Works matching IS 10013695 AND DT 2015 AND VI 32 AND IP 1
Results: 74
Compressive fusion for remote-sensing images by block compressed sensing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 316, doi. 10.3969/j.issn.1001-3695.215.01.074
- By:
- Publication type:
- Article
Edit propagation based on region transformation and RF filter.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 312, doi. 10.3969/j.issn.1001-3695.215.01.073
- By:
- Publication type:
- Article
Level set method combined global and local information and its application to breast MRI.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 307, doi. 10.3969/j.issn.1001-3695.215.01.072
- By:
- Publication type:
- Article
Texture classification method via random feature dictionary.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 303, doi. 10.3969/j.issn.1001-3695.215.01.071
- By:
- Publication type:
- Article
Application of AMM based on heteroscedastic PLDA in three-dimensional face recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 298, doi. 10.3969/j.issn.1001-3695.215.01.070
- By:
- Publication type:
- Article
MIMO multiple descriptions design based on lattice reduction aided linear precoding.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 295, doi. 10.3969/j.issn.1001-3695.215.01.069
- By:
- Publication type:
- Article
Compressed sensing for gait recognition with WM-CoSaMP.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 291, doi. 10.3969/j.issn.1001-3695.215.01.068
- By:
- Publication type:
- Article
Fractional block matching three-dimensional filter.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 287, doi. 10.3969/j.issn.1001-3695.215.01.067
- By:
- Publication type:
- Article
Visual saliency detection based on color and texture features.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 284, doi. 10.3969/j.issn.1001-3695.215.01.066
- By:
- Publication type:
- Article
Low rank representation based mitosis detection on breast cancer histopathology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 280, doi. 10.3969/j.issn.1001-3695.215.01.065
- By:
- Publication type:
- Article
Remote sensing image de-blur with bidimensional empirical mode decomposition algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 276, doi. 10.3969/j.issn.1001-3695.215.01.064
- By:
- Publication type:
- Article
Target points positioning algorithm based on rare information in uncalibrated camera's photos.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 271, doi. 10.3969/j.issn.1001-3695.215.01.063
- By:
- Publication type:
- Article
Research on multi-satellites area observation planning method based on capability of imaging resource.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 269, doi. 10.3969/j.issn.1001-3695.215.01.062
- By:
- Publication type:
- Article
Frame-level low complexity end-to-end distortion estimation technique for stereoscopic video transmission.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 265, doi. 10.3969/j.issn.1001-3695.215.01.061
- By:
- Publication type:
- Article
Grayscale image DSCM matching algorithm evaluation system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 262, doi. 10.3969/j.issn.1001-3695.215.01.060
- By:
- Publication type:
- Article
E-mail filtering algorithm with boundary decision rules based on rough set.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 258, doi. 10.3969/j.issn.1001-3695.215.01.059
- By:
- Publication type:
- Article
Cryptanalysis and improvement of Lai's authenticated group key transfer protocol.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 254, doi. 10.3969/j.issn.1001-3695.215.01.058
- By:
- Publication type:
- Article
Study on trust evaluation model based on cloud model and trust chain.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 249, doi. 10.3969/j.issn.1001-3695.215.01.057
- By:
- Publication type:
- Article
Protocol identification association analysis in mobile network environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 243, doi. 10.3969/j.issn.1001-3695.215.01.056
- By:
- Publication type:
- Article
Social discovery service model for location privacy protection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 239, doi. 10.3969/j.issn.1001-3695.215.01.055
- By:
- Publication type:
- Article
Dynamic initial block-size strategy research of Cascade protocol based on error rate model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 236, doi. 10.3969/j.issn.1001-3695.215.01.054
- By:
- Publication type:
- Article
Suspicious vulnerability locating based on taint state space.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 232, doi. 10.3969/j.issn.1001-3695.215.01.053
- By:
- Publication type:
- Article
Research on predicting attack path based on Bayesian inference.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 226, doi. 10.3969/j.issn.1001-3695.215.01.052
- By:
- Publication type:
- Article
Hybrid mutual anonymous authentication protocol for the Internet of things environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 222, doi. 10.3969/j.issn.1001-3695.215.01.051
- By:
- Publication type:
- Article
Security analysis of two public key encryption schemes.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 218, doi. 10.3969/j.issn.1001-3695.215.01.050
- By:
- Publication type:
- Article
Method of encrypted protocol reverse engineering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 214, doi. 10.3969/j.issn.1001-3695.215.01.049
- By:
- Publication type:
- Article
Study of RFID inter-domain security system based on SAML.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 210, doi. 10.3969/j.issn.1001-3695.215.01.048
- By:
- Publication type:
- Article
Adaptive de-noising method based on EEMD and autocorrelation function property.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 206, doi. 10.3969/j.issn.1001-3695.215.01.047
- By:
- Publication type:
- Article
Reliable forwarding protocol based on network coding in delay tolerant mobile sensor network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 202, doi. 10.3969/j.issn.1001-3695.215.01.046
- By:
- Publication type:
- Article
Research on battlefield ground mobile robot Ad hoc network system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 198, doi. 10.3969/j.issn.1001-3695.215.01.045
- By:
- Publication type:
- Article
Cloud computing profit maximization based on multi-server optimal configuration.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 194, doi. 10.3969/j.issn.1001-3695.215.01.044
- By:
- Publication type:
- Article
Blind sensing algorithm based on eigenvalue in multiple antennas cognitive radio.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 191, doi. 10.3969/j.issn.1001-3695.215.01.043
- By:
- Publication type:
- Article
Queuing theory based centralized dynamic spectrum allocation scheme in cognitive radio networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 187, doi. 10.3969/j.issn.1001-3695.215.01.042
- By:
- Publication type:
- Article
Skype encrypted traffic identification based on trend-aware protocol fingerprints.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 183, doi. 10.3969/j.issn.1001-3695.215.01.041
- By:
- Publication type:
- Article
Fast wideband signals DOA estimation under coexistence of both uncorrelated and coherent signals.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 179, doi. 10.3969/j.issn.1001-3695.215.01.040
- By:
- Publication type:
- Article
Optimal setting of collision window in back-off algorithm in WSN.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 175, doi. 10.3969/j.issn.1001-3695.215.01.039
- By:
- Publication type:
- Article
Interactive visualization analysis platform for underground banks laundering.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 170, doi. 10.3969/j.issn.1001-3695.215.01.038
- By:
- Publication type:
- Article
Adaptive neuron PID control based on minimum resource allocation network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 167, doi. 10.3969/j.issn.1001-3695.215.01.037
- By:
- Publication type:
- Article
Research on adaptive fault detection scheme in fault-tolerant cloud computing networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 161, doi. 10.3969/j.issn.1001-3695.215.01.036
- By:
- Publication type:
- Article
Simultaneous recognition of both speech and speaker's group with small space occupation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 156, doi. 10.3969/j.issn.1001-3695.215.01.035
- By:
- Publication type:
- Article
Hierarchical routing architecture and partitioning approach for multiple FPGAs oriented to high performance computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 150, doi. 10.3969/j.issn.1001-3695.215.01.034
- By:
- Publication type:
- Article
Application of improved time series model in forecasting of short-term traffic flow for freeway.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 146, doi. 10.3969/j.issn.1001-3695.215.01.033
- By:
- Publication type:
- Article
Semantic-based keyword extraction method for document.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 142, doi. 10.3969/j.issn.1001-3695.215.01.032
- By:
- Publication type:
- Article
Study on application of copper rougher flotation reagent-addition assessment based on dynamic bubble size PDF.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 138, doi. 10.3969/j.issn.1001-3695.215.01.031
- By:
- Publication type:
- Article
Optimal scheduling model for home energy management system based on real-time electricity pricing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 131, doi. 10.3969/j.issn.1001-3695.2015.01.030
- By:
- Publication type:
- Article
Event driven simulation model research of urban rail transit emergency treatment process.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 125, doi. 10.3969/j.issn.1001-3695.2015.01.029
- By:
- Publication type:
- Article
High-efficient cycle-accurate modeling of DSP based on Gem5.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 121, doi. 10.3969/j.issn.1001-3695.2015.01.028
- By:
- Publication type:
- Article
Method for application of SVM into test case generation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 115, doi. 10.3969/j.issn.1001-3695.2015.01.027
- By:
- Publication type:
- Article
Novel approach for Uyghur stemmer using mixed method.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 112, doi. 10.3969/j.issn.1001-3695.2015.01.026
- By:
- Publication type:
- Article
Data provenance based consistency service for hybrid cloud.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 1, p. 108, doi. 10.3969/j.issn.1001-3695.2015.01.025
- By:
- Publication type:
- Article