Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2015 Issue 6
xin xi dong tai
..............page:封2
Review of online sketch recognition
Wu Lingda;,Deng Wei;,Zhang Yougen;,Yang Chao;
..............page:1601-1607
Review of methods for against spectrum leakage
Yang Huiyue;,Tu Yaqing;,Zhang Haitao;,Mao Yuwen;,Su Dan;
..............page:1608-1613
Dependency parsing of Chinese complex nominal phrase
Chen Yongbo;,Tang Ang'ang;,Ji Donghong;
..............page:1617-1620
Classification model based on ensemble random forests
Deng Shengxiong;,Luo Jiangtao;,Liu Yong;,Wang Xiaoping;,Yang Junchao;
..............page:1621-1624,1629
Multi-granularity subtopic division based on LDA and HowNet
Li Xiangdong;,Ba Zhichao;,Huang Li;
..............page:1625-1629
Microblog user interest modeling based on term correlation and normalized cut weighting scheme
Yao Wei;,Ma Huifang;,Sun Yuexin;,Zhang Zhichang;
..............page:1630-1633
Telecom customer evaluation method based on dominance-based rough set approach
Deng Weibin;,Wang Guoyin;
..............page:1634-1637
Low-carbon closed-loop logistics network design based on carbon emission permits trade and queuing theory
He Qichao;,Luo Wenping;,Hu Zhihua;,Li Lihua;
..............page:1638-1641,1648
Efficient algorithm AWAPM_SPRMII for mining all-weighted positive and negative association patterns
Gao Liang;,Xia Bing;,Huang Mingxuan;
..............page:1642-1648
Consider impact of speed on desired distance car-following model
Qiu Xiaoping;,Sun Ruoxiao;,Yang Da;,Yu Dan;
..............page:1649-1652
Study and improvement of backtracking search optimization algorithm based on differential evolution
Tian Wenkai;,Liu Sanyang;,Wang Xiaojuan;
..............page:1653-1656,1662
Research of collaborative vehicle routing problem for bus in countries
Cai Yanguang;,Tang Yalian;,Zhu Jun;
..............page:1657-1662
Cuckoo search algorithm based on Powell local search method for global optimization
Ma Wei;,Sun Zhengxing;,Li Junlou;
..............page:1667-1675
Task scheduling based on improved bat algorithm under logistics cloud service
Zhang Xiaolei;,Ma Congan;,Shen Chen;
..............page:1676-1679,1697
Control algorithm based on sampling rate changeable sensor
Liu Dongqian;,Chen Yixiang;,Chen Xiaodong;,He Kangli;
..............page:1680-1683,1688
Video key frame extraction based on stage expert adjusting bat algorithm
Zou Chensong;,Wang Hong;
..............page:1684-1688
Analysis of track association based on fuzzy evidence theory
Ding Feng;,Xue Lei;
..............page:1694-1697
Dynamic ensemble selection based on classifier competence of margin
Chen Rui;,Huang Haijun;,Huang Wen;,Hu Jingsong;
..............page:1698-1702
Method for determining labor hour in mass customization based on complexity of product structure
Chen Youling;,Ruan Jian;,Wang Yao;
..............page:1703-1706
Algorithm for vertex distinguishing total coloring of random graphs
Li Jingwen;,Li Xiaohui;,Dong Wei;,Jia Xibei;,Du Yongwen;
..............page:1707-1710,1715
New algorithms for computing max-product instantiations
Li Chao;,Qin Biao;
..............page:1711-1715
Method of failure prediction and evaluation based on MFCC feature extraction
Chang Fei;,Qiao Xin;,Zhang Shen;,Xu Huadong;
..............page:1716-1719
Eye movement study on effects of printed ads promotion information affecting consumers
Zeng Hui;,Hao Liaogang;,Li Yongjian;
..............page:1720-1723,1727
Topic interaction model based on local community detection for MOOC teaching process
Shi Bo;,He Chu;,Zhuo Tong;,Xu Xin;
..............page:1724-1727
Research on check & resolve method of ontology collective evolution conflict
Xue Jianwu;,Shen Caijun;
..............page:1728-1731,1736
Design and implementation of memory leak detection tool of C/C + + based on dynamic instrumentation
Zeng Jiaping;,Yang Qiuhui;,Wang Hualong;,Xu Baoping;,Huang Wei;
..............page:1737-1741
Flattening dispose of ODQ document model and grammar
Ling Feng;,Liu Xuhong;,Tian Ying'ai;,Li Ning;
..............page:1747-1750
Formal specification and verification for SQL operations in top level specification of secure database
Wang Zhipeng;,Yang Minghui;,Chen Bing;,Wang Fu;
..............page:1751-1756
Parallel mixed chaotic encryption scheme on MapReduce
Wang Xinyu;,Yang Geng;,Min Zhaoe;
..............page:1757-1760,1777
Image block encryption method based on ZUC algorithm and DNA encoding
Jing Dangwei;,Wu Chengmao;
..............page:1761-1765,1781
Novel images encryption algorithm based on chaotic system and DNA sequence operation
Xu Guangxian;,Guo Xiaojuan;
..............page:1766-1769
Algorithm of image encrypting based on Logistic chaotic system
Zhang Yonghong;,Zhang Bo;
..............page:1770-1773
Steganography for low bit-rate speech based on pitch period prediction
Yan Shufan;,Tang Guangming;,Sun Yifeng;
..............page:1774-1777
Network security situation prediction method based on PSO-SVM
Chen Shanxue;,Yang Zheng;,Zhu Jiang;,Li Fangwei;
..............page:1778-1781
Study of data security risk relevance about cloud computing for small and medium-sized enterprises
Wang Zhiying;,Su Xiang;,Diao Yajing;,Wang Ping;,Ge Shilun;
..............page:1782-1786
Polymorphic inline code obfuscation algorithm
Shao Mengliang;,Qi Deyu;,Liu Dongwen;
..............page:1787-1790,1800
Active measurement model based on mixed-chain & character pre-setting
Xu Kaiyong;,Shang Jing;,Yang Tianchi;,Li Jianfei;,Jin Lei;
..............page:1791-1795
Differential fault attack on TWINE
Xu Peng;,Wei Yuechuan;,Pan Xiaozhong;
..............page:1796-1800
Analyzing chain of trust model based on entity dependence
Cheng Ge;,Li Cong;,Zhang Yun;
..............page:1801-1805
Research on mobile handover framework based on OpenFlow
Chen Zhi;,Ge Jingguo;,E Yuepeng;,Mi Wei;
..............page:1806-1810,1838
Performance analysis of FDL buffer queue under bounded delay
Liu Jianming;,Chen Haibin;,He Ye;,Jiang Zejun;
..............page:1816-1818,1821
Data integrity verification algorithm in data duplicate backup system
Han Ying;,Wang Maofa;,Zhang Yanxia;
..............page:1819-1821
Fast recovery from concurrent link failures based on optimization of colored trees
Wang Mingming;,Meng Xiangru;,Li Jizhen;,Liu Qingyuan;
..............page:1822-1825
Adaptive fair sampling based on reducing flow numbers
Li Haili;,Shi Menglin;,Zhang Zhen;,Gong Yangyang;,Guo Wei;,Wang Yu;
..............page:1826-1829
Novel mobility model based on Bezier curve for mobile Ad hoc networks
Zhang Wenjing;,Jia Yungang;,Wang Wei;
..............page:1830-1834
Effective strategy of adding links for maximizing traffic capacity of complex networks
Zhao Yanxin;,Li Li;,Wang Xiaoming;
..............page:1839-1841
Stability study of distributed network congestion control algorithm
Wang Yue;,Jiang Binbin;,Jin Bing;
..............page:1842-1845
SNR estimation for OFDM signals in frequency selective fading channels
Zhang Tianqi;,Liu Yu;,Li Can;,Zhang Yajuan;
..............page:1846-1848,1851
Research on energy-aware reverse AODV routing protocol
Liu Jie;,Wang Ling;,Wang Shan;,Li Wen;,Feng Wei;
..............page:1849-1851
Efficient warning message dissemination protocol in vehicular networks
Deng Zuoxiang;,Zhu Yanmin;,Li Minglu;
..............page:1852-1856
Interference alignment algorithm based on hybrid optimization and receiver cooperation strategy
Liu Shenxiao;,Yang Yong;,Chang Chaowen;
..............page:1857-1860
Research on energy efficiency of CSMA/CA
Zhang Renshang;,Qu Kaishe;
..............page:1861-1864
Camera lens distortion correction based on IACPSO algorithm
Ren Xiaokui;,Jin Lin;,Jiao Wenbin;
..............page:1865-1868
3D reconstruction based on independent three-view of image sequence
Li Cong;,Zhao Hongrui;,Fu Gang;
..............page:1869-1873
Application of cultural improved particle swarm optimization in image registration
Zhu Xia;,Chen Renwen;,Zhang Piaoyan;
..............page:1874-1877
Automatic registration algorithm for scattered point clouds based on curvature feature
Ma Zhongling;,Zhou Mingquan;,Geng Guohua;,Sun Jiaze;,Li Jing;
..............page:1878-1880,1887
Facial recognition research on correlation NPE algorithm
Liu Jiamin;,Li Lianze;,Luo Fulin;,Liu Yizhe;,Liu Yumei;
..............page:1881-1883,1891
Approach to extract building from SAR image based on center line of L-shaped structure
Xu Xu;,Zhang Fengli;,Wang Guojun;,Zhou Liangjiang;,Shao Yun;,Liang Xingdong;
..............page:1888-1891
Multi-target tracking framework for fixed camera
He Tao;,Zhang Jiashu;,Hua Jian;,Gong Xiaobiao;
..............page:1892-1896
Eyes state detection method based on LBP
Yao Sheng;,Li Xiaohua;,Zhang Weihua;,Zhou Jiliu;
..............page:1897-1901
Shape sharing initialized active contour model for image segmentation
Mei Mengjie;,Xu Jun;
..............page:1902-1905
Marginalized particle filter for combined feature target-tracking
Meng Junying;,Liu Jiaomin;,Han Ming;
..............page:1906-1911,1916
Center surround feature detector for CT volumetric data and its parallel implementation based on CUDA
Cui Mingming;,Cao Hongtao;,Yan Bin;,Chen Jian;,Zeng Lei;,Cai Ailong;
..............page:1912-1916