Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Communications Technology
1002-0802
2013 Issue 12
An Improved Smart AGC Interference Suppression Technology in Spectum Spreading
LAI Ping;,LU Rui-min;,MA Shi-wang;,SHEN Jun;
..............
page:1-5
MIMO-OFDM Nonlinear Precoding Simulation based on IT++
ZHAO Hong-yu;,ZHAO Yan-yan;
..............
page:6-10
Simulation of Distributed Base-Station Collaboration in Cellular System
GE Wan-cheng;,ZHANG Cui-ying;
..............
page:11-14
Speech Feature Extraction based on LPP Manifold Learning Algorithm
JI Wei;,WANG Li;
..............
page:15-18
Study on Wavelet Sym3 Threshold-method in Speech De-noising
BAO Hua-wei;,LIU Yu-hong;,ZHANG Zheng-Li;
..............
page:19-22
LEACH based on Clustering Communication Protocol for Wireless Sensor Networks
ZHANG Yue;,ZHOU Jie;
..............
page:23-28
Overview on Routing Algorithms of Cognitive Ad Hoc Networks
LIU Zhi-jun;,WANG Cheng-gui;,WANG Yu-meng;,ZHANG Hai-tao;
..............
page:29-33
Message Exchange Strategy in NATO Link22 System
BAI Xiang;,PAN Li-li;,WANG Xiang;
..............
page:34-37
Generating Method for Network-Management Strategy based on Ontology Model
HUANG Yue-jiang;,LI Chun-lin;
..............
page:38-42
Application of A Symmetrical Multi-Channel Technology in HF Emergency Communication
TANG Guang-liang;,XIE Ming;
..............
page:43-45
Indoor Passive Location based on Location Fingerprint
FENG Wei;,WANG Yu-wen;
..............
page:46-48
3G Information Push System based on ARM11
MA Jun;,WANG Hai-xi;
..............
page:49-52
Compactly-Optimized DGHV Fully-Homomorphic Encryption Scheme
CAO Yun-fei;,TANG Dian-hua;,YANG Hao-miao;
..............
page:53-57
Review on Cryptographic Property of Finite-Field Wavelet Transform
SHEN Bing;,WANG Jin-bo;,XIONG Ling;
..............
page:58-61
Research and Implementation of MD5 Brute-force Cracking Algorithm based on CUDA
JI Qing-bing;,LAN Tian;,YU Fei;,ZHANG Li-jun;
..............
page:62-65
Principle and Security Analysis of Modbus Protocol
CHENG Yong-xin;,ZUO Wei;
..............
page:66-69
Exploration on Onion-mode Encryption Model for External DBMS
TANG Dian-hua;,WU Kai-jun;,ZENG Bing;
..............
page:70-73
Key Collisions of RC4
CAO Yun-fei;,ZHAO Wei;
..............
page:74-76
Exploration on Attribution of Multi-source Network Attack
CHEN Zhou-guo;,HAO Yao;,HUANG Chen;,PU Shi;
..............
page:77-81
Exploration on AOS Link Multi-level Protection Technology
AN Hong-zhang;,REN Fei;,WU Kai-jun;
..............
page:82-85
Strong Authentication of Electronic Trading based on Internet Real-name System
LONG Kai;,MA Ding;
..............
page:86-88
Design on Access Control of Security Chip
ZHANG Rui;,ZHANG Wen-pei;
..............
page:89-92
A New Scheme of Fast Remote and Dynamic FPGA Reconfiguration
HUANG Yong;
..............
page:93-96
Design and Implementation of A Chip in Support of PCM-CVSD Digital Code Conversation
HE Wei-guo;,HU Yang-chuan;,LI Yu-li;,SI Huan-li;
..............
page:97-100
xin xi dong tai
..............
page:封3
Hardware Design of Earth-Station Servo System for Shipborne Satellite Communication
HUANG Jian-bo;,ZHU Zong-jiu;
..............
page:101-103
A Usefule Clock and Reset Management Circuit Design in SoC
HU Yang-chuan;,SI Huan-li;
..............
page:104-106