callback( { "result":{ "query":":facetid:toc:\"db/journals/jcm/jcm11.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"223.73" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"138", "@dc":"138", "@oc":"138", "@id":"43453365", "text":":facetid:toc:db/journals/jcm/jcm11.bht" } }, "hits":{ "@total":"138", "@computed":"138", "@sent":"138", "@first":"0", "hit":[{ "@score":"1", "@id":"3136288", "info":{"authors":{"author":[{"@pid":"17/2212-6","text":"Qiang Tang 0006"},{"@pid":"50/11068","text":"Yuansheng Luo"},{"@pid":"196/1535","text":"Ming-Zhong Xie"},{"@pid":"62/5860","text":"Ping Li"}]},"title":"Connected Dominating Set Construction Algorithm for Wireless Networks Based on Connected Subset.","venue":"J. Commun.","volume":"11","number":"1","pages":"50-57","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/0006LXL16","doi":"10.12720/JCM.11.1.50-57","ee":"https://doi.org/10.12720/jcm.11.1.50-57","url":"https://dblp.org/rec/journals/jcm/0006LXL16"}, "url":"URL#3136288" }, { "@score":"1", "@id":"3136289", "info":{"authors":{"author":[{"@pid":"196/1496","text":"Ahmed Abu-Khadrah"},{"@pid":"162/4613","text":"Zahriladha Zakaria"},{"@pid":"196/1487","text":"Mohdazlishah Othman"},{"@pid":"89/9873","text":"Mohd Shahril Izuan Mohd Zin"}]},"title":"Markov Chain Model and Performance Enhancement for EDCA Protocol.","venue":"J. Commun.","volume":"11","number":"8","pages":"748-757","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Abu-KhadrahZOZ16","doi":"10.12720/JCM.11.8.748-757","ee":"https://doi.org/10.12720/jcm.11.8.748-757","url":"https://dblp.org/rec/journals/jcm/Abu-KhadrahZOZ16"}, "url":"URL#3136289" }, { "@score":"1", "@id":"3136290", "info":{"authors":{"author":[{"@pid":"152/0148","text":"Ban Al-Omar"},{"@pid":"196/1750","text":"A. R. Ali-Ali"},{"@pid":"28/4314","text":"Taha Landolsi"}]},"title":"WiMAX Multiple Hops Architecturein Smart Grid Communications.","venue":"J. Commun.","volume":"11","number":"9","pages":"805-812","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Al-OmarAL16","doi":"10.12720/JCM.11.9.805-812","ee":"https://doi.org/10.12720/jcm.11.9.805-812","url":"https://dblp.org/rec/journals/jcm/Al-OmarAL16"}, "url":"URL#3136290" }, { "@score":"1", "@id":"3136291", "info":{"authors":{"author":{"@pid":"05/10823","text":"Mohammed M. Alwakeel"}},"title":"Quadrature Spatial Modulation Performance Analysis over Rician Fading Channels.","venue":"J. Commun.","volume":"11","number":"3","pages":"249-254","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Alwakeel16","doi":"10.12720/JCM.11.3.249-254","ee":"https://doi.org/10.12720/jcm.11.3.249-254","url":"https://dblp.org/rec/journals/jcm/Alwakeel16"}, "url":"URL#3136291" }, { "@score":"1", "@id":"3136292", "info":{"authors":{"author":[{"@pid":"32/3506","text":"Jing An"},{"@pid":"58/1568","text":"Chang Li"}]},"title":"Performance Analysis of Coded Cooperation Based on Distributed Turbo Codes with Multiple Relays.","venue":"J. Commun.","volume":"11","number":"7","pages":"667-676","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/AnL16","doi":"10.12720/JCM.11.7.667-676","ee":"https://doi.org/10.12720/jcm.11.7.667-676","url":"https://dblp.org/rec/journals/jcm/AnL16"}, "url":"URL#3136292" }, { "@score":"1", "@id":"3136293", "info":{"authors":{"author":{"@pid":"196/2035","text":"Hui Bao"}},"title":"Delay Lock Loop Assisted Phase Lock Loop for GNSS Signal Tracking.","venue":"J. Commun.","volume":"11","number":"5","pages":"471-477","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Bao16","doi":"10.12720/JCM.11.5.471-477","ee":"https://doi.org/10.12720/jcm.11.5.471-477","url":"https://dblp.org/rec/journals/jcm/Bao16"}, "url":"URL#3136293" }, { "@score":"1", "@id":"3136294", "info":{"authors":{"author":[{"@pid":"26/2077","text":"Jianrong Bao"},{"@pid":"05/5369","text":"Xiqi Gao 0001"},{"@pid":"94/5745","text":"Xiaorong Xu"},{"@pid":"19/113","text":"Rui Guo"},{"@pid":"18/4625-8","text":"Bin Jiang 0008"}]},"title":"Low Rate QC LDPC Codes with Reconfigurable Structures for Space Information Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"255-262","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/BaoGXGJ16","doi":"10.12720/JCM.11.3.255-262","ee":"https://doi.org/10.12720/jcm.11.3.255-262","url":"https://dblp.org/rec/journals/jcm/BaoGXGJ16"}, "url":"URL#3136294" }, { "@score":"1", "@id":"3136295", "info":{"authors":{"author":[{"@pid":"26/2077","text":"Jianrong Bao"},{"@pid":"77/2036","text":"Dan He"},{"@pid":"18/4625-8","text":"Bin Jiang 0008"},{"@pid":"01/3168","text":"Xianghong Tang"}]},"title":"High Rate QC-LDPC Codes with Optimization of Maximum Average Girth.","venue":"J. Commun.","volume":"11","number":"10","pages":"936-943","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/BaoHJT16","doi":"10.12720/JCM.11.10.936-943","ee":"https://doi.org/10.12720/jcm.11.10.936-943","url":"https://dblp.org/rec/journals/jcm/BaoHJT16"}, "url":"URL#3136295" }, { "@score":"1", "@id":"3136296", "info":{"authors":{"author":[{"@pid":"159/4370","text":"Xuyan Bao"},{"@pid":"196/1879","text":"Xiaojin Zhou"},{"@pid":"49/7526","text":"Xiaojuan Wang"},{"@pid":"66/4615-25","text":"Yong Zhang 0025"},{"@pid":"05/2978","text":"Mei Song"}]},"title":"Topology Control based on Set Cover for Delay-Tolerant Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"272-281","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/BaoZWZS16","doi":"10.12720/JCM.11.3.272-281","ee":"https://doi.org/10.12720/jcm.11.3.272-281","url":"https://dblp.org/rec/journals/jcm/BaoZWZS16"}, "url":"URL#3136296" }, { "@score":"1", "@id":"3136297", "info":{"authors":{"author":[{"@pid":"158/6407","text":"Fuyu Cai"},{"@pid":"43/5512","text":"Fons J. Verbeek"}]},"title":"Rough Fuzzy C-means and Particle Swarm Optimization Hybridized Method for Information Clustering Problem.","venue":"J. Commun.","volume":"11","number":"12","pages":"1106-1113","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/CaiV16","doi":"10.12720/JCM.11.12.1106-1113","ee":"https://doi.org/10.12720/jcm.11.12.1106-1113","url":"https://dblp.org/rec/journals/jcm/CaiV16"}, "url":"URL#3136297" }, { "@score":"1", "@id":"3136298", "info":{"authors":{"author":[{"@pid":"25/7045","text":"Yang Cao"},{"@pid":"04/999","text":"Hui Yang"},{"@pid":"25/8074","text":"Xiaoxu Zhu"}]},"title":"Energy Saving Scheme Based on Multi-modes Hybrid Dynamic Bandwidth Optimization for Software Defined Distribution Optical Networks.","venue":"J. Commun.","volume":"11","number":"12","pages":"1028-1035","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/CaoYZ16","doi":"10.12720/JCM.11.12.1028-1035","ee":"https://doi.org/10.12720/jcm.11.12.1028-1035","url":"https://dblp.org/rec/journals/jcm/CaoYZ16"}, "url":"URL#3136298" }, { "@score":"1", "@id":"3136299", "info":{"authors":{"author":[{"@pid":"42/10205","text":"Yourong Chen"},{"@pid":"04/4498","text":"Junjie Chen"},{"@pid":"20/10208","text":"Zhangquan Wang"},{"@pid":"149/3252","text":"Tiaojuan Ren"}]},"title":"Hybrid Localization Algorithm of Mobile Nodes in Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"4","pages":"358-364","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ChenCWR16","doi":"10.12720/JCM.11.4.358-364","ee":"https://doi.org/10.12720/jcm.11.4.358-364","url":"https://dblp.org/rec/journals/jcm/ChenCWR16"}, "url":"URL#3136299" }, { "@score":"1", "@id":"3136300", "info":{"authors":{"author":[{"@pid":"55/6253-2","text":"Bing Chen 0002"},{"@pid":"74/3247","text":"Hong Shen"},{"@pid":"188/7823","text":"Xiaoxiao Cao"}]},"title":"Cooperative Caching Placement in Cognitive Device-to-Device Networks.","venue":"J. Commun.","volume":"11","number":"1","pages":"42-49","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ChenSC16","doi":"10.12720/JCM.11.1.42-49","ee":"https://doi.org/10.12720/jcm.11.1.42-49","url":"https://dblp.org/rec/journals/jcm/ChenSC16"}, "url":"URL#3136300" }, { "@score":"1", "@id":"3136301", "info":{"authors":{"author":[{"@pid":"72/4440","text":"Yonghong Chen"},{"@pid":"12/1198-42","text":"Jie Yang 0042"},{"@pid":"58/9492","text":"Xuehong Cao"},{"@pid":"02/1003-9","text":"Rui Chen 0009"}]},"title":"Energy Efficiency Analysis of Multi-Antenna Heterogeneous Relay-Assisted Cellular Network via Stochastic Geometry.","venue":"J. Commun.","volume":"11","number":"11","pages":"970-976","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ChenYCC16","doi":"10.12720/JCM.11.11.970-976","ee":"https://doi.org/10.12720/jcm.11.11.970-976","url":"https://dblp.org/rec/journals/jcm/ChenYCC16"}, "url":"URL#3136301" }, { "@score":"1", "@id":"3136302", "info":{"authors":{"author":[{"@pid":"152/6825","text":"Fatang Chen"},{"@pid":"196/1675","text":"Fanchao Zha"},{"@pid":"196/1549","text":"Hanyan Zhang"}]},"title":"Adaptive Space-Time Block Coded Spatial Modulation Algorithm Based on Constellation Transformation.","venue":"J. Commun.","volume":"11","number":"11","pages":"1020-1027","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ChenZZ16","doi":"10.12720/JCM.11.11.1020-1027","ee":"https://doi.org/10.12720/jcm.11.11.1020-1027","url":"https://dblp.org/rec/journals/jcm/ChenZZ16"}, "url":"URL#3136302" }, { "@score":"1", "@id":"3136303", "info":{"authors":{"author":[{"@pid":"152/0037","text":"Chuang Deng"},{"@pid":"96/2203","text":"Shengwei Wang"},{"@pid":"144/1516","text":"Junyong Liu"},{"@pid":"24/2541","text":"Zhen Yu"}]},"title":"A Novel Intelligent Working Monitoring and Guarding System of Smart Substations Based on UWB Positioning and Aerial LiDAR Data.","venue":"J. Commun.","volume":"11","number":"8","pages":"765-771","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/DengWLY16","doi":"10.12720/JCM.11.8.765-771","ee":"https://doi.org/10.12720/jcm.11.8.765-771","url":"https://dblp.org/rec/journals/jcm/DengWLY16"}, "url":"URL#3136303" }, { "@score":"1", "@id":"3136304", "info":{"authors":{"author":[{"@pid":"196/1742","text":"Hervé Gokou Diédié"},{"@pid":"33/5789","text":"Michel Babri"},{"@pid":"196/1819","text":"Boko Aka"}]},"title":"Efficient Cluster-Based Self-Organization Scheme for Connectivity Control in Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"7","pages":"632-643","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/DiedieBA16","doi":"10.12720/JCM.11.7.632-643","ee":"https://doi.org/10.12720/jcm.11.7.632-643","url":"https://dblp.org/rec/journals/jcm/DiedieBA16"}, "url":"URL#3136304" }, { "@score":"1", "@id":"3136305", "info":{"authors":{"author":[{"@pid":"10/6868","text":"Lin Ding"},{"@pid":"96/6688","text":"Minsheng Tan"}]},"title":"Robustness of Random Scale-Free Networks against Cascading Failure under Edge Attacks.","venue":"J. Commun.","volume":"11","number":"12","pages":"1088-1094","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/DingT16","doi":"10.12720/JCM.11.12.1088-1094","ee":"https://doi.org/10.12720/jcm.11.12.1088-1094","url":"https://dblp.org/rec/journals/jcm/DingT16"}, "url":"URL#3136305" }, { "@score":"1", "@id":"3136306", "info":{"authors":{"author":[{"@pid":"07/3314","text":"Haitao Dong"},{"@pid":"76/893","text":"Lei Song"},{"@pid":"50/1682","text":"Jin-Lin Wang 0001"},{"@pid":"y/JunYang4","text":"Jun Yang 0004"}]},"title":"SSLSARD: A Request Distribution Technique for Distributed SSL Reverse Proxies.","venue":"J. Commun.","volume":"11","number":"4","pages":"374-382","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/DongSWY16","doi":"10.12720/JCM.11.4.374-382","ee":"https://doi.org/10.12720/jcm.11.4.374-382","url":"https://dblp.org/rec/journals/jcm/DongSWY16"}, "url":"URL#3136306" }, { "@score":"1", "@id":"3136307", "info":{"authors":{"author":[{"@pid":"175/2677","text":"Anming Dong"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"},{"@pid":"75/4570","text":"Dongfeng Yuan"}]},"title":"Probabilistic Constraint Robust Transceiver Design for MIMO Interference Channel Networks.","venue":"J. Commun.","volume":"11","number":"4","pages":"340-348","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/DongZY16","doi":"10.12720/JCM.11.4.340-348","ee":"https://doi.org/10.12720/jcm.11.4.340-348","url":"https://dblp.org/rec/journals/jcm/DongZY16"}, "url":"URL#3136307" }, { "@score":"1", "@id":"3136308", "info":{"authors":{"author":[{"@pid":"11/7673","text":"Ning Du"},{"@pid":"55/2270-4","text":"Hao Zhang 0004"},{"@pid":"98/10847","text":"Tingting Lv"},{"@pid":"g/TAGulliver","text":"T. Aaron Gulliver"}]},"title":"Threshold Selection for TOA Estimation Based on Skewness and Kurtosis in 60GHz Ranging System.","venue":"J. Commun.","volume":"11","number":"5","pages":"507-515","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Du0LG16","doi":"10.12720/JCM.11.5.507-515","ee":"https://doi.org/10.12720/jcm.11.5.507-515","url":"https://dblp.org/rec/journals/jcm/Du0LG16"}, "url":"URL#3136308" }, { "@score":"1", "@id":"3136309", "info":{"authors":{"author":[{"@pid":"57/2878","text":"Fei Fang"},{"@pid":"69/339","text":"Meng Jiang"}]},"title":"A Fast Adaptive Control Algorithm for Slotted ALOHA.","venue":"J. Commun.","volume":"11","number":"2","pages":"203-212","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/FangJ16","doi":"10.12720/JCM.11.2.203-212","ee":"https://doi.org/10.12720/jcm.11.2.203-212","url":"https://dblp.org/rec/journals/jcm/FangJ16"}, "url":"URL#3136309" }, { "@score":"1", "@id":"3136310", "info":{"authors":{"author":[{"@pid":"62/2271","text":"Zhaoxi Fang"},{"@pid":"28/8329","text":"Pengfei Shao"},{"@pid":"96/780","text":"Wen Zheng"},{"@pid":"196/1562","text":"Zeping Pang"}]},"title":"Differential Network Coded Transmission for Two-Way Relay Networks with Large Antenna Array.","venue":"J. Commun.","volume":"11","number":"10","pages":"944-949","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/FangSZP16","doi":"10.12720/JCM.11.10.944-949","ee":"https://doi.org/10.12720/jcm.11.10.944-949","url":"https://dblp.org/rec/journals/jcm/FangSZP16"}, "url":"URL#3136310" }, { "@score":"1", "@id":"3136311", "info":{"authors":{"author":[{"@pid":"140/2394","text":"Miguel Rodel Felipe"},{"@pid":"158/5244","text":"Sivaraman Sundaram"},{"@pid":"45/10447","text":"Donghong Wang"},{"@pid":"85/2357","text":"Khin Mi Mi Aung"}]},"title":"Secured Large Scale Shared Storage System.","venue":"J. Commun.","volume":"11","number":"1","pages":"93-99","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/FelipeSWA16","doi":"10.12720/JCM.11.1.93-99","ee":"https://doi.org/10.12720/jcm.11.1.93-99","url":"https://dblp.org/rec/journals/jcm/FelipeSWA16"}, "url":"URL#3136311" }, { "@score":"1", "@id":"3136312", "info":{"authors":{"author":[{"@pid":"196/1807","text":"Lingyun Feng"},{"@pid":"60/9804","text":"Yueyun Chen"},{"@pid":"32/3338","text":"Xinzhe Wang"}]},"title":"Energy-Efficient Resource Allocation in Macrocell-Smallcell Heterogeneous Networks.","venue":"J. Commun.","volume":"11","number":"5","pages":"440-445","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/FengCW16","doi":"10.12720/JCM.11.5.440-445","ee":"https://doi.org/10.12720/jcm.11.5.440-445","url":"https://dblp.org/rec/journals/jcm/FengCW16"}, "url":"URL#3136312" }, { "@score":"1", "@id":"3136313", "info":{"authors":{"author":[{"@pid":"162/2675-2","text":"Qiming Fu 0002"},{"@pid":"z/XiaoZhou-2","text":"Xiao Zhou 0002"},{"@pid":"23/2651","text":"Cheng-You Wang"},{"@pid":"119/1697","text":"Baochen Jiang"}]},"title":"Mathematical Relation between APBT-Based and DCT-Based JPEG Image Compression Schemes.","venue":"J. Commun.","volume":"11","number":"1","pages":"84-92","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/FuZWJ16","doi":"10.12720/JCM.11.1.84-92","ee":"https://doi.org/10.12720/jcm.11.1.84-92","url":"https://dblp.org/rec/journals/jcm/FuZWJ16"}, "url":"URL#3136313" }, { "@score":"1", "@id":"3136314", "info":{"authors":{"author":[{"@pid":"14/3881","text":"Xiang Gao"},{"@pid":"93/2334-36","text":"Yong Li 0036"},{"@pid":"26/2077","text":"Jianrong Bao"}]},"title":"Efficient Carrier Acquisition and Tracking for High Dynamic and Weak Satellite Signals.","venue":"J. Commun.","volume":"11","number":"7","pages":"644-652","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/GaoLB16","doi":"10.12720/JCM.11.7.644-652","ee":"https://doi.org/10.12720/jcm.11.7.644-652","url":"https://dblp.org/rec/journals/jcm/GaoLB16"}, "url":"URL#3136314" }, { "@score":"1", "@id":"3136315", "info":{"authors":{"author":[{"@pid":"196/1643","text":"Li-Jun Ge"},{"@pid":"196/1868","text":"Yi-Tai Cheng"},{"@pid":"196/1909","text":"Bing-Rui Xiao"}]},"title":"Joint Channel Estimation and Nonlinear Distortion Recovery Based on Compressed Sensing for OFDM Systems.","venue":"J. Commun.","volume":"11","number":"1","pages":"15-22","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/GeCX16","doi":"10.12720/JCM.11.1.15-22","ee":"https://doi.org/10.12720/jcm.11.1.15-22","url":"https://dblp.org/rec/journals/jcm/GeCX16"}, "url":"URL#3136315" }, { "@score":"1", "@id":"3136316", "info":{"authors":{"author":[{"@pid":"166/7501","text":"Lijun Ge"},{"@pid":"61/500","text":"Yue Li"},{"@pid":"130/6597","text":"Jin Tao"}]},"title":"Time and Frequency Synchronization Scheme for IEEE802.15.3c OFDM System.","venue":"J. Commun.","volume":"11","number":"2","pages":"143-148","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/GeLT16","doi":"10.12720/JCM.11.2.143-148","ee":"https://doi.org/10.12720/jcm.11.2.143-148","url":"https://dblp.org/rec/journals/jcm/GeLT16"}, "url":"URL#3136316" }, { "@score":"1", "@id":"3136317", "info":{"authors":{"author":[{"@pid":"09/8388","text":"Xian Guo"},{"@pid":"12/4774","text":"Tao Feng"},{"@pid":"196/1744","text":"Jun-li Fang"},{"@pid":"02/736","text":"Jing Wang"},{"@pid":"05/511","text":"Ye Lu"}]},"title":"Secure Content Delivery Scheme Based on Yaksha System for CCMANETs.","venue":"J. Commun.","volume":"11","number":"2","pages":"221-230","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/GuoFFJL16","doi":"10.12720/JCM.11.2.221-230","ee":"https://doi.org/10.12720/jcm.11.2.221-230","url":"https://dblp.org/rec/journals/jcm/GuoFFJL16"}, "url":"URL#3136317" }, { "@score":"1", "@id":"3136318", "info":{"authors":{"author":[{"@pid":"70/2221","text":"Hui Guo"},{"@pid":"151/9907","text":"Shilong Ji"},{"@pid":"17/1495","text":"Lihong Wang"}]},"title":"Outage Performance of Cognitive Multi-Hop Network under Interference Constraints over Nakagami-m Fading.","venue":"J. Commun.","volume":"11","number":"7","pages":"686-692","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/GuoJW16","doi":"10.12720/JCM.11.7.686-692","ee":"https://doi.org/10.12720/jcm.11.7.686-692","url":"https://dblp.org/rec/journals/jcm/GuoJW16"}, "url":"URL#3136318" }, { "@score":"1", "@id":"3136319", "info":{"authors":{"author":[{"@pid":"196/1477","text":"Ayman Hajjawi"},{"@pid":"25/5105","text":"Mahamod Ismail"},{"@pid":"36/8515","text":"Nor Fadzilah Abdullah"},{"@pid":"33/11252","text":"Rosdiadee Nordin"},{"@pid":"44/7024","text":"Özgür Ertug"}]},"title":"A PDR-Based Scheduling Scheme for LTE-A Networks.","venue":"J. Commun.","volume":"11","number":"9","pages":"856-861","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HajjawiIANE16","doi":"10.12720/JCM.11.9.856-861","ee":"https://doi.org/10.12720/jcm.11.9.856-861","url":"https://dblp.org/rec/journals/jcm/HajjawiIANE16"}, "url":"URL#3136319" }, { "@score":"1", "@id":"3136320", "info":{"authors":{"author":[{"@pid":"89/487","text":"Wang Hao"},{"@pid":"18/7768","text":"Zhu Qi"}]},"title":"Power Allocation and Relay Selection Scheme Based on System Outage Probability for Energy-Harvesting Cooperative Network.","venue":"J. Commun.","volume":"11","number":"10","pages":"903-909","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HaoQ16","doi":"10.12720/JCM.11.10.903-909","ee":"https://doi.org/10.12720/jcm.11.10.903-909","url":"https://dblp.org/rec/journals/jcm/HaoQ16"}, "url":"URL#3136320" }, { "@score":"1", "@id":"3136321", "info":{"authors":{"author":[{"@pid":"196/1810","text":"Lee Cheun Hau"},{"@pid":"196/1878","text":"Yun Seng Lim"}]},"title":"A Real-Time Active Peak Demand Reduction for Battery Energy Storage with Limited Capacity.","venue":"J. Commun.","volume":"11","number":"9","pages":"841-847","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HauL16","doi":"10.12720/JCM.11.9.841-847","ee":"https://doi.org/10.12720/jcm.11.9.841-847","url":"https://dblp.org/rec/journals/jcm/HauL16"}, "url":"URL#3136321" }, { "@score":"1", "@id":"3136322", "info":{"authors":{"author":[{"@pid":"42/963","text":"Liang He"},{"@pid":"41/5232","text":"Yuanyuan Li"},{"@pid":"196/1906","text":"Longwen Wu"},{"@pid":"05/1367","text":"Yaqin Zhao"},{"@pid":"127/4896","text":"Shuying Li"}]},"title":"Maximizing Energy Efficiency in Heterogeneous Cellular Network with Massive MIMO and Small Cells.","venue":"J. Commun.","volume":"11","number":"7","pages":"616-623","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HeLWZL16","doi":"10.12720/JCM.11.7.616-623","ee":"https://doi.org/10.12720/jcm.11.7.616-623","url":"https://dblp.org/rec/journals/jcm/HeLWZL16"}, "url":"URL#3136322" }, { "@score":"1", "@id":"3136323", "info":{"authors":{"author":[{"@pid":"22/6402","text":"Haiping Huang"},{"@pid":"86/6853","text":"Dan Sha"},{"@pid":"34/3240","text":"Yongcan Zhang"},{"@pid":"10/1749","text":"Pengfei Li"}]},"title":"Routing Algorithm and Traffic Light Control based on Vehicular Delay-Tolerant Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"305-316","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HuangSZL16","doi":"10.12720/JCM.11.3.305-316","ee":"https://doi.org/10.12720/jcm.11.3.305-316","url":"https://dblp.org/rec/journals/jcm/HuangSZL16"}, "url":"URL#3136323" }, { "@score":"1", "@id":"3136324", "info":{"authors":{"author":[{"@pid":"163/3229","text":"Yuanhong Huo"},{"@pid":"98/4851","text":"Dake Liu"}]},"title":"A High-Throughput Processor for Cryptographic Hash Functions.","venue":"J. Commun.","volume":"11","number":"7","pages":"702-709","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/HuoL16","doi":"10.12720/JCM.11.7.702-709","ee":"https://doi.org/10.12720/jcm.11.7.702-709","url":"https://dblp.org/rec/journals/jcm/HuoL16"}, "url":"URL#3136324" }, { "@score":"1", "@id":"3136325", "info":{"authors":{"author":[{"@pid":"142/9120","text":"Xiaoxiao Jiang"},{"@pid":"55/1483","text":"Jie Jin"},{"@pid":"22/9348","text":"Chen Deng"},{"@pid":"20/6417-9","text":"Wei He 0009"}]},"title":"Replace Strategy Based Node Selection for Bearings-Only Target Tracking in Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"10","pages":"927-935","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/JiangJDH16","doi":"10.12720/JCM.11.10.927-935","ee":"https://doi.org/10.12720/jcm.11.10.927-935","url":"https://dblp.org/rec/journals/jcm/JiangJDH16"}, "url":"URL#3136325" }, { "@score":"1", "@id":"3136326", "info":{"authors":{"author":[{"@pid":"77/4076","text":"Yang Jiang"},{"@pid":"29/11053","text":"Yingjie Xu"},{"@pid":"173/2665","text":"Yunyan Xie"},{"@pid":"196/1894","text":"Shaokai Hong"},{"@pid":"29/4328","text":"Xia Wu"}]},"title":"Low-Complexity Detection Scheme for Generalized Spatial Modulation.","venue":"J. Commun.","volume":"11","number":"8","pages":"726-732","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/JiangXXHW16","doi":"10.12720/JCM.11.8.726-732","ee":"https://doi.org/10.12720/jcm.11.8.726-732","url":"https://dblp.org/rec/journals/jcm/JiangXXHW16"}, "url":"URL#3136326" }, { "@score":"1", "@id":"3136327", "info":{"authors":{"author":[{"@pid":"123/7966","text":"Liping Jin"},{"@pid":"14/6496","text":"Youming Li"},{"@pid":"62/2271","text":"Zhaoxi Fang"}]},"title":"Capacity Analysis of Broadband Relaying Systems for Low-Voltage Powerline Communications.","venue":"J. Commun.","volume":"11","number":"8","pages":"772-778","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/JinLF16","doi":"10.12720/JCM.11.8.772-778","ee":"https://doi.org/10.12720/jcm.11.8.772-778","url":"https://dblp.org/rec/journals/jcm/JinLF16"}, "url":"URL#3136327" }, { "@score":"1", "@id":"3136328", "info":{"authors":{"author":[{"@pid":"123/7966","text":"Liping Jin"},{"@pid":"14/6496","text":"Youming Li"},{"@pid":"62/2271","text":"Zhaoxi Fang"},{"@pid":"27/9245","text":"Jiong Shi"}]},"title":"Adaptive Three-Phase Differential Transmission Scheme for Two-Way Relay Networks.","venue":"J. Commun.","volume":"11","number":"7","pages":"660-666","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/JinLFS16","doi":"10.12720/JCM.11.7.660-666","ee":"https://doi.org/10.12720/jcm.11.7.660-666","url":"https://dblp.org/rec/journals/jcm/JinLFS16"}, "url":"URL#3136328" }, { "@score":"1", "@id":"3136329", "info":{"authors":{"author":[{"@pid":"120/1293","text":"Wenjing Kang"},{"@pid":"92/9706","text":"Gongliang Liu"},{"@pid":"00/6381","text":"Bin Hu"}]},"title":"Compressed Sensing Based Adaptive-Resolution Data Recovery in Underwater Sensor Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"317-324","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/KangLH16","doi":"10.12720/JCM.11.3.317-324","ee":"https://doi.org/10.12720/jcm.11.3.317-324","url":"https://dblp.org/rec/journals/jcm/KangLH16"}, "url":"URL#3136329" }, { "@score":"1", "@id":"3136330", "info":{"authors":{"author":[{"@pid":"16/3602","text":"Yung-An Kao"},{"@pid":"196/1711","text":"KunFeng Wu"}]},"title":"The Research of Frequency Domain Least Squares Channel Estimation in OFDM Systems.","venue":"J. Commun.","volume":"11","number":"2","pages":"157-163","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/KaoW16","doi":"10.12720/JCM.11.2.157-163","ee":"https://doi.org/10.12720/jcm.11.2.157-163","url":"https://dblp.org/rec/journals/jcm/KaoW16"}, "url":"URL#3136330" }, { "@score":"1", "@id":"3136331", "info":{"authors":{"author":[{"@pid":"196/1663","text":"Oliver Kehret"},{"@pid":"12/9557","text":"Manuel Schappacher"},{"@pid":"67/6275","text":"Axel Sikora"}]},"title":"A Network Emulation Testbed for Complex Topologies of Wired M-Bus According to EN13757.","venue":"J. Commun.","volume":"11","number":"9","pages":"819-826","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/KehretSS16","doi":"10.12720/JCM.11.9.819-826","ee":"https://doi.org/10.12720/jcm.11.9.819-826","url":"https://dblp.org/rec/journals/jcm/KehretSS16"}, "url":"URL#3136331" }, { "@score":"1", "@id":"3136332", "info":{"authors":{"author":[{"@pid":"196/1593","text":"Hwan-Chul Kim"},{"@pid":"196/1756","text":"Choong-Soo Lim"},{"@pid":"181/7196","text":"Chang-Seok Lee"},{"@pid":"45/1171","text":"Jeong-Hun Choi"}]},"title":"Introduction of Real-Time Video Surveillance System Using UAV.","venue":"J. Commun.","volume":"11","number":"2","pages":"213-220","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/KimLLC16","doi":"10.12720/JCM.11.2.213-220","ee":"https://doi.org/10.12720/jcm.11.2.213-220","url":"https://dblp.org/rec/journals/jcm/KimLLC16"}, "url":"URL#3136332" }, { "@score":"1", "@id":"3136333", "info":{"authors":{"author":[{"@pid":"196/1519","text":"Yong-Dong Lai"},{"@pid":"181/7535","text":"Ji-Ming Lin"},{"@pid":"29/6045","text":"Jin Ding"},{"@pid":"07/668","text":"Xiang Zhao"}]},"title":"A Simple Joint Clock Synchronization and Localization Algorithm with Low Communication Overhead.","venue":"J. Commun.","volume":"11","number":"1","pages":"77-83","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LaiLDZ16","doi":"10.12720/JCM.11.1.77-83","ee":"https://doi.org/10.12720/jcm.11.1.77-83","url":"https://dblp.org/rec/journals/jcm/LaiLDZ16"}, "url":"URL#3136333" }, { "@score":"1", "@id":"3136334", "info":{"authors":{"author":[{"@pid":"46/421","text":"Jiping Li"},{"@pid":"147/0480","text":"Yaoming Ding"},{"@pid":"06/5443","text":"Zenggang Xiong"},{"@pid":"42/1335","text":"Shouyin Liu"},{"@pid":"196/1589","text":"Honglai Li"}]},"title":"Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs.","venue":"J. Commun.","volume":"11","number":"1","pages":"58-63","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiDXLL16","doi":"10.12720/JCM.11.1.58-63","ee":"https://doi.org/10.12720/jcm.11.1.58-63","url":"https://dblp.org/rec/journals/jcm/LiDXLL16"}, "url":"URL#3136334" }, { "@score":"1", "@id":"3136335", "info":{"authors":{"author":[{"@pid":"152/0131","text":"Jianpo Li"},{"@pid":"196/1773","text":"Junyuan Huo"}]},"title":"Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"2","pages":"132-142","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiH16","doi":"10.12720/JCM.11.2.132-142","ee":"https://doi.org/10.12720/jcm.11.2.132-142","url":"https://dblp.org/rec/journals/jcm/LiH16"}, "url":"URL#3136335" }, { "@score":"1", "@id":"3136336", "info":{"authors":{"author":[{"@pid":"152/0131","text":"Jianpo Li"},{"@pid":"196/1773","text":"Junyuan Huo"}]},"title":"Quantum Genetic Energy Efficient Iteration Clustering Routing Algorithm for Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"12","pages":"1048-1056","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiH16a","doi":"10.12720/JCM.11.12.1048-1056","ee":"https://doi.org/10.12720/jcm.11.12.1048-1056","url":"https://dblp.org/rec/journals/jcm/LiH16a"}, "url":"URL#3136336" }, { "@score":"1", "@id":"3136337", "info":{"authors":{"author":[{"@pid":"83/6353","text":"Peng Li"},{"@pid":"42/6727","text":"Yunjian Jia"},{"@pid":"63/5245","text":"Mingjun Feng"},{"@pid":"196/1866","text":"Changrong Ye"},{"@pid":"81/4345","text":"Fei Chen"},{"@pid":"93/4715","text":"Huifang Fan"}]},"title":"A Real-Time Software Defined Radio Platform for LTE-Advanced Heterogeneous Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"263-271","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiJFYCF16","doi":"10.12720/JCM.11.3.263-271","ee":"https://doi.org/10.12720/jcm.11.3.263-271","url":"https://dblp.org/rec/journals/jcm/LiJFYCF16"}, "url":"URL#3136337" }, { "@score":"1", "@id":"3136338", "info":{"authors":{"author":[{"@pid":"195/9714","text":"Xiangmin Li"},{"@pid":"152/0014","text":"Zhuang Kang"},{"@pid":"122/6756","text":"Liang Jia"}]},"title":"A Ku-Band Low-Phase-Noise Wide-Tuning-Range VCO in SiGe BiCMOS Technology.","venue":"J. Commun.","volume":"11","number":"12","pages":"1102-1105","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiKJ16","doi":"10.12720/JCM.11.12.1102-1105","ee":"https://doi.org/10.12720/jcm.11.12.1102-1105","url":"https://dblp.org/rec/journals/jcm/LiKJ16"}, "url":"URL#3136338" }, { "@score":"1", "@id":"3136339", "info":{"authors":{"author":[{"@pid":"82/6624","text":"Xiaolong Li"},{"@pid":"194/9838","text":"Yunqing Liu"},{"@pid":"18/4914","text":"Shuang Zhao"},{"@pid":"55/5559","text":"Wei Chu"}]},"title":"A Modified Regularized Adaptive Matching Pursuit Algorithm for Linear Frequency Modulated Signal Detection Based on Compressive Sensing.","venue":"J. Commun.","volume":"11","number":"4","pages":"402-410","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiLZC16","doi":"10.12720/JCM.11.4.402-410","ee":"https://doi.org/10.12720/jcm.11.4.402-410","url":"https://dblp.org/rec/journals/jcm/LiLZC16"}, "url":"URL#3136339" }, { "@score":"1", "@id":"3136340", "info":{"authors":{"author":[{"@pid":"82/6624","text":"Xiaolong Li"},{"@pid":"194/9838","text":"Yunqing Liu"},{"@pid":"18/4914","text":"Shuang Zhao"},{"@pid":"55/5559","text":"Wei Chu"}]},"title":"Parameter Estimation of LFM Signal Based on Bayesian Compressive Sensing via Fractional Fourier Transform.","venue":"J. Commun.","volume":"11","number":"7","pages":"693-701","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiLZC16a","doi":"10.12720/JCM.11.7.693-701","ee":"https://doi.org/10.12720/jcm.11.7.693-701","url":"https://dblp.org/rec/journals/jcm/LiLZC16a"}, "url":"URL#3136340" }, { "@score":"1", "@id":"3136341", "info":{"authors":{"author":[{"@pid":"00/5315","text":"Zimao Li"},{"@pid":"87/6339","text":"Yingying Wang"},{"@pid":"74/1079","text":"Maode Ma"}]},"title":"Efficient Deployment of Base Stations in Wireless Communication Networks.","venue":"J. Commun.","volume":"11","number":"6","pages":"609-615","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiYM16","doi":"10.12720/JCM.11.6.609-615","ee":"https://doi.org/10.12720/jcm.11.6.609-615","url":"https://dblp.org/rec/journals/jcm/LiYM16"}, "url":"URL#3136341" }, { "@score":"1", "@id":"3136342", "info":{"authors":{"author":[{"@pid":"196/1838","text":"Zechen Lin"},{"@pid":"81/119","text":"Zhizhong Ding"},{"@pid":"196/1930","text":"Qingxin Hu"},{"@pid":"10/9992","text":"Shuai Tao"}]},"title":"P-TDMA-SYS: A TDMA System over Commodity 802.11 Hardware for Mobile Ad-Hoc Networks.","venue":"J. Commun.","volume":"11","number":"8","pages":"710-725","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LinDHT16","doi":"10.12720/JCM.11.8.710-725","ee":"https://doi.org/10.12720/jcm.11.8.710-725","url":"https://dblp.org/rec/journals/jcm/LinDHT16"}, "url":"URL#3136342" }, { "@score":"1", "@id":"3136343", "info":{"authors":{"author":[{"@pid":"22/10613","text":"Yanfei Lin"},{"@pid":"81/3525","text":"Xingang Wang"},{"@pid":"07/1405","text":"Cheng Zhong"},{"@pid":"151/6228","text":"Sujie Shao"},{"@pid":"13/342","text":"Xuesong Qiu 0001"}]},"title":"Fault Recovery Algorithm for WSNs in Smart Grid.","venue":"J. Commun.","volume":"11","number":"9","pages":"827-833","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LinWZSQ16","doi":"10.12720/JCM.11.9.827-833","ee":"https://doi.org/10.12720/jcm.11.9.827-833","url":"https://dblp.org/rec/journals/jcm/LinWZSQ16"}, "url":"URL#3136343" }, { "@score":"1", "@id":"3136344", "info":{"authors":{"author":[{"@pid":"196/2003","text":"Haiqiang Liu"},{"@pid":"160/1340","text":"Zhenxiang Gao"},{"@pid":"196/1595","text":"Xulong Shao"},{"@pid":"155/0252","text":"Xu Shan"},{"@pid":"55/456","text":"Weihua Zhou"}]},"title":"Joint User Association and Resource Allocation for Interference Mitigation and Load Balancing in HCNs.","venue":"J. Commun.","volume":"11","number":"11","pages":"977-983","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuGSSZ16","doi":"10.12720/JCM.11.11.977-983","ee":"https://doi.org/10.12720/jcm.11.11.977-983","url":"https://dblp.org/rec/journals/jcm/LiuGSSZ16"}, "url":"URL#3136344" }, { "@score":"1", "@id":"3136345", "info":{"authors":{"author":[{"@pid":"51/3710-92","text":"Yang Liu 0092"},{"@pid":"18/1762","text":"Yi Shen"},{"@pid":"59/2353","text":"Lei Ding"}]},"title":"Minimize Congestion for Random-Walks in Networks via Local Adaptive Congestion Control.","venue":"J. Commun.","volume":"11","number":"6","pages":"579-585","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuSD16","doi":"10.12720/JCM.11.6.579-585","ee":"https://doi.org/10.12720/jcm.11.6.579-585","url":"https://dblp.org/rec/journals/jcm/LiuSD16"}, "url":"URL#3136345" }, { "@score":"1", "@id":"3136346", "info":{"authors":{"author":[{"@pid":"51/3710","text":"Yang Liu"},{"@pid":"71/815","text":"Wanneng Shu"},{"@pid":"196/1748","text":"Chrish Zhang"}]},"title":"A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing.","venue":"J. Commun.","volume":"11","number":"2","pages":"185-191","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuSZ16","doi":"10.12720/JCM.11.2.185-191","ee":"https://doi.org/10.12720/jcm.11.2.185-191","url":"https://dblp.org/rec/journals/jcm/LiuSZ16"}, "url":"URL#3136346" }, { "@score":"1", "@id":"3136347", "info":{"authors":{"author":[{"@pid":"35/295","text":"Jian Liu"},{"@pid":"172/5709","text":"Xinxin Tan"},{"@pid":"196/1831","text":"Ci Huang"},{"@pid":"30/4985","text":"Xin Ji"}]},"title":"An Enhanced Feasible Adaptive Scheduling Algorithm for 3GPP LTE-Advanced System.","venue":"J. Commun.","volume":"11","number":"1","pages":"64-70","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuTHJ16","doi":"10.12720/JCM.11.1.64-70","ee":"https://doi.org/10.12720/jcm.11.1.64-70","url":"https://dblp.org/rec/journals/jcm/LiuTHJ16"}, "url":"URL#3136347" }, { "@score":"1", "@id":"3136348", "info":{"authors":{"author":[{"@pid":"97/2274-26","text":"Yu Liu 0026"},{"@pid":"196/1655","text":"Gaolin Xiang"},{"@pid":"186/9646","text":"Yongle Lu"},{"@pid":"25/7045","text":"Yang Cao"},{"@pid":"95/9865","text":"Yunmei Li"},{"@pid":"76/1781","text":"Lin Lv"}]},"title":"Calibration of MEMS Accelerometer Based on Kalman Filter and the Improved Six Position Method.","venue":"J. Commun.","volume":"11","number":"5","pages":"516-522","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuXLCLL16","doi":"10.12720/JCM.11.5.516-522","ee":"https://doi.org/10.12720/jcm.11.5.516-522","url":"https://dblp.org/rec/journals/jcm/LiuXLCLL16"}, "url":"URL#3136348" }, { "@score":"1", "@id":"3136349", "info":{"authors":{"author":[{"@pid":"77/35","text":"Zhen Liu"},{"@pid":"297/0514","text":"Jun-an Yang"},{"@pid":"93/4010","text":"Hui Liu"},{"@pid":"35/7092","text":"Wei Wang"}]},"title":"Transfer Learning by Sample Selection Bias Correction and Its Application in Communication Specific Emitter Identification.","venue":"J. Commun.","volume":"11","number":"4","pages":"417-427","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuYLW16","doi":"10.12720/JCM.11.4.417-427","ee":"https://doi.org/10.12720/jcm.11.4.417-427","url":"https://dblp.org/rec/journals/jcm/LiuYLW16"}, "url":"URL#3136349" }, { "@score":"1", "@id":"3136350", "info":{"authors":{"author":[{"@pid":"77/35","text":"Zhen Liu"},{"@pid":"297/0514","text":"Jun-an Yang"},{"@pid":"93/4010","text":"Hui Liu"},{"@pid":"35/7092","text":"Wei Wang"}]},"title":"Multi-Similarity Based Multi-Source Transfer Learning and Its Applications.","venue":"J. Commun.","volume":"11","number":"6","pages":"539-549","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuYLW16a","doi":"10.12720/JCM.11.6.539-549","ee":"https://doi.org/10.12720/jcm.11.6.539-549","url":"https://dblp.org/rec/journals/jcm/LiuYLW16a"}, "url":"URL#3136350" }, { "@score":"1", "@id":"3136351", "info":{"authors":{"author":[{"@pid":"17/144","text":"Haitao Liu"},{"@pid":"180/7315","text":"Zhisheng Yin"},{"@pid":"38/1691","text":"Xuejun Zhang"}]},"title":"Symbol Error Performance Analysis of OFDM Receiver with Pulse Blanking over Frequency Selective Fading Channel.","venue":"J. Commun.","volume":"11","number":"3","pages":"325-332","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LiuYZ16","doi":"10.12720/JCM.11.3.325-332","ee":"https://doi.org/10.12720/jcm.11.3.325-332","url":"https://dblp.org/rec/journals/jcm/LiuYZ16"}, "url":"URL#3136351" }, { "@score":"1", "@id":"3136352", "info":{"authors":{"author":[{"@pid":"196/1697","text":"Zhuqian Long"},{"@pid":"43/8839","text":"Wentian Ji"}]},"title":"Power-Efficient Immune Clonal Optimization and Dynamic Load Balancing for Low Energy Consumption and High Efficiency in Green Cloud Computing.","venue":"J. Commun.","volume":"11","number":"6","pages":"558-563","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/LongJ16","doi":"10.12720/JCM.11.6.558-563","ee":"https://doi.org/10.12720/jcm.11.6.558-563","url":"https://dblp.org/rec/journals/jcm/LongJ16"}, "url":"URL#3136352" }, { "@score":"1", "@id":"3136353", "info":{"authors":{"author":{"@pid":"196/1830","text":"Peiyun Luo"}},"title":"Bloom Filter Based Load Balancing Mechanis for Mobile Ad Hoc Networks.","venue":"J. Commun.","volume":"11","number":"11","pages":"1012-1019","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Luo16","doi":"10.12720/JCM.11.11.1012-1019","ee":"https://doi.org/10.12720/jcm.11.11.1012-1019","url":"https://dblp.org/rec/journals/jcm/Luo16"}, "url":"URL#3136353" }, { "@score":"1", "@id":"3136354", "info":{"authors":{"author":[{"@pid":"158/3479","text":"Lukman Abiodun Olawoyin"},{"@pid":"157/9099","text":"Munzali Ahmed Abana"},{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"22/7020","text":"Hongwen Yang"}]},"title":"A Two-Hop Multi-Relay Secure Transmission with Improved Suboptimal Relay Selection Scheme.","venue":"J. Commun.","volume":"11","number":"6","pages":"592-597","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/OlawoyinAWY16","doi":"10.12720/JCM.11.6.592-597","ee":"https://doi.org/10.12720/jcm.11.6.592-597","url":"https://dblp.org/rec/journals/jcm/OlawoyinAWY16"}, "url":"URL#3136354" }, { "@score":"1", "@id":"3136355", "info":{"authors":{"author":[{"@pid":"158/3479","text":"Lukman Abiodun Olawoyin"},{"@pid":"22/7020","text":"Hongwen Yang"},{"@pid":"41/5979","text":"Yue Wu"}]},"title":"Enhancing the Security of Wireless Communication with the Aid of Guard Nodes.","venue":"J. Commun.","volume":"11","number":"6","pages":"586-591","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/OlawoyinYW16","doi":"10.12720/JCM.11.6.586-591","ee":"https://doi.org/10.12720/jcm.11.6.586-591","url":"https://dblp.org/rec/journals/jcm/OlawoyinYW16"}, "url":"URL#3136355" }, { "@score":"1", "@id":"3136356", "info":{"authors":{"author":[{"@pid":"153/6541","text":"Jinglan Ou"},{"@pid":"196/1713","text":"Yawen Hu"},{"@pid":"140/8357","text":"Haoran Xu"},{"@pid":"118/2196","text":"Ge Wen"},{"@pid":"40/10453","text":"Haowei Wu"}]},"title":"Opportunistic Relay Selection for Decode-and-Forward Two-Way Relaying under Outdated Channel State Information.","venue":"J. Commun.","volume":"11","number":"7","pages":"653-659","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/OuHXWW16","doi":"10.12720/JCM.11.7.653-659","ee":"https://doi.org/10.12720/jcm.11.7.653-659","url":"https://dblp.org/rec/journals/jcm/OuHXWW16"}, "url":"URL#3136356" }, { "@score":"1", "@id":"3136357", "info":{"authors":{"author":[{"@pid":"16/5560-6","text":"Wei Peng 0006"},{"@pid":"07/2014","text":"Dongyan Chen"},{"@pid":"79/6764","text":"Wenhui Sun"},{"@pid":"06/7075","text":"Guiqing Zhang"}]},"title":"Distributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"11","pages":"984-991","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/PengCSZ16","doi":"10.12720/JCM.11.11.984-991","ee":"https://doi.org/10.12720/jcm.11.11.984-991","url":"https://dblp.org/rec/journals/jcm/PengCSZ16"}, "url":"URL#3136357" }, { "@score":"1", "@id":"3136358", "info":{"authors":{"author":[{"@pid":"175/2245","text":"Bensheng Qi"},{"@pid":"196/1649","text":"Xuejiao Miao"},{"@pid":"82/7674","text":"Hongxia Miao"},{"@pid":"17/7672","text":"Zhixiang Deng"}]},"title":"Tasks Scheduling of Actuators Algorithm Based on PSO-ACO for WSAN.","venue":"J. Commun.","volume":"11","number":"12","pages":"1066-1072","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/QiMMD16","doi":"10.12720/JCM.11.12.1066-1072","ee":"https://doi.org/10.12720/jcm.11.12.1066-1072","url":"https://dblp.org/rec/journals/jcm/QiMMD16"}, "url":"URL#3136358" }, { "@score":"1", "@id":"3136359", "info":{"authors":{"author":[{"@pid":"59/3394","text":"Zhaoyang Qu"},{"@pid":"04/383-15","text":"Pengfei Xu 0015"},{"@pid":"196/1648","text":"Youxue Ren"}]},"title":"Personalized Recommendation Method of Power Information Operation and Maintenance Knowledge Based on Spark.","venue":"J. Commun.","volume":"11","number":"8","pages":"785-791","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/QuXR16","doi":"10.12720/JCM.11.8.785-791","ee":"https://doi.org/10.12720/jcm.11.8.785-791","url":"https://dblp.org/rec/journals/jcm/QuXR16"}, "url":"URL#3136359" }, { "@score":"1", "@id":"3136360", "info":{"authors":{"author":[{"@pid":"42/2707","text":"Guanghui Ren"},{"@pid":"176/7555","text":"Jianan Han"},{"@pid":"196/1979","text":"Haihui Zhu"},{"@pid":"184/7669","text":"Jiahui Fu"},{"@pid":"196/1623","text":"Mingguang Shan"}]},"title":"High Security Multiple-image Encryption using Discrete Cosine Transform and Discrete Multiple-Parameter Fractional Fourier Transform.","venue":"J. Commun.","volume":"11","number":"5","pages":"491-497","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/RenHZFS16","doi":"10.12720/JCM.11.5.491-497","ee":"https://doi.org/10.12720/jcm.11.5.491-497","url":"https://dblp.org/rec/journals/jcm/RenHZFS16"}, "url":"URL#3136360" }, { "@score":"1", "@id":"3136361", "info":{"authors":{"author":[{"@pid":"69/4334","text":"Yuan Ren"},{"@pid":"97/97","text":"Jian Zhou"},{"@pid":"46/5223","text":"Hui Gao"}]},"title":"Robust Beamforming and Artificial Noise Design in K-User Interference Channel with Simultaneous Wireless Information and Power Transfer.","venue":"J. Commun.","volume":"11","number":"8","pages":"740-747","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/RenZG16","doi":"10.12720/JCM.11.8.740-747","ee":"https://doi.org/10.12720/jcm.11.8.740-747","url":"https://dblp.org/rec/journals/jcm/RenZG16"}, "url":"URL#3136361" }, { "@score":"1", "@id":"3136362", "info":{"authors":{"author":[{"@pid":"157/2567","text":"Xiongli Rui"},{"@pid":"58/9492","text":"Xuehong Cao"},{"@pid":"12/1198-42","text":"Jie Yang 0042"},{"@pid":"02/1003-9","text":"Rui Chen 0009"}]},"title":"Energy-Efficient Cross-Layer Double Cooperative MAC for Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"10","pages":"918-926","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/RuiCYC16","doi":"10.12720/JCM.11.10.918-926","ee":"https://doi.org/10.12720/jcm.11.10.918-926","url":"https://dblp.org/rec/journals/jcm/RuiCYC16"}, "url":"URL#3136362" }, { "@score":"1", "@id":"3136363", "info":{"authors":{"author":[{"@pid":"133/8962","text":"Wasan Kadhim Saad"},{"@pid":"25/5105","text":"Mahamod Ismail"},{"@pid":"33/11252","text":"Rosdiadee Nordin"},{"@pid":"69/9706","text":"Ayman A. El-Saleh"}]},"title":"Spectrum Sensing Schemes for Dynamic Primary User Signal Under AWGN and Rayleigh Fading Channels.","venue":"J. Commun.","volume":"11","number":"3","pages":"231-242","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SaadINE16","doi":"10.12720/JCM.11.3.231-242","ee":"https://doi.org/10.12720/jcm.11.3.231-242","url":"https://dblp.org/rec/journals/jcm/SaadINE16"}, "url":"URL#3136363" }, { "@score":"1", "@id":"3136364", "info":{"authors":{"author":[{"@pid":"160/1270","text":"Rongyang Shan"},{"@pid":"z/XiaoZhou-2","text":"Xiao Zhou 0002"},{"@pid":"23/2651","text":"Cheng-You Wang"}]},"title":"APBT-Based Channel Estimation for OFDM System.","venue":"J. Commun.","volume":"11","number":"3","pages":"290-296","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ShanZW16","doi":"10.12720/JCM.11.3.290-296","ee":"https://doi.org/10.12720/jcm.11.3.290-296","url":"https://dblp.org/rec/journals/jcm/ShanZW16"}, "url":"URL#3136364" }, { "@score":"1", "@id":"3136365", "info":{"authors":{"author":[{"@pid":"18/1762","text":"Yi Shen"},{"@pid":"51/3710-92","text":"Yang Liu 0092"},{"@pid":"196/1706","text":"Wenqian Xing"}]},"title":"Community Detection in Weighted Networks via Recursive Edge-Filtration.","venue":"J. Commun.","volume":"11","number":"5","pages":"484-490","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ShenLX16","doi":"10.12720/JCM.11.5.484-490","ee":"https://doi.org/10.12720/jcm.11.5.484-490","url":"https://dblp.org/rec/journals/jcm/ShenLX16"}, "url":"URL#3136365" }, { "@score":"1", "@id":"3136366", "info":{"authors":{"author":[{"@pid":"07/10365","text":"Wenxiao Shi"},{"@pid":"161/8751","text":"Keqiang Cui"},{"@pid":"66/8491","text":"Yuan Chai"}]},"title":"Routing and Channel Assignment for Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks.","venue":"J. Commun.","volume":"11","number":"11","pages":"992-997","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ShiCC16","doi":"10.12720/JCM.11.11.992-997","ee":"https://doi.org/10.12720/jcm.11.11.992-997","url":"https://dblp.org/rec/journals/jcm/ShiCC16"}, "url":"URL#3136366" }, { "@score":"1", "@id":"3136367", "info":{"authors":{"author":[{"@pid":"196/1600","text":"Jiancai Song"},{"@pid":"72/4265","text":"Chunping Hou"},{"@pid":"09/33","text":"Guixiang Xue"},{"@pid":"74/1079","text":"Maode Ma"}]},"title":"Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm.","venue":"J. Commun.","volume":"11","number":"9","pages":"879-885","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SongHXM16","doi":"10.12720/JCM.11.9.879-885","ee":"https://doi.org/10.12720/jcm.11.9.879-885","url":"https://dblp.org/rec/journals/jcm/SongHXM16"}, "url":"URL#3136367" }, { "@score":"1", "@id":"3136368", "info":{"authors":{"author":[{"@pid":"33/2079-5","text":"Hongyu Sun 0005"},{"@pid":"31/7","text":"Zhiyi Fang"},{"@pid":"36/6299","text":"Xiaoyun Liu"},{"@pid":"15/2402","text":"Zheng Lu"}]},"title":"Insightful Causes and Potential Resolutions for Spectrum Crisis in ISM Bands: A Survey.","venue":"J. Commun.","volume":"11","number":"9","pages":"862-870","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SunFLL16","doi":"10.12720/JCM.11.9.862-870","ee":"https://doi.org/10.12720/jcm.11.9.862-870","url":"https://dblp.org/rec/journals/jcm/SunFLL16"}, "url":"URL#3136368" }, { "@score":"1", "@id":"3136369", "info":{"authors":{"author":[{"@pid":"10/6026","text":"Guiling Sun"},{"@pid":"32/1000","text":"Yangyang Li"},{"@pid":"180/9984","text":"Haojie Yuan"},{"@pid":"08/3292","text":"Jingfei He"},{"@pid":"181/0425","text":"Tianyu Geng"}]},"title":"Improvement of Compressive Sampling and Matching Pursuit Algorithm Based on Double Estimation.","venue":"J. Commun.","volume":"11","number":"6","pages":"573-578","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SunLYHG16","doi":"10.12720/JCM.11.6.573-578","ee":"https://doi.org/10.12720/jcm.11.6.573-578","url":"https://dblp.org/rec/journals/jcm/SunLYHG16"}, "url":"URL#3136369" }, { "@score":"1", "@id":"3136370", "info":{"authors":{"author":[{"@pid":"180/9631","text":"Kangning Sun"},{"@pid":"04/7083","text":"Linhua Ma"},{"@pid":"39/4117","text":"Yanhua Cao"},{"@pid":"49/10052-5","text":"Xing Hu 0005"},{"@pid":"196/1745-2","text":"Shaocheng Huang 0002"}]},"title":"Design of LDPC Codes Degree Sequences on Random Particle Swarm Optimization over Mixed Channel.","venue":"J. Commun.","volume":"11","number":"5","pages":"455-461","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SunMCHH16","doi":"10.12720/JCM.11.5.455-461","ee":"https://doi.org/10.12720/jcm.11.5.455-461","url":"https://dblp.org/rec/journals/jcm/SunMCHH16"}, "url":"URL#3136370" }, { "@score":"1", "@id":"3136371", "info":{"authors":{"author":[{"@pid":"196/1763","text":"Maoxin Sun"},{"@pid":"171/9926","text":"Hongyan Qian"}]},"title":"Handover Management Scheme in SDN-based Wireless LAN.","venue":"J. Commun.","volume":"11","number":"3","pages":"282-289","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/SunQ16","doi":"10.12720/JCM.11.3.282-289","ee":"https://doi.org/10.12720/jcm.11.3.282-289","url":"https://dblp.org/rec/journals/jcm/SunQ16"}, "url":"URL#3136371" }, { "@score":"1", "@id":"3136372", "info":{"authors":{"author":[{"@pid":"181/2690-3","text":"Jie Tian 0003"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"},{"@pid":"63/6682","text":"Dalei Wu"},{"@pid":"75/4570","text":"Dongfeng Yuan"}]},"title":"Cross-Layer Assisted Power and Rate Control for Video Transmission in Wireless Networks.","venue":"J. Commun.","volume":"11","number":"2","pages":"118-125","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/TianZWY16","doi":"10.12720/JCM.11.2.118-125","ee":"https://doi.org/10.12720/jcm.11.2.118-125","url":"https://dblp.org/rec/journals/jcm/TianZWY16"}, "url":"URL#3136372" }, { "@score":"1", "@id":"3136373", "info":{"authors":{"author":[{"@pid":"196/2018","text":"Dong Doan Van"},{"@pid":"134/7553","text":"Qingsong Ai"},{"@pid":"130/4691","text":"Dung Ong Mau"}]},"title":"MS-CCVN: Multi-Source Content Centric Vehicular Networking.","venue":"J. Commun.","volume":"11","number":"12","pages":"1079-1087","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/VanAM16","doi":"10.12720/JCM.11.12.1079-1087","ee":"https://doi.org/10.12720/jcm.11.12.1079-1087","url":"https://dblp.org/rec/journals/jcm/VanAM16"}, "url":"URL#3136373" }, { "@score":"1", "@id":"3136374", "info":{"authors":{"author":[{"@pid":"139/9203","text":"Srinivasa Rao Vempati"},{"@pid":"99/11298","text":"Habibulla Khan"},{"@pid":"139/9193","text":"Anil Kumar Tipparti"}]},"title":"Multiuser Detection Using Particle Swarm Optimization over Fading Channels with Impulsive Noise.","venue":"J. Commun.","volume":"11","number":"1","pages":"23-32","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/VempatiKT16","doi":"10.12720/JCM.11.1.23-32","ee":"https://doi.org/10.12720/jcm.11.1.23-32","url":"https://dblp.org/rec/journals/jcm/VempatiKT16"}, "url":"URL#3136374" }, { "@score":"1", "@id":"3136375", "info":{"authors":{"author":[{"@pid":"79/5745","text":"Ming Wan"},{"@pid":"38/4195","text":"Wenli Shang"},{"@pid":"18/6295-1","text":"Peng Zeng 0001"},{"@pid":"41/6186","text":"Jianming Zhao"}]},"title":"SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter.","venue":"J. Commun.","volume":"11","number":"1","pages":"108-117","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WanSZZ16","doi":"10.12720/JCM.11.1.108-117","ee":"https://doi.org/10.12720/jcm.11.1.108-117","url":"https://dblp.org/rec/journals/jcm/WanSZZ16"}, "url":"URL#3136375" }, { "@score":"1", "@id":"3136376", "info":{"authors":{"author":[{"@pid":"67/1771-5","text":"Han Wang 0005"},{"@pid":"196/1666","text":"Yani Cui"},{"@pid":"22/7436","text":"Wencai Du"},{"@pid":"124/8412","text":"Lingwei Xu"}]},"title":"Hybrid PAPR Reduction Scheme with Partial Transmit Sequence and Tone Reservation for FBMC/OQAM.","venue":"J. Commun.","volume":"11","number":"5","pages":"478-483","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangCDX16","doi":"10.12720/JCM.11.5.478-483","ee":"https://doi.org/10.12720/jcm.11.5.478-483","url":"https://dblp.org/rec/journals/jcm/WangCDX16"}, "url":"URL#3136376" }, { "@score":"1", "@id":"3136377", "info":{"authors":{"author":[{"@pid":"82/4206","text":"Chen Wang"},{"@pid":"41/3085","text":"Yong Fang"},{"@pid":"247/9049-1","text":"Jinyan Li 0001"}]},"title":"Estimation of NON-WSSUS Channel for OFDM System: Exploiting Support Correlations through a Novel Adaptive Weighted Predict-Re-Estimate L1 Minimization.","venue":"J. Commun.","volume":"11","number":"2","pages":"149-156","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangFL16","doi":"10.12720/JCM.11.2.149-156","ee":"https://doi.org/10.12720/jcm.11.2.149-156","url":"https://dblp.org/rec/journals/jcm/WangFL16"}, "url":"URL#3136377" }, { "@score":"1", "@id":"3136378", "info":{"authors":{"author":[{"@pid":"145/9268","text":"Haoyun Wang"},{"@pid":"196/1778","text":"Yuhan Fei"},{"@pid":"119/7180","text":"Jiaojiao Liu"},{"@pid":"53/8578","text":"Yingjun Xiong"},{"@pid":"95/4426","text":"Shougang Ren"},{"@pid":"57/2852","text":"Huanliang Xu"}]},"title":"A Novel Event Detection Framework for Wireless Sensor and Actor Networks.","venue":"J. Commun.","volume":"11","number":"1","pages":"1-14","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangFLXRX16","doi":"10.12720/JCM.11.1.1-14","ee":"https://doi.org/10.12720/jcm.11.1.1-14","url":"https://dblp.org/rec/journals/jcm/WangFLXRX16"}, "url":"URL#3136378" }, { "@score":"1", "@id":"3136379", "info":{"authors":{"author":[{"@pid":"181/2817-132","text":"Lei Wang 0132"},{"@pid":"59/3394","text":"Zhaoyang Qu"},{"@pid":"196/1897","text":"Zelong Li"}]},"title":"The Design and Implementation of Attack Path Extraction Model in Power Cyber Physical System.","venue":"J. Commun.","volume":"11","number":"9","pages":"834-840","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangQL16","doi":"10.12720/JCM.11.9.834-840","ee":"https://doi.org/10.12720/jcm.11.9.834-840","url":"https://dblp.org/rec/journals/jcm/WangQL16"}, "url":"URL#3136379" }, { "@score":"1", "@id":"3136380", "info":{"authors":{"author":[{"@pid":"17/1208","text":"Zhongli Wang"},{"@pid":"23/6902","text":"Guo Sheng"},{"@pid":"98/5660","text":"Xu Zhang"}]},"title":"Characterization, Signaling, Capacity and Coding Based on Fading Channels: A Review.","venue":"J. Commun.","volume":"11","number":"6","pages":"523-538","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangSZ16","doi":"10.12720/JCM.11.6.523-538","ee":"https://doi.org/10.12720/jcm.11.6.523-538","url":"https://dblp.org/rec/journals/jcm/WangSZ16"}, "url":"URL#3136380" }, { "@score":"1", "@id":"3136381", "info":{"authors":{"author":[{"@pid":"35/7092-136","text":"Wei Wang 0136"},{"@pid":"74/4718","text":"Xiaoxiang Wang"}]},"title":"Joint Rate Distribution and Bandwidth Allocation for Energy Efficient Multiuser Parallel Transmission.","venue":"J. Commun.","volume":"11","number":"2","pages":"179-184","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangW16","doi":"10.12720/JCM.11.2.179-184","ee":"https://doi.org/10.12720/jcm.11.2.179-184","url":"https://dblp.org/rec/journals/jcm/WangW16"}, "url":"URL#3136381" }, { "@score":"1", "@id":"3136382", "info":{"authors":{"author":[{"@pid":"36/1341-11","text":"Liping Wang 0011"},{"@pid":"23/2651","text":"Cheng-You Wang"},{"@pid":"z/XiaoZhou-2","text":"Xiao Zhou 0002"}]},"title":"Deblocking Scheme for JPEG-Coded Images Using Sparse Representation and All Phase Biorthogonal Transform.","venue":"J. Commun.","volume":"11","number":"12","pages":"1095-1101","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangWZ16","doi":"10.12720/JCM.11.12.1095-1101","ee":"https://doi.org/10.12720/jcm.11.12.1095-1101","url":"https://dblp.org/rec/journals/jcm/WangWZ16"}, "url":"URL#3136382" }, { "@score":"1", "@id":"3136383", "info":{"authors":{"author":[{"@pid":"40/3934","text":"Dong Wang"},{"@pid":"92/235","text":"Mingquan Zhou"},{"@pid":"122/2828-2","text":"Sajid Ali 0002"},{"@pid":"133/6502","text":"Pengbo Zhou"},{"@pid":"25/3718","text":"Guohua Geng"}]},"title":"Exploring the Performance of Authentication Mechanism in Integrated Cloud Services Environment with CSP.","venue":"J. Commun.","volume":"11","number":"4","pages":"388-395","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangZAZG16","doi":"10.12720/JCM.11.4.388-395","ee":"https://doi.org/10.12720/jcm.11.4.388-395","url":"https://dblp.org/rec/journals/jcm/WangZAZG16"}, "url":"URL#3136383" }, { "@score":"1", "@id":"3136384", "info":{"authors":{"author":[{"@pid":"17/1208","text":"Zhongli Wang"},{"@pid":"48/2807","text":"Long Zhang"},{"@pid":"196/2011","text":"Abigail S. E. Edmonds"},{"@pid":"128/3965","text":"Shuping Dang"}]},"title":"Network-Based Anti-Theft Alert System Using Dynamic Hybrid TOA/AOA Algorithm.","venue":"J. Commun.","volume":"11","number":"8","pages":"758-764","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangZED16","doi":"10.12720/JCM.11.8.758-764","ee":"https://doi.org/10.12720/jcm.11.8.758-764","url":"https://dblp.org/rec/journals/jcm/WangZED16"}, "url":"URL#3136384" }, { "@score":"1", "@id":"3136385", "info":{"authors":{"author":[{"@pid":"97/6505","text":"Qing Wang"},{"@pid":"196/1516","text":"Minjiong Zhu"},{"@pid":"196/1542","text":"Yongrun Yu"},{"@pid":"74/1079","text":"Maode Ma"},{"@pid":"68/10314","text":"Xin Cui"}]},"title":"A Load Balance Mechanism in Heterogeneous Network Based on Utility Function.","venue":"J. Commun.","volume":"11","number":"9","pages":"871-878","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WangZYMC16","doi":"10.12720/JCM.11.9.871-878","ee":"https://doi.org/10.12720/jcm.11.9.871-878","url":"https://dblp.org/rec/journals/jcm/WangZYMC16"}, "url":"URL#3136385" }, { "@score":"1", "@id":"3136386", "info":{"authors":{"author":[{"@pid":"25/4202","text":"Xiaohui Wei"},{"@pid":"57/2622","text":"Yue Jin"},{"@pid":"91/1905","text":"Hongliang Li"},{"@pid":"178/2759","text":"Xingwang Wang"},{"@pid":"196/1820","text":"Shoufeng Hu"}]},"title":"Virtual Resource Consolidation for Green Computing Based on Virtual Cluster Live Migration.","venue":"J. Commun.","volume":"11","number":"2","pages":"192-202","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WeiJLWH16","doi":"10.12720/JCM.11.2.192-202","ee":"https://doi.org/10.12720/jcm.11.2.192-202","url":"https://dblp.org/rec/journals/jcm/WeiJLWH16"}, "url":"URL#3136386" }, { "@score":"1", "@id":"3136387", "info":{"authors":{"author":[{"@pid":"25/4202","text":"Xiaohui Wei"},{"@pid":"97/2119-7","text":"Yuanyuan Liu 0007"},{"@pid":"31/5925-4","text":"Xin Bai 0004"}]},"title":"Maximizing Lifetime of CDS-Based Wireless Ad Hoc Networks.","venue":"J. Commun.","volume":"11","number":"4","pages":"365-373","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WeiLB16","doi":"10.12720/JCM.11.4.365-373","ee":"https://doi.org/10.12720/jcm.11.4.365-373","url":"https://dblp.org/rec/journals/jcm/WeiLB16"}, "url":"URL#3136387" }, { "@score":"1", "@id":"3136388", "info":{"authors":{"author":[{"@pid":"72/4250-23","text":"Hao Wu 0023"},{"@pid":"35/837-1","text":"Bin Liu 0001"},{"@pid":"37/4190-62","text":"Yang Li 0062"},{"@pid":"78/7704","text":"Huichen Dai"},{"@pid":"67/6649-4","text":"Yi Wang 0004"},{"@pid":"158/2002","text":"Yaxuan Wang"}]},"title":"Towards Energy-Efficient Caching in Content-Centric Networking.","venue":"J. Commun.","volume":"11","number":"12","pages":"1036-1047","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WuLLDWW16","doi":"10.12720/JCM.11.12.1036-1047","ee":"https://doi.org/10.12720/jcm.11.12.1036-1047","url":"https://dblp.org/rec/journals/jcm/WuLLDWW16"}, "url":"URL#3136388" }, { "@score":"1", "@id":"3136389", "info":{"authors":{"author":[{"@pid":"07/4912","text":"Chun-Hui Wu"},{"@pid":"80/43-9","text":"Qin Li 0009"},{"@pid":"86/7695","text":"Zhiwei Sun"},{"@pid":"136/1966","text":"Xueling Zhong"}]},"title":"Generic Construction of Chameleon Hash to Group Elements.","venue":"J. Commun.","volume":"11","number":"6","pages":"564-572","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WuLSZ16","doi":"10.12720/JCM.11.6.564-572","ee":"https://doi.org/10.12720/jcm.11.6.564-572","url":"https://dblp.org/rec/journals/jcm/WuLSZ16"}, "url":"URL#3136389" }, { "@score":"1", "@id":"3136390", "info":{"authors":{"author":[{"@pid":"41/5979","text":"Yue Wu"},{"@pid":"158/3479","text":"Lukman Abiodun Olawoyin"},{"@pid":"22/7020","text":"Hongwen Yang"}]},"title":"Optimizing Energy Allocation for Energy Harvesting Node with Hybrid ARQ.","venue":"J. Commun.","volume":"11","number":"4","pages":"396-401","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/WuOY16","doi":"10.12720/JCM.11.4.396-401","ee":"https://doi.org/10.12720/jcm.11.4.396-401","url":"https://dblp.org/rec/journals/jcm/WuOY16"}, "url":"URL#3136390" }, { "@score":"1", "@id":"3136391", "info":{"authors":{"author":[{"@pid":"148/2821","text":"Yujie Xia"},{"@pid":"99/6243","text":"Junjie Zhang"}]},"title":"PAPR Reduction for OFDM/OQAM Signals Using Offset-Symbols Joint SLM Method.","venue":"J. Commun.","volume":"11","number":"11","pages":"998-1004","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XiaZ16","doi":"10.12720/JCM.11.11.998-1004","ee":"https://doi.org/10.12720/jcm.11.11.998-1004","url":"https://dblp.org/rec/journals/jcm/XiaZ16"}, "url":"URL#3136391" }, { "@score":"1", "@id":"3136392", "info":{"authors":{"author":[{"@pid":"125/3679","text":"Kejiang Xiao"},{"@pid":"06/2293-38","text":"Rui Wang 0038"},{"@pid":"97/8704-91","text":"Lei Zhang 0091"},{"@pid":"19/360","text":"Lei Xu"}]},"title":"Cross-Correlation Based Vehicle Feature Extraction by Magnetic Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"4","pages":"349-357","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XiaoWZX16","doi":"10.12720/JCM.11.4.349-357","ee":"https://doi.org/10.12720/jcm.11.4.349-357","url":"https://dblp.org/rec/journals/jcm/XiaoWZX16"}, "url":"URL#3136392" }, { "@score":"1", "@id":"3136393", "info":{"authors":{"author":[{"@pid":"51/4462-5","text":"Yi Xie 0005"},{"@pid":"80/10878","text":"Wenjia Ding"},{"@pid":"28/5434","text":"Yulin Wang"}]},"title":"A More Extensible Transparent Encrypted File System Based on Filter Driver.","venue":"J. Commun.","volume":"11","number":"4","pages":"383-387","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XieDW16","doi":"10.12720/JCM.11.4.383-387","ee":"https://doi.org/10.12720/jcm.11.4.383-387","url":"https://dblp.org/rec/journals/jcm/XieDW16"}, "url":"URL#3136393" }, { "@score":"1", "@id":"3136394", "info":{"authors":{"author":[{"@pid":"196/1684","text":"Tianyi Xiong"},{"@pid":"11/3140-1","text":"Zan Li 0001"},{"@pid":"132/3205","text":"Peihan Qi"}]},"title":"Measurement Matrix Calibration Method for Modulated Wideband Converter under Imperfect Periodic Pseudorandom Waveform.","venue":"J. Commun.","volume":"11","number":"5","pages":"498-506","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XiongLQ16","doi":"10.12720/JCM.11.5.498-506","ee":"https://doi.org/10.12720/jcm.11.5.498-506","url":"https://dblp.org/rec/journals/jcm/XiongLQ16"}, "url":"URL#3136394" }, { "@score":"1", "@id":"3136395", "info":{"authors":{"author":[{"@pid":"196/1925","text":"Shina Xu"},{"@pid":"22/11311","text":"Jingli Mao"},{"@pid":"40/8208","text":"Biling Zhang"}]},"title":"A Contract-Based Pricing Scheme for the Renewable Energy Trading.","venue":"J. Commun.","volume":"11","number":"9","pages":"848-855","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XuMZ16","doi":"10.12720/JCM.11.9.848-855","ee":"https://doi.org/10.12720/jcm.11.9.848-855","url":"https://dblp.org/rec/journals/jcm/XuMZ16"}, "url":"URL#3136395" }, { "@score":"1", "@id":"3136396", "info":{"authors":{"author":[{"@pid":"19/360","text":"Lei Xu"},{"@pid":"52/10238","text":"Ying Ni"},{"@pid":"72/2621","text":"Kai Zhao"},{"@pid":"27/5935","text":"Hongwei Zhang"},{"@pid":"92/3956","text":"Xiaohui Li"}]},"title":"Distributed Space-Time-Frequency Cooperative Transmission Scheme for Bidirectional Multi-Relay Communication Networks.","venue":"J. Commun.","volume":"11","number":"10","pages":"896-902","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XuNZZL16","doi":"10.12720/JCM.11.10.896-902","ee":"https://doi.org/10.12720/jcm.11.10.896-902","url":"https://dblp.org/rec/journals/jcm/XuNZZL16"}, "url":"URL#3136396" }, { "@score":"1", "@id":"3136397", "info":{"authors":{"author":[{"@pid":"52/6941","text":"Liang Xue"},{"@pid":"91/112","text":"Ying Liu"},{"@pid":"39/1581","text":"Yanlong Wang"},{"@pid":"196/1602","text":"Zuopeng Li"},{"@pid":"21/6066","text":"Yongjian Fan"}]},"title":"r-RADAR: Obtain the Maximum Throughput When an Energy Harvesting Relay Node is Applied in Multiuser OFDMA Networks.","venue":"J. Commun.","volume":"11","number":"11","pages":"957-969","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/XueLWLF16","doi":"10.12720/JCM.11.11.957-969","ee":"https://doi.org/10.12720/jcm.11.11.957-969","url":"https://dblp.org/rec/journals/jcm/XueLWLF16"}, "url":"URL#3136397" }, { "@score":"1", "@id":"3136398", "info":{"authors":{"author":[{"@pid":"12/1198-42","text":"Jie Yang 0042"},{"@pid":"58/9492","text":"Xuehong Cao"},{"@pid":"02/1003-9","text":"Rui Chen 0009"},{"@pid":"12/9540","text":"Dawei Zhu"}]},"title":"Energy Efficiency Optimization and Comparison for One-Way and Two-Way Decode-and-Forward Relay Systems.","venue":"J. Commun.","volume":"11","number":"2","pages":"171-178","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangCCZ16","doi":"10.12720/JCM.11.2.171-178","ee":"https://doi.org/10.12720/jcm.11.2.171-178","url":"https://dblp.org/rec/journals/jcm/YangCCZ16"}, "url":"URL#3136398" }, { "@score":"1", "@id":"3136399", "info":{"authors":{"author":[{"@pid":"68/1137","text":"Shiyong Yang"},{"@pid":"196/1875","text":"Jinlong Jiang"}]},"title":"Frequency Estimation of 2-D Harmonics in Multiplicative and Additive Noise Based on ESPRIT.","venue":"J. Commun.","volume":"11","number":"4","pages":"411-416","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangJ16","doi":"10.12720/JCM.11.4.411-416","ee":"https://doi.org/10.12720/jcm.11.4.411-416","url":"https://dblp.org/rec/journals/jcm/YangJ16"}, "url":"URL#3136399" }, { "@score":"1", "@id":"3136400", "info":{"authors":{"author":[{"@pid":"152/0089","text":"Faquan Yang"},{"@pid":"11/3140-1","text":"Zan Li 0001"},{"@pid":"196/1671","text":"Simin Zeng"},{"@pid":"50/9778","text":"Benjian Hao"},{"@pid":"132/3205","text":"Peihan Qi"},{"@pid":"196/1691","text":"Zhongxian Pang"}]},"title":"A Novel Method for Wireless Communication Signal Modulation Recognition in Smart Grid.","venue":"J. Commun.","volume":"11","number":"9","pages":"813-818","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangLZHQP16","doi":"10.12720/JCM.11.9.813-818","ee":"https://doi.org/10.12720/jcm.11.9.813-818","url":"https://dblp.org/rec/journals/jcm/YangLZHQP16"}, "url":"URL#3136400" }, { "@score":"1", "@id":"3136401", "info":{"authors":{"author":[{"@pid":"18/7021","text":"Weijun Yang"},{"@pid":"02/6428","text":"Yun Zhang"}]},"title":"A Fast Algorithm for the Optimal Constrained Path Routing in Wireless Mesh Networks.","venue":"J. Commun.","volume":"11","number":"2","pages":"126-131","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangZ16","doi":"10.12720/JCM.11.2.126-131","ee":"https://doi.org/10.12720/jcm.11.2.126-131","url":"https://dblp.org/rec/journals/jcm/YangZ16"}, "url":"URL#3136401" }, { "@score":"1", "@id":"3136402", "info":{"authors":{"author":[{"@pid":"18/7021","text":"Weijun Yang"},{"@pid":"02/6428","text":"Yun Zhang"}]},"title":"A Fast Algorithm for Multicast Routing Subject to Multiple QoS Constrains in WMNs.","venue":"J. Commun.","volume":"11","number":"8","pages":"733-739","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangZ16a","doi":"10.12720/JCM.11.8.733-739","ee":"https://doi.org/10.12720/jcm.11.8.733-739","url":"https://dblp.org/rec/journals/jcm/YangZ16a"}, "url":"URL#3136402" }, { "@score":"1", "@id":"3136403", "info":{"authors":{"author":[{"@pid":"39/3026","text":"Zhijun Yang"},{"@pid":"196/1733","text":"Longzheng Zhu"},{"@pid":"06/1501","text":"Hongwei Ding"},{"@pid":"87/7434","text":"Zheng Guan"}]},"title":"A Priority-based Parallel Schedule Polling MAC for Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"8","pages":"792-797","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YangZDG16","doi":"10.12720/JCM.11.8.792-797","ee":"https://doi.org/10.12720/jcm.11.8.792-797","url":"https://dblp.org/rec/journals/jcm/YangZDG16"}, "url":"URL#3136403" }, { "@score":"1", "@id":"3136404", "info":{"authors":{"author":[{"@pid":"00/2237-1","text":"Lei Ye 0001"},{"@pid":"05/7401","text":"Chong Peng"},{"@pid":"50/9062","text":"Lingqiu Zeng"},{"@pid":"160/1164","text":"Qingwen Han"},{"@pid":"96/5609","text":"Xiaoying Liu"},{"@pid":"84/7418","text":"Dongmei Chen"},{"@pid":"142/6490","text":"Chen Du"}]},"title":"Experimental Analysis of Cluster-Based Multi-Channel Mechanism for Inter-Vehicle Safety Warning Message Transmission.","venue":"J. Commun.","volume":"11","number":"1","pages":"33-41","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YePZHLCD16","doi":"10.12720/JCM.11.1.33-41","ee":"https://doi.org/10.12720/jcm.11.1.33-41","url":"https://dblp.org/rec/journals/jcm/YePZHLCD16"}, "url":"URL#3136404" }, { "@score":"1", "@id":"3136405", "info":{"authors":{"author":[{"@pid":"161/8578","text":"Xiu-Wen Yin"},{"@pid":"136/7718","text":"Hong-Zhou Tan"}]},"title":"Low-Complexity Fine Frequency Synchronization for MB-OFDM Based UWB Systems.","venue":"J. Commun.","volume":"11","number":"2","pages":"164-170","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YinT16","doi":"10.12720/JCM.11.2.164-170","ee":"https://doi.org/10.12720/jcm.11.2.164-170","url":"https://dblp.org/rec/journals/jcm/YinT16"}, "url":"URL#3136405" }, { "@score":"1", "@id":"3136406", "info":{"authors":{"author":[{"@pid":"27/116","text":"Bin Yu"},{"@pid":"00/11135","text":"Xianggen Yin"},{"@pid":"83/6331","text":"Xu Chen"},{"@pid":"87/5809-13","text":"Zhe Zhang 0013"},{"@pid":"196/2025","text":"Lang Jiang"}]},"title":"Hybrid Hierarchical Communication Network Optimal Placement for Transmission Line Online Monitoring in Smart Grid.","venue":"J. Commun.","volume":"11","number":"9","pages":"798-804","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YuYCZJ16","doi":"10.12720/JCM.11.9.798-804","ee":"https://doi.org/10.12720/jcm.11.9.798-804","url":"https://dblp.org/rec/journals/jcm/YuYCZJ16"}, "url":"URL#3136406" }, { "@score":"1", "@id":"3136407", "info":{"authors":{"author":[{"@pid":"196/1530","text":"Baozhou Yu"},{"@pid":"66/5923","text":"Qi Zhu"}]},"title":"A QoS-Based Channel Allocation and Power Control Algorithm for Device-to-Device Communication Underlaying Cellular Networks.","venue":"J. Commun.","volume":"11","number":"7","pages":"624-631","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YuZ16","doi":"10.12720/JCM.11.7.624-631","ee":"https://doi.org/10.12720/jcm.11.7.624-631","url":"https://dblp.org/rec/journals/jcm/YuZ16"}, "url":"URL#3136407" }, { "@score":"1", "@id":"3136408", "info":{"authors":{"author":[{"@pid":"46/2181","text":"Yang Yu"},{"@pid":"35/256","text":"Yongqing Zhu"},{"@pid":"145/0690","text":"Juniarto Samsudin"}]},"title":"Distributed Metadata Search for the Cloud.","venue":"J. Commun.","volume":"11","number":"1","pages":"100-107","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/YuZS16","doi":"10.12720/JCM.11.1.100-107","ee":"https://doi.org/10.12720/jcm.11.1.100-107","url":"https://dblp.org/rec/journals/jcm/YuZS16"}, "url":"URL#3136408" }, { "@score":"1", "@id":"3136409", "info":{"authors":{"author":[{"@pid":"04/6901-3","text":"Meng Zhang 0003"},{"@pid":"76/1584-1","text":"Xin Zhang 0001"},{"@pid":"76/2312","text":"Yongyu Chang"}]},"title":"Analytical Model for Coexistence Performance Evaluation of WiFi and LTE Licensed-Assisted Access to Unlicensed Spectrum.","venue":"J. Commun.","volume":"11","number":"12","pages":"1073-1078","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/Zhang0C16","doi":"10.12720/JCM.11.12.1073-1078","ee":"https://doi.org/10.12720/jcm.11.12.1073-1078","url":"https://dblp.org/rec/journals/jcm/Zhang0C16"}, "url":"URL#3136409" }, { "@score":"1", "@id":"3136410", "info":{"authors":{"author":[{"@pid":"48/2807-3","text":"Long Zhang 0003"},{"@pid":"191/8512","text":"Chunhong Bai"},{"@pid":"191/8637","text":"Fan Zhuo"},{"@pid":"41/10114-1","text":"Haitao Xu 0001"},{"@pid":"81/6685","text":"Wei Huang"}]},"title":"Dynamic Rate Allocation for Multipath Routing under Path Stability and Prioritized Traffic Session Constraints for Cognitive Radio Ad Hoc Networks with Selfish Secondary Users.","venue":"J. Commun.","volume":"11","number":"5","pages":"462-470","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangBZXH16","doi":"10.12720/JCM.11.5.462-470","ee":"https://doi.org/10.12720/jcm.11.5.462-470","url":"https://dblp.org/rec/journals/jcm/ZhangBZXH16"}, "url":"URL#3136410" }, { "@score":"1", "@id":"3136411", "info":{"authors":{"author":[{"@pid":"55/957-26","text":"Kai Zhang 0026"},{"@pid":"18/11275","text":"Jie Guan"},{"@pid":"00/6381-11","text":"Bin Hu 0011"}]},"title":"Zero Correlation Linear Cryptanalysis on LEA Family Ciphers.","venue":"J. Commun.","volume":"11","number":"7","pages":"677-685","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangGH16","doi":"10.12720/JCM.11.7.677-685","ee":"https://doi.org/10.12720/jcm.11.7.677-685","url":"https://dblp.org/rec/journals/jcm/ZhangGH16"}, "url":"URL#3136411" }, { "@score":"1", "@id":"3136412", "info":{"authors":{"author":[{"@pid":"78/6194","text":"Hai-Yan Zhang"},{"@pid":"14/4834","text":"Jing Huang"},{"@pid":"321/2457","text":"Juhu Li"},{"@pid":"121/7998","text":"Juan Nie"}]},"title":"Performance of OFDM AF Relaying System with Subcarrier Mapping in the Presence of Phase Noise.","venue":"J. Commun.","volume":"11","number":"4","pages":"428-439","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangHLN16","doi":"10.12720/JCM.11.4.428-439","ee":"https://doi.org/10.12720/jcm.11.4.428-439","url":"https://dblp.org/rec/journals/jcm/ZhangHLN16"}, "url":"URL#3136412" }, { "@score":"1", "@id":"3136413", "info":{"authors":{"author":[{"@pid":"16/7786","text":"Jianwu Zhang"},{"@pid":"68/1974-9","text":"Jing Jiang 0009"},{"@pid":"26/2077","text":"Jianrong Bao"},{"@pid":"18/4625-8","text":"Bin Jiang 0008"},{"@pid":"15/5923-11","text":"Chao Liu 0011"}]},"title":"Improved Relay Selection Strategy for Hybrid Decode-Amplify Forward Protocol.","venue":"J. Commun.","volume":"11","number":"3","pages":"297-304","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangJBJL16","doi":"10.12720/JCM.11.3.297-304","ee":"https://doi.org/10.12720/jcm.11.3.297-304","url":"https://dblp.org/rec/journals/jcm/ZhangJBJL16"}, "url":"URL#3136413" }, { "@score":"1", "@id":"3136414", "info":{"authors":{"author":[{"@pid":"128/0289","text":"Shujing Zhang"},{"@pid":"181/2820","text":"Jing Li"},{"@pid":"04/2868","text":"Bo He"},{"@pid":"156/0087","text":"Jiaxing Chen"}]},"title":"LSDV-Hop: Least Squares Based DV-Hop Localization Algorithm for Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"243-248","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangLHC16","doi":"10.12720/JCM.11.3.243-248","ee":"https://doi.org/10.12720/jcm.11.3.243-248","url":"https://dblp.org/rec/journals/jcm/ZhangLHC16"}, "url":"URL#3136414" }, { "@score":"1", "@id":"3136415", "info":{"authors":{"author":[{"@pid":"29/4190","text":"Jun Zhang"},{"@pid":"57/1592","text":"Hui Tian"}]},"title":"Resource Allocation in Full Duplex Heterogeneous Networks with eICIC.","venue":"J. Commun.","volume":"11","number":"6","pages":"550-557","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangT16","doi":"10.12720/JCM.11.6.550-557","ee":"https://doi.org/10.12720/jcm.11.6.550-557","url":"https://dblp.org/rec/journals/jcm/ZhangT16"}, "url":"URL#3136415" }, { "@score":"1", "@id":"3136416", "info":{"authors":{"author":[{"@pid":"91/8451","text":"Zhitao Zhang"},{"@pid":"151/4577","text":"Ye Yin"},{"@pid":"196/1592","text":"Haoqian Wei"},{"@pid":"58/1874","text":"Wei Tang"}]},"title":"An Automatic Calibration of Large-Scale Indoor Target Signal Positioning System.","venue":"J. Commun.","volume":"11","number":"6","pages":"598-608","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangYWT16","doi":"10.12720/JCM.11.6.598-608","ee":"https://doi.org/10.12720/jcm.11.6.598-608","url":"https://dblp.org/rec/journals/jcm/ZhangYWT16"}, "url":"URL#3136416" }, { "@score":"1", "@id":"3136417", "info":{"authors":{"author":[{"@pid":"70/8204","text":"Daoxu Zhang"},{"@pid":"04/6901-2","text":"Meng Zhang 0002"},{"@pid":"53/2189","text":"Li Li"},{"@pid":"99/5168-1","text":"Hanwen Luo 0001"}]},"title":"Two-Hop Co-Located Robust Precoding Design in Radio SWIPT Relay Networks.","venue":"J. Commun.","volume":"11","number":"1","pages":"71-76","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhangZLL16","doi":"10.12720/JCM.11.1.71-76","ee":"https://doi.org/10.12720/jcm.11.1.71-76","url":"https://dblp.org/rec/journals/jcm/ZhangZLL16"}, "url":"URL#3136417" }, { "@score":"1", "@id":"3136418", "info":{"authors":{"author":[{"@pid":"194/3901","text":"Yongkang Zheng"},{"@pid":"86/8430","text":"Mingliang Wu"},{"@pid":"196/1918","text":"Zhiqiang Peng"}]},"title":"A Close-Loop Conformance Testing System of IEC 61850.","venue":"J. Commun.","volume":"11","number":"8","pages":"779-784","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhengWP16","doi":"10.12720/JCM.11.8.779-784","ee":"https://doi.org/10.12720/jcm.11.8.779-784","url":"https://dblp.org/rec/journals/jcm/ZhengWP16"}, "url":"URL#3136418" }, { "@score":"1", "@id":"3136419", "info":{"authors":{"author":[{"@pid":"z/XiaoZhou-2","text":"Xiao Zhou 0002"},{"@pid":"179/0741","text":"Zhun Ye"},{"@pid":"13/2466","text":"Xiaoxiao Liu"},{"@pid":"23/2651","text":"Cheng-You Wang"}]},"title":"Channel Estimation Based on Linear Filtering Least Square in OFDM Systems.","venue":"J. Commun.","volume":"11","number":"11","pages":"1005-1011","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhouYLW16","doi":"10.12720/JCM.11.11.1005-1011","ee":"https://doi.org/10.12720/jcm.11.11.1005-1011","url":"https://dblp.org/rec/journals/jcm/ZhouYLW16"}, "url":"URL#3136419" }, { "@score":"1", "@id":"3136420", "info":{"authors":{"author":[{"@pid":"196/1954","text":"Momiao Zhou"},{"@pid":"66/7775","text":"Feifei Zhao"}]},"title":"Performance Optimization for Interference Alignment Based on MMSE Prediction to Time-Variant Channels.","venue":"J. Commun.","volume":"11","number":"5","pages":"446-454","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhouZ16","doi":"10.12720/JCM.11.5.446-454","ee":"https://doi.org/10.12720/jcm.11.5.446-454","url":"https://dblp.org/rec/journals/jcm/ZhouZ16"}, "url":"URL#3136420" }, { "@score":"1", "@id":"3136421", "info":{"authors":{"author":[{"@pid":"65/5932","text":"Xiangyang Zhu"},{"@pid":"55/6253","text":"Bing Chen"},{"@pid":"51/8079","text":"Hong-yan Qian"}]},"title":"HawkFlow: Scheme for Scalable Hierarchically Distributed Control in Software Defined Network.","venue":"J. Commun.","volume":"11","number":"10","pages":"910-917","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhuCQ16","doi":"10.12720/JCM.11.10.910-917","ee":"https://doi.org/10.12720/jcm.11.10.910-917","url":"https://dblp.org/rec/journals/jcm/ZhuCQ16"}, "url":"URL#3136421" }, { "@score":"1", "@id":"3136422", "info":{"authors":{"author":[{"@pid":"68/6322","text":"Jianping Zhu"},{"@pid":"39/5376","text":"Chunfeng Lv"},{"@pid":"98/9971","text":"Zhengsu Tao"}]},"title":"An Improved Localization Scheme Based on DV-Hop for Large-Scale Wireless Sensor Networks.","venue":"J. Commun.","volume":"11","number":"12","pages":"1057-1065","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhuLT16","doi":"10.12720/JCM.11.12.1057-1065","ee":"https://doi.org/10.12720/jcm.11.12.1057-1065","url":"https://dblp.org/rec/journals/jcm/ZhuLT16"}, "url":"URL#3136422" }, { "@score":"1", "@id":"3136423", "info":{"authors":{"author":[{"@pid":"08/2470","text":"Xiaodong Zhu"},{"@pid":"74/4927","text":"Weining Qi"},{"@pid":"50/1682","text":"Jinlin Wang 0001"},{"@pid":"81/9979","text":"Yiqiang Sheng"}]},"title":"A Popularity-Based Collaborative Caching Algorithm for Content-Centric Networking.","venue":"J. Commun.","volume":"11","number":"10","pages":"886-895","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhuQWS16","doi":"10.12720/JCM.11.10.886-895","ee":"https://doi.org/10.12720/jcm.11.10.886-895","url":"https://dblp.org/rec/journals/jcm/ZhuQWS16"}, "url":"URL#3136423" }, { "@score":"1", "@id":"3136424", "info":{"authors":{"author":[{"@pid":"196/1664","text":"Zhilong Zhu"},{"@pid":"21/1244","text":"Gang Xu"},{"@pid":"132/5833","text":"Fengsui Wang"}]},"title":"Fast Coding Unit Decision Algorithm for HEVC Intra Coding.","venue":"J. Commun.","volume":"11","number":"10","pages":"950-956","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZhuXW16","doi":"10.12720/JCM.11.10.950-956","ee":"https://doi.org/10.12720/jcm.11.10.950-956","url":"https://dblp.org/rec/journals/jcm/ZhuXW16"}, "url":"URL#3136424" }, { "@score":"1", "@id":"3136425", "info":{"authors":{"author":[{"@pid":"196/1803","text":"Yanfang Zou"},{"@pid":"18/4624","text":"Hongyi Yu"},{"@pid":"181/2689-31","text":"Qing Li 0031"},{"@pid":"144/1564","text":"Jian-Hui Liu"},{"@pid":"71/6601","text":"Wei Guo"}]},"title":"A Packet Forwarding Protocol in Coal Mine Opportunistic Networks.","venue":"J. Commun.","volume":"11","number":"3","pages":"333-339","year":"2016","type":"Journal Articles","access":"closed","key":"journals/jcm/ZouYLLG16","doi":"10.12720/JCM.11.3.333-339","ee":"https://doi.org/10.12720/jcm.11.3.333-339","url":"https://dblp.org/rec/journals/jcm/ZouYLLG16"}, "url":"URL#3136425" } ] } } } )