电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP3":
1210 YE Feng, HONG Siting, CHEN Jiazhen, ZHENG Zihua, LIU Guanghai
  Salient Object Detection via Multi-feature Diffusion-based Method
    JEIT   2018 Vol.40 (5): 1210-1218 [Abstract] (94) [HTML 1 KB] [PDF 17209 KB] (288)
1242 LI Yaqian, JIA Lu, LI Haibin, ZHANG Wenming, ZHANG Yansong
  Research on Target Tracking Algorithm from Fisheye Camera Based on Compressive Sensing
    JEIT   2018 Vol.40 (5): 1242-1249 [Abstract] (106) [HTML 1 KB] [PDF 6197 KB] (397)
1250 WU Xinjie, YAN Shiyu, XU Panfeng, YAN Hua
  Image Reconstruction Algorithm for Electrical Capacitance Tomography Based on Sparsity Adaptive Compressed Sensing
    JEIT   2018 Vol.40 (5): 1250-1257 [Abstract] (126) [HTML 1 KB] [PDF 2186 KB] (609)
1258 XIE Jinbao, HOU Yongjin, KANG Shouqiang, LI Baiwei, ZHANG Xiao
  Multi-feature Fusion Based on Semantic Understanding Attention Neural Network for Chinese Text Categorization
    JEIT   2018 Vol.40 (5): 1258-1265 [Abstract] (171) [HTML 1 KB] [PDF 1485 KB] (1214)
763 CHEN Zhuo, FENG Gang, LIU Bei, ZHOU Yang
  Construction Policy of Network Service Chain Oriented to Resource Fragmentation Optimization in Operator Network
    JEIT   2018 Vol.40 (4): 763-769 [Abstract] (187) [HTML 1 KB] [PDF 272 KB] (513)
770 YI Peng, LI Gen, ZHANG Zhen
  Energy Optimized Implicit Collaborative Caching Scheme for Content Centric Networking
    JEIT   2018 Vol.40 (4): 770-777 [Abstract] (135) [HTML 1 KB] [PDF 720 KB] (430)
778 BI Xiaojun, ZHANG Qian
  Service Access Control for Heterogeneous Wireless Networks Based on Multi-objective Evolutionary Algorithm Based on Decomposition
    JEIT   2018 Vol.40 (4): 778-784 [Abstract] (159) [HTML 1 KB] [PDF 764 KB] (386)
785 LI Dan, LAN Julong, WANG Peng, HU Yuxiang
  Distributed Service Path Selection Algorithm under Central Control
    JEIT   2018 Vol.40 (4): 785-793 [Abstract] (145) [HTML 1 KB] [PDF 1368 KB] (409)
794 WANG Kai, CHEN Xinhua, CHEN Xi, Wu Zehui
  On the Defense Advantages of Network Address Shuffling Against Different Scanning Attacks
    JEIT   2018 Vol.40 (4): 794-801 [Abstract] (158) [HTML 1 KB] [PDF 817 KB] (410)
802 WANG Jianhua, WANG Guangbo, XU Yang, HU Yixiao, ZHANG Yue, FAN Liwen
  Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    JEIT   2018 Vol.40 (4): 802-810 [Abstract] (117) [HTML 1 KB] [PDF 348 KB] (380)
811 YAN Xixi, LIU Yuan, LI Zichen, TANG Yongli, YE Qing
  New Multi-authority Attribute-based Encryption Scheme on Lattices
    JEIT   2018 Vol.40 (4): 811-817 [Abstract] (114) [HTML 1 KB] [PDF 256 KB] (318)
920 XIONG Lei, WU Liyang, DU Shaoyi, BI Duyan, FANG Ting
  Robust Non-rigid Registration Algorithm Based on Local Affine Registration
    JEIT   2018 Vol.40 (4): 920-927 [Abstract] (114) [HTML 1 KB] [PDF 2875 KB] (488)
928 ZHANG Yan, SUN Shiyu, HU Yongjiang, LI Jianzeng, FAN Cong
  Random Sample Consensus Algorithm Based on Feature Distance and Inliers
    JEIT   2018 Vol.40 (4): 928-935 [Abstract] (95) [HTML 1 KB] [PDF 3804 KB] (486)
936 WANG Huabin, LI Mengwen, ZHOU Jian, TAO Liang
  Double Gabor Orientation Weber Local Descriptor for Palmprint Recognition
    JEIT   2018 Vol.40 (4): 936-943 [Abstract] (98) [HTML 1 KB] [PDF 6173 KB] (545)
944 YUAN Lifen, DU Yuqing, HE Yigang, Lü Mi, CHENG Zhen
  Grouped Dynamic Frame Slotted ALOHA Tag Anti-collision Algorithm Based on Parallelizable Identification
    JEIT   2018 Vol.40 (4): 944-950 [Abstract] (106) [HTML 1 KB] [PDF 1218 KB] (387)
951 MA Jie, ZHANG Xiudan, YANG Nan, TIAN Yalei
  Gesture Recognition Method Combining Dense Convolutional with Spatial Transformer Networks
    JEIT   2018 Vol.40 (4): 951-956 [Abstract] (111) [HTML 1 KB] [PDF 1481 KB] (411)
957 LI Ping, ZHANG Luyao, CAO Xia, HU Jianhua
  Hybrid Context Recommendation Algorithm Based on Latent Topic
    JEIT   2018 Vol.40 (4): 957-963 [Abstract] (107) [HTML 1 KB] [PDF 324 KB] (371)
964 LIU Cong, LIU Yunqing
  Research on Pulse Wave Velocity Measurement Method Based on Dual-mode Algorithm
    JEIT   2018 Vol.40 (4): 964-970 [Abstract] (95) [HTML 1 KB] [PDF 913 KB] (462)
1012 ZHU Jianqing, ZENG Huanqiang, DU Yongzhao, LEI Zhen, ZHENG Lixin, CAI Canhui
  Person Re-identification Based on Novel Triplet Convolutional Neural Network
    JEIT   2018 Vol.40 (4): 1012-1016 [Abstract] (142) [HTML 1 KB] [PDF 458 KB] (465)
594 LI Panchi, SUN Hao
  Quantum Color Image Filtering in the Frequency Domain
    JEIT   2018 Vol.40 (3): 594-601 [Abstract] (108) [HTML 1 KB] [PDF 38369 KB] (417)
602 XIE Tao, WU Ensi
  A Robust Kernelized Correlation Tracking Algorithm for Infrared Targets Based on Ensemble Learning
    JEIT   2018 Vol.40 (3): 602-609 [Abstract] (154) [HTML 1 KB] [PDF 10745 KB] (448)
610 HAN Zheng, XIAO Zhitao
  Weakly Supervised Semantic Segmentation Based on Semantic Texton Forest and Saliency Prior
    JEIT   2018 Vol.40 (3): 610-617 [Abstract] (153) [HTML 1 KB] [PDF 16756 KB] (510)
618 WANG Xiaofeng, ZHANG Minglu, LIU Jun
  Robot Perceptual Learning Method Based on Incremental Bidirectional Principal Component Analysis
    JEIT   2018 Vol.40 (3): 618-625 [Abstract] (128) [HTML 1 KB] [PDF 4157 KB] (561)
626 WANG Xiaohua, XIA Chen, HU Min, REN Fuji
  Facial Expression Recognition Based on the Fusion of  Spatio-temporal Features in Video Sequences
    JEIT   2018 Vol.40 (3): 626-632 [Abstract] (158) [HTML 1 KB] [PDF 1995 KB] (529)
633 ZHANG Dongbo, CHEN Zhiqiang, YI Liangling, XU Haixia
  Binarization Representation of Image Microstructure and the Application of Object Recognition
    JEIT   2018 Vol.40 (3): 633-640 [Abstract] (137) [HTML 1 KB] [PDF 5180 KB] (544)
641 TIAN Wei, HUANG Gaoming
  Robust Multisensor Bias Estimation Under Nonideal Association
    JEIT   2018 Vol.40 (3): 641-647 [Abstract] (106) [HTML 1 KB] [PDF 325 KB] (355)
683 LIU Zhenhua,ZHOU Peilin, DUAN Shuhong
  Attribute-based Proxy Re-encryption Scheme with Keyword Search
    JEIT   2018 Vol.40 (3): 683-689 [Abstract] (123) [HTML 1 KB] [PDF 589 KB] (799)
690 WU Dapeng, WU Guangkai,WANG Ruyan
  Energy-saving Mechanism of Integrated Fiber-wireless Access Network with Uplink Data Frame Aggregation
    JEIT   2018 Vol.40 (3): 690-696 [Abstract] (125) [HTML 1 KB] [PDF 249 KB] (481)
697 SHEN Zhijun, GAO Jing, WU Rigeng
  Feedback and Reverse Transmission Mechanism Based Two-stage Switch Architecture
    JEIT   2018 Vol.40 (3): 697-704 [Abstract] (139) [HTML 1 KB] [PDF 777 KB] (356)
750
  Design of Hardware Obfuscation AES Based on State Deflection Strategy
    JEIT   2018 Vol.40 (3): 750-757 [Abstract] (91) [HTML 1 KB] [PDF 3660 KB] (569)
First page | Prev page | Next page | Last pagePage 3 of 64, 1895 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech