Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 18
Techniques of ANN's construction to TCM eight principal syndromes
WU Yun;ZHOU Chang-le
..............page:243-245,248
Error analysis of P3Ppose estimation
HAO Ying-ming;ZHU Feng;OU Jin-jun;WU Qing-xiao;ZHOU Jing;FU Shuang-fei
..............page:239-242
Statistical analysis of simple step-stress accelerated life testing for Type II hybrid censored sample
QIN Xiao-qiong;KANG Hui-guang;SHI Yi-min;HU Jun-mei
..............page:236-238
Method using GPS measuring parachute pivot angle
XU Ping;YANG S-imu;GU Da-quan;LIU Bin
..............page:233-235
Orthogonal differential evolution algorithm for engineering optimum design
CHEN Wen-xia;GONG Wen-yin;CAI Zhi-hua
..............page:230-232,235
Time synchronization in wireless industrial control networks
LI Rui-jun;HU Shu-juan;HOU Wei-yan
..............page:224-226
Maize seed recognition based on genetic algorithm and multi-class SVM
WANG Hong-yong;HOU Hui-fang;LIU Su-hua
..............page:221-223
Study on distributed optical fiber pipeline leakage detection system based on SCADA
ZHOU Yan;YU Mei;JIN Shi-jiu;ZENG Zhou-mo;FENG Hao
..............page:218-220
Research impact of passenger car of a two-lane highway based on cellular automaton model
KANG Hong-xia;QIAN Yong-sheng;WANG Hai-long
..............page:211-214
Topology dividing algorithm of grounding grids corrosion diagnosis
WANG Shu-qi;NI Yun-feng;LIU Jian;WANG Sen
..............page:207-210
Statistical analysis software driven reconfigurable SPC system
ZHANG Su-mei
..............page:203-206
Position estimation of underwater vehicle based on information fusion map
YANG Fang-qiong;TAN Qing;PENG Gao-ming
..............page:200-202,210
Application research of rough sets in logisic alliance stability decision-making
SHI Cheng-dong;CHENG Jun-no;YU Lan-lan
..............page:197-199,229
Trajectory tracking control of service robot based on vision
ZHANG Li-Xun;BU Chi-wu
..............page:194-196
Nonlinear speech predictor using models for chaotic systems
QIN Ai-na;HUANG Zhong;GUI Wei-hua
..............page:141-143
Mixed clustering algorithm based on artificial fish swarm
LIU Bai;ZHOU Yong-quan
..............page:136-138
Hybrid genetic algorithm and hidden Markov model for Web information extraction
XIAO Ji-yi;ZOU La-mei;LI Chuan-qi
..............page:132-135
Digital image hiding method based on bit operation and chaotic sequence
LI Peng;ZHANG Xue-feng;TIAN Dong-ping
..............page:175-176,214
Trademark retrieval based on multi-feature extraction
MA Yu-guo;WU Shuan-hu;SONG Yi-bin
..............page:172-174,193
Method of fast iris location based on local curve fitting
YAO Qin;SHI Yi-kai;WANG Huan;SHAN Ning
..............page:169-171,189
Recognizing simple polyhedron based on geometry constraint
ZHANG Gui-mei;XU Lin-hong
..............page:163-165,168
Denoising algorithm by wavelet shrinkage based on wavelet influence cone
YANG Zhi-fei;ZHAO Ming
..............page:144-146,226
Fuzzy parameters identification based on BP neural network
WEI Wei-xing;MO Shao-qing;QIN Chun-fang;LIAO Yi-kui;WEN Yong
..............page:44-47,131
Reliability evaluating model of shortest path in network based on sensitivity analysis
YANG Xiao-ling;XIE Zheng;CHEN Zhi;XU Zhen
..............page:106-108
Improvement of threshold digital signature scheme
GAO Dong-mei;LIU Shao-wu;ZHANG Long;LIU Feng
..............page:104-105,118
Bayesian-Chi2 algorithm for discretization of real value attributes
LIU Lei;YAN De-qin;SANG Yu
..............page:39-40,43
Data fitting experiments of LS-WSVM
XIAN Guang-ming
..............page:36-38,93
Matrix presentation of weighted rough sets
YANG Yong;LU Xiao-yun;LI Lian
..............page:34-35,82
Study on fusing simplex search into genetic algorithm
XIAO Hong-feng;TAN Guan-zheng
..............page:30-33
Active services framework of information sharing
MA Wei-dong;LI You-ping;ZHOU Ming-tian
..............page:25-29,33
Image Mean Shift filtering method based on wavelet multi-resloution decomposi-tion
SUN Xiao-wei;LI Yan-jun;CHEN Yi
..............page:17-20
Research of speech training visual method using Self-Organizing Map
YANG Dan;XU Bin;WANG Xu;LIAO Fu-cheng
..............page:15-16,20
Feature extraction algorithm based on music melody outline
SUN Ting;GENG Guo-hua;ZHOU Ming-quan;WANG Xiao-feng
..............page:12-14,90
Algorithm of Web based index expansion in P2P systems
YOU Jia-li;WANG Jin-lin
..............page:6-8,24
Mobile terminal aided data collection protocol for wireless sensor networks
MA Kui;HUANG He-qing;SHEN Jie;YAO Dao-yuan;LIU Hai-tao
..............page:1-5
Software architecture evolution based on non-functional requirements
LIU Xian-feng;HUANG Wan-gen
..............page:57-60
Optimal combination-based method for solving linear equations with errors
XIA Tian;FANG Yong;WANG Chang-hui;YANG Yong;FAN Gang
..............page:54-56,108
Optimization of box-based algorithms for collision detection
LIU Jian-xin;CUI Han-guo;ZHANG Jing;WU Sheng
..............page:51-53,86
Binary differential evolution and its applications
WANG Zhi-gang;GUO Guang-han;HAO Zhi-feng
..............page:48-50
Consecutive humming feather extraction based on two-layer neural network
ZHENG Gui-bin;LIU Yan;LIU Sheng;HAN Ji-qing
..............page:246-248
Workflow scheduling algorithm on grid based on resource state reliability
TIAN Guo-zhong;YU Jiong;HOU Yong;XING Jian;CHEN Zhen
..............page:115-118
Intrusion detection model based on D-S evidence theory
GONG Qiong-yao;DING Hong;KONG Ting
..............page:113-114,123
Host intrusion detection based on sequence of Windows Native API
ZHU Ying-ying;YE Mao;LIU Nai-qi;LI Zheng;ZHENG Kai-yuan
..............page:109-112
Improved scheduling of sleeping With geographical information for MANET
ZHOU Ke;PENG Yu-xu;ZHANG Li-jun
..............page:99-103
Layered Web security model based on EAP-SAKE
ZHANG Jian-wei;HE Lei
..............page:97-98
Quantitative analysis on performance of TCP congestion control mechanism
WU Wen-hong;LI Xiang-li
..............page:94-96,143
Possible wireless sensor network protocol model
LIU Yong-min;JIANG Xin-hua;NIAN Xiao-hong;LU Wu-yi;YANG Sheng-yue
..............page:91-93
Reliability analysis of link failure model in E-2DMesh networks
XIAO Jie;LIANG Jia-rong;LI Yin;XU Shuang
..............page:87-90
Optimization algorithm for complicated circuit based on GEP
LI Kang-shun;LIANG Jiu-sheng;ZHANG Wen-sheng;LI Yuan-xiang
..............page:83-86
New real-time simulation method of smoke
DING Wan-ning;GU Yao-lin
..............page:80-82
Research on trusted architecture and implementation of Taihang secure BIOS
ZHOU Zhen-liu;LI Ming;XU Rong-sheng;SONG Dong-sheng
..............page:76-79
Low power parallel VLSI architecture for 2-D discrete wavelet transform
LIU Hong-jin;HE Xing;ZHANG Tie-jun;WANG Dong-hui;YU Qi-ying;HOU Chao-huan
..............page:73-75
Design and implementation of IPv4 IPv6 adaptive QoS enabled VPN
ZHANG Jing;WANG Wen-dong;GONG Xiang-yang;QUE Xi-rong
..............page:127-131
Simulation spread of infection diseases based on geo-entity
ZHONG Shao-bo;ZHANG Mao-lei;ZHENG Jin-yong;HUANG Quan-yi
..............page:190-193
Fast quarter-pixel motion estimation algorithm applied for H.264
CHEN Gang;JIA Zhen-hong
..............page:186-189
Image compression algorithm based on wavelet domain SVD
YE Song;DAI Cai-liang;YU Zhi-qiang;TANG Ling;WU Yuan;WANG Jie-bin
..............page:183-185
Image segmentatio based on PSO and Fuzzy C-Means clustering algorithm
CHEN Xi;LI Chun-yue;LI Feng;CAO Peng
..............page:181-182,185
Image thresholding based on weighting shannon entropy
WU Cheng-mao
..............page:177-180
Research of improving TCP algorithm based on fuzzy control in mobile ad hoc networks
LI Li-jun;LIU Hong-fei;ZHANG Zi-bing;YANG Zu-yuan
..............page:124-126
Novel method of estimating flow length distribution
MA Jing-shan;CHEN Shi-liang;ZHAO Xue-lu;LIU Wei-jiang
..............page:119-120,135
Edge detection of gray-sere images based on self-adaptive CNN
ZHANG Ying;ANG Tai-yong;HUANG Guo-long;LENG Yong-gang
..............page:160-162
Method for text location in color image based on brightness grading and stroke detection
LIU Qiong;ZHOU Hui-can;WANG Yao-nan
..............page:157-159,162
Research of effective argument identification algorithm in se-mantic role labeling
DING Jin-tao;ZHOU Guo-dong;WANG Hong-ling;ZHU Qiao-ming
..............page:153-156
Discovery of data mining services based on domain ontology
CHEN Ying;GU Guo-chang
..............page:150-152,156
Based on wavelet packet de-noise method implemented in landmine recognition
WU Jian-bin;ZHOU Hui-lin;TIAN Mao
..............page:147-149
LFSR reseeding methodology based on partial consistency
WU Xiao-yin;LIANG Hua-guo;ZHAN Kai-hua;WU Yi-cheng;LI Jian-xin
..............page:70-72
Design and implementation of universal service platform for application
ZHANG Jian-lin;LI Ban;XU Cong-fu
..............page:66-69,75
New smoothing function and its properties for Support Vector Machines
HUANG Ren-tai;XIONG Jin-zhi
..............page:64-65,103
New hybrib algorithm for solving 0-1 knapsack problem
ZHAO Chao-qing;HU Xiao-bing
..............page:61-63