Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2014 Issue 6
Invulnerability of small-world network against cascading failure based on nonlinear load-capacity model
WU Xiao-ping;WANG Jia-sheng;QIN Yan-lin;YE Qing;Department of Information Security;Naval University of Engineering;
..............page:1-7
Performance analysis of a network coding scheme based on orthogonal process
ZHANG Zu-fan;PENG Chun-ling;YANG Jing;JING Xiao-rong;School of Communications and Information Engineering;Chongqing University of Posts and Telecommunications;Chongqing Key Laboratory of Mobile Communication;Chongqing University of Posts and Telecommunications;
..............page:8-14
Fuzzy co-clustering algorithm for high-order heterogeneous data
HUANG Shao-bin;YANG Xin-xin;SHEN Lin-shan;LI Yan-mei;College of Computer Science and Technology;Harbin Engineering University;
..............page:15-24
Strategy of routing based on layered for underwater wireless sensor networks
PENG Jian;HONG Chang-jian;LIU Tang;ZHANG Yun-yong;College of Computer Science;Sichuan University;College of Fundamental Education;Sichuan Normal University;Platform and Cloud Computing Research Center;China Unicom Research Institute;
..............page:25-31
Rate control algorithm for no-feedback distributed video coding
CHEN Jian;HUI Chao;KUO Yong-hong;School of Telecommunications Engineering;Xidian University;
..............page:32-38+46
Seam-Carving forgery detection based on expanded Markov features
SHENG Guo-rui;GAO Tie-gang;FAN Li;GAO Lin;YANG Fu-sheng;ZHANG Shun;College of Software;Nankai University;College of Information and Electric Engineering;Ludong University;
..............page:39-46
Regular expression matching technology with two-stage memory
CHEN Shu-hui;XU Cheng-cheng;College of Computer;National University of Defense Technology;
..............page:47-55+63
Multi-path routing protocol based on adaptation mechanism of cell in ad hoc networks
GONG Wei-bing;YANG Xiao-long;ZHANG Min;LONG Ke-ping;School of Computer & Communication Engineering;University of Science and Technology Beijing;
..............page:56-63
Scale-free fault-tolerant topology control algorithm in wireless sensor network with optimization of path energy consumption
LIU Hao-ran;HAN Tao;LI Ya-qian;YIN Rong-rong;Hebei Province KeyLaboratory of Special Optical Fiber and Optical Fiber Sensing;College of Information Science and Engineering;Yanshan University;Institute of Information Science Engineering;Yanshan University;
..............page:64-72
Multi-antenna diversity receiving scheme for mobile communication system in high-speed railway
LUO Wan-tuan;FANG Xu-ming;CHENG Meng;ZHAO Ya-jun;Key Lab of Information Coding and Transmission;Southwest Jiaotong University;College of Physics and Electronic Engineering;Guangxi University for Nationalities;Baseband Algorithm Department;ZTE;
..............page:73-81
Voronoi tessellation and hierarchical model based texture image segmentation
ZHAO Quan-hua;LI Yu;HE Xiao-jun;SONG Wei-dong;Institute for Remote Sensing Science and Application;School of Geomatics;Liaoning Technical University;
..............page:82-91
Rearch and implementation of constant beamwidth time-demain beamformer based on Farrow structure
ZHOU Tian;ZHANG Bing-zhi;DU Wei-dong;PENG Dong-dong;Acoustic Science and Technology Laboratory;Harbin Engineering University;College of Underwater Acoustic Engineering;Harbin Engineering University;Nanjing Marine Radar Institute;
..............page:92-99
Link quality based path delay analysis in wireless sensor networks
CHEN Quan;GAO Hong;Department of Computer Science and Technology;Harbin Institute of Technology;
..............page:100-109
LRST: searching tree anti-collision algorithm with low-redundancy
HUANG Qiong;LING Jiang-tao;ZHANG Min;YANG Xiao-long;Key Laboratory of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;Institute of Advanced Network Technology and New Services;University of Science and Technology Beijing;
..............page:110-116
Blind signal separation algorithm based on temporal predictability and differential search algorithm
CHEN Lei;ZHANG Li-yi;GUO Yan-ju;HUANG Yong;LIANG Jing-yi;School of Information Engineering;Tianjin University of Commerce;School of Precision Instrument and Opto-Electronics Engineering;Tianjin University;School of Information Engineering;Hebei University of Technology;
..............page:117-125
Blind SINR estimation for OFDM system in the presence of radio frequency interference
HONG Shun-li;LI You-ming;JIN Ming;WANG Gang;Institute of Communication Technology;Ningbo University;Institute of Information Technology;Zhejiang Institute of Communications;
..............page:126-131
Load balance based relay selection and spectrum transition joint scheme
HUANG Bo;FANG Xu-ming;CHEN Yu;HUANG Gao-yong;Key Lab of Information Coding and Transmission;Southwest Jiaotong University;
..............page:132-138
Algorithm for foggy image enhancement based on the total variational Retinex and gradient domain
CHEN Bing-quan;LIU Hong-li;Department of Electrical and Information Engineering;Hunan University;Department of Information Science and Engineering;Jishou University;
..............page:139-147
Three-channel dependent mid/side coding framwork for multichannel 3D audio
DONG Shi;HU Rui-min;YANG Yu-hong;WANG Xiao-chen;TU Wei-ping;National Engineering Research Center for Multimedia Software;Wuhan University;
..............page:148-153
Face recognition under unconstrained based on LBP and deep learning
LIANG Shu-fen;LIU Yin-hua;LI Li-chen;School of Information Engineering;Wuyi University;
..............page:154-160
Downlink outage probability analysis of distributed MIMO systems over a composite fading channel
PENG Wen-jie;LI Yue-heng;JU Mei-yan;HUANG Ping;TAN Guo-ping;College of Computer and Information;Hohai University;
..............page:161-168
Key techniques of cognitive convergence networks
YANG Chun-gang;YUE Jian;LI Jian-dong;SHENG Min;LI Hong-yan;LIU Qin;State Key Lab of ISN;Information Science Institute;Xidian University;
..............page:169-179
3-subset meet-in-the-middle attack on block cipher TWIS
ZHENG Ya-fei;WEI Hong-ru;School of Mathematics and Physics;University of Science and Technology Beijing;
..............page:180-184
Improved sub-band JND model with textural decomposition and its application in perceptual image coding
ZHENG Ming-kui;SU Kai-xiong;WANG Wei-xing;LAN Cheng-dong;YANG Xiu-zhi;College of Physics and Information Engineering;Fuzhou University;
..............page:185-191+199
Novel method for joint parameter estimation based on FPSD in wideband bistatic MIMO radar system
LI Li;QIU Tian-shuang;Information Engineering College;Dalian University;Faculty of Electronic Information and Electrical Engineering;Dalian University of Technology;
..............page:192-199
Construction of a new class of(2k, k, 1) convolutional codes
ZHANG Cheng-chang;PENG Wan-quan;WEI Bo;College of Electroning Engineering;Chongqing University of Posts and Telecommunications;Laboratory of Aerocraft Tracking Telemetering & Command and Communication;Ministry of Education;Chongqing University;Chongqing Vocational Institute of Engineering;
..............page:200-206