限定检索结果

检索条件"机构=Beijing University of Posts and Telecommunications"
99 条 记 录,以下是1-10 订阅
视图:
排序:
STABILITY OF GENERALIZED JACKSON NETWORKS WITH INFINITE SUPPLY OF WORK
收藏 引用
《Journal of Systems Science & Complexity》2008年 第2期21卷 283-295页
作者:Yongjiang GUOSchool of Science Beijing University of Posts and Telecommunications Beijing 100876 China 
A general Jackson network (GJN) with infinite supply of work is considered. By fluid limit model, the author finds that the Markov process describing the dynamics of the GJN with infinite supply of work is positive ...
来源:详细信息评论
Cyclostationary signature design for common control channel of cognitive radio
收藏 引用
《The Journal of China Universities of posts and telecommunications2009年 第2期16卷 42-46页
作者:QI Yuan PENG Tao WANG Wen-bo LUO Shi-feng School of Telecommunication Engineering,beijing university of posts and telecommunications,beijing 100876,China[a]School of Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China 
Embedding specific signatures in transmitted signals for identifying common control channels of cognitive radio are addressed in research laboratories because availability of the spectrum occupied by the common contro...
来源:详细信息评论
EXIT analysis of M-algorithm based MIMO detectors and LDPC code design optimization
收藏 引用
《Science in China(Series F)》2009年 第12期52卷 2248-2258页
作者:YOU MingHou1,2, TAO XiaoFeng1,2, CUI QiMei1,2 & ZHANG Ping1,2 1 Wireless Technology Innovation Institute, beijing university of posts and telecommunications, beijing 100876, China 2 Key Laboratory of Universal Wireless Communications, (beijing university of posts and telecommunications), Ministry of Education, beijing 100876, ChinaWireless Technology Innovation Institute Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications) Ministry of Education Beijing 100876 China 
This paper investigates joint design and optimization of both low density parity check (LDPC) codes and M-algorithm based detectors including iterative tree search (ITS) and soft-output M-algorithm (SOMA) in mul...
来源:详细信息评论
A NEW METHOD FOR DESIGNING FULL FREQUENCY HOP CODES
收藏 引用
《Journal of Electronics(China)》1993年 第2期10卷 132-138页
作者:杨义先Beijing University of Posts and TelecommunicationsBeijing 100088 
Permutation polynomials in finite fields are introduced for the first time into thedesign of full frequency hop codes(FHCs).Various kinds of full FHCs with good auto-and cross-correlation functions are presented in th...
来源:详细信息评论
THEORY AND DESIGN OF UNIFORM FILTER BANKS USING ALL-PASS FILTERS
收藏 引用
《Journal of Electronics(China)》1993年 第2期10卷 107-115页
作者:王文博 王德隽Beijing University of Posts and TelecommunicationsBeijing 100088 
In this paper,the theory of uniform filter banks using all-pass tilters is furtherdeveloped.A new structure of two stage filter banks using all-pass filter is proposed,The pre-stage is half-band filter with period,the...
来源:详细信息评论
Robust Tomlinsion-Harashima precoding design with outdated CSIT
收藏 引用
《The Journal of China Universities of posts and telecommunications2010年 第2期17卷 59-62页
作者:WANG Xu-zhen ,NIU Kai,HE Zhi-qiang,YU Guang-wei,WU Wei-ling Key Laboratory of Universal Wireless Communications,Ministry of Education,beijing university of posts and telecommunications,beijing 100876,China[a] Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts Telecommunications Beijing 100876 China 
The channel state information at transmitter (CSIT) acquisition plays a key role in the multi-input multi-output (MIMO) system, especially for the precoding schemes. However it is unrealizable to acquire perfect C...
来源:详细信息评论
Blocking Probability Based Hierarchical Storage Design in VoD Systems
收藏 引用
《The Journal of China Universities of posts and telecommunications2003年 第1期10卷 44-48页
作者:LI Qing-guo, SUN Song-lin, CAI An-ni, SUN Jing-ao (beijing university of posts and telecommunications, beijing 100876, P.R. China)Beijing University of Posts and Telecommunications 北京 100876 
In this paper, we discuss the relationship between the blocking probabilityand the configuration of storage hierarchy in a Video on Demand ( VoD) server using the queueingmodel we propose. With this model, the optimal...
来源:详细信息评论
A 3-D Polarization Quadrature Amplitude Modulation Method and Constellation Mapping
收藏 引用
《China Communications》2015年 第10期12卷 16-26页
作者:SUN Xuehong ZHANG Haiying ZENG Zhimin GUO CailiBeijing Key Laboratory of Network System Architecture and ConvergenceSchool of Information and Communication EngineeringBeijing University of Posts and Telecommunications Key Laboratory of Intelligent Sensing for Desert InformationSchool of Physics Electrical EngineeringNingxia University 
As a new three-dimensional(3-D)modulation,Polarization Quadrature Amplitude Modulation(PQAM) can be regarded as the combination of Pulse amplitude modulation(PAM) and Quadrature Amplitude Modulation(QAM) *** can bette...
来源:详细信息评论
An Applied Method for Designing Maximally Decimating Non-uniform Filter Banks
收藏 引用
《The Journal of China Universities of posts and telecommunications2003年 第1期10卷 25-28,33页
作者:LI Xue-bin, LIU Ze-min (beijing university of posts and telecommunications, beijing 100876, P.R. China)Beijing University of Posts and Telecommunications Beijing 100876 P. R. China 
Assembling individual line phase filters to form a multi-channel filter bank allows the synthesis filter to be similar to corresponding analysis filters, and the design calculation can be simple. The appropriate relat...
来源:详细信息评论
Design of Secure Distributed Intrusion Detection Systems
收藏 引用
《The Journal of China Universities of posts and telecommunications2002年 第2期9卷 17-24页
作者:GUO Dai fei, YANG Yi xian, HU Zheng ming (Information Security Center, beijing university of posts and telecommunications, beijing 100876, P. R. China)Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 P. R. China 
Intrusion Detection System(IDS)have received a great deal ofattention because of their excellent ability of preventing networkincidents. Recently, many efficient approaches have been proposed toimprove detection abili...
来源:详细信息评论
聚类工具 回到顶部