[1] |
Qionghua LUO, Hongkui WANG, Haibing YIN, Yafen XING.
Just noticeable distortion model based on entropy masking in DCT domain
[J]. Telecommunications Science, 2023, 39(2): 59-70.
|
[2] |
Bin ZHUGE, Zhenghu YIN, Wenxue SI, Lei YAN, Ligang DONG, Xian JIANG.
Student knowledge tracking based multi-indicator exercise recommendation algorithm
[J]. Telecommunications Science, 2022, 38(9): 129-143.
|
[3] |
Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN.
Calculation method of information dissemination based on information entropy in public internet
[J]. Telecommunications Science, 2022, 38(4): 90-100.
|
[4] |
Yafen1 XING, Haibing YIN, Hongkui WANG, Qionghua LUO.
Video temporal perception characteristics based just noticeable difference model
[J]. Telecommunications Science, 2022, 38(2): 92-102.
|
[5] |
Zaisheng LIU, Fei NI, Rongpeng LI, Honggang ZHANG, Chang LIU, Jiefang ZHANG, Songyun XIE.
Persistent homology based topological analysis on the gestalt patterns during human brain cognition process
[J]. Telecommunications Science, 2021, 37(7): 77-85.
|
[6] |
Qizhu ZHONG.
Research and application of media streams based on entropy and FAHP
[J]. Telecommunications Science, 2020, 36(4): 145-153.
|
[7] |
Ke ZHANG,YueJia SUN,Hai HAN.
Customer credit modeling and credit granting method based on hybrid algorithm of collaborative filtering and social network
[J]. Telecommunications Science, 2020, 36(2): 52-60.
|
[8] |
Xiaofeng CHEN,Yadi ZHAO,Lipeng ZHANG,Feng ZHU.
Application of big data method in forecasting potential sensitive customers of electric power
[J]. Telecommunications Science, 2019, 35(11): 117-124.
|
[9] |
Tieming CHEN, Binbin XIANG, Mingqi LV, Bo CHEN, Xie JIANG.
Android malware detection method based on byte-code image and deep learning
[J]. Telecommunications Science, 2019, 35(1): 9-17.
|
[10] |
Bowen XU,Xiaodong WANG,Lei GUO,Jian WANG.
A video encryption in HEVC entropy coding based on magic square
[J]. Telecommunications Science, 2018, 34(3): 95-104.
|
[11] |
Siwei MA,Falei LUO,Tiejun HUANG.
Kernel technologies and applications of AVS2 video coding standard
[J]. Telecommunications Science, 2017, 33(8): 1-15.
|
[12] |
Fei LI,Ken CHEN,Meng LI,Chunmei GUO.
Crowd abnormal behavior detection based on motion similar entropy
[J]. Telecommunications Science, 2017, 33(5): 90-98.
|
[13] |
Minjuan WANG,Zhengpeng JI,Chao LV.
A rules extraction algorithm for IPTV customers forecasting based on the forecasting entropy measurement
[J]. Telecommunications Science, 2016, 32(5): 160-165.
|
[14] |
Jianli FENG,Mingshi LUO,Xiaomin ZHANG.
Signal entropy feature extraction and simulation analysis of the armored target with passive millimeter wave
[J]. Telecommunications Science, 2016, 32(1): 93-97.
|
[15] |
Mingxin Wang,Huachun Zhou,Jia Chen,Hongke Zhang.
An Entropy Based Anomaly Traffic Detection Approach in SDN
[J]. Telecommunications Science, 2015, 31(9): 83-89.
|