Works matching IS 10013695 AND DT 2015 AND VI 32 AND IP 2
Results: 72
Haze image restoration using domain transform recursive filter.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 638, doi. 10.3969/j.issn.1001-3695.2015.02.072
- By:
- Publication type:
- Article
B-spline surfaces reconstruction of arbitrary topological type.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 635, doi. 10.3969/j.issn.1001-3695.2015.02.071
- By:
- Publication type:
- Article
Research on parallel computation of boundary detection based on GPUs.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 630, doi. 10.3969/j.issn.1001-3695.2015.02.070
- By:
- Publication type:
- Article
Based on HOG and DMMA for face recognition with single training sample per person.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 627, doi. 10.3969/j.issn.1001-3695.2015.02.069
- By:
- Publication type:
- Article
Image interpolation scheme based on rough sets reduction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 623, doi. 10.3969/j.issn.1001-3695.2015.02.068
- By:
- Publication type:
- Article
Robust face recognition based on the second order Volterra kernal optimized by ABC algorithm with Levy mutations.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 619, doi. 10.3969/j.issn.1001-3695.2015.02.067
- By:
- Publication type:
- Article
Shape from focus using relative degree of grey incidence.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 613, doi. 10.3969/j.issn.1001-3695.2015.02.066
- By:
- Publication type:
- Article
Study on CT image reconstruction based on missing projection sonogram.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 609, doi. 10.3969/j.issn.1001-3695.2015.02.065
- By:
- Publication type:
- Article
Web image annotation based on Hessian semi-supervised feature selection.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 606, doi. 10.3969/j.issn.1001-3695.2015.02.064
- By:
- Publication type:
- Article
Defect detection of magnetic particle indication image based on fractal dimension.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 603, doi. 10.3969/j.issn.1001-3695.2015.02.063
- By:
- Publication type:
- Article
Study on motion estimation based on fuzzy classification in electronic image stabilization application.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 598, doi. 10.3969/j.issn.1001-3695.2015.02.062
- By:
- Publication type:
- Article
Separation method of mixed pigments based on spectrum expression and independent component analysis.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 593, doi. 10.3969/j.issn.1001-3695.2015.02.061
- By:
- Publication type:
- Article
Opportunistic transmission strategy based on dynamic message redundancy.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 589, doi. 10.3969/j.issn.1001-3695.2015.02.060
- By:
- Publication type:
- Article
Adaptive energy optimized clustering algorithm for wireless sensor network routing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 585, doi. 10.3969/j.issn.1001-3695.2015.02.059
- By:
- Publication type:
- Article
Fault location using passive end-to-end greedy algorithm for wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 579, doi. 10.3969/j.issn.1001-3695.2015.02.058
- By:
- Publication type:
- Article
Research of improved ant algorithm for mobile Ad hoc networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 574, doi. 10.3969/j.issn.1001-3695.2015.02.057
- By:
- Publication type:
- Article
Research on hierarchical perfect difference super-peer topology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 569, doi. 10.3969/j.issn.1001-3695.2015.02.056
- By:
- Publication type:
- Article
Virtual network embedding algorithm based on analysis of network centrality.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 565, doi. 10.3969/j.issn.1001-3695.2015.02.055
- By:
- Publication type:
- Article
Traffic classification based on analysis to users' activities status.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 560, doi. 10.3969/j.issn.1001-3695.2015.02.054
- By:
- Publication type:
- Article
Wideband DOA estimation algorithm based on array extension.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 556, doi. 10.3969/j.issn.1001-3695.2015.02.053
- By:
- Publication type:
- Article
Accurate tracking method of multipath BOC (n,n) signal.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 552, doi. 10.3969/j.issn.1001-3695.2015.02.052
- By:
- Publication type:
- Article
Error detection in dynamic topic tracking.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 547, doi. 10.3969/j.issn.1001-3695.2015.02.051
- By:
- Publication type:
- Article
Research on mobile cellular automata model for public sentiment dissemination in opportunistic networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 543, doi. 10.3969/j.issn.1001-3695.2015.02.050
- By:
- Publication type:
- Article
Research of private cloud resource allocation with multi-type user based on online mechanism design.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 539, doi. 10.3969/j.issn.1001-3695.2015.02.049
- By:
- Publication type:
- Article
Research on k-shell structure of online social networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 536, doi. 10.3969/j.issn.1001-3695.2015.02.048
- By:
- Publication type:
- Article
Cloud resources search algorithm based on structured peer-to-peer network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 532, doi. 10.3969/j.issn.1001-3695.2015.02.047
- By:
- Publication type:
- Article
Analysis of service scheduling and resource allocation based on cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 528, doi. 10.3969/j.issn.1001-3695.2015.02.046
- By:
- Publication type:
- Article
Probability secure multiparty computation protocol for matrix equality and matrix eigenvalues.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 524, doi. 10.3969/j.issn.1001-3695.2015.02.045
- By:
- Publication type:
- Article
Privacy protection scheme in cloud computing using CP-ABE based on data partition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 521, doi. 10.3969/j.issn.1001-3695.2015.02.044
- By:
- Publication type:
- Article
H. 264 video encryption algorithm for region of interest.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 516, doi. 10.3969/j.issn.1001-3695.2015.02.043
- By:
- Publication type:
- Article
Design and analysis of fast image encryption algorithm based on multiple chaotic systems.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 512, doi. 10.3969/j.issn.1001-3695.2015.02.042
- By:
- Publication type:
- Article
Fragile watermarking based on secure embedding for hierarchical tampering detection and content recovery.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 507, doi. 10.3969/j.issn.1001-3695.2015.02.041
- By:
- Publication type:
- Article
Survey of security authentication scheme for wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 503, doi. 10.3969/j.issn.1001-3695.2015.02.040
- By:
- Publication type:
- Article
FHE-CF: designing of fully homomorphic encryption scheme based on ciphertext flattening technique.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 498, doi. 10.3969/j.issn.1001-3695.2015.02.039
- By:
- Publication type:
- Article
Binary protocol identification based on weighted byte entropy vector.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 493, doi. 10.3969/j.issn.1001-3695.2015.02.038
- By:
- Publication type:
- Article
Key agreement on slow fading channels based on trellis coded modulation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 489, doi. 10.3969/j.issn.1001-3695.2015.02.037
- By:
- Publication type:
- Article
Obfuscation algorithms based on congruence equation and Chinese remainder theorem.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 485, doi. 10.3969/j.issn.1001-3695.2015.02.036
- By:
- Publication type:
- Article
Program instrumentation oriented to program analysis.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 479, doi. 10.3969/j.issn.1001-3695.2015.02.035
- By:
- Publication type:
- Article
Case distributed processing system model based on improved Petri net and workflow.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 475, doi. 10.3969/j.issn.1001-3695.2015.02.034
- By:
- Publication type:
- Article
Matching method between requirement and resource ontology based on structural similarity.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 470, doi. 10.3969/j.issn.1001-3695.2015.02.033
- By:
- Publication type:
- Article
Nash equilibrium strategy choosing method for resolving inconsistencies of requirements.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 466, doi. 10.3969/j.issn.1001-3695.2015.02.032
- By:
- Publication type:
- Article
Research on metadata storage and querying of FITS file based on NoSQL.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 461, doi. 10.3969/j.issn.1001-3695.2015.02.031
- By:
- Publication type:
- Article
Research on affecting factors for collaborative procurement of cluster supply chain based on computational experiments.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 456, doi. 10.3969/j.issn.1001-3695.2015.02.030
- By:
- Publication type:
- Article
Adaptive control application of fuzzy logic system without any rules based on fuzzy implication relations of each variable.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 451, doi. 10.3969/j.issn.1001-3695.2015.02.029
- By:
- Publication type:
- Article
Study of multi-model soft close-loop fault-tolerant control with sensor faults.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 447, doi. 10.3969/j.issn.1001-3695.2015.02.028
- By:
- Publication type:
- Article
Study on time-quota based on degree of part customization in MC environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 443, doi. 10.3969/j.issn.1001-3695.2015.02.027
- By:
- Publication type:
- Article
Grab correction system fault diagnosis based on fuzzy neural network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 439, doi. 10.3969/j.issn.1001-3695.2015.02.026
- By:
- Publication type:
- Article
Triangular fuzzy number intuitionistic fuzzy Bonferroni means operator and its application.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 434, doi. 10.3969/j.issn.1001-3695.2015.02.025
- By:
- Publication type:
- Article
Study of algorithm about producing utility optimal instructional feedback tactics based on ontology and influence diagram model in affective computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 427, doi. 10.3969/j.issn.1001-3695.2015.02.024
- By:
- Publication type:
- Article
Optimized Rao-Blackwellized particle filter by Gaussian particle swarm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 2, p. 423, doi. 10.3969/j.issn.1001-3695.2015.02.023
- By:
- Publication type:
- Article