Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Computer Engineering and Applications
FQ: 半月
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1002-8331
CN: 11-2127/TP
YP: 1964
Url: 华北计算技术研究所
Recommended Journals
Computer Engineering and Applications
2008 -19
Catalog
Development of data fusion technique for automobile meter systems LAN Hong-li1,YANG Xu2,WU Tong-feng3,LUO Wen-guang2 1.Department of Computer Engineering,Guangxi University of Technology,Liuzhou,Guangxi 545006,China 2.Department of Electronic and Control Engineering,Guangxi University of Technology,Liuzhou,Guangxi 545006,China 3.Department of Automobile Engineering,Guangxi University of Technology,Liuzhou,Guangxi 545006,China
Multiphase traffic signal timing optimization of intersection based on ant colony algorithm XIAO Ye-wei,HUANG Hui-xian,WANG Chen-hao Institute of Information Engineering,Xiangtan University,Xiangtan,Hunan 411105,China
Estimating missing value in incomplete fuzzy preference relations based on additive consistency ZHANG Yuan-lin,KUANG Xing-hua School of Information System and Management,National University of Defense Technology,Changsha 410073,China
Flexible framework for multi-geoobjects integrated visualization WANG Zhan-gang,PAN Mao,WANG Bin School of Earth and Space Science,Peking University,Beijing 100871,China
Multiple-location dynamic replication strategies of data grids and their application research FENG Yong1,ZHONG Jiang1,LI Zhi-guo1,2,YE Chun-xiao1 1.College of Computer Science,Chongqing University,Chongqing 400030,China 2.Southwest Research Center,Shanghai Baosight Software Corporation,Chongqing 400041,China
Application of rigid regression algorithm in GPS positioning SHENG Hu,YANG Jing-shu Key Laboratory of Electric Restriction,Hefei Electronic Engineering Institute,Hefei 230037,China
Improvement of performance of sound source localization and tracking based on microphone array WANG Jun,ZHONG Lan-xiang School of Information and Technology,Northwest University,Xi’an 710069,China
New recursive construction method of orthomorphic permutations ZHENG Hao-ran,CUI Ting,SHI Jian-hong Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China
Saturation throughput analysis of IEEE 802.11e Enhanced Distributed Channel Access NIE Shi-qun,LIU Wei School of Electronic and Information Engineering,Henan University of Science and Technology,Luoyang,Henan 471003,China
Research on optimal techniques for software implementation of ECC over F_2~m field LIU Wen-bo,ZHANG Fan,GUO Yun-fei,LIU Li-xiong China National Digital Switching System Engineering & Technological R & D Center,Zhengzhou 450002,China
Availability evaluation based on SANs model for a parallel I/O system ZHENG Xiao1,2,LI Hong-liang2,ZHENG Fang2,ZHENG Xiang2,CHEN Zuo-ning2 1.PLA Information and Engineering University,Zhengzhou 450002,China 2.Jiangnan Institute of Computing Technology,Wuxi,Jiangsu 214083,China
Improved algorithm for vector data compression based on multiple objects CHEN Fei-xiang1,LI Hua2,YU Wen-yang3 1.College of Information,Beijing Forestry University,Beijing 100083,China 2.Land Consolidation and Rehabilitation Center,the Ministry of Land and Resources,Beijing 100035,China 3.China Remote Sensing Satellite Ground Station,Chinese Academy of Sciences,Beijing 100086,China
New image retrieval method based on entropy and fractal coding ZHANG Liang-bin,XI Li-feng College of Computer Science and Information Technology,Zhejiang Wanli University,Ningbo,Zhejiang 315100,China
Enhanced human motion detection algorithm and its implementation based on video surveillance SHI Zhi-long,CHEN Yi-min,XU Jie Department of Computer Engineering and Science,Shanghai University,Shanghai 200072,China
n multiple ant colony algorithm for composing test paper problem CHENG Mei-ying,XIONG Wei-qing,WEI Ping Institute of Computer Science and Technology,Ningbo University,Ningbo,Zhejiang 315211,China
Real-time video denoising arithmetic based on adaptive multi-layers background SHEN Wei-ming1,GUO Xiao-yun1,YANG Li-dong2 1.Multimedia Communication Engineering Center,LIESMARS,Wuhan University,Wuhan 430072,China 2.Hubei Kechuang Hi-tech Net-video Co.Ltd,Wuhan 430071,China
Recognition of complex named-entities in user queries of search engine HU Xue-ying,LIU Hui,LU Ru-zhan Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200240,China
Piecewise linear representation of time series based on temporal edge operator XIAO Hui1,MA Hai-bing2,GONG Wei3 1.Ningbo Institute of Technology,Zhejiang University,Ningbo,Zhejiang 315100,China 2.Unit 92664 of CPLA,Qingdao,Shandong 266032,China 3.Faculty of Business,Ningbo University,Ningbo,Zhejiang 315211,China
Using GA decision-theoretic model to enhance survivability of information system DING Li-na1,ZHENG Ning1,KONG Ting2 1.Department of Computer Science,Hangzhou Dianzi University,Hangzhou 310018,China 2.Experiment Center,Zhejiang Police College,Hangzhou 310053,China
Echo state networks and its application on image edge detection PEI Cheng-dan Department of Computer Science,School of Industry and Merchandise,South-Central University for Nationalities,Wuhan 430223,China
Parameter estimation method for uniform velocity rectilinear motion blur CAI Hui-min,ZHANG Yan-ning,WANG Zhi-yin,DUAN Feng,SUN Jin-qiu Department of Computer Science and Engineering,Northwest Polytechnical University,Xi’an 710072,China
Research of unsupervised classification of remote sensing image based on modified genetic algorithm CHEN Zhong,LIU Jian-guo,WANG Guo-you Institute for Pattern Recognition & Artificial Intelligence,Huazhong University of Science and Technology,Wuhan 430074,China
Multi-elliptic target detection based on EM algorithm ZHENG Lin,LIU Quan,GUO Jin-xu School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China
Edge detection of inner defect based on cross-image JIA Chao,MA Guo-lei College of Information Science and Engineering,Yanshan University,Qinhuangdao,Hebei 066004,China
New natural texture classification approach LIU Ming-xia,HOU Ying-kun,YANG De-yun Department of Information Science and Technology,Taishan College,Taian,Shandong 271000,China
Research on robust super-resolution reconstruction algorithm for reduction to outliters of video image sequences LIU Yun,ZHANG Yan College of Information Science and Technology,Qingdao University of Science and Technology,Qingdao,Shandong 266061,China
Frequency domain approach based on mutual information to image registration WU Ya-juan,LIU Xiao-feng College of Computer,China West Normal University,Nanchong,Sichuan 637002,China
Image encryption based on chaotic adjustment of wavelet coefficient HE Xi-ping1,ZHANG Qiong-hua2 1.College of Computer Science and Information Engineering,Chongqing Technology and Business University,Chongqing 400067,China 2.Library,Chongqing University,Chongqing 400067,China
Video object segmentation based on MRF model using wavelet transform XIE Lei,LI Mei,GAO Zhi-yong,LIU Hai-hua College of Electronic and Information Engineering,South-Central University for Nationalities,Wuhan 430074,China
Fuzzy modeling based on feature selection and collaborative fuzzy clustering QI Hong-yu1,WU Xiao-jun1,WANG Shi-tong1,YANG Jing-yu2 1.School of Information Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China 2.School of Computer Science and Technology,Nanjing University of Science & Technology,Nanjing 210094,China
Image encryption arithmetic based on S-boxes scrambling and Chaos theory WANG De1,ZHANG Yuan-biao2 1.Department of Computer Science,Ji’nan University,Guangzhou 510632,China 2.College of Zhuhai,Ji’nan University,Zhuhai,Guangdong 519070,China
New uncorrelated variable step LMS algorithm and its application JIN Jie,LI Dong-hui,XU Yin-hao School of Electronic and Information Engineering,Tianjin University,Tianjin 300072,China
B-spline surface reconstruction based on profile data LIN Zi-zhi1,PAN Ri-jing1,2 1.School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China 2.The Key Lab of Network Security and Cryptography,Fujian Normal University,Fuzhou 350007,China
Large scale volume rendering algorithm based on packed-index texture SU Chao-shi,ZHAO Ming-chang,ZHANG Xiang-wen School of Computer Science and Control,Guilin University of Electronic Technology,Guilin,Guangxi 541004,China
Data mining platform-WEKA and secondary development on WEKA CHEN Hui-ping1,LIN Li-li1,WANG Jian-dong2,MIAO Xin-rui1 1.Computer & Information Engineering College,Hohai University,Changzhou,Jiangsu 213022,China 2.College of Information Science & Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
Design and realization of ontology prototype system based on FCA ZHANG Rui-ling1,XU Hong-sheng1,SHEN Xia-jiong2 1.Academy of Information Technology,Luoyang Normal University,Luoyang,Henan 471022,China 2.Institute of Data and Knowledge Engineering,Henan University,Kaifeng,Henan 475001,China
Novel audio watermarking algorithm based on quantizing DCT domain ZHOU Li-hua,ZHOU Zhi-ping College of Communication and Control Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Digital image watermarking based on feather point against geometrical attacks YANG Wen-jie1,SUN Xiao-jun2,HU Ming-hao1,LU Kun1 1.Department of Mathematics,Shaanxi University of Science & Technology,Xi’an 710021,China 2.Department of Mathematics,Baoji College of Arts & Science,Baoji,Shaanxi 721013,China
Optimized implementation of inverse scan,inverse quantizer and inverse transform for AVS decoder HUANG You-wen,CHEN Yong-en Institute of Communication Technology,Tongji University,Shanghai 200092,China
Using Sybil attack to optimize PageRank ZHANG Da-lu,CHEN Qing,HU Zhi-guo Department of Computer Science,Tongji University,Shanghai 201804,China
Novel fragile watermarking algorithm WU Zhe-dong1,LIU Guo-zhi1,TAN Xiu-hu2 1.Department of Underwater Acoustic Engineering,Harbin Engineering University,Harbin 150001,China 2.Department of Electronic Engineering,University of Electronic Scienceic and Technology of China,Chengdu 610054,China
New chaotic encryption method to enhance communication security SHI Feng-liang1,ZHU Yu-hua1,ZHAO Hong-wei2 1.Department of Physics,Tangshan Teachers College,Tangshan,Hebei 063000,China 2.Hebei Institute of Technology,Tangshan,Hebei 063000,China
Research of encryption in network test systems CHEN Guo1,2 1.Department of Modern Educational Technology,Chongqing Normal University,Chongqing 400047,China 2.Department of Computer Science and Engineering,Chongqing University,Chongqing 400044,China
Compress value-list index using improved run-length encode approach CHEN Fu-qiang1,2,XI Jian-qing 1.School of Computer Science & Engineering,South China University of Technology,Guangzhou 510641,China 2.Department of Business,Guangdong Polytechnic Normal University,Guangzhou 510262,China
Research of Chinese word segmentation system applies in professional search engine WANG Shuo,YOU Feng,SHAN Lan,ZHAO Heng-yong College of Information Science and Technology,Beijing University of Chemical Technology,Beijing 100029,China
Study and implementation of Kazakh lexical scanner DAWEL Abilhaye,GULILA Altenbek College of Information Science and Engineering,Xinjiang University,Urumqi 830046,China
Study on FP-growth algorithm for mining based on XML data YANG Ke,LAI Chao-an,ZHAO Yang Research Center of Contemporary Manufacturing Information System,South China University of Technology,Guangzhou 510640,China
Segmentation method of news video stories based on announcer identification XU Xin-wen,LI Guo-hui,GAN Ya-li School of Information System and Management,National University of Defense Technology,Changsha 410073,China
Algorithms for constructing look-up table labels of de Bruijn sequences using fixed value label XIE Shen-quan College of Information and Engineering,Xiangtan University,Xiangtan,Hunan 411105,China
Small targets detection based on hierarchical clustering WANG Chun-xin1,SHEN Tong-sheng2,ZHANG Yu-ye1 1.Department of Control Engineering,Navy Aeronautical and Astronautical University,Yantai,Shandong 264001,China 2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China
Computation of symmetry descriptor convolution integral HUANG Jian-min,ZHOU Su-ting,PAN Jing College of Computer Science & Information Technology,Guangxi Normal University,Guilin,Guangxi 541004,China
Multicast IP-routing lookup scheme based on sectional storage ZHANG Jun,CHENG Dong-nian,HUANG Hui-qun,ZHANG Peng National Digital Switching System Engineering & Technological Research Center,Zhengzhou 450002,China
Multi-object optimal secure routing algorithm based on differentiated service model HAN Dan,HU Guang-min,LU Cai Key Laboratory of Broadband Optical Fiber Transmission and Communication Networks of Ministry of Education,UESTC,Chengdu 610054,China
Mutual authentication in GSM based on Elliptic Curve Cryptography and combined public key technology ZHANG Yi2,CUI Tian-xi1,2,TANG Hong1,2 1.College of Computer Science,Chongqing University of Posts and Telecommunication,Chongqing 400065,China 2.Lab.of Mobile Telecommunication Technology,Chongqing University of Posts and Telecommunication,Chongqing 400065,China
Efficient remote user authentication scheme based on random nonce LI Xing Institute of Automation,Qufu Normal University,Qufu,Shandong 273165,China
Supervisal algorithm design of IDS based on Lagrange Support Vector Regression ZHANG Jia-chao School of Information Engineering,Lianyungang Technical College,Lianyungang,Jiangsu 222006,China
Flow sampling based on DCF with controllable resource LIU Yuan-zhen,LIU Yuan,LI Xiao-hang School of Information Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
New adaptive AQM algorithm in large delay network HOU Ping1,2,WANG Zhi-quan1 1.Department of Automation,Nanjing University of Science & Technology,Nanjing 210094,China 2.Department of Business Administration,Nanjing College for Population Program Management,Nanjing 210042,China
Self-adaptive mechanism to publish layered Web Service on mobile network LI Ye1,2,CHEN Xiao2,WANG Jin-lin2 1.Graduate University of Chinese Academy of Sciences,Beijing 100039,China 2.National Network New Media Engineering Research Center,Institute of Acoustics,CAS,Beijing 100080,China
Kind of user behaviour trust and role based dynamic access control model TIAN Li-qin1,3,JI Tie-guo1,LIN Chuang2,YANG Yang1 1.Information Engineering School,University of Science and Technology Beijing,Beijing 100083,China 2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China 3.Department of Computer,North China Institute of Science and Technology,Beijing 101601,China
Traffic-flow optimal control model in intelligent transport systems:rough neural network approach LI Jin1,HUANG Da-rong2 1.College of Information and Engineering,Hubei Institute for Nationalities,Enshi,Hubei 445000,China 2.Institute of Information and Computational Science,Chongqing Jiaotong University,Chongqing 400074,China
Financial time series forecasting based on mixtures of kernels ZHANG Yong-hua,ZENG Fan-zi School of Computer and Communication,Hunan University,Changsha 410082,China
Study of location selection for factory based on RS image processing WANG Yi-jun,LUO Da-yong,ZHANG Hang School of Information Science & Engineering,Central South University,Changsha 410075,China
Study on multi-class text classification algorithm based on hyper-sphere support vector machines QIN Yu-ping1,2,WANG Xiu-kun1,LI Xiang-na2,WANG Chun-li1 1.School of Electronic and Information Engineering,Dalian University of Technology,Dalian,Liaoning 116024,China 2.College of Information Science and Technology,Bohai University,Jinzhou,Liaoning 121000,China
Revising method for separation hyperplane of imbalanced data in SVM LIU Wan-li,LIU San-yang Department of Mathematics,Luoyang Normal College,Luoyang,Henan 471022,China
Task scheduling algorithm based on multi-population and level set LAN Zhou,SUN Shi-xin School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
Parameters optimizing of PID controller based on improved artificial immune algorithm LIU Guo-lian1,2,TAN Guan-zheng1,HE Yan2 1.School of Information Science and Engineering,Central South University,Changsha 410083,China 2.Hunan Railway College of Science and Technology,Zhuzhou,Hunan 412000,China
Analysis for adaptability of MWSN's longevity by genetic algorithm of bestrew distributing WANG Xue-fei Department of Computer Science,Huangshan University,Huangshan,Anhui 245011,China
Discrete hopfield networks-based approach of autocorrelated process control CUI Qing-an Insitute of Management Engineering,Zhengzhou University,Zhengzhou 450001,China
Decision rule of set-valued information system based on variable precision tolerance relation CHEN Zi-chun1,2,QIN Ke-yun2 1.School of Mathematics and Computer,Xihua University,Chengdu 610039,China 2.Department of Mathematics,Southwest Jiaotong University,Chengdu 610013,China
Application of Petri nets and ant colony algorithm for solving routing problem on CDN YE Jian-hong1,2,SUN Shi-xin1,ZHANG Yun-sheng1,ZHOU Yi-min1 1.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China 2.Department of Mathematics and Computer Sciences,Eindhoven University of Technology,P.O.Box 513,NL-5600 MB Eindhoven,The Netherlands
Improved PSO algorithm for project optimization scheduling WANG Jing-lian1,LIU Hong2,YANG Wen-chao1,LI Shao-hui2 1.Teaching Department of Modern Education Technology of Ludong University,Yantai,Shandong 264025,China 2.School of Information Management,Shandong Normal University,Ji’nan 250014,China
Option automatic generation algorithm based on ACCA HU Ming-hui,YIN Chang-ming,LI Li-yun College of Computer and Communicational Engineering,Changsha University of Science and Technology,Changsha 410076,China
Improved differential evolution algorithms for solving constrained optimization problems LIU Ming-guang School of Public Administration of South China Normal University,Guangzhou 510006,China
Virtual enterprise knowledge sharing risk early-warning based on heuristic attribute reduction SHI Cheng-dong1,2,GUO Fu-li2,BIAN Dun-xin1 1.School of Electric and Electronic Engineering,Shandong University of Technology,Zibo,Shandong 255049,China 2.School of Business Administration,Xi’an University of Technology,Xi’an 710048,China
2008 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36]
More Issues:   [1997]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved