Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Nanjing University of Posts and Telecommunications(Natural Science)
1673-5439
2012 Issue 3
Throughput Trade-off with Sensing Period Based on Data Collisions in Cognitive Radios
JI Guo-qing;ZHU Hong-bo
..............
page:1-4
The Implementation Method of Sensing Union in MAC in Cognitive Radio System
TIAN Xue-wei
..............
page:45-50,55
An Improved l1 Norm Minimum Algorithm for Spectrum Detection
WANG Chen-hao;XIAO Xiao-chao
..............
page:5-9,15
UWB Channel Estimation Based on PN-encoder Filter Compressive Sensing
YU Xiang-nan;ZHENG Bao-yu;JIAN Chun-yu
..............
page:51-55
Characteristics and Suppression Strategy of Intercell Interference in TD Trunking Downlink
CHENG Yu-lun;YANG Long-xiang
..............
page:10-15
A Non-parametric Music Fingerprint Extract Approach Based on Entropy
SHAO Xi;ZHOU Chuan-ping
..............
page:56-60
A Whitening-rotation-based Semi-blind Channel Estimation Method for Multiuser Multiantenna OFDM System
GAO Yue-xing;YANG Jie;ZHU Wei-ping;MENG Qing-min
..............
page:16-20
Opportunistic Power Control in Cognitive Radios Based on Decode-and-forward
TENG Hong-fei;TIAN Feng;WU Meng-wen
..............
page:61-65,99
A Fast Algorithm for Pre-processing of Solving Volume Integral Equation Using Method of Moments
ZHANG Ming;GUO Lin
..............
page:21-23
Optimal Selection of Sensing Channel in Cognitive Radio Network
YE Jun;ZHU Qi
..............
page:24-29
The Survey on Network Coding Research
DONG Zan-qiang;SHEN Su-bin
..............
page:66-75
Research on Double Closed-loop Controlled Inverter with Load Current Feedback
MA Hai-xiao;GONG Chun-ying
..............
page:30-35
Multi-Agent Cooperation Based on Imporved-acquaintance Model
LI Li-sen;LIANG Zhi-wei;REN Yan-da
..............
page:76-80
Research on Energy Detection with Multiple Receiving Antennas
ZHANG Pei;SUN Shi-xiu;JIAN Chun-yu;ZHU Wei-ping
..............
page:36-39
An Improved Pseudo-inverse Control Scheme Applying to DIVA Model
ZHANG Xin;ZHANG Shao-bai
..............
page:81-85
Measurements Modeling Based on Neural Network in Compressed Sensing
ZHANG Jian;YANG Zhen;JI Yun-yun
..............
page:40-44
Malicious Code Dynamic Analysis Based on Self Similar Characteristics
LI Peng;WANG Ru-chuan
..............
page:86-90
Passive Attack on SLMAP Authentication Protocol
WANG Shao-hui;ZHANG Wei-wei
..............
page:91-94
Multi-link Status Auto Detected and Fast Switching Methods
LI Cai-hong;CHEN Li-quan;WANG Ling-ling;ZHU Yao
..............
page:95-99
Advance in Metal-organic Frameworks (MOFs)
ZHOU Xin-hui;LI Hong-hui
..............
page:100-110
nan jing you dian da xue xue bao ( zi ran ke xue ban ) jian jie
..............
page:封3