Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2015 Issue 7
Overview of hand gesture tracking based on Kinect
Liu Jia;,Zheng Yong;,Zhang Xiaorui;,Xie Donghui;,Lu Xiong;
..............page:1921-1925
Survey on SCADA system testbed for cyber security research
Huang Huiping;,Xiao Shide;,Meng Xiangyin;
..............page:1926-1930
Overview on protocol state machine inference:a survey
Wu Lifa;,Wang Chen;,Hong Zheng;,Zhuang Honglin;
..............page:1931-1936
Outlier detection techniques for wireless sensor networks: a survey
Ye Dongfen;,Yang Mingxia;,Fan Wei;,Shao Pengfei;
..............page:1937-1941
K-nearest neighbor imputation based on sparse coding
Su Yijuan;,Cheng Debo;,Zong Ming;,Li Ling;,Zhu Yonghua;
..............page:1942-1945
Method of new sentiment word discovery based on OC-SVM
Fu Lina;,Xiao He;,Ji Donghong;
..............page:1946-1948,1952
Multi-mode equilibrium assignment model and algorithm under speed limit scheme
Shuai Bin;,Ding Dong;,Zhu Jincheng;,Sun Chaoyuan;
..............page:1949-1952
Empirical research on effects of distance among multiple spreaders on spreading
Su Shuqing;,Zhang Ning;
..............page:1953-1955,1969
Staffing method for call centers based on ant colony optimization
Yang Xueliang;,Li Junxiang;,Tai Yuhong;
..............page:1962-1965,2038
Optimization for work zone length with queues on detour
Li Pan;,Qiu Xiaoping;,Yang Da;
..............page:1970-1973,2008
Optimization of hub-and-spoke service network design for railway express freight train
Huang Lixia;,Shuai Bin;,Wang Wenxian;
..............page:1974-1978
Sensitive public sentiment research based on interactions between blogs
Gao Weili;,Zhu Fuxi;,Liu Kegang;,Weng Shijin;
..............page:1979-1981
Research on micro-blog user's interest mining based on UF_AT model which combining with focusing feature of microblog
Wang Yonggui;,Zhang Xu;,Ren Junyang;,Liu Xianguo;
..............page:1982-1985
Research N-gram based Uyghur text classification technique
Maimaitiyiming Hasimu;,Wushouer Silamu;,Weinila Mushajiang;,Nuermaimaiti Youluwasi;
..............page:1986-1988,2004
Study on Tibetan automatic word segmentation as syllable tagging
He Xiangzhen;,Li Yachao;,Ma Ning;,Yu Hongzhi;
..............page:1989-1991
Hybrid opposition-based learning and artificial fish swarm algorithm using good-point set
Wang Peichong;,Li Lirong;,GAO Wenchao;,Wang Shenwen;
..............page:1992-1995
Research on forecast method of short-term freeway mixed traffic flow
Zhou Tong;,Yang Zhiyong;,Sun Dihua;,Wei Fangqiang;
..............page:1996-1999
Normalization and approximate calculation of semantics uncertain temporal span
Chen Lei;,Zuo Yayao;,Feng Chaoyong;
..............page:2000-2004
Artificial bee colony algorithm based on tabu search and its application
Liu Beilei;,Jiang Mingyan;,Zhang Zhenyue;
..............page:2005-2008
Research of many-objective dynamic parking choice and route guidance
Xiao Jing;,Wang Hao;
..............page:2009-2013,2026
Multi-task parallel compression algorithm for high-throughput DNA sequencing data
He Na;,Li Jiahui;,Wang Ting;,Luo Haibiao;
..............page:2014-2017
Research on improved latency estimation algorithm in quantum program
Deng Dingsheng;,Luo Ping;,Yang Jie;,Zhang Endong;
..............page:2018-2022
Incremental subspace data mining method based on data stream density of complex network
Hou Yan;,Li Wei;,Wen Qiaonong;
..............page:2023-2026
Long BCH encoding fast algorithm for NAND Flash
Ren Keqiang;,Wu Fan;,Xie Bin;
..............page:2027-2029
Research of flight landing scheduling problem based on improved particle swarm optimization
Ma Yingjun;,Sun Xiaona;,Zhao Dongfang;
..............page:2035-2038
Research on changing of interrupt priority to function static call relation
Yang Zhijia;,Mu Yongmin;,Li Liangjie;
..............page:2039-2041,2045
Study on additional relationships based on design patterns's roles
Xiao Zhuoyu;,He Pei;,Li Yan;
..............page:2042-2045
Analysis of importance of nodes in dynamical software network based on information quantity
Zhao Zhiying;,Yu Hai;,Zhu Zhiliang;
..............page:2051-2056
Method based on improved ant colony algorithm for component retrieving
Tong Hao;,Sun Hang;,Li Jing;,Gao Rong;,Peng Weiping;
..............page:2057-2059,2064
Study of fault-detection method in continuous process based on statistical features analysis
Pang Yujun;,Li Na;,Li Yuan;,Zhang Cheng;
..............page:2060-2064
Improved algorithm of chaotic particle swarm and its application in TSP
Li Wen;,Wu Tiebin;,Zhao Quanyou;,Li Lingxiang;
..............page:2065-2067
Designing of online network IDS based on fusion of RST and Q-learning algorithm
Li Qun;,Huang Lihong;
..............page:2068-2072,2086
Distributed method for Twitter data processing and its applications
Zhang Zhenhua;,Wu Kaichao;
..............page:2073-2077,2091
Estimated algorithm of flow number based on iteration method
Qian Kun;,Yi Peng;,Zhang Zhen;,Huang Wanwei;,Jiang Hong;
..............page:2078-2082
Energy efficient virtual network embedding based on searching network centrality kernel
Wang Bo;,Chen Shuqiao;,Wang Zhiming;,Wang Wenzhao;
..............page:2087-2091
Data aggregation scheduling algorithm without communication collision under physical interference model
Liu Wenbin;,Liu Hongbing;,Li Xiangbao;,Yang Bo;,Wen Zhiqiang;
..............page:2092-2096,2139
Cognitive users dynamic spectrum access algorithm based on prediction
Xue Wei;,Zhang Dongdong;,Song Chengjun;
..............page:2097-2100
Research on classification algorithm of eye movements signals based on curve fitting and SVM
Hou Chuanyu;,Lyu Zhao;,Wu Xiaopei;
..............page:2101-2104,2111
Congestion control in V2VC based on context-aware distributed beacon scheduling scheme
Zhou Wengang;,Peng Haiyun;,Zhu Hai;
..............page:2105-2111
Research on capacity of multi-layer Mesh networks based on queuing restrictions
Liu Chanzhen;,Zhang Xiaochuan;
..............page:2112-2115
Application of joint signal recognition on PSK and QAM based on constellation
Wang Tingting;,Gong Xiaofeng;
..............page:2116-2118
Fault link set inference based on passive end-to-end measurements for wireless sensor networks
Xu Ke;,Wang Jian;,Shang Fengjun;
..............page:2123-2127,2132
Novel game-based incentive strategy for opportunistic networks
Liu Qilie;,Liu Maosong;,Li Yun;
..............page:2128-2132
Quadratic residue codes over Fp + uFp + vFp + uvFp
Li Qianqian;,Shi Minjia;,Ge Maorong;
..............page:2136-2139
Evidence conversion model based on evidence database
Han Zongda;,Li Binglong;
..............page:2140-2143
Research on linear transformations based on Cauchy matrix
Ma Qinglu;,Wei Yuechuan;,Pan Xiaozhong;
..............page:2144-2146
Attribute-based signature with private key delegating
Zhou Sufang;,Li Shundong;,Yang Bo;
..............page:2147-2149
Set-enumeration tree based k-anonymity approach in social networks
Lu Huilin;
..............page:2150-2152,2167
Research on PUE attack detection based on symbol rising edge feature extraction
Lei Qian;,Zheng Wenxiu;,Feng Jingyu;
..............page:2153-2155
Secure determination protocol of point-sphere relationship based on different coordinate systems
Hu Guiyin;,Wang Taochun;,Chen Fulong;,Zheng Xiaoyao;
..............page:2156-2158,2162
Active defense scheme of intelligent transportation system based on double dynamic honeypot technology
Wang Chaojie;,Huang Yuda;,Zhao Hongzhuan;,Wang Yiran;
..............page:2159-2162
Attribute-based encryption access control scheme in wireless body area networks
Tian Ye;,Peng Yanbin;,Yang Yuli;,Peng Xinguang;
..............page:2163-2167
Software identification distributing system for trusted computing platform
Li Jianfei;,Xu Kaiyong;,Jin Lei;,Shang Jing;
..............page:2168-2171,2175
Robust image data hiding with the largest singular value shifting
Yao Chumao;,Tang Guangming;,Cai Zhen;
..............page:2172-2175
Clustering algorithm for static gait recognition based on low-dimensional plantar pressure features
Fang Zhengwen;,Wang Nian;,Jiang Jinjian;,Bao Wenxia;
..............page:2176-2178,2183
Face recognition algorithm based on improved sparse deep belief networks
Chai ruimin;,Cao zhenji;
..............page:2179-2183
Research of adaptive multi-channel biometric recognition based on fusion of path-based clustering and USTU
Zhang Guoping;,Huang Miao;,Ma Li;,Zhao Guiqin;
..............page:2184-2188,2195
Ultrasound image filtering method based on Canny operator edge tangent diffusion
Xiao Lei;,Chen Fei;,Xiong Xiujuan;
..............page:2189-2191,2199
Level set liver tumor segmentation based on parameterized morphological gradient modification
Cui Ying;,Wang Xiaopeng;,Yu Hui;
..............page:2192-2195
Random forests for hierarchical pedestrian detection
Xiang Tao;,Li Tao;,Li Xudong;,Li Dongmei;
..............page:2196-2199
Facial feature tracking of AAM algorithm based on eyes first fitting
Zhong Rui;,Wu Huaiyu;,Wu Ruohong;
..............page:2200-2204
Image segmentation algorithm based on FCM optimized by adaptive spatial information
Zhou Wengang;,Sun Ting;,Zhu Hai;
..............page:2205-2208,2213
Study of traffic flow and vehicle lane-changing rate detecting at intersection entrance
Yang Deliang;,Xie Xudong;,Niu Xiaotie;
..............page:2209-2213
Intersection foreground detection based on video sensor networks and traffic signal
Ge Jun;,Zhou Lianying;
..............page:2214-2217,2221
Generalized non-local means algorithm for image denoising
Guo Hongtao;,Wang Xiaowei;,Zhang Yongqin;
..............page:2218-2221
Hierarchical B picture bi-prediction direct mode
Zheng Jiali;,Ni Guangnan;,Qin Tuanfa;
..............page:2222-2225
Research for reconstructing higher quality image of marine microorganisms holograms
Liu Yucui;,Tang Chunming;,Zhang Hongke;
..............page:2230-2233
Real-time simulation of clouds based on dynamic grids
Fan Xiaolei;,Zhang Limin;,Liu Ying;
..............page:2234-2237