Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Communications Technology
1002-0802
2000 Issue 3
xu yan
li zhen bang
..............
page:1
Probe in the HF Networking Technology
Luo Qiuxia;Zhou Zhizhong;Zou Shengtang
..............
page:2-5,28
HF Network and Its Correlative Technology
Zhu Hongchen;Luo Qiuxia
..............
page:6-8
Study on the Topology of HF Networking
shi quan ; jin zuo ; zhao wen fang
..............
page:9-11
On the Topology of HF Radio Packet Network
Chen Huawei;Luo Qiuxia;Jin Fan
..............
page:12-15
HF Networking Controller and Its Implementation
Zou Shengtang;Luo Qiuxia;Li Yongping;He Jing
..............
page:16-18
Reliability Analysis of HF Radio Networking
chen zhong xue ; jin zuo ; zhou zhi zhong
..............
page:19-21
Applications of Block Design for HF Radio Networking
Chen Zhongxue;Jin Fan;Chen Huawei;Shi Quan
..............
page:22-25
Invulnerability Assessment of HF Communication Networking Based on Nodes
Chen Zhongxue;Jin Fan;Zhou Shengtang;Zhu Hongchen
..............
page:26-28
Research of High Frequency Data Link Protocol
Rao Zhihong;Zhou Zhizhong;Zhou Wen
..............
page:29-30,33
High Speed Single Tone HF MODEM
Zhou Zhizhong;Luo Qiuxia;Li Kailin
..............
page:31-33
The Study of HF Frequency Hopping Communication Technology
Li Ming;Qi Renhua;Zhu Hongchen
..............
page:34-37
Analysis of Error-control in HF Adaptive Data Transmission
Jia Rupeng;Zhou Zhizhong
..............
page:38-42
Study on 8-ary FSK Modem for HF ALE System and Its DSP Implementation
Zhang Qu;Li Xiaofeng;Zhang Hao
..............
page:43-47
Cryptanalysis of H-Y Key Authentication Scheme and Its Revised Scheme
Li Hu;Chen Huanghai;Zhu Hongwen
..............
page:48-50
Key Exchange Implementation Based on ISAKM
Li Hu;Chen Huanghai;Zhu Hongwen
..............
page:51-54
Kerberos Technology Used in Certificate Operation of LDAP
Lu Songnian;Cai Yibo;Xue Zhi
..............
page:55-58
The Trust Mechanism of Public Key Infrastructure
Meng Guie;Yang Yuhang
..............
page:59-62
Dynamic Security Mechanisms for Multicasting Synchronous Collaboration
Zhu Kangxin;Yin Ying;Li Jianhua;Zhu Hongwen
..............
page:63-65
Wireless Local Area Network and Its Security Mechanism
He Li;Qu Baozhang
..............
page:66-69,73
Method of Vector Quantization Based on Wavelet and JPEG for Image Compression
Sun Haiwei;Tan Xinquan
..............
page:70-73
Impulse Noise Detection and Removal Using Fuzzy Reasoning
Kim Sunchol;Tan Xinquan
..............
page:74-77
A Low Bit Rate Speech Coding Method Based on CELP and LZH
Musyaju Raju;Yao Tianren
..............
page:78-81
The Research and Design of Transceiver for ADSL
Gong Min
..............
page:82-85,92
A New Data Acquisition Method in Software Radio Receiver
Chen Juanyong;Xu Jilin
..............
page:86-88
Analysis of Sender Delay of Unicast-Based Reliable Synchronous Collaboration Communication
Zhu Kangxin;Li Ke;Li Jianhua;Zhu Hongwen
..............
page:89-92
The Research Trend for Adaptive Power Amplifiers in Mobile Transmitters
Wu shuyue;Zhang Eryang
..............
page:93-96
The Protocol Reference Model of APON Access Network and Its Traffic Management
Hu Gang;Fan Ge
..............
page:97-100
A Event-triggered Topology Updating Strategy of Tactical Internet
Zhou Ling;Li Ying;Ye Yousun
..............
page:101-104