Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2016 Issue 4
Channel Estimation Algorithm based on Factor Graph In OFDM System
HUANG Wei-ying;,ZHANG Xiao-ying;,WEI Ji-bo;
..............page:391-396
Robust Transmission in MISO Relay Channels based on Secrecy Rate
LIN Zhi;,YANG Wei-wei;,WEI Xiao-hui;
..............page:397-401
A Lattice Reduction-Aided Low-Complexity List Detection
JING Chang-le;,WANG Xin;,WEI Ji-bo;
..............page:402-407
Phase Compensation Technology in Wireless Optical Communication
WANG Zhi-hua;,GONG Zhe-xi;,GUO Peng-zhan;
..............page:413-417
Method and Models of Field Strength Calculation in HF Sky-Wave Communication
LI Xue-hong;,LI Fa-zhong;,HAN Long;,CHEN Li-jun;
..............page:418-422
Image De-Noising based on Kalman Filter
Saidiwaerdi Maimaiti;,Abudoujiapaer Rusuli;,Minawaer Wumaier;
..............page:423-425
A Distributed Dynamic Spectrum Access Algorithm based on Spectrum Database
LIAO Yun-feng;,CHEN Yong;,TIAN Jia-qiang;,BAO Li-na;
..............page:426-430
Outage Probability Performance of Multi-Antenna AF Relay
LAI Ping;,CHEN Jun-qiang;,FAN Hong-zhi;,LIU Tian-jian;
..............page:431-435
Joint Optimization Algorithm of Power and Repeater Gain in Multi-Beam Satellite Communication Systems
YANG Liu;,XIE Si-lin;,YANG Kong-zhe;,WANG Ya-hui;
..............page:436-441
Realization and Optimization of Ring-Shaped Beam in HAP Communication
NI Shu-yan;,WU Xiang-yu;,JIN Shan;
..............page:442-445
Modified LEACH Protocol based on Ant Colony Optimization and Energy Balance
ZHOU Zhi-yong;,CHEN Hui;,WANG Hai-tao;,WANG Shi-jie;
..............page:446-451
Service Discovery Mechanism in Tactical Communication Network
KANG Zong-xu;,WANG Kai;,YANG Xiao;,LI Shi-zhao;,LEI Xue-bing;
..............page:452-456
Network Alarm Closed-Loop Control Scheme based Control Chart
ZHANG Lu;,SU Xing;
..............page:457-461
Security Architecture for Smart Government based on Cloud Computing
WANG Yong-jian;,ZHU Yun-qi;,XU Yang;,XING Song-feng;
..............page:462-468
Infosec Assurance System of Intelligent Manufacturing
LAN Kun;,TANG Lin;
..............page:469-474
Hierarchical Detection of Trojan Behavior based on Random Forest
WU Jin-long;,SHI Xiao-fei;,XU Jia;,SHI Jun;
..............page:475-480
Research and Analysis of Several Key FHE Structures
MA Fei;,LI Juan;
..............page:481-485
Blind Watermarking Algorithm for Color Images in Wavelet Domain based on Differential Evolution
WU Wan-xu;,NIU Yu-ying;,LIU Tian-tian;,ZHAO Quan-chao;
..............page:486-491
Planning and Construction of Transmission Access Network for Small Cell
YU Min;,XIANG Hui;
..............page:492-495
Application of TA-based Network Optimizing Strategy in LTE
LI Li-zhi;,YUE Lei;,CHEN Shan-fang;,DENG Man-ling;
..............page:496-499
A Satellite Abnormal Signal Lock Indicator Shift Detection Method based on Data Fitting
MA He;,LI Zhi-qiang;,SUN Jian-jun;,DONG Ya-guo;,YIN Jun;
..............page:500-503
FPGA Model Design and Resource Efficiency of Handwritten Code
XING Yu-lei;,ZHAO Gang;
..............page:504-508