Found: 76
Select item for more details and to access through your institution.
Method for constructing brain functional sub-networks based on sparse representation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2878, doi. 10.3969/j.issn.1001-3695.2014.09.076
- By:
- Publication type:
- Article
Image segmentation methods on implicit surfaces based on Potts model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2873, doi. 10.3969/j.issn.1001-3695.2014.09.075
- By:
- Publication type:
- Article
Group sparse based feature selection for image retrieval.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2867, doi. 10.3969/j.issn.1001-3695.2014.09.074
- By:
- Publication type:
- Article
Intuitionistic fuzzy C-means clustering algorithm incorporating local information for image segmentation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2864, doi. 10.3969/j.issn.1001-3695.2014.09.073
- By:
- Publication type:
- Article
Fast algorithm of namecard character recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2859, doi. 10.3969/j.issn.1001-3695.2014.09.072
- By:
- Publication type:
- Article
Adaptively weighted SpPCA face recognition algorithm with one training image per person.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2856, doi. 10.3969/j.issn.1001-3695.2014.09.071
- By:
- Publication type:
- Article
DiffServ-based congestion control mechanism in IEEE 802. 16 Mesh networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2811, doi. 10.3969/j.issn.1001-3695.2014.09.060
- By:
- Publication type:
- Article
Unsupervised feature selection based on local reconstruction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2828, doi. 10.3969/j.issn.1001-3695.2014.09.064
- By:
- Publication type:
- Article
Sub-pixel stereo matching method based on variational principle.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2846, doi. 10.3969/j.issn.1001-3695.2014.09.068
- By:
- Publication type:
- Article
Neighborhood optimization algorithm based on compressive sensing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2841, doi. 10.3969/j.issn.1001-3695.2014.09.067
- By:
- Publication type:
- Article
Video image defogging algorithm research under sea fog.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2836, doi. 10.3969/j.issn.1001-3695.2014.09.066
- By:
- Publication type:
- Article
MMDA with blocking clustering for face recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2853, doi. 10.3969/j.issn.1001-3695.2014.09.070
- By:
- Publication type:
- Article
Method of extracting consistent protein spot set from 2-DE images.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2850, doi. 10.3969/j.issn.1001-3695.2014.09.069
- By:
- Publication type:
- Article
Method on real-time video transmission based on intra-frame compression.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2824, doi. 10.3969/j.issn.1001-3695.2014.09.063
- By:
- Publication type:
- Article
Multi-dimensional traffic distributed algorithm for network cost optimization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2820, doi. 10.3969/j.issn.1001-3695.2014.09.062
- By:
- Publication type:
- Article
Mechanism of reducing inter-AS traffic load for content centric networking.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2815, doi. 10.3969/j.issn.1001-3695.2014.09.061
- By:
- Publication type:
- Article
Saliency detection based on local contrast and global rarity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2832, doi. 10.3969/j.issn.1001-3695.2014.09.065
- By:
- Publication type:
- Article
Network coding based lifetime optimization of wireless multi-hop networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2807, doi. 10.3969/j.issn.1001-3695.2014.09.059
- By:
- Publication type:
- Article
Measuring and characterizing workload and power consumption on cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2803, doi. 10.3969/j.issn.1001-3695.2014.09.058
- By:
- Publication type:
- Article
Evolutionary algorithm towards resource allocation of concurrent scheduling multiple DAGs in clouds.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2798, doi. 10.3969/j.issn.1001-3695.2014.09.057
- By:
- Publication type:
- Article
Optimal transmission scheduling on energy harvesting wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2796, doi. 10.3969/j.issn.1001-3695.2014.09.056
- By:
- Publication type:
- Article
Research on performance evaluation benchmark of formatted text watermarking.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2764, doi. 10.3969/j/ssn.1001-3695.2014.09.048
- By:
- Publication type:
- Article
Research on encrypted data identification in data link layer by randomness test.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2759, doi. 10.3969/j/ssn.1001-3695.2014.09.047
- By:
- Publication type:
- Article
Dynamic optimization of speed scaling in cloud computing based on stochastic service decision nets.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2792, doi. 10.3969/j.issn.1001-3695.2014.09.055
- By:
- Publication type:
- Article
Unstructured data encryption using improved fine-grained method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2754, doi. 10.3969/j/ssn.1001-3695.2014.09.046
- By:
- Publication type:
- Article
Software fault prediction based on quad tree K-means clustering algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2732, doi. 10.3969/j/ssn.1001-3695.2014.09.040
- By:
- Publication type:
- Article
Improved elliptical curve ElGamal based homomorphic image encryption scheme for sharing secret images.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2748, doi. 10.3969/j/ssn.1001-3695.2014.09.044
- By:
- Publication type:
- Article
Secure communication based on chaotic pilot signal controlling chaotic synchronization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2788, doi. 10.3969/j.issn.1001-3695.2014.09.054
- By:
- Publication type:
- Article
Research on weak key of NTRU encryption scheme.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2784, doi. 10.3969/j.issn.1001-3695.2014.09.053
- By:
- Publication type:
- Article
Research of privacy-preserving model of office flowchart structure.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2782, doi. 10.3969/j.issn.1001-3695.2014.09.052
- By:
- Publication type:
- Article
Improved role mining based on methods of partitioning and compression.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2776, doi. 10.3969/j.issn.1001-3695.2014.09.051
- By:
- Publication type:
- Article
Disease spread model with variation of virus included.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2773, doi. 10.3969/j.issn.1001-3695.2014.09.050
- By:
- Publication type:
- Article
Research of covert channel based on micro-blog posting time.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2770, doi. 10.3969/j.issn.1001-3695.2014.09.049
- By:
- Publication type:
- Article
Authenticated key agreement protocol with hybrid security.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2745, doi. 10.3969/j/ssn.1001-3695.2014.09.043
- By:
- Publication type:
- Article
Study of credible guarantee mechanism of multi-source information resources cloud services model on cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2741, doi. 10.3969/j/ssn.1001-3695.2014.09.042
- By:
- Publication type:
- Article
Data query optimization method under protection of real-time streaming data written.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2736, doi. 10.3969/j/ssn.1001-3695.2014.09.041
- By:
- Publication type:
- Article
Digital image watermarking algorithm resisting attacks based on improved ridgelet transform.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2750, doi. 10.3969/j/ssn.1001-3695.2014.09.045
- By:
- Publication type:
- Article
Trusted software reliability measures based on cloud model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2729, doi. 10.3969/j/ssn.1001-3695.2014.09.039
- By:
- Publication type:
- Article
Featured transition system based test method for software product line.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2724, doi. 10.3969/j/ssn.1001-3695.2014.09.038
- By:
- Publication type:
- Article
Weighted sequential pattern mining algorithm research based on well completion business process.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2719, doi. 10.3969/j/ssn.1001-3695.2014.09.037
- By:
- Publication type:
- Article
Modeling and simulation of medical treatment service process based on resource sharing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2715, doi. 10.3969/j/ssn.1001-3695.2014.09.036
- By:
- Publication type:
- Article
Intelligent recognition system of fruit picking robot.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2711, doi. 10.3969/j/ssn.1001-3695.2014.09.035
- By:
- Publication type:
- Article
PSO-BP ensemble approach for domestic and foreign enterprise credit risk assessment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2705, doi. 10.3969/j.issn.1001-3695.2014.09.034
- By:
- Publication type:
- Article
Improved shuffled frog leaping algorithm based on pseudo-differential disturbance.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2681, doi. 10.3969/j.issn.1001-3695.2014.09.028
- By:
- Publication type:
- Article
Research on protocol modelling method based on behavior trees and its application.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2696, doi. 10.3969/j.issn.1001-3695.2014.09.032
- By:
- Publication type:
- Article
Study on similarity matching of store procedure based on Zhang-Shasha algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2692, doi. 10.3969/j.issn.1001-3695.2014.09.031
- By:
- Publication type:
- Article
Erasure codes-based data placement fault-tolerant algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2688, doi. 10.3969/j.issn.1001-3695.2014.09.030
- By:
- Publication type:
- Article
AR-Tri-training: Tri-training with assistant and rich information strategy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2685, doi. 10.3969/j.issn.1001-3695.2014.09.029
- By:
- Publication type:
- Article
Design of fire alarm dispatching system for oil tank zone based on WSN technology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2700, doi. 10.3969/j.issn.1001-3695.2014.09.033
- By:
- Publication type:
- Article
Artificial food chain-based animal swarm optimization algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 9, p. 2673, doi. 10.3969/j.issn.1001-3695.2014.09.027
- By:
- Publication type:
- Article