Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2017 Issue 1
Survey of data provenance security
Shi Libo;,Sun Lianshan;,Wang Yixing;
..............page:1-7
Survey on traffic features in Internet traffic classification
Liu Zhen;,Wang Ruoyu;,Cai Xianfa;,Tang Deyu;
..............page:8-14,41
Research on classification of subjective-object semantic classes
Li Tingyu;,Wang Ya;,Cao Cong;,Zhang Zaiyue;,Cao Cungen;
..............page:15-20
New framework based on SLP
Zhang Suping;,Wang Dong;,Ding Lili;,Wang Pengxiang;,Gong Yi;,Yu Haining;
..............page:21-26
Event-triggered consensus control of second-order multi-agent systems
Huang Hongwei;,Huang Tianmin;,Wu Sheng;
..............page:27-30
Risk averse closed-loop supply chain coordination mechanism with rebate and penalty contracts under emergency events
Huo Liang’an;,Jiang Jiehui;,Zhao Yuping;,Chen Binbin;
..............page:31-35
Urban community classification algorithm based on cloud aggregation theory
Gu Hongbo;,Xu Minghai;,Xi Jiejie;,Wu Jing;
..............page:36-41
Prediction method of global transportation network flow with cellular automata
Zhang Fengqin;,Wang Mengfei;,Guan Hua;,Li Xiaoqing;,Chen Dawu;,Chen Guirong;
..............page:42-45
Efficient parallel algorithm for linear RankSVM on multi-core systems
Nie Hui;,Peng Jiao;,Jin Jing;,Li Kangshun;
..............page:46-51,57
Dynamic resource awareness framework for parallel fuzzing
Lian Mei;,Zou Yanyan;,Huo Wei;,Zou Wei;
..............page:52-57
Microblog recommendation algorithm based on user’s tag
Wang Ningning;,Lu Ran;,Wang Zhihao;,Liu Chengyun;
..............page:58-61
Research on component evolving model based on high-orderπcalculus
He Haiyang;,Li Qiang;,Yu Xiang;,Han Xiangyu;
..............page:67-74
Path tracking method of unmanned surface vehicle with two fixed propellers under wave disturbance
Zheng Tiqiang;,Wang Jianhua;,Zhao Mengkai;,Wu Gongxing;
..............page:75-78
PID control strategy of tractor driving anti slip control based on improved PSO algorithm
Cheng Zhun;,Lu Zhixiong;,Tang Di;,Jiang Chunxia;,Zhou Jing;
..............page:83-86
Optimization method of integrate deep learning into PLS
Zhu Zhipeng;,Du Jianqiang;,Yu Riyue;,Nie Bin;,Yu Fang;
..............page:87-90
Short-term traffic flow prediction based on deep learning
Luo Xianglong;,Jiao Qinqin;,Niu Liyao;,Sun Zhuangwen;
..............page:91-93,97
Prediction of PLK1 PBD activity based on deep learning
Gao Shuangyin;,Tian Shengwei;,Yu Long;,Shi Xinyu;
..............page:94-97
New regenerating codes reducing repair bandwidth by replication
Ding Bingchen;,Li Weizhong;
..............page:102-106
Attribute reduction method based on enhanced positive region
Shi Bowen;,bLi Guohe;,Wu Weijiang;,Hong Yunfeng;,Zhou Xiaoming;
..............page:107-109,127
Decision-theoretic rough set based on incomplete interval-valued information system
Zhang Xin;,Li Xuwu;,Lu Yanli;,Chen Yujin;
..............page:110-113,122
Agglomerative hierarchical clustering based on ant colony optimization algorithm
Lyu Lin;,Wei Yongqing;,Ren Min;,Pan Xiao;
..............page:114-117
Multi-label CRF based method for disease extraction
Wang Pengyuan;,Ji Donghong;
..............page:118-122
Topic information extraction of history evolution based on PAM and topical TextRank
Tian Changbo;,Lin Min;,Siriguleng;
..............page:123-127
Fuzzy session association rule mining algorithm based on time decay model
Yang Yingjie;,Qiu Wei;
..............page:128-131,140
Topic mining based on U_BTM model in social networks
Li Lei;,Zhu Yuting;,Shi Huaji;,Zhou Conghua;
..............page:132-135,146
Research on important places identification method based on improved CFSFDP algorithm
Ma Chunlai;,Shan Hong;,Ma Tao;,Zhu Lixin;
..............page:136-140
Research on effect of entities semantic information on Chinese entity relation extraction
Duan Liguo;,Xu Qing;,Li Aiping;,Cui Minjun;
..............page:141-146
Improved SNM algorithm based on length filtering and dynamic fault-tolerance
Liu Yasi;,Cheng Li;,Li Xiao;
..............page:147-150,155
Multi-agent based artificial immune network algorithm for data classification
Hong Ming;,Liu Peizhong;,Luo Yanming;
..............page:151-155
Research on NoC mapping based on quantum ant colony algorithm
Fan Shaocong;,Liu Yijun;
..............page:156-159,169
New kind of carrier frequency offset estimation algorithm for OFDM systems
Yu Kanmin;,Huang Yang;,Yang Xiaopeng;,Liu Mingzhen;
..............page:160-162
Pseudo-code acquisition algorithm based on MF-FRFT
Huang Mingjun;,Wang Yongmin;,Niu Jiahong;
..............page:163-165
Study on datagram source address validation solution in SAVI DHCPv6
Huang Shenglin;,Lyu Fengchang;,Wang Wei;
..............page:166-169
Research on network topology density control based on stochastic geometry
Wang Zhen;,Kang Lin;,Shan Hong;,You Jingwen;
..............page:170-172,176
Study full-view of strong barrier coverage based on heterogeneous nodes
Guo Kaidong;,Feng Xiufang;
..............page:173-176
Target coverage scheme for WSN based on LA algorithm and node power adaptive adjustment
Jin Qiu;,Pei Fei;,Lin Fu;
..............page:177-180,185
Research on wireless sensor networks clustering algorithm based on K-means++
Yu Xiuya;,Liu Dongping;,Yang Jun;
..............page:181-185
Routing strategy for complex networks based on traffic gravitational field
Luo Kaitian;,Liu Gang;
..............page:194-196,210
Game-based hybrid routing algorithm in software defined networking
Ren Zerong;,Chen Shuqiao;,Fang Xinwei;,Jiang Yiming;
..............page:197-201
Channel assignment algorithm for wireless Mesh network based on Lagrange dual optimization and PSO
Zheng Jinfang;,Shao Quanyi;,Zhi Jianhong;
..............page:202-205,213
Packet forwarding protocol in coal mine opportunistic networks based on terminal attribute
Zou Yanfang;,Yu Hongyi;,Li Qing;,Liu Jianhui;
..............page:206-210
Novel blind estimation method of number of OFDM subcarriers
Zhang Haichuan;,Lei Yingke;
..............page:211-213
Identity-based broadcast encryption from ideal lattice
Xiang Wen;,Yang Xiaoyuan;,Wu Liqiang;
..............page:217-220,245
Integral cryptanalytic on reduced-round of CAST-256
Zheng Xiangqian;,Zhang Wenying;,Xiao Zhen;,Li Qingqing;
..............page:221-223
Dynamic type-based proxy re-encryption scheme based on lattice
Li Zichen;,Zhang Yulong;,Yang Yatao;
..............page:224-228
Analysis of PRESENT block cipher based on MILP
Wang Heng;,Zhang Wenying;
..............page:229-232
Moving target defense approach of HSS
Zhao Xing;,Tang Hongbo;,Wang Wenbo;,Zhao Yu;
..............page:238-241,260
Ideal lattice-based oblivious transfer protocol of provably secure
Li Zichen;,Zhang Yaze;,Zhang Fengjuan;,Yang Yatao;
..............page:242-245
Cube test and analysis for reduced SIMON family of block ciphers
Wan Liuchan;,Wei Yongzhuang;
..............page:246-250
Based on tag's ID wireless key generation for RFID system algorithm
Zhang Zhaohui;,Liu Yue;,Liu Daowei;
..............page:261-263,269
Foreground seeds generation algorithm based on hierarchical grouping used in parametric min-cut
Zhu Junguang;,Ji Lixin;,Li Shaomei;,Gao Chao;
..............page:264-269
Object tracking on weighted super pixel level spatio-temporal context
Wang Shumin;,Gong Ningsheng;,Chen Yitao;
..............page:270-274
Equivalence partitioning anti-aliasing algorithm for ray tracing
Cao Xiaopeng;,Han Jungang;
..............page:275-278
Method of image registration based on ZM phase feature description
Zheng Kouquan;,Yang Wenjing;,Zhang Jizhou;,Lei Yingjie;,Wei Qiang;
..............page:279-282
Guided image filter and application based on adaptive fractional-order differential
Xie Wei;,You Min;,Zhou Yuqin;
..............page:283-286,301
Movie summarization method based on audio-visual feature fusion
Luan Xidao;,Xie Yuxiang;,Li Chen;,Niu Xiao;
..............page:287-289
Method for pulmonary nodules segmentation based on low dose CT images
Hei Xiaoji;,Jiang Huiqin;,Ma Ling;,Yang Xiaopeng;,Liu Yumin;
..............page:290-294
Conformal extension of cubic uniform B-spline curve
Yan Lanlan;,Han Xuli;
..............page:295-301
Human action recognition method based on spatio-temporal image segmentation and interactive area detection
Zhang Jie;,Wu Jianzhang;,Tang Jiali;,Fan Honghui;
..............page:302-305,320
Velocity estimation method and simulation of motion marine target based on computer vision
Sun Shaojie;,Yang Xiaodong;
..............page:306-309,313
Infrared image enhancement based on human visual properties
Chen Hongyu;,Hui Bin;,Chang Zheng;,Luo Haibo;
..............page:310-313
Blind image forgery detection method based on noise variance estimation
Li Hang;,Zheng Jiangbin;
..............page:314-316
Lossy image compression using SVD and Contourlet transform
Chen Yaxiong;,Huang Zhangcan;,Feng Lei;
..............page:317-320