Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2013 Issue 12
Formula of bivariate osculatory rational interpolation
JING Ke;KANG Ning
..............page:33-35
Hierarchical singular point detection based on wavelet transform
LIU Mige;LI Xiaobin
..............page:206-209
Improved robust matting algorithm for nature image
HUANG Rui;WANG Xiang
..............page:136-139
Fusion algorithm of multi-focus images based on morphological wavelet of adaptive PCNN
HE Liujie;HU Tao;REN Xianyi
..............page:132-135,159
Design of least square broadband matrix filter in range-depth domain
LIU Jiaxuan;ZHANG Xinhua;FAN Wentao
..............page:200-205
Research of speed observer based on BP neural network optimized by Genetic Algorithm
ZHANG Wenli;LIU Guorong;ZHANG Wei;WU Chaoshuai
..............page:259-262,266
Application of DE-SVM fusion algorithm in intrusion detection
LI Yinhuan;ZHONG Yanhua;YUAN Changqing
..............page:70-73
2-D analysis of ILC algorithm for time-delay system using influence function
HUI Lichuan;SU Tiehan;LIN Hui
..............page:267-270
CVT vehicle unsteady condition ratio control strategy based on fuzzy-PID
YAN Guanghui;YU Qiang;ZHANG Shuo;LI Zhaokai
..............page:250-254
Research on integrated target tracking algorithm based on switching modes
DING Feng;HUANG Jianchong
..............page:214-217
Study on encryption technology based on Fresnel transform
WU Xingjia
..............page:90-92,109
Face recognition in change of illumination based on improved Retinex algorithm
CHEN Wei;ZHAO Fangtian;CHEN Kan;ZHANG Mingmin
..............page:151-154,167
Moving object detection algorithm based on matching of brightness histogram
XUE Lixia;LIU Huang;WANG Zuocheng
..............page:148-150
Surveillance study of spaceborne synthetic aperture radar in different working modes
CHEN Yingying;WU Yanhong;JIA Xin
..............page:223-227,241
Numerical solution of generalized Maxwell fluid fractional differential equation
YAO Shujun;ZHANG Yongliang
..............page:41-46
Genetic algorithm based scheduling strategy of tridimensional terminal transmission system
ZHOU Zhiping;LIANG Meilian;PAN Chengxian
..............page:228-232,241
Application of short-time TEO energy in noisy speech endpoint detection
LI Jie;ZHOU Ping;DU Zhiran
..............page:144-147
Distance weighted extreme Support Vector Machine
LU Shuxia;ZHOU Xu;ZHANG Meng;WANG Xizhao
..............page:160-163
Color image stitching based on color invariant and SURF
GAO Shengfeng;WANG Zhengyong;ZANG Yuanyuan;HE Xiaohai
..............page:113-115,128
Segment LCD character recognition based on segmentation and splice
ZENG Zhongjie;PAN Qing;XU Ruyi;CAI Nian;XU Shaoqiu
..............page:110-112,143
Improved distributed algorithm based on MLAT for airport
LU Yu;LIU Changzhong;XU Zili
..............page:1-4
Application of grey model and neural network in stock prediction
ZHANG Qiuming;ZHU Hongli
..............page:242-245,254
Impact of SNR estimation errors on performance of DDEA-Turbo equalization system
MENG Qingping;ZHOU Xinli;TIAN Wei
..............page:178-181
Image enhancement algorithm avoiding color distortion
WANG Zixu;YU Suping
..............page:106-109
Intrusion detection model of abnormal event fusion based on gray correlation
LIU Yue;WANG Rui;GUO Jiping;YAN Liqiang
..............page:86-89
Trend analysis method for monitoring metrics in monitor system
LIANG Yinghong;LIU Yichun
..............page:218-222
Recognition of sEMG based on reconstructed feature by Gaussian radial basis function
AI Qingsong;LU Ying;LIU Quan
..............page:182-186,222
Compression scheme for BIST based on folding & statistics
FANG Xiangsheng
..............page:57-59,79
Variable-sized bin-packing problem with fragility
LIU Linhao;YANG Dingqiang;WANG Chen
..............page:263-266
New multi-scroll chaotic system and its circuit simulation
OU Qingli;XU Lanxia
..............page:187-190
Approach to blind estimation of pseudo random code sequence for DSSS signal in multipath
WEI Yongpeng;LIU Luokun;GUO Hong;YANG Zhengju
..............page:195-199
Certificateless threshold proxy signature scheme
YU Jing;LI Zhihui
..............page:74-76
(λ,μμ) Vague quotient rings
ZHOU Junmei;XIN Xiaolong
..............page:50-52,96
Research on algebraic immunity of Boolean function
MA Lingyong;CHONG Jinfeng;ZHUO Zepeng
..............page:84-85,89
Speech endpoints detection method based on wavelet neural network
HU Wei;ZHENG Mingcai
..............page:191-194
Visual-lossless data compression algorithm for SVG-based spatial vector data
HUANG Haosheng;WANG Yunpeng
..............page:8-10,15
Research of high speed real-time multiport SDRAM controller realized on FPGA
FAN Bo;WANG Yanjie;SUN Honghai;CHEN Huaizhang;HE Shuwen
..............page:60-64
Image splicing detection using Weber local descriptors
LIU Xiaoxia;LI Feng;XIONG Bing
..............page:140-143
High-capacity watermarking scheme based on multiple transform domain
ZHU Chunhua;YANG Tiejun
..............page:80-83,100
Improved algorithm combined with coded information in single-channel blind signal separation
YANG Yong;ZHANG Dongling;PENG Hua
..............page:172-177,205
Vehicle route planning for passenger transport
DAI Yiyuan;WEN Guilin;ZHOU Hua'an
..............page:255-258,266
Application of Cauchy-Schwarz divergence in image segmentation
ZHANG Shanqing;ZHANG Kunlong;XIN Weibin
..............page:129-131
(1 + v)-constacyclic codes over F2 + uF2 + vF2
XU Xiaofang
..............page:77-79
Method for text region localization in complex background images
ZHOU Xiang;CHEN Hui;ZHANG Kai;SONG Huaibo
..............page:101-105
Research on architecture for cyber-physical systems based on multi-view
HE Ming;LIANG Wenhui;CHEN Guohua;CHEN Qiuli;LIAN Xianglei
..............page:25-32
Heuristic algorithm for scheduling Out-Tree task graphs
KUANG Wen;ZHANG Jianjun;JIANG Hong
..............page:47-49,76
Hardware Trojan detection method based on electromagnetic side-channel analysis
LI Xiongwei;XU Xu;ZHANG Yang;YU Hao;DENG Gaoming
..............page:97-100
Small target detection method based on visual attention
XIE Wenliang;ZHU Dan;TONG Xinxin
..............page:125-128
Method for detecting double MP3 compression with same bit-rate
YU Xianmin;WANG Rangding;YAN Diqun;ZHU Jie
..............page:93-96
Obstacles rigidity and flexibility discriminant method in robot vision
DONG Benzhi;REN Huijuan;REN Hong'e
..............page:155-159
Application of decision tree in circuit fault diagnosis
CHEN Shaowei;WANG Cong;ZHAO Shuai
..............page:233-236
Adapted tensor voting algorithm according to fractal dimension
WANG Li;DAI Fang;GUO Wenyan;HAN Wei
..............page:168-171
Maximum A Posteriori adaptation in password recognition
SI Huajian;LI Hui;CHEN Guanhua;FANG Xin
..............page:164-167