Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Computer Engineering and Applications
FQ: 半月
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1002-8331
CN: 11-2127/TP
YP: 1964
Url: 华北计算技术研究所
Recommended Journals
Computer Engineering and Applications
2010 -21
Catalog
Research on vehicle dispatching at container terminal based on Multiple Agent System ZHAO Hui,LIU Tie-nan School of Economics and Management,Civil Aviation University of China,Tianjin 300300,China
Refinery scheduling optimization research based on continuous process characteristics LI Ming,LI Qi-qiang,GUO Qing-qiang,DING Ran School of Control Science and Engineering,Shandong University,Jinan 250061,China
Outlier data mining application in power load forecasting SHI Dong-hui School of Electronics and Information Engineering,Anhui University of Architecture,Hefei 230088,China
Control method of headland turning based on improved pure pursuit model for agricultural machine HUANG Pei-chen,LUO Xi-wen,ZHANG Zhi-gang Key Lab of Key Technology on Agricultural Machine and Equipment of South China Agricultural University,Ministry of Education,Guangzhou 510640,China
SCO algorithm based on entropy function for NCP SUN Jia-ze1,WANG Shu-yan1,ZHANG Jian-ke2,CAO Xiao-peng1 1.Department of Computer Science,Xi'an Institute of Posts and Telecommunications,Xi'an 710061,China 2.Department of Mathematics and Physics,Xi'an Institute of Posts and Telecommunications,Xi'an 710061,China
Simulation method of rock stability analysis based on block theory LI Jian-yong,XIAO Jun,WANG Ying College of Computing & Communication Engineering,Graduate University of Chinese Academy of Sciences,Beijing 100049,China
Algorithm of digraph connected dominating set GAO Wen-yu School of Information Science,Guangdong University of Business Studies,Guangzhou 510320,China
Matriculate probability model of national college entrance examination LU Chang-hui1,LUO Yong2,HUANG Quan1,3,LIU Qing-bao1,DENG Su1 1.Key Lab of Science and Technology for National Defense of C4ISR Technology,National University of Defense Technology,Changsha 410073,China 2.College of Science,National University of Defense Technology,Changsha 410073,China 3.Hunan Examination Center of Education,Changsha 410001,China
Guide star identification method for star sensor LI Xue-kui1,TAN Hai-shu1,ZHANG Huan-ming1,YU Xin-mei1,HAO Zhi-hang21.The Mechatronics and Information Engineering School,Foshan University,Foshan,Guangdong 528000,China 2.Changchun Institute of Optics,Fine Mechanics and Physics,Chinese Academy of Sciences,Changchun 130022,China
Mesocyclone recognition based on new flooding algorithm PAN Yun-hong1,ZHANG Yun1,WU Zhi-fang2,ZHONG Ling1 1.Faculty of Automation,Guangdong University of Technology,Guangzhou 510006,China 2.Guangzhou Central Observatory,Guangzhou 510080,China
Design of RPR data transmitting scheme using VOQ YUAN Na1,LI Hui1,MA Yong-gang2,WANG Yun-fei1 1.School of Electronic Engineering,Northwestern Polytechnical University,Xi'an 710129,China 2.School of Information Science and Technology,Northwest University,Xi'an 710127,China
Efficient ID-based threshold signature scheme in standard model DA Qing-feng Department of Computer Science,Qinghai Normal University,Xining 810008,China
Energy efficient routing protocol based on energy of node and stability of topology CHEN Yong-hui1,LIU Zhi-qin1,Nagasaka2,ZHANG Chun-feng3 1.School of Computer Science and Technology,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China 2.Department of Information Technology,Hiroshima Institute of Technology,Hiroshima,Japan 3.School of Information Engineering,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China
Routing algorithm with prediction in Ad hoc networks WU Zheng-yu School of Information,Beijing Forestry University,Beijing 100083,China
Analysis and improvement of two digital signature schemes without certificates NONG Qiang,HAO Yan-hua,HUANG Ru-fen 1.Department of Computer Science and Engineering,Zhangzhou Normal University,Zhangzhou,Fujian 363000,China 2.Key Laboratory of Information Security Technology,Zhangzhou Normal University,Zhangzhou,Fujian 363000,China
Research on Ad Hoc clustering algorithm YANG Wei-dong Network Center,Southern Medical University,Guangzhou 510515,China
Design and analysis of chaotic pseudorandom sequence generator WEI Yu-xuan Guangxi Polytechnic of Construction,Nanning 530003,China
Study on QoS performance statistical bounds about wireless multi-hop networks CHEN Zhi-gang,ZHONG Hong-bo,QI Hua-mei,ZENG Feng School of Information Science and Engineering,Central South University,Changsha 410083,China
Dynamical multi-secret sharing scheme in access structure LIU Ye,LI Zhi-hui,GUO Rui College of Mathematics & Information Science,Shaanxi Normal University,Xi'an 710062,China
Least p norm criterion α spectrum estimation with carrier frequency detection JIANG Jin-long,ZHA Dai-feng,FAN Hong-she College of Electronic Engineering,Jiujiang University,Jiujiang,Jiangxi 332005,China
Implementation of parallel algorithms for randomized pattern matching on cluster of workstations XUE Song-wen,SHEN Wei-chang,YAN Gong-xiao,QIAO Long School of Information Science and Technology,Northwest University,Xi'an 710127,China
Improved method for modeling leaf venation patterns GU Wen-zhe1,JIN Wen-biao1,2,ZHANG Zhi-feng2 1.College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China 2.School of Science,Hangzhou Dianzi University,Hangzhou 310018,China
Research and application on medical data mining based on rough sets YE Ming-quan1,WU Chang-rong2,HU Xue-gang3 1.Computer Staff Room,Wannan Medical College,Wuhu,Anhui 241002,China 2.Institute of Mathematics and Computer,Anhui Normal University,Wuhu,Anhui 241002,China 3.Institute of Computer and Information,Hefei University of Technology,Hefei 230009,China
Research on feature-preserving method of point-sampled model simplification NI Tong-guang,GU Xiao-qing,YANG Chang-chun School of Information Science & Engineering,Jiangsu Polytechnic University,Changzhou,Jiangsu 213164,China
Research on combined method in missing flight data complement XU Lei,ZHANG Feng-ming Engineering College,Air Force Engineering University,Xi'an 710038,China
Intelligent driving behavior research to virtual autonomous vehicle CUI Xiao-yi,WANG Xian-mei,ZHONG Yan-jiong,DONG Ping Department of Electronic Information Engineering,University of Science and Technology Beijing,Beijing 100083,China
Enhanced privacy preserving K-anonymity model:(α,L)-diversity K-anonymity KAN Ying-ying1,CAO Tian-jie1,2 1.Computers Science and Technology Department,China University of Mining and Technology,Xuzhou,Jiangsu 221116,China 2.National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China
Data cluster based on extension K nearest neighbor algorithm YANG Yi,XIANG Chang-cheng,WEI Dai-jun College of Science,Hubei University for Nationalities,Enshi,Hubei 445000,China
Study on semantic Web service discovery based on service grouping LI Man,LI Jian-hua Department of Information Science and Engineering,Central South University,Changsha 410075,China
Method of image retrieval based on bit-plane histogram features vector YANG Hong-ju,HAN Jian-dong,CAO Fu-yuan Key Laboratory of Ministry of Education for Computational Intelligence and Chinese Information Processing,School of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
Enhancement algorithm for X-ray images based on neighborhood related information GUI Zhi-guo,ZHANG Peng-cheng National Key Lab for Electronic Measurement Technology,North University of China,Taiyuan 030051,China
Application of Hermite operator in image registration ZHANG Ming-hui,GAO Yuan-yuan,LU Zhen-tai,FENG Qian-jin School of Biomedical Engineering,Southern Medical University,Guangzhou 510515,China
Online estimation of image Jacobian matrix with time-delay compensation LIU Wen-fang1,BING Zhi-gang2,LU Sheng-li2,LU Hai-long2 1.Electrical and Electronics Technology Application Department,Tianjin Institute of Mechanical and Electronic Technology,Tianjin 300131,China 2.Tianjin Key Laboratory of Information Sensing and Intelligent Control,Tianjin 300222,China
Color image segmentation based on JSEG and watershed methods SUN Wei-fang1,2,DUAN Zhi-yong1,ZHU Zhong-jie2 1.Physical Engineering College,Zhengzhou University,Zhengzhou 450001,China 2.Ningbo Key Lab of Digital Signal Processing(DSP),Zhejiang Wanli University,Ningbo,Zhejiang 315100,China
Microscopic image compression using global motion estimation and Canny algorithm SHAO Hua1,YANG Ming2,SUN Yan-yan2,WANG Song-liang1 1.Information School,Ningbo City College of Vocational Technology,Ningbo,Zhejiang 315100,China 2.Faculty of Information Science and Technology,Ningbo University,Ningbo,Zhejiang 315211,China
Three kinds of adjusted trigonometric spline curves YAN Lan-lan1,LIANG Jiong-feng2 1.College of Mathematics and Information Science,East China Institute of Technology,Fuzhou,Jiangxi 344000,China 2.College of Civil and Environmental Engineering,East China Institute of Technology,Fuzhou,Jiangxi 344000,China
Image processing method using mixed non-linear Butterworth filter WANG Da-hong,HU Mao-lin School of Mathematical Sciences,Anhui University,Hefei 230039,China
Partial multi-objects extracted based on single level set LI Wei-bin,SONG Song-he Department of Mathematics & Systems Science,College of Science,National University of Defense Technology,Changsha 410073,China
Multi-Agent Q-learning based on quantum theory and ant colony algorithm MENG Xiang-ping1,WANG Sheng-bin2 1.Department of Electrical Engineering,Changchun Institute of Technology,Changchun 130012,China 2.Department of Computer Engineering,Northeast Dianli University,Jilin 132012,China
Effective hybrid differential evolution algorithms for lot-streaming flow shop scheduling problem SANG Hong-yan1,PAN Quan-ke2,WU Lei2,PAN Yu-xia21.School of Mathematics Science,Liaocheng University,Liaocheng,Shandong 252059,China 2.School of Computer Science,Liaocheng University,Liaocheng,Shandong 252059,China
Research on business models of information technology service LUO Wen China Development Research Institute of Electronic & Information Industry,Beijing 100846,China
System designation for computer aided rejoining of bones/tortoise shells with inscriptions based on contour matching WANG Ai-min1,2,LIU Guo-ying1,2,GE Wen-ying1,ZHOU Hong-yu1,WANG Ding-lei1 1.School of Computer & Information Engineering,Anyang Normal University,Anyang,Henan 455002,China 2.Institute of Digital Inscriptions on Bones/Tortoise Shells,Anyang,Henan 455002,China
Grammar and semantic extensions of Front compiler front-end generator for Elegant ZHU Heng-wei,ZHANG Ming-guo,QIAO Hai-quan Beijing Qinghe Building Zi 6,Beijing 100085,China
Study on fast program worst-case execution time estimation WU Guo-wei,YAO Lin,YUE Feng Software College,Dalian University of Technology,Dalian,Liaoning 116023,China
Verifying software requirements with ontology and semantic Web rule language HU Hai-bo,ZHANG Lei.School of Software Engineering,Chongqing University,Chongqing 400044,China
Steganalysis method based on improved SVM CHEN Xiao-nan1,ZHANG Min-qing1,MA Lin2 1.Network and Information Security Key Lab,Electronics Department,Engineering College of the APF,Xi'an 710086,China 2.Equipment and Transport Department,Engineering College of the APF,Xi'an 710086,China
Dual-watermarking policy based on Arnold transform and error correcting coding ZHANG Li,JIA Zhen-hong School of Information Science and Engineering,Xinjiang University,Urumqi 830046,China
Cryptanalysis and improvement of (t,n) threshold proxy signature scheme ZUO Zhen-yuan1,XIE Qi2 1.School of Information Science and Engineering,Hangzhou Normal University,Hangzhou 310036,China 2.Graduate School,Hangzhou Normal University,Hangzhou 310036,China
Research of agreement context based on logical scaling LI Xiao-rui,ZHONG Feng,YU Yuan,FENG Xuan School of Mechanical Electronic & Information Engineer,China University of Mining & Technology,Beijing 100083,China
Improved algorithm of data preprocessing in audio fingerprint search GUAN Yao-hua,SHEN Ling,WU Yun,ZHAO Yong Key Lab of Integrated Microsystems,Shenzhen Graduate School,Peking University,Shenzhen,Guangdong 518055,China
Adaptive algorithm for lip detection and location HUANG Yong-hui1,PAN Bao-chang2,LIANG Jian1,FAN Xiao-yan1 1.Faculty of Automation,Guangdong University of Technology,Guangzhou 510006,China 2.Faculty of Information Engineering,Guangdong University of Technology,Guangzhou 510006,China
Concept mapping method for information security management HU Ruo School of Computer,Guangdong Polytechnic Normal University,Guangzhou 510665,China
Stratified resampling strategy imported by residual information in SMC framework WU Gang1,2,TANG Zhen-min2,YANG Jing-yu2 1.Department of Vehicle Engineering,Nanjing Institute of Technology,Nanjing 211167,China 2.School of Computer Science & Technology,Nanjing University of Science and Technology,Nanjing 210094,China
Adaptive immune quantum-behaved particle swarm optimization parallel algorithm CHENG Xin-wen School of Computer,Sichuan University of Science & Engineering,Zigong,Sichuan 643000,China
Intrusion detection based on cluster connectivity clustering algorithm DANG Xiao-chao1,HAO Zhan-jun2,3,WANG Xiao-juan3 1.College of Network Education,Northwest Normal University,Lanzhou 730070,China 2.Department of Engineering Technology,Xijing University,Xi'an 710123,China 3.College of Mathematics & Information Science,Northwest Normal University,Lanzhou 730070,China
Adaptive-parallelism scheduling for Internet-based volunteer computing system CHEN Zuo-zan1,XU Sheng-chao2 1.Education Technology Center,Yulin Normal University,Yulin,Guangxi 537000,China 2.Department of Computer,Guangdong Vocational College of Posts and Telecom,Guangzhou 510630,China
Detection of intrusion samples in IDS based on improved AdaBoost algorithm CHEN Nian1,WANG Ru-chuan2 1.Department of Computer Science,Chizhou College,Chizhou,Anhui 247000,China 2.Department of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210093,China
Improvement of Pastry routing mechanism LIU Shi-peng,DENG Ya-ping College of Computer Science,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
Intrusion detection method based on rough set and genetic reduction algorithm YI Zhe,LI Wei-sheng College of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
Mechanism and prevention of cross-domain Web page malicious code LI Zhi-yong1,XUE Liang2,TAO Ran1,ZHANG Hao1 1.School of Information Technology,Beijing Institute of Technology,Beijing 100081,China 2.Navy Academy of Armament,Beijing 100161,China
Improved method for sensor fault diagnosis based on strong tracking filtering LIU Zhi-cheng1,LANG Jian-hua2,QIU Hai-lian3 1.Department of Automation,Taiyuan Institute of Technology,Taiyuan 030008,China 2.Shanxi North Xing'an Chemical Industry Company Limited,Taiyuan 030008,China 3.Yunnan Mechanical Research and Design Institute,Kunming 650031,China
Identification of dynamic nonlinear systems based on modified LSSVM DU Zhi-yong1,WANG Xian-fang2,ZHENG Li-yuan3 1.Henan Mechanical and Electrical Engineering College,Xinxiang,Henan 453002,China 2.School of Communication and Control Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China 3.School of Electrical and Control Engineering,Liaoning Technical University,Huludao,Liaoning 125105,China
Improved indoor location scheme for Cricket wireless sensor network LIU Yu-hong,ZHAN Ying Basic Teaching & Researching Center,School of Software,Nanyang Institute of Technology,Nanyang,Henan 473004,China
Application for gene clustering based on quantum-behaved particle swarm algorithm GAO Qian-qian,XU Wen-bo,SUN Jun School of Information Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Two new methods of transforming Vague set into Fuzzy set XU Feng-sheng Department of Computer Science and Technology,Dezhou University,Dezhou,Shandong 253023,China
Study of water system remote sensing image XU Lu-qiang1,2,LIU Jing-xia3,QIN Jun2,ZHU Jun2 1.Computer School,Southwest University of Science and Technology,Mianyang,Sichuan 621010,China 2.Southwest Jiaotong University,Chengdu 610031,China 3.Chengdu Electromechanical College,Chengdu 610031,China
Identification method combining PSO and improved BP neural network GAO Lin,SUN Hai-rong,YANG Huai-shen School of Control Science and Engineering,North China Electric Power University,Baoding,Hebei 071003,China
Structural risk minimization principle of random rough samples ZHANG Zhi-ming 1,TIAN Jing-feng 2 1.College of Mathematics and Computer Sciences,Hebei University,Baoding,Hebei 071002,China 2.Science and Technology College,North China Electric Power University,Baoding,Hebei 071051,China
Extended coded cooperative diversity in wireless sensor networks LI Dong,SHI Hao-shan,CHENG Wei,YANG Jun-gang Electronic Information College,Northwestern Polytechnical University,Xi'an 710072,China
Quantum competitive decision algorithm for function optimization LIU Yong1,2,MA Liang1,NING Ai-bing1 1.School of Management,University of Shanghai for Science and Technology,Shanghai 200093,China 2.Department of Fundamental Studies,Yancheng Institute of Technology,Yancheng,Jiangsu 224051,China
Effective supply chain performance prediction method and its application CHEN Dong-dong Economic Management College,Sichuan Agricultural University,Ya'an,Sichuan 625014,China
2010 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36]
More Issues:   [1997]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved