Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 23
Audio watermarking algorithm based on MP3 compress domain
zhou zhi ping ; zhang cai hong ; zhou li hua
..............page:92-94,118
Large margin nonlinear discriminant analysis of minimization within class scatter
zhang wei wei ; chen xiu hong
..............page:194-197
Covariance estimation of hyperspectral data using particle swarm optimization
zhou li na ; huang zuo ; li xian hua
..............page:203-205,230
Improved cluster-based routing protocol for Wireless Sensor Networks
liu hai yang ; yang yu hang
..............page:82-84,121
Automatic recognition of traffic light signals on crosswalk based on moble phone
xu li zhen ; he yao ping ; sun lin
..............page:219-222
Autonomous helicopter landing on moving target
wu lan ba gen ; hu ji zhong ; xu yuan ming
..............page:227-230
Research on time synchronization protocol of cooperative engagement simulation
liu chuan bo ; wang hang yu ; qiu zhi ming
..............page:223-226
Research on on-line visual system to detect transfusion solution
zhang jian ; wang yao nan ; lu juan
..............page:231-234
Hybrid algorithm of immune algorithm,genetic algorithm and nat colony system
geng qiang ; wang cheng liang
..............page:44-46,87
Self-adaptive particle swarm optimizer for multi-objective optimization problems
wen zuo ; liao wei zhi ; bi ying zhou
..............page:38-40
Cluster analysis based on self-adaptive hybrid differential evolution with simulated annealing algorithm
su qing hua ; hu zhong bo ; xiong yi neng
..............page:41-43,78
Humanoid predictive control of stabilization walking for biped robot
jing cheng lin ; li zu shu ; xue fang zheng
..............page:21-24
Speech enhancement based on new spectral subtraction of geometric approach
zuo zuo feng ; zeng yi cheng ; liu bo quan
..............page:144-147
Blind identification of time-varying channel in chaotic communication
fan yong quan ; zhang jia shu
..............page:151-153,158
New method on attenuation deformation of units modeling
liao zhi fang ; jiang yu juan ; fan xiao ping ;radman alhamidi
..............page:235-237
Transformation from XML schema to UML class diagram based on meta model
huang long ; yang yu hang
..............page:59-60,110
Method of computing positive region by universe decrement
yao guang shun ; ma li sheng ; yang chuan jian
..............page:47-49
Fast SVM incremental learning algorithm based on between-class convex hull vectors
wu chong ming ; wang xiao dan ; bai dong ying ; zhang hong da
..............page:185-187,248
Component parameter optimization of embedded configuration feature algorithms
huang wei dong ; yan yi
..............page:72-74,114
Whole spectrum clutter compensation method for forward looking airborne radar
he fei ; jiang dong chu
..............page:138-140
Attribute reduction of generalized information systems
gong zeng tai ; guo yong ping ; shi zhan hong
..............page:34-37,58
Multipurpose image watermarking system based on chaos and lifting wavelet
zhu cong xu ; wei xing yu
..............page:115-118
Improved cascade license plate location method
chen jin ; xu pei xia
..............page:244-248
Face feature extraction combined ICA with global optimal strategy
yin jian qin ; han yan bin ; li jin ping
..............page:166-169
Medical ultrasound image segmentation based on random walks
yu jia li ; guo min
..............page:241-243
Centroid-based classification based on affine geometry and orthogonal decomposition
zhang yu fang ; liang zuo ; xiong zhong yang ; xiao zuo
..............page:141-143,147
Secure routing protocol based on trust model in MANET
ren yan ; ren ping an ; wu zhen qiang ; ma jian feng ; zhang jing dong ; liu yan ping
..............page:129-131,193
Efficient anonymous authentication scheme in VANETs
feng yong ; liang hao
..............page:126-128,226
Method based on data flow analysis to understanding binary program
tang he ping ; huang shu guang ; wu zhi yong
..............page:64-66,71
Large capacity information hiding algorithm
zhang xian quan ; sun rong hai ; zhu ying jun
..............page:122-125
Cluster head load balanced clustering routing protocol for Wireless Sensor Networks
jiang hai feng ; qian jian sheng ; li shi yin ; zuo ying hong ; niu guang dong
..............page:111-114
Automated reasoning algorithm based on lattice-valued first-order logic LF(X)
li xiao bing ; xu yang
..............page:18-20,49
Improved algorithm for mining weighted frequent patterns
wang yan ; xue hai yan ; li ling ling ; sun xin de
..............page:135-137,197
Blind source separation based on Bayesian optimization algorithm with decision graphs
yi ye qing ; lin ya ping ; liu yun ru
..............page:132-134,184
Comparison between two kinds of noise estimate algorithms
he huai qing ; gao jin zhi
..............page:154-158
(t,n)threshold proxy signature scheme with designated receiver
mi jun li ; li su bei ; zhang jian zhong
..............page:85-87
Performance analysis on multi-antenna signals combining in correlated noises.Computer Engineering and Applications
wan ming kang ; luo bai wen ; yu hong yi ; yang zuo
..............page:12-14,30
Method of fault detection for wireless sensor networks
ji sai ; yuan shen fang ; ma ting huai ; tian wei
..............page:95-97,121
New image authentication algorithm with anti-JPEG compression
gao bao jian ; feng feng
..............page:190-193
Dynamical properties analysis of genetic regulatory network
zuo xiang hong ; wei wei yi
..............page:15-17,24
Software cost estimation model based on RBF neural network
zeng yi ; li juan
..............page:61-63,140
Color image watermarking method using relationship between blocks
peng hong ; wang wei xing ; wang jun
..............page:198-202
Dynamic analysis a class of neural networks with time-varying delays
zhang hui xia ; gao xing bao
..............page:50-55
Hybrid Gaussian pLSA model and item based collaborative filtering recommendation
chen deng ke ; kong fan sheng
..............page:209-211,234
Background clutter suppression technology based on genetic neural network
li zhi jun ; fan qiao yan ; ai si ka er ai mu du la
..............page:178-180,230
Study on image encryption of multi-stage chaotic system with variable parameters
zhou zhi gang ; xu jiang feng ; liu
..............page:106-110
Adaptive digital audio information hiding based on integer wavelet transform technique
zheng yu ; liu wen jie ; zhao ying nan
..............page:148-150,226
Double-step anti-aliasing drawing algorithm of circle
niu yu jing ; tang zuo
..............page:175-177,248
Two changes of exponential backoff algorithm for DCF
ming ting tang ; wu shao xing ; wang guo an
..............page:88-91,125
Study on thermal power plant optimal site selection
ren feng ; liu ying zong ; niu dong xiao
..............page:212-214
Self-certified blind signcryption scheme based on Discrete Logarithm Problem
yu hui fang ; wang cai fen ; wang zhi cang
..............page:119-121
Survey on normal estimation for 3D point clouds
li bao ; cheng zhi quan ; dang gang ; jin shi yao
..............page:1-7
Routing method based on quantum evolutionary algorithm
deng chang chun
..............page:103-105
Trust model based on perceived risk for P2P E-commerce system
liu yu ling ; liu zuo
..............page:98-102,222
Radiographic image enhancement algorithm based on finite ridglet fusion
shen kuan ; wen yu mei ; cai yu fang
..............page:170-174
Research of evolutionary algorithm used for image match
wu qing hua ; wang dian hong ; yan xue song
..............page:181-184
MAP hierarchical selection mechanism based on mobile performance computation
xue jian sheng ; liu jian ; song bao yan ; ren xiu li
..............page:75-78
Study on image scrambling degree using singular value decomposition of difference image
tian xiao ping ; wu cheng mao
..............page:162-165,248
Multi-objective optimization method for Job-shop scheduling
zeng qiang ; yang yu ; wang xiao lei ; liang xue dong
..............page:215-218
Inflection points algorithm and properties of parametric convex curves
fang zuo ; zhu xing hui ; wu quan yuan ; wang xing bo
..............page:188-189,218
Applying probabilistic suffix tree to intrusion detection
zheng zuo ; jiang sheng yi ; tang yong
..............page:79-81