电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP3":
255 XIAO Bin, TANG Han, XU Yunqiu, LI Weisheng
  Multi-focus Image Fusion Based on Hess Matrix
    JEIT   2018 Vol.40 (2): 255-263 [Abstract] (178) [HTML 1 KB] [PDF 19882 KB] (538)
264 WANG Xin, ZHU Hangcheng, NING Chen, Lü Guofang
  Combination of Dark-channel Prior with Sparse Representation for Underwater Image Restoration
    JEIT   2018 Vol.40 (2): 264-271 [Abstract] (143) [HTML 1 KB] [PDF 42366 KB] (422)
272 LIU Daqian, LIU Wanjun, FEI Bowen
  Object Tracking Method Based on Sparse Optimization of Local Sensing
    JEIT   2018 Vol.40 (2): 272-281 [Abstract] (144) [HTML 1 KB] [PDF 20185 KB] (419)
282 REN Hui, SU Zhibin, GAO Nan, Lü Chaohui
  Extraction Algorithm for Active Contour Based on Disparity Information of Stereoscopic Image
    JEIT   2018 Vol.40 (2): 282-288 [Abstract] (154) [HTML 1 KB] [PDF 14581 KB] (405)
289 YANG Junfeng, LIN Yaping, OU bo, JIANG Junqiang, LI Qiang
  A Quick Response Code Beautification Method Based on Saliency Weighted Random Optimization
    JEIT   2018 Vol.40 (2): 289-297 [Abstract] (191) [HTML 1 KB] [PDF 12661 KB] (410)
298
  Underwater Image Visibility Restoration Based on Underwater Imaging Model
    JEIT   2018 Vol.40 (2): 298-305 [Abstract] (113) [HTML 1 KB] [PDF 11074 KB] (486)
306 LIU Wenyuan, LIU Huixiang, WEN Liyun, WANG Lin
  A Scalable Lightweight Radio Fingerprint Map Construction Method
    JEIT   2018 Vol.40 (2): 306-313 [Abstract] (98) [HTML 1 KB] [PDF 1533 KB] (468)
323 CAO Zhiyi, NIU Shaozhang, ZHANG Jiwei
  Research on Face Reduction Algorithm Based on Generative Adversarial Nets with Semi-supervised Learning
    JEIT   2018 Vol.40 (2): 323-330 [Abstract] (272) [HTML 1 KB] [PDF 14342 KB] (730)
331
  An Improved Seam Carving Algorithm Based on Image Blocking and Optimized Cumulative Energy Map
    JEIT   2018 Vol.40 (2): 331-337 [Abstract] (126) [HTML 1 KB] [PDF 5480 KB] (591)
338 XU Liangfeng, WANG Jiayong, CUI Jingnan, HU Min, ZHANG Keke, TENG Wendi
  Dynamic Expression Recognition Based on Dynamic Time Warping and Active Appearance Model
    JEIT   2018 Vol.40 (2): 338-345 [Abstract] (94) [HTML 1 KB] [PDF 3210 KB] (469)
346 FU Dongmei, SUN Jing, YANG Tao
  Target Extraction of Hand Infrared Trace Images Based on Artificial Targeting Immunotherapy
    JEIT   2018 Vol.40 (2): 346-352 [Abstract] (76) [HTML 1 KB] [PDF 2811 KB] (373)
363 ZHANG Yong, GAO Xinxin, WANG Yujie
  Solving the Time Optimal Traveling Salesman Problem Based on Hybrid Shuffled Frog Leaping Algorithm-Genetic Algorithm
    JEIT   2018 Vol.40 (2): 363-370 [Abstract] (116) [HTML 1 KB] [PDF 292 KB] (364)
438 ZHANG Bo, LONG Hui, JIANG Feibo
  Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition
    JEIT   2018 Vol.40 (2): 438-446 [Abstract] (107) [HTML 1 KB] [PDF 19888 KB] (415)
447 ZHEN Yan, LI Xing, YANG Jing
  Distributed Energy-balanced Dynamic Packet Forwarding Strategy in WSN
    JEIT   2018 Vol.40 (2): 447-454 [Abstract] (109) [HTML 1 KB] [PDF 612 KB] (317)
455 SHI Jiugen, ZHU Wei, JIA Kunying, XU Ying
  Multi-controller Deployment Algorithm Based on Load Balance in Software Defined Network
    JEIT   2018 Vol.40 (2): 455-461 [Abstract] (205) [HTML 1 KB] [PDF 258 KB] (493)
500 ZHANG Yongjie, ZHANG Yulei, WANG Caifen
  Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings
    JEIT   2018 Vol.40 (2): 500-508 [Abstract] (116) [HTML 1 KB] [PDF 248 KB] (290)
1 ZHAO Zhiyuan, ZHU Zhiqiang, WANG Jianhua, SUN Lei
  Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    JEIT   2018 Vol.40 (1): 1-10 [Abstract] (266) [HTML 1 KB] [PDF 378 KB] (748)
11 WANG Daxing, TENG Jikai
  Probably Secure Cetificateless Aggregate Signature Algorithm for Vehicular Ad hoc Network
    JEIT   2018 Vol.40 (1): 11-17 [Abstract] (255) [HTML 1 KB] [PDF 503 KB] (1961)
18 YU Bin, FENG Li,GONG Bi, KONG Zhiyin
  Design and Implementation of Multi-level Interaction Memory Controller
    JEIT   2018 Vol.40 (1): 18-24 [Abstract] (110) [HTML 1 KB] [PDF 1347 KB] (364)
25 ZHANG Jixian, XIE Ning, LI Weidong, YUE Kun, ZHANG Xuejie
  Truthful Multi Requirements Auction Mechanism for Virtual Resource Allocation of Cloud Computing
    JEIT   2018 Vol.40 (1): 25-34 [Abstract] (119) [HTML 1 KB] [PDF 5039 KB] (707)
63 ZHOU Weiwei, YU Bin
  Optimal Defense Strategy in WSNs Based on the Game of Multi-stage Intrusion Detection
    JEIT   2018 Vol.40 (1): 63-71 [Abstract] (119) [HTML 1 KB] [PDF 320 KB] (311)
72
  Error Control Algorithm of Distributed Localization in Wireless Sensor Networks
    JEIT   2018 Vol.40 (1): 72-78 [Abstract] (101) [HTML 1 KB] [PDF 1110 KB] (683)
79 SU Yuze, MENG Xiangru, MENG Qingwei, ZHAO Zhiyuan
  Environment Adaptive and Joint Topology Aware Virtual Network Embedding Algorithm
    JEIT   2018 Vol.40 (1): 79-86 [Abstract] (107) [HTML 1 KB] [PDF 344 KB] (319)
87 QI Feng,CHEN Zhihui, WEI Lei, LU Min, SHAO Sujie,GUO Shaoyong
  ONU-BS Deployment Strategy for FiWi Network Based on Cost Optimization
    JEIT   2018 Vol.40 (1): 87-94 [Abstract] (113) [HTML 1 KB] [PDF 751 KB] (302)
189 XIAO Leyi, OUYANG Honglin, FAN Chaodong
  Multi-objective Cross Section Projection Otsu's Method Based on Memory Knetic-molecular Theory Optimization Algorithm
    JEIT   2018 Vol.40 (1): 189-199 [Abstract] (120) [HTML 1 KB] [PDF 9391 KB] (359)
200 TIAN Shengwei, ZHOU Xingfa, YU Long, FENG Guanjun, Aishan WUMAIER, LI Pu
  Causal Relation Extraction of Uyghur Events Based on Bidirectional Long Short-term Memory Model
    JEIT   2018 Vol.40 (1): 200-208 [Abstract] (162) [HTML 1 KB] [PDF 649 KB] (802)
209 QU Zhiguo, TAN Xiansi, LIN Qiang, WANG Hong, FEI Taiyong
  Randomized Wide Line Detector
    JEIT   2018 Vol.40 (1): 209-218 [Abstract] (122) [HTML 1 KB] [PDF 4409 KB] (412)
219 LIU Chang, ZHANG Yike, ZHANG Pengyuan, YAN Yonghong
  Neural Network Language Modeling Using an Improved Topic Distribution Feature
    JEIT   2018 Vol.40 (1): 219-225 [Abstract] (160) [HTML 1 KB] [PDF 302 KB] (523)
2795 WEN Wei, CAO Xuefei,CHEN Bo, HAN Xun,ZHANG Xuefeng, WANG Penghui,LIU Hongwei
  Infinite Max-margin Linear Discriminant Projection Model
    JEIT   2017 Vol.39 (12): 2795-2802 [Abstract] (292) [HTML 1 KB] [PDF 1169 KB] (490)
2945 LIU Zhengyi, HUANG Zichao, ZHANG Zhihua
  RGB-D Saliency detection Based on Saliency Center Prior and Saliency-depth Probability Adjustment
    JEIT   2017 Vol.39 (12): 2945-2952 [Abstract] (94) [HTML 1 KB] [PDF 3464 KB] (500)
First page | Prev page | Next page | Last pagePage 4 of 64, 1895 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech