Advanced Search

Most Downloaded

1
Embedded Implementation of HMM Speaker-Independent Continuous Speech Recognition System
Du Li-min, Xie Ling-yun, Liu Bin
2005, 27(1): 60-63 .
[Abstract](2495) [PDF 1074KB](69469)
2
Overview on Image Quality Assessment Methods
Jiang Gang-yi, Huang Da-jiang, Wang Xu, Yu Mei
2010, 32(1): 219-226 . doi: 10.3724/SP.J.1146.2009.00091
[Abstract](4238) [PDF 303KB](8420)
3
Mobile WiMAX Access Control Based on Game Theory
Zhang Ming, Wang Suo-Ping, He Tao
2008, 30(11): 2601-2604 . doi: 10.3724/SP.J.1146.2007.01757
[Abstract](2261) [PDF 214KB](7583)
4
Internet of Things-oriented Wireless Sensor Networks Review
Qian Zhi-Hong, Wang Yi-Jun
2013, 35(1): 215-227. doi: 10.3724/SP.J.1146.2012.00876
[Abstract](2694) [PDF 386KB](6525)
5
An Improved Secure Communication System Based on Chaotic Masking
Zhao Bai-shan, Zhu Yi-sheng
2007, 29(3): 699-701 . doi: 10.3724/SP.J.1146.2005.00842
[Abstract](2346) [PDF 245KB](5825)
6
Construction of Rotation Symmetric Boolean Functions with Good Cryptographic Properties
Xiong Xiao-Wen, Wei Ai-Guo, Zhang Zhi-Jun
2012, 34(10): 2358-2362. doi: 10.3724/SP.J.1146.2012.00329
[Abstract](1618) [PDF 198KB](4745)
7
Wavelet Filtering Method and Its Application
Pan Quan, Meng Jin-li, Zhang Lei, Cheng Yong-mei, Zhang Hong-cai
2007, 29(1): 236-242 . doi: 10.3724/SP.J.1146.2005.00233
[Abstract](5540) [PDF 288KB](4730)
8
ADAPTIVE PROBABILITIES OF SELECTION,CROSSOVER AND MUTATION IN GENETIC ALGORITHMS
Yang Zhenqiang, Wang Changhong, Zhuang Xianyi
2000, 22(1): 112-117 .
[Abstract](1873) [PDF 1135KB](4708)
9
Clustering Algorithms Used in Data Mining
Jiang Yuan, Zhang Zhao-yang, Qiu Pei-liang, Zhou Dong-fang
2005, 27(4): 655-662 .
[Abstract](3205) [PDF 2423KB](4681)
10
Xiong Xiao-Yun
2011, 33(1): 245-254.
[Abstract](4149) [PDF 297KB](4161)
11
An Easily Initialized Visual Tracking Algorithm Based on Similar Structure for Convolutional Neural Network
LI Huanyu, BI Duyan, ZHA Yufei, YANG Yuan
2016, 38(1): 1-7. doi: 10.11999/JEIT150600
[Abstract](740) [PDF 14800KB](4121)
12
Simplified Algorithm and Hardware Implementation for Particle Filter Applied to Bearings-only Tracking
Hong Shao-hua, Shi Zhi-guo, Chen Kang-sheng
2009, 31(1): 96-100 . doi: 10.3724/SP.J.1146.2007.01166
[Abstract](3498) [PDF 246KB](3944)
13
Linear Water-Filling Power Allocation Algorithm in OFDMA System
Zhang Dong-mei, Xu You-yun, Cai Yue-ming
2007, 29(6): 1286-1289 . doi: 10.3724/SP.J.1146.2005.01345
[Abstract](2956) [PDF 237KB](3928)
14
Power Analysis Security Evaluation on Piccolo Based on FPGA Platform
Wang Chen-Xu, Li Jing-Hu, Yu Ming-Yan, Wang Jin-Xiang
2014, 36(1): 101-107. doi: 10.3724/SP.J.1146.2013.00193
[Abstract](1585) [PDF 354KB](3921)
15
Survey on Coverage in Wireless Sensor Networks Deployment
Liu Li-ping, Wang Zhi, Sun You-xian
2006, 28(9): 1752-1757 .
[Abstract](2612) [PDF 282KB](3855)
16
Affinity Propagation Clustering Based on Variable-Similarity Measure
Dong Jun, Wang Suo-ping, Xiong Fan-lun
2010, 32(3): 509-514 . doi: 10.3724/SP.J.1146.2009.01066
[Abstract](3758) [PDF 268KB](3766)
17
An Introduction to Compressive Sampling and Its Applications
Jin Jian, Gu Yuan-tao, Mei Shun-liang
2010, 32(2): 470-475 . doi: 10.3724/SP.J.1146.2009.00497
[Abstract](4327) [PDF 260KB](3691)
18
2D Radar Imaging Scheme Based on Compressive Sensing Technique
Xie Xiao-chun, Zhang Yun-hua
2010, 32(5): 1234-1238 . doi: 10.3724/SP.J.1146.2009.01223
[Abstract](4309) [PDF 338KB](3641)
19
Overview of Artificial Immune System and Its Algorithms
Xie Ke-ming, Xie Gang, Guo Hong-bo, Xu Xin-ying
2005, 27(11): 1839-1844 .
[Abstract](2541) [PDF 236KB](3625)
20
TPM-Based Dynamic Integrity Measurement Architecture
Liu Zi-wen, Feng Deng-guo
2010, 32(4): 875-879 . doi: 10.3724/SP.J.1146.2009.00408
[Abstract](2958) [PDF 240KB](3484)

Monthly Journal Founded in 1979

The Source Journal of EI Compendex The Source Journal of ESCI Database

Competent unit:Authorized by CAS

Host unit:Hosted by IECAS,Department of Information Science of NNSFC

Editor-in-Chief:Yirong Wu

ISSN 1009-5896  CN 11-4494/TN

News
more >
Conference
more >
Author Center