Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
电子学报(英文版)
FQ: quarterly
AD of Publication: China
Lanuage: English
ISSN: 1022-4653
CN: 10-1284/TN
YP: 1991
Recommended Journals
电子学报(英文版)
2018 -05
Catalog
A Correlation Visual Analytics System for Air Quality DU Yi;Abish Malik;ZHOU Lianke;ZHOU Yuanchun;Department of Big Data Technology and Application Development
Viewpoint Optimization Method for Flying Robot Inspecting Transmission Towers Based on Point Cloud Model LIU Chang'an;DONG Ruifang;JIN Lu;WU Hua;School of Control and Computer Engineering
The Research of One Novel Cost-Sensitive Classification Algorithm ZHOU Jingjing;SUN Weifeng;HAN Xiaomin;LU Ruqiang;ZHANG Yuanqi;ZHANG Shenwei;Zhejiang Gongshang University;School of Software
Knowledge Compilation Methods Based on the Clausal Relevance and Extension Rule NIU Dangdang;LIU Lei;LYU Shuai;College of Computer Science and Technology
Interactive Details on Demand Visual Analysis on Large Attributed Networks DU Xiaolei;WEI Yingmei;WU Lingda;College of Information System and Management
A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security ZHONG Zengsheng;ZHAO Ying;SHI Ronghua;SHENG Yingshuai;LIU Junrong;MENG Hua;LIN Dan;School of Information Science and Engineering
RectMap:A Boundary-Reserved Map Deformation Approach for Visualizing Geographical Map SUN Guodao;ZHAI Shuangpo;LI Si;LIANG Ronghua;College of Information Engineering
Visual Analytics of Traffic Congestion Propagation Path with Large Scale Camera Data SHAN Zhenyu;PAN Zhigeng;LI Fengwei;XU Huihui;LI Jiming;Hangzhou Normal University;Institute of VR
Visual Comparison of Customer Stickiness in Retail Stores JIANG Tao;SHI Lei;ZHAO Ye;ZHANG Xiatian;LU Yao;HUANG Congcong;SKLCS
Visual Exploration of Differences Among DTI Fiber Models MEI Honghui;GUO Fangzhou;CHEN Haidong;CHEN Yi;CHEN Wei;State Key Lab of CAD&CG
Secure DRM Scheme Based on Blockchain with High Credibility MA Zhaofeng;HUANG Weihua;GAO Hongmin;School of Cyberspace Security
WAF-Based Chinese Character Recognition for Spam Image Filtering LI Siyuan;LI Ruiguang;XU Yuan;ZHOU Hao;YAN Hanbing;XU Bin;ZHANG Honggang;Beijing University of Posts and Telecommunication;National Institute of Network and Information Security of China;National Computer Network Emergency Response Technical Team Coordination Center of China;
Release Connection Fingerprints in Social Networks Using Personalized Differential Privacy LI Yongkai;LIU Shubo;LI Dan;WANG Jun;School of Computer
Memory Request Priority Based Warp Scheduling for GPUs ZHANG Jun;HE Yanxiang;SHEN Fanfan;LI Qing'an;TAN Hai;School of Software
The Existence of a Class of Balanced Multi-output Rotation Symmetric Boolean Functions DU Jiao;FU Shaojing;QU Longjiang;LI Chao;PANG Shanqi;College of Mathematics and Information Science
Certificateless Signcryption Scheme Without Random Oracles ZHOU Caixue;School of Information Science and Technology
A Self-Biased Low-Jitter Process-Insensitive Phase-Locked Loop for 1.25Gb/s-6.25Gb/s SerDes YUAN Hengzhou;GUO Yang;LIU Yao;LIANG Bin;GUO Qiancheng;College of Computer Science
Interweaving Permutation Meets Block Compressed Sensing ZHANG Bo;LIU Yulin;JING Xiaojun;ZHUANG Jie;WANG Kai;Communication NCO Academy
Single-Channel Speech Separation Based on Non-negative Matrix Factorization and Factorial Conditional Random Field LI Xu;TU Ming;WANG Xiaofei;WU Chao;FU Qiang;YAN Yonghong;Key Laboratory of Speech Acoustics and Content Understanding
Block Markov Superposition Transmission with Color Shift Keying ZENG Huicong;LIN Nina;MA Xiao;School of Electronics and Information Technology
Multi-domain Lightweight Asymmetric Group Key Agreement ZHENG Jiamin;TAN Yu'an;ZHANG Xiaosong;ZHANG Qikun;ZHANG Quanxin;ZHANG Changyou;School of Computer Science and Technology
Wireless Channel Measurements and Modeling of LTE Broadband System for High-Speed Railway Scenarios ZHAO Hua;LYU Qing;LIU Yachuan;CHEN Jiaxing;ZHANG Shujing;Hebei Normal University
Coverage Probability and Average Rate of Uplink Cellular Networks Based on a 3-D Model PAN Ziyu;ZHU Qi;LIANG Guangjun;HU Han;The Key Wireless Lab of Jiangsu Province
Grey Wolf Optimizer with Ranking-Based Mutation Operator for IIR Model Identification ZHANG Sen;ZHOU Yongquan;College of Information Science and Engineering
A Neuro-Fuzzy Crime Prediction Model Based on Video Analysis ZOU Beiji;Nurudeen Mohammed;ZHU Chengzhang;ZHANG Ziqian;ZHAO Rongchang;WANG Lei;School of Information Science and Engineering
Analysis of Commonly and Specifically Dysregulated Pathways in Three Women Cancers LIU Xiyang;AN Yingying;YU Baoguo;QIN Guimin;School of Software
A Survey of Macroscopic Brain Network Visualization Technology CHEN Weifeng;SHI Lei;CHEN Wei;School of Information
Diffusion Insighter:Visual Analysis of Traffic Diffusion Flow Patterns SUN Guodao;LI Si;CAO Dizhou;LIU Chunhui;JIANG Xiaorui;LIANG Ronghua;College of Information Engineering
2018 Issues:  [01]
More Issues:   [2014]   [2015]   [2016]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved