and Microwave Technologies which covers, but not limited to the following scope:
Wireless & Mobile Networking
Wireless Sensor Networks
Cognitive Radio Networks
Ad Hoc, Sensor and Mesh Networking
Next-Generation Networking and Internet
Wireless Network Security and Privacy
Networking and Information Security
Network Protocol and Congestion Control
QoS, Reliability & Performance Modeling
Mobility, Location and Handoff Management
Capacity, Throughput, Outage and Coverage
Multimedia in Wireless Networks
Optical Networks and Systems
Space-Time, MIMO and Adaptive Antennas
OFDM, CDMA and Spread Spectrum
Modulation, Coding and Diversity
Wireless Systems and Signal Processing (SDR, MIMO, UWB, etc.)
B3G/4G Systems, WiMAX, WLAN and WPAN
Channel Model and Characterization
Multi-Hop and Cooperative Communications
Interference Cancellation and MUD
Radio Resource Management and Allocation
Cognitive Radio and Software Defined Radio
Satellite & Space Communications
Multimedia Communications
Multiple Access Techniques
Optical Communications
Active Array Antennas and Components
Antenna Design, Modelling and Measurements
Antennas and Propagation for Wireless Systems
Applications and Standards (Mobile, Wireless, networks)
Characterization of Material Parameters
Circuit Design and Applications
Electromagnetic Compatibility
EM Field Theory and Numerical Techniques
Filters
Hybrid and Multi-Chip Modules
Linear and Non-linear CAD Techniques
Low Noise and Communication Receivers
Medical and Biological Effects
Meta-materials and Photonic Bandgap Structures
Microwave Measurements
Microwave Photonics
Modelling, Simulation and characterizations of devices and circuits
New and Emerging Technologies and Materials
Passive Components and Circuits
Power Amplifiers and Linearizers
Quality of Life / Medical Diagnosis and Imaging Systems
Radar and Homeland Security
Radar Applications
Radar Architecture and Systems
Radar Signal Processing and System Modelling
RFID and Sensors
RF-MEMS and MOEMS
Si-based Devices and IC Technologies
Modern Education and Computer Science Press
Выпуски журнала
Статьи журнала

Статья
This paper analyzes and researches the theories of the encryption communications and identities authentication over the Internet banking based on the PKI technology. Combined with the specific Internet banking system, this research tries to design Internet banking system communication encryption and identities verification and the workflow and main functions. Implementing application to enhance confidentiality of the information transferred by the network communication, this research solves the problems of encrypting Internet banking data and verifying the identities of users and Internet banking. Finally, this paper explores the key technology more in-depth in the designing.
Бесплатно

Application of Digital Mockup Technology
Статья научная
Digital simulation design is one of the mechanical product modern design methods. We have introduced the concept and meaning of digital mockup technology in mechanical design and its architecture, design cycle, which are concerned multi-domain UML, multi-body dynamics and multidisciplinary design. We also have analyzed the automobile digital simulation design method and digital mockup technology.
Бесплатно

Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
Статья научная
Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly adopted to construct control flow graph, then both symbolic execution and taint analysis are used to detect exploit payloads, at last predefined length of NOOP instruction sequence is recognized to help detection. Experimental results show that the approach is capable of correctly distinguishing the exploit codes from regular network flows.
Бесплатно

Power Factor Analysis of the Linear Motor in Mines
Статья научная
This paper introduces the structure of linear motor in mines. Analyze the power relation of power-AC -linear motor – vibrant machine, based on this, count the power factor; and make mechanical analysis to the vibrancy, get the power factor, which should be: in the precondition of without collision for the top and bottom magnet, do best to decrease the δ_0 to close to ΔΧ_m (ΔΧ_m depends on the technique of the vibrant load), make Κ_δ close to 1 and λ_e close to critical maximum λ_(em) . It is significantly useful to design linear motor.
Бесплатно