Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 3
Research on electronic identity management in cyberspace
HAN Ji-zhong;,LI Feng-hua;,WAN Sheng;,XUE Xiao-yun;
..............page:641-644,650
Survey on cooperative communication research in wireless sensor and actuator networks
FENG Yong;,LU Zhi-qiang;,YANG Jie;,ZHENG Xiong-qi;
..............page:645-650
Survey of AVF evaluation methods for microprocessor reliability
FANG Feng-cai;,HOU Yi-bin;,HUANG Zhang-qin;,TANG Liu;,ZHANG Hui-bing;
..............page:651-657
Design and analysis of calculation sorting algorithm
LI Chao;,LI Tong;,LIANG Li-gang;,YANG Xiu-cheng;,ZHAO Na;
..............page:658-662,695
Application of fair cumulation method for apportioning seats on genetic selecting operation
GOU Jin;,WANG Cheng;,YU Fei;
..............page:667-670,704
Improved MOPSO algorithm and its application
CHEN Xing;,FENG Jin-zhi;,ZHENG Song-lin;
..............page:675-678,683
Optimization algorithm of 0-1 knapsack problem based on absolute greedy and expected efficiency
LV Jian-hui;,SHI Lan;,ZHANG Yi-hong;
..............page:684-687
Hybrid model based on wavelet transform and ARIMA for short-term electricity price forecasting
NIU Li-xiao;,SHANG Wen-li;,WANG Zheng-fang;,ZANG Chuan-zhi;,ZHANG Sheng-shan;
..............page:688-691
Study on tourism flow forecast: based on seasonal adjustment’ PSO-SVR model
LI Ling-yan;,WENG Gang-min;
..............page:692-695
Group recommendation algorithm for online community users
GUO Jun-peng;,ZHAO Meng-nan;
..............page:696-699
Discovering topic from Chinese microblog based on hidden topics analysis
CHEN Xing-shu;,SHI Jian-hong;,WANG Wen-xian;
..............page:700-704
Research on optimization of job scheduling based onmulti-queue for Hadoop platform
DAI Bin;,HE Yi-zhou;,LI Chun-yan;
..............page:705-707,738
Dynamic ensemble selection algorithmbased on constraint score
CHEN Rui;,HUANG Shu-guang;,HUANG Wen;,ZHANG Liang;
..............page:708-712
K-means text clustering algorithm based on initial cluster centers selection according to maximum distance
DING Feng;,GAO Fei;,YU Jiang;,YU Lei;,ZHAI Dong-hai;
..............page:713-715,719
Mining frequent items in uncertain dataset using compressed UF-tree
CHEN Chao-quan;,HUANG Jia-huan;,JIANG Yun-hui;
..............page:716-719
Approximation algorithm for frequent itemsets mining on uncertain dataset
WANG Le;,WANG Shui;,ZHU Kong-tao;
..............page:725-728
MVDR algorithm for wideband coherent signals based on data reconstruction
BIAN Hong-yu;,WANG Jun-lin;
..............page:729-730,734
Iterative algorithm for corridor vanishing point detection and tracking
WANG Heng-sheng;,ZHANG Qiang;
..............page:735-738
Research on similarity mapping algorithm for high-speed Ethernet
CAO Bing-yao;,CHEN Jian;,YAN Ke;,ZHENG Yue;
..............page:739-743
Evaluation and improvement method on division of community structure in network
WANG Heng-shan;,WU Peng;
..............page:744-746,752
Clustering analysis on climate data of red-crowned crane breeding distribution area in Northeast China
PENG Li-tan;,TANG Xu-qing;,YAN Han-bing;
..............page:747-752
New denoising method for speech signal based on wavelet entropy and adaptive threshold
CHEN Xiao-juan;,JIA Ming-chao;,SONG Na;,WANG Wen-ting;
..............page:753-755
Research and application of regional population attributes analysis based on mobile network signaling
LIN Ju-ting;,LUO Jiang-tao;,SHEN Ze;,SHU Zhong-ling;,ZHOU Yun-feng;
..............page:756-759
Research of algorithms for vertex-distinguishing edge coloring of graphs
CHEN Zhi-peng;,LI Jing-wen;,SUN Liang;,ZHANG Yun-han;
..............page:760-764
Uncertain continuous time series Top-◢K◣ anomaly detection method
CHANG Yu-hu;,MENG Fan-rong;,YAN Qiu-yan;,YAO Yan-xu;
..............page:765-768
Research of subjective trust evaluation model based on fuzzy theory
GAN Gang;,SUN Guang-hua;
..............page:769-772
Profitability analysis of third-party Internet payment platform
SHUAI Qing-hong;,YANG Ling;
..............page:773-775
Method of real-time traffic statistics using mobile network signaling
LIN Ju-ting;,LUO Jiang-tao;,SHU Zhong-ling;,WU Song;,ZHOU Yun-feng;
..............page:776-779
Dynamic position detection method for large rotary parts based on IMM
FENG Xin;,GU Wen-tao;,LI Zhou-yang;,ZHOU Shao-wei;
..............page:780-783
Location algorithm based on RKNN and its applications
LIU Tian-bo;,SUN Huan-liang;,XU Jing-ke;,YU Ge;
..............page:789-791,795
Topic detection model based on Bayesian belief network
SUN Xiao-lei;,WU Shu-fang;,XU Jian-min;
..............page:792-795
Complex network based simulation model for transportationnetwork congestion evaluation
LIU Ying-hua;,YANG Liu-qing;,ZONG Gang;
..............page:796-800
Modeling and simulation of left-turn vehicle collision avoidance behavior in intersection
AN Yi-sheng;,HE Bing-hua;,SHANG Long-hua;,ZHAO Xiang-mo;
..............page:801-803
Research on recommendation algorithm by fusing social network and trust
HU Yun;,LI Hui;,MA Xiao-ping;,SHI Jun;
..............page:808-810
Vulnerability assessment based on correlation
FENG Bo;,ZHANG Feng-li;
..............page:811-814
Assessment of vulnerability threat based on fuzzy theory
GAO Ling;,GAO Xue-ling;,HE Lin;,MA Chi;,SUN Qian;
..............page:815-818,824
Data anonymization based on restriction of information gain ratio:method and evaluation
GU Xiao;,XIONG Ping;,ZHU Tian-qing;
..............page:819-824
Efficient identity-based signature scheme from lattices
LI Ming-xiang;,LIU Yang;,ZHAO Xiu-ming;
..............page:825-828
Ancilla-driven universal blind quantum computation
LI Shun-dong;,XUE Dan;,YANG Chen;
..............page:829-831,838
Data hiding based on disk slack space
JIANG Zi-feng;,NIU Xiao-peng;,WANG Wei;,ZENG Guang-yu;
..............page:839-842,845
Differential power analysis attacks on PRESENT
JIAO Ge;,LI Ken-li;,LI Lang;,LI Ren-fa;,WANG Yi;,ZOU Yi;
..............page:843-845
Steganalysis of LSB matching based on neighborhood correlation of pixels
LEI Yu;,WU Song;,ZHANG Min-qing;
..............page:846-849
Reversible data hiding method with large embedded capacity
QIU Ying-qiang;
..............page:850-852,856
Implementation of reconfigurable of DES and SM4 encryption algorithm
GUO Pei-yuan;,HE Duo-duo;,WU Xiao;
..............page:853-856
Socially aware multiple-copy opportunistic routing protocol for VANETs
LUO Guang-chun;,QIN Ke;,SUN Hai-feng;
..............page:857-859,887
Energy-efficient data gathering algorithm with speed control
GUO Song-tao;,LIU Rui-chao;
..............page:860-865
Ubiquitous data collection protocol for maximizing lifetime of WSN
CHEN Yan;,LIANG Jun-bin;,WU Wen-kang;,ZHANG Shang-shang;
..............page:866-871
Load balancing algorithm based on probability for Ad hoc networks
HOU Yan;,WANG Feng-chun;,WANG Hua-dong;
..............page:872-875
Iterative location algorithm for LTE mobile station under NLOS environment
GAO Feng;,GAO Ze-hua;,YAN Long;
..............page:876-878
Method support correlation-service with Web service selection
HAN Lu;,HE Jing;,PAN Shan-liang;
..............page:879-883
Data aggregation scheduling algorithm with uniform power control
LI Xiang-bao;,LIU Wen-bin;,WEN Zhi-qiang;,YANG Bo;
..............page:888-891,897
Clustering data gathering scheme based on hybrid CS in WSN
SHI Dong-sheng;
..............page:892-897
Modeling for overlay network topology based on multivariable tradeoff
LIU Yuan-ni;,TANG Hong;,ZHAO Guo-feng;
..............page:898-900
Optimum sensor allocation in distortion tolerant wireless sensor network
LUO Kan;,WANG Hua;
..............page:901-904
Virtual potential field based coverage optimization algorithm for directional sensor networks
DAI Ning;,DUAN Shao-mi;,FU Li-xia;,MAO Jian-lin;,QIAO Guan-hua;
..............page:905-907
Research on dispatching and management model based onsafe performance interface
CHEN Bin;,ZHANG Lei;
..............page:908-911,916
Resource allocation scheme based on coalitional game model in mobile cloud computing
LIU Ming;,LIU Yuan-jun;,PENG Zi-ran;,ZHU Cong;
..............page:912-916
Research of rapid eye movement recognition algorithm
DAI Shu-guang;,MU Ping-an;,NI Yi-wen;
..............page:917-920
Fused monogenic binary pattern combined with spatial saliency for facial emotion classification
JIANG Xiao-liang;,LI Bai-lin;,LIU Jia-jia;,WANG Kai;,XIONG Ying;,YUAN Jian-ying;
..............page:921-925
Method of ghost suppression based on similarity measure
HE Yu-feng;,LI Jia-tian;,LI Xiao-juan;
..............page:926-928,932
Real-time tracking using multi-feature weighting based on compressive sensing
WANG Song-lin;,XIANG Xin-guang;
..............page:929-932
Novel minimum distance clip method based on color space for video coding
FAN Tao;,LI Ya-ke;,WANG Guo-zhong;,ZHAO Hai-wu;
..............page:933-936,941
A video-data-driven method to generate water surface models
CHEN Cong;,WANG Qing;,XIAO Zhao-lin;
..............page:942-945,948
Point cloud simplification technology of 3D optical measurement applied on reverse engineering
BAI Dai-ping;,CUI Guo-ying;,LI Yan-qin;,YANG Yong;,ZHANG De-hai;,ZHANG Xiao-qiang;
..............page:946-948
Head-shoulder detection based on LW-PGD and SVM in video
GUO Xu;,QIN Shuang;,RAO Qin;,XIE Gang;,ZHANG Wen-hui;
..............page:949-952
Hand gesture recognition based on combining Hu moments and BoF-SURF support vector machine
GUO Yuan-shu;,SUI Yun-heng;
..............page:953-956,960
Research of classification method for natural images based on adaptive feature-weighted K-nearest neighbors
HAO Lu-wei;,HOU Yu-ting;,PENG Jin-ye;,WANG Rui;
..............page:957-960