电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP39":
544 Cao Lin; Liu Xiao-jun; Zou Mou-yan
  A Hybrid Method for Face Recognition Based on Fractal Coding and Singular Value Decomposition
    JEIT   2005 Vol.27 (4): 544-547 [Abstract] (1739) [HTML 1 KB] [PDF 727 KB] (1107)
629 Peng Yi; Zhao Dong-feng; Zhou Zheng-zhong; Zha Guang-ming
  Study on the Application of Distributed Wireless Token Ring Protocol in Wireless Ad Hoc Networks
    JEIT   2005 Vol.27 (4): 629-633 [Abstract] (1907) [HTML 1 KB] [PDF 1390 KB] (959)
638 Liu Shu; Li Wei-sheng; Wang Tao
  An Advanced Algorithm for Fast Lower-Cost Shortest Path Tree
    JEIT   2005 Vol.27 (4): 638-641 [Abstract] (1729) [HTML 1 KB] [PDF 1022 KB] (1274)
655 Jiang Yuan①②; Zhang Zhao-yang; Qiu Pei-liang; Zhou Dong-fang
  Clustering Algorithms Used in Data Mining
    JEIT   2005 Vol.27 (4): 655-662 [Abstract] (3203) [HTML 1 KB] [PDF 2424 KB] (4922)
670 Deng Zi-li; Gao Yuan; Li Yun; Wang Xin
  Multisensor Information Fusion Steady-State Optimal Wiener Deconvolution Filter
    JEIT   2005 Vol.27 (4): 670-672 [Abstract] (214) [HTML 1 KB] [PDF 672 KB] (820)
337 Zhu Xu-dong; Li Le-min; Xu Du
  A Priority Supporting Adaptive Routing Algorithm in Direct Interconnection Networks
    JEIT   2005 Vol.27 (3): 337-340 [Abstract] (1898) [HTML 1 KB] [PDF 1248 KB] (737)
341 Zhou Wei-hua; Zhu Xin-ning; Wu Mu-qing; Ding Wei
  A Scheduling Algorithm for Input Queued Switch with Guaranteed Fairness
    JEIT   2005 Vol.27 (3): 341-345 [Abstract] (1816) [HTML 1 KB] [PDF 1508 KB] (1085)
351 Sun Zhi-xin; Yang Jia-yuan; Shi Liang-hui; Wang Ru-chuan
  Research and Implementation of an Active Network Security System Based on Honeypots
    JEIT   2005 Vol.27 (3): 351-354 [Abstract] (2110) [HTML 1 KB] [PDF 1165 KB] (1022)
467

Zhong Wei-cai; Liu Jing; Liu Fang; Jiao Li-cheng

  Estimation of Distribution Algorithm Based on Generic Gaussian Networks
    JEIT   2005 Vol.27 (3): 467-470 [Abstract] (1744) [HTML 1 KB] [PDF 1150 KB] (1030)
471 Zhang An-min; Han Chong-zhao
  Tracking Fusion with Dissimilar Sensors for Linear Systems with Correlated Measurement Noises
    JEIT   2005 Vol.27 (3): 471-473 [Abstract] (1677) [HTML 1 KB] [PDF 802 KB] (1322)
474 Ni Lin; Miao Yuan
  An Image Retrieval Method in JPEG2000 Compressed Domain
    JEIT   2005 Vol.27 (3): 474-477 [Abstract] (1657) [HTML 1 KB] [PDF 1102 KB] (706)
478 Zhang Li; Qian Gong-bin; Ji Zhen
  Intelligent Digital Watermarking Technique Based on ICA
    JEIT   2005 Vol.27 (3): 478-482 [Abstract] (1864) [HTML 1 KB] [PDF 1257 KB] (856)
251 Yuan Gang; Wang Yu-feng; Wang Wen-dong; Cheng Shi-duan
  An Optimal Rate Control Scheme in the Internet
    JEIT   2005 Vol.27 (2): 251-255 [Abstract] (1578) [HTML 1 KB] [PDF 1272 KB] (744)
298 Yu Qiu-ze; Cao Ju; Liu Jian; Tian Jin-wen
  Rapid Surface Interpolation from Massive Scattered Data Using Compactly Supported Radial Basis Functions and Conjugate Gradient Method
    JEIT   2005 Vol.27 (2): 298-301 [Abstract] (2458) [HTML 1 KB] [PDF 1097 KB] (1924)
302 Li Jie; Gao Xin-bo; Jiao Li-cheng
  A CSA-Based New Fuzzy Clustering Algorithm
    JEIT   2005 Vol.27 (2): 302-305 [Abstract] (1847) [HTML 1 KB] [PDF 1217 KB] (980)
306 Yang Li; Li Yu-shan; Liu Yang; Zhang Da-pu
  Detection Contours of Multiple Moving Objects with Complex Background
    JEIT   2005 Vol.27 (2): 306-309 [Abstract] (2084) [HTML 1 KB] [PDF 987 KB] (1423)
326 Li Xiao-ou; Feng Huan-qing
  Nonlinear ICA Based on a Combined Neural Network and Its Application to Single-Trial Extraction of SCP
    JEIT   2005 Vol.27 (2): 326-328 [Abstract] (1738) [HTML 1 KB] [PDF 827 KB] (836)
17 Liu Zong-xiang; Xie Wei-xin; Yang Xuan
  Target Location Method Based on Intersection of Lines of Sight in the Netted Passive Sensor System
    JEIT   2005 Vol.27 (1): 17-20 [Abstract] (1836) [HTML 1 KB] [PDF 910 KB] (947)
31 Zhang Xiao-hua; Meng Hong-yun; Liu Fang; Jiao Li-cheng
  Effective Image Authentication Technique Based on the Interested Region
    JEIT   2005 Vol.27 (1): 31-34 [Abstract] (1778) [HTML 1 KB] [PDF 1116 KB] (801)
35 Yan Hua; Liu Ju; Li Dao-zhen; Sun Jian-de
  Incremental Wiener Filter and Space-Adaptive Regularization Based Super-Resolution Image Restoration
    JEIT   2005 Vol.27 (1): 35-38 [Abstract] (2243) [HTML 1 KB] [PDF 353 KB] (874)
39 Liu Yang; Li Yu-shan
  The Moving Object Detection Based on 2D Spatio-temporal Entropic Thresholding
    JEIT   2005 Vol.27 (1): 39-42 [Abstract] (1959) [HTML 1 KB] [PDF 1072 KB] (884)
43

Cao Ju①②; Tan Yi-hua; Ma Jie; Tian Jin-wen

  Detecting Moving Objects from Infrared Image Sequence on Displacing Background
    JEIT   2005 Vol.27 (1): 43-46 [Abstract] (1925) [HTML 1 KB] [PDF 1187 KB] (888)
47 Wu Xiao-Jun①②③; Yang Jing-Yu; Wang Shi-Tong; Josef Kittler; Lu Jie-ping
  An Improved Optimal Set of Statistical Uncorrelated Discriminant Vectors
    JEIT   2005 Vol.27 (1): 47-50 [Abstract] (2011) [HTML 1 KB] [PDF 1017 KB] (907)
56 Xia Ming-ge①②; He You; Su Feng; Huang Xiao-dong①②
  Multiscale Edge Detection Image Fusion Algorithm Using Wavelet Transform
    JEIT   2005 Vol.27 (1): 56-59 [Abstract] (2116) [HTML 1 KB] [PDF 1119 KB] (1077)
60 Du Li-min; Xie Ling-yun; Liu Bin
  Embedded Implementation of HMM Speaker-Independent Continuous Speech Recognition System
    JEIT   2005 Vol.27 (1): 60-63 [Abstract] (2480) [HTML 1 KB] [PDF 1075 KB] (69657)
64 Xie Lei; Fu Zhong-hua; Jiang Dong-mei; Zhao Rong-chun; Werner Verhelst; Hichem Sahli; Jan Conlenis
  A Robust Dynamic Mouth Feature Based on Visemic LDA for Audio Visual Speech Recognition
    JEIT   2005 Vol.27 (1): 64-68 [Abstract] (2216) [HTML 1 KB] [PDF 1526 KB] (865)
112 Zhu Hong;Wu Cheng-ke;Fang Yong;Wang Yang-li
  Joint Multiple Description and Scalable Coding for Robust Transmission of Video over Internet
    JEIT   2005 Vol.27 (1): 112-115 [Abstract] (1748) [HTML 1 KB] [PDF 1300 KB] (903)
127 Liu Hong; Bai Dong; Ding Wei
  Dynamic Routing with Minimum Interference for Traffic Engineering
    JEIT   2005 Vol.27 (1): 127-130 [Abstract] (1824) [HTML 1 KB] [PDF 1106 KB] (1662)
131 Zou Shi-hong; Lin Hua-Sheng; Cheng Shi-duan
  Study on Transmitting MPEG-4 Video Stream in WLAN
    JEIT   2005 Vol.27 (1): 131-135 [Abstract] (1929) [HTML 1 KB] [PDF 1014 KB] (857)
1863 You Ya-ping; Yuan Bao-zong
  Mathematical Morphology Appoach to Face Detection in Complex Background
    JEIT   2004 Vol.26 (12): 1863-1870 [Abstract] (1864) [HTML 1 KB] [PDF 1554 KB] (1288)
First page | Prev page | Next page | Last pagePage 48 of 53, 1585 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech