Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 10
Blind demodulation algorithm for MFSK signal based on all digital phase-locked loop
XU Jian-fei;WANG Fu-ping;WANG Zan-ji
..............page:3852-3854
Implementation of satellite based hyper-spectral image feature extraction method
BI Wen-jing;ZHANG Shan-cong
..............page:3910-3912,3916
Efficient hybrid query tree anti-collision algorithm in RFID system
SUN Wen-sheng;CHEN An-hui
..............page:3717-3719
Design and implementation of uSD card based mobile context data collection and reporting system
ZHANG Jin-feng;CHEN Can-feng;TANG Yue-zhong
..............page:3723-3726,3738
Method to calculate CFI value used in LTE system
LI Xiao-wen;FANG Qian-jun;SONG Hai-bei
..............page:3891-3893
Efficient fault-tolerant mechanism in super-peer network based on k-Petersen graph
TAN Yi-hong;ZHAO Bi-hai;WANG Xin;LIN Ya-ping
..............page:3900-3903
Workshop collaborative scheduling method based on membership degree functions
SUN Ya-nan;CHEN You-ling;WANG Chao;ZHOU Yu-jie
..............page:3739-3741,3759
Flow line enhancement based on fractional differentials
LI Bao-qiang;FAN Yin;LI Qian
..............page:3960-3962
Image segmentation based on Boltzmann entropy
CAO Jian-nong
..............page:3920-3924
Image annotation based on AFSVM-MIL arithmetic
DENG Jian-xuna;XIONG Zhong-yang;ZENG Dai-min
..............page:3917-3919,3924
TD-LTE system initial cell search and algorithm
LI Xiao-wen;WANG Jun
..............page:3875-3877
Routing optimization of 6LoWPAN nested mobile networks
WANG Xiao-nan;QIAN Huan-yan
..............page:3897-3899
Semi-automatic common ontology construction method based on dictionary
XU Si-vuan;GAO Chun-ming;PAN Hua-wei;LEI Yuan
..............page:3727-3730
Multi-objective estimation of distribution algorithm based on bacterial foraging
QIAO Ying;GAO Yue-lin;JIANG Qiao-yong
..............page:3681-3683,3686
Design and study of wide band antenna
BAI Yu;LI Ying-song;YANG Xiao-dong
..............page:3881-3883,3890
Knowledge transfer simulation of cluster enterprise based on task requirements
SUN Xin-qiu;WANG Hong-guo;SHAO Zeng-zhen;ZHAO Xue-chen
..............page:3756-3759
Improved reconstruction algorithm in 3 D face morphable model
ZHENG Qing-bi;WEI Yan-jun
..............page:3947-3949
Analysis and compare of methods predicting protein complex
TANG Xi-wei;WANG Jian-xin;HU Qiu-ling
..............page:3611-3614
Analysis and improvement of certificateless signcryption scheme
CHEN Ming;WU Kai-gui;HE Pan
..............page:3799-3802,3822
Design of detection model for DLL-Trojan based on method of simulation loading
ZHONG Ming-quan;TANG Zhang-guo;LI Huan-zhou;ZHANG Jian
..............page:3790-3792,3806
Effect of individual difference on virus\' spreading efficiency
ZHOU Hai-ping;CAI Shao-hong;LONG Yan
..............page:3797-3798,3827
Image encryption based on composite hyper chaotic system and relevanted with plaintext
YANG Xue-song;YU Wan-bo;WEI Xiao-peng
..............page:3807-3810
New temporal error concealment method based on motion object
DING Zhi-hong;WANG Gang;LIU Li-zhu
..............page:3995-3997
Video de-hazing using spatial-temporal coherence optimization
ZHANG Yi;ZHANG Jia-wan;YANG Guo-qiang;LI Liang
..............page:3983-3985,3988
Hardware simulation method for neural network with FPGA
ZHANG Rong-hua;WANG Jiang
..............page:3707-3710
Semi-supervised affinity propagation clustering based on manifold distance
FENG Xiao-lei;YU Hong-tao
..............page:3656-3658,3664
Research of redundant rule detection method in emergency response system
FU Shan-shan;SUN Zhong-lin;CHEN Xin
..............page:3671-3674
Multi-process pipeline method for high-dimensional system simulation
ZHANG Rong-hua;WANG Jiang
..............page:3694-3698
High performance navigation of large-scale terrain based on GPU programming
LIU Hao;ZHAO Wen-ji;DUAN Fu-zhou;GONG Hui-li;CAO Wei;GUANXian-xiang;PAN Li-liang
..............page:3775-3777,3781
Research on complex system\'s simulation conceptual model architecture based on multi-views
LIU Bin;MI Dong;DU Xiao-ming;SUN Xiao
..............page:3782-3785
Privacy preservation model based on semantic distance of sensitive category attribute
SUN Yan-zheng;CHEN Wei-he;ZHAN Yong-zhao
..............page:3823-3827
Study on coordinates model for dynamic acoustic array tracking system
LIU Heng;LIU Ya-lei;GU Xiao-hui
..............page:3711-3713,3722
Clustering validation with classifiers
LIU Yan-chi;GAO Xue-dong;GUO Hong-wei;WU Sen
..............page:3637-3639
Improved C4.5 decision trees algorithm based on variable precision rough set
LIU Xing-wen;WANG Dian-hong;CHEN Fen-xiong
..............page:3649-3651
Planar random polyline mapping in unit area and chaos analysis of its cross-iteration
YU Wan-bo;YANG Xue-song;WEI Xiao-peng
..............page:3837-3841
Suborbicular cluster recognition algorithm based on multi-dimensional analysis
XIAO Sheng-sheng;LIU Peng
..............page:3665-3670,3674
Research of gene clustering hybrid algorithm based on particle pair and extremal optimization
XUAN Jun-bo;WU Xiao-xia;WANG Zhen-zhen;ZHANG Chao-ying
..............page:3675-3677,3680
Joint antennas and users selection with SLNR precoding
CHEN Lei;WANG Da-ming;WANG Sheng;CUI Wei-jia
..............page:3887-3890
Algorithm based on reinforcement learning for UAV search
ZHANG Jing-jing;ZHOU De-yun;ZHANG Kun
..............page:3659-3661
Modified collaborative filtering algorithm based on meta similarity
XU Peng-yuan;DANG Yan-zhong
..............page:3646-3648,3651
Research progress in tetrahedral mesh generation from medical volume data
ZHOU Yun;FAN Xiao-ping;LIAO Zhi-fang;LIU Shao-qiang
..............page:3615-3622
Blog automatic summarization based on features information
CHEN Ming;WANG Bang-jun;ZHAO Peng-peng;CUI Zhi-ming
..............page:3760-3763
Study on communication model based on message driven in radar system simulation
WANG Lei;LU Xian-liang;CHEN Ming-yan;ZHANG Shun-sheng;ZHANG Wei
..............page:3767-3769,3774
Built-in test diagnosis strategy design based on dependency model
GUO Ming-wei;NI Shi-hong;ZHU Jia-hai
..............page:3753-3755
Method to implement retargetable cross-debugger
XIA An-xiang;SHI Hao-shan;RUAN Yuan;LIU Hong-hong
..............page:3735-3738
Distributed cooperative spectrum sensing in cognitive radio networks
ZHANG Lu-hua;CHEN Zhong
..............page:3849-3851,3854
New P2P searching algorithm based on trust model-SAT
FAN Hui-bo;ZHANG Xin-you
..............page:3861-3864
Two-stage algorithm based on estimation of distribution algorithm for permutation flow-shop scheduling problem
YE Bao-lin;GAO Hui-min;WANG Xiao-ping;ZENG Jian-chao
..............page:3702-3706
Improved quantum genetic algorithm based on cloud model theory
XU Bo;PENG Zhi-ping;YU Jian-ping
..............page:3684-3686
Implementation framework of RFID in discrete manufacturing enterprises
LI Wen-chuan;WANG Xu;JING Yi
..............page:3746-3749
Study of sonically-enhanced menu interaction for mobile terminals
YU Yao-hua;LIU Zheng-jie
..............page:3742-3745
Multicast fair service scheduling algorithm for CICQ switches
WANG Peng;CHEN Shu-qiao;HU Hong-chao
..............page:3845-3848
Survey of contour grouping
GUO Qiang;TU Dan
..............page:3629-3636
Block based correction codebook model
FANG Xian-yong;HE Biao;LUO Bin
..............page:3977-3982
Relative-speed-based self-adaptive backoff algorithm for 802.11 p VANET
WEI Li-qi;XIAO Xiao-qiang;CHEN Ying-wen;XU Ming;FAN Hai-kuan
..............page:3878-3880,3886
Dynamic voltage scaling policy based on Markov model
BU Ai-guo
..............page:3750-3752
Dynamic trust model based on behavior monitoring and data mining
TAN Xing-bin;LI Gang;LI Ji
..............page:3764-3766
Moving object detection by scanning monitor in camp\'s area
SHA Sha;CHEN Chen
..............page:3967-3969,3973
Point-clouds registration algorithm based on improve projection
YANG Ying-bao;LIU Xian-yong;YANG Jun-ping
..............page:3954-3956
Application of adaptive PCNN based on neighborhood to medical image fusion
XIA Jia-xing;DUAN Xian-hua;WEI Shi-chao
..............page:3929-3933
Approach of vehicle plate extraction based on HSV color space and SIFT feature
YANG Tao;ZHANG Sen-lin
..............page:3937-3939,3976
Face recognition with Gabor texture features
YANG Hong-yu;YU Lei;WANG Sen
..............page:3974-3976
Improvement to adaptive triangulation algorithm
JIANG Heng-heng;LI Qi-min;TANG Bao-ping
..............page:3950-3953
Cellular automata modeling and analysis of e-mail virus propagation
GONG Yong-wang;SONG Yu-rong;JIANG Guo-ping
..............page:3793-3796
Fast intra-frame prediction algorithm based on macro-block pre-determine for H.264/AVC standard
CHEN Shi-zhe;WANG Ming-quan;CHEN Zhi-qiang
..............page:3992-3994
Study for DV-HOP localization algorithm based on multiple regression analysis
HU Yan;SHAN Zhi-long
..............page:3884-3886
Fast integral image computation on GPU
WANG Zhi-guo;WANG Gui-jin;SHI Chen-bo;MIAO Quan;LIN Xing-gang
..............page:3913-3916
Identification of evaluation collocation based on maximum entropy model
FANG Ming;LIU Pei-yu
..............page:3714-3716
Single-scale image classification employing Bag-of-Words model
CHEN Kai;XIAO Guo-qiang;PAN Zhen;LI Zheng-hao
..............page:3986-3988
TCAM policy-based routing fused items\' maintenance and management algorithm
YANG Zan;WANG Jian-xin;YANG Lin;MA Lin-ru
..............page:3894-3896,3899
Research of QoS multicast routing problem based on ant colony algorithm and genetic algorithm
NI Yun-zhu;LI Zhi-shu;LIU Yi-jing
..............page:3865-3868,3877
Performance investigation of indoor MIMO based on IMT-Advanced channel model
WEN Lin-hai;ZHANG Zu-fan;MENG Ding
..............page:3869-3870,3874
Study of Ad hoc network routing algorithm based on complex network theory
HUANG Xiao-feng;WANG Bo-hui;CAI Nian
..............page:3871-3874
Stateful address configuration for 6LoWPAN wireless sensor networks
WANG Xiao-nan;QIAN Huan-yan
..............page:3904-3906,3909
Two-link failure in WDM optical networks with mixed protection algorithm
CHEN Chao;WANG Da-bin;XU Tong-ya
..............page:3855-3857
Anonymity privacy preserving algorithm based on frequent itemset mining
XU Yong;DING Zhong-ming;SI Feng-shan
..............page:3828-3830,3833
Method of reconstructing 3D human head based on two half-frontal photos
YU Chang;CHEN Yi-qiang;LIU Jun-fa;TANG Xiao-qing
..............page:3944-3946,3982
Quality criteria of anonymous publishing table based on entropy
XU Yong;DING Zhong-ming;WANG Hao;HUANG Can
..............page:3834-3836,3841
SW/HW partition algorithm research based on improved O- 1 dynamic programming
ZHAO Quan-wei;WU Qiang;LIU Jie
..............page:3687-3689
Survey on research of opinion spam in user-generated-content
YANG Feng-lei;LI Jian-hui
..............page:3601-3605
Group key management scheme based on group signature with fault tolerance for mobile Ad hoc networks
ZHU Chang-sheng;LIU Peng-hui;WANG Qing-rong;CAO Lai-cheng
..............page:3811-3816
Detection algorithm for region duplication forgery based on Tchebichef moments
GU Zong-yun;LV Wan-li;LUO Bin
..............page:3842-3844
Distributed K-means clustering by learningdata density in local peer
ZHANG Ke-ze;YANG He-biao;SHEN Xiang-jun;JIANG Zhong-qiu
..............page:3643-3645,3655
Average speed evaluate based on non-parametric regression
ZHANG Yu;MA Shou-feng;JIA Ning
..............page:3699-3701,3706
Study on construction of virtual cucumber based on growth model in greenhouse
TANG Wei-dong;LI Ping-ping;HU Xue-hua;LIJin-zhong;LU Zhang-ping
..............page:3957-3959,3966
Flotation froth image texture extraction based on LBPV
TANG Zhao-hui;ZHU Chu-mei;LIU Jin-ping
..............page:3934-3936
Particle swarm optimization based on chemotaxis operation of bacterial foraging algorithm
YANG Ping;SUN Yan-ming;LIU Xiao-long;CHE Lan-xiu
..............page:3640-3642
Automatic image annotation based on salient regions
YIN Wen-jie;HAN Jun-wei;GUOLei;HE Sheng;XU Ming
..............page:3925-3928,3933
Study of USB device driver and its application in GDB remote debugging
KUANG Yang;LEI Hang;ZHAN Jin-yu
..............page:3770-3774
State-of-the-art in distributed privacy preserving data mining
LIU Ying-hua;YANG Bing-ru;MA Nan;CAO Dan-yang
..............page:3606-3610
Advances in unmanned ground vehicles coordination system
YAN Yan;TANG Zhen-min
..............page:3623-3628,3636
Adaptive image watermarking technique based on human visual system
LUO Peng;SU Yang;YANG Xiao-yuan;LIU Yuan
..............page:3817-3819,3844
Research and implementation of fragile watermark for vector graphics
ZHENG Liang-bin;FENG Liu-ping;CHEN Ru-qi;CHENG Xiao-jin
..............page:3820-3822
Glowworm swarm optimization algorithm based on max-min luciferin
LIU Jia-kun;ZHOU Yong-quan
..............page:3662-3664
Multi-group co-evolutionary method research: applied in large scale SoC hardware/software partitioning
JIAO Su-min;WANG Cai-hong;WANG Xue-mei
..............page:3690-3693
Double active contours
WANG Shao-rong;SHANGGUAN Da-yan;CHEN Yi-song
..............page:3989-3991
Multi-objective tracking method based on Mean Shift——connected component labeling
LU Hao-bo;LI Jian-qiang;WANG Xiao-min
..............page:3963-3966
GAISP: GPU accelerated astronomical image subtraction photometry algorithm
YANG Mu-jin;YU Ce;SUN Ji-zhou;CAO Wei;CHEN Jin-yan;SHANG Zhao-hui;LIU Qiang
..............page:3940-3943