Works matching IS 10013695 AND DT 2014 AND VI 31 AND IP 3
Results: 77
Research of classification method for natural images based on adaptive feature-weighted K-nearest neighbors.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 957, doi. 10.3969/j.issn.1001-3695.2014.03.077
- By:
- Publication type:
- Article
Hand gesture recognition based on combining Hu moments and BoF-SURF support vector machine.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 953, doi. 10.3969/j.issn.1001-3695.2014.03.076
- By:
- Publication type:
- Article
Clustering data gathering scheme based on hybrid CS in WSN.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 892, doi. 10.3969/j.issn.1001-3695.2014.03.061
- By:
- Publication type:
- Article
Data aggregation scheduling algorithm with uniform power control.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 888, doi. 10.3969/j.issn.1001-3695.2014.03.060
- By:
- Publication type:
- Article
Method support correlation-service with Web service selection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 879, doi. 10.3969/j.issn.1001-3695.2014.03.058
- By:
- Publication type:
- Article
Iterative location algorithm for LTE mobile station under NLOS environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 876, doi. 10.3969/j.issn.1001-3695.2014.03.057
- By:
- Publication type:
- Article
Construction scheme of multiple secure virtual private networks over next generation optical access networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 884, doi. 10.3969/j.issn.1001-3695.2014.03.059
- By:
- Publication type:
- Article
Head-shoulder detection based on LW-PGD and SVM in video.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 949, doi. 10.3969/j.issn.1001-3695.2014.03.075
- By:
- Publication type:
- Article
Point cloud simplification technology of 3D optical measurement applied on reverse engineering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 946, doi. 10.3969/j.issn.1001-3695.2014.03.074
- By:
- Publication type:
- Article
A video-data-driven method to generate water surface models.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 942, doi. 10.3969/j.issn.1001-3695.2014.03.073
- By:
- Publication type:
- Article
Recognition of control chart patterns based on feature fusion with support vector machine.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 937, doi. 10.3969/j.issn.1001-3695.2014.03.072
- By:
- Publication type:
- Article
Novel minimum distance clip method based on color space for video coding.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 933, doi. 10.3969/j.issn.1001-3695.2014.03.071
- By:
- Publication type:
- Article
Real-time tracking using multi-feature weighting based on compressive sensing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 929, doi. 10.3969/j.issn.1001-3695.2014.03.070
- By:
- Publication type:
- Article
Method of ghost suppression based on similarity measure.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 926, doi. 10.3969/j.issn.1001-3695.2014.03.069
- By:
- Publication type:
- Article
Fused monogenic binary pattern combined with spatial saliency for facial emotion classification.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 921, doi. 10.3969/j.issn.1001-3695.2014.03.068
- By:
- Publication type:
- Article
Research of rapid eye movement recognition algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 917, doi. 10.3969/j.issn.1001-3695.2014.03.067
- By:
- Publication type:
- Article
Resource allocation scheme based on coalitional game model in mobile cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 912, doi. 10.3969/j.issn.1001-3695.2014.03.066
- By:
- Publication type:
- Article
Research on dispatching and management model based on safe performance interface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- By:
- Publication type:
- Article
Virtual potential field based coverage optimization algorithm for directional sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 905, doi. 10.3969/j.issn.1001-3695.2014.03.064
- By:
- Publication type:
- Article
Optimum sensor allocation in distortion tolerant wireless sensor network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 901, doi. 10.3969/j.issn.1001-3695.2014.03.063
- By:
- Publication type:
- Article
Modeling for overlay network topology based on multivariable tradeoff.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 898, doi. 10.3969/j.issn.1001-3695.2014.03.062
- By:
- Publication type:
- Article
Load balancing algorithm based on probability for Ad hoc networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 872, doi. 10.3969/j.issn.1001-3695.2014.03.056
- By:
- Publication type:
- Article
Data anonymization based on restriction of information gain ratio:method and evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 819, doi. 10.3969/j.issn.1001-3695.2014.03.044
- By:
- Publication type:
- Article
Assessment of vulnerability threat based on fuzzy theory.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 815, doi. 10.3969/j.issn.1001-3695.2014.03.043
- By:
- Publication type:
- Article
Vulnerability assessment based on correlation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 811, doi. 10.3969/j.issn.1001-3695.2014.03.042
- By:
- Publication type:
- Article
Research on recommendation algorithm by fusing social network and trust.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 808, doi. 10.3969/j.issn.1001-3695.2014.03.041
- By:
- Publication type:
- Article
Multi-objective location-transportation model in post-disaster relief operations.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 804, doi. 10.3969/j.issn.1001-3695.2014.03.040
- By:
- Publication type:
- Article
Ubiquitous data collection protocol for maximizing lifetime of WSN.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 866, doi. 10.3969/j.issn.1001-3695.2014.03.055
- By:
- Publication type:
- Article
Energy-efficient data gathering algorithm with speed control.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 860, doi. 10.3969/j.issn.1001-3695.2014.03.054
- By:
- Publication type:
- Article
Socially aware multiple-copy opportunistic routing protocol for VANETs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 857, doi. 10.3969/j.issn.1001-3695.2014.03.053
- By:
- Publication type:
- Article
Implementation of reconfigurable of DES and SM4 encryption algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 853, doi. 10.3969/j.issn.1001-3695.2014.03.052
- By:
- Publication type:
- Article
Reversible data hiding method with large embedded capacity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 850, doi. 10.3969/j.issn.1001-3695.2014.03.051
- By:
- Publication type:
- Article
Steganalysis of LSB matching based on neighborhood correlation of pixels.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 846, doi. 10.3969/j.issn.1001-3695.2014.03.050
- By:
- Publication type:
- Article
Differential power analysis attacks on PRESENT.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 843, doi. 10.3969/j.issn.1001-3695.2014.03.049
- By:
- Publication type:
- Article
Data hiding based on disk slack space.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 839, doi. 10.3969/j.issn.1001-3695.2014.03.048
- By:
- Publication type:
- Article
Research on two-dimensional and multi-levels reliability evaluation method of cloud service.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 832, doi. 10.3969/j.issn.1001-3695.2014.03.047
- By:
- Publication type:
- Article
Ancilla-driven universal blind quantum computation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 829, doi. 10.3969/j.issn.1001-3695.2014.03.046
- By:
- Publication type:
- Article
Efficient identity-based signature scheme from lattices.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 825, doi. 10.3969/j.issn.1001-3695.2014.03.045
- By:
- Publication type:
- Article
Modeling and simulation of left-turn vehicle collision avoidance behavior in intersection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 801, doi. 10.3969/j.issn.1001-3695.2014.03.039
- By:
- Publication type:
- Article
Complex network based simulation model for transportation network congestion evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 796, doi. 10.3969/j.issn.1001-3695.2014.03.038
- By:
- Publication type:
- Article
Topic detection model based on Bayesian belief network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 792, doi. 10.3969/j.issn.1001-3695.2014.03.037
- By:
- Publication type:
- Article
Location algorithm based on RKNN and its applications.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 789, doi. 10.3969/j.issn.1001-3695.2014.03.036
- By:
- Publication type:
- Article
Study of multi-source information resources cloud systems and cloud services model on cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 784, doi. 10.3969/j.issn.1001-3695.2014.03.035
- By:
- Publication type:
- Article
Dynamic position detection method for large rotary parts based on IMM.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 780, doi. 10.3969/j.issn.1001-3695.2014.03.034
- By:
- Publication type:
- Article
Method of real-time traffic statistics using mobile network signaling.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 776, doi. 10.3969/j.issn.1001-3695.2014.03.033
- By:
- Publication type:
- Article
Profitability analysis of third-party Internet payment platform.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 773, doi. 10.3969/j.issn.1001-3695.2014.03.032
- By:
- Publication type:
- Article
Research of subjective trust evaluation model based on fuzzy theory.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 769, doi. 10.3969/j.issn.1001-3695.2014.03.031
- By:
- Publication type:
- Article
Uncertain continuous time series Top-K anomaly detection method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 765, doi. 10.3969/j.issn.1001-3695.2014.03.030
- By:
- Publication type:
- Article
Group recommendation algorithm for online community users.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 696, doi. 10.3969/j.issn.1001-3695.2014.03.013
- By:
- Publication type:
- Article
Study on tourism flow forecast; based on seasonal adjustment' PSO-SVR model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 692, doi. 10.3969/j.issn.1001-3695.2014.03.012
- By:
- Publication type:
- Article