Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2013 Issue 2
Optimization of acoustic model for Uyghur continuous speech recognition
Nurmemet Yolwas;Wushour Silamu
..............page:145-147
Wideband spectrum sensing in dynamic allocation mode
ZHANG Peng;ZHAO Zhijin;SHANG Junna
..............page:109-112,140
Application research of over-sampled chaotic maps in voice communication
LIU Shucong;YANG Jingsong;SONG Yanxing
..............page:119-121,129
Research on feature extraction and classification of apples' near infrared spectra
BU Xibin;WU Bin;JIA Hongwen
..............page:170-173,193
Self-adaption segmentation algorithm for line extraction based on laser sensor
XU Jun;ZHANG Guoliang;WANG Junlong
..............page:43-47
Application of counterpropagation proeess neural network in well fault diagnosis
ZHANG Qiang;XU Shaohua;LI Panchi
..............page:9-12
Multivariate branching chaotic signature system
SUN Xiaoyan;ZHANG Maosheng;ZHU Xiaoshu;LI Shuoming
..............page:97-99,125
Novel kernel-based nonlinear discriminant analysis
XUE Sizhong;CHEN Xiuhong
..............page:181-183
Efficient frequent pattern tree structure over data streams
TAN Jun;BU Yingyong;CHEN Aibin
..............page:152-154
Limit properties of entropy density of nonnegative continuous information source
WANG Xuewu;ZHOU Xiangfeng;WANG Tong
..............page:86-88
Dynamic energy-efficient scheduling algorithm based on homogeneous multicore system
YUAN Long;YANG Pin;LIANG Gang;LI Chiyun
..............page:76-79
Method for radar coverage fusing based on projective grid
LIU Yanjun;LIAO Ruotong;QIAO Shidong
..............page:177-180
Key management scheme for post-disaster road monitoring system
SUN Xiaoling;SUN Xuguang;LI Shanshan;CHEN Fuming;YANG Qiuge
..............page:130-133
Improved hierarchical K-means clustering algorithm
HU Wei
..............page:157-159
Algorithm for finite element mesh generation based on sweeping
ZENG Zhuo;CHEN Jiaxin
..............page:219-221
System design against spam message disguised with homonym
HU Demin;Hu Jinlong
..............page:92-96
Matching in description logic εLN
ZHANG Wei;YU Quan;WANG Ju;JIANG Yuncheng
..............page:48-52
Approach for topical sentence extraction based on model LDA.
WANG Li;LI Peifeng;ZHU Qiaoming
..............page:160-164,257
WSN energy management model based on multiple mobile Agent
DANG Xiaochao;YAO Haohao
..............page:100-104,236
Energy efficient multi-sink relocation in wireless sensor networks
YUAN Tiantian;XU Jingdong;ZHANG Jianzhong
..............page:19-23
Application of PSO-SVM information fusion in wide area backup protection
ZHANG Bin;JIAO Yuanzhao;DONG Haiying;SHENG Yi
..............page:165-169
Multi-feature image retrieval method based on K-means clustering segmentation
ZENG Jiexian;WANG Junting;FU Xiang
..............page:226-230
Capacity analysis of compound channel for distributed MIMO system
LIU Wei;WANG Qing
..............page:137-140
Image signal design method based on three error components
MING Jun;WANG Yiying;YANG Yang
..............page:234-236
Personal recommendation algorithm with customer preference model and BP neural networks
XIN Juqin;JIANG Yan;SHU Shaolong
..............page:57-60,96
Applying Gaussian process based on median filtering in 3G network performance prediction
HUANG Liping;SUN Yongxiong;SHEN Chen
..............page:126-129
Focus-guided multi-scale Retinex with color restore algorithm
DOU Yiwen;ZHOU Mingzheng;TANG Ganyi;LU Guifu
..............page:207-210,270
Application of association rules in stock plate cointegration analysis
ZHANG Jianlin;ZHOU Chaoliang
..............page:242-245
Interval-valued intuitionistic fuzzy rough sets based on coverings
WANG Yanping;SUN Jing;CHEN Meiwei
..............page:155-156,218
Multicast routing optimization based on immune Memetic algorithm
HU Min;HU Bo;HUANG Hongmei
..............page:105-108
Efficient key establishment scheme for sensor networks
LI Sujun;ZHOU Boqing;YANG Siqing
..............page:134-136,151
GSV-SVM based language recognition system
LIANG Chunyan;AN Maobo;LIU Zhenye;SUO Hongbin;WANG Junjie
..............page:174-176,180
Research on classification for imbalanced dataset based on improved SMOTE
WANG Chaoxue;PAN Zhengmao;DONG Lili;MA Chunsen;ZHANG Xing
..............page:184-187,245
Based on PTPd improved high-precision clock synchronization
SONG Shengjin;XU Yonghui;JIANG Shouda
..............page:72-75,85
Analysing and improving security of Zeroconf networks
ZHOU Yimin;SHEN Jiajie
..............page:141-144
Research on software defect list: prediction method based on grey relational analysis
DONG Shaoyang;XIA Qingguo;LI Ning
..............page:67-71
Feature extraction for Korean pine male and female flowers based on contours
ZHANG Junqing;SU Jianmin
..............page:231-233,251
Semantic SOA framework orient to aviation repair
XU Feng;ZHANG Shusheng
..............page:34-38
ENO scheme based on interpolation of radial basis function
LIU Li;ZHAO Fengqun
..............page:53-56
High dimensional image feature matching based on sub-vector distance indexing
ZHAO Song;MA Ronghua;CAO Haiwang;YANG Heng
..............page:237-241,264
Application of differential evolution algorithm in wind power integrated system
KUANG Honghai;WU Zhengqiu;LI Shengqing;LI Junjun
..............page:39-42,56
Exploiting multiple semantic features for comment text topic clustering
LI Yahong;WANG Suge;LI Deyu
..............page:188-193
Model for case retrieval in CBR system based on extenics
JIA Yanhua;MO Rong;YANG Haicheng;WANG Weizhen
..............page:258-260
Research on segmentation of historical Chinese books
NI Enzhi;JIANG Minjun;ZHOU Changle
..............page:29-33,38
Product recommendation based on CTM-PMF model
PENG Jiangping
..............page:1-4,8
Decision-making analysis of multinational supply chain under disruption
PANG Guoying;WEI Jie
..............page:252-257
EEG-MUSIC source localization in a stable noise environment
LONG Junbo;WANG Haibin;ZHA Daifeng
..............page:122-125
Member ID-based group signature with online extractors
LIU Xin
..............page:113-118
Network intrusion clustering method based on improved LDA and CNN
TAN Lizhi;LI Erxi;OUYANG Aijia;HE Minghua;ZHOU Xu
..............page:89-91,108
Analysis and simulation of enterprise's ERP failure based on FTA
CHENG Youming;HU Wei;GUI Yunmiao
..............page:246-251