Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2015 Issue 12
Survey on visual sentiment analysis
Li Zuhe;,Fan Yangyu;
..............page:3521-3526
Survey of state prediction of computing resources in cloud
Hong Bin;,Peng Fuyang;,Deng Bo;,Wang Dongxia;
..............page:3527-3533
Research of data collection technology in crowd sensing based on social behavior analysis
Chen Xiang;,Xu Jia;,Wu Min;,Dai Hua;,Yu Jingjie;
..............page:3534-3541
Collaborative recommendation algorithm based on contribution factor
Wang Xingmao;,Zhang Xingming;
..............page:3551-3554
Prediction model of microblog users profile based on RBF neural network
Yu Yan;,Chen Hongchang;,Yu Hongtao;
..............page:3555-3559
Closed frequent patterns mining method over distributed data streams
Tang Yingfeng;,Chen Shiping;
..............page:3560-3564,3595
Collaborative filtering recommendation algorithm combining time weight and trust relationship
Zhao Haiyan;,Hou Jingde;,Chen Qingkui;
..............page:3565-3568
Research of mining important online reviews based on complex network and fusion products subject
He Youshi;,Li Jinhai;,Li Shuopeng;,Ye Ling;
..............page:3569-3573
Algorithm for online detection of data stream based on distance
Li Shaobo;,Wei Zhonghe;,Meng Wei;
..............page:3579-3581
Variable selection and outlier detection based on Bayesian Lasso method
Shang Hua;,Feng Mu;,Zhang Beibei;,Yu Fengmin;
..............page:3586-3589
Dynamic clustering algorithm based on KD-tree and K-means method
Wan Jing;,Zhang Yi;,He Yunbin;,Li Song;
..............page:3590-3595
Weighted feature selection for clustering
Liu Shuai;,Yang Yingjie;,Liu Wuyue;
..............page:3596-3599
Hub and spoke urban logistics network evolution model and algorithm
Fu Jiangyue;,Chen Gang;
..............page:3605-3608,3617
Indoor path planning based on improved hierarchical D* algorithm
Shi Jiugen;,Li Kaiye;
..............page:3609-3612
Research on time optimal TSP based on hybrid PSO-GA
Zhang Yong;,Chen Ling;,Xu Xiaolong;,Li Feiteng;
..............page:3613-3617
Gaussian harmony search algorithm for driver satisfaction based logistics distribution path optimization
Hu Lili;,Wang Zhanbei;,Zhao Feng;
..............page:3622-3625,3676
Hybrid particle swarm optimization algorithm of new learning factors and constraint factor
Zhang Shuiping;,Zhong Weibiao;
..............page:3626-3628,3653
Shuffled frog leaping and bat algorithm with Gauss mutation
Zheng Yunshui;,Yue Xiaoxue;,Lin Junting;
..............page:3629-3633
Improved flocking algorithm with a minority of informed agents
Wu Guofeng;,Kang Huaiqi;
..............page:3634-3637
Improved gravitational search algorithm with elite opposition-based learning
Jing Furong;,Guo Zhaolu;,Luo Huilan;,Li Kangshun;
..............page:3638-3641
Biogeography-based optimization with self-adaptive immigrate
Fan Huilian;,Zeng Guangpu;
..............page:3642-3645
Heterogeneous multi-core processor task schedule based on improved SFLA
Cheng Xiaohui;,Gu Junjie;,Deng Yun;
..............page:3646-3649
Solving nurse rostering problem based on hybrid integer programming and evolutionary algorithm
Ouyang Ji;,Lin Weijia;,Zhuo Xiaoyan;,Qin Yong;,Huang Han;
..............page:3660-3664
Method of pipeline weak leak detection based on online dictionary learning
Jiang Hua;,He Fenghang;,Wu Bo;,Xu Zhiguang;
..............page:3665-3667
Novel weighted rough naive Bayes algorithm and its application
Wang Hui;,Huang Ziwei;,Liu Shufen;
..............page:3668-3672,3692
Study on GIS-based probability integral algorithm to predict mining subsidence for arbitrary shape face
Jiang Jian;,Zhao Xiaodong;,Chen Yang;
..............page:3673-3676
Portable fireman search and rescue system based on inertial sensors
Su Fei;,Jin Zhigang;,Wang Bingjian;
..............page:3677-3681
Thermal-aware test scheduling of SoC based on thermal partition in ultra deep submicron technology
Jiao Ge;,Li Lang;,Liu Hui;,Zou Yi;
..............page:3682-3684,3696
Dynamic crosstalk optimizing on critical paths for chip detailed routing
Cai Dongling;,Feng Gang;
..............page:3685-3687
Research on locating entry point of stack-based virtual machine
Cai Ruijie;,Liu Shengli;,Lin Wei;,Liu Long;,Wang Dongxia;
..............page:3688-3692
Usability evaluation of mobile phone software based on process mining
Zhang Hong;,Hua Lixian;,Lin Tao;,Yu Qian;
..............page:3693-3696
Thread migration strategy on multiprocessor system on chip
Hu Teng;,Mei Lingqi;,Huang Kai;,Lin Wei;,Zhang Xiaomeng;,Xiu Siwen;,Yan Xiaolang;
..............page:3697-3701
Reversible data-hiding algorithm in encrypted image for security application in cloud computing
Xiao Di;,Bai Ke;,Zheng Hongying;
..............page:3702-3705,3713
Reversible data hiding algorithm based on encrypted medical images
Zheng Hongying;,Cheng Huihui;
..............page:3706-3709
Dynamic data integrity checking scheme based on H-MHT
Li Ying;,Zhang Yongsheng;,Ma Jie;
..............page:3710-3713
Pairing-free ID-based authenticated key agreement protocol for satellite networks with forward security
Meng Meng;,Chen Xingyuan;,Xu Guoyu;,Du Xuehui;
..............page:3714-3717
Anti-phishing solutions based on full life cycle of document
Zhang Wen;,Yang Yu;
..............page:3718-3722
Research of controllable privacy preserving searching scheme based on SPE in cloud storage
Cui Chunying;,Hu Haizhi;,Li Xuemei;
..............page:3723-3728
Network active defense strategy selection based on attack-defense graph
Li Zhi;,Shan Hong;,Ma Chunlai;,Huang Jun;
..............page:3729-3734
Cloud resource scheduling based on semantic search engine
Li Ming;,Wu Yue;,Chen Jia;
..............page:3735-3737,3749
Task scheduling oriented to topology of virtual machines resource in cloud computing
Zhang Liang;,Zhang Xihuang;
..............page:3738-3741,3745
Virtual machine selection algorithm based on capacity detection and load characters
Zhang Dongsheng;,Shen Jiquan;,Zhang Xiaohong;
..............page:3746-3749
Efficient clustering data collection protocol via hybrid compressed sensing
Shi Jiugen;,Song Zhengchao;,Zhu Wei;
..............page:3756-3759
Active computing node trust method in wireless sensor network
Zhang Jun;,Chen Yang;,Wu Haiyan;
..............page:3760-3764
WSN coverage optimization based on judging value of PSO algorithm dimension by dimension
Feng Lin;,Ran Xiaomin;,Sun Tao;
..............page:3765-3768
Improved LANDMARC localization algorithm based on double-tag
Xu Ying;,Liu Shehan;
..............page:3769-3772
Topology construction and resource searching strategy for mobile peer-to-peer networks
Zhou Xinxin;,Gao yue;,Song Renjie;,Yu Zhenwei;
..............page:3773-3775,3778
Study on interference alignment based on dynamical power allocation in MIMO interference channel
Zhang Wenjuan;,Xiao Hailin;,Ren Chanchan;,Hou Jia;
..............page:3776-3778
Wideband spectrum sensing based on GNU radio and USRP
Zhao Nan;,Wu Minghu;,Zhou Xianjun;,Xiong Wei;
..............page:3779-3781,3789
Analysis of network traffic complexity based on multiscale entropy method
Zhou Peng;,Chen Yufeng;
..............page:3782-3785
Research and application of energy consumption reduction opportunities network based on mobile medical large data platform
Guan Peiyuan;,Chen Zhigang;,Wang Yunhua;,Wu Jia;,Liu Hui;
..............page:3790-3793
Human action recognition using hierarchical moving pose covariance method
Wang Mingliang;,Sun Huaijiang;
..............page:3794-3797
Accurate estimation of remote sensing image motion blur parameters based on Radon transform
Wang Lin;,Shi Xueyan;,Zhang Shaohui;,Shao Xiaopeng;
..............page:3798-3800,3809
Novel multiscale edge tracking algorithm for edge detection
Chen Enqing;,Wang Jianbo;,Qi Lin;
..............page:3801-3804
Adaptive face verification based on visual condition estimation
Huang Renjie;,Li Tao;,Dou Yumin;,Liu Feng;
..............page:3805-3809
Application of fast and robust method based on spatial domain HPF in face recognition
Xu Liang;,Li Xin;,Huang Lihong;
..............page:3810-3813
Image segmentation of hollow blade mould based on C-V model using gradient vector
Liu Zhenkun;,Gu Zhongtao;,Liao Xiaobo;,Cai Yong;
..............page:3814-3816
Image segmentation based on SLIC and conditional random field
Sun Wei;,Guo Min;
..............page:3817-3820,3824
Adaptive similarity neighborhood preserving projection algorithm based on PCA space
Lin Yu'e;,Guo Yongcun;,Li Jingzhao;
..............page:3821-3824
Research of digital model repair of TFI algorithm with derivative correction
He Tengxiao;,Yang Jie;,Pang Yufei;,Xiao Sumei;,Dai Feng;
..............page:3830-3833
New tetrahedron cutting method on tetrahedron subdivision
Liao Zhifang;,Kong Lingyuan;,Peng Zhiwen;,Huang Xiaoyu;
..............page:3834-3836
New method for triangular mesh generation of basic voxel surface
Wu Ting;,Zhang Libing;
..............page:3837-3840