Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Journal on Communications
FQ: monthly
AD of Publication: China
Lanuage: English
ISSN: 1000-436X
CN: 11-2102/TN
YP: 1980
Recommended Journals
Video Engineering
Communications Technology
Wireless Communication Technology
Modern Radar
Modern Transmission
West China Broadcasting TV
China Digital Cable TV
Journal on Communications
2018 -05
Multi-label feature selection algorithm based on joint mutual information of max-relevance and min-redundancy ZHANG Li;WANG Cong;School of Software
Research on cloud computing users' public safety trust model based on scorecard-random forest ZHOU Shengli;JIN Canghong;WU Lifa;HONG Zheng;Institute of Command and Control Engineering
Algorithm for scenario benefit route planning based on user's requests WANG Nan;ZHOU Honglei;LI Jinbao;LI Lingli;Key Laboratory of Database and Parallel Computing of Heilongjiang Province
Detection method of LDoS attacks based on combination of ANN & KPCA WU Zhijun;LIU Liang;YUE Meng;School of Electronics Information & Automation
Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence XIAO Bin;SHI Wenming;LI Weisheng;MA Jianfeng;Chongqing Key Laboratory of Computational Intelligence
Security analysis of weighted network anonymity based on singular value decomposition ZENG Yong;ZHOU Lingjie;JIANG Zhongyuan;LIU Zhihong;MA Jianfeng;School of Cyber Engineering
Cloud data secure deduplication scheme via role-based symmetric encryption XIONG Jinbo;ZHANG Yuanyuan;TIAN Youliang;YING Zuobin;LI Qi;MA Rong;Guizhou Provincial Key Laboratory of Public Big Data
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing LIN Hui;YU Mengyang;TIAN Youliang;HUANG Yijie;College of Mathematics and Informatics
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key YAN Xincheng;CHEN Yue;JIA Hongyong;CHEN Yanru;ZHANG Xinyue;School of Data and Target Engineering
Spatio-temporal aware privacy-preserving scheme in LBS LI Weihao;DING Sheng;MENG Jiajie;LI Hui;School of Cyber Engineering
Concepts,issues,and applications of fog computing JIA Weijia;ZHOU Xiaojie;School of Electronic
Joint admission control algorithm based on load transfer in heterogeneous networks XIA Weiwei;DING Zhaoming;SHEN Lianfeng;National Mobile Communications Research Laboratory
Secure and efficient token based roaming authentication scheme for space-earth integration network XUE Kaiping;MA Yongjin;HONG Jia'nan;XU Jie;YANG Qingyou;Department of Electronic Engineering and Information Science
Pseudo 4D projective coordinate-based multi-base scalar multiplication XU Ming;SHI Liang;College of Information Engineering
Key storage management scheme based on keyed hash tree with state WANG Xiangyu;MA Jianfeng;MIAO Yinbin;ZHANG Kai;WU Qiying;School of Cyber Engineering
Automatic method for searching integral distinguishers of ARX block ciphers HAN Ya;WANG Mingsheng;State Key Laboratory of Information Security
Nondata-aided error vector magnitude performance analysis over κ-μ shadowed fading channel YANG Fan;ZENG Xiaoping;MAO Haiwei;JIAN Xin;DU Derong;TAN Xiaoheng;GAO Yiwen;The College of Communication Engineering
Reliability modeling and planning of energy harvesting based on uncertainty theory WANG Zhe;LI Taoshen;YE Jin;GE Zhihui;WU Min;College of Electrical Engineering
2018 Issues:  [01] [05]
More Issues:   [1980]   [1981]   [1982]   [1983]   [1984]   [1985]   [1986]   [1987]   [1988]   [1989]   [1990]   [1991]   [1992]   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved