Works matching IS 10013695 AND DT 2013 AND VI 30 AND IP 12
Results: 92
Switching vector median filter based on fuzzy decision.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3870, doi. 10.3969/j.issn.1001-3695.2013.12.092
- By:
- Publication type:
- Article
Real-time face to camera distance measurement system based on monocular vision.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3866, doi. 10.3969/j.issn.1001-3695.2013.12.091
- By:
- Publication type:
- Article
Eyeglasses removal method based on occlusion region compensation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3863, doi. 10.3969/j.issn.1001-3695.2013.12.090
- By:
- Publication type:
- Article
Graph-based near-duplicate video subsequence matching algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3857, doi. 10.3969/j.issn.1001-3695.2013.12.089
- By:
- Publication type:
- Article
Dark channel prior dehazing algorithm based on edge optimization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3854, doi. 10.3969/j.issn.1001-3695.2013.12.088
- By:
- Publication type:
- Article
Multiple watermarks algorithm based on nonsubsampled Contourlet transform and singular value decomposition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3850, doi. 10.3969/j.issn.1001-3695.2013.12.087
- By:
- Publication type:
- Article
Research of fusing image classification into object localization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3844, doi. 10.3969/j.issn.1001-3695.2013.12.086
- By:
- Publication type:
- Article
Application of auto-fitting level set method in lesion segmentation of breast ultrasound images.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3840, doi. 10.3969/j.issn.1001-3695.2013.12.085
- By:
- Publication type:
- Article
Abnormal crowd behavior recognition based on KOD energy model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3836, doi. 10.3969/j.issn.1001-3695.2013.12.084
- By:
- Publication type:
- Article
Research on image technology of shadowed region recovery based on multi-scale Retinex.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3833, doi. 10.3969/j.issn.1001-3695.2013.12.083
- By:
- Publication type:
- Article
Contour drawing method fit visual characteristics.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3832, doi. 10.3969/j.issn.1001-3695.2013.12.082
- By:
- Publication type:
- Article
New FCM algorithm fused universal gravitation and local entropy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3828, doi. 10.3969/j.issn.1001-3695.2013.12.081
- By:
- Publication type:
- Article
Colored hillshading map based on HSV color model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3824, doi. 10.3969/j.issn.1001-3695.2013.12.080
- By:
- Publication type:
- Article
Design and implement of 3D virtual robot kinematics simulation system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3820, doi. 10.3969/j.issn.1001-3695.2013.12.079
- By:
- Publication type:
- Article
Batik graphics morphing algorithm based on increment iterative transformation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3817, doi. 10.3969/j.issn.1001-3695.2013.12.078
- By:
- Publication type:
- Article
Based on machine vision encoder grating assembled eccentric adjustment system design.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3814, doi. 10.3969/j.issn.1001-3695.2013.12.077
- By:
- Publication type:
- Article
Mean-Shift tracking algorithm based on background weighted update approach.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3810, doi. 10.3969/j.issn.1001-3695.2013.12.076
- By:
- Publication type:
- Article
Rotational attack on Luffa hash function.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3807, doi. 10.3969/j.issn.1001-3695.2013.12.075
- By:
- Publication type:
- Article
Evaluation method for fuzzing strategy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3804, doi. 10.3969/j.issn.1001-3695.2013.12.074
- By:
- Publication type:
- Article
Network behavior detection based on data stream analysis.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3800, doi. 10.3969/j.issn.1001-3695.2013.12.073
- By:
- Publication type:
- Article
Certificateless proxy ring signature scheme without bilinear pairings.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3797, doi. 10.3969/j.issn.1001-3695.2013.12.072
- By:
- Publication type:
- Article
Publicly verifiable and renewable multi-secret sharing scheme.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3794, doi. 10.3969/j.issn.1001-3695.2013.12.071
- By:
- Publication type:
- Article
Cross-realm password-authenticated key agreement protocol based on self-certified cryptography.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3790, doi. 10.3969/j.issn.1001-3695.2013.12.070
- By:
- Publication type:
- Article
Novel alarm correlation clustering algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3786, doi. 10.3969/j.issn.1001-3695.2013.12.069
- By:
- Publication type:
- Article
Extension of AVISPA based on concept of channels.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3783, doi. 10.3969/j.issn.1001-3695.2013.12.068
- By:
- Publication type:
- Article
Multi-format audio watermarking algorithm based on improved quantizing DCT domain.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3779, doi. 10.3969/j.issn.1001-3695.2013.12.067
- By:
- Publication type:
- Article
Effective method for analysis of Cisco IOS image injection attack.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3775, doi. 10.3969/j.issn.1001-3695.2013.12.066
- By:
- Publication type:
- Article
System to discover phishing attacks actively based on DNS.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3771, doi. 10.3969/j.issn.1001-3695.2013.12.065
- By:
- Publication type:
- Article
K-Q: algorithm for privacy disclosure detection supporting large number of queries.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3767, doi. 10.3969/j.issn.1001-3695.2013.12.064
- By:
- Publication type:
- Article
Improved defense method against non-control-data attacks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3762, doi. 10.3969/j.issn.1001-3695.2013.12.063
- By:
- Publication type:
- Article
Reputation evaluating model and security routing protocol of wireless sensor networks based on grey Markov model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3758, doi. 10.3969/j.issn.1001-3695.2013.12.062
- By:
- Publication type:
- Article
Secured inter-domain routing mechanism based on key node.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3753, doi. 10.3969/j.issn.1001-3695.2013.12.061
- By:
- Publication type:
- Article
Cryptanalysis of provably digital secure signature schemes.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3749, doi. 10.3969/j.issn.1001-3695.2013.12.060
- By:
- Publication type:
- Article
Deniable ring authentication in concurrent setting.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3745, doi. 10.3969/j.issn.1001-3695.2013.12.059
- By:
- Publication type:
- Article
Optimized random access mechanism for M2M service in LTE system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3742, doi. 10.3969/j.issn.1001-3695.2013.12.058
- By:
- Publication type:
- Article
Time-domain reference based physical layer security method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3738, doi. 10.3969/j.issn.1001-3695.2013.12.057
- By:
- Publication type:
- Article
Model of cloud computing oriented T-RBAC.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3735, doi. 10.3969/j.issn.1001-3695.2013.12.056
- By:
- Publication type:
- Article
Modeling and simulation of high efficiently coded constant envelope system in air-ground data link.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3732, doi. 10.3969/j.issn.1001-3695.2013.12.055
- By:
- Publication type:
- Article
Analysis and control of crosstalk between multi-parallel transmission lines in high-speed interconnect bus structure.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3729, doi. 10.3969/j.issn.1001-3695.2013.12.054
- By:
- Publication type:
- Article
Improved fault-tolerance mechanism in cloud storage system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3724, doi. 10.3969/j.issn.1001-3695.2013.12.053
- By:
- Publication type:
- Article
Architecture for wireless sensor network based on cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3720, doi. 10.3969/j.issn.1001-3695.2013.12.052
- By:
- Publication type:
- Article
DOA estimation of OFDM signal based on sparse representation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3716, doi. 10.3969/j.issn.1001-3695.2013.12.051
- By:
- Publication type:
- Article
Load balancing method in structured P2P network with multiple resources.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3712, doi. 10.3969/j.issn.1001-3695.2013.12.050
- By:
- Publication type:
- Article
MF-TDMA burst allocation algorithm in GEO telecommunication system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3708, doi. 10.3969/j.issn.1001-3695.2013.12.049
- By:
- Publication type:
- Article
Simulation of quantum secure direct communication protocol based on four-qubit cluster state.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3705, doi. 10.3969/j.issn.1001-3695.2013.12.048
- By:
- Publication type:
- Article
Performance simulation study of video transmission based on ONC.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3702, doi. 10.3969/j.issn.1001-3695.2013.12.047
- By:
- Publication type:
- Article
Efficient complexity reduction in codebook search for ACELP.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3699, doi. 10.3969/j.issn.1001-3695.2013.12.046
- By:
- Publication type:
- Article
Research on IOT mass data processing based on analog to information converter.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3694, doi. 10.3969/j.issn.1001-3695.2013.12.045
- By:
- Publication type:
- Article
Research and application of clustering algorithm based on factor of time and space.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3690, doi. 10.3969/j.issn.1001-3695.2013.12.044
- By:
- Publication type:
- Article
Cloud computing architecture oriented household Internet of things.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3686, doi. 10.3969/j.issn.1001-3695.2013.12.043
- By:
- Publication type:
- Article