Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Acta Electronica Sinica
FQ: monthly
AD of Publication: China
Lanuage: English
ISSN: 0372-2112
CN: 11-2087/TN
YP: 1962
Recommended Journals
Video Engineering
Communications Technology
Wireless Communication Technology
Modern Radar
Modern Transmission
West China Broadcasting TV
China Digital Cable TV
Acta Electronica Sinica
2012 -05
Heyting System and Its Representation by H-Spatilization WU Hong-bo
The Scheme of Symplectic MRTD Using Propagation Technique WEI Min
Qubits Reversible Logic Circuits Synthesis Based on Bisection Method YANG Zhong-ming1
Reliability Assessment of Products with Wiener Process Degradation by Fusing Multiple Information WANG Xiao-lin
The Aliasing Analysis and Resolution Calculation of Tilting Sampling System WANG Jing
FDOA Location Algorithm for Fixed Emitter with Moving Observer LIU Cong-feng1
A Minimal Boundary Thermal Analysis Method for Stacked 3D IC YU Hui
Optic-Electric Tracking System Filter Design Based on Posterior Confidence Residual Test with Intermittent Observations CHEN Li1
A Modified Parallel Wrapper Cell for Hierarchical SOCs Test DENG Li-bao
2TF:A Collaborative Considered TSV and Thermal Floorplanning Algorithm for Three-Dimensional Chip WANG Wei1
A Fault-Tolerant Routing Algorithm Based on BIST for 2D-Mesh Network-on-Chip without Using Virtual Channels YAO Lei2
BIST Scheme of Parallel Folding Counters LIANG Hua-guo1
Radar Target One Dimensional High Resolution Imaging Based on Sparse and Non-Uniform Samplings in Frequency Domain ZHOU Jian-xiong
Adaptive Range-Spread Target Detectors for Compound-Gaussian Clutter JIAN Tao1
Local-World Weighted Topology Evolving Model for Wireless Sensor Networks ZHANG De-gan
Deployment Algorithm of Mobile Sensing Nodes Based on Evolutionary Optimization NAN Guo-fang
IoT Technology and Application QIAN Zhi-hong
A Novel Design of QAM Whose Modulation Index is not the Nth Power of 2 CHANG Cheng-wei
A Verifiable Rational Secret Sharing Scheme Based on Bilinear Pairing ZHANG En1
Secure Multi-Party Comparing Protocol and Its Applications LIU Wen
Compact Multi-Coupon Schemes with Concurrent Security LIU Xin1
A Personalized Privacy Anonymous Method Based on Inverse Clustering WANG Bo1
A Software Watermarking Algorithm Based on Threads Relation XU Jin-chao
Research of Content Feature Descriptors for Lunar Images Based on Saliency Regions CHEN Hui-zhong1
Image Super-Resolution Algorithms Based on Sparse Representation of Classified Image Patches LIAN Qiu-sheng
A New Fast Automatic Mosaic Method on Unmanned Aerial Vehicle Images LI Yan-shan
PCNN Model Automatic Parameters Determination and Its Modified Model DENG Xiang-yu1
A Middleware-Based Algorithm for Redundant Reader Elimination in RFID Systems L Shi-lei
3D Mesh Merging and Stitching with Large Overlaps ZOU Bei-ji
Evolutionary Generation of Test Data for Path Coverage Based on Automatic Reduction of Search Space ZHANG Yan1
An Improved Level Partitioning Algorithm Considering Minimum Execution Delay and Resource Restraints CHEN Nai-jin1
Fuzzy Approximation-Based Adaptive Tracking Control for Nonlinear Systems with Multiple Time Delays DU Zhen-bin
The Model and Algorithm for the Target Threat Assessment Based on Elman_AdaBoost Strong Predictor WANG Gai-ge1
2012 Issues:  [12] [11] [10] [09] [08] [07] [06] [05] [04] [03] [02] [01]
More Issues:   [1962]   [1963]   [1964]   [1965]   [1978]   [1979]   [1980]   [1981]   [1982]   [1983]   [1984]   [1985]   [1986]   [1987]   [1988]   [1989]   [1990]   [1991]   [1992]   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2013]   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved