Advanced Search

Most Downloaded

1
Embedded Implementation of HMM Speaker-Independent Continuous Speech Recognition System
Du Li-min, Xie Ling-yun, Liu Bin
2005, 27(1): 60-63.
2
Overview on Image Quality Assessment Methods
Jiang Gang-yi, Huang Da-jiang, Wang Xu, Yu Mei
2010, 32(1): 219-226. doi: 10.3724/SP.J.1146.2009.00091
3
Mobile WiMAX Access Control Based on Game Theory
Zhang Ming, Wang Suo-Ping, He Tao
2008, 30(11): 2601-2604. doi: 10.3724/SP.J.1146.2007.01757
4
Internet of Things-oriented Wireless Sensor Networks Review
Qian Zhi-Hong, Wang Yi-Jun
2013, 35(1): 215-227. doi: 10.3724/SP.J.1146.2012.00876
5
An Improved Secure Communication System Based on Chaotic Masking
Zhao Bai-shan, Zhu Yi-sheng
2007, 29(3): 699-701. doi: 10.3724/SP.J.1146.2005.00842
6
Wavelet Filtering Method and Its Application
Pan Quan, Meng Jin-li, Zhang Lei, Cheng Yong-mei, Zhang Hong-cai
2007, 29(1): 236-242. doi: 10.3724/SP.J.1146.2005.00233
7
Clustering Algorithms Used in Data Mining
Jiang Yuan, Zhang Zhao-yang, Qiu Pei-liang, Zhou Dong-fang
2005, 27(4): 655-662.
8
ADAPTIVE PROBABILITIES OF SELECTION,CROSSOVER AND MUTATION IN GENETIC ALGORITHMS
Yang Zhenqiang, Wang Changhong, Zhuang Xianyi
2000, 22(1): 112-117.
9
Construction of Rotation Symmetric Boolean Functions with Good Cryptographic Properties
Xiong Xiao-Wen, Wei Ai-Guo, Zhang Zhi-Jun
2012, 34(10): 2358-2362. doi: 10.3724/SP.J.1146.2012.00329
10
同行评议项目分组与申请代码和关键词的选择
Xiong Xiao-Yun
2011, 33(1): 245-254.
11
An Easily Initialized Visual Tracking Algorithm Based on Similar Structure for Convolutional Neural Network
LI Huanyu, BI Duyan, ZHA Yufei, YANG Yuan
2016, 38(1): 1-7. doi: 10.11999/JEIT150600
12
Linear Water-Filling Power Allocation Algorithm in OFDMA System
Zhang Dong-mei, Xu You-yun, Cai Yue-ming
2007, 29(6): 1286-1289. doi: 10.3724/SP.J.1146.2005.01345
13
Simplified Algorithm and Hardware Implementation for Particle Filter Applied to Bearings-only Tracking
Hong Shao-hua, Shi Zhi-guo, Chen Kang-sheng
2009, 31(1): 96-100. doi: 10.3724/SP.J.1146.2007.01166
14
Survey on Coverage in Wireless Sensor Networks Deployment
Liu Li-ping, Wang Zhi, Sun You-xian
2006, 28(9): 1752-1757.
15
Power Analysis Security Evaluation on Piccolo Based on FPGA Platform
Wang Chen-Xu, Li Jing-Hu, Yu Ming-Yan, Wang Jin-Xiang
2014, 36(1): 101-107. doi: 10.3724/SP.J.1146.2013.00193
16
An Introduction to Compressive Sampling and Its Applications
Jin Jian, Gu Yuan-tao, Mei Shun-liang
2010, 32(2): 470-475. doi: 10.3724/SP.J.1146.2009.00497
17
Affinity Propagation Clustering Based on Variable-Similarity Measure
Dong Jun, Wang Suo-ping, Xiong Fan-lun
2010, 32(3): 509-514. doi: 10.3724/SP.J.1146.2009.01066
18
Overview of Artificial Immune System and Its Algorithms
Xie Ke-ming, Xie Gang, Guo Hong-bo, Xu Xin-ying
2005, 27(11): 1839-1844.
19
2D Radar Imaging Scheme Based on Compressive Sensing Technique
Xie Xiao-chun, Zhang Yun-hua
2010, 32(5): 1234-1238. doi: 10.3724/SP.J.1146.2009.01223
20
TPM-Based Dynamic Integrity Measurement Architecture
Liu Zi-wen, Feng Deng-guo
2010, 32(4): 875-879. doi: 10.3724/SP.J.1146.2009.00408
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Last
  • Total:5
  • To
  • Go