Works matching IS 10013695 AND DT 2013 AND VI 30 AND IP 11
Results: 82
Improved algorithm of adaptive Gaussian mixture model for real-time moving object detection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3518, doi. 10.3969/j.issn.1001-3695.2013.11.082
- By:
- Publication type:
- Article
Image semantic segmentation based on higher-order CRF model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3514, doi. 10.3969/j.issn.1001-3695.2013.11.081
- By:
- Publication type:
- Article
Variational level set method of medical image segmentation based on kernel fuzzy clustering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3510, doi. 10.3969/j.issn.1001-3695.2013.10.080
- By:
- Publication type:
- Article
Particle filter tracking method of color and SIFT features based adaptive fusion.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3506, doi. 10.3969/j.issn.1001-3695.2013.11.079
- By:
- Publication type:
- Article
Ultrasound image despeckling using polar coordinate system and Monte Carlo approach.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3503, doi. 10.3969/j.issn.1001-3695.2013.10.078
- By:
- Publication type:
- Article
Feature line extraction method for heritage image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3500, doi. 10.3969/j.issn.1001-3695.2013.11.077
- By:
- Publication type:
- Article
Practical license plate recognition method based on multi-feature extraction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3495, doi. 10.3969/j.issn.1001-3695.2013.11.076
- By:
- Publication type:
- Article
New approach to model registration via shape descriptor.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3492, doi. 10.3969/j.issn.1001-3695.2013.11.075
- By:
- Publication type:
- Article
Iterative tensor high-order singular value decomposition method for image restoration.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3488, doi. 10.3969/j.issn.1001-3695.2013.11.074
- By:
- Publication type:
- Article
3D object recognition based on path-contour.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3483, doi. 10.3969/j.issn.1001-3695.2013.11.073
- By:
- Publication type:
- Article
Step by step 3D face reconstruction algorithm based on CLG optical flow.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3480, doi. 10.3969/j.issn.1001-3695.2013.11.072
- By:
- Publication type:
- Article
Effective image classification method based on HOG-PCA.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3476, doi. 10.3969/j.issn.1001-3695.2013.11.071
- By:
- Publication type:
- Article
Improving coverage of wireless sensor network using enhanced adaptive PSO algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3472, doi. 10.3969/j.issn.1001-3695.2013.11.070
- By:
- Publication type:
- Article
Reservation multiple access protocol in underwater sensor networks based on compressed sensing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3470, doi. 10.3969/j.issn.1001-3695.2013.11.069
- By:
- Publication type:
- Article
High speed Chirp BOK square law detection and equalization in multipath channel.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3463, doi. 10.3969/j.issn.1001-3695.2013.11.067
- By:
- Publication type:
- Article
Robust target tracking in LOS/NLOS hybrid environment based on interactive multiple model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3466, doi. 10.3969/j.issn.1001-3695.2013.11.068
- By:
- Publication type:
- Article
Congestion control algorithm based on dynamic threshold.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 4359, doi. 10.3969/j.issn.1001-3695.2013.11.066
- By:
- Publication type:
- Article
Group cooperation method for physical layer security based on cooperated beamforming.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3421, doi. 10.3969/j.issn.1001-3695.2013.11.056
- By:
- Publication type:
- Article
Sharing software watermarking scheme based on chaotic optimization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3418, doi. 10.3969/j.issn.1001-3695.2013.11.055
- By:
- Publication type:
- Article
Unequal authenticity protection for light signature scheme in high-bitrate video multicast.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3380, doi. 10.3969/j.issn.1001-3695.2013.11.044
- By:
- Publication type:
- Article
Steganalysis of additive modelable information hiding using phase angles.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3411, doi. 10.3969/j.issn.1001-3695.2013.11.053
- By:
- Publication type:
- Article
Behavior detection of malware based on combination of API function and its parameters.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3407, doi. 10.3969/j.issn.1001-3695.2013.11.052
- By:
- Publication type:
- Article
Design of adaptive cooperation policy in MANET accessing Internet.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3455, doi. 10.3969/j.issn.1001-3695.2013.11.065
- By:
- Publication type:
- Article
Multi-cell joint processing algorithm based on SLNR criterion.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3451, doi. 10.3969/j.issn.1001-3695.2013.11.064
- By:
- Publication type:
- Article
New mechanism applied for congestion control in hierarchical mobile IPv6 networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3448, doi. 10.3969/j.issn.1001-3695.2013.11.063
- By:
- Publication type:
- Article
Novel frame synchronization method for DVB-S2 standard based on SOF + PLSC.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3445, doi. 10.3969/j.issn.1001-3695.2013.11.062
- By:
- Publication type:
- Article
Unicast routing algorithm of earliest deliver based on historical orderliness prediction in DTN.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3442, doi. 10.3969/j.issn.1001-3695.2013.11.061
- By:
- Publication type:
- Article
DDoS defense collaborative relationship optimization algorithm based on social network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3438, doi. 10.3969/j.issn.1001-3695.2013.11.060
- By:
- Publication type:
- Article
Research on adaptive network theft Trojan detection model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3434, doi. 10.3969/j.issn.1001-3695.2013.11.059
- By:
- Publication type:
- Article
DCT and Logistic Map based multiple robust watermarks for medical image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3430, doi. 10.3969/j.issn.1001-3695.2013.11.058
- By:
- Publication type:
- Article
Method to detect Chinese domain name homograph attack.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3426, doi. 10.3969/j.issn.1001-3695.2013.11.057
- By:
- Publication type:
- Article
Analysis and improvement of new blind signature scheme.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3404, doi. 10.3969/j.issn.1001-3695.2013.11.051
- By:
- Publication type:
- Article
Evaluation method for IMS network attack effect based on fuzzy comprehensive evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3400, doi. 10.3969/j.issn.1001-3695.2013.11.050
- By:
- Publication type:
- Article
Effective and efficient copy detection algorithm for Web video.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3414, doi. 10.3969/j.issn.1001-3695.2013.11.054
- By:
- Publication type:
- Article
Annotated random intervals indexing for reachability determination in large graphs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3374, doi. 10.3969/j.issn.1001-3695.2013.11.043
- By:
- Publication type:
- Article
Application-layer DoS attack detection based on HMM.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3393, doi. 10.3969/j.issn.1001-3695.2013.11.048
- By:
- Publication type:
- Article
QoS control based on kernel density estimation in soft real-time task.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3346, doi. 10.3969/j.issn.1001-3695.2013.11.036
- By:
- Publication type:
- Article
Formal method of product design in mass customization based on theory of polychromatic sets.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3362, doi. 10.3969/j.issn.1001-3695.2013.11.040
- By:
- Publication type:
- Article
Differential fault attack on LILI-128.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3396, doi. 10.3969/j.issn.1001-3695.2013.11.049
- By:
- Publication type:
- Article
Improved task scheduling mechanism for MapReduce in heterogeneous environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3370, doi. 10.3969/j.issn.1001-3695.2013.11.042
- By:
- Publication type:
- Article
Analysis and improvement of proxy blind signature scheme based on DLP.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3390, doi. 10.3969/j.issn.1001-3695.2013.11.047
- By:
- Publication type:
- Article
Elliptic curve cryptosystem algorithm based on Chebyshev polynomial.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3388, doi. 10.3969/j.issn.1001-3695.2013.11.046
- By:
- Publication type:
- Article
Efficient scalar multiplication of ECC based on composite operations over prime fields.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3385, doi. 10.3969/j.issn.1001-3695.2013.11.045
- By:
- Publication type:
- Article
Description method of spatial data services virtualization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3358, doi. 10.3969/j.issn.1001-3695.2013.11.039
- By:
- Publication type:
- Article
Research on environment interaction problem through mixed input.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3353, doi. 10.3969/j.issn.1001-3695.2013.11.038
- By:
- Publication type:
- Article
FPGA high-level synthesis compile optimization algorithm based on matrix partitioning.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3349, doi. 10.3969/j.issn.1001-3695.2013.11.037
- By:
- Publication type:
- Article
Online trusted evolution of running instance in software evolution process.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3365, doi. 10.3969/j.issn.1001-3695.2013.11.041
- By:
- Publication type:
- Article
Method for fault detection of integrated navigation system based on improved UKF algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3306, doi. 10.3969/j.issn.1001-3695.2013.11.025
- By:
- Publication type:
- Article
Study on disassembly profit probability model considering multi-constraints under uncertain environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3339, doi. 10.3969/j.issn.1001-3695.2013.11.034
- By:
- Publication type:
- Article
Method and application research of three-dimensional RFID positioning system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3336, doi. 10.3969/j.issn.1001-3695.2013.11.033
- By:
- Publication type:
- Article