Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2003 Issue 6
The Design of Improved Multiplicative Inverse's Calculating Method According to GF(2n)
wang dan ; liu wen jiang ; dong wei ; rong meng tian
..............page:81-83
CDMA Location Technologies and Its Applications
chang yong yu ; yang ning
..............page:78-80
High Speed Data Stream Processing Solution in DS/CDMA Spread Spectrum Receiver
zuo si he ; wang jia chi ; jiang tai hui
..............page:76-77,86
The Development and Implementation of Bluetooth Technology and Specification
peng li ; wu xu wei ; zuo ya ping ; cheng lei ; yang xiao li
..............page:71-73
Optical Cross Connet and Its Components
jiang jun min ; wu song ; zhou li ming ; wang jia zuo
..............page:69-70
SNMP Agent Development based on ucd -snmp in Linux Environment
hu fang zuo ; zhang dan ; yang yang
..............page:66-68
Study of ADSL Access to IP WAN
kuang bin ; luo han wen
..............page:63-65
Study on Software Aging in Communication Systems
jiang le tian ; xu guo zhi ; zhou ling ling
..............page:60-62
The Research and Comparison of Broadband Access
xu min ; luo han wen
..............page:58-59,62
CIM -LDAP Mapping Design
sun li jun ; yang zhao zuo ; tie ling
..............page:54-57
Data Link of TBF Establishment Timing Improvement In GPRS
ye jian feng ; ge wan cheng
..............page:51-53,57
Survivability in IP/MPLS -Over- WDM Network
li yan jun ; shen zuo jun ; yu hong fang
..............page:48-50
The Design of Centralized Network Management Interface for Exchanges Based on TCP/IP
huang chang qing ; yu sheng sheng
..............page:46-47
Spectrum Analyzing of Multinary Digital Baseband Signal
song jun ; cao lei ; qian jian sheng ; zhu nai peng
..............page:44-45
Communicational Signals' Modulation Recognition
yao ya feng ; huang zai lu
..............page:41-43,50
Multiple Access Protocols for Satellite Communication Systems
wen ping ping ; gu xue mai
..............page:36-38
The Technology of Adaptive Equalization in HF Communication
liang zuo ; xie sheng li
..............page:33-35,38
An Algorithm of Expand - Golay Encode and Decode
xu rui
..............page:28-29
Performance Analysis of MQAM Using Fixed Threshold Adaptive Modulation
deng qi zuo ; dong zuo
..............page:26-27
Fuzzy Sub- band Speech Endpoint Detection Based Adaptive Smoothing
zhang wen jun ; xie jian ying
..............page:1-2,18
Adaptive Multi- rate Coding Technology in Wireless Communication System
hu wei ; jiang ling ge
..............page:5-6
An Implementation of DCT on DSP Used in H. 263 Encoder
chen wen sheng ; ou yang hua
..............page:7-9
A New Adaptive Threshold Scheme of Image Denoising Based on Wavelet Transform
ding wen jia ; liu zhi wen
..............page:10-11
The Main Techniques in Chinese Word- Segmentation and Its Prospect of Application
wang ke ; gao chang bo ; di xue feng ; luo wan bo
..............page:12-15
A Novel Scheme of Overcoming Peak -to -Average Power Ratio in OFDM
tan xue zhi ; liu li guo ; hou zuo guan
..............page:16-18
A Simple Frame Synchrozation Method in Orthogonal Frequency Division Multiplexing Systems
cui xiao zhun ; hu guang rui ; chen hao
..............page:19-20
The Design of a Digital DSSS Receiver
wang jia chi ; zuo si he ; jiang tai hui
..............page:24-25,27
Research on Authentication Technology of Multicast
liu zuo ; li jian hua
..............page:84-86
A QKD and QA Protocol Through Once Quantum Communication
chen zuo ; zhu fu chen
..............page:87-88
An Improved Scheme Of BB84 Protocol
yang yu guang ; zhu shi xiong
..............page:89-90,106
The Security of WLAN and Hardware Implementation of TKIP
chen yong ; xu chang qing
..............page:91-92,103
A Gatekeeper Message Authentication Mechanism Based on H. 235
zhang shi hui ; yin rui xiang ; yan gang hua
..............page:93-94
A Multilevel Security Algorithm and Its Realization Project
yao xu zuo ; tang yao
..............page:95-96
Analysis and Comparison on the Security Architectures of 2G & 3G Mobile Communications System
chen zi li ; lin de jing ; lin bai gang
..............page:97-100
Research on Intrusion Prevention System and Its Implementation
qing zuo ; yuan hong chun
..............page:101-103