{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:22:25Z","timestamp":1730272945718,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iscit.2016.7751656","type":"proceedings-article","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T16:41:39Z","timestamp":1480005699000},"page":"384-387","source":"Crossref","is-referenced-by-count":1,"title":["The end to end assessment based on the quality of FDD-LTE network by user business data"],"prefix":"10.1109","author":[{"given":"Jiucheng","family":"Huang","sequence":"first","affiliation":[]},{"given":"Saibin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Feihu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jialong","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Guijun","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.08.011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.10.035"},{"key":"ref10","first-page":"557","article-title":"PengCheng Mu, QinYe Yin. A wireless secret key generation method based on Chinese remainder theorem in FDD systems[J]","author":"wang","year":"2012","journal-title":"Science China Information Sciences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.005"},{"key":"ref5","article-title":"Accurate Radio Coverage Assessment Methods Investigation for 3G\/4G Networks[J]","author":"ahmed","year":"2016","journal-title":"Computer Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2015.07.004"},{"key":"ref7","first-page":"9411","article-title":"Coverage rate calculation in wireless sensor networks[J]","author":"kashi","year":"2012","journal-title":"Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.08.005"},{"key":"ref9","article-title":"Capacity of Generalized UTRA FDD Closed-Loop Transmit Diversity Modes[J]","volume":"543","author":"hamalainen","year":"2010","journal-title":"Wireless Personal Communications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.10.044"}],"event":{"name":"2016 16th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2016,9,26]]},"location":"Qingdao, China","end":{"date-parts":[[2016,9,28]]}},"container-title":["2016 16th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7736510\/7751579\/07751656.pdf?arnumber=7751656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T22:50:35Z","timestamp":1482187835000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7751656\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iscit.2016.7751656","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}