首页 > 最新文献

2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)最新文献

英文 中文
New unimodular sequences with two-level periodic autocorrelations 具有两水平周期自相关的新单模序列
A. Leukhin, P. Fan
An algebraic method for designing unimodular sequence with two-level periodic autocorrelations by solving a trigonometric equation is proposed. Based on this algebraic method, new constructions of p-ary (p = 3,5) sequences arc presented.
提出了一种通过求解三角方程来设计具有两级周期自相关的非模序列的代数方法。基于这种代数方法,给出了p-ary (p = 3,5)序列的新构造。
{"title":"New unimodular sequences with two-level periodic autocorrelations","authors":"A. Leukhin, P. Fan","doi":"10.1109/IWSDA.2015.7458391","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458391","url":null,"abstract":"An algebraic method for designing unimodular sequence with two-level periodic autocorrelations by solving a trigonometric equation is proposed. Based on this algebraic method, new constructions of p-ary (p = 3,5) sequences arc presented.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116823072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feeding back the output or sharing state, which is better for the state-dependent degraded wiretap channel with noncausal CSI at the transmitter? 反馈输出或共享状态,哪个更适合状态依赖的降级窃听信道,在发射机处具有非因果CSI ?
Bin Dai, Zheng Ma, Linman Yu
In this paper, we show that a noiseless feedback link from the legitimate receiver to the transmitter increases the maximum achievable secrecy rate of Chen and Han Vinck's model of the degraded wiretap channel with CSI only available at the transmitter. Moreover, we find that in some particular cases, this feedback scheme performs even better than Chia and El Gamal's CSI sharing scheme on improving the maximum achievable secrecy rate of Chen and Han Vinck's model.
在本文中,我们证明了从合法接收器到发射器的无噪声反馈链路增加了Chen和Han Vinck的退化窃听信道模型的最大可实现保密率,CSI仅在发射器处可用。此外,我们发现在某些特定情况下,该反馈方案在提高Chen和Han Vinck模型的最大可实现保密率方面甚至优于Chia和El Gamal的CSI共享方案。
{"title":"Feeding back the output or sharing state, which is better for the state-dependent degraded wiretap channel with noncausal CSI at the transmitter?","authors":"Bin Dai, Zheng Ma, Linman Yu","doi":"10.1109/IWSDA.2015.7458421","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458421","url":null,"abstract":"In this paper, we show that a noiseless feedback link from the legitimate receiver to the transmitter increases the maximum achievable secrecy rate of Chen and Han Vinck's model of the degraded wiretap channel with CSI only available at the transmitter. Moreover, we find that in some particular cases, this feedback scheme performs even better than Chia and El Gamal's CSI sharing scheme on improving the maximum achievable secrecy rate of Chen and Han Vinck's model.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal frequency-hopping sequence sets under maximum aperiodic Hamming correlation 最大非周期汉明相关下的最优跳频序列集
Changyuan Wang, D. Peng
In order to evaluate the goodness of frequency-hopping sequences, the maximum aperiodic Hamming correlation is used as an important measure. In this paper, based on generalized Gordon-Mills-Welch sequences (GGMW sequences) and generalized m-sequences (GM sequences), two classes of frequency-hopping sequence sets arc presented, which are optimal for maximum aperiodic Hamming correlation according to the aperiodic Hamming correlation bound.
为了评价跳频序列的优劣,将最大非周期汉明相关作为一种重要的度量。本文基于广义Gordon-Mills-Welch序列(GGMW序列)和广义m-序列(GM序列),根据非周期Hamming相关界,给出了两类最优的最大非周期Hamming相关跳频序列集。
{"title":"Optimal frequency-hopping sequence sets under maximum aperiodic Hamming correlation","authors":"Changyuan Wang, D. Peng","doi":"10.1109/IWSDA.2015.7458402","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458402","url":null,"abstract":"In order to evaluate the goodness of frequency-hopping sequences, the maximum aperiodic Hamming correlation is used as an important measure. In this paper, based on generalized Gordon-Mills-Welch sequences (GGMW sequences) and generalized m-sequences (GM sequences), two classes of frequency-hopping sequence sets arc presented, which are optimal for maximum aperiodic Hamming correlation according to the aperiodic Hamming correlation bound.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sufficient conditions for an (n, 1) mother code and its puncturing pattern to generate a given convolutional code (n, 1)母码及其穿刺模式生成给定卷积码的充分条件
Habong Chung, Hwanseok Jang, Jinwoo Seong
Puncturing is the most common way of increasing the rate of convolutional codes. The puncturing process is done to the original code called the mother code by a specific puncturing pattern. In this article, we investigate into the question whether any convolutional code is obtainable by puncturing some (n, 1) mother codes. We present two sufficient conditions for the mother code and the puncturing pattern to satisfy in order that the punctured code is equivalent to the given (N, K) convolutional code.
刺破是提高卷积码识别率的最常用方法。穿刺过程是通过特定的穿刺模式对称为母代码的原始代码进行的。在这篇文章中,我们研究了是否有任何卷积码可以通过穿刺一些(n, 1)母码得到的问题。我们给出了母码和穿刺模式满足的两个充分条件,使穿刺码等价于给定的(N, K)卷积码。
{"title":"Sufficient conditions for an (n, 1) mother code and its puncturing pattern to generate a given convolutional code","authors":"Habong Chung, Hwanseok Jang, Jinwoo Seong","doi":"10.1109/IWSDA.2015.7458422","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458422","url":null,"abstract":"Puncturing is the most common way of increasing the rate of convolutional codes. The puncturing process is done to the original code called the mother code by a specific puncturing pattern. In this article, we investigate into the question whether any convolutional code is obtainable by puncturing some (n, 1) mother codes. We present two sufficient conditions for the mother code and the puncturing pattern to satisfy in order that the punctured code is equivalent to the given (N, K) convolutional code.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiplication in a Galois ring 伽罗瓦环中的乘法
S. Akleylek, F. Özbudak
In this paper, we focus on the efficient multiplication in a Galois ring of the size 4n, where n is a positive integer. We consider to adapt the finite field multiplication methods to the Galois ring multiplication. We give the polynomial multiplication in the Galois ring as a Toeplitz matrix-vector multiplication design with a modification used in finite fields of characteristic two. By this method, we reduce the multiplication complexity. Note that the proposed approach can be easily generalized to Galois rings of arbitrary characteristic. To the best of our knowledge, this is the first study to have a subquadratic space complexity to multiply two elements in the Galois rings.
本文主要研究大小为4n的伽罗瓦环上的有效乘法,其中n为正整数。我们考虑将有限域乘法方法应用于伽罗瓦环乘法。我们给出了伽罗瓦环上的多项式乘法作为Toeplitz矩阵-向量乘法设计,并在特征2的有限域上作了修改。通过这种方法,我们降低了乘法的复杂度。注意,所提出的方法可以很容易地推广到任意特征的伽罗瓦环。据我们所知,这是第一个在伽罗瓦环中两个元素相乘的次二次空间复杂度的研究。
{"title":"Multiplication in a Galois ring","authors":"S. Akleylek, F. Özbudak","doi":"10.1109/IWSDA.2015.7458407","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458407","url":null,"abstract":"In this paper, we focus on the efficient multiplication in a Galois ring of the size 4n, where n is a positive integer. We consider to adapt the finite field multiplication methods to the Galois ring multiplication. We give the polynomial multiplication in the Galois ring as a Toeplitz matrix-vector multiplication design with a modification used in finite fields of characteristic two. By this method, we reduce the multiplication complexity. Note that the proposed approach can be easily generalized to Galois rings of arbitrary characteristic. To the best of our knowledge, this is the first study to have a subquadratic space complexity to multiply two elements in the Galois rings.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131525446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-dimensional Anderson-Darling statistic based goodness-of-fit test for spectrum sensing 基于多维Anderson-Darling统计量的频谱感知拟合优度检验
Sanjeev Gurugopinath, B. Samudhyatha
In this paper, we propose a multi-dimensional extension of the Anderson-Darling statistic based goodness-of-fit lest for spectrum sensing in a cognitive radio network with multiple nodes. A technique lo evaluate the optimal detection threshold that satisfies a constraint on the false-alarm probability is discussed. Assuming stationary and known noise statistics, we show that this detector, called as the K-sample Anderson-Darling statistic based detector, outperforms the well-known energy detector under various practically relevant primary signal models and channel fading models, through extensive Monte Carlo simulations.
在本文中,我们提出了一种基于Anderson-Darling统计的多维度拟合优度方法,用于多节点认知无线电网络的频谱感知。讨论了一种评估满足虚警概率约束的最优检测阈值的方法。假设平稳且已知噪声统计量,我们通过广泛的蒙特卡罗模拟表明,这种检测器被称为基于k样本Anderson-Darling统计量的检测器,在各种实际相关的主信号模型和信道衰落模型下优于众所周知的能量检测器。
{"title":"Multi-dimensional Anderson-Darling statistic based goodness-of-fit test for spectrum sensing","authors":"Sanjeev Gurugopinath, B. Samudhyatha","doi":"10.1109/IWSDA.2015.7458396","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458396","url":null,"abstract":"In this paper, we propose a multi-dimensional extension of the Anderson-Darling statistic based goodness-of-fit lest for spectrum sensing in a cognitive radio network with multiple nodes. A technique lo evaluate the optimal detection threshold that satisfies a constraint on the false-alarm probability is discussed. Assuming stationary and known noise statistics, we show that this detector, called as the K-sample Anderson-Darling statistic based detector, outperforms the well-known energy detector under various practically relevant primary signal models and channel fading models, through extensive Monte Carlo simulations.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"16 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120889317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The computational complexity of some algorithms for the rank bounded distance on cyclic codes 讨论了循环码的秩有界距离算法的计算复杂度
Junru Zheng, T. Kaida
The authors proposed an algorithm for calculation of new lower bound using the discrete Fourier transform in 2010. Afterward, we considered some algorithms to improve the original algorithm. In this paper, we discuss the computational complexity of the rank bounded distance for cyclic codes.
作者在2010年提出了一种利用离散傅里叶变换计算新下界的算法。之后,我们考虑了一些算法来改进原算法。本文讨论了循环码的秩有界距离的计算复杂度。
{"title":"The computational complexity of some algorithms for the rank bounded distance on cyclic codes","authors":"Junru Zheng, T. Kaida","doi":"10.1109/IWSDA.2015.7458409","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458409","url":null,"abstract":"The authors proposed an algorithm for calculation of new lower bound using the discrete Fourier transform in 2010. Afterward, we considered some algorithms to improve the original algorithm. In this paper, we discuss the computational complexity of the rank bounded distance for cyclic codes.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122597398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography 基于椭圆曲线密码的智能卡动态身份认证方案
M. Sarvabhatla, C. Vorugunti
As networking and wireless communication technologies advance more rapidly, it give rise to a quick change in the m-commerce land scape. The insecure public internet as an access medium resulted in lots of cryptographic attacks on wireless transactions. Due to this, there is an extreme demand for light weight and secure authentication protocols. In this context, few researchers have proposed E.C.C based authentication schemes to validate the legitimacy of the user connecting to remote server. Recently Islam et al has proposed a dynamic ID based authentication scheme using E.C.C and claimed that their scheme is secure and flexible. In this manuscript, we will illustrate that their scheme is susceptible to offline password guessing attack and user impersonation attack. We then communicate a secure and robust authentication scheme, which is resistant to all cryptographic attacks and light weight. We have analyzed security strengths of our scheme formally using random oracle model and game theory.
随着网络和无线通信技术的快速发展,移动商务领域发生了迅速的变化。由于公共互联网作为一种不安全的访问媒介,导致了大量针对无线交易的加密攻击。因此,对轻量级和安全的身份验证协议有极大的需求。在这种情况下,很少有研究人员提出基于ecc的身份验证方案来验证连接到远程服务器的用户的合法性。最近Islam等人提出了一种基于动态ID的认证方案,并声称该方案具有安全性和灵活性。在本文中,我们将说明他们的方案容易受到离线密码猜测攻击和用户冒充攻击。然后,我们通信一个安全可靠的身份验证方案,它可以抵抗所有加密攻击和轻量级。利用随机oracle模型和博弈论对该方案的安全性进行了形式化分析。
{"title":"A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography","authors":"M. Sarvabhatla, C. Vorugunti","doi":"10.1109/IWSDA.2015.7458418","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458418","url":null,"abstract":"As networking and wireless communication technologies advance more rapidly, it give rise to a quick change in the m-commerce land scape. The insecure public internet as an access medium resulted in lots of cryptographic attacks on wireless transactions. Due to this, there is an extreme demand for light weight and secure authentication protocols. In this context, few researchers have proposed E.C.C based authentication schemes to validate the legitimacy of the user connecting to remote server. Recently Islam et al has proposed a dynamic ID based authentication scheme using E.C.C and claimed that their scheme is secure and flexible. In this manuscript, we will illustrate that their scheme is susceptible to offline password guessing attack and user impersonation attack. We then communicate a secure and robust authentication scheme, which is resistant to all cryptographic attacks and light weight. We have analyzed security strengths of our scheme formally using random oracle model and game theory.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127628234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Self-dual cyclic codes over ℤ4 + uℤ4 自对偶循环码在素数4 + u素数4上
R. Luo, P. Udaya
In this paper we study the structure of self-dual cyclic codes over the ring Λ = ℤ4 + uℤ4. The ring Λ is a local Frobenius ring but not a chain ring. We characterize self-dual cyclic codes of odd length n over Λ. The results can be used to construct some optimal binary, quaternary cyclic and self-dual codes.
本文研究了环Λ = 0 4 + u 0 4上的自对偶循环码的结构。这个环Λ是一个局部的Frobenius环,而不是链环。我们刻画了奇长n / Λ的自对偶循环码。所得结果可用于构造一些最优的二进制、四元循环码和自对偶码。
{"title":"Self-dual cyclic codes over ℤ4 + uℤ4","authors":"R. Luo, P. Udaya","doi":"10.1109/IWSDA.2015.7458414","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458414","url":null,"abstract":"In this paper we study the structure of self-dual cyclic codes over the ring Λ = ℤ<sub>4</sub> + uℤ<sub>4</sub>. The ring Λ is a local Frobenius ring but not a chain ring. We characterize self-dual cyclic codes of odd length n over Λ. The results can be used to construct some optimal binary, quaternary cyclic and self-dual codes.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127346496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of near-complementary sequences of length n · 2m 长度为n·2m的近互补序列的构造
Gaofei Wu, Zilong Wang
The problem of constructing near-complementary sequences for peak power control in orthogonal frequency-division multiplexing (OFDM) is considered in this paper. In some applications, it is required that the sequences have various lengths as well as low peak-to-mean envelope power ratio (PMEPR). In this paper, we give a method for constructing length n · 2m-k near-complementary sequences by the aid of standard Golay sequences. The method is a generalization of the construction of Golay sequences given by Fielder et al. Our method transforms seed pairs of length n to near-complementary sequences of length n · 2m-k, while the PMEPR bound of these sequences is two times as many as that of the seed pairs. When the seed pairs are Golay pairs, a class of complementary sets of size 4 will be obtained. We will consider the number of sequences of length n · 2m-k with PMEPR ≤ 4 in the future.
研究正交频分复用(OFDM)中峰值功率控制的近互补序列构造问题。在某些应用中,要求序列具有不同的长度以及较低的峰平均包络功率比(PMEPR)。本文给出了一种利用标准Golay序列构造长度为n·2m-k的近互补序列的方法。该方法是对Fielder等人给出的Golay序列构造方法的推广。我们的方法将长度为n的种子对转化为长度为n·2m-k的近互补序列,而这些序列的PMEPR界是种子对的两倍。当种子对为Golay对时,将得到一类大小为4的互补集。未来我们将考虑长度为n·2m-k且PMEPR≤4的序列个数。
{"title":"Construction of near-complementary sequences of length n · 2m","authors":"Gaofei Wu, Zilong Wang","doi":"10.1109/IWSDA.2015.7458401","DOIUrl":"https://doi.org/10.1109/IWSDA.2015.7458401","url":null,"abstract":"The problem of constructing near-complementary sequences for peak power control in orthogonal frequency-division multiplexing (OFDM) is considered in this paper. In some applications, it is required that the sequences have various lengths as well as low peak-to-mean envelope power ratio (PMEPR). In this paper, we give a method for constructing length n · 2m-k near-complementary sequences by the aid of standard Golay sequences. The method is a generalization of the construction of Golay sequences given by Fielder et al. Our method transforms seed pairs of length n to near-complementary sequences of length n · 2m-k, while the PMEPR bound of these sequences is two times as many as that of the seed pairs. When the seed pairs are Golay pairs, a class of complementary sets of size 4 will be obtained. We will consider the number of sequences of length n · 2m-k with PMEPR ≤ 4 in the future.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1