Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2014 Issue 1
Radome Equivalent Transmission Line Theory and Application
LI Gao-sheng;,MING Yong-jin;
..............page:7-12
Automatic Recognition of Modulated Signals based on Decision Method
GU Guang-yu;,HE Bin;
..............page:13-17
A Full-digital Burst-mode PSK Demodulator without Preamble for Multiple Symbol Rates
LIAO Ming;,WANG Shi-lian;,YAO Jun;,ZHANG Wei;
..............page:18-23
CPM Detection Algorithm based on PSP Equaliation
YANG Li-ping;,ZHOU Zhi-zhong;
..............page:24-28
Unequal Protection of Turbo Code based on Known Bits
HUANG Yao;,LI Ji-ping;,XIAO Chuang-chuang;
..............page:29-32
Facial Expression Recognition based on Gabor Wavelet Transform
FENG Gui;,XIE Jin-fang;
..............page:33-36
Data Link Information Distribution System and Its Service Discovery Approach
PENG Lai-xian;,WANG Zhen;,ZHAO Wen-dong;
..............page:37-45
A Centralized Scheduling Algorithm for CoMP with Low Complexity
FENG Gang;,FU Shu;,LIU Qi-qi;,WU Bin;
..............page:46-49
Performance of GTS Mechanism in IEEE802 . 15 . 4 Protocol
HUANG Lei;,JIANG Zhi-wen;,LI Guang-wei;,ZHOU Xi;
..............page:55-59
A Routing Algorithm and Simulation of WSN based on LEACH
LIU Yu-hong;,SU Jian-hua;,XU Yue-zhou;
..............page:60-63
Resource Management for Tactical Communications Network
TIAN Yong-chun;,WANG Jun;
..............page:64-70
A New Dynamic Spectrum Anti-Jamming Technology based on Cognition
BI Wen-bin;,LIANG Liang;,TIAN Hua;,ZHU Yi-chao;
..............page:71-75
Design and Analysis of Dynamic Group Key Agreement Protocol with UC Security
LI Jun;,LU Zheng-fu;,YANG Chun-yao;
..............page:81-85
Software-Defined Networking Security
HAO Ping;,HE En;,ZHANG De-zhi;
..............page:86-90
Study on Internet Real-Name Authentication
LI Dan;,MA Ding;
..............page:91-96
Public-Opinion Control Technology in Micro-blog
WANG Xiao-wu;,YAO Chun-hua;,ZENG Xi;
..............page:97-101
An Implementation of DoS Attack Tool based on SYN Flood
HU Yong;,PAN Peng-zhi;
..............page:102-105
A Small Dual-frequency Antenna based on Slot Structure for Wireless Energy Collection
BAI Xue;,XU Lei-jun;,YANG Xiao-dong;,ZHAO Bu-hui;
..............page:106-110
Designs of Power Amplifier and Predistorter Models
CAO Min;,LI Long;,WANG Ge;,WANG Wei;,ZHU Juan-juan;
..............page:111-114
Design on High-Speed Data Interface
YANG Rui-rui;,ZHANG Rui;,ZHANG Wen-pei;
..............page:119-122