Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Communications Technology
1002-0802
2014 Issue 1
Discussion of Blind Source Separation Problem and Its Solution in Communication
YANG Liu;,ZHANG Hang;
..............
page:1-6
Radome Equivalent Transmission Line Theory and Application
LI Gao-sheng;,MING Yong-jin;
..............
page:7-12
Automatic Recognition of Modulated Signals based on Decision Method
GU Guang-yu;,HE Bin;
..............
page:13-17
A Full-digital Burst-mode PSK Demodulator without Preamble for Multiple Symbol Rates
LIAO Ming;,WANG Shi-lian;,YAO Jun;,ZHANG Wei;
..............
page:18-23
CPM Detection Algorithm based on PSP Equaliation
YANG Li-ping;,ZHOU Zhi-zhong;
..............
page:24-28
Unequal Protection of Turbo Code based on Known Bits
HUANG Yao;,LI Ji-ping;,XIAO Chuang-chuang;
..............
page:29-32
Facial Expression Recognition based on Gabor Wavelet Transform
FENG Gui;,XIE Jin-fang;
..............
page:33-36
Data Link Information Distribution System and Its Service Discovery Approach
PENG Lai-xian;,WANG Zhen;,ZHAO Wen-dong;
..............
page:37-45
A Centralized Scheduling Algorithm for CoMP with Low Complexity
FENG Gang;,FU Shu;,LIU Qi-qi;,WU Bin;
..............
page:46-49
Overload Control Mechanism in Machine-to-Machine Network based on LTE Technology
YI Dan-dan;,YU Xiang;
..............
page:50-54
Performance of GTS Mechanism in IEEE802 . 15 . 4 Protocol
HUANG Lei;,JIANG Zhi-wen;,LI Guang-wei;,ZHOU Xi;
..............
page:55-59
A Routing Algorithm and Simulation of WSN based on LEACH
LIU Yu-hong;,SU Jian-hua;,XU Yue-zhou;
..............
page:60-63
Resource Management for Tactical Communications Network
TIAN Yong-chun;,WANG Jun;
..............
page:64-70
A New Dynamic Spectrum Anti-Jamming Technology based on Cognition
BI Wen-bin;,LIANG Liang;,TIAN Hua;,ZHU Yi-chao;
..............
page:71-75
Simulation and Its Interference Method of Circular Antenna Array-based GPS Anti-jamming Performance
MA Hui;,WANG Yong-zhou;,XIA Bin;
..............
page:76-80
Design and Analysis of Dynamic Group Key Agreement Protocol with UC Security
LI Jun;,LU Zheng-fu;,YANG Chun-yao;
..............
page:81-85
Software-Defined Networking Security
HAO Ping;,HE En;,ZHANG De-zhi;
..............
page:86-90
Study on Internet Real-Name Authentication
LI Dan;,MA Ding;
..............
page:91-96
Public-Opinion Control Technology in Micro-blog
WANG Xiao-wu;,YAO Chun-hua;,ZENG Xi;
..............
page:97-101
An Implementation of DoS Attack Tool based on SYN Flood
HU Yong;,PAN Peng-zhi;
..............
page:102-105
A Small Dual-frequency Antenna based on Slot Structure for Wireless Energy Collection
BAI Xue;,XU Lei-jun;,YANG Xiao-dong;,ZHAO Bu-hui;
..............
page:106-110
Designs of Power Amplifier and Predistorter Models
CAO Min;,LI Long;,WANG Ge;,WANG Wei;,ZHU Juan-juan;
..............
page:111-114
Design and Implementation of Multi-use K-interface Subscriber Line Repeater
WU Zhong-yue;
..............
page:115-118
Design on High-Speed Data Interface
YANG Rui-rui;,ZHANG Rui;,ZHANG Wen-pei;
..............
page:119-122