An iterative reliability-based decoding for LDPC coded modulation system Ping HuangChunming ZhaoMing Jiang OriginalPaper 15 May 2008 Pages: 289 - 293
Symmetric information rate of CPM and optimal detector design Zhimin YangShiju LiZhaoyang Zhang OriginalPaper 15 May 2008 Pages: 294 - 299
Signal constellations design for differential unitary space-time in MIMO-OFDM system over frequency-selective fading channels Jing ChenQi Zhu OriginalPaper 15 May 2008 Pages: 300 - 304
An improved Markov Chain Monte Carlo method for MIMO iterative detection and decoding Xiang HanJibo Wei OriginalPaper 15 May 2008 Pages: 305 - 310
Collaborative tracking via particle filter in wireless sensor networks Zhenya YanBaoyu ZhengShitang Li OriginalPaper 15 May 2008 Pages: 311 - 318
Group transmit antenna selection based on GIS technology for V-BLAST system Xiaoge ZhangChengqi Xu OriginalPaper 15 May 2008 Pages: 319 - 323
Reconstruct azimuth signal and suppress interbeam ambiguities of SPCMB SAR with hybrid filterbank Xiufeng SongWeidong Yu OriginalPaper 15 May 2008 Pages: 324 - 329
Improving Voice Activity Detection via weighting likelihood and dimension reduction Huanliang WangJiqing HanTieran Zheng OriginalPaper 15 May 2008 Pages: 330 - 336
A robust eye localization algorithm for face recognition Wencong ZhangXin LiZhenquan Zhuang OriginalPaper 15 May 2008 Pages: 337 - 342
Semi-fragile watermarking algorithm for image tampers localization and recovery Xuemei JiangQuan Liu OriginalPaper 15 May 2008 Pages: 343 - 351
Asymboost-based fisher linear classifier for face recognition Xianji WangXueyi YeZhenquan Zhuang OriginalPaper 15 May 2008 Pages: 352 - 357
A novel algorithm for voice conversion using Canonical Correlation Analysis Zhihua JianZhen Yang OriginalPaper 15 May 2008 Pages: 358 - 363
Research on grouping strategy of SIP-based streaming media P2P live broadcast network Hui LiuYongfeng HuangXing Li OriginalPaper 15 May 2008 Pages: 364 - 371
Security analysis and improvement of new threshold multi-Proxy multi-Signature scheme Rongbo LuDake HeChangji Wang OriginalPaper 15 May 2008 Pages: 372 - 377
A scalable hybrid modular multiplication algorithm Qiang MengTao ChenQuji Chen OriginalPaper 15 May 2008 Pages: 378 - 383
Correlation investigation between contact approach speed of handheld metal rod and discharge parameters from charged human body Fangming RuanOsamu FujiwaraYougang Gao OriginalPaper 15 May 2008 Pages: 384 - 388
X-band circularly polarized rectennas for microwave power transmission applications Xuexia YangJunshu XuChanglong Xu OriginalPaper 15 May 2008 Pages: 389 - 393
Fast symbol-level synchronization for TR-UWB signals using double hybrid DS-TH spreading Zhuo ZhangZhengnan JiHao Yin OriginalPaper 15 May 2008 Pages: 394 - 400
SAR image compression with target region extraction and preservation in decomposed structural component Jun ZhangYingjun HuangGuohui Li OriginalPaper 15 May 2008 Pages: 401 - 404
BFA based neural network for image compression Ying ChuHua MiQ. H. Wu OriginalPaper 15 May 2008 Pages: 405 - 408
Low-complexity redundancy insertion in multiple description coding Rener YangJinxiang LiHuafeng Wen OriginalPaper 15 May 2008 Pages: 409 - 414
Fingerprint-based key binding/recovering scheme based on fuzzy vault Quan FengFei SuAnni Cai OriginalPaper 15 May 2008 Pages: 415 - 421
Analysis and measurement of large dynamic range RF switch inter-modulation Zhouan Han OriginalPaper 15 May 2008 Pages: 422 - 427
Application of gray evaluation model based on AHP in ATM system Zhijun WuWen Pan OriginalPaper 15 May 2008 Pages: 428 - 432