Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 7
Research and development on deep learning
LIU Jian-wei;,LIU Yuan;,LUO Xiong-lin;
..............page:1921-1930,1942
Research advances on Snake model
CHEN Li-chao;,NIU Yu-mei;,PAN Li-hu;,ZHANG Xiu-qin;
..............page:1931-1936
Survey of channel assignment scheme for anti-ripple effect
DING Hui;,LI Ming-ming;,LIU Jian-sheng;,LUO Dan;,YUE Guang-xue;
..............page:1937-1942
Sliding mode control of Parkinsonian state of thalamic interneuron
CHEN Ying-yuan;,LI Hui-yan;,WANG Jiang;
..............page:1943-1946,1950
Research on recursive task allocation mechanism of distributed satellite system
CHAI Yi;,GAO Li;,LIU Zi-lin;,WU Zheng-zhong;
..............page:1947-1950
Method of prediction on driving track of specific vehicles in potential group
SUN Li-min;,SUN Yu-yan;,WU Zi-jun;,YU Chong-chong;
..............page:1951-1955
Study on improved one-order Sigma-Delta modulator with single bit
CHEN Jun-ning;,DAI Guang-zhen;,MENG Jian;,XU Chao;,XU Hui-fang;,XU Tai-long;
..............page:1956-1958
Study of behavior dynamics of large logistics system based on time scaling law
LIN Ji-nan;,LIU Xiao-feng;,YAO Can-zhong;
..............page:1959-1961,1971
Modified fuzzy adaptive algorithm based on current statistical model for track prediction
LI Teng;,NI Juan;,OUYANG Chao;,YANG Xiao-peng;,YANG Zhao-yang;
..............page:1962-1964,1979
Index supporting approximate query in non-metric space
HUO Huan;,JIANG Ping;,PENG Dun-lu;,XU Wen-jie;
..............page:1965-1971
Stable saturation density of DBSCAN algorithm
ZHANG Li-jie;
..............page:1972-1975
Multi-task allocation problem research based on multi-agent
GUO Xiao-he;,LIU Ke;,LU Yong-le;,ZHOU Ji-qiang;
..............page:1980-1983,1988
Shuffled frog leaping algorithm with leadership mechanism
WU De-long;,XU Feng;,ZHANG Gui-zhu;,ZHAO Fang;
..............page:1984-1988
Application of latent factor in random walk model
WU Wei-min;,YANG Yong-xiang;
..............page:1989-1993,2012
Recursive least-squares actor-critic algorithm in continuous space
FU Yu-chen;,JIN Yu-jing;,SONG Xu-wen;,ZHU Wen-wen;
..............page:1994-1997,2000
Linearized Bregman algorithm via SVD
CHENG Li-zhi;,SUN Tao;,ZHANG Hui;
..............page:2001-2003
Method of evaluating micro-blog users' influence based on comprehensive analysis of user behavior
CHEN Hong-chang;,QI Chao;,YU Hong-tao;
..............page:2004-2007
Incremental modeling and online anomaly detection of vehicle trajectories
HAN Xu;,HAO Huan-fei;,NIE Mei-ling;,TANG Chun-ming;
..............page:2008-2012
AHP integrated PSO task scheduling algorithm in cloud storage system
LI Fei;,LIU Bing;,WANG Juan;,ZHANG Lu-qiao;
..............page:2013-2016
Novel algorithm for mining protein complex from weighted network
HU Qiu-ling;,HU Wei;,TANG Xi-wei;
..............page:2017-2020
Iterated cubature square root particle filter
HAN Lei;,LI Feng;,MA Chun-lin;,WANG Qiu-ping;
..............page:2021-2023,2026
Pattern recognition method of blockage in pipeline fault small sample for storage and transportation process
CHEN Fu-ming;,LI Sheng-lin;,QING Yu-bo;,SHUI Ai-she;,SUN Yao-lei;
..............page:2031-2034
Semi-supervised learning approach to recognize subjective sentences in microblogs
CHEN Duan-sheng;,FANG Yuan;,WU Yang-yang;
..............page:2035-2039
Sampled-data synchronization for chaotic neural networks with time-varying delays
LU Yao;,NIE Rui-xing;,SUN Zhi-yi;,WANG Jian-an;,ZHANG Wen-yu;
..............page:2040-2043,2047
Research on high efficient BIRA technology
DAI Zi-bin;,GAO Xiu-cai;,ZHANG Li-chao;,ZHANG Yi;
..............page:2044-2047
Study and application on 4D safety information model of slope during construction period in hydropower station
DU Cheng-bo;,SA Wen-qi;,XUE Lie;,ZHANG Feng-hua;,ZHANG She-rong;
..............page:2053-2057
Research for automotive electronics oriented model attributes configuration general framework
XIA Chao;,YAN Hua;,YUAN Guang-long;
..............page:2058-2061
RFID fingerprints-based localization based on different similarity measures
HUANG Bao-hu;,ZHANG Hua;,ZOU Bo;
..............page:2062-2066
Comprehensive testability evaluation method based on D-S evidence theory
HUANG Yi-feng;,JING Bo;,YU Si-qi;
..............page:2071-2073
High-performance mechanism of local data cache in Web system
SHI Rui-bing;,WU Juan;,WU Min;,XIE Jie-tao;
..............page:2074-2077
Efficient processing algorithm for uncertain XML query processing based on LSPI index
HAN Yu-tong;,SU Long-chao;,TAN Yue-sheng;,ZHANG Xiao-lin;
..............page:2078-2081,2100
Research on information gain based software birthmark
LI Fei-fei;,ZHOU Qing-lei;
..............page:2082-2084,2087
Fuzzing test technology based on concolic symbolic execute
HAN Qing;,LI Hui;,LU Ping-ping;,MU Wen-si;
..............page:2088-2091,2096
Construction and design of appendage softman under syncretic mechanism
WU Dan-feng;,XIAO Chao-en;,XU Xiao-wei;,ZHANG Qing-chuan;
..............page:2092-2096
Parallel subtree reduction approach for defect localization
YANG Shu-xin;,ZHANG Qiu-mei;
..............page:2097-2100
Certificateless authenticated tripartite key agreement protocol
HE Ming-xing;,LI Xu-dong;,TAN Hong-lian;
..............page:2101-2104
Fully homomorphic encryption based on approximate integer GCD
GU Chun-sheng;,JING Zheng-jun;,YU Zhi-min;
..............page:2105-2108
Remote authentication protocol for multi-servers based on smart card
ZHANG Qing;
..............page:2109-2111,2115
Keystroke dynamics based user authentication using conditional random fields
HE Ding-long;,LI Chen;,YUE Bao-ling;,ZHANG Gong-xuan;
..............page:2112-2115
Audio watermarking algorithm based on SVD and DWT
DUAN Sui-jun;,FAN Jiu-lun;
..............page:2116-2118
Detecting DOM based XSS vulnerability based on dynamic taint propagation model
CHANG Chao;,JIA Wen-chao;,SHI Fan;,WANG Yong-yi;
..............page:2119-2122,2126
Data reduction strategy to intrusion detection of imbalanced sample data for subgroup discovery
BIAN Jing;,FU Dong-lai;,PENG Xin-guang;,WANG Ying;
..............page:2123-2126
Global avalanche characteristics of two classes of boolean functions
CHONG Jin-feng;,WEI Shi-min;,ZHUO Ze-peng;
..............page:2127-2129
USB Key authentication scheme based on cloud computing
CHANG Chao-wen;,WANG Shuai;,WEI Yan-fen;
..............page:2130-2134
Sequence encryption based on multi-objective differential evolutionary algorithm
CHEN Tian-dong;,LI Kang-shun;,WU Jun-qin;
..............page:2139-2143,2147
Virus propagation model of heterogeneous Bluetooth networks including human behaviors
CHEN Bo;,HUANG Fang;,LIU Yuan-jun;,ZHANG En-di;
..............page:2144-2147
VANET wireless-power-controlling based on clustering
CHEN Zhen;,HAN Jiang-hong;,LIU Zheng-yu;,ZHAI Yan;
..............page:2148-2151
Effective reliable hybrid routing algorithm for opportunistic networks
DU Bao-yang;,LI Ji-bi;,REN Zhi;,ZHANG Jian;
..............page:2152-2155,2163
Adaptive routing mechanism based on transmission performance
BAI Lu;,TAO Yang;
..............page:2156-2158,2167
Application of joint resource allocation algorithm in cooperative system
JIA Wen;,LI Yun;,MA Ya-fei;,ZHU De-li;
..............page:2159-2163
Research of Wi-Fi real-time position algorithm
KAN Zhi-qiang;,NIE Er-hao;,SU Wei-jun;,YU Chong-chong;
..............page:2164-2167
Novel clustering routing algorithm for non-uniform distributed and heterogeneous wireless sensor network
CHEN Xian-yi;,JIN Zhi-gang;,LIN Guo-lan;,LIU Jia;,YANG Xiong;
..............page:2168-2170,2174
Optimization algorithm of cooperation spectrum sensing based on SNR filter
TANG Xiao-li;,WU Min;,ZHANG Xue-jun;
..............page:2175-2177
Study onload prediction method based on OpenStack
LI Dan-cheng;,LI Quan-zuo;,MA Dong-lin;,SONG Xiao-xue;,WANG Xiao-chen;
..............page:2178-2182
Deformable object collision detection algorithm based on hybrid update method
TAN Rui-pu;,ZHAO Wei;
..............page:2183-2186,2190
Automatic target segmentation algorithm of GrabCut based on cubic spline interpolation
CHEN Xiao;,WANG Hao;,WEN Pei-zhi;,WU Xiao-jun;
..............page:2187-2190
Segmentation algorithm based on contour curve of occluded vehicle
LIU Wan-jun;,YAO Xue;,ZHANG Hai-tao;
..............page:2191-2194,2200
Fast corner detection algorithm with sub-pixel accuracy imitating Hessian-Laplace
CHEN Ke-yin;,PENG Hong-xing;,XIONG Jun-tao;,ZOU Xiang-jun;
..............page:2195-2200
Face detection based on eye location and AdaBoost Gabor filter
BAI Qiu-chan;,YANG Ding-li;,ZHANG Yu-lin;,ZHAO Huan-yu;,ZHOU Hong-biao;
..............page:2201-2204
Algorithm of remote sensing image matching based on Harris corner and SURF feature
CHEN Qiang;,GE Pan-pan;,GU Yi-he;
..............page:2205-2208
Application research of RANSAC algorithm on copy-move forgery detection
HUO Hong-tao;,JIANG Min;,WANG Ren-hua;
..............page:2209-2212
Low-pass filter based digital video stabilization without cumulative error
WANG Ming-hui;,XU Jie;,YANG Shuo;
..............page:2213-2215,2223
Correlation coefficient image correction methods with rotation invariance
WEI Chun-tao;,YUAN Kai-min;,ZOU Xuan;
..............page:2220-2223
Image authentication algorithm based on trisected image basic blocks
LI Xiang-yang;
..............page:2224-2227,2232
Supervised kernel locality preserving projection algorithm based on maximum separation degree difference
JIANG Shu-ming;,WANG Ke-jun;,ZHANG Yuan-yuan;,ZOU Guo-feng;
..............page:2228-2232
Novel image inpainting algorithm based on quickly searching optimum matching block
JIN Jing;,NIE Hui;,ZOU Yan-li;
..............page:2233-2237,2240