{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236723,"version":"3.37.0"},"reference-count":15,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.10.2821-2827","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T14:03:16Z","timestamp":1412604196000},"source":"Crossref","is-referenced-by-count":0,"title":["Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks"],"prefix":"10.4304","volume":"9","author":[{"given":"Cong","family":"Liao","sequence":"first","affiliation":[]},{"given":"Hongwu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xinye","family":"Wu","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1638663"},{"key":"ref2","first-page":"897","article-title":"ML frequency offset and carrier phase estimation in OFDM systems with noncircular transmissions","volume-title":"Proc EUSIPCO 2004","author":"Fusco","year":"2004","unstructured":"[2] T. Fusco and M. Tanda. ML frequency offset and carrier phase estimation in OFDM systems with noncircular transmissions, in Proc. EUSIPCO 2004, 2004, pp. 897\u2013900."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.891429"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1367559"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.820989"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.821912"},{"issue":"Issue 10","key":"ref7","first-page":"2113","article-title":"Doubly selective channel estimation for subband and OFDMA using basis expansion models","volume":"54","year":"2011","unstructured":"[8] Chen Donghua and Qiu Hongbing. Doubly selective channel estimation for subband and OFDMA using basis expansion models, Science China Information Sciences, Vol. 54, Issue 10, 2011, pp 2113-2123.","journal-title":"Science China Information Sciences"},{"key":"ref8","first-page":"284","article-title":"Wu, Di. Resource management for uplink OFDM wireless communication system.","volume-title":"Global Mobile Congress","author":"Xu","year":"2007","unstructured":"[10] Xu, Liang, Chen, Tianding, Ren, Zhiguo, Wu, Di. Resource management for uplink OFDM wireless communication system. Global Mobile Congress, 2007, 284-288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2009.03.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.04.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2010.04.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2004.07.011"},{"key":"ref13","first-page":"5","article-title":"Sub gradient approach for resource management in multi-user OFDM systems.","volume-title":"First International Conference on Communications and Elcetronies","author":"Yong-joo","year":"2007","unstructured":"[15] Yong-joo Chung, Chun-hyun Paik, Hu-gon Kim. Sub gradient approach for resource management in multi-user OFDM systems. First International Conference on Communications and Elcetronies, 2007, 5"},{"key":"ref14","first-page":"119","volume-title":"K Sekiyama and H","volume":"4725","year":"2007","unstructured":"[18] K. Sekiyama and H. Araki, Network Topology Reconfiguration Against Targeted and Random Attack., Lecture Notes in Computer Science, vol. 4725\/2007, pp. 119-130, 2007."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/CIS.2007.108","article-title":"E\u00b1cient Zaps and Signatures of Knowledges.","volume-title":"Proceeding of IEEE International Conference on Computational Intelligence and Security (CIS 2007)","author":"Tang","year":"2007","unstructured":"[19] C. M Tang, D. Y Pei, Z. A Yao. E\u00b1cient Zaps and Signatures of Knowledges. 2007. In Proceeding of IEEE International Conference on Computational Intelligence and Security (CIS'2007), pages 637-641"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:23Z","timestamp":1738775303000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":15,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2014,10,6]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.10.2821-2827","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,10,6]]}}}