Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Electronics & Information Technology
1009-5896
2009 Issue 1
A Cooperative MIMO Scheme Based on Limited Feedback in WSNs
Zhang Yu;Li Zi;Cai Yue-ming;Chen Xian-ming;Xu You-yun
..............page:32-36
The Channel Capacity and Resource Allocation Scheme for Distributed Alamouti Space-Time Code
Zhong Zhi-meng;Ren Pin-yi;Zhu Shi-hua;Lü Gang-ming
..............page:27-31
Phase Rotation Modulation Technique for Time-Varying OFDM Systems
Yu Fei;Yang Lu-xi
..............page:23-26
Frequency Power Partition Scheme in the Broadband Multi-cell Cellular Networks
Wang Wei-wei;Zeng Yun-bao;Guo Zi-hua;Chen Chang-jia
..............page:18-22
A TOA/ AOA Location Algorithm in NLOS Environment
Mao Yong-yi;Li Ming-yuan;Zhang Bao-jun
..............page:37-40
QoS Guaranteed Dynamic Resource Allocation for MIMO-OFDM Systems
Sun Qiao-yun;Tian Hui;Dong Kun;Zhang Ping
..............page:41-44
Research on Anti-collision Protocols in RFID Systems——Design and Optimization
Wang Jian-wei;Zhao Yu-ping;Timo Korhonen
..............page:1-4
Phase Noise Mitigation Method for OFDM System Based on Huber ML
Wang de-gang;Zhang Xiao-ying;Wei Ji-bo
..............page:75-78
Two Typical High Throughput Decoding Algorithms for QC-LDPC Codes
Liu Xiao-jian;Wu Xiao-fu;Zhao Chun-ming
..............page:79-82
Optimized Decoder Design and Implement for High Rate LDPC Codes
Zhang Jing-lin;Liu Rong-ke;Zhao Ling
..............page:83-86
Low-Complexity Particle Filtering Detection for MIMO Systems
Zheng Jian-ping;Bai Bao-ming;Wang Xin-mei
..............page:87-90
A New Design for Concatenated Space-Time Block Code M-TCM
Ao Jun;Ao Fa-liang;Liao Gui-sheng
..............page:91-95
Simplified Algorithm and Hardware Implementation for Particle Filter Applied to Bearings-only Tracking
Hong Shao-hua;Shi Zhi-guo;Chen Kang-sheng
..............page:96-100
An Improvement on Adaptive Beamforming via Virtual Array Transformation
Wang Ming-zhe;Wang Jun
..............page:101-103
A Robust Frequency Tracking Technology for Chaotic Frequency Modulation
Xu Mao-ge;Song Yao-liang
..............page:104-107
ACCA-CFAR Detection with Local Adaptive Threshold
Zhang Liang;Li Yu;Ji Ke-feng;Su Yi
..............page:160-163
Study on Intersection of Spectrum and Sub-band Processing Technique in Synthetic Aperture Radar Imaging
Song Yue-peng;Liu Xiang-le;Yang Ru-liang
..............page:152-155
A Novel Signal Processing Approach for the Multi-Carrier MIMO Radar
Yang Ming-lei;Zhang Shou-hong;Chen Bai-xiao;Zhang Huan-ying
..............page:147-151
ESPRIT Super-Resolution Imaging Algorithm Based on External Illuminators
Li Yan;Wang Jun;Zhang Shou-hong
..............page:143-146
A New Method for Estimating Parameters of K-distributed Clutter
Yu Hui;Wang Yan-fei;Yan Hong-hui
..............page:139-142
Spatial Domain Image Watermarking Scheme Robust to Geometric Attacks Based on Odd-Even Quantization
Li Lei-da;Guo Bao-long;Biao Jin-feng
..............page:134-138
2008 nian xin xi ke xue bu yi chu xiang mu shou li qing kuang ji fen xi
xiong xiao zuo ; xia yin shui ; lv ke
..............page:253-254
Translationally Invariant Airborne Bistatic SAR Imaging Algorithm and Experimental Result
Gong Zhen-qiang;Zhang Xiao-ling
..............page:173-176
Bistatic SAR Polarimetric Analysis
Xu Feng;Jin Ya-qiu
..............page:182-187
A Linearly Constrained LSCM Algorithm Based on Subspace
Meng Yan;Wang Jin-kuan;Zhu Jun
..............page:49-52
Coded MIMO Detection Based on Iterative Channel Soft Information
Xu Jin;Tao Xiao-feng;Zhang Ping
..............page:57-60
On SNR Mismatch in T-TCM Systems
Yan Tao;Ru Le;Zhang Xi;Du Xing-min
..............page:61-65
An Adaptive Rate Control Algorithm for JPEG2000 Based on Rate Pre-allocation
Kong Fan-qiang;Li Yun-song;Wang Ke-yan;Zhuang Huai-yu
..............page:66-70
A Novel Method for Radar Emitter Signals Recognition Based on Spectrum Atoms
Zhu Ming;Jin Wei-dong;Hu Lai-zhao
..............page:188-191
An Image Denoising Method Using Total Variation Regularization for Flow Field
Lu Cheng-wu;Song Guo-xiang
..............page:112-115
A Multi-layer Windows Method of Moments for Gait Recognition
Chen Shi;Ma Tian-jun;Huang Wan-hong;Gao You-xing
..............page:116-119
Super-resolution Reconstruction of Video Sequence Based on WLS Filtering
Han Yu-bing;Shu Feng;Wu Le-nan
..............page:120-123
Research on Image Fusion with Double Density Dual-Tree Complex Wavelet Transform
Yue Jin;Yang Ru-liang;Huan Ruo-hong
..............page:129-133
Study on Target Detection of SAR Image Using Improved Fractal Feature
Cheng De-bao;Hu Feng-ming;Yang Ru-liang
..............page:164-168
FDTD Analysis of Pulse Propagation on Blumlein Line Produced by Photo-Conductive Switches Applied Bias Voltage
Zhu Yan-wu;Shi Shun-xiang;Sun Yan-ling;Liu Ji-fang
..............page:250-252
A Robust Beamforming Method in the Situation of Sample Pollution and Limited Snapshots
Liu Gui-yu;Liao Gui-sheng;Tao Hai-hong
..............page:192-195
A Power Control Algorithm Based on Position of Node in the Wireless Ad hoc Networks
Wen Kai;Guo Wei;Huang Guang-Jie
..............page:201-205
The Whole Monitor to the Performance of Optical Data Stream in All-optical Network
Zhu Bo;Chen He-ming;Yang Xiang-lin;Fan Hong;Ma Zheng-bei;Qian Chen;Hou Shao-hua;Zou Jian-hua;Wang Xiao-jun;Dong Xiao-yan
..............page:206-209
Research on Opportunistic Cooperation Transmission and Its Performance in Wireless Sensor Network
Yan Zhen-ya;Zheng Bao-yu;Lin Zhi-wei
..............page:215-218
An Adaptive Power Control Mechanism of DCF Protocol in Ad hoc Networks
Lei Lei;Xu Zong-ze
..............page:219-223
Policy-Based Signature Scheme for Credential Privacy Protecting in Trust Negotiation
Zhang Ming-wu;Yang Bo;Zhu Sheng-lin;Zhang Wen-zheng
..............page:224-227
A Game Theoretic Analysis of Service Hopping Mechanism for DoS Defense
Shi Le-yi;Jia Chun-fu;Lü Shu-wang
..............page:228-232
ABCD Modeling of Crosstalk Coupling Noise of Interconnects
Du Xiao-ming;Zhao Feng-jun;Wu Ding-yun;Zhang-le
..............page:242-245
Forgery Attacks on a Series Group Signature Schemes
Yu Bao-zheng;Xu Cong-wei
..............page:246-249