Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 11
Crossover particle swarm optimization algorithm based on diffusion mechanism
XU Xing;WU Yu;WEI Bo;LI Yuan-xiang
..............page:4156-4159
Measurement method study on complexity of information system architecture
ZHANG Wen;LIU Gang;ZHU Yi-fan
..............page:4081-4085
Quick time-frequency analysis algorithm for a great deal of data
TIAN Ren-fei
..............page:4078-4080
Deep Web query interface identification based on decision tree and link-similar
LI Xue-ling;SHI Hua-ji;LAN Jun;LI Xing-yi
..............page:4086-4088,4099
Decoupling control of wastewater treatment system based on immune optimization PID neural network
YE Hong-tao;LUO Fei;XU Yu-ge;WANG Rui;HE Wei-gang
..............page:4097-4099
Scheduling algorithm preempted based on price for hybrid reconfigurable tasks
HAN Xiao-ya;WANG Bin-qiang;HUANG Wan-wei;WANG Bao-jin
..............page:4040-4044
Research on technology of two-dimension grid generation for river based on MO
WU Wen-zheng;SHI Wei-ren;ZOU Jie-xuan
..............page:4225-4227
Numerical simulation of electrical logging using high accuracy adaptive hp-FEM
MA Zhong-hua;LIU De-jun;LI Hui;LI Kun;ZHANG Song
..............page:4216-4218
Gene selection based on MDA-RS algorithm
LI Yan;CAI Li-jun;ZHANG Hao;ZHOU Hui-jun
..............page:4104-4106,4110
Tag quantity estimation method,using collision factor in RFID systems
HE Hong-jiang;DING Xiao-ye;ZHAI Yao-xu
..............page:4131-4133
Research on emergency plan ontology model and application
TANG Pan;WANG Hong-wei;WANG Zhe;LIU Dan
..............page:4160-4165,4170
Parallel optimization algorithm based on Newton method
WANG Bao;SUN Oin
..............page:4118-4120
Text clustering method based on centers of initial cluster and anew rescaling function
LIU Jin-ling;FENG Wan-li;ZHANG Ya-hong
..............page:4115-4117
Uncertainty method for control of virtual human\' s blink
YANG Zhi-xiao;FAN Yan-feng
..............page:4100-4103
Robustness analysis of opportunistic network routing algorithm with different degree of node cooperation
SUN Jian-zhi;LIU Nai-rui;HAN Zhong-ming;CHEN Dan
..............page:4266-4269,4295
Approach for dynamic group automatic aggregation path planning based on improved FA
LIU Peng;LIU Hong;ZHENG Xiang-wei;DING Yan-hui
..............page:4146-4149
Mining maximal dense subgraphs in uncertain PPI network
LIU Jia-cai;SHANG Xue-qun;MENG Ya;WANG Miao
..............page:4134-4137,4141
Research of service-based mobile user interface software architecture
GUO Cui;HUA Qing-yi;GUO Ya-wei;WANG Ni
..............page:4180-4183
Project financing decision making model based on fuzzy group multiple attributes
LI Xiang-hua;WANG Meng-jun
..............page:4228-4231
Bacterial foraging group-tours algorithm based on differential evolution
LIU Xiao-long;LI Rong-jun
..............page:4028-4031
Novel immune algorithm for solving constrained optimization problems
YANG Jian;ZHANG Min-hui
..............page:4129-4130,4133
Research on emergency material dispatch model orienting multi-level depots
TIAN Wei-dong;ZHAO Li
..............page:4045-4048
Rescheduling based on branch-and-bound in critical chain project scheduling
TIAN Wen-di;CUI Nan-fang;FU Zhang-hua
..............page:4035-4039,4048
Optimized road network restoration scheduling for dynamic emergency resources scheduling model
LI Meng-jun;CHEN Sen;LI Ben-xian;YE Guo-qing
..............page:4125-4128
Complex event detection method for distributed RFID streams
WANG Yong-heng;YANG Sheng-hong
..............page:4177-4179,4190
Preliminary implementation of road-car network based on IEEE 802.11 p/1609
JIN Chun;XU Hong-gang;WEI Xing;LUO Zhi-feng;HE Shan
..............page:4219-4221
Research on K-means algorithm based on density
ZHANG Lin;CHEN Yan;JI Ye;ZHANG Jin-song
..............page:4071-4073,4085
Effective method for cluster centers\' initialization in K-means clustering
XIONG Zhong-yang;CHEN Ruo-tian;ZHANG Yu-fang
..............page:4188-4190
Analysis and improvement of hash-based RFID authentication protocol
ZHANG Bing;MA Xin-xin;QIN Zhi-guang
..............page:4311-4314
Two kinds of extensions of bicubic Coons patch
LI Jun-cheng;YANG Lian;LI Bing-jun
..............page:4389-4391
Formal verification of event graph models based on TLA
XIA Wei;YAO Yi-ping;MU Xiao-dong
..............page:4171-4173,4187
Method of knowledge reduction for product family design based on fuzzy clustering and rough set
HUA Er-tian;XIAO Jun-jun;LIU Ke-hong;ZHOU Ke
..............page:4064-4066,4080
Research on emotion, cognition and personality student model in E-Learning
WANG Wan-sen;GONG Wen
..............page:4174-4176,4183
High capacity image watermarking scheme robust to geometric attacks based on local feature regions
ZHAO Wen-xian;WANG Ling;WANG Mei-zhen
..............page:4353-4356
Impact of Gaussian white noise on dynamics of map-based neural model
LIU Yu-liang;WANG Jiang;YU Hai-tao
..............page:4153-4155,4159
Differential evolution algorithm with hybrid wave
LIU Rong-hui;LI Bei
..............page:4053-4056,4063
Perturbation-based approach for solving arbitrary sized circle Packing problem
HUANG Wen-qi;FU Zhang-hua;XU Ru-chu
..............page:4032-4034
Plant leaf recognition technology based on image analysis
ZHANG Ning;LIU Wen-ping
..............page:4001-4007
Study of new P2P spatial indexing network on vector data
WU Jia-gao;BIAN Chao-jie;SHAO Shi-wei;ZOU Zhi-qiang;HU Bin
..............page:4240-4242,4262
Study on reconfigurable assembly line sequencing problem based on NSGA-Ⅱ algorithm
CHEN Xiong-bing;CHEN You-ling;LU Xiang-zhen
..............page:4138-4141
Algorithm of community detection based on data fields
WANG Li-jun;YANG Bing-ru;XIE Yong-hong
..............page:4142-4145
Annealing evolution algorithm for grid task scheduling
XUE Sheng-jun;XU Jun-lei;XING Guo-wen
..............page:4049-4052,4059
Simplified eignspace-based robust adaptive beamforming algorithm
YAN Bing-bing;DAI Yue-hua;CHEN Jun-ning;GUO Jin-rui;HUANG Hu-bing
..............page:4057-4059
PET bottle cap inspection method based on linear fitting algorithm
ZHENG Yun-feng;WANG Gui-jin;HE Bei;LI Yan-li;LIN Xing-gang
..............page:4398-4400
Real-time processing method of 2D-FFT/IFFT for high-resolution image and hardware implementation
WEN Bo;ZHANG Qi-heng;ZHANG Jian-lin
..............page:4376-4379
Robust fault diagnosis for anti-pinch of pure electric vehicles based on H_/H∞ approach
LIU Fang-shu;LI Hong-qiang;CHEN Hong;MENG Yong-qiang
..............page:4232-4235,4239
Approach of solving for service composition program oriented SOA
GAO Jun;SHEN Cai-liang;CHEN Xuan
..............page:4184-4187
Fault diagnosis of gearbox based on Hilbert and wavelet transform
ZHANG De-xiang;WANG Ping;WU Xiao-pei;GAO Qing-wei
..............page:4236-4239
Study of fair resource allocation algorithm for downlink channel in OFDMA relay system
HUANG Gao-fei;TANG Dong;ZHENG Hui
..............page:4278-4281
Research and application for load control of TD-SCDMA system
ZHOU Ya-feng;LI Bing-zhi;SUN Xue-yan
..............page:4274-4277
Fast geometry figure recognition algorithm based on edge pixel point eigenvalues
YAO Lei-bo;GUO Chao;ZHANG Wei-min
..............page:4386-4388
Method for license plate segmentation based on morphological and gradient reconstruct
GUO Ya;HUANG Yan-guo;XUN Lun-hui
..............page:4392-4393,4397
XML keyword Search based on result type grouping
WANG Zhen-zhen;WU Xiao-xia;ZHANG Chao-ying;XUAN Jun-bo;QIN Zhang-rong
..............page:4194-4198
Linear complexity of Whiteman-generalized cyclotomic sequence with order four
LIU Long-fei;YANG Xiao-yuan;CHEN Hai-bin
..............page:4350-4352
Study of large-scale MANET multipath routing model based on P2P
LUO Qiao;CHEN Jing;GUO Yi-chen;HUANG Cong-hui
..............page:4243-4245
Research and analysis of mixed honeypot
ZHAO Yue-hua;TANG Man
..............page:4341-4344
Research on hierarchical network security threat situation assessment
ZHU Li-na;ZHANG Zuo-chang;FENG Li
..............page:4303-4306,4310
Dynamic buffer allocation based on date flow direction for NoC
XIE Tong-fei;HAN Guo-dong;XIAO Qing-hui
..............page:4251-4255
MPI job launching based on communication optimization on Infiniband clusters
CAO Zong-yan;NIU Tie;ZHAO Yi;ZHU Peng;CHI Xue-bin
..............page:4256-4259
Triple-polarization orthogonal space-time-polarization block code based on quatemion orthogonal designs
LI Ke;HOU Chun-ping;WANG Qing;FU Jin-lin
..............page:4260-4262
Large-scale video retrieval system based on DSMI algorithm and GPU acceleration
ZHONG Yu;ZHU Min;CHEN Xue;GAO Yu
..............page:4373-4375
Representation and application of ontology based emergency plan for logistics
FENG Zhi-yong;YANG Qian;RAO Guo-zheng;ZHANG Chen;LI Guang-peng
..............page:4209-4212,4227
Rapid method for adaptive shot boundary detection
TANG San;CHAI Yi;YIN Hong-peng
..............page:4383-4385
Trust-based dynamic access control in Web Services
YIN Xiao-ling;XIA Qi-shou;WANG Ru-chuan
..............page:4331-4334
Preserving privacy in social networks based on d-neighborhood subgraph anonymity
JIN Hua;ZHANG Zhi-xiang;LIU Shan-cheng;JU Shi-guang
..............page:4322-4325
Delay performance analysis of MAC protocol with priority
JIA Wei;LIANG Jun;TONG Ya-guang
..............page:4288-4290,4302
Blood cell classification method based on hyperspectral data
DAIChun-ni;LI Qing-li;LIU Jin-gao
..............page:4370-4372,4379
Simulation research on attitude control of spacecraft based on MapleSim and LabVIEW
SUN Wen-jun;YAN Hui;GAO Yong-ming
..............page:4202-4205,4218
Research on evaluation models of satellite image blur
TANG Zhong-qi;SUN Ji-yin;LIU Hao
..............page:4394-4397
Chaotic population migration algorithm based on uniform design and its application
CHANG Tian-hai;ZOU Hong;CHANG Jian
..............page:4206-4208
Network fault identification based on ACDP-HSVMs
ZHANG Li;MENG Xiang-ru;WEN Xiang-xi
..............page:4282-4284,4298
Energy-efficient and adaptable secure data aggregation for WSNs
QIN Xiao-liang;WEI Qin-fang;ZHANG Shuang-jie
..............page:4299-4302
Study and implementation of 6LoWPAN service model
WANG Xiao-nan;QIAN Huan-yan
..............page:4285-4287
Image encryption algorithm based on DFRCT
ZHU Gui-liang;QIN Xiao-li;ZHANG Xiao-qiang
..............page:4338-4340
Low complexity cell-ID detection algorithm for LTE systems
WANG Jun;LI Xiao-wen
..............page:4263-4265
Research of trust model based on reputation evaluation
ZHANG Ke-fei;CHEN Tao
..............page:4326-4330,4334
Overview of workflow technology in scientific process
XIAO Fei;ZHANG Wei-hua;WANG Dong-hui
..............page:4013-4019
Network topology probe method based on binary search
WANG Shang;LU Ze-xin;PENG Wei;MA Shi-cong
..............page:4296-4298
Research on micro-agent simulation model of evacuation under direction of macro-scene
LI Hui;WANG Han-ning;ZENG Wen-cong;XIONG Mu-zhou;DOU Ming-gang;TIAN Jian
..............page:4111-4114
Study of shrinking clustering method based on Febernaci sequence flexible-size grid
LIANG Jian-hai;PAN Quan;YANG Feng
..............page:4067-4070,4077
Quick recognition method of Data Matrix barcode
YAO Lin-chang;BAI Rui-lin;QIAN Yong;XU Yi-zhao
..............page:4368-4369,4388
Research of urban traffic carbon emission data mining based on Hadoop
ZHU Yue;JIA Si-qi;ZHANG Jun-kui;LI Qi
..............page:4213-4215
Solving 0-1 knapsack problem by fuzzy particle swarm optimization
LIU Yin;MA Liang
..............page:4026-4027,4031
Fast algorithm of subpixel edge detection based on Zernike moments
YANG Hao;PEI Lei;LI Chang-shun
..............page:4380-4382,4385
Summary-based method to improve memory leak analysis
LEI Da;ZENG Qing-kai
..............page:4315-4319
Java Servlet-based WebGIS performance optimization
ZHANG Xiao-fang;LI Guo-hui;LAN Xiao-ling
..............page:4222-4224
Multi-camera calibration method using planar patterns
PAN Hua-wei;YANG Zhen-xian;GAO Chun-ming;LEI Yuan
..............page:4357-4360
Improved chaos particle swarm optimization algorithm for vehicle routing problem
LI Ya;LI Dan;WANG Dong;YANG Wen-yin
..............page:4107-4110
Anti-collusion attack digital fingerprinting scheme
BAI Meng;XIAO De-gui;ZHANG Heng
..............page:4320-4321,4325
Modularized multi-strategy fuzzy ontology mapping method
ZHAO Yan;LI Guan-yu;RAO Zhang-min
..............page:4166-4170
Research on probabilistic plan recognition
LIU Ying;GU Wen-xiang
..............page:4008-4012,4019
Study of efficient parallel RSA algorithm
LI Yun-fei;LIU Oing;LI Tong;HAO Lin;KANG Zhi-yuan
..............page:4345-4349
Algorithm for computing multi-state network reliability based on transition of d-mincuts and d-minpaths
LI Zhen;SUN Xin-li;JI Guo-xun;LIU Hao-jie;LIU Zhi-yong
..............page:4270-4273
Method of new neural network for solving convex quadratic programming with equality constraints
YI Chen-fu;CHEN Yu-huan;ZHANG Xiao-hong
..............page:4023-4025
Security improvement for image encryption algorithm based on hyper-chaos system
LI Ling;WANG Wei-nan;LI Jin-jie
..............page:4335-4337
Key frame extraction algorithm under compressed domain based on two detection curvature
ZHANG Jian-ming;ZHANG Xiao-li;REN Xin-bo
..............page:4364-4367
Application of GO-FLOW methodology in reliability analysis of product assembly process
ZHANG Gen-bao;CUI You-zhi;LIU Jian;TANG Xian-jin;GE Hong-yu
..............page:4199-4201
Design of data grid scheduling simulator
XING Chang-ming;LIU Fang-ai
..............page:4191-4193,4198
High-precision cache replacement algorithm based on object role
NIU Wei;CHENG Juan;ZHAI Zheng-jun;GUO Yang-ming
..............page:4089-4091
Dynamic scheduling problem with multi-spot producing
ZHOU Yang;SUN Bin-feng
..............page:4121-4124,4128
Deployment scheme of sensor networks based on data fusion
LI Ming-ming;LI Xiao-long;HUANG Ting-lei
..............page:4246-4250,4255
Non-dominated sorting uniform generic algorithm
LIU Hou-cai;CHEN Zhi-gang
..............page:4020-4022,4025