Works matching IS 10013695 AND DT 2014 AND VI 31 AND IP 2
Results: 78
Multihypothesis prediction algorithm of DCVS based on spatio temporal correlativity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 637, doi. 10.3969/j.issn.1001-3695.2014.02.078
- By:
- Publication type:
- Article
Electronic image stabilization algorithm for high speed surface vehicle vision system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 633, doi. 10.3969/j.issn.1001-3695.2014.02.077
- By:
- Publication type:
- Article
Algorithm on video-based dual background modeling.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 629, doi. 10.3969/j.issn.1001-3695.2014.02.076
- By:
- Publication type:
- Article
LK tracking based on sparse representation and features selection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 625, doi. 10.3969/j.issn.1001-3695.2014.02.075
- By:
- Publication type:
- Article
Building information extraction of high resolution remote sensing image based on moment invariants.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 622, doi. 10.3969/j.issn.1001-3695.2014.02.074
- By:
- Publication type:
- Article
Improvement of key frames in distributed video coding.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 619, doi. 10.3969/j.issn.1001-3695.2014.02.073
- By:
- Publication type:
- Article
Phase-only correlation image matching algorithm under epipolar geometry constraint.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 615, doi. 10.3969/j.issn.1001-3695.2014.02.072
- By:
- Publication type:
- Article
Volume measurement study of 3D medical reconstruction model based on quasi-Monte Carlo method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 612, doi. 10.3969/j.issn.1001-3695.2014.02.071
- By:
- Publication type:
- Article
Segmentation of banknote serial number with predicting priori knowledge.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 608, doi. 10.3969/j.issn.1001-3695.2014.02.070
- By:
- Publication type:
- Article
Approach of similarity analysis for non-rigid models combining diffusion distance with MDS.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 605, doi. 10.3969/j.issn.1001-3695.2014.02.069
- By:
- Publication type:
- Article
Correlation of sequence-based ultrasound image adaptive denoising.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 600, doi. 10.3969/j.issn.1001-3695.2014.02.068
- By:
- Publication type:
- Article
Blind image deblurring based on regularization method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 596, doi. 10.3969/j.issn.1001-3695.2014.02.067
- By:
- Publication type:
- Article
Counter-harmonic mean-based tensor morphological operators and application in edge detection for color images.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 593, doi. 10.3969/j.issn.1001-3695.2014.02.066
- By:
- Publication type:
- Article
Pseudoinverse solution to construction of cubic splines.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 590, doi. 10.3969/j.issn.1001-3695.2014.02.065
- By:
- Publication type:
- Article
Efficient hierarchical group signature based on elliptic curve.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 586, doi. 10.3969/j.issn.1001-3695.2014.02.064
- By:
- Publication type:
- Article
Data correlation analysis assists vulnerability detection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 583, doi. 10.3969/j.issn.1001-3695.2014.02.063
- By:
- Publication type:
- Article
Improved multi-source heterogeneous alert aggregation scheme.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 579, doi. 10.3969/j.issn.1001-3695.2014.02.062
- By:
- Publication type:
- Article
3D model steganalysis based on geometry characteristics.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 576, doi. 10.3969/j.issn.1001-3695.2014.02.061
- By:
- Publication type:
- Article
Packet delay based binding method of label to data stream.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 571, doi. 10.3969/j.issn.1001-3695.2014.02.060
- By:
- Publication type:
- Article
Research of color image watermarking algorithm based on biorthogonal lifting wavelet and singular value decomposition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 568, doi. 10.3969/j.issn.1001-3695.2014.02.059
- By:
- Publication type:
- Article
Rational fairness exchange protocols based on maximum entropy principle.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 563, doi. 10.3969/j.issn.1001-3695.2014.02.058
- By:
- Publication type:
- Article
Safety transition system and its application.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 558, doi. 10.3969/j.issn.1001-3695.2014.02.057
- By:
- Publication type:
- Article
Express information protection application based on K-anonymity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 555, doi. 10.3969/j.issn.1001-3695.2014.02.056
- By:
- Publication type:
- Article
Electronic cash system with multiple banks based on TPM for cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 551, doi. 10.3969/j.issn.1001-3695.2014.02.055
- By:
- Publication type:
- Article
Malware detection by monitoring host's activities.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 547, doi. 10.3969/j.issn.1001-3695.2014.02.054
- By:
- Publication type:
- Article
Feasibility analysis of privacy-preserving data mining models based on security multiparty computation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 543, doi. 10.3969/j.issn.1001-3695.2014.02.053
- By:
- Publication type:
- Article
Analysis and improvement of a certificateless proxy blind signature.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 540, doi. 10.3969/j.issn.1001-3695.2014.02.052
- By:
- Publication type:
- Article
Multi-authority attribute based signature scheme suitable for distributed system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 536, doi. 10.3969/j.issn.1001-3695.2014.02.051
- By:
- Publication type:
- Article
New secure cetificateless signcryption scheme without pairing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 532, doi. 10.3969/j.issn.1001-3695.2014.02.050
- By:
- Publication type:
- Article
User behavior analysis based on segmentation, clustering and timing relationship analysis.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 526, doi. 10.3969/j.issn.1001-3695.2014.02.049
- By:
- Publication type:
- Article
IACO resources search algorithm in unstructured P2P network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 522, doi. 10.3969/j.issn.1001-3695.2014.02.048
- By:
- Publication type:
- Article
Improvement of Chord search algorithm research in P2P network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 518, doi. 10.3969/j.issn.1001-3695.2014.02.047
- By:
- Publication type:
- Article
Connectivity on one-dimensional flight route in aeronautical Ad hoc network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 515, doi. 10.3969/j.issn.1001-3695.2014.02.046
- By:
- Publication type:
- Article
Weighting of credibility cooperative spectrum sensing based on dynamic threshold.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 511, doi. 10.3969/j.issn.1001-3695.2014.02.045
- By:
- Publication type:
- Article
Study on evaluating impact of narrowband interference on Beidou navigation system's signals.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 507, doi. 10.3969/j.issn.1001-3695.2014.02.044
- By:
- Publication type:
- Article
High-accuracy phase estimation of single-tone based on restricted phase unwrapping.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 503, doi. 10.3969/j.issn.1001-3695.2014.02.043
- By:
- Publication type:
- Article
Wireless broadcasting retransmission scheme based on Fourier matrix.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 500, doi. 10.3969/j.issn.1001-3695.2014.02.042
- By:
- Publication type:
- Article
Uplink CSI based adaptive predicted repeat GBN-HARQ scheme.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 496, doi. 10.3969/j.issn.1001-3695.2014.02.041
- By:
- Publication type:
- Article
Spectrum allocation mechanism based on group buying.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 492, doi. 10.3969/j.issn.1001-3695.2014.02.40
- By:
- Publication type:
- Article
Research on sociality routing algorithms in mobile social networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 488, doi. 10.3969/j.issn.1001-3695.2014.02.039
- By:
- Publication type:
- Article
Research on relay node placement based on greedy algorithm in wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 485, doi. 10.3969/j.issn.1001-3695.2014.02.038
- By:
- Publication type:
- Article
Design of metro automatic fare collection system based on cloud computing technology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 480, doi. 10.3969/j.issn.1001-3695.2014.02.037
- By:
- Publication type:
- Article
Research of logistics park service resource sharing and configuration mode based on cloud logistics services.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 476, doi. 10.3969/j.issn.1001-3695.2014.02.036
- By:
- Publication type:
- Article
Design of robust H<sub>∞</sub> controller for networked control systems.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 472, doi. 10.3969/j.issn.1001-3695.2014.02.035
- By:
- Publication type:
- Article
Research of event-based continuous data protection system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 465, doi. 10.3969/j.issn.1001-3695.2014.02.034
- By:
- Publication type:
- Article
Spread model and application of shortage of supplies for emergency logistics network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 461, doi. 10.3969/j.issn.1001-3695.2014.02.033
- By:
- Publication type:
- Article
Application of data model for guidance system in deploying guide signs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 457, doi. 10.3969/j.issn.1001-3695.2014.02.032
- By:
- Publication type:
- Article
Research on space-time accessibility considering direction of travel.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 455, doi. 10.3969/j.issn.1001-3695.2014.02.031
- By:
- Publication type:
- Article
Real-time system simulation and verification approach based on STeC to Stateflow transformation system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 448, doi. 10.3969/j.issn.1001-3695.2014.02.030
- By:
- Publication type:
- Article
Description of domain requirement based on limited language.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 444, doi. 10.3969/j.issn.1001-3695.2014.02.029
- By:
- Publication type:
- Article