Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2016 Issue 7
zheng gao qi shi
..............page:封3
Simulation on Coherent Multipath Characteristic for Underwater Acoustic Channel
GUO Tie-liang;,ZHANG Zhi-yong;,ZHANG Lin;
..............page:799-806
A Rate-matched Coded Modulation for Wireless Transmission
XU Long-xi;,GE Wan-cheng;
..............page:807-811
Performance Analysis of HF Wideband Data Communication Transmission Systems
WANG Dong-li;,CAO Peng;,HUANG Guo-ce;,SUN Qi-lu;,ZHUO Kun;
..............page:812-816
Simulation Study on Noise Reduction and Anti-Jamming Modulation Technology in Wireless Communication
WEN Guo-jun;,JIN Hong-jun;,YANG Cheng;
..............page:817-820
Full-Parallel Architecture based on Stochastic Decoding Algorithm
YUN Fei-long;,XIAO Yin;,ZHANG Xun;,ZHU Hong-peng;,LV Jing;
..............page:821-825
Burst Synchronization Design based on Phase Trajectory Correlation Algorithm
ZENG Ji;,LIU Chao;,GAO Xia;,YANG Xing;
..............page:831-835
Blind Recognition Algorithm based on Random Interwoven Parameter of A Convolution Code
TU Sun;,WANG Wei-wei;,LIU Xiao-Long;
..............page:836-841
Angular Tracking Method based on Cyclic Spectrum of BPSK Signal
SONG Xiao-rui;,ZHENG Hai-xin;,KUANG Xue-wei;
..............page:842-847
Comparison of Three Image De-Noising Methods based on Matlab
SAIDIWAERDI·Maimaiti;,AINIWAER·Ruozi;
..............page:856-861
Simulation Analysis of Exponent Moments in the Image Reconstruction
WU Yu;,PING Zi-liang;,LI Yin;
..............page:862-866
Improved Artificial Bee Colony Algorithm based on Congestion concept
WANG Wen-guo;,WU Zong-yue;
..............page:867-871
Power Control and Channel Access for D2D Communications based on Physical Layer Security
JIANG Lin-li;,LUO Yi-jie;,ZHANG Ya-min;
..............page:872-875
Positioning Technology based on RFID
LIU Xing;,LIU Rong;,WEN Meng;
..............page:880-884
Simulation Application based on Pandas
DONG Yu-hui;
..............page:885-889
Study of Risk-Adaptable PBCUC
LUO Xiao-feng;,LUO Wan-bo;
..............page:890-895
Differential Cryptanalysis of an Orthormophic Permutation
BAI Shu-jun;,ZHANG Xin;
..............page:896-901
Detection Method for Clone Attack in Wireless Sensor Networks based on Improved EDD Algorithm
XU Xiao-long;,GAO Zhong-he;,HAN Li-juan;
..............page:902-908
Security Audit System Framework in Big Data Environment
DING Wen-chao;,LENG Bing;,XU Jie;,YAN Li-na;
..............page:909-914
Intelligent Data Masking System for Big Data Productive Environment
CHEN Tian-ying;,CHEN Jian-feng;
..............page:915-922
Design of Multimedia Client Security Access based on SIP
WANG Yong-jian;,LIU Yong-tao;,LIANG Wei-he;,ZHANG Xin;,ZHAO Zhi-ming;
..............page:923-928
FPGA Realization of Multiplication Group Value Algorithm for PAPR Reduction
HE Wei-wu;,TAN Qi-wen;,ZENG Kang-juan;
..............page:929-936