-
61
Resource allocation strategy of low earth orbit satellite oriented to user transmission difference
Published 2023-08-01Get full text
Article -
62
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Get full text
Article -
63
Temporal fair active queue management algorithm for multi-rate 802.11 WLAN
Published 2009-01-01Get full text
Article -
64
Study on chaos phase space synchronous rotation and distinguish switching security communication
Published 2016-10-01Get full text
Article -
65
-
66
Algorithm study of digital HPA predistortion using one novel memory type BP neural network
Published 2014-01-01Get full text
Article -
67
Blockchain sharding storage scheme based on concatenated coding
Published 2024-07-01Get full text
Article -
68
User scheduling and power allocation strategy for cell-free networks based on federated learning
Published 2024-09-01Get full text
Article -
69
Deep learning based physical layer wireless communication techniques:opportunities and challenges
Published 2019-02-01Get full text
Article -
70
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01Get full text
Article -
71
Fuzzy clustering method based on genetic algorithm in intrusion detection study
Published 2009-01-01Get full text
Article -
72
Contact plan design based on bi-directional particle swarm optimization in satellite network
Published 2019-08-01Get full text
Article -
73
Simple scheme combining space-time coded OFDM with multi-dimension beamforming
Published 2006-01-01Get full text
Article -
74
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01Get full text
Article -
75
-
76
Security model without managers for blockchain trading system
Published 2020-12-01Get full text
Article -
77
Overview of research progress on blind separation methods for single channel communication signal
Published 2023-08-01Get full text
Article -
78
Research of fast decoding for longer constraint length convolutional codes
Published 2010-01-01Get full text
Article -
79
Polynomial estimation method for PN sequence based on reliability accumulation
Published 2012-09-01Get full text
Article -
80
Secrecy capacity analysis of MISO system with artificial noise
Published 2012-10-01Get full text
Article