Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecommunications Science
1000-0801
2012 Issue 5
xin xi dong tai
..............page:48,53,59,98,108,114,132,141,154,156,封3
An Improved Algorithm Used to Estimate the CP Type in TD-LTE System
Chen Fatang;Ji Yingying;Teng Wang
..............page:104-108
Object Tracking Algorithm for Binary WSN Based on APF
Zhu Jinfang;Zhang Xiaoying;Fan Yiming
..............page:109-114
Study on Regional Difference of China\'s 3G Mobile Phone Users
Ma Daojie;Lv Tingjie
..............page:72-79
Design of TD-SCDMA Mobile Video Surveillance System Based on HSUPA and Multi-Stream Technology
Hu Fali;Wang Chongping;Zhou Jianmin
..............page:65-72
Research on the Improvement of Reliability of RRC Signaling in the HO in LTE System
Liu Limin;Dong Hongcheng;Li Xiaowen
..............page:80-83
Application of OTA in Terminal Test System for Operators
Huang Xiaolei;An Gang;Gao Yiwei
..............page:127-132
Research of Browser/Server Architecture System Migration and Implementation of Cloud Computing
Li Shusheng;Duan Yong;Shi Yirong;Ye Yuhang
..............page:133-141
A New Adaptive Threshold Algorithm Based on Noise Estimation for Energy Detection
Long Yingxian;Zhang Ning;Zhou Feng;Liang Xuwen
..............page:49-53
New Problems of Radio Network Optimization in Dense Urban Areas
Zhou Xingwei;Shen Chen
..............page:151-154
Research on Improved Algorithm of Monte Carlo Localization
Shao Qingliang;Li Yufeng;Qu Lele;Wang Peng
..............page:84-87
Research on HTML5 Technology and Application Model
Li Huiyun;He Zhenwei;Li Li;Lu Gang
..............page:24-29
Research on Development Technology of the Cross Platform Smart Device
Lu Gang;Zhu Peijun;Li Huiyun;Wen Jinjun
..............page:14-17
The Designing Method of ODN for FTTH
Zhang Jun
..............page:142-150
Research and Analysis on Converged Video Communication with “De-Teleco” Solution
Han Jianting;Ke Wei;Wan Xiang
..............page:92-98
Android Privilege Escalation Vulnerability Attacks Detection
Shen Cailiang;Tang Keping;Yu Lifeng;Fan Fuwei
..............page:115-119
A Bind Source Extraction Method with the Order Based on Artificial Bee Colony Optimization
Wang Rongjie;Zhou Haifeng;Zhan Yiju
..............page:43-48
Research on the Key Technologies of Smart Terminal Based on Application Virtualization
Yah Liyun;Zhong Weibin;Li Rongrong;Zhang Ling
..............page:9-13
Study on the Key Technologies of Intelligent Mobile Device
Zhao Xuejun;Liang Baiqing;Luo Xuan;Wei Yingqi
..............page:1-8
Research on the Rich Communication Client Technology and Application for Telecom Operator
Zhang Ling;Hu Wensheng;Yang Xinzhang;Yan Liyun
..............page:18-23
Frequency Planning of IMT System Based on the Hierarchical Spectrum Demand Forecast
Nie Boshi;Feng Zhiyong;Feng Zebing;Song Xingang
..............page:30-36
Study on Echo Cancellation Technology of Multipath Channel
Wang Zhenchao;Liang Junjun;Wang Zhuyi;Li Huiya
..............page:60-64
Study and Application About Intersystem SMS Paging for CDMA Network
Xia Lei;Li Qing;Li Dongliang;Chen Sizhong
..............page:37-42