Works matching IS 10013695 AND DT 2013 AND VI 30 AND IP 9
Results: 82
Blending detailed color by registering line segments for image mosaic.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2878, doi. 10.3969/j.issn.1001-3695.2013.09.082
- By:
- Publication type:
- Article
Semantic understanding technology of sketch type-stroke in concept design.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2875, doi. 10.3969/j.issn.1001-3695.2013.09.081
- By:
- Publication type:
- Article
Improved algorithm based on full reference blur ratio.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2872, doi. 10.3969/j.issn.1001-3695.2013.09.080
- By:
- Publication type:
- Article
Multi-classification method applied to face recognition based on mixed Gaussian distribution.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2868, doi. 10.3969/j.issn.1001-3695.2013.09.079
- By:
- Publication type:
- Article
Volume rendering based on zero-cross points of boundary surface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2865, doi. 10.3969/j.issn.1001-3695.2013.09.078
- By:
- Publication type:
- Article
Algorithm of image matching based on improved SIFT feature and graph transformation matching.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2861, doi. 10.3969/j.issn.1001-3695.2013.09.077
- By:
- Publication type:
- Article
Camera array-based HDR image synthesis method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2858, doi. 10.3969/j.issn.1001-3695.2013.09.076
- By:
- Publication type:
- Article
Method of line target detection in 3D CT image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2855, doi. 10.3969/j.issn.1001-3695.2013.09.075
- By:
- Publication type:
- Article
Based on concave point direction line adhesion drug image segmentation method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2852, doi. 10.3969/j.issn.1001-3695.2013.09.074
- By:
- Publication type:
- Article
Multiple features and SVM combined SAR image segmentation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2846, doi. 10.3969/j.issn.1001-3695.2013.09.073
- By:
- Publication type:
- Article
Research on impact of clear channel assessment on coexistence of ZigBee and Wi-Fi.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2843, doi. 10.3969/j.issn.1001-3695.2013.09.072
- By:
- Publication type:
- Article
Implementation and evaluation of cross-layer cooperative routing in multi-hop wireless networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2839, doi. 10.3969/j.issn.1001-3695.2013.09.071
- By:
- Publication type:
- Article
Low power listening MAC protocol with collision avoidance and traffic adaption.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2835, doi. 10.3969/j.issn.1001-3695.2013.09.070
- By:
- Publication type:
- Article
Cloud resources multi-attribute range-query algorithm based on peer-to-peer network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2831, doi. 10.3969/j.issn.1001-3695.2013.09.069
- By:
- Publication type:
- Article
Two-topology based high-level simulation platform for NoC performance evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2827, doi. 10.3969/j.issn.1001-3695.2013.09.068
- By:
- Publication type:
- Article
Triangulation-based localization algorithm over complex 3D terrains.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2823, doi. 10.3969/j.issn.1001-3695.2013.09.067
- By:
- Publication type:
- Article
IoT identifier resolver with intelligent predictive cache.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2819, doi. 10.3969/j.issn.1001-3695.2013.09.066
- By:
- Publication type:
- Article
Single sign-on transparent integration technology for Web systems with HTTP authentication protocols.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2813, doi. 10.3969/j.issn.1001-3695.2013.09.065
- By:
- Publication type:
- Article
Dynamic symbolic execution based defect detection system for binary programs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2810, doi. 10.3969/j.issn.1001-3695.2013.09.064
- By:
- Publication type:
- Article
Improved scheme of quantum key distribution based on BB84 protocol.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2807, doi. 10.3969/j.issn.1001-3695.2013.09.063
- By:
- Publication type:
- Article
Wet-paper stego-coding based on cyclic-code.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2805, doi. 10.3969/j.issn.1001-3695.2013.09.062
- By:
- Publication type:
- Article
Research on trust model based on infinitely repeated games theory in P2P networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2802, doi. 10.3969/j.issn.1001-3695.2013.09.061
- By:
- Publication type:
- Article
Key pre-distribution scheme for wireless sensor network using matrix deployed knowledge.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2799, doi. 10.3969/j.issn.1001-3695.2013.09.060
- By:
- Publication type:
- Article
Joint compression-encryption of block image based on context.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2795, doi. 10.3969/j.issn.1001-3695.2013.09.059
- By:
- Publication type:
- Article
Detection algorithm of image copy-move forgery based on Harris and spacial average information.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2791, doi. 10.3969/j.issn.1001-3695.2013.09.058
- By:
- Publication type:
- Article
Authentication encryption scheme based on lattice.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2788, doi. 10.3969/j.issn.1001-3695.2013.09.057
- By:
- Publication type:
- Article
Separate privilege virtual machine security model based on mutual trust.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2784, doi. 10.3969/j.issn.1001-3695.2013.09.056
- By:
- Publication type:
- Article
Research on payload adaptive batch steganography.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2780, doi. 10.3969/j.issn.1001-3695.2013.09.055
- By:
- Publication type:
- Article
Research on attach and strategy of CAPTCHA technology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2776, doi. 10.3969/j.issn.1001-3695.2013.09.054
- By:
- Publication type:
- Article
Probabilistic public-key cryptosystem based on Chebyshev.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2772, doi. 10.3969/j.issn.1001-3695.2013.09.053
- By:
- Publication type:
- Article
Research of predicting insider threat based on Bayesian network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2767, doi. 10.3969/j.issn.1001-3695.2013.09.052
- By:
- Publication type:
- Article
Research of quantitative network security assessment based on Bayesian-attack graphs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2763, doi. 10.3969/j.issn.1001-3695.2013.09.051
- By:
- Publication type:
- Article
Cloud computing key management scheme based on covert mapping combined public key.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2759, doi. 10.3969/j.issn.1001-3695.2013.09.050
- By:
- Publication type:
- Article
Cooperative method of key derivation for LTE systems based on radio interface and core network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2755, doi. 10.3969/j.issn.1001-3695.2013.09.049
- By:
- Publication type:
- Article
Temporal logic of actions' expression of predicate behavior graph in concurrent system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2752, doi. 10.3969/j.issn.1001-3695.2013.09.048
- By:
- Publication type:
- Article
Research of software defect prediction model based on LASSO-SVM.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2748, doi. 10.3969/j.issn.1001-3695.2013.09.047
- By:
- Publication type:
- Article
Categorical approach for making model of data model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2744, doi. 10.3969/j.issn.1001-3695.2013.09.046
- By:
- Publication type:
- Article
UML sequence based interlocking test case generation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2740, doi. 10.3969/j.issn.1001-3695.2013.09.045
- By:
- Publication type:
- Article
Amelioration method of SNM based on flexible window and ranking adjusting.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2736, doi. 10.3969/j.issn.1001-3695.2013.09.044
- By:
- Publication type:
- Article
Evaluation method of software usability process based on fuzzy analytic hierarchy process.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2730, doi. 10.3969/j.issn.1001-3695.2013.09.043
- By:
- Publication type:
- Article
Dynamic evolution of software architectures and realization based on incidence matrix.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2726, doi. 10.3969/j.issn.1001-3695.2013.09.042
- By:
- Publication type:
- Article
Logic simulation of correspond with OSEK/VDX OS specification.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2722, doi. 10.3969/j.issn.1001-3695.2013.09.041
- By:
- Publication type:
- Article
Design and implementation of senior portal based on technology acceptance model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2718, doi. 10.3969/j.issn.1001-3695.2013.09.040
- By:
- Publication type:
- Article
Method of real-time city-traffic monitoring based on simplified road network model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2715, doi. 10.3969/j.issn.1001-3695.2013.09.039
- By:
- Publication type:
- Article
Cloud computing strategy of coordinated control in urban region traffic things networking.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2711, doi. 10.3969/j.issn.1001-3695.2013.09.038
- By:
- Publication type:
- Article
Research on unified coding system for Internet of things.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2707, doi. 10.3969/j.issn.1001-3695.2013.09.037
- By:
- Publication type:
- Article
Design and implementation of GPS location history data mining and anomalous detection system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2704, doi. 10.3969/j.issn.1001-3695.2013.09.036
- By:
- Publication type:
- Article
Discrete-time high-order distributed consensus algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2700, doi. 10.3969/j.issn.1001-3695.2013.09.035
- By:
- Publication type:
- Article
Graph matching algorithm based on edge map's connection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2697, doi. 10.3969/j.issn.1001-3695.2013.09.034
- By:
- Publication type:
- Article
Fuzzy artificial bees colony algorithm for solving traveling salesman problem.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2694, doi. 10.3969/j.issn.1001-3695.2013.09.033
- By:
- Publication type:
- Article