Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 4
Application and research of light-weight medical diagnosis system based on virtual machine
bao jing hai ; gong wen feng ; huang an jia ; liang jia hai
..............page:1394-1396
Automatic generation of path test data based on GA-PSO
zhou hong ; zhang sheng ; liu lin zuo ; cai hong
..............page:1366-1369
Self-adapting search space chaos-artificial bee colony algorithm
bao li ; zeng jian chao
..............page:1330-1334
Universal approximation of typical fuzzy systems with generalized linear membership function
huang wei hua ; fang kang ling ; zhang zheng ; chen shi jie
..............page:1263-1265,1269
3D mesh segmentation based on granularity of quotient space theory
shi xiao jing ; han zuo
..............page:1598-1600
Research of eye tracking method based on Kanade-Lucas optical algorithm
yang jing dong ; yang jing hui ; cai ze su
..............page:1575-1577
Design and implementation of Chinese character CAPTCHA based on multi-transfigure feature
dai ru yi ; ai li rong ; gao hai chang
..............page:1508-1510
Ultra wide-band communication system based on time-reversed approach
zhang chao xia ; duan yue xing ; zhao qing hua ; wang hua kui
..............page:1441-1443,1447
Research on discrete-type software reliability demonstration testing
jiang meng zuo ; li qiu ying
..............page:1363-1365
Multi-layer random stimulus strategy for microprocessor verification
zhang xin ; huang kai ; meng jian zuo ; yin liao ; yan xiao lang ; ge hai tong
..............page:1284-1288
RBAC-based trusted access control model for grid
huang gang ; wang ru chuan ; tian kai
..............page:1473-1476,1495
Optimization of replication strategy based on transport cost in grid environments
zhao qiu yun ; luo sheng xian ; wei le
..............page:1444-1447
Multi-cross signal timing based on particle swarm optimization algorithm
zhang lan ; lei xiu juan ; ma qian zhi
..............page:1252-1254,1292
Ant colony algorithm design of intercrossing affected double variable for continuous optimization problem
yuan jian yi ; gong quan mei ; zhou shun hua
..............page:1242-1245
Entropy-based anomaly detection method for education network
chen zuo qi ; wang juan
..............page:1434-1436
DiffServ marking method providing per flow QoS guarantee in MPLS networks
liu nian bo ; liu ming ; wu lei ; zeng jia zhi
..............page:1422-1426
Study and implementation of algorithm for reachable multi-path transfer of rail transit\'s last trains
peng yi bing ; su hou qin ; he jin chuan
..............page:1373-1375,1379
Stable serial optimal and parallel algorithm of point-in-polygon test
hao jian qiang ; gong yun zhan ; ye hong
..............page:1342-1348
Model of recommended courses based on collaborative filtering
zhou li juan ; xu ming sheng ; zhang yan yan ; zhang zuo
..............page:1315-1318
Algorithmic research on fast reconstruction from large point clouds with holes
tian jian lei ; liu xu min ; guan yong
..............page:1544-1546
Solving complementarity problem based on maximum-entropy differential evolution algorithm
yong long quan ; chen tao ; zhang jian ke
..............page:1308-1310,1338
Research on knowledge management of paroxysmal public crisis based on super-network
li zhi hong ; wang hai yan ; zhou guang gang
..............page:1319-1322
Ant colony algorithm with division-cooperation of labor and weight
liu wen yuan ; yuan fang ; sun de jie
..............page:1239-1241
Fact-oriented conceptual modeling: survey
pan wen lin ; liu da zuo
..............page:1227-1231
Application of immune genetic algorithm in wave impedance inversion
nie ru ; yue jian hua ; deng shuai qi
..............page:1273-1276
New iterative algorithm for regularized image restoration with variable step length
hu xue gang ; wu yong ; liu yan
..............page:1572-1574,1597
Discretizing three-dimensional wind field for falling snow simulation based on D3bQ15 lattice
lv meng ya ; wang juan ; tang yong ; wang li jun ; dai jun li
..............page:1566-1568,1583
Face recognition approach based on symmetrical scatter matrix space
duan xu ; zhang zuo li
..............page:1557-1559
Fast and high sensitivity focusing evaluation function
li yu feng ; chen nian nian ; zhang jia cheng
..............page:1534-1536
Workflow dynamic authorization model with task-role-based access control
yang tian zuo ; dong hong lin ; huang qin ; liu yi liang
..............page:1511-1513
Transformed coefficient reuse in adaptive block-size transform scheme for H.264/AVC encoder
qi hong gang ; huang qing ming ; deng lei ; yin hai bing ; chen zuo
..............page:1540-1543
Adaptive particle filtering for dynamic Bayesian networks inference based on local sample method
qi wei ; wang hao ; yao hong liang
..............page:1304-1307
Video scene segmentation based on dominant color tracking and mass-center moving
yin yong ; wang xu jun
..............page:1563-1565
Improved multi-objective evolutionary algorithm based on objective-space-divided
ren chang an ; li zhi yong ; chen you wen
..............page:1311-1314,1318
Weighted threshold secret sharing scheme based on Mignotte sequence
yang yu ; hou zheng feng
..............page:1505-1507
Dynamic password scheme based on quadratic residues
jia shu hong
..............page:1503-1504,1507
Active authorization rules for enforcing RBAC with spatial characteristics
tang zhu ; ju shi guang ; chen wei he
..............page:1496-1499,1502
Implementation of ITU-T G.723.1 speech codec on TMS320C50
zhu rong ; hu rui min ; chang jun ; wang zhong yuan
..............page:1400-1402
Study of emergency resource ontology model
gao shan ; zhang jian zuo ; dong cun xiang ; zhang xian kun ; du lei ; wang wen jun
..............page:1349-1351,1369
Image fusion technique based on combination of Iαβ color space and Contourlet transform
hu shun shi ; ding lin ; qin jian xin ; ni xi liang
..............page:1521-1523
Indoor wireless channel measurements and analysis based on WSN
yang ; huang he qing ; shen jie ; wang ying guan
..............page:1448-1451,1454
Design for RS (255,223) encoder based on CCSDS criteria
bao tao ; xu jia dong ; zhang hui sheng
..............page:1430-1433
Batch verification of group signature without random oracles
wang shao hui ; wang gao li
..............page:1461-1463
GM-EA: guided mutation evolutionary algorithm
bi ying zhou ; lu jian bo ; ding li xin ; yuan chang an
..............page:1249-1251
Optimization arbiter technique of reducing latency in sharing memory access SOC
guan na ; li kang ; ma pei jun ; wu ying qi
..............page:1391-1393,1399
Gray programming model for emergency material dispatch
song xiao yu ; liu chun hui ; chang chun guang
..............page:1259-1262
Multi-objective particle swarm optimization algorithm based on DMs preference region
mai xiong fa ; li ling
..............page:1301-1303,1348
Infrared human image segmentation based on new fuzzy criterion and DE algorithm
nie fang yan ; gao chao ; guo yong cai
..............page:1594-1597
Multi-parameter optimized joint source channel coding method
zhang dan ; li xiao feng ; jian chong ; zhao er hu ; xiong rong
..............page:1530-1533
Development of voice activity detection technology
han li hua ; wang bo ; duan shu feng
..............page:1220-1226
Intelligent composing test papers based on analytic hierarchy process and artificial fish swarm algorithm
ren jian ; bian can ; quan hui yun
..............page:1293-1296,1300
Research of simultaneous localization and mapping in robot
ke wen de ; cai ze su ; li jia lan
..............page:1216-1219
Page clustering based on text-link model and affinity propagation algorithm
guo jing feng ; ma zuo ; dai jun li
..............page:1255-1258,1262
Improvement of Eclat algorithm for association rules based on hash Boolean matrix
xiong zhong yang ; chen pei en ; zhang yu fang
..............page:1323-1325
Research on GPU based multiple data streams correlations parallel computing
zhou yong ; wang zuo ; cheng chun tian ; guo he
..............page:1232-1235
Shot similarity measure based on probabilistic distance and temporal and spatial features fusion
li xian hui ; zhan yong zhao ; ke jia
..............page:1526-1529
Energy-efficient MAC protocol for medium load in wireless sensor networks
ren xiu li ; du ji li ; yin feng jie ; xue jian sheng
..............page:1410-1411,1429
Extendible intra network security device policy conflict detection algorithm
wu zuo ; chen xing yuan ; zhang yong fu ; wang yong liang ; dai xiang dong
..............page:1484-1488
Overview of methods for concept matching
chen qian ; xiang yang ; wei zuo
..............page:1201-1206
Construction of song database based on frequency domain convolutive signal blind source separation
li peng ; zhou ming quan ; li nan shan ; wang xue song
..............page:1376-1379
Study on automatic kidneys segmentation from abdominal CT images
zhao yu qian ; zhou jie ; wang xiao fang
..............page:1591-1593
Localization algorithm based on clustering average in wireless sensor networks
hou ya na ; hu wei ping
..............page:1455-1457
Wireless video surveillance system based on H.264 and 3G technology and optimized rate control algorithm
ren shou hua ; wang sheng hua ; liu shi lei ; jiang xi wang
..............page:1554-1556,1559
Using least-square orthogonal distance method to fit double concentric elliptical arcs
zhang qing feng ; peng qing yu
..............page:1578-1580
Improvement on fast motion estimation algorithm for H.264
cai zi xing ; jiang dong dong ; tan ping ; an ji cheng
..............page:1524-1525,1529
Least squares image reconstruction algorithms restricted by iterative method for electrical capacitance tomography system
chen yu ; zhang li xin ; chen de yun ; yu xiao yang
..............page:1588-1590,1593
SIRS virus spreading model and computer simulation in regular network under local area control
guo chang zuo ; cai shao hong ; zhang da min
..............page:1493-1495
SVM-based cooperation intrusion detection system for WSN
zhu zuo ; song ru shun ; yao yong xian
..............page:1489-1492
Anonymous secure routing protocol for wireless sensor network
zhang zhi ming ; deng jian gang ; zou cheng wu ; yu min
..............page:1477-1480
Cryptanalysis and improvement on new type of group signature scheme
wang qing long ; wei yan yan
..............page:1464-1465,1488
Research on Bayesian network improved by EM-GA and its application
jin jun li ; zhao chuan ; yang jie
..............page:1360-1362
Study of robustness of complex networks based on copying model
huang jin yuan ; zhang ning ; xiao yang hua
..............page:1403-1406
Fault diagnosis model based on modified evidence theory and neural network
zhang han dong ; wang cui hua
..............page:1277-1279
3D face color modeling technology under emotion expression
wang yan ; fan yang yu
..............page:1581-1583
Kalman filter-based adaptive link-layer FEC mechanism for wireless sensor networks
jin yong ; le de guang ; bai guang wei
..............page:1412-1415
Kernel ant clustering
wang xiang ; zheng jian guo ; wang yu ling
..............page:1326-1329
Sparse Bayesian method applied to telecommunication alarm sequences forecasting
li tong yan ; li xing ming
..............page:1427-1429
Image segmentation based on inertia adaptive particle swarm optimization and fuzzy entropy
zhang wei ; sui qing mei
..............page:1569-1571,1587
Likelihood map fusion for visual object tracking
bian zhi guo ; jin li zuo ; fei shu zuo
..............page:1537-1539,1543
One-step prediction method for time series
xiu chun bo
..............page:1266-1269
Improved real-time task scheduling algorithms for heterogeneous multiprocessors
yin yang mei ; xu cheng ; liu yan
..............page:1236-1238,1245
Penalty optimal brain surgeon model to improve neural network generalization
wu cui juan ; li dong ; zuo tian
..............page:1280-1283
Vehicle classification algorithm based on anisotropic magneto resistive sensors
jia ning ; ma shou feng ; chen hua
..............page:1270-1272
SCCP:self-adjusting of circle coverage protocol in wireless sensor networks
liu zuo ; zhang jin ; wang xing ; duan jun
..............page:1407-1409
Optimal data allocation algorithm based on multiple path
li ze ping ; lu xian liang ; li liang ; ren li yong ; hou meng shu
..............page:1246-1248
Color circle-marker detection under complex illumination
zhang hong ying ; wu ya dong ; yang fan
..............page:1550-1553
Design of traffic microscope simulation system for producing vehicles based on OD
jing peng ; zuo zhi cai ; lin xu xun
..............page:1380-1383
Research on credit assessment based on trade behavior for e-commerce
wang zhi bing ; li chang yun
..............page:1357-1359
Analysis of parallel Krylov subspace method for three-dimensional heat equation
li dan dan ; cheng tang pei ; wang qun
..............page:1335-1338
Design and implementation of automated penetration testing system
xing bin ; gao ling ; sun zuo ; yang wei
..............page:1384-1387
Study on application of central public cryptosystem in dynamic secret sharing scheme
shang yu lian ; zhao xue jun ; song wu li ; shi kai quan
..............page:1500-1502
Routing strategy based on preferential direction for vehicular Ad hoc networks
tian hong yan ; xu cheng ; liu yan
..............page:1416-1418,1426
Improved VFC Snake model
gao xiang jun ; fang hong bin ; li bin ; mao zong yuan
..............page:1560-1562
Metadata management strategy based on DBMS
wu zuo ; ju shi guang ; cai tao
..............page:1297-1300
Advances in biometrics and application on identification of individuals in livestock
qian jian ping ; yang xin ting ; ji zeng tao ; liu xue zuo ; sun chuan heng ; xing bin
..............page:1212-1215
Survey on trust management for e-commerce systems
li dao quan ; liang yong quan ; zhang zuo
..............page:1207-1211,1226
Adaptive 3D fractal reconstruction algorithm of terrain profile
he wen bin ; niu zuo ; liang li zuo
..............page:1289-1292
Research on cross-domain access control and border protection technique
zou xiang ; jin bo ; ni li shun
..............page:1481-1483
LDPC codes for LTE-Advanced and research on encoding and decoding algorithm
zhang min ; huang jun wei ; meng jie
..............page:1458-1460
Multi-robot task allocation approach based on robotic utility function
chen jian ping ; yuan zhao guo ; yang yi min
..............page:1339-1341
Peer-to-peer trust model based on cluster recommendation
yang lei ; qin zhi guang ; zhong zuo
..............page:1469-1472
Location algorithm use mobile beacon in wireless sensor networks
bao ke jin ; wang wei
..............page:1452-1454
Intelligent evaluation of city public traffic using geometric network analysis
wang xu hong ; hu zuo ; jia bai jun ; liu wan qing ; wang lei ; qin hui jie
..............page:1397-1399
Novel zero-watermarking based on SIFT feature of digital image
zhao xing yang ; sun ji yin
..............page:1517-1520
Optimum prediction of network traffic based on Fourier model
dong yan ; sun en chang ; sun yan hua ; zhang yan hua ; duan zhi bin
..............page:1419-1421
Performance evaluation of broadcast for vehicular safety applications
xiong dong yu ; chen qian bin ; tang lun ; chen pei ran
..............page:1437-1440
Lattice attack on knapsack public key cryptosystem
wang bao cang ; ju chun fei
..............page:1466-1468,1492