[1] |
Cheng Yi, Zhao Yan, Yin Peiwen.
Radar false alarm plots elimination based on multi-feature extraction and classification
[J]. The Journal of China Universities of Posts and Telecommunications, 2024, 31(1): 83-92.
|
[2] |
Niu Yaohui, Li Xiuping, Zhao Wenyu.
Review of reader antennas for UHF RFID systems
[J]. The Journal of China Universities of Posts and Telecommunications, 2023, 30(5): 72-92.
|
[3] |
Li Yajie, Zhang Jie.
Artificial intelligence for optical transport networks: architecture, application and challenges
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(6): 3-17.
|
[4] |
Xie Xiaode Zheng Jiali Lin Zihan He Siyi Feng Minyu.
Random mating mayfly algorithm for RFID network planning
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(5): 40-50.
|
[5] |
Lin Zihan, Zheng Jiali, Xie Xiaode, Feng Minyu, He Siyi.
RFID network planning based on improved brain storm optimization algorithm
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(5): 30-39.
|
[6] |
Lu Zhichao, Zhao Haiying.
Shared experiences across multiple devices: a new digital interactive experience method for cultural heritage based on mixed reality
[J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29(2): 1-12.
|
[7] |
Quan Yixuan, Zheng Jiali, Xie Xiaode, Lin Zihan, Luo Wencong.
Hybrid gray wolf optimization-cuckoo search algorithm for RFID network planning
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(6): 91-102.
|
[8] |
.
Design and verification of on-chip debug circuit based on JTAG
[J]. The Journal of China Universities of Posts and Telecommunications, 2021, 28(3): 95-101.
|
[9] |
Li Li, Zheng Jiali, Quan Yixuan, Lin Zihan, Li Yingchao, Huang Tianxing.
RFID Indoor positioning based on Semi-supervised Actor-Critic Co-training
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(5): 69-81.
|
[10] |
Lin Qiaomin, Fa Anqi, Pan Min, Xie Qiang, Du Kun, Sheng Michael.
Cleaning RFID data streams based on K-means clustering method
[J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27(2): 72-81.
|
[11] |
.
Research on a provable security RFID authentication protocol based on Hash function
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2016, 23(2): 31-37.
|
[12] |
Kai KANG.
Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2016, 23(2): 56-65.
|
[13] |
周前能 闫凯 林金朝 庞宇 李国权 罗伟.
Novel high-PSRR high-order curvature-compensated bandgap voltage reference
[J]. JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOM, 2016, 23(2): 66-72.
|
[14] |
Zhang Xiaohong, Hu Yingmeng.
RFID mutual-authentication protocol with synchronous updated-keys based on Hash function
[J]. Acta Metallurgica Sinica(English letters), 2015, 22(6): 27-35.
|
[15] |
.
Research on robust multi-period inventory inaccuracy based on RFID technology
[J]. Acta Metallurgica Sinica(English letters), 2015, 22(5): 32-40.
|