Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2016 Issue 10
Data preprocessing based recovery model in wireless meteorological sensor network
WANG Jun;,YANG Yang;,CHENG Yong;
..............page:2647-2652,2658
Node localization based on improved flooding broadcast and particle filtering in wireless sensor network
ZHAO Haijun;,CUI Mengtian;,LI Mingdong;,LI Jia;
..............page:2659-2663,2669
Throughput analysis and optimization of MAC protocol with multiple rates in mobile Ad Hoc network
ZHU Qingchao;,CHEN Jing;,GONG Shuiqing;
..............page:2664-2669
Sensor network clustering algorithm with clustering time span optimization
LIANG Juan;,ZHAO Kaixin;,WU Yuan;
..............page:2670-2674
Adaptability of light source array simplification in wireless optical access network
XU Chun;,GUO Wenqiang;,GUNIMIRE Awudan;
..............page:2675-2679
Fairness-optimized resource allocation method in cloud environment
XUE Shengjun;,HU Minda;,XU Xiaolong;
..............page:2686-2691
Energy-aware fairness enhanced resource scheduling method in cloud environment
XUE Shengjun;,QIU Shuang;,XU Xiaolong;
..............page:2692-2697
Virtual machine dynamic consolidation method based on adaptive overloaded threshold selection
YAN Chengyu;,LI Zhihua;,YU Xinrong;
..............page:2698-2703,2709
Resource allocation framework based on cloud computing package cluster mapping
LU Haoyang;,CHEN Shiping;
..............page:2704-2709
Distributed power iteration clustering based on GraphX
ZHAO Jun;,XU Xiaoyan;
..............page:2710-2714
Cloud outsourcing private set intersection protocol based on garbled Bloom filter
ZHANG En;,LIU Yapeng;
..............page:2723-2727,2732
Cloud service behavior trust model based on non-interference theory
XIE Hong'an;,LIU Dafu;,SU Yang;,ZHANG Yingnan;
..............page:2728-2732
Revocable fuzzy identity based encryption scheme over ideal lattice
XIANG Wen;,YANG Xiaoyuan;,WU Liqiang;
..............page:2733-2737
Provably secure undeniable signature scheme based on identity
WANG Xiong;,DENG Lunzhi;
..............page:2738-2741,2746
Adaptive asynchronous and anti-noise secure communication scheme based on hyper-chaotic Lorenz system
ABDURAHMAN Kadir;,MIREGULI Aili;,MUTALLIP Sattar;
..............page:2742-2746
Outsourced attribute-based encryption for general circuit from multilinear maps
CHEN Fei;,HAN Yiliang;,LI Xiaoce;,SUN Jiahao;,YANG Xiaoyuan;
..............page:2747-2752,2757
Anonymized data privacy protection method based on differential privacy
SONG Jian;,XU Guoyan;,YAO Rongpeng;
..............page:2753-2757
Improved certificate-based aggregate proxy signature scheme
ZUO Liming;,GUO Hongli;,ZHANG Tingting;,CHEN Zuosong;
..............page:2758-2761,2766
Efficient identity-based anonymous broadcast encryption scheme in standard model
MING Yang;,YUAN Hongping;,SUN Bian;,QIAO Zhengyang;
..............page:2762-2766
Review helpfulness based on opinion support of user discussion
LI Xueming;,ZHANG Chaoyang;,SHE Weijun;
..............page:2767-2771,2776
Micro-blog new word discovery method based on improved mutual information and branch entropy
YAO Rongpeng;,XU Guoyan;,SONG Jian;
..............page:2772-2776
Collaborative filtering algorithm based on trust and item preference
ZHENG Jie;,QIAN Yurong;,YANG Xingyao;,HUANG Lan;,MA Wanzhen;
..............page:2784-2788,2798
Micro-blog recommendation algorithm by combining tag and artificial bee colony
WANG Ningning;,LU Ran;,WANG Zhihao;
..............page:2789-2793
Chinese word segment based on character representation learning
LIU Chunli;,LI Xiaoge;,LIU Rui;,FAN Xian;,DU Liping;
..............page:2794-2798
Adaptive tracking control and vibration suppression by fuzzy neural network for free-floating flexible space robot with limited torque
PANG Zhenan;,ZHANG Guoliang;,YANG Fan;,JIA Xiao;,LIN Zhilin;
..............page:2799-2805,2821
Method of program path validation based on satisfiability modulo theory solver
REN Shengbing;,WU Bin;,ZHANG Jianwei;,WANG Zhijian;
..............page:2806-2810
Android GUI traversal method based on static analysis
TANG Yang;,ZENG Fanping;,WANG Jiankang;,HUANG Xinyi;
..............page:2811-2815
Testing data generation method based on fireworks explosion optimization algorithm
DING Rui;,DONG Hongbin;,FENG Xianbin;,ZHAO Jiahua;
..............page:2816-2821
Bilinear image similarity matching algorithm based on deep feature analysis
LI Ming;,ZHANG Hong;
..............page:2822-2825,2831
Supervised active contour image segmentation by kernel self-organizing map
FAN Haiju;,LIU Guoqi;
..............page:2832-2836,2841
Adaptive shadow removal based on superpixel and local color constancy
LAN Li;,HE Xiaohai;,WU Xiaohong;,TENG Qizhi;
..............page:2837-2841
Realistic real-time rendering method for translucent three-dimensional objects
WEN Peizhi;,ZHU Likun;,HUANG Jia;
..............page:2842-2848
Multi-channel real-time video stitching based on circular region of interest
WANG Hanguang;,WANG Xuguang;,WANG Haoyuan;
..............page:2849-2853,2858
Fast intra-depth decision algorithm for high efficiency video coding
LIU Ying;,GAO Xueming;,LIM Kengpang;
..............page:2854-2858
Local motion blur detection based on energy estimation
ZHAO Senxiang;,LI Shaobo;,CHEN Bin;,ZHAO Xuezhuan;
..............page:2859-2862,2869
K-nearest neighbor searching algorithm for laser scattered point cloud
ZHAO Jingdong;,YANG Fenghua;
..............page:2863-2869
Two-person interaction recognition based on improved spatio-temporal interest points
WANG Peiyao;,CAO Jiangtao;,JI Xiaofei;
..............page:2875-2879,2884
Gesture feature extraction of depth image based on curvature and local binary pattern
SHANG Changjun;,DING Rui;
..............page:2885-2889,2894
Hemorrhagic feature extraction based on different color channels in fundus images
NI Sen;,FU Dongmei;,DING Ye;
..............page:2890-2894
Regularized robust coding for tumor cell image recognition based on dictionary learning
GAN Lan;,ZHANG Yonghuan;
..............page:2895-2899,2906
Motion parameter extraction algorithm for pigs under natural conditions
FENG Aijing;,XIAO Deqin;
..............page:2900-2906
Fast flame recognition approach based on local feature filtering
MAO Wentao;,WANG Wenpeng;,JIANG Mengxue;,OUYANG Jun;
..............page:2907-2911
Defect detection of small hole inner surface based on multi-focus image fusion
NIU Qunyao;,YE Ming;,LU Yonghua;
..............page:2912-2915,2921
Statistical iterative algorithm based on adaptive weighted total variation for low-dose CT
HE Lin;,ZHANG Quan;,SHANGGUAN Hong;,ZHANG Wen;,ZHANG Pengcheng;,LIU Yi;,GUI Zhiguo;
..............page:2916-2921
Automatic positioning and detection method for jewelry based on principal component analysis
JIA Yulan;,HUO Zhanqiang;,HOU Zhanwei;,WANG Zhiheng;
..............page:2922-2926
Whole parameters estimation for linear frequency modulation pulse based on partial correlationtle
WANG Sixiu;,XU Zhou;,WANG Xiaojie;,WANG Jianghua;
..............page:2927-2932,2939
Aircraft stands assignment optimization based on variable tabu length
LI Yaling;,LI Yi;
..............page:2940-2944