Found: 74
Select item for more details and to access through your institution.
Adaptive image strip dividing algorithm based on ordered data clustering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 957, doi. 10.3969/j.issn.1001-3695.2015.03.074
- By:
- Publication type:
- Article
New video stream dynamic target tracking algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 954, doi. 10.3969/j.issn.1001-3695.2015.03.073
- By:
- Publication type:
- Article
New Delaunay triangulation algorithm of point cloud based on parametric method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 950, doi. 10.3969/j.issn.1001-3695.2015.03.072
- By:
- Publication type:
- Article
New efficient SPH approach for incompressible fluid simulation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 946, doi. 10.3969/j.issn.1001-3695.2015.03.071
- By:
- Publication type:
- Article
Low-rank and sparsity-based MRI reconstruction algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 942, doi. 10.3969/j.issn.1001-3695.2015.03.070
- By:
- Publication type:
- Article
Video super-resolution based on low-rank and total variation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 938, doi. 10.3969/j.issn.1001-3695.2015.03.069
- By:
- Publication type:
- Article
Application of Retinex algorithm based on sparse difference and Mean-Shift filtering in face recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 934, doi. 10.3969/j.issn.1001-3695.2015.03.068
- By:
- Publication type:
- Article
Multi-planar detection for digital images based on guided sampling of matching point similarity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 929, doi. 10.3969/j.issn.1001-3695.2015.03.067
- By:
- Publication type:
- Article
Long-term video tracking algorithm of optimized TLD based on Mean-Shift.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 925, doi. 10.3969/j.issn.1001-3695.2015.03.066
- By:
- Publication type:
- Article
Shape variation representation of 3D shape descriptors.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 922, doi. 10.3969/j.issn.1001-3695.2015.03.065
- By:
- Publication type:
- Article
Component-based facial expression recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 917, doi. 10.3969/j.issn.1001-3695.2015.03.064
- By:
- Publication type:
- Article
Terminator security mobile payment protocol using certificateless public keys cryptography.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 912, doi. 10.3969/j.issn.1001-3695.2015.03.063
- By:
- Publication type:
- Article
Active defense strategy selection of network based on fuzzy static Bayesian game model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 887, doi. 10.3969/j.issn.1001-3695.2015.03.057
- By:
- Publication type:
- Article
Cluster system for binary data frame.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 909, doi. 10.3969/j.issn.1001-3695.2015.03.062
- By:
- Publication type:
- Article
File hiding based on flash redundant blocks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 900, doi. 10.3969/j.issn.1001-3695.2015.03.060
- By:
- Publication type:
- Article
Research on mobile phone anti-theft tracking system based on IMSI detection and face recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 895, doi. 10.3969/j.issn.1001-3695.2015.03.059
- By:
- Publication type:
- Article
Trojan detection method based on analysis of multiple data flow.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 890, doi. 10.3969/j.issn.1001-3695.2015.03.058
- By:
- Publication type:
- Article
ID-based key-insulated authenticated key agreement protocol.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 885, doi. 10.3969/j.issn.1001-3695.2015.03.056
- By:
- Publication type:
- Article
Research on binding smart card with mobile equipments based on certificateless public key cryptography.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 905, doi. 10.3969/j.issn.1001-3695.2015.03.061
- By:
- Publication type:
- Article
New public key cryptography based on QC-MDPC code.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 881, doi. 10.3969/j.issn.1001-3695.2015.03.055
- By:
- Publication type:
- Article
Performance and security optimized tradeoff based on coevolutionary algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 855, doi. 10.3969/j.issn.1001-3695.2015.03.049
- By:
- Publication type:
- Article
Quantum key distribution protocol based on Bell states and its entanglement.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 873, doi. 10.3969/j.issn.1001-3695.2015.03.053
- By:
- Publication type:
- Article
Reminder service self-coordination strategy research based on context in ubiquitous computing environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 800, doi. 10.3969/j.issn.1001-3695.2015.03.036
- By:
- Publication type:
- Article
New routing algorithm for mobile wireless sensor network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 866, doi. 10.3969/j.issn.1001-3695.2015.03.051
- By:
- Publication type:
- Article
Improved broadcasting scheduling algorithm in cognitive radio networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 860, doi. 10.3969/j.issn.1001-3695.2015.03.050
- By:
- Publication type:
- Article
Research on optimization of KLEIN.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 877, doi. 10.3969/j.issn.1001-3695.2015.03.054
- By:
- Publication type:
- Article
Admission control on multi-tiered server system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 852, doi. 10.3969/j.issn.1001-3695.2015.03.048
- By:
- Publication type:
- Article
Privacy preserving recommendation method based on groups.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 869, doi. 10.3969/j.issn.1001-3695.2015.03.052
- By:
- Publication type:
- Article
Method for querying high dimensional data in P2P system based on tree structure.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 842, doi. 10.3969/j.issn.1001-3695.2015.03.046
- By:
- Publication type:
- Article
Self-adaptive context aware routing protocol for delay and tolerant network based on Kaliman filter theory.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 838, doi. 10.3969/j.issn.1001-3695.2015.03.045
- By:
- Publication type:
- Article
Research on unknown label detection protocol based on RFID.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 814, doi. 10.3969/j.issn.1001-3695.2015.03.039
- By:
- Publication type:
- Article
Study of artificial glowworm algorithm based on Gauss mutation in resource scheduling of cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 834, doi. 10.3969/j.issn.1001-3695.2015.03.044
- By:
- Publication type:
- Article
Localization algorithm based on high energy efficiency and fairness in mobile devices.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 846, doi. 10.3969/j.issn.1001-3695.2015.03.047
- By:
- Publication type:
- Article
PA model based on dynamic rational-function and predistortion application.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 806, doi. 10.3969/j.issn.1001-3695.2015.03.037
- By:
- Publication type:
- Article
Bats algorithm research in cloud computing resource scheduling based on membrane computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 830, doi. 10.3969/j.issn.1001-3695.2015.03.043
- By:
- Publication type:
- Article
Optimized test ports selecting method on 3D-NoC.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 810, doi. 10.3969/j.issn.1001-3695.2015.03.038
- By:
- Publication type:
- Article
Object based cooperative awareness model and its applications.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 771, doi. 10.3969/j.issn.1001-3695.2015.03.030
- By:
- Publication type:
- Article
Design of resource allocation scheme for D2D based on Kuhn-Munkres optimal matching.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 827, doi. 10.3969/j.issn.1001-3695.2015.03.042
- By:
- Publication type:
- Article
Evaluation method of network invulnerability based on nonoverlapping paths entropy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 825, doi. 10.3969/j.issn.1001-3695.2015.03.041
- By:
- Publication type:
- Article
Game-based probabilistic approach for multi-objective clustering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 821, doi. 10.3969/j.issn.1001-3695.2015.03.040
- By:
- Publication type:
- Article
Predicable, concurrent and real-time transmiision of high-speed data streams in online BCI.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 794, doi. 10.3969/j.issn.1001-3695.2015.03.035
- By:
- Publication type:
- Article
Test data generation based on adaptive mutation particle swarim algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 786, doi. 10.3969/j.issn.1001-3695.2015.03.033
- By:
- Publication type:
- Article
Fault localization based on enhanced radial basis function network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 781, doi. 10.3969/j.issn.1001-3695.2015.03.032
- By:
- Publication type:
- Article
Exception handling method based on hierarchical classification in J2EE applications.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 776, doi. 10.3969/j.issn.1001-3695.2015.03.031
- By:
- Publication type:
- Article
Research on temporal candidate key with cardinality M.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 748, doi. 10.3969/j.issn.1001-3695.2015.03.025
- By:
- Publication type:
- Article
Design and development of rapid evaluation system of vehicle dynamics simulation based on SciDAV is.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 790, doi. 10.3969/j.issn.1001-3695.2015.03.034
- By:
- Publication type:
- Article
Global optimization of black-box function using improved EGO algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 764, doi. 10.3969/j.issn.1001-3695.2015.03.028
- By:
- Publication type:
- Article
Random walls based approximate approach for topic search.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 759, doi. 10.3969/j.issn.1001-3695.2015.03.027
- By:
- Publication type:
- Article
Combined nested partitions method based on local search algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 752, doi. 10.3969/j.issn.1001-3695.2015.03.026
- By:
- Publication type:
- Article
Large scale microblog's topic discovery based on PBTM.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 3, p. 768, doi. 10.3969/j.issn.1001-3695.2015.03.029
- By:
- Publication type:
- Article