Works matching IS 10013695 AND DT 2014 AND VI 31 AND IP 4
Results: 78
New optimization algorithm of 0-1 knapsack problem.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 997, doi. 10.3969/j.issn.1001-3695.2014.04.009
- By:
- Publication type:
- Article
Sensitive topic detection based on conditional random fields.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 993, doi. 10.3969/j.issn.1001-3695.2014.04.008
- By:
- Publication type:
- Article
Incremental knowledge acquisition algorithm based on decision information entropy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 989, doi. 10.3969/j.issn.1001-3695.2014.04.007
- By:
- Publication type:
- Article
Robust extreme learning machine algorithm based on imbalanced datasets.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 985, doi. 10.3969/j.issn.1001-3695.2014.04.006
- By:
- Publication type:
- Article
Indoor navigation location model fused various of context for emergency evacuation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 981, doi. 10.3969/j.issn.1001-3695.2014.04.005
- By:
- Publication type:
- Article
Vulnerability analysis of interdependent infrastructure systems.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 976, doi. 10.3969/j.issn.1001-3695.2014.04.004
- By:
- Publication type:
- Article
Improvements of non-negative matrix factorization for image extraction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 970, doi. 10.3969/j.issn.1001-3695.2014.04.003
- By:
- Publication type:
- Article
Survey of customized data security exchange technology for e-government.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 965, doi. 10.3969/j.issn.1001-3695.2014.04.002
- By:
- Publication type:
- Article
Survey on energy-efficient task scheduling with bus conflict avoidance for multi-core embedded systems.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 961, doi. 10.3969/j.issn.1001-3695.2014.04.001
- By:
- Publication type:
- Article
Research of function connection of brain based on color and shape.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1276, doi. 10.3969/j.issn.1001-3695.2014.04.078
- By:
- Publication type:
- Article
Feature preserving algorithm of point cloud iterative simplification.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1273, doi. 10.3969/j.issn.1001-3695.2014.04.077
- By:
- Publication type:
- Article
Fast and efficient facial feature point positioning method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1270, doi. 10.3969/j.issn.1001-3695.2014.04.076
- By:
- Publication type:
- Article
Image de-nosing based on Contourlet transform and improved NeighShink.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1267, doi. 10.3969/j.issn.1001-3695.2014.04.075
- By:
- Publication type:
- Article
New connecting method for border breakpoints in optical image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1264, doi. 10.3969/j.issn.1001-3695.2014.04.074
- By:
- Publication type:
- Article
On-line boosting tracking based on direction texture entropy combined Haar-like feature.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1260, doi. 10.3969/j.issn.1001-3695.2014.04.073
- By:
- Publication type:
- Article
Algorithm of image matching based on improved weighted graph transformation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1256, doi. 10.3969/j.issn.1001-3695.2014.04.072
- By:
- Publication type:
- Article
Multiple description video coding and transmission simulation over ZigBee.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1252, doi. 10.3969/j.issn.1001-3695.2014.04.071
- By:
- Publication type:
- Article
Face recognition algorithm fusing multi-modal monogenic features.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1246, doi. 10.3969/j.issn.1001-3695.2014.04.070
- By:
- Publication type:
- Article
Best viewpoints selection based on feature points detecting.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1242, doi. 10.3969/j.issn.1001-3695.2014.04.069
- By:
- Publication type:
- Article
Levelset algorithm of dental arch curve constraint of multi level set and primary and secondary statistical model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1239, doi. 10.3969/j.issn.1001-3695.2014.04.068
- By:
- Publication type:
- Article
Rapid shape matching algorithm based on contour vectorization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1236, doi. 10.3969/j.issn.1001-3695.2014.04.067
- By:
- Publication type:
- Article
Image segmentation based on fast BP algorithm over local adaptive prior MRF model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1232, doi. 10.3969/j.issn.1001-3695.2014.04.066
- By:
- Publication type:
- Article
Research on iris segmentation based on level set method with keeping circular.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1229, doi. 10.3969/j.issn.1001-3695.2014.04.065
- By:
- Publication type:
- Article
DBH measurement method based on tree images taken by single-CCD camera mounted on theodolite.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1225, doi. 10.3969/j.issn.1001-3695.2014.04.064
- By:
- Publication type:
- Article
Eye tracking method on improved CamShift algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1220, doi. 10.3969/j.issn.1001-3695.2014.04.063
- By:
- Publication type:
- Article
Multi-pose face correction and recogniton based on affine transformation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1215, doi. 10.3969/j.issn.1001-3695.2014.04.062
- By:
- Publication type:
- Article
Research on application of chaotic sequence in security of network coding.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1212, doi. 10.3969/j.issn.1001-3695.2014.04.061
- By:
- Publication type:
- Article
Adaptive threat modeling for secure WSN routing protocols.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1208, doi. 10.3969/j.issn.1001-3695.2014.04.060
- By:
- Publication type:
- Article
Assessment of third-party payment security using attack tree.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1204, doi. 10.3969/j.issn.1001-3695.2014.04.059
- By:
- Publication type:
- Article
Feistel network image encryption algorithm based on hyperchaotic sequence.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1199, doi. 10.3969/j.issn.1001-3695.2014.04.058
- By:
- Publication type:
- Article
Secure certificateless signcryption scheme without bilinear pairing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1195, doi. 10.3969/j.issn.1001-3695.2014.04.057
- By:
- Publication type:
- Article
Optimization of AES and RSA algorithm and its mixed encryption system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1189, doi. 10.3969/j.issn.1001-3695.2014.04.056
- By:
- Publication type:
- Article
Analysis of encryption and decryption process among crypto functions based on dynamic data-flow.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1185, doi. 10.3969/j.issn.1001-3695.2014.04.055
- By:
- Publication type:
- Article
Batch fully homomorphic encryption over integers with shorter public keys.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1180, doi. 10.3969/j.issn.1001-3695.2014.04.054
- By:
- Publication type:
- Article
New method to solve collusion attack and key collision in combined public key.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1176, doi. 10.3969/j.issn.1001-3695.2014.04.053
- By:
- Publication type:
- Article
Intrusion detection model based on multi-decision trees for RFID technology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1172, doi. 10.3969/j.issn.1001-3695.2014.04.052
- By:
- Publication type:
- Article
Research on reconfigurable security carrying network construction and reconfiguration algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1167, doi. 10.3969/j.issn.1001-3695.2014.04.051
- By:
- Publication type:
- Article
Research of admission control model based on Markov decision processes.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1163, doi. 10.3969/j.issn.1001-3695.2014.04.050
- By:
- Publication type:
- Article
Energy optimization and admission control based on game theory in hierarchical wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1158, doi. 10.3969/j.issn.1001-3695.2014.04.049
- By:
- Publication type:
- Article
Research on website growth based on Web user behaviors.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1154, doi. 10.3969/j.issn.1001-3695.2014.04.048
- By:
- Publication type:
- Article
Robust beam-space adaptive beamforming algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1151, doi. 10.3969/j.issn.1001-3695.2014.04.047
- By:
- Publication type:
- Article
QoS optimization mechanism based on hop-bounded mechanism in wireless Mesh networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1147, doi. 10.3969/j.issn.1001-3695.2014.04.046
- By:
- Publication type:
- Article
TDOA co-location method based on natural selection linear decreasing weight PSO and Taylor algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1144, doi. 10.3969/j.issn.1001-3695.2014.04.045
- By:
- Publication type:
- Article
Anomaly detection scheme based on one-class quarter-sphere support vector machine in wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1138, doi. 10.3969/j.issn.1001-3695.2014.04.044
- By:
- Publication type:
- Article
Predicting packet loss based error control algorithm in video transmission.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1135, doi. 10.3969/j.issn.1001-3695.2014.04.043
- By:
- Publication type:
- Article
Research on fast fine C/A code acquisition technique of GPS signal.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1131, doi. 10.3969/j.issn.1001-3695.2014.04.042
- By:
- Publication type:
- Article
Improved multipath-detection algorithm in routing discovery.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1127, doi. 10.3969/j.issn.1001-3695.2014.04.041
- By:
- Publication type:
- Article
Application of adaptive robust UKF algorithm in GPS/BD-2 integrated system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1123, doi. 10.3969/j.issn.1001-3695.2014.04.040
- By:
- Publication type:
- Article
2DPCA modeling and monitoring in penicillin fermentation process.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1098, doi. 10.3969/j.issn.1001-3695.2014.04.034
- By:
- Publication type:
- Article
LM-Smith neural network controller for time-delay system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 4, p. 1115, doi. 10.3969/j.issn.1001-3695.2014.04.038
- By:
- Publication type:
- Article