Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2016 Issue 6
Vulnerability risk analysis method based on game model and risk matrix
ZHANG Heng-wei;ZHANG Jian;HAN Ji-hong;WANG Jin-dong;Information Engineering University;
..............page:1421-1427
Design and analysis of FHE-compatible distributed face recognition scheme
LU Zheng-fu;WANG Huan;School of Mathematics and Statistics;Yunnan University;
..............page:1428-1434+1542
Differential fault analysis of MIBS cipher by inducing faults to key schedule
WANG Zhong;YAN Ying-jian;Information Engineering University;
..............page:1435-1439
Evaluation method of network security situation based on multi-source event fusion
WANG Fa-yu;ZHANG Xiao-hong;Key Laboratory of Tianjin City of Intelligent Computing and Software New Technology;Tianjin University of Technology;
..............page:1440-1444
Design of model for analytic method of Android malware based on cascade defense network
ZHANG Yue;ZHENG Dong;ZHANG Ying-hui;National Engineering Laboratory for Wireless Security;Xi’an University of Posts and Telecommunications;
..............page:1445-1450+1470
KVM-based trusted virtualization platform design and implementation
CHI Ya-ping;LI Xin;WANG Yan;WANG Hui-li;Department of Communication Engineering;Beijing Electronic and Science Technology Institute;College of Communication Engineering;Xi’an Electronic and Science Technology University;
..............page:1451-1455
Energy-balancing network routing protocol of bridge load monitoring based on game theory
LIN Jia-quan;ZHANG Tian-jiao;Aviation Automation College;Civil Aviation University of China;
..............page:1456-1459
Suboptimal ML detection algorithm for generalized spatial modulation system
ZHAO Qing-min;SUN Yi-fei;Department of Electronic Information Engineering;Nanchang University;
..............page:1460-1463
Dynamic spectrum allocation algorithm based on graphical game
LIU Jue-fu;YANG Jiang;ZHU Bing-hu;HU Jing;College of Information Engineering;East China Jiaotong University;
..............page:1464-1470
Cluster-routing protocol for heterogenous multi-level wireless sensor networks
WEN Pei-zhi;XU Chen-jiao;DENG Zhen-rong;HUANG Wen-ming;School of Computer Science and Engineering;Guilin University of Electronic Technology;School of Electronic Engineering and Automation;Guilin University of Electronic Technology;
..............page:1471-1477
Design of embedded software used on i.MX6 based asynchronous LED display control system
YANG Bo;LI Ke-sheng;HE Shu-zhuan;LI Wei;LI Li;PAN Hong-bing;School of Electronic Science and Engineering;Nanjing University;Jiangsu Provincial Key Laboratory of Photonic and Electronic Materials Science and Technology;Nanjing University;
..............page:1478-1484
Design of distributed PV power generation monitoring system based on CAN and Web
WAN Xiao-feng;DU Li-ping;LIU Qi;DAI Ya-chen;College of Information Engineering;Nanchang University;
..............page:1485-1489+1566
Fast solving algorithm for RTI target location based on FPGA
QU Qiang;WU Xin-jie;CHEN Xue-bo;School of Electronic and Information Engineering;Liaoning University of Science and Technology;
..............page:1490-1494
Real-time Cache scheduling scheme for multi-core embedded systems
DU Nan;ZHANG Guo;WANG Jian-ping;Faculty of Information Engineering and Automation;Kunming University of Science and Technology;
..............page:1495-1499
Community detection algorithm based on local particle swarm optimization
ZHANG Liang;YAO Shi-jun;CHEN Chu-xiang;College of Science;Information Engineering University;
..............page:1500-1504
Algorithm of mining local communities in tourists social network
FAN Wei;CHEN Xu-guang;College of Computer Science and Technology;Civil Aviation University of China;
..............page:1505-1509+1578
Open platform of emotion recognition based on deep learning
LIN Ping-rong;HOU Zhi;WEN Gui-hua;Software Engineering Department;South China Institute of Software Engineering;Guangzhou University;School of Computer Science and Engineering;South China University of Technology;
..............page:1510-1514
Automatic generation of software vulnerability test case based on KLEE
HUANG Qi;CAI Ai-hua;LYU Hui-ying;PENG Wu;WANG Dong-hai;CHEN Jun-hua;Research Institute of Electronic Science and Technology;University of Electronic Science and Technology of China;Academy of Electronics and Information Technology;China Electronics Technology Group Corporation;School of Management;Capital Normal University;Key Laboratory of IOT Application Technology of Universities in Yunnan Province;Yunnan Minzu University;
..............page:1515-1519+1525
Floating-point exception detection based on program rewriting and interval arithmetic
YUAN Hao;Shanghai Key Laboratory of Trustworthy Computing;East China Normal University;
..............page:1520-1525
Parallelization and performance improvement of Gauss-Jordan elimination on compressed storage
XIONG Ren-hao;LIU Yu;College of Information Science and Engineering;Guilin University of Technology;College of Mechanical and Control Engineering;Guilin University of Technology;
..............page:1526-1530
Parallel machine scheduling problem based on improved glowworm swarm optimization algorithm
NI Zhi-wei;PANG Shan-shan;WU Zhang-jun;LI Rong-rong;LI Jing-ming;College of Management;Hefei University of Technology;Key Laboratory of Process Optimization and Intelligent Decision-Making of Ministry of Education;Hefei University of Technology;
..............page:1531-1536+1548
Adaptive inlaid-type steganography algorithm based on MP3
ZHANG Yao;PAN Feng;SHEN Jun-wei;Department of Electronic Technology;Engineering University of Armed Police Force;
..............page:1537-1542
Terrain mesh simplification based on vertex importance and hierarchical clustering tree
WANG Jia-teng;YIN Hong;XIE Wen-bin;YIN Chao;Institute of Command Information and System;PLA University of Science and Technology;
..............page:1543-1548
Color and texture feature based approach for leaf occlusion detection in security surveillance video
YUAN Yuan;DING Sheng;XU Xin;School of Computer Science and Technology;Wuhan University of Science and Technology;Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System;Wuhan University of Science and Technology;
..............page:1549-1554
FR-CoSaMP image reconstruction algorithm based on improved measurement
WU Guo-hui;ZHANG Hua-dong;LI Xing-kun;DAI Ji-yang;Nondestructive Text Key Laboratory of Ministry Education;Nanchang Hangkong University;Beijing Electro-Mechanical Engineering Research Institute;
..............page:1555-1559
Image enhancement based on Contourlet transform and improved MSRCR
ZOU Bin;LIU Ao;College of Computer Science and Technology;Wuhan University of Science and Technology;Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System;Wuhan University of Science and Technology;
..............page:1560-1566
Video key frame extraction based on thought of multi core condensed
LIANG Rui;ZHU Qing-xin;HU Juan;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............page:1567-1572
Vehicle detection under complicated background
LING Yong-guo;HU Wei-ping;Guangxi Key Lab of Multi-Source Information Mining and Security;College of Electronic Engineering;Guangxi Normal University;Department of Physics and Electronic Engineering;Guangxi Normal University for Nationalities;
..............page:1573-1578
Salt-and-pepper denoising based on total variation and reweighted low-rank matrix recovery
ZHANG Min;TAN Wen-rong;School of Foreign Languages;Southwest University for Nationalities;Sichuan Province Key Lab of Signal and Information Processing;Southwest Jiaotong University;School of Computer Science and Technology;Southwest University for Nationalities;
..............page:1579-1583
Kernel sparse dictionary learning in remote sensing image classification
ZOU Jin-song;HUANG Kai-feng;Department of Electronics and Information Engineering;Chongqing College of Water Resources and Electric Engineering;College of Information Technology;Luoyang Normal University;
..............page:1584-1587+1658
Image forgery detection algorithm based on non-sampling wavelet transform coupled Zernike moment
FENG Li;GONG Zi-hua;WEN Yuan-bao;Department of Humanities and Social Sciences;Xiamen City University;The 722Institute of China Shipbuilding Industry Corporation;School of Computer Science and Technology;Huazhong University of Science and Technology;
..............page:1588-1592
Model of Agent individual oriented belief revision system
WANG Yuan-gang;LI Guan-yu;DING Ya-fei;College of Information Science and Technology;Dalian Maritime University;
..............page:1593-1598
Rule extraction method of breast cancer diagnosis based on partial ordered structure diagram
ZHENG Cun-fang;HONG Wen-xue;WANG Jin-jia;School of Electrical Engineering;Yanshan University;Liren College;Yanshan University;School of Information Science and Engineering;Yanshan University;
..............page:1599-1603+1686
Sample and attribute weighting FCM clustering segmentation algorithm based on two-dimensional histogram
WANG Li-juan;WU Cheng-mao;LIU Ji-hong;School of Electronic Engineering;Xi’an University of Posts and Telecommunications;
..............page:1604-1609+1631
Multiple classifiers ensemble learning algorithm based on rough set theory
HU Feng;CHENG Xin-yi;Chongqing Key Laboratory of Computational Intelligence;Chongqing University of Posts and Telecommunications;
..............page:1610-1616
Pain expression recognition based on deep learning
WANG Jun;XIA Li-min;Zhongshan Institute;University of Electronics Science and Technology;School of Information Science and Engineering;Central South University;
..............page:1617-1620+1692
Human posture identification based on fuzzy pattern recognition
WANG Yu-kun;GAO Wei-xin;TANG Nan;WANG Xin;JI Jiang;College of Electronic Engineering;Xi’an Shiyou University;Xi’an Northwest Petroleum Pipeline Company;
..............page:1621-1625
Fuzzy C-means clustering segmentation algorithm based on intra-class and inter-class distance
LIU Lu;WU Cheng-mao;School of Electronic and Information Engineering;Xi’an University of Posts and Telecommunications;
..............page:1626-1631
Online behavior recognition based on latent-dynamic conditional neural fields
ZHANG Yu-yan;MEI Xue;CHENG Li;ZHU Jia;YUAN Yu-hao;College of Electrical Engineering and Control Science;Nanjing Tech University;
..............page:1632-1635+1653
Double population hybrid genetic algorithm for solving flexible job shop scheduling problem
CHENG Zi-an;TONG Ying;SHEN Li-juan;YU Shuai-shuai;LI Ming;College of Machinery and Transportation;Southwest Forestry University;
..............page:1636-1642
Graph self-representation for sparse feature selection
ZHONG Zhi;HU Rong-yao;HE Wei;LUO Yan;College of Computer and Information Engineering;Guangxi Teachers Education University;Guangxi Key Lab of Multi-source Information Mining and Security;Guangxi Normal University;
..............page:1643-1648
Artificial bee colony algorithm with global best-guided and chaotic-local-search strategy
LI Rong;YANG Yong;SHI Jian-zhong;College of Energy and Power Engineering;Nanjing Institute of Technology;
..............page:1649-1653
Improved manifold clustering algorithm based on density peaks search
LIU Yan-li;ZHANG Jian-peng;School of Computer Engineering;Shenzhen Polytechnic;China National Digital Switching System Engineering and Technological R&D Center;Web Engineering Section;Department of Mathematics and Computer Science;Eindhoven University of Technology;
..............page:1654-1658
Method of visual candidate loop-closure recall for mobile robot
WU Jun-jun;Software College;Guangdong Food and Drug Vocational College;School of Mechanical and Automotive Engineering;South China University of Technology;
..............page:1659-1662
Object tracking via multi-task structured sparse model
CHEN Yun;WU Fei;JING Xiao-yuan;Department of IOT Engineering;Jiangsu College of Information Technology;College of Automation;Nanjing University of Posts and Telecommunications;
..............page:1663-1667
Performance evaluation of weather research and forecast(WRF)model on ERA
CHEN Yi-ran;WANG Yu-zhu;JIANG Jin-rong;HAO Hui-qun;CHEN Ting;LIU Chun;Supercomputing Center;Computer Network Information Center;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Beijing Computer Technology and Application Institute;China Electric Power Research Institute;
..............page:1668-1674
Design of coverage-guiding and reusable verification platform for PCIe
LIU Hang-tian;ZHOU Yi;DAI Zi-bin;ZHANG Li-chao;Cryptogram Engineering College;Information Engineering University;
..............page:1675-1680
Attitude measurement system for robot based on multi-sensor information fusion
YANG Dan;LIU Xiao-ping;HU Ling-yan;College of Information Engineering;Nanchang University;
..............page:1681-1686
FastATB:Easy-to-use graphic system for composing scientific data analysis tasks
WU Yan;CHEN Mei;LI Hui;College of Computer Science and Technology;Guizhou University;Guizhou Engineering Laboratory for Advanced Computing and Medical Information Services;Guizhou University;
..............page:1687-1692
Experiment and study of effects of optic power on best bias position in FOG
LI He;LYU Ying-jin;ZHU Kui-bao;DENG Nian-mao;Institute 706;The Second Academy of China Aerospace Science and Industry Corporation;Institute 17;Fourth Academy of China Aerospace Science and Industry Corporation;
..............page:1693-1696
Getting process content of guest OS based on VMI
LI Yong-gang;CUI Chao-yuan;LI Ping;Department of Automation;School of Information Science and Technology;University of Science and Technology of China;Institute of Intelligent Machine;Hefei Institutes of Physical Science;Chinese Academy of Sciences;
..............page:1697-1701