Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 5
New spectral clustering method for large-scale complex image segmentation
LI Jun-ying;WANG Xi-li
..............page:1994-1997
Robust image hashing for image authentication and tampering detection
ZHAO Yan;WEI Wei-min
..............page:1929-1931,1939
Applied research of neural network internal model control in nonlinear time-delay system
HAN Chao-yuan;DONG Xiu-cheng
..............page:1783-1785,1788
Image registration based on two-feature game
YAN Yu-wu;YAO Xiao-qiang;SUN Ya-jun
..............page:1983-1986
Model study on regional medical information incorporate
ZHANG Lan-hua;XUE Shao-wei;LI Jian;TANG Yi-yuan
..............page:1777-1779
Binarization method to scanning image of thicker book
ZHANG Wei;LIU Zhi-gang
..............page:1998-2000
xin xi dong tai
..............page:1773
Uncertainty control of head shaking for virtual human based on cloud model
YANG Zhi-xiao;FAN Yan-feng
..............page:1718-1720
Color image watermark algorithm based on SVD and lifting wavelet transformation
XU Guo-rong;WANG Li-ping
..............page:1981-1982,1986
Temporal conflict detection and resolution in process of plan execution based on STN
TANG Luo-hao;ZHU Cheng;ZHANG Wei-ming
..............page:1780-1782
Edge detection method based on adaptive order morphology filter
YAN Hai-xia;LIU Yan-jun
..............page:1978-1980
Modular rewriting system based on method for intruder deduction
LI Da-hai;HAN Ji-hong;WANG Ya-di;WANG Jing
..............page:1918-1921,1936
Research on model of survivable storage system(SSS)and its architecture
WANG Jing-jing;YANG Xiao-yuan;ZHANG Wei;PAN Xiao-zhong;CHEN Jia-yong
..............page:1947-1950
Study on hybrid particle swarm optimization algorithms
ZHANG Hui-yun;HUANG Xiao-wei;ZHANG Hong-hua;XU Jie
..............page:1631-1633,1681
Method of moving target detection based on region textures
HUANG Wen-li;FAN Yong;LI Hui-zhuo;XUE Qin;TANG Zun-lie;XIONG Ping
..............page:1968-1971
Facial expression recognition based on CBP-TOP features
ZHU Yong;ZHAN Yong-zhao
..............page:1957-1960
Algorithm for underdetermined blind signal separation based on constrained NMF
ZHAO Zhi-jin;LU Hong;SHANG Jun-na
..............page:1843-1845
Blind color image watermarking method based on conic surface and reflection
LI Yan-shan;CAO Wen-ming
..............page:1894-1896
Improved algorithm based on hybrid wireless mesh protocol
HE Ling;HUANG Jun
..............page:1846-1849
UML state-chart extraction based on formal specification
ZENG Yi;ZHOU Xin;ZHOU Ji
..............page:1767-1769
Improved Rubik\'s cube digital watermarking algorithm
XU Chun-yang;ZHOU An-min;FANG Yong;LIU Liang
..............page:1926-1928
Wavelet transform watermarking method based on local phase correlation
HU Lei;WANG Dong-qing;WAN Fang
..............page:1922-1925
Incentive-compatible trust model based on social network
LUO Bo-fa;CAI Guo-yong
..............page:1932-1936
Optimization of aircraft flight control system based on improved multi-objective evolutionary algorithm
NIE Rui;ZHANG Wei-guo;LI Guang-wen;LIU Xiao-xiong
..............page:1703-1706
Recommendation algorithm on feature extraction based on user interests
LIU Mei-lian;LIU Tong-cun;LI Xiao-long
..............page:1664-1667
Short-term traffic flow detection based on wavelet
LI Zhi-min;YI Liang-you;XUE Ping;DAI Gao;XIE Xian-bao
..............page:1677-1678
Clustering ensemble algorithm for categorical data
LI Tao-ying;CHEN Yan;ZHANG Jin-song;ZHANG Lin
..............page:1671-1673
Improved hash chain based key distribution scheme
GAO Wei;GAO Tie-gang
..............page:1886-1888,1893
Coverage method based on combined weighted clustering for 3 D wireless sensor networks
JIANG Peng;LIU Xiao-qing
..............page:1824-1826,1830
Application of nonlinear dimensional reduction algorithm in combination predictive model
WU Meng-jun;LIU Jiang-ping;NIU Yu-gang
..............page:1961-1964
Modeling and simulation of rumor spread in C2 network organization
WANG Chang-chun;CHEN Chao;DU Zheng-jun
..............page:1906-1909
Research on personal pronoun anaphora resolution in Chinese
DONG Guo-zhi;ZHU Yu-quan;CHENG Xian-yi
..............page:1774-1776,1779
Application of data mining based on concept lattice in inventory management
WANG Yu-hui;YANG Li
..............page:1745-1747
Web service selection fuzzy algorithm for QoS and user\'s requirements
SHI Rong-rong;ZHOU Xiao-ming;GUO Cheng-hao
..............page:1748-1751
Protein secondary structure co-training prediction method
LIU Jun;XIONG Zhong-yang;WANG Yin-hui
..............page:1688-1691
Static parameter estimation for nonlinear system based on particle filter
ZHOU Fang-long;WANG Hao;YAO Hong-liang
..............page:1637-1639,1654
Research on new cloud storage service model
LIU Jin-zhi;YU Dan;ZHU Shuai-shuai
..............page:1869-1872
Non-uniform subdivision for B-splines of arbitrary degree
SUN Li-juan;LIU Yang;ZHAO Qiang
..............page:1972-1974
Improved ant colony algorithm for path planning of tourist scenic area
HU Jun-guo;Qi Heng-nian;DONG Feng;WANG Hang-jun
..............page:1647-1650
Survey of privacy preserving data mining methods based on homomorphic encryption
QIAN Ping;WU Meng
..............page:1614-1617,1622
Chaos great deluge algorithm for function optimization problem
SHENG Hong-ping;MA Liang
..............page:1626-1627,1657
Research of binary tree\'s storage structure in DNA computer
ZHU Ya-li;LI Ken-li;XU Yu-ming
..............page:1623-1625,1630
Survey on melody extraction technique
LAN Tian;LI Yang;ZHONG Ting;QIN Zhi-guang
..............page:1618-1622
Self-adaptive semi-fragile digital watermarking algorithm
FAN Yong-liang;ZHANG Hui-min;ZHANG Yun-long
..............page:1937-1939
Improved vertical handoff scheme in heterogeneous wireless networks
WANG Wei;JING Zhi-hong;CHEN Peng
..............page:1861-1862,1865
High-speed data transfer protocol based on custom Ethernet frame and its application in imaging system
SHANG Yuan-yuan;XU Da-wei;YANG Xin-hua;ZHANG Wei-gong;HAN Bao-yuan
..............page:1854-1856,1860
Algorithm of upper and lower approximations based on matrix
LIU Cai-hui;MIAO Duo-qian
..............page:1628-1630
Research on analyzing load equilibrium of multi-threads
CHEN Zuo;YANG Qiu-wei;WAN Xin;REN Xiao-xi
..............page:1752-1755,1760
Analysis of delay performance of multichannel SW-ARQ based on M/G/1 model with vacation
LI Suo-ping;ZHOU Yong-qiang;TENG Guo-bao;LI Jun
..............page:1813-1815
Exemplar-based inpainting algorithm constrained by continuity
SUN Yu-gang;LI Kai-yu;CHENG Wei-ping;XU Gui-li
..............page:1951-1953
Sequence detection algorithm for CPM based on Walsh signal space decomposition
ZHONG Kai;GE Lin-dong;GONG Ke-xian
..............page:1808-1809,1812
Improved Kalman filter algorithm in positioning system for autonomous mobile robot
ZENG Jian-ping;WANG Bao-tong;XIE Hai-qing
..............page:1710-1712
Bilateral dynamic negotiation model impact by irrational environment
CHENG Zhao-qian;WANG Hong-guo;SHAO Zeng-zhen;YANG Yi
..............page:1713-1717
Survey of data aggregation for wireless sensor networks
CHEN Zheng-yu;YANG Geng;CHEN Lei;XU Jian
..............page:1601-1604,1613
Protein-protein interaction extraction method using co-training
QIAN Wei-zhong;DENG Wei;FU Chong;QIN Zhi-guang
..............page:1738-1741
Novel location-index compression mechanism based on bit vector
CHEN Jian-ying;LIU Xin-song
..............page:1761-1763
Design and implementation of GPU-based parallel minimum spanning tree algorithm
GUO Shao-zhong;WANG Wei;WANG Lei
..............page:1682-1684,1702
Apply events broker to realize intelligence distribution based on subject in P2P network
ZHOU Jia-jun;WANG Feng;MA Rui-xing;LI Xiao-jian
..............page:1835-1838,1849
Research on MFJSSP based on improved ant colony algorithm
LI Li;WANG Ke-qi
..............page:1640-1643
Establishing data transmission model in optical ring network
MENG Bao-guo;ZHANG Yan-mei;PENG Shu-ping
..............page:1866-1868
Research on P2P-based DDoS attacks and their defense mechanism
LIU Min-xia;YU Jie;LI Qiang;CHEN Zhi-xin
..............page:1609-1613
Solving complementarity problem based on maximum-entropy harmony search algorithm
YONG Long-quan;SUN Pei-min;GAO Kai
..............page:1724-1727
Global outlier detection based on hierarchical clustering
HANG Bin-mei;WEI Lin-na;SONG Qing-zhen
..............page:1731-1733
Cross-layer packet scheduling scheme for supporting QoS of real-time services
LIU Yang;JI Xin-sheng
..............page:1810-1812
Automatic semantic annotation based on ontology and knowledge base
QI Xin;XIAO Min;SUN Jian-peng
..............page:1742-1744,1747
Behavior analysis and intrusion detection of illegal access to WLAN
WANG Guan-nan;LI Ou;LIU Yang
..............page:1873-1877
Multi-class classification method based on K-means cluster and hyper-sphere
BAO Lei;HUANG Shu-guang;LI Yong-cheng
..............page:1764-1766
Steganalysis for LSB matching based on correlation of pixels in local regions
ZHAO Yan-rong;PING Xi-jian;XIONG Gang
..............page:1897-1900,1909
Detection of C2C reputation fraud activities based on neural network and SNA
ZHENG Hua;WU Ke-wen;ZHU Qing-hua
..............page:1882-1885
Algebraic attack on PRESENT cipher
GE Shi-jing;GU Da-wu;LIU Zhi-qiang;LIU Ya
..............page:1889-1893
Study on bionic flexible workflow modeling and adaptation algorithm
WANG Ying-hui;WANG Dong-bo;WANG Zeng-lei;LIU Zhi-zhong
..............page:1692-1695
Dynamic optimization of packet classification rules organization based on Internet traffic statistical characters
YANG Zan;YANG Lin;WANG Bao-jin;ZHANG Kun
..............page:1878-1881,1885
New algorithm based on resource map for directional sensor networks
LIU Meng;ZHANG Ke
..............page:1674-1676
ACE based reliable UDP design and implementation
CHEN Jian-hong;XI Jian-qing;SUN Jin-pei;CHEN Deng-biao
..............page:1857-1860
Cross-layer power controlled routing in wireless Ad hoc networks
HUANG Hao-jun;HU Guang-min;YU Fu-cai
..............page:1793-1797
Device request broker model in ubiquitous computing environment
WANG Huai-ying;HUANG Dong;ZHENG Min;SHI Xing-guo
..............page:1734-1737
Partition clustering algorithm based on artificial bee colony principal
LIU Lei;WANG Hong-guo;SHAO Zeng-zhen;YIN Hui-juan
..............page:1699-1702
Fragile watermarking scheme based on index constrained vector quantization
ZHOU Yun;WANG Rang-ding
..............page:1940-1942
Dynamic remote attestation model in real-time monitoring
WANG Ning;WU Zhen-qiang;FU Xiang-ping
..............page:1943-1946
Toward recombination of building blocks based on CBR-GA
ZOU Peng;BI Ying-zhou;YANG Hu-lin;LIU A-ning;YUAN Chang-an
..............page:1658-1660,1673
Novel clustering algorithm based on grid and density
XIONG Shi-yong
..............page:1721-1723,1727
Incremental PSVM learning algorithm based on cloud model
JIN Zhu;MA Xiao-ping
..............page:1685-1687,1691
Design of light source structure for non-contract palmprint images acquisition
YUAN Wei-qi;SUN Hong
..............page:1965-1967
Study of two-terminal multi-state network reliability
WANG Bing-shan;SONG Yue;WANG Yu-mei
..............page:1863-1865
Research on argumentation-based multi-product negotiation model
JIANG Guo-rui;XU Yang-wei
..............page:1661-1663
New force feedback algorithm for teleoperation robot
HOU Jing-wei;ZHAO Ding-xuan;GONG Ming-de;CUI Yu-xin
..............page:1679-1681
Research on removal algorithm of rain and snow from images based on improved snake model
SUN Yi-gang;DUAN Xiao-ye;ZHANG Hong-ying;YU Zhi-jing
..............page:1991-1993
Assessment method of information security based on multiple cask model
WU Jian-wen;WANG Tao;XU Ling-kui;LI Chun-wu
..............page:1914-1917,1928
Target tracking algorithm based on improved extend Kalman particle filter
WANG Hua-jian;JING Zhan-rong;YANG Yan
..............page:1634-1636,1643
Performance analysis of MIMO in two-tier LTE network
ZHANG Liang-liang;ZHANG Zu-fan;YANG Zheng-yu
..............page:1819-1823
New service-oriented multi-dimensional fast packet classification algorithm
BI Xia-an;ZHANG Da-fang
..............page:1802-1804
Image hash algorithm based on chaos theory
XIAO Xiao;HU Chun-qiang;DENG Shao-jiang
..............page:1904-1905,1925
Adaptive hybrid particle swarm optimization algorithm and application
ZHANG Chao-long;JIANG Ju-lang;JIANG Shan-he;LI Qiang
..............page:1696-1698
Multi-constraint QoS routing protocol for Ad hoc network
GUO Jian;SUN Li-juan
..............page:1789-1792
Design and realization of global earth observation visualization system in Shanghai Expo
WANG Hai-bin;YANG Yin-ming;YANG Ya-wei;ZHU Xue-song
..............page:1770-1773
Semantic-based image retrieval algorithm using fuzzy support vector machine
HUANG Wen-yu;QIN Tuan-fa;TANG Zhen-hua
..............page:1987-1990
Tracking object contour based on multiple features
WU Xi-yan;DONG Fang-min;LIU Yong;CAI Ling
..............page:1954-1956,1964
Realization of stegnography based on speech of Bol SipPhone
YANG Jun;BAI Sen;HUANG Yong-feng;YUAN Jian
..............page:1901-1903,1913
Certificateless signature scheme of EMR based DSA
FENG Jiang;SONG Yu-qing;CHEN Jian-mei;ZOU Wei-wei
..............page:1910-1913
Combination of randomly drop and drop front in passive queue management
JIANG Wen-gang;SUN Jin-sheng;WANG Zhi-quan
..............page:1798-1801
Optimal model and algorithm for size of main functional area in distribution central
QIN Jin;NI Ling-Lin;SHI Feng;DENG Lian-bo
..............page:1651-1654
Development of software security vulnerability discovery models
FENG Yong;FAN Ming-yu;LI Wei
..............page:1605-1608
Modified BP decoding algorithm based on oscillation and check update
LIU Jian-hao;ZHAO Ze-mao;BAO Jian-rong
..............page:1827-1830
Research for incremental updating algorithm for attribute reduction based on array
WANG Xiao-yan;YANG Si-chun
..............page:1728-1730
Vehicle-based single-line laser radar image segmentation and noise detection algorithm
LIANG Xiong;TANG Jin;CAI Zi-xing
..............page:1975-1977