Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Engineering Technics and Standardization
1008-5599
2011 Issue 2
Research of reducing concatenated short messages paging
SU Hua-qiang;LI Li-zhi
..............
page:1-7
Analysis of system efficiency improved by procedure granulation
WU Wen-tao
..............
page:8-10
Mobile communication spectrum plan study(second half)
MENG De-xiang
..............
page:28-31
Real-time charging information mediation solution of data services and its analysis
ZHANG Xiao-jing
..............
page:66-70
How to optimize transmission network
QIN Ming
..............
page:22-27
Study on the technology development and the promotion on energy-saving products of efficient power rectifier
SONG Fu-feng
..............
page:40-45
Research on deep convergent scheme of GSM/TD and WLAN network
WANG Shao-bo;FENG Chuan-fen;FU Hong-zhi;JI Fang
..............
page:32-35
Feasibility analysis of 2G/3G subscriber accesses LTE network of three-no
Yin Feng-qing;Feng Zheng
..............
page:46-52
Research and application of automated testing in BOSS
JIANG Yun;YANG Jian-jun;LUO Wen-mo
..............
page:71-76
Analysis of minicomputer and storage construction model based on BOSS
QIN Tao;CHEN Zi-yu
..............
page:81-85
Dual polarized indoor antenna research and its application in LTE system
GAO Feng;ZHU Wen-tao;HE Ji-wei;MA Hua-xing
..............
page:53-56
Implementation of the precise marketing based on 12580 call center
LIU Nan-hai;ZHOU Cheng-shu
..............
page:11-14
Analysis of the precise marketing system\'s construction
TANG Xu-dong;ZHANG Hai-feng
..............
page:77-80
UHF-RFID research based on MIMO technology
CHEN Han-zhen;WANG Zhe;WU Ming-ming
..............
page:61-65
Design and implementation of the living streaming broadcast system based on two-dimension bar code
Yu Bijun;Tan Pei
..............
page:57-60
Building tactic analysis on the radio communication system in railway shunting
WANG Fang
..............
page:36-39
Analysis and optimization on estimating investment of business support system
ZHANG Jin-gang;WU Wei
..............
page:86-88
Analysis and countermeasures of the fraud using cloned SIM card and network vulnerability
ZENG Jun-qiang
..............
page:15-21
xin xi dong tai
..............
page:21,39,45,52,60,65,89-92