Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 12
Survey of electronic and circuit fault self-repair based on EHW
CAI Jin-yan;,MENG Tian-zhen;,MENG Ya-feng;,WAN Rang-xin;,ZHANG Jun-bin;
..............page:3521-3524,3563
Survey of research on anti-pattern detection
HU Pei-pei;,SHENG Jin-fang;,WANG Bin;
..............page:3525-3528
Research advances on privacy-preserving data mining
GAO Sha-sha;,HUANG Hui-hui;,XU Liang;,ZHANG Hai-tao;
..............page:3529-3535
Research progress of emotion recognition in information fusion
DANG Hong-she;,GUO Chu-jia;,ZHANG Na;
..............page:3536-3539
Interval algorithm for one class of non-differentiable equations
LIU Feng-hua;
..............page:3540-3542
Collaborative filtering algorithm by considering negative correlations
GUO Qiang;,GUO Ying-ying;,HU Zhao-long;,LIU Jian-guo;,ZHOU Ji-ping;
..............page:3543-3545,3575
Novel co-training algorithm based on rough sets
SHENG Xiao-chun;,YUE Xiao-dong;
..............page:3546-3550
Bicluster algorithm on discrete time-series gene expression data
SHANG Xue-qun;,WANG Miao;,XU Tao;,YANG Mi-jing;
..............page:3551-3556,3567
Web user cluster based on social tagging system
LU Lu;,WEI Deng-yue;,ZHAO Jing;
..............page:3557-3559,3592
Detecting community structure using stochastic cluster sampling algorithm
CAI Jun;,YU Shun-zheng;
..............page:3560-3563
Simulation on credit evolutionary of business cooperation based on small world network
RU Bao-feng;,ZHANG Cun-lu;
..............page:3568-3570
Predicting d-Pareto dominance in multi-objective optimization using nearest neighbor classification method
GUO Guan-qi;,WANG Xian-feng;,YIN Cheng;,ZENG Wen-jing;
..............page:3571-3575
Spanning tree approach to solve network sensor location problems
HE Sheng-xue;
..............page:3576-3578,3582
Improved batch RPEM algorithm for speaker recognition
LI Jin-hui;,XIANG Yao-jie;,YANG Jun-an;,YANG Rui-guo;
..............page:3579-3582
Diversity maintaining harmony search algorithm and its TSP solution
HUANG Jian;,PENG Qi-yuan;
..............page:3583-3585
Research on military conceptual model validation methods based on rule reasoning
GU Chuang;,LIU Bin;,SUN Wang-hu;,TIAN Shu-chao;,ZHANG Xue-min;
..............page:3586-3588,3613
Research of DSFB frequency domain LMS algorithm
LUO Kan;,WANG Hua;,ZHANG Min;
..............page:3589-3592
Simulations on movement of intelligent vehicle based on rectangular safe neighborhood
XIONG Sheng-hua;,ZHAO Hai-liang;
..............page:3593-3596,3621
Based on improved PSO_LSSVM predict mechanical structure of fatigue crack propagation
CHEN Zhong-jie;,JIANG Gang;,WANG Jing;
..............page:3597-3599,3609
Firefly algorithm based on multi-group learning mechanism
FU Qiang;,TONG Nan;,ZHAO Yi-ming;
..............page:3600-3602,3617
Research of model and algorithm for uncertain emergency logistics center location
SHANG Li-yuan;,TAN Qing-mei;
..............page:3603-3605
User-adaptive Item-based collaborative filtering recommendation algorithm
WANG Cheng-liang;,WANG Cong-mei;,XU Ling;
..............page:3606-3609
Hot keyphrase extraction based on TF*PDF
GAO Yan;,MA Pei-xun;
..............page:3610-3613
Similar index: two-level index used for deduplication
CAI Xiao-bin;,JIANG Ze-jun;,PENG Cheng-zhang;,ZHANG Zhi-ke;
..............page:3614-3617
Novel collaborative filtering algorithm based on interest degree of item
SUN Guang-ming;,WANG Shuo;
..............page:3618-3621
Improved GAF algorithm of dividing cells based on optimal number of cluster heads
HAN Hao-peng;,LI Zhuo-ran;,LIANG Qing;,XIONG Wei;
..............page:3622-3624
Research on method of fault prediction based on improved grey neural network
MENG Chen;,WANG Cheng;,YANG Sen;
..............page:3625-3628
Research of cloud scheduling algorithm for traffic information
CAI Ming;,CHEN Lei;,DAI Yun;
..............page:3629-3633,3637
Research for nonlinear tracking problem based on QCNN
CHEN Chang-xing;,FU Hui;,NIU De-zhi;,QU Kun;,WANG Xu-jing;,ZHAO Yan-ming;
..............page:3634-3637
Complex network approach to competitive relationships between logistics enterprises
GAO Xiu-li;,MENG Fei-rong;
..............page:3638-3642
Research on conversion between XBRL financial reports based on domain ontology
CHEN Zhi-de;,DU Wei;,WU Zhong-sheng;,ZHANG Tian-xi;
..............page:3643-3646,3651
Application and research of new hybrid bionic intelligent algorithm
HAI Lin-peng;,LI Wen-rui;,LIU Zhi-zhong;,XUE Xiao;
..............page:3647-3651
Application and research of entropy theory in multi-objective evolution
DAI Guang-ming;,PENG Lei;,WANG Mao-cai;,ZHANG Yu-zhen;
..............page:3652-3656
Wavelet entropy used in feature analysis of high speed train bogie fault signal
GOU Xian-tai;,HUANG Jin;,JIANG Peng;,JIN Wei-dong;,QIN Na;
..............page:3657-3659,3663
Evaluation of weapon initiation based on entropy weight method and super efficiency DEA model
TAN Qing-mei;,TANG Lin-bing;,WU Jie;
..............page:3660-3663
Time series similarity matching based on weighted IMF
SUN Ru-ru;,XIAO Di;
..............page:3664-3666
Error sensitivity in digital predistortion system
HE Zi-shu;,KONG Xiao-wei;,XIA wei;
..............page:3674-3677,3681
Sort of novel control method for two wheels self-balancing scooter
DUAN Qi-chang;,LI Feng-bing;,WENG Jue;
..............page:3678-3681
Research of running maintenance-alarm system of NC machine based on Internet of things technology
CHEN Jia-yan;,HONG Tao;,WANG Guo-qiang;,ZHANG Gen-bao;
..............page:3682-3685
Cloud computing architecture oriented household Internet of things
CHEN Liang;,GU Xue-ping;,QIU Jing;,ZHU You-chan;
..............page:3686-3689
Research and application of clustering algorithm based on factor of time and space
LUO Ze;,YAN Bao-ping;,YAN Shuang-jian;
..............page:3690-3693,3697
Research on IOT mass data processing based on analog to information converter
LIU Yuan;,YANG Ze-lin;
..............page:3694-3697
Efficient complexity reduction in codebook search for ACELP
DENG Ling;,JIN Jing;,WAN Yi-long;,ZHANG Tian-qi;
..............page:3698-3701
Performance simulation study of video transmission based on ONC
BAI Guang-wei;,DI Hai-yang;,SHEN Hang;,YU Miao;
..............page:3702-3704,3711
Simulation of quantum secure direct communication protocol based on four-qubit cluster state
HE Guo-tian;,LI Xian-zhong;,ZHANG Xin;
..............page:3705-3707,3715
MF-TDMA burst allocation algorithm in GEO telecommunication system
CHEN Jian-zhou;,LIU Li-xiang;,ZENG Xian-hua;
..............page:3708-3711
Load balancing method in structured P2P network with multiple resources
FAN Jian-xi;,LIU Wen-jun;,SHEN Hai-fei;,WANG Yong-wei;
..............page:3712-3715
DOA estimation of OFDM signal based on sparse representation
WAN Yi-long;,WANG Zhi-chao;,ZHANG Tian-qi;,ZHU Hong-bo;
..............page:3716-3719
Architecture for wireless sensor network based on cloud computing
SUN Han-lin;,XIE Xiao-yan;,YAN Zheng;,ZHANG Peng;
..............page:3720-3723
Improved fault-tolerance mechanism in cloud storage system
LIANG Jun;,NIE Rui-hua;,ZHANG Ke-lun;
..............page:3724-3728
Modeling and simulation of high efficiently coded constant envelope system in air-ground data link
BA Teng-long;,BAI Peng;,LI Ming-yang;,QU Peng;,WU Jian-hua;,YAO Yao;
..............page:3732-3734
Model of cloud computing oriented T-RBAC
HUANG Yi;,LI Ken-li;
..............page:3735-3737
Time-domain reference based physical layer security method
HUANG Kai-zhi;,LI Ming-liang;,ZHU Hui;
..............page:3738-3741
Optimized random access mechanism for M2M service in LTE system
LU Guang-yue;,SHI Yuan-ying;
..............page:3742-3744
Deniable ring authentication in concurrent setting
QIN Zhi-guang;,ZENG Sheng-ke;
..............page:3745-3748,3752
Cryptanalysis of provably digital secure signature schemes
HU Yun-hong;,WANG Yong-feng;
..............page:3749-3752
Secured inter-domain routing mechanism based on key node
DOU Jun;,KONG Ling-jing;,LI Yao;,ZENG Hua-shen;
..............page:3753-3757,3782
Reputation evaluating model and security routing protocol of wireless sensor networks based on grey Markov model
JIANG Hua;,LIU Wei-qiang;,WANG Xin;,ZENG Mei-mei;
..............page:3758-3761,3766
Improved defense method against non-control-data attacks
LIU Xiao-long;,ZHENG Tao;
..............page:3762-3766
K-Q :algorithm for privacy disclosure detection supporting large number of queries
CHEN Yu-chan;,LIN Yong-yan;,SONG Ling;
..............page:3767-3770
System to discover phishing attacks actively based on DNS
GENG Guang-gang;,HONG Bo;,MAO Wei;,WANG Li-ming;,WANG Wei;
..............page:3771-3774
Effective method for analysis of Cisco IOS image injection attack
CHEN Li-gen;,LIU Sheng-li;,XIAO Da;,ZENG Cheng;
..............page:3775-3778
Multi-format audio watermarking algorithm based on improved quantizing DCT domain
LIU Wei-guo;,PAN Deng;,SHI Rong-hua;,WU Ni;
..............page:3779-3782
Extension of AVISPA based on concept of channels
GUO Yuan-bo;,LIU Wei;
..............page:3783-3785,3803
Novel alarm correlation clustering algorithm
GUO Kai-qiang;,LIU Dong-sheng;,TANG Wei-dong;,XIAO Xiao-hong;,ZENG Xiao-hui;
..............page:3786-3789,3793
Publicly verifiable and renewable multi-secret sharing scheme
DU Wei-zhang;,SHANG Xue-jiao;
..............page:3794-3796,3799
Certificateless proxy ring signature scheme without bilinear pairings
SU Ben-yue;,YAO Shao-wen;,ZHANG Chun-sheng;
..............page:3797-3799
Network behavior detection based on data stream analysis
CHEN Xing-yuan;,DU Xue-hui;,WANG Chao;,WEI Hao;
..............page:3800-3803
Evaluation method for fuzzing strategy
CHEN Guang-xuan;,WANG Bin-jun;,ZHANG Hai-tao;
..............page:3804-3806
Rotational attack on Luffa hash function
CAO Jin-ke;,LI Yun-qiang;,ZHAO Tu-hua;
..............page:3807-3809,3869
Mean-Shift tracking algorithm based on background weighted update approach
HU Ling-yan;,LI Mao-lin;,LIU Xiao-ping;,XU Shao-ping;
..............page:3810-3813
Based on machine vision encoder grating assembled eccentric adjustment system design
CONG Yan-bin;,JIN Chang;,LIU Xian-li;,PEI Zhen-cheng;,WANG Yi-wen;
..............page:3814-3816,3827
Batik graphics morphing algorithm based on increment iterative transformation
LIU Zheng-hong;,PAN Wei-jie;
..............page:3817-3819
Design and implement of 3D virtual robot kinematics simulation system
CAI Hong-bin;,DENG Wen-hong;,LI Long;
..............page:3820-3823
Colored hillshading map based on HSV color model
GUO Bing-xuan;,LI Jian;,XIAO Xiong-wu;,ZHANG Chun-sen;
..............page:3824-3827
New FCM algorithm fused universal gravitation and local entropy
CUI Zhao-hua;,GAO Li-qun;,LI Hong-jun;,MA Hong-bin;
..............page:3828-3830
Contour drawing method fit visual characteristics
HU Wei;,LI Zhen-zhen;,YUAN Guo-dong;
..............page:3831-3832,3849
Research on image technology of shadowed region recovery based on multi-scale Retinex
LIU Xiao-jun;,SUN Yong-rong;,WANG Xiao-xiao;,ZHANG Yi;
..............page:3833-3835
Abnormal crowd behavior recognition based on KOD energy model
DUAN Jing-jing;,FAN Yong;,GAO Lin;,LI Yu-feng;,REN Xin-yu;,XIA Jing-jing;
..............page:3836-3839
Research of fusing image classification into object localization
LIN Ying;,QIAN Yi;,WU Gang-shan;
..............page:3844-3849
Dark channel prior dehazing algorithm based on edge optimization
LI Jie;,SHI Wen-xuan;,ZHAN Shi-ying;
..............page:3854-3856,3862
Eyeglasses removal method based on occlusion region compensation
HU Guo-jing;,LOU Zhen;
..............page:3863-3865
Real-time face to camera distance measurement system based on monocular vision
DONG Xiu-cheng;,WANG Yi;,ZHANG Fan;
..............page:3866-3869
Switching vector median filter based on fuzzy decision
FAN Yang-yu;,LEI Tao;,LIU Shu;,WANG Jian-shu;,ZHANG Chen-rui;
..............page:3870-3873