Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xi'an University of Post and Telecom
1007-3264
2012 Issue 2
Modulation recognition for LTE uplink and downlink signals
zhan jin long ; fang hui ni ; zheng liang
..............page:9-12
A survey on state-of-the-art techniques in content-based image retrieval
liu ying ; fan jiu lun
..............page:1-8
Reduction algorithm based on invariant for pairwise test sets
sun jia ze
..............page:71-74,79
B/S intelligent building monitoring system based on ZigBee protocol
fan meng li ; pang sheng li ; lu guang yue
..............page:17-21
guo jian feng jiao shou
..............page:F0002-F0002
Investigation of evolution route of Internet of Things
huang yu lan ; gong jia min
..............page:110-114
A correction method of barrel distortion image
liu ya qiang ; chen wen yi
..............page:27-30,36
Fuzzy recognition of rode-edge of parking area
guo meng ; shang feng ; ma guo qiang ; wang zhi wei
..............page:62-66
The realization of entangled state in Josephson charge qubits
zhang xiu ; hui xiao qiang
..............page:37-42,56
A watermark algorithm based on visual system and DWT domain
liu si qi ; lv jian ping
..............page:88-93
A wavelet domain multi-focus image fusion based on mosaic
ren zhen ; wei wei
..............page:84-87,93
Impact of cyber-culture on ideological education for undergraduates
li jing ; dong xiao long
..............page:107-109,114
Multi-data fusion technology in the application of ball mill control
zhao dong liang ; wang wen qing ; liang zuo ; zhao guo
..............page:80-83
Comparison on image de-noising methods based on spatial domain
wang wen qing ; zuo zuo
..............page:75-79
A dynamic risk assessment method based on hidden Markov model
liu chen hui zi ; zhang xue feng
..............page:31-36
An investigation and analysis on information service status of Shaanxi fruit industry
mao feng xia ; luo zuo feng
..............page:103-106
A survey on cognitive radio security
feng jing zuo ; lu guang yue ; bao zhi qiang
..............page:47-52
Pricing study of telecommunications value-added service based on the bilateral platform
zhou li zuo ; long xiao yu ; liu ying
..............page:120-124
An autorun implementation of wireless network card based on USB protocol
wang yun jie ; li zhe
..............page:22-26
The analytical theory of SRS with different linear attenuation coefficient
gong jia min ; li rui ; ping zuo
..............page:43-46