Application Research of Computers 2012 Issue 7 Enhanced algorithm for three-route quick sort
Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2012 Issue 7
Enhanced algorithm for three-route quick sort
WANG Shan-kun;TAO Zhen-rong
..............page:2513-2516
Single task coalition structure generation algorithm based on CSGs
SHI Qiang;XIA Yang;WANG Lei
..............page:2509-2512,2516
Survey of proofs on data storage security in cloud computing
LIANG Biao;CAO Yu-ji;QIN Zhong-yuan;ZHANG Qun-fang
..............page:2416-2421
Model-free cooperative control of vehicle\'steering/anti-lock braking system
LI Guo;HOU Yan-jie;FENG Ze-bin
..............page:2470-2474
Study in neighbor artificial immune net work based on kernel clustering
LI Xin;LI Li-jun;GAO Zi-cheng
..............page:2464-2466
Semantic Web rough ontology: definition, model and storage method
WANG Hong-yun;HUANG Ying-hui
..............page:2520-2523,2526
Study on transit scheduling optimization based on improved genetic-simulated annealing algorithm
WANG Qing-rong;YUAN Zhan-ting;ZHANG Qiu-yu
..............page:2461-2463
Advances in quantum genetic algorithm
LIANG Chang-yong;BAI Hua;CAI Mei-ju;LU Wen-xing
..............page:2401-2405
Gene expression data clustering based on particle pair and differential evolution
XUAN Shi-li;YANG Qiu-ye;ZHANG Chao-ying;XUAN Jun-bo
..............page:2484-2487
Modified algorithm for spectrum sensing based on MME
WANG Run-liang;LI Hao;HUANG Yan;ZHANG Bai-yu
..............page:2638-2641
Clustering PPI networks based on improved spectral clustering method
WU Shuang;LEI Xiu-juan;GUO Ling
..............page:2442-2446
Logistics demand forecasting based on LSSVM optimized bytwo-order oscillating PSO
GENG Li-yan;ZHAO Peng;ZHANG Zhan-fu
..............page:2558-2560
New revised queue management algorithm of RED: RED-r
JIANG Wen-gang;SUN Jin-sheng;WANG Zhi-quan
..............page:2632-2634
Research of high-level cloud architecture based on cloudserver cluster reserve mechanism
GAO Hong-qing;REN Shu-xia;CHONG Da-shuang
..............page:2593-2596,2623
Research of virtual driver\'s visual perception model
REN Xiao-ming;XUE Qing;ZHENG Chang-wei
..............page:2494-2499
Affinity propagation based on K-mutual nearest neighbor consistency
XING Yan;ZHOU Yong
..............page:2524-2526
Loop based trace way prediction for instruction cache
LIANG Jing;CHEN Zhi-jian;MENG Jian-yi
..............page:2491-2493,2499
Concept lattice gluing based fuzzy ontology merging method
LI Zhao-hai;LI Guan-yu
..............page:2517-2519,2533
Research on test case optimization based on rough set and D-S theory
SUN Qing-qing;LI Long-shu;LI Xue-jun;XU Yi
..............page:2534-2536
Selection-suppressed non-local spatial FCM image segmentation method
ZHAO Feng;FAN Jiu-lun
..............page:2737-2739,2746
Modeling and analyzing virus propagation on dynamic Internet
YANG Chun-xia;HU Dan-ting;HU Sen
..............page:2678-2680
Outlier detection algorithm based on shared nearest neighbor
SU Xiao-ke;ZHENG Yuan-pan;WAN Ren-xia
..............page:2426-2428,2453
Research on HMM application for fault diagnosis ofwastewater treatment by biomembrance process
WANG Bo;XUAN Xiao-duo;QING Xiao-xia
..............page:2552-2554
Sensitive direct trust computation model for trusted networks
FAN Yan-feng;YANG Zhi-xiao
..............page:2703-2707
Multiscale denoising algorithm based on Shearlet frame
WANG Xiao-ming;FENG Xin;DANG Jian-wu
..............page:2733-2736
Research on flexible production planning for mass customization
ZHAI Li-li;WANG Huan;QI Kai;WU Fei
..............page:2544-2548
Research on energy hole based on PMRC in WSN
LI Qian-qian;LIU Fang-ai;DING Ding
..............page:2614-2617
Robust dual-watermarking algorithm based on Contourlet and SVD
CHEN Ning;MA Hui-jie
..............page:2700-2702
Distributed network structure detection mechanism based on node importance in DTN
WU Da-peng;KONG Xiao-long;WANG Ru-yan;JIN Ji-wei;FAN Si-long
..............page:2645-2649
Anti-detection technology of IP covert timing channel
WNAG Chang-da;BO Zhao-jun;GUAN Xing-xing;LI Zhi-guo
..............page:2657-2659,2664
SAR image reconstruction based on Bayesian matching pursuit
XU Jian-ping;PI Yi-ming
..............page:2722-2724,2736
Route interlocking and dispatching modeling based on CPN and analysis
LI Guo-qiang;LIN Guo-yuan;MA Dong
..............page:2575-2578
Application of fuzzy genetic algorithm in sensitive wordclassification optimization
YEI Lei;ZOU Guo-qi;XIAO Jian
..............page:2549-2551,2578
Path planning of mobile robot based on compound potential field method
WANG Mei;WANG Ye-ting;TU Da-wei;JIANG Ji-liang;ZHANG Guo-dong
..............page:2447-2449,2460
Retransmission control algorithm based on neighbor nodes in mobile Ad hoc networks
TAO Yang;WANG Cun-jin;LIU Cheng
..............page:2642-2644,2649
Novel SNR estimation based on TD-LTE systems
CHEN Fa-tang;JI Ying-ying;LIANG Tao-tao
..............page:2607-2609
Recognition and reconstruction for expressway bent lane line
HUANG Xiao-hui;GUO Lie;LI Bing;LIU Bao-yin
..............page:2787-2789
Trust evaluation model in services computing
ZHANG Yong-sheng;WU Ming-feng;ZHENG Zhi-hua;LI Yuan-yuan;FU Meng-xia
..............page:2693-2695,2707
Research of model for dynamic object segmentation based on LBP kernel density estimation
HE Huang-kai;TANG Ning-jiu;LI Zheng;SUN Yuan
..............page:2719-2721,2732
Subblock-weighted template matching method applied to overlappedvehicle detection
LI Jing;LIU Huai-yu;HONG Liu-rong
..............page:2751-2753
Location algorithm for eye pupil based onskin color features and genetic algorithm
HAO Ming-gang;DONG Xiu-cheng
..............page:2754-2757,2762
Survey and realization on information hiding based on error-correcting code
MA Yong-hui;XU Chang-yong;PING Xi-jian;LIU Cui-qing
..............page:2686-2689
Fast dynamic cloth simulation based on local adaptive hybrid integration
SHEN Cai-liang;LI Wei;YU Li-feng;ZHANG Ming-min
..............page:2740-2742
Landmark recognition for UAV autonomous landing based on vision
LI Yu;WANG You-ren;LUO Hui;CHEN Yan;JIANG Yuan-yuan
..............page:2780-2783
Research of AHP handover algorithm based on TD-SCDMAtrunking-communication system
JIANG Qing;CHEN Hao;ZHU Jiang;WEI Zhong-xiang
..............page:2584-2585,2609
News video semantic extraction framework based on multimodal information
YAN Jian-peng;FENG Hua-min;LIU Jia-qi
..............page:2725-2729
Comparison of energy consumption for several cooperative diversity modes
CHEN Chun-kai;XIE Hong
..............page:2629-2631,2641
Image retrieval for color images based on circularity measure of complex moment
MA Zi-ping; KANG Bao-sheng
..............page:2743-2746
Research of power analysis physical experiment platform based AT89C51
LI Lang;LI Ken-li;JIAO Ge;WANG Yu-qi;ZOU Yi
..............page:2681-2682
One-time group signature model based on hash function
GAO Xiao-dong;YANG Ya-tao;LI Zi-chen
..............page:2665-2667
Automatic image annotation refinement based on keyword co-occurrence and WordNet
KE Xiao;LI Dong-yan;CHEN Guo-long
..............page:2796-2800
Algorithm for simple data model polygon merging based onHilbert-curve on multi-core CPU
CHEN Zhan-long;WU Liang;LIU Huan-huan
..............page:2747-2750
Routing load oriented adaptive dispersive Ad hoc routing protocol
LI Yan;CHEN Zhuo
..............page:2635-2637
Collective CHI and IG feature selection method
WANG Guang;QIU Yun-fei;SHI Qing-wei
..............page:2454-2456
Immune based novel intrusion prevention model
LIU He-an
..............page:2712-2714
Coordination strategy for closed-loop supply chain with price-discount contract
WANG Xu;ZHANG Nan;WANG Yin-he
..............page:2450-2453
Research of classification method fornatural images based on multitask learning
LIU Cheng;PENG Jin-ye
..............page:2773-2775
Multi-branch tree model of bend for curve and its application inmap generalization
LIU Peng-cheng;YANG Wen-bo;LI Chang
..............page:2793-2795
Study of IP covert timing channel\'s communication protocol
WANG Chang-da;LI Zhi-guo;GUAN Xing-xing;BO Zhao-jun
..............page:2654-2656
Power controllable WLAN MAC protocol implementation based on hardware multi-threaded network processor
WANG Lei;ZHANG Xiao-tong;ZHANG Yan-li;WANG Qin
..............page:2624-2628
Evaluation method of image fusion based on multi-scale PSNR
ZHU Ya-hui;PENG Guo-hua
..............page:2784-2786
Research on formulation of university enrollment plan
ZHENG Qing-hua;LUO Jing;WANG Yan-bo;YANG Song;SONG Hong-xia
..............page:2567-2570
Visualizing multivariate musical content based on visual thumbnails
CHEN Ya-xi;LEI Kai-bin
..............page:2758-2762
Cross-layer collaboration based on hierarchical handover decision
XU Ming-hai;WANG Yu
..............page:2579-2583,2599
Efficient identity-based threshold ring signcryption scheme
SUN Hua;GUO Lei;ZHENG Xue-feng;WANG Ai-min
..............page:2660-2664
Public key cryptosystem based on approximate greatest common polynomial divisor
YU Zhi-min;GU Chun-sheng;JING Zheng-jun
..............page:2690-2692,2699
Fine-grained fault-tolerance routing algorithm of NoC based onreuse of partly defective switches
CHEN Qing-qiang;LUO Xing-guo;ZHANG Fan;LIU Liang-liang
..............page:2586-2588,2617
Research on PAPR restrain and pre-distortion technique in OFDM-ROF system
MAO Lu-hong;ZHANG Zhi-dong;GUO Zhi-ying;NAN Jing-chang
..............page:2610-2613
New ID-based fair off-line electronic cash scheme
CUI Wei;ZHOU Yu-jian;LIANG Jian;ZHOU You-sheng;WANG Zun-liang;WU Chun-hua
..............page:2668-2671
Energy-aware and trust-driven virtual machine scheduling
LIU Yong;WANG Xin-hua;WANG Zhen;SUI Jing-qi
..............page:2479-2483
Survey on methodology for constructing ontology based on structured information source
CHA Song-il;MA Zong-min;JIAO Xiao-long
..............page:2406-2410
Research on implicit requirement knowledge transfer insoftware project based on SNA
SHAN Xiao-hong;LIU Xiao-yan
..............page:2537-2540
Evaluating real estate based on two-tuple linguisticmulti-attribute decision making
YANG Xi;TENG Shao-hua;ZHANG Wei
..............page:2565-2566,2574
Dynamic collaborative indoor locating method based on multiple terminals
YANG Hua;LIU Jun-fa;CHEN Yi-qiang
..............page:2457-2460
New robust network covert channel
WANG Chang-da;GUAN Xing-xing;LI Zhi-guo;BO Zhao-jun
..............page:2650-2653
Adaptive object tracking based on pruning quadrature Kalman particle filter
LI Yu-chen;LI Zhan-ming
..............page:2776-2779,2783
Energy and performance-aware mapping for real-timecomplex system based on NoC platform
CHEN Yi-ou;HU Jian-hao;CHEN Geng-sheng
..............page:2589-2592,2628
Chaotic genetic algorithm for solving vehicle routing problems with time windows
WANG Yong-feng;YANG Yu;GU Yong-ming;WU Cai-ming
..............page:2422-2425,2456
Dynamically temporal association rules mining based on SFVS
ZHANG Xin-yu;XIA Shi-xiong;NIU Qiang
..............page:2571-2574
Contour extraction method based on improved level set and self-adaptive region growing
FU Ying-jie;ZHANG Jian;ZOU Ling;WANG Kai;LI Bo-lin;LV Xi;SONG Si-si
..............page:2770-2772
Optimization of parallel algorithm for molecular dynamics based on OpenMP and Multi-Critical
DUAN Zhen-hua;BAI Ming-ze;DOU Yu-sheng
..............page:2432-2434
Search-based test-data generation for Simulink
DENG Shao-peng;YANG Zhi-yi;WANG Yu-ying
..............page:2527-2530
Analysis and calculation on human-computer interaction system of emotion
YANG Jie;ZHAO Qiang
..............page:2763-2765,2769
Sequential pattern mining algorithm based on last item location information of sequence
MIAO Yu-qing;WU Kong-ling;ZHU Xiao-yan;SU Jie
..............page:2505-2508
P2P streaming identification method based on endpoint features
CHEN Wei;LAN Ju-long;ZHANG Jian-hui
..............page:2600-2602,2606
Solution for implementation constraints of workflow patterns
FU Li-na;HAO Ke-gang
..............page:2500-2504
Application and research on Winograd parallel algorithm of matrix multiplication based on OpenMP
YANG Guang-liang;LI Hong-jian;DOU Yu-sheng;TANG Hong
..............page:2435-2437,2441
Utilizing motion captured file to simulate micro-Doppler signal of human beings
ZHAO Hui-ning;HE Si-san;FENG Cun-qian
..............page:2766-2769
Survey of virtual resource management in cloud data center
QIAN Qiong-fen;LI Chun-lin;ZHANG Xiao-qing;LI La-yuan
..............page:2411-2415,2421
Research on feature dimension reduction in text classification
ZHANG Yu-fang;WAN Bin-hou;XIONG Zhong-yang
..............page:2541-2543
Medical object extraction model based on regional energyminimization and active contour model
SHANG Yan-feng;WANG Ning;WANG Hui
..............page:2715-2718,2729
Fuzzy tracking algorithm with feedback based on maximum entropy principle
LIU Zhi;CHEN Feng;HUANG Ji-ping
..............page:2467-2469,2508
Solution of uncertainties in mixed interference suppression for DSSS
SUN Zhi-guo;LI Li-jin;GUO Li-li
..............page:2603-2606
Cloud model based mind interaction between human and virtual role
FAN Yan-feng;YANG Zhi-xiao
..............page:2475-2478