Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
1673-825X
2012 Issue 1
A FRFT-OFDM system and equalization in Ka-band for Doppler effect elimination
SHEN Yong;DA Xin-yu;ZENG Wu;XIE Tie-cheng
..............page:45-49
zheng gao jian ze
..............page:封3
A finger vein recognition method which is based on kernel Fisher discriminant analysis
YU Cheng-bo;ZHANG Jin;ZHANG Yi-meng;LI Hong-bing
..............page:90-95
Research on power control with non-linear pricing method in cognitive Relay network
JIANG Qing;YANG Ke-li;LIU Zhang-mao
..............page:8-13
Personalized affective model based on PAD
YANG Yong;ZHANG Zhi-yu
..............page:96-103
Spectrum handoff decision algorithm with dynamic weights for cognitive radio networks
XIE Xian-zhong;YANG Guang;MA Bin
..............page:1-7
A new method for downlink synchronization sequence fast searching
HE Wei;LIU Yong-kang;CHEN Guo-ping;TIAN Zeng-shan
..............page:64-68
Study on temperature drift compensation of infrared thermal imaging system
DAI Shao-sheng;LIU Fa-ping
..............page:69-72
Study of collaborative filtering
JI Liang-hao
..............page:78-82
Tri-stage buffer used in the high-speed communication by the addition of SRAM
SHI Yun;ZHENG Yong-qiu;REN Yong-feng
..............page:60-63,95
Robot arm remote control based on trajectory planning in joint space
ZHANG Yi;YOU Qun-xia;LUO Yuan;ZHOU Hui-yu
..............page:104-108
Improved PNN algorithm for initial codebook design of LBG
CHEN Shan-xue;ZHANG Yan;WU Li-bin
..............page:50-54
Design of rate-compatible protograph LDPC codes
WANG Zhi-na;XIAO Min;WANG Lin
..............page:55-59
A game algorithm of dynamic spectrum allocation based on spectrum difference
ZHANG Xin-chun;HE Shi-biao;GE Li-jia;SUN Jiang
..............page:20-23
Switch degree distribution: an improved degree distribution for LT digital fountain code
LEI Wei-jia;LIU Hui-feng;XIE Xian-zhong
..............page:34-38
A network mobility management scheme based on the iocator/ID separating network
LI Xue-xia;GAO Shuai;WANG Li-li;ZHANG Hong-ke
..............page:83-89
Research of network safety path and secure network coding under wiretapping
ZHU Lian-xiang;ZHU Yan-yan;CAO Zheng
..............page:39-44
An integrated model based on misuse detection and anomaly behavior detection
XIE Hong;LIU Ren-jie;CHEN Chun-kai
..............page:73-77
One ECDH key agreement scheme with authentication based on ECDLP
CAO Yang;HAO Yu-jie;HONG Qi
..............page:118-120,126