Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 1
Study of adaptive Smith predictor for central air conditioner
WANG Yan;LIU Hong-li;WANG Chao
..............page:58-60,71
Research of new fuzzy sliding mode controller on AC position servo system
WANG Xian;YANG Kun;SUN Kai-lin;SONG Shu-lin
..............page:65-68
Speech emotion recognition based on two kind of GMM-UBM multidimensional likelihoods and SVM
HUANG Yong-ming;ZHANG Guo-bao;DONG Fei;DA Fei-peng
..............page:98-101
Approach of internetware optimization meeting reliability expectation
MA Hua;ZHANG Hong-yu
..............page:163-166
Research progress of chaos-based watermarking
LIU Zhu-song;CHEN Ping-hua;LIU Yi-jun
..............page:1-5,9
Study on server placement of P2P systems
YUAN Xiao-qun;LIU Jun-bin;JI Man
..............page:17-19,36
Hybrid dynamic clustering algorithm based on partition and hierarchical clustering
HAO Hong-xing;ZHU Yu-quan;CHEN Geng;LI Mi-na
..............page:51-53
Survey of MAC scheduling technique of wireless Ad hoc networks
XU Chao-nong;XU Yong-jun;FAN Yong-kai
..............page:10-16
Research of relay transmission mechanism based on network coding technology in cells
HUANG Qiong;NI Ming-jing;TANG Lun;CHEN Qian-bin
..............page:275-278
Sociable interface-based model checking for Web applications
LI Jue-long;LI Liang;XING Jian-chun;YANG Qi-liang
..............page:207-210
Research of particle filter algorithm based on randomized Halton sequences
HUANG Dong-min;PAN Quan;LIANG Xin-hua
..............page:91-94
Paradigm words selecting method based on word clustering for sentiments analysis
PENG Xue-shi;SUN Chun-hua
..............page:114-116
Discrete process neural networks training based on spline function
LI Pan-chi;WANG Hai-ying
..............page:75-77
Study of optical network planning under complex traffic requirements
GONG Qiang;ZENG Ling;XU Shi-zhong;WANG Sheng;LI Le-min
..............page:108-110
Predicate formal system based on 0-level universal AND operator and its soundness
MA Ying-cang;HE Hua-can
..............page:84-86,101
Research on forecast of earthquake medical emergency rescue
FANG Zhi-yang;WEN Jin;WANG Jun-feng;SHI Ying-kang
..............page:172-174,181
Clustering algorithm based on attribute-relationship integrated similarity
WU Ling-yu;GAO Xue-dong;WU Sen
..............page:44-47
Survey of identifying method for measurement of heavy-hitter traffic flow
LI Zhen;YANG Ya-hui;ZHANG Guang-xing
..............page:6-9
Survey of research on kernel function evaluation
WANG Ting-hua;CHEN Jun-ting
..............page:25-28
Survey of SOA modeling in whole lifecycle
WANG Lin-lin;ZHANG Chun;LIU Xin;LIU Chuan
..............page:37-41
Cigarette distribution based on clustering objects in road network
ZHENG Yang-yang;LIU Xi-yu;DENG Wen-chen
..............page:142-144
Random exponential marking strategy based on adaptive neuron
YAO Meng-kai;HUANG Wen-jun;TAN Ping
..............page:268-270,274
Rapid 3D modeling of personalized face
HAO Ning-bo;LIAO Hai-bin
..............page:352-355,366
Improvement of DSR routing protocol with load-balancing
LI Mei;ZHOU Ji-peng
..............page:256-258
Improvement of scheduling algorithm in two-hop relay systems and its performance comparison
WANG Chun-hui;DAI Cui-qin;WANG Guang-yu;CHEN Qian-bin
..............page:259-261,264
Building computing resource sharing platform using structured P2P approach
WEI Wen-dai;SHI Jun-yan
..............page:223-225,229
Variation modal Retinex image enhancement algorithm based on PCA
FENG Rui-li;CAI Zi-xing;GUO Fan
..............page:395-397
Fire safety evaluation model of large city community based on Bayesian network
LIU Li-zhen;CHEN Lei;ZHANG Mao-hong
..............page:182-184,188
Dynamic four-character bidirectional dictionary mechanism based on memcached
JIANG Cai-zhi;WANG Hao
..............page:152-154,158
Research and design of instrumentation with no trap
RONG Han-tao;WANG Xiao-bin;HAO Zong-bo;CUI Juan-na
..............page:149-151
Thematic words extraction from Chinese Web pages based on semantic relations
LI Fang-fang;GE Bin;MAO Xing-liang;TANG Da-quan
..............page:105-107,123
Macrogamete sampling strategy of ethnic group clustering
CHEN Hao;CUI Du-wu;PAN Xiao-ying
..............page:42-43,57
Research of certificateless perfect concurrent signcryption
LUO Ming;YAN Qi-jun;ZOU Chun-hua;WEN Ying-you
..............page:322-325
TCP Vegas slow start strategy based on factor of proportional factor
YAN Er-hui;ZHU Min;DING Qing;LI Yun-tao;WEN Tao
..............page:253-255
Clustering algorithm based on residual energy and node degree for WSNs
FU Ju-ping;QI Xiao-gang
..............page:250-252
Topology matching method based on structured P2P system
FANG Fang;CHEN Shi-ping
..............page:220-222
Standard of mesh wireless personal area network——IEEE 802.15.5
SHI Xiao-chen;LIU Kai-ming;GAO Jin-chun;LIU Yuan-an
..............page:243-246
IPv4/IPv6 live migration framework for virtual machine based on cloud computing
CHEN Jun;CHEN Xiao-wei
..............page:247-249,252
Analyzing bursty feature for event detection
CHEN Hong;CHEN Wei
..............page:117-120
Fault diagnosis method for HUD based on fuzzy BP neural network
HUANG Lei;NAN Jian-guo;SUI Yong-hua;GUO Lei;WANG Xue-feng
..............page:179-181
Tabu search algorithm with variable-based fixation on solving UBQP problem
WANG Yang;MIAO Ke-jian
..............page:131-133
Multi-objective particle swarm optimizer based on orthogonal design
LIU Yan-min;ZHAO Qing-zhen;NIU Ben
..............page:72-74
Study and implement of Anti-model test framework
WANG Li-xin;GAO Cui-yun
..............page:167-171
Ontology construction model based on formal concept analysis and statistical theory
ZHANG Bin;LIU Zeng-liang;YU Da-tai;HUANG Hong
..............page:111-113
Learning Bayesian network equivalence classes based on mutual information
LI Bing-han;GAO Xiao-li;LIU San-yang
..............page:81-83,94
Business rule-based individual tax return system
WANG Wei-hui;GENG Guo-hua;ZHOU Ming-quan
..............page:203-206
Visual cryptography scheme for cheating prevention based on permutation and combination
CHEN Qin;PENG Wen-fang;XU Kun;YU Ya-ling
..............page:318-321,325
Research and implementation of business logic customization framework for SaaS applications
CHEN Wei;SHEN Bei-jun;QI Zheng-wei
..............page:155-158
Fixed-point algorithm for independent component analysis with reference
HUO Zheng-quan;LI Hong
..............page:134-136
Emergency document structure modeling based on knowledge element
LIAO Kai-ji;XIONG Hui-hui;YE Dong-hai
..............page:175-178
Research on method for extracting large-scale social network based on Mapreduce
SHI Quan;XIAO Yang-hua;WEN Wen-hao;ZHU Qian-qian;WANG Heng-shan
..............page:145-148
Time-space based trust model for P2P system
QIN Zhi-guang;HUANG Ke-rui
..............page:293-297
Multi channel group key agreement in Ad hoc cognitive radio networks
SUN Li-yan;ZHOU Jian
..............page:335-337,344
Hybrid application layer multicast model based on virtual P2SP
XU Jian-zhen;TAI De-xin;GUO Li
..............page:230-233
Source-specific multicast receiver authentication in source address validation architecture
TAN Peng-xu;CHEN Yue;SHAO Jing;XIAO Jian-peng
..............page:279-281,286
Harmony search algorithms for lot-streaming flow shop scheduling problem
HAN Hong-yan;REN Li-qun
..............page:87-90
Study on novel method of distance measurement based on chaos synchronization
ZHENG Hao-zhou;HU Jin-feng;LIU Li-dong;HE Zi-shu
..............page:69-71
Complexity ideas based research of emergency exercise simulation platform
ZHU Yue;LI Qi;YU Tie-qiao
..............page:195-198,202
Correlation analysis of traffic alert information on backbone network
TIAN Jia-rui;ZHANG Wen-zheng;ZHOU Ying-jie;FENG Zhen
..............page:287-289,297
Differential biclustering algorithm of microarray dataset based on weighted graph
DIAO Jing-ni;SHANG Xue-qun;WANG Miao;MIU Miao
..............page:48-50,53
Boundary-aware detector generation mechanism of negative selection algorithm
HU Bo;HU Min;LI Yuan-shan
..............page:137-138,144
Data invulnerability oriented redundant storage strategy in P2P networks
WU Chun-wang;XU Hao;TANG Da-quan
..............page:215-219,236
Spacecraft test oriented pattern representation of time series
ZHOU Jia-jie;YU Dan;MA Shi-long;CHEN Li-ping
..............page:127-130
Novel clone selection algorithm
DENG Xue-feng;TANG Jun
..............page:332-334
Mining closed frequent graph based on partitioning graph database
XUE Bing;ZHANG Jun-feng;ZHENG Chao
..............page:61-64,68
Dynamic evaluation method study of enterprise supply chain performance based on FCM
CHEN You-ling;HU Chun-hua;PENG Jin-wen
..............page:185-188
Efficient authentication and key agreement mechanism for P2PSIP
SHI Yuan-ying
..............page:234-236
Incremental algorithm for clustering texts in internet-oriented topic detection
YIN Feng-jing;XIAO Wei-dong;GE Bin;LI Fang-fang
..............page:54-57
Real-time performance of peer-to-peer network
YAO Jing;LI Zhong-wen;GUO Bing
..............page:20-24
Based on group reputation system in P2P network
CAI Liang;HUANG Yi-xiu
..............page:211-214,233
Research on graduation learning dynamic fuzzy neural network algorithm based on pruning technique
ZHANG De-feng;ZHOU Ling;SUN Ya-min;MA Zi-long
..............page:124-126,130
Research resource sharing and service cooperative between universities in region model based on SOA
QIU Hui-qi;CHEN Shi-ping;ZHU Yu-hong
..............page:192-194
Efficient sanitizable signature schemes with full privacy
GONG Jun-qing;QIAN Hai-feng
..............page:312-317
Investigation of convergence in probability for generic clonal selection algorithm
FANG Xian-jin;LIU Ling-bing;MU Xue-hai;WANG Xing-wang
..............page:121-123
Overview of ship detection methods in remote sensing image
TANG Mu-en;LIN Ting-qiang;WEN Gong-jian
..............page:29-36
Fusion of polarimetric SAR image based on nonsubsampled Contourlet transform and directional Teager energy
ZHANG De-xiang;WU Xiao-pei;GAO Qing-wei;GUO Xiao-jing
..............page:388-391
Decomposition and reconstruction of freeform curve based on reverse subdivision scheme
XU Feng;ZHENG Hong-chan;PENG Guo-hua;YE Zheng-lin
..............page:356-359,387
Online learning algorithm of Gaussian process based on adaptive nature gradient
SHEN Qian-qian;SUN Zong-hai
..............page:95-97,120
Sliding-window self-healing key distribution mechanism for WSN
CAI Yun-feng;MAO Yu-guang
..............page:338-340,351
Improvement of greedy forwarding schemes based on fuzzy logic control
GUAN Wei;REN Qing-hua;ZHANG Heng-yang;ZHENG Bo
..............page:282-286
Interest-based search scheme for unstructured P2P network
CHEN Xiang-xiang;WU Kai-gui;CHEN Ming
..............page:226-229
Efficient signature scheme for specified verifier
XU Jin-fang;GAO De-zhi;LIU Shu-dong
..............page:298-299,303
Kernel K-means clustering algorithm based on local density
LI Mi-na;ZHU Yu-quan;CHEN Geng;HAO Hong-xing
..............page:78-80,90
New method to generate chaotic pseudo-random sequence
LI Meng-ting;ZHAO Ze-mao
..............page:341-344
Cluster size for randomly distributed wireless sensor networks in shadowed environments
LIU Tao;LI Zhi-shu;XIA Xiang;XIAO Jing-zhong
..............page:237-239,242
SSL handshake protocol based on batch key redistribution
LUO Qing;LIN Ya-ping
..............page:345-348
Wide-field-of-view ultrasound imaging based on mutual-information and quadratic transformation
XU Zi-juan;TAN Chao-wei;LIU Dong-quan
..............page:363-366
Key frame extraction based on swarm intelligence and K-means
ZHANG Jian-ming;LI Guang-cui;JIANG Xing-jie
..............page:360-362,394
Driver programming design of wide-band direction finding system based on PCI Express bus
LI Yong-zhe;HE Zi-shu;CHENG Ting;LI Jun
..............page:159-162
Self-learning traffic signal control method of isolated intersection combining Q-learning and fuzzy logic
HE Zhao-cheng;SHE Xi-wei;YANG Wen-chen;CHEN Ning-ning
..............page:199-202
Study on dynamic simulation of virtual plant based on video features extraction
TANG Wei-dong;HU Xue-hua;GUO Chen;LIU Chang-xin;LU Zhang-ping
..............page:375-377
Correlated query strategy on requirement information of clients for WSN
TANG Chao-wei;ZHANG Wei-jun
..............page:240-242
Novel group key agreement protocol based on trusted third party for wireless network
YOU Zi-yi;XIE Xiao-yao
..............page:309-311,317
Enforcing data privacy and user privacy over outsourced database service
YU Yong-hong;BAI Wen-yang
..............page:304-308
Energy-balanced hierarchical routing protocol with dynamic intervals
CHEN Zu-jue;MA Xie-guang;CHEN Yuan
..............page:271-274
Application of Internet of things in distribution and management system of relief supplies
HUANG Dong-mei;FANG Di-gou;ZHANG Ming-hua;HE Sheng-qi;GUO Li-rui;KANG Pei-hong
..............page:189-191
New color image blind watermarking algorithm
LI Yan-shan
..............page:349-351
New local trust degree computation method for open distributed systems
JIANG Li-ming;ZHANG Kun;XU Jian;ZHANG Hong
..............page:290-292
Construction of platform for real-time moving object detection and tracking
JIA Hong-bin;MAO Xiao-bo;CHEN Tie-jun
..............page:398-400
Improved routing protocol based on separation time in delay tolerant networks
LIU Zhan-jun;DU Yang;LIU Qi-lie;CAO Bin;WANG Xiang;LI Yun
..............page:265-267
Cognitive radio routing selection strategy based on fuzzy control
HAN Qing-wen;SHANG Shu-min;ZHU Ying-he
..............page:262-264
Dynamic trust model based on trade weight for P2P network
WANG Tao-chun;LUO Yong-long;ZUO Kai-zhong;JIE Biao
..............page:300-303
2D bidirectional scalable motion model based on scalable video coding
CHEN Hu;KAO Meng-ping;ZHANG Ping;LIU Zhao
..............page:371-374,391
Multi-pose face recognition based on LLR algorithm
TAN Xiao-heng;ZHANG Jian-hui
..............page:392-394