Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 10
Rough clustering algorithm based on granular computing
LI Lian;LUO Ke;ZHOU Bo-xiang
..............page:2916-2919
Improved Lattice-Boltzmann method and algorithm for image inpainting
LIU Zuo-chu;CHEN Han-lin;XIAN Da-quan
..............page:3181-3184
Survey on group signature
CHENG Xiao-gang;WANG Jian;DU Ji-xiang
..............page:2881-2886
Central force optimization algorithm for constrained optimization problems and its engineering applications
ZHU Gao-feng;WU Tie-bin;ZHANG Yan-lei;CHENG Yun;LIU Yun-lian
..............page:2923-2926,2961
Evaluation of road network comprehensive reliability based on cloud theory and radar graph model
LI Xiao-jing;LIU Li-jian;LIU Lin-zhong
..............page:3007-3010
Anisotropy-based filter with two dimensional cloud model
ZHOU Zhe;WANG Shu-liang
..............page:3178-3180
Algorithm for continuous berth allocation based on QCs transfer
WEI Xiao-dong;YANG Zhi-ying
..............page:2972-2976
Emotion model of crowd based on opinion identity
YIN Yan-jun;TANG Wei-qing
..............page:2996-3000
Multi-strategy cooperative evolutionary particle swarm optimization
ZHANG Jie;PEI Fang
..............page:2965-2967,2990
Network congestion control algorithm based on smith's adaptive fuzzy
SHI Yong-hong;GAO Shi-jie
..............page:3071-3074
Research on UDP-based high-speed network transport protocols
YUE Zhao-juan;REN Yong-mao;LI Jun
..............page:2887-2890
Feature selection based on class distribution difference and term entropy for Uyghur text
Alimjan AYSA;Turgun IBRAHIM;Kurban OBUL;Wayit ABLIZ;Hasan OMAR
..............page:2958-2961
Integrated scheduling algorithm of multi-procedures ended together
ZHU Tian-hao;XIE Zhi-qiang;ZHENG Fu-ping
..............page:2907-2911,2919
Novel cutting algorithm based on Bézier curve in virtual surgery
ZHU Ling;YE Xiu-fen;XI Ji-er;SUN Ming
..............page:3195-3200
Direction vector constraints image fusion algorithm based on NSCT
LIU Cui-yin;LEI Huan;WANG Cui-wei
..............page:3172-3174,3177
Study on filter-MTRNN algorithm based on closed and open region pruning
ZENG Ling-zhi;YANG Ying;YANG Lei;MENG Cai-liang;CHEN Yi-xin
..............page:2986-2990
Safety software of speed and position determination system based on SCADE and QNX platform
LI Yao;CHEN Rong-wu;XIE Gang
..............page:3044-3047
Low-complexity multi-symbol detection algorithm for telemetry PCM/FM signal
WANG Li;YUAN Fu;ZHENG Lin-hua;XIANG Liang-jun
..............page:3065-3067,3070
Research of classification analysis for distributed data warehouse
LI Wei-wei;LI Mei;ZHANG Yang;SHEN Ai-li
..............page:2936-2939,2943
Low complexity PDCCH blind detection algorithm
ZHOU You;HU Han-ying;CHEN Guo-jun
..............page:3084-3087,3090
Interactive region-of-interest based lecture video encoding
LIU Jun-hong;CHEN Yao-wu
..............page:3165-3168
Mesh simplification method based on preserving shape features
OU Chun-sheng;ZHANG You-sheng
..............page:3162-3164,3168
Technique for multi-core instruction-set simulator
LUO Han-qing;LIANG Li-ping;YE Tian-chun
..............page:3035-3037
Research on objective weight determine method of ZigBee network performance index
CHENG Xiao-hui;LIANG Qi-liang;HE Jun-quan
..............page:3068-3070
Color image watermarking algorithm based on singular value decomposition
ZENG Wen-quan;XIONG Xiang-guang;YU Ai-min
..............page:3114-3116,3120
MIMO detection algorithm for rank-deficient channels
JIANG Pan-pan;ZHAO Wei-bo;XU Yao;WANG Da-ming
..............page:3088-3090
Enhanced reactive tabu search algorithm for multi-user massive MISO signal detection
KANG Kai;ZHONG Zi-fa;YAN Zhan;LI Ning
..............page:3057-3060
Running state estimation of high-speed train based on wavelet analysis
LIU Lin-yan;JIN Wei-dong;YU Zhi-bin
..............page:2948-2950
Modeling method research of ultra-weak photon emission of fish based on PLS
YE Ting-dong;HONG Xiao-bin
..............page:2962-2964,3006
Airplane recognition system for visual sensor networks
JIANG Jun-jie;MA Xiao-xian;PENG Li
..............page:3015-3021
Space delay-tolerant network secure communication model
DU Xue-hui;CHEN Xing-yuan;CAO Li-feng;XU Guo-yu
..............page:3096-3100,3105
Constructing new chaotic system based on Si'lnikov theorem
DENG Kui-biao;YU Si-min
..............page:3038-3040
Refining triphone model in mandarin continuous speech recognition
QI Yao-hui;PAN Fu-ping;GE Feng-pei;YAN Yong-hong
..............page:2920-2922
Infrared and visual image fusion enhancement by dual-transform
LI Yan-mei;CHEN Lei-ting;RAO Yun-bo;LUO Jian;ZHOU Jun
..............page:3142-3145
Research on pattern clustering in statistical data trajectories
LIU Yi;LUO Nian-long
..............page:3001-3006
Annotation used expansion of case framework for video event with multi-dimensional association rules mining method
KE Jia;ZHAN Yong-zhao;CHEN Xiao-jun;WANG Man-rong
..............page:3133-3138,3154
Design and implementation of towed linear array sonar data recording system
HUA Xiang-ning;DUAN Fa-jie;JIANG Jia-jia;CHEN Jin;LI Yan-chao;LI Chen-yang;LI Ji
..............page:3022-3025,3029
Novel method of voltage sag rapid detection based on energy operator
DONG Na;HUANG Wen-qing;ZHOU Chao;SUN Gan-hui
..............page:3011-3014,3021
Vector-based efficient algorithm for computing differences between two complex polygons
YAN Hao-wen;ZHANG Li-ming;LI Qian-qian;LI Shuang-yuan
..............page:3192-3194
Mobility handover scheme for vehicular Ad hoc networks
WANG Xiao-nan;QIAN Huan-yan
..............page:3051-3052,3060
Research on product modular manufacturing time formulation method under mass customization environment
LI Zhi;CHEN You-ling;ZHOU Yu-jie
..............page:2912-2915,2931
3D visualization method on real-time division of radars mutual electromagnetic interference
SHANG Zhong-liang;LI Lin-cheng;ZHANG Li
..............page:3128-3132
H.264/AVC parallel video coding based on MapReduce
ZHENG Li-hua;ZENG Xue
..............page:3139-3141,3145
Image encryption scheme based on hyper-chaotic sequence
ZHONG Hou-qiao;LI Jian-min;LIN Zhen-rong;WANG Zhen
..............page:3110-3113
Survey of access control in wireless sensor networks
WANG Ming-wei;WANG Lie-jun;XIE Wei-min
..............page:2896-2902
Cellular bat algorithm for 0-1 programming problem
LI Zhi-yong;MA Liang;ZHANG Hui-zhen
..............page:2903-2906,2935
Research on hole-filling algorithm for 3D models
XIE Qian-ru;GENG Guo-hua
..............page:3175-3177
Object-semantics based malware detection method
REN Li;PAN Xiao-zhong
..............page:3106-3109,3113
DFSA sampling training rules anti-collision algorithm based on tags grouped
LI Wei-wei;GUO Zhi-tao;ZHANG Jing;GU Jun-hua
..............page:2968-2971,2995
SAR image denoising based on complex ridgelet transform
TONG Jian-feng;KANG Bao-sheng;LI Hong-an;ZHANG Lei
..............page:3149-3151
PI rate control algorithm for high-bandwidth WLAN
ZHAO Wei-feng;GUO Tao;SHU Yan-tai;LIU Chun-feng
..............page:3053-3056
Research on personality customizable dynamic form technology for SaaS platform
PAN Hua;SUN Lin-fu;LIU Shu-ya
..............page:3026-3029
Digital image stabilization algorithm based on corner detection in feature blocks
XU Yi-ming;GU Ju-ping;LIU Xiao-li;LU Guan
..............page:3189-3191
Mining outlier in high dimensional space based on adaptive high contrast subspace
ZHAO Bao-tong;XUE An-rong;DONG Guo-bin
..............page:2940-2943
Crack detection algorithm based on gray correlation
DONG An-guo;LIANG Miao-miao
..............page:3121-3123,3132
Research on fault data classification based on improved V-detector algorithm
XU Xin-ping;ZHAO Rong-zhen
..............page:2951-2953,2976
Hybrid differential evolution algorithm based on complex method and cloud model
PAN Qi;HE Zhong-shi;ZHU Hua-zheng
..............page:2981-2985
New multi-indicator customer segmentation method based on consuming data mining
ZENG Xiao-qing;XU Qin;ZHANG Dan;LIN Da-han
..............page:2944-2947
Improved scattering-model-based speckle filter of polarimetric SAR data
SHAN Zi-li;GU Hong-zhi;CHEN Jin-yong;WANG Chao
..............page:3152-3154
Research on distortionless resizing method for components of Chinese characters
SUN Hao;TANG Ying-min;LIAN Zhou-hui;XIAO Jian-guo
..............page:3155-3158
Survey of network flow identification technology
LEI Cheng;ZHANG Hong-qi;SUN Yi;DU Xue-hui
..............page:2891-2895,2902
Analysis on in-out system of railway container terminal with fuzzy eigenvalues
LIN Bing-kun;CHENG Wen-ming
..............page:3041-3043
Security provenance model based on OPM
LIU Tong;WANG Feng-ying
..............page:3117-3120
Fast thresholding algorithm of 2D Otsu for low SNR image
LIU Jin;JIN Wei-dong
..............page:3169-3171,3200
Advanced aggregated multicast algorithm
XU Jian;NI Hong;DENG Hao-jiang;LIU Lei
..............page:3048-3050,3056
Similarity measurement method of skull and craniofacial data
JIN Wu-xia;LI Kang;GENG Guo-hua;LIU Lun-chun
..............page:3124-3127,3151
Mining and recommending strategies based on core groups in Web viral marketing
XIA Xiu-feng;ZHANG Xiao-fei
..............page:3030-3034
End-to-end traffic inference of encrypted MANET
CHANG Hui-jun;SHAN Hong;HUANG Jun
..............page:3079-3083
Improved Census transform for stereo matching
LEI Lei;ZHENG Jiang-bin;SONG Xue-mei
..............page:3185-3188