Application Research of Computers 2012 Issue 12 Qualitative modeling of complex system based on cloud model using QSIM
Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2012 Issue 12
Craniofacial model data partition based on SVDD
LI Kun-peng;ZHOU Ming-quan;LI Kang
..............page:4754-4757,4796
Research on maze path optimization algorithmbased on self-adaptive flooding model
LIN Jun;GU Bing;YANG Chen;CAI Ting-ting
..............page:4472-4475
Digital watermarking method for binary text images authentication and tamper localization
HU Jing-yi;MAO Jian-xu;ZHAO Xi
..............page:4631-4634,4643
Application of normal cloud based adaptive genetic algorithm inUAV path planning
CHENG Xiao-dong;ZHOU De-yun;HE Peng;ZHANG Kun
..............page:4469-4471
Research about static segment of Flexray based on utilization
ZHANG Jian-jun;YU Ping;ZHANG Ben-hong
..............page:4574-4576
Research and implementation of map algorithm based on Web Mercator
LI Chang-chun;CAI Bai-gen;SHANGGUAN Wei;WANG Jian
..............page:4793-4796
Research on wireless Mesh network in train-ground communication system of urban mass transit
LIU Xiao-juan;YAO Wen-rui
..............page:4723-4725,4728
Passive detection of doctored JPEG image via BAG mismatching
ZHANG Xin;ZHOU Shang-bo
..............page:4626-4630
Provably secure certificate-based blind signature
HUANG Ru-fen;NONG Qiang;HUANG Zhen-jie
..............page:4622-4625,4630
Mincost-based grid resource discovery model
ZHANG Zhong-ping;JIA Qian
..............page:4683-4687,4690
Design and implementation of image/signal processing parallellibrary based on MPI and object-orientation
JIANG Chun-mao;WU Xiang-hu;DUAN Ying;QU Ming-cheng;LIU Min;LI Zhi-cong
..............page:4560-4563,4570
Survey on secure routing research in wireless sensor networks
LI Ting;FENG Yong
..............page:4412-4419
ASM facial feature location under attitude changes
LI Wei-sheng;ZHANG Yan;ZHOU Li-fang
..............page:4764-4766,4778
Optimal design on urban public transitskeleton-network based on genetic algorithm
WANG Jia;FU Zhuo;DU Jing-yi
..............page:4518-4521,4533
Research on formation form and obstacle avoidance of CGF groups
HUANG Jue;QIN Long;YIN Quan-jun;ZHA Ya-bing
..............page:4466-4468
Robust H∞ control for uncertain systems with multiple time-delay
QU Bai-da;XU Ji-lin;XU Bao-guo
..............page:4577-4579
Load balancing algorithm based on load weights
ZHANG Yu-fang;WEI Qin-lei;ZHAO Ying
..............page:4711-4713
Method of signatures description of leaves images for plant categorization
XIE Cong-hua;WANG Li-jun;CHANG Jin-yi
..............page:4740-4742,4746
k-coverage strategy of wireless sensor networks
GUO Long;XIONG Wei;LIANG Qing;LIU Ting
..............page:4677-4679
Analyzing dynamic properties of modules in PPI network
GUO Yang;SHANG Xue-qun;LI Jing
..............page:4495-4499
Image quality modeling in forward looking infrared target matching
WANG Peng;SUN Ji-yin;GUO Wen-pu;HUANG Jie
..............page:4797-4800
Fingerprint algorithm for positioning based on RSS space-time processing
WANG Ding;MA Juan;ZHAO Yi-xuan
..............page:4726-4728
Optimization of diagnostic strategy in non-redundantmulti-fault system based on probability threshold
ZHU Hai-peng;JING Bo;HUANG Yi-feng;SHU Jun-yang
..............page:4512-4514
Fuzzy analytic hierarchy process model based on particle swarm optimization
LI Zhuang-kuo;XUE You-tian
..............page:4549-4552
Abnormal behavior detection based on globe energy model
WANG Qiao;LEI Hang;HAO Zong-bo
..............page:4782-4785
Face recognition based on MB-LBP operator and multi-linear PCA algorithm
YANG Hai-yan;LIU Guo-dong
..............page:4733-4735,4739
Coded aperture techniques forcatadioptric omni-directional image defocus deblurring
PENG Yang;LIU Yu;LI Yong-le;ZHANG Mao-jun
..............page:4736-4739
Frequency domain reciprocal—Gaussian cascade low-passfiltering denoising method of image
WANG Jie;MAO Yu-quan;LI Si-jia;WU Chong-hu
..............page:4775-4778
Prediction of protein complexes based on weighted network
TANG Xi-wei;LI Yong-fan;HU Qiu-ling
..............page:4500-4502
CoSaMP algorithm of compressed sensing based on wavelet tree model
SU Wei-jun;WANG Hong-hong;YU Chong-chong;YANG Yang
..............page:4530-4533
Parameters optimization research of SVM based on MCS
GUO Yi-ge;SUN Li;LIU Yi-an
..............page:4553-4555,4559
Performance degradation modeling based method foroptimizing equipment inspection
ZHANG Zheng-xin;HU Chang-hua;ZHOU Zhi-jie;ZHANG Zhao
..............page:4564-4566,4583
Dynamic hierarchical and distributed data acquisition algorithm
TAN Xing-li;TANG Xue-wen;WANG Mei-yang
..............page:4691-4693,4702
Adaptive information hiding algorithm based on video coding standard
CHEN Qing;NIU Yue-rui;LIAN Pan-pan;XING Xiao-xi;HU Qi-wen
..............page:4659-4661
Method of VoIP MediaGateway identification based on SVM
LIANG Wei;CHEN Fu-cai;LI Shao-mei
..............page:4706-4710,4713
Fast model for kernel extension of graph embedding
LIN Yu-e;LI Jing-zhao;LIANG Xing-zhu;LIN Yu-rong
..............page:4758-4760
Kernel estimation and reconstruction for motion blurred images
YU Fen;YANG Yong-jie;MIAO Lan-fang
..............page:4743-4746
Image registration algorithm based on EPF and maximum cross-correlation for target recognition of manipulator
ZHANG Yi-wen;HOU Yuan-bin;KANG Qian;MENG Yang
..............page:4761-4763,4800
Multi-model function optimization based on immune clonal memetic algorithm
LIU He-an;ZHANG Qun-hui
..............page:4515-4517
Interdisciplinary reasoning on description logic
LU Dao-she;YANG Shi-han;WU Jin-zhao;XIONG Ling-fang
..............page:4503-4506,4511
Object-based building extraction with optimal image segmentation scales
ZHANG Li-min;ZHANG Jian-ting;XU Tao
..............page:4789-4792
Fuzzy TOPSIS-based resource service optimal-selection algorithm
ZHANG Qian;QI De-yu
..............page:4522-4526
QoS routing algorithm based on genetic simulated annealing algorithm
CHEN Xiao-juan;CHEN Jing
..............page:4680-4682
Trust management model based on Shapley entropy
LIU Yu-xuan;GUO Yu-cui
..............page:4656-4658
Ergodic capacity for MUD/SD cognitive radio system
XIE Xian-bin;GUO Wei
..............page:4671-4673
Low-density parity-check codes on multiple-inputmultiple-output communication systems
HUANG Cheng-rong;GUO Ying;LEE Moon-ho
..............page:4719-4722
Maximum entropy Newton method for absolute value equations
DENG Yong-kun;WANG Hai-jun;ZHANG Ping
..............page:4546-4548
3D reconstruction algorithm from uncalibrated images with high precision
YUAN Jian-ying;LIU Jia-jia;WANG Kai;LI Bai-lin
..............page:4786-4788
Chaotic optimization algorithm for multi-objective 0-1 programming problem
YANG Ling-ling;MA Liang;ZHANG Hui-zhen
..............page:4486-4488
Brief survey on cloud testing
LI Qiao;KE Dong-liang;WANG Xiao-lin
..............page:4401-4406,4425
Study on defense of unstructured and uncentralized P2P network DDoS attacks
XU Xiao-dong;LI Gang;YANG Yan
..............page:4618-4621
Novel image scrambling algorithm based on changing pixel values
HE Li-ming;QIANG Sai-li
..............page:4635-4638,4650
RBF-SVM feature selection arithmeticbased on kernel space mean inter-class distance
HUANG Ying-qing;ZHAO Kai;JIANG Xiao-yu
..............page:4556-4559
Study and implementation of Chinese language emotion analysissystem based on weight algorithm
ZHANG Hao-min;SHI Bo-ying;LIU Xu-hong
..............page:4571-4573,4597
Deep accelerating artificial bee colony algorithm
LU Ying-yu;WANG Bing;LI Xue-wen;QIN Yong
..............page:4445-4447
Detection of complexity video event based on hypergraph model
KE Jia;ZHAN Yong-zhao;CHEN Xiao-jun;WANG Man-rong
..............page:4770-4774
Kernel two dimensional maximum margin criterion
JIANG Wei;CHENG Yang-yang;YANG Bing-ru
..............page:4767-4769,4774
Momentum particle swarm optimization with optimal crossover
YU Yun;CHEN Xi
..............page:4459-4462,4468
Classification algorithm based on semantics and text feature weighting
ZHANG Guo-dong;ZHANG Hua-xiang
..............page:4476-4478
Model of COREX fuel blending based ondecision tree rule extraction method
ZHAO Chen-xi;XU Jin-wu;LI Min;YANG Jian-hong
..............page:4567-4570
Survey of partially blind signature
LI Ming-xiang;LI Feng;WANG Tao
..............page:4437-4440
Bi-objective coverage hole healing in hybrid wireless sensor networks
WEI Lin-na;QIN Zhi-guang
..............page:4666-4670
Network traffic identification based on data finger-print
SONG Jiang;ZHANG Chun-rui;ZHANG Nan;LI Fen;WU Yan-mei
..............page:4604-4606,4614
Improvement and realization of cryptography service library Cryptlib
LI Lin;YANG Xian-wen
..............page:4662-4665
Trust access control model based on service attention spot similarity recommendation
LI Yuan-yuan;ZHANG Yong-sheng;WU Ming-feng
..............page:4644-4647
False data filtering scheme in wireless sensor networks
ZHU Ling-zhi;ZHAO Jin-guo;LIU Zhi-xiong;HUANG Jun-jie;LIANG Jun-bin
..............page:4426-4431,4440
Semantic SOA framework orient to aviation repair
XU Feng;ZHANG Shu-sheng
..............page:4589-4592
Solving for timetabling problem in universitiesbased on hybrid particle swarm optimization
CAO Ce-jun;YANG Qin;LI Cong-dong
..............page:4451-4454
Research on split augmented Hammerstein behavioral model
NAN Jing-chang;QU Yun;WANG Xin;MAO Lu-hong
..............page:4703-4705
Extended symbolic aggregate approximation based anomaly mining of hydrological time series
LIU Qian;ZHU Yue-long;ZHANG Peng-cheng
..............page:4479-4481,4502
Survey of distributed fault detection algorithms for wireless sensor networks
XU Xiao-long;GENG Wei-jian;YANG Geng;LI Ling-juan;YANG Zhen
..............page:4420-4425
Base stations clustering model based onaverage of signal to interference ratio gain
LI Kun;HUANG Kai-zhi;LU Guo-ying;ZHOU Lei
..............page:4699-4702
Algorithm for obtaining transitive opening of fuzzy similarity relation
DENG Guan-nan;JIANG Yan-li
..............page:4534-4537
Multi-path search algorithm in public transportation based on node accessibility
FU Guang-mei;WANG Hong
..............page:4492-4494
Flexible delegation model with trustworthiness based onpermission mapping mechanism
CAI Wei-hong;HUANG Ri-cheng;LIANG Ning-ning;YAN Wei
..............page:4607-4614
Research progress of tumor hyperthermia treatment planning system
ZHUO Zi-han;ZHAI Wei-ming;LIU Ling-ling;CAI Dong-yang;LI Yi-ge;TANG Jin-tian
..............page:4407-4411
PCA-SVM for control chart recognition of genetic optimization
LI Tai-fu;HU Sheng;WEI Zheng-yuan;HAN Ya-jun
..............page:4538-4541,4545
PCA algorithm based on power transformation pretreatment for face recognition
HOU Xiao-jing;TAO Shao-hua;CHEN Zhou;DU Xiang-jun
..............page:4747-4749
Passive image splicing detection based on third order statistical features
ZHAO Xu-dong;YUAN Ye;LI Sheng-hong;WANG Shi-lin;LI Jian-hua
..............page:4729-4732,4749
Implementation for VRP with multi-window based oncollaborative adaptive tabu algorithm
ZHU Ling-ling;YANG Ai-qin;WU Kuan-ren
..............page:4542-4545
Improved extractive summarization of Chinese texts using latent semantic analysis
XIAO Sheng;HE Yan-xiang
..............page:4507-4511
Method of higher-order model transformation combined with MDA
ZENG Yi;XU Lin;HUANG Xing-yan;WANG Cui-qin
..............page:4584-4588
Strategy of adaptive simulated annealing particle swarm optimization algorithm
YU Hai-ping;LIU Hui-chao;WU Zhi-jian
..............page:4448-4450
Survey on location-based services
TANG Ke-ping;XU Fang-heng;SHEN Cai-liang
..............page:4432-4436
Research on conflict evidence combination based on compatibility distance
LIU Xi-liang;CHEN Gui-ming;LI Fang-xi;ZHANG Qian
..............page:4527-4529
3D facial correspondence based on deformation and geodesic distance consistency constraint
HE Jie-qiong;GENG Guo-hua;DU Hong-qiang;GUO Peng;HE Yi-yue;LI Kang
..............page:4750-4753
Improved multi-objective optimization algorithm
FAN Ji-shan;WANG Jing-zhuo;XIONG Sheng-wu
..............page:4463-4465,4494