Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Computer Engineering and Applications
FQ: 半月
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1002-8331
CN: 11-2127/TP
YP: 1964
Url: 华北计算技术研究所
Recommended Journals
Computer Engineering and Applications
2010 -19
Catalog
Research of path planning algorithms based on vector map data structure CHEN He-ping,LI Xiao-qin,GU Jin-guang,CHEN Bin,SHEN Lei College of Information Science & Engineering,Wuhan University of Science & Technology,Wuhan 430081,China
Hybrid algorithm for traffic flow breakdown identification ZHANG Jing-lei,WANG Xiao-yuan School of Transportation and Vehicle Engineering,Shandong University of Technology,Zibo,Shandong 255091,China
Research on prognostic and health management system for aircraft electrical power system using multi-agent ZHANG Li1,2,YUAN Hai-wen2 1.College of Computer Science,Shaanxi Normal University,Xi'an 710062,China 2.School of Automation Science & Electrical Engineering,Beihang University,Beijing 100191,China
Research of steepest descent and conjugate gradient in digital beamforming ZONG Rong-fang,LI Feng-lin Department of Electric Engineering,Huaihai Institute of Technology,Lianyungang,Jiangsu 222005,China
Rough integrals and rough degree of function rough sets YU Xiu-qing1,2 1.Dezhou College,Dezhou,Shandong 253014,China 2.School of Mathematics and System Sciences,Shandong University,Jinan 250100,China
Design and research of low-voltage DC Servo with EPA WANG Xiu-jun1,HU Xie-he1,ZHANG Yong-liang2,HU Jian-ting2 1.The Institute of Cyber-Systems and Control,Zhejiang University,Hangzhou 310027,China 2.Zhejiang SUPCON Electric CO.,LTD,Hangzhou 310053,China
Analysis of SEIQ epidemic model in homogeneous complex networks CHU Yang-jie,ZHOU Jia-hua,WANG Jin-shui,HUANG Zhang-can School of Sciences,Wuhan University of Technology,Wuhan 430070,China
Rough set algebra and R0-algebra based on implication operator WEI Hai-xin,LI Xiu-qing Guilin College of Aerospace Technology,Guilin,Guangxi 541004,China
Extension of Basis system L~* and its relative properties ZHANG Qiong,WU Hong-bo College of Mathematics and Information Sciences,Shaanxi Normal University,Xi'an 710062,China
Method of improving central difference Kalman filter YANG Hong1,2,LI Ya-an1,LI Guo-hui1,2,YUAN Run-ping3 1.College of Marin,Northwestern Polytechnical University,Xi'an 710072,China 2.School of Electronic and Engineering,Xi'an University of Post and Telecommunications,Xi'an 710061,China 3.School of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China
New method of improved extended Kalman filter YANG Hong1,2,LI Ya-an1,LI Guo-hui1,2 1.College of Marin,Northwestern Polytechnical University,Xi'an 710072,China 2.School of Electronic and Engineering,Xi'an University of Post and Telecommunications,Xi'an 710061,China
Application of wavelet packet analysis for GPS data de-noising LIU Qi-fen1,GUO Wei1,SHEN Rong-hui2 1.College of Mathematics and Information Science,Hebei Normal University,Shijiazhuang 050016,China 2.Geological Environment Survey Department,Geological Environment Survey Institute of Hebei,Shijiazhuang 050021,China
Fast mode selection algorithm based on statistic and texture prediction for H.264 HAN Xue School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan,Hunan 411201,China
Sink mobility scheme with energy-balanced clustering in wireless sensor networks ZHAO Er-dun1,LIU Wei1,LI Chong1,TANG Pei-he2 1.Department of Computer Science,Central China Normal University,Wuhan 430079,China 2.Department of Computer Engineering,Guangxi University of Technology,Liuzhou,Guangxi 545006,China
Self-organization on-demand certification architecture for MANET SHEN Ming-yu,YANG Wei-jie,CHEN Juan School of Computer & Information,Hefei University of Technology,Hefei 230009,China
Multi-interface routing protocol based-on Ad hoc network PENG Zhong-jun1,WEI Yong-lin2 1.School of Automation,Chongqing University of Posts & Telecommunications,Chongqing 400065,China 2.School of Computer,Chongqing University of Posts & Telecommunications,Chongqing 400065,China
Wireless Mesh Network based on rate-adaptive with congestion control strategy WANG Jun,ZHU Cui-tao College of Electronics and Information Engineering,South-Center University for Nationalities,Wuhan 430074,China
Improved hierarchical AODV routing protocol for hybrid wireless Mesh network ZENG Wen-li,PEI Ting-rui,ZHANG Zhao-xia,ZHAO Zhi College of Information Engineering,Xiangtan University,Xiangtan,Hunan 411105,China
Novel stability based segmented backup routing protocol ZHANG Hui1,2,DONG Yu-ning1,YANG Long-xiang1,ZHU Hong-bo1 1.Jiangsu Provincial Key Lab of Wireless Communications,College of Communication and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China 2.National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China
RTP encapsulation for scalable video coding stream and its application LIU Wei1,CHEN Xu2,LIANG Yong-sheng1 1.Institute of Information Technology,Shenzhen Institute of Information Technology,Shenzhen,Guangdong 518029,China 2.College of Information Engineering,Shenzhen University,Shenzhen,Guangdong 518060,China
Study of segmentation of hand X-ray regions of interest JI Yu-fang,WU Xi-sheng School of Information Engineering of Southern Yangtze University,Wuxi,Jiangsu 214122,China
Image denoising with multiwavelets JIA Xing-tuo,WANG Cheng-ru Yanshan University,Qinhuangdao,Hebei 066004,China
Modified word sense disambiguation algorithm GUO Zhi-bing,HUANG Guang-jun,LU Chao-hua Electronic Information Engineering College,Henan University of Science & Technology,Luoyang,Henan 471003,China
Architecture design of geophysical collaborative computing Environment WEN Yuan-qiao School of Navigation,Wuhan University of Technology,Wuhan 430063,China
Neural network for speaker recognition of PCA technology YU Li-qiang1,2,MA Dao-jun1,2 1.College of Communication Engineering,Xidian University,Xi'an 710071,China 2.Beijing Electronic Science and Technology Institute,Beijing 100070,China
Method for question answer pair extraction based on domain knowledge WANG Su-ge,SONG Xiao-lei,LI Hong-xia Department of Mathematics Science,Shanxi University,Taiyuan 030006,China
Personalized recommendation algorithm for smart museum environment ZHOU Shan-dan,ZHOU Xing-she,WANG Hai-peng,NI Hong-bo,ZHANG Gui-ying,MIAO Qiang College of Computer Science,Northwestern Polytechnical University,Xi'an 710072,China
Automatic threshold selection based on grey system theory WANG Xiao-fang,LIU Chi,ZHAO Yu-qian School of Info-Physics and Geomatics Engineering,Central South University,Changsha 410083,China
Image encryption technology based on DWT LIU Yue College of Information Engineering,Zhengzhou University,Zhengzhou 450001,China
Biomimetic pattern face recognition integration of PCA and LDA transform JIANG Jia-fu,YUAN Cheng-wei Institute of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410004,China
Image inpainting based on 1 Norm HE Wen-xi1,2,DING Xing-hao2 1.College of Sciences,Jiangxi Technology University,Ganzhou,Jiangxi 341000,China 2.School of Information Science and Technology,Xiamen Universty,Xiamen,Fujian 361000,China
Reconstruction technique of 3D object based on interpolating subdivision triangles DU Li-mei,GU Yao-lin Department of Information Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Image hiding algorithm based on WPT and SVD ZHENG Wei,CHENG Zhi-gang,CHEN Li-xia College of Electronic and Information Engineering,Hebei University,Baoding,Hebei 071002,China
Compare of range image segmentation methods with differential co-efficient operation and binary morphology ZHANG Mei1,2,WEN Jing-hua1,ZHANG Zu-xun2,ZHANG Jian-qing2 1.School of Mathematics and Statistics,Guizhou Financial Institute,Guiyang 550004,China 2.School of Remote Sensing and Information Engineering,Wuhan University,Wuhan 430079,China
Study on implementation of multi-bits watermark CHENG Chao1,ZHU Xiao-dong1,LIU Jing2,ZHANG Xiao-xu1 1.College of Computer Science and Technology,Jilin University,Changchun 130012,China 2.College of Mathematics,Jilin University,Changchun 130012,China
Analysis of stability of data fitting by implicit polynomial curve WU Gang Key Lab of Electronic Business,Nanjing University of Finance and Economics,Nanjing 210003,China
LDA algorithm and its application to face recognition XIE Yong-lin College of Software,Ningbo Dahongying University,Ningbo,Zhejiang 315000,China
Lipper simulation method of small water area LU Wei-liang,CHENG Tian-tian,HE Wei,LI Yun-fei School of Computer Science and Technology,SooChow University,Suzhou,Jiangsu 215021,China
Research on target tracking based on Gene Algorithm's resampling particle filter LIU Gang1,LIANG Xiao-geng1,2 1.Department of Automatic Control,Northwestern Polytechnology University,Xi'an 710072,China 2.Luoyang Photoelectric Technology Development Center,Luoyang,Henan 471009,China
Research and implementation of automatic adaptation 3-dimension face-modeling YI Fa-ling,XIONG Wei,WANG Sheng,ZHANG Hao-ming College of Medical Information Engineering,Guangdong Pharmaceutical University,Guangzhou 510006,China
Analysis and improvement of warning propagation algorithm QIN Yong-bin,XU Dao-yun Department of Computer Science,Guizhou University,Guiyang 550025,China
Research on standard and process of avionics software development WAN Ming,FAN Xiao-guang,NAN Jian-guo College of Engineering,Air Force Engineering University,Xi'an 710038,China
Secure threshold proxy signature scheme LV Xin,WANG Zhi-jian,XU Feng College of Computer and Information Engineering,Hohai University,Nanjing 210098,China
Cryptanalysis of deciphering MD5 algorithm CHEN Shao-hui1,2,ZHAI Xiao-ning1,2,YAN Na1,2,SU Guo-xing1,2 1.Department of Communication Engineering,Xidian University,Xi'an 710071,China 2.Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
Improved sort method for Chinese strings ZHANG Hai-jun1,2,3,DING Xi-yuan2,ZHU Chao-yong2,3 1.Department of Computer Science and Technology,Xinjiang Normal University,Urumqi 830054,China 2.Research Center of Computer & Language Information Engineering,Chinese Academy of Sciences,Beijing 100097,China 3.School of Computer Science and Technology,University of Science and Technology of China,Hefei 230027,China
Scheduling algorithms of real-time transactions based on traversing a directed acyclic graph XIANG Jun School of Information Engineering,Hubei Institute for Nationalities,Enshi,Hubei 445000,China
Research of ontology modeling methods for integration of secure het-erogeneous data MENG Yu-long,YIN Gui-sheng,WANG Hui-qiang Department of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China
Improvement of similarity measure method ZHANG Xia1,WANG Jian-dong2,GU Hai-hua1 1.Software College,Nanjing College of Information Technology,Nanjing 210046,China 2.College of Information Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China
Intelligent extending to efficiently deriving XML keys LIU Xian-feng,GONG Hui College of Mathematics and Computer Science,Hunan Normal University,Changsha 410081,China
Improved self-organizing migrating algorithm and its application in Bump problem LIN Zhi-yi1,WANG Ling-ling2 1.Faculty of Computer,Guangdong University of Technology,Guangzhou 510006,China 2.State Key Lab of Software Engineering,Wuhan University,Wuhan 430072,China
Performance testing for network security audit devices SHI Lin1,HUO Xin2 1.School of Mechatronical Engineering,Beijing Institute of Technology,Beijing 100081,China 2.School of Software,Beijing Institute of Technology,Beijing 100081,China
Research of lager-scale network for topology discovery PAN Lei,PEI Fei College of Computer Science,Zhongyuan University of Technology,Zhengzhou 450007,China
Double identity authentication system of one-time pad based on Schnorr protocol ZHANG Xiao-hong1,2,FAN Zhong-kui1,ZHONG Xiao-yong3 1.School of Information Engineering,Jiangxi University of Science and Technology,Ganzhou,Jiangxi 341000,China 2.State Key Lab of Networking & Switching Technology,Beijing University of Posts & Telecommunications,Beijing 100876,China 3.Ganzhou Nonferrous Metallurgy Research Institute,Ganzhou,Jiangxi 341000,China
SPKI/SDSI extension model in computational grid QIAO Long,SHEN Wei-chang,XUE Song-wen School of Information Science and Technology,Northwest University,Xi'an 710127,China
Spam detection approach based on Support Vector Machine and Kernel Principal-Component Analysis QIN Yu-ping1,GENG Shu1,SUN Zong-bao2 1.College of Information Science and Engineering,Bohai University,Jinzhou,Liaoning 121000,China 2.Computer Science and Technology College,Harbin University of Technology,Harbin 150080,China
Formal analysis of Needham-Schroeder protocol with authentication test methods LI Ting-yuan1,2,QIN Zhi-guang1,LIU Xiao-dong2,ZHANG Xuan-fang2 1.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China 2.School of Computer,Civil Aviation Flight University of China,Guanghan,Sichuan 618307,China
Network load balancing algorithm based on ecological predator-prey model HU Yi-hong,JIANG Jia-fu,ZHAO Jia School of Computer & Communication Engineering,Changsha Univercity of Science & Technology,Changsha 410076,China
Model of self-adapted routing for intelligence push in computer network operations ZHOU Jia-jun1,WANG Feng2,WANG Ting-ting3,LI Xiao-jian4 1.Anqing Teachers College,Anqing,Anhui 246003,China 2.Zhoukou Teachers College,Zhoukou,Henan 466000,China 3.Anyang Institute Technology,Anyang,Henan 455000,China 4.Guangxi Normal University,Guilin,Guangxi 541004,China
Traffic scheduling based on queue delay detect for available bandwidth in logical links TAN Wei1,2,LI Yong1,YAO Xi-fan2,GE Dong-yuan2 1.Department of Computer,Dongguan University of Technology,Dongguan,Guangdong 523808,China 2.School of Mechanical & Automotive Engineering,South China University of Technology,Guangzhou 510640,China
Robust fault detection of system based on parameters estimation of Symmetric Alpha-Stable distributions ZHANG Zheng-dao,ZHANG Wei-hua School of Communication and Control Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Non-touched system for 6D motions of model surveillance JIA Qi,GUO He,WANG Yu-xin,LIU Tian-yang Department of Software,Dalian University of Technology,Dalian,Liaoning 116620,China
Fault diagnosis for AUV based on FRPN LIU Xin1,YIN Gui-sheng2,ZHANG Lei3 1.State Key Laboratory of Underwater Robot Technology,Harbin Engineering University,Harbin 150001,China 2.College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China 3.College of Information and Communication Engineering,Harbin Engineering University,Harbin 150001,China
Neural network learning algorithm based on random annealing and it's application DONG Guo-jun,Halmuratm Institute of Information and Scientific Engineering,Xinjiang University,Urumqi 830046,China
Application of fuzzy bayes theory in change detection of remote sensing images CHEN Ke1,ZHANG Bao-ming1,XIE Ming-xia1,2 1.Institute of Surveying and Mapping,Information Engineering University,Zhengzhou 450052,China 2.75719(Troup)of PLA,China
Survey on development of expert system ZHANG Yu-dong,WU Le-nan,WANG Shui-hua School of Information Science & Engineering,Southeast University,Nanjing 210096,China
Stochastic stability of neural networks with interval time-varying delays WU Hai-xia 1,2 ,FENG Wei 2 ,ZHANG Wei 2 1.College of Computer Science,Chongqing University,Chongqing 400044,China 2.Department of Computer and Modern Education Technology,Chongqing Education College,Chongqing 400067,China
Multi-colony particle swarm optimization algorithm LUO De-xiang,ZHOU Yong-quan,HUANG Hua-juan,WEI Xing-qiong College of Mathematics and Computer Science,Guangxi University for Nationalities,Nanning 530006,China
Method for designing H∞ structured specified controllers ZHAO Ao-dong1,XI Mao-long1,SUN Jun2 1.Wuxi Institute of Technology,Wuxi,Jiangsu 214122,China 2.School of Information Technology,Southern Yangtze University,Wuxi,Jiangsu 214121,China
Routing selection of WSN restricted by double factors SUN Ming-song1,WANG Zhan-yu2,ZHANG Ren-wei1 1.Network Information Center,Harbin University of Science and Technology,Harbin 150080,China 2.Engineering Training Center,Harbin Institute of Technology,Harbin 150001,China
Design of environmental monitoring system with mobile sink LIU Hong-tao,CHENG Liang-lun Faculty of Automation,Guangdong University of Technology,Guangzhou 510006,China
Path planning based on extension strategy in unknown environment YE Wei-qiong1,2,YU Yong-quan2 1.College of Computer & Communication,Hunan University of Technology,Zhuzhou,Hunan 412000,China 2.Institute of Intelligence Engineering,Guangdong University of Technology,Guangzhou 510090,China
2010 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36]
More Issues:   [1997]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved