Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 2
Ultrasonic multi-life location method based on optimized spread spectrum emission signal
YAO Zhenjing;YANG Jingsong;SONG Yanxing;GUO Chunsheng
..............page:11-14
Forward-looking 3-D SAR imaging model using optimization of array by simulated annealing
LV Lan;ZHANG Xiaoling;WEI Shunjun
..............page:135-138
Dim moving point target tracking algorithm based on multi-source measurements information fusion
ZHOU Tongchi;Askar Hamdulla;WANG Rongshuan;HUANG Dongmei
..............page:182-184,226
Fingerprint classification method based on fusion of membership
TAN Taizhe;PI Kaijun;ZHANG Hongyan
..............page:191-193,237
Online dynamic calibration of linear movement camera
PAN Yabin;LIU Guodong
..............page:188-190,210
Prediction of grain yield using AIGA-BP neural network
NIU Zhixian;LI Wupeng;ZHANG Wenjie
..............page:235-237
Fast algorithm of license plate location under complex background
FANG Wanyuan;LIANG Jiuzhen
..............page:160-163,176
Application of artificial fish swarm algorithm in self-adaptive image enhancement
DING Shengrong;MA Miao;GUO Min
..............page:185-187
Research on self-adapting digital filter
WU Youxi;LI Jianman;MI Shaohua;HOU Dandan
..............page:145-147
Lung nodule detection based on Dynamic Multiple Classifiers Selection ensemble algorithm
HAN Yanyan;FENG Jun;CUI Xin;WANG Qiuping
..............page:218-221
Fire localization strategy based on modified Ant Colony Algorithm
KANG Yimei;YANG Enbo;YANG Xinkai
..............page:207-210
Soft inclines
LIAO Zuhua;RUI Mingli
..............page:30-32,42
Formal analysis and improvement of IKEv2 against man-in-the-middle attack
ZHU Xiaowei;ZHOU Haigang;LIU Jun
..............page:59-62
On controlled algorithm for vehicle avoidance obstacle
LIU Xiusong
..............page:230-234
Predicting intrinsically disordered proteins by using central amino acid compositions
HE Bo;WANG Kejun;FENG Weixing;XU Nuolin
..............page:133-134,144
Storing and querying GML documents based on coordinates separation
WANG Fabiao;GUAN Jihong;ZHU Fubao
..............page:151-155
Restoration method of PSO-BP neural network based on HDSG
GUO Pei;HE Xiaohai;TAO Qingchuan;LI Muwei
..............page:156-159
Noise decaying of seismic data by Steerable Pyramid decomposition based on Laplace prior
LIN Chun;WANG Xuben;LIU Lihui
..............page:222-226
Study on leaks of detection based on immunity
HE Yi;JIANG Jan
..............page:103-105
Design and implementation of Jinan municipal infrastructure projects management and decision-making support system
ZHU Yunhai;TAN Jing;WU Hongzhi;WAN Li;LIU Xiang
..............page:241-244
Multi phase codebook background model
WANG Xianrong;GOU Xiantai;LUO Gang
..............page:168-172
Performance analysis of vector dot product on GPU
GUO Lei;LIU Jinfeng
..............page:201-202,226
Robot path planning based on Bayes decision in complex environment
WANG Juan;ZHU Qingbao;CUI Jing
..............page:245-248
Formula of interval-valued intuitionistic fuzzy entropy and its applications
GAO Zhihai;WEI Cuiping
..............page:53-55,75
Personalized query expansion method
YU Chunlei;ZHU Zhengyu;HE Jie;DONG Shujia
..............page:119-123,129
Observation information reduction for strong cycle planning
CHANG Qing;WEN Zhonghua;HU Yulong;CHEN Jianlin
..............page:148-150
Image fusion in curvelet domain based on pulse coupled neural networks and optimization of evaluated rule
WU Junzheng;YAN Weidong;LIU Junmin;BIAN Hui;NI Weiping
..............page:197-200
New certificateless proxy ring signature scheme
ZHANG Junrong;REN Ping\' an;LI Wenli
..............page:63-65
Simulation of intelligent dynamic behavior for anti-aircraft gun element CGF entity
WANG Peng;ZHU Yuanchang;DI Yanqiang
..............page:227-229,237
Secure model in WiFi/WiMAX mixed networks based on pre-authentication
CHEN Weihong;SHEN Yuxiang;XIAO Weichu
..............page:93-95,138
Research on conversion from conjunctive normal form to disjunctive normal form
ZHI Huilai;ZHI Dongjie;LIU Zongtian
..............page:15-17,29
Effective method of sensor fault diagnosis
SHAN Yugang;WANG Hong
..............page:22-25
Ontology structure characteristics analysis and matching application research
LIANG Shuai;LUO Qiangyi;HUANG Zhenhong
..............page:43-47
Algorithm of changing pseudonyms simultaneously in VANETs
LI Jianqing;PAN Yuanyuan;FENG Li
..............page:18-21,38
GPU-acceleration of parallelized image matching algorithm
LI Xujie
..............page:173-176
New method of attribute reduction based on rough set
WANG Peiji;ZHAO Yulin;LV Jianfeng
..............page:113-115,129
Distributed trusted verification mechanism for trusted computing platform
LIU Lan;YUAN Daohua;TONG Xing;WANG Zhonglei
..............page:99-102,118
Craniofacial reconstruction based on improved regional statistical craniofacial model
ZHU Xinyi;GENG Guohua;WEN Chao
..............page:5-7,52
Application of adaptive clustering algorithm on DDoS attacks detection
LI Lijuan;LI Shaodong
..............page:86-89
Face recognition algorithms based on dynamic radial basis neural network
ZHANG Defeng;ZHOU Ling;SUN Yamin
..............page:203-206,240
On algebraic immunity of Plateaued functions in odd variables
WU Weiling;WANG Yongiuan;ZHANG Shiwu
..............page:96-98
Recognition of color face images based on quaternion matrices and NSCT transform
LI Bingchun;DENG Yong
..............page:164-167,172
Research on distributed system recommendation trust model
QU Yonghua;DOU Wanfeng;LIU Chao
..............page:109-112
Improved KNN text categorization
ZHONG Jiang;LIU Ronghui
..............page:142-144
Cross multi-table frequent itemsets mining with privacy preserving
LIN Rui;ZHONG Cheng;LI Xiaolu
..............page:66-68,75
Parallelization of numerical storm surge model
MIAO Chunbao;ZHAO Peng;SHEN Biao;LIU Yongling
..............page:39-42
Music fingerprint extraction and music retrieval based on harmonic
ZHOU Hongchen;JIANG Dongmei;Hichem Sahli;Werner Verhelst
..............page:139-141,176
New image encryption theme based on dual chaotic systems
LU Huibin;ZHANG Peng;GUO Xianpeng;HAO Min
..............page:90-92,126
New position algorithm of sensor network
WANG Jiangtao;GE Qiang;QIAN Wei
..............page:76-79,89
Fixed-point algorithm based on kurtosis for one-unit ICA-R
ZHANG Shoucheng;LIU Yongkai
..............page:130-132,172
Research on efficient authentication mechanism in MIPv6 fast hierarchical handoff
XU Xingqi;PAN Jin;GUO Chao;CHEN Zhiguang
..............page:69-75
Algorithm of log end recognition based on non-linear least squares principle
MEI Zhenrong;REN Hong\' e;ZHU Meng
..............page:177-178,210
Studying of real-time smog diffusing based on particle swarm optimization
LIU Lan;XU Jianfeng;LIU Qun
..............page:179-181,234
Uighur speech synthesis method based on multi-level unit and prosodic parameter matching
Gulijiamali Maimaitiaili;Aisikaer Rouzi;Aisikaer Aimudula
..............page:116-118
Cryptanalysis and improvement of universal designated verifier ring signature
CHEN Qiqing;WANG Huaqun
..............page:106-108
Dynamic diversity preservation strategy for multi-objective evolutionary algorithms
PANG Shan;YANG Xinyi;SU Qingtang
..............page:48-52
Sequencing method of vague pattern making arranged target importance
YANG Jie;WANG Hongxu
..............page:33-35,42