Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Computer Engineering and Applications
FQ: 半月
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1002-8331
CN: 11-2127/TP
YP: 1964
Url: 华北计算技术研究所
Recommended Journals
Computer Engineering and Applications
2010 -28
Catalog
Lag synchronization of chaotic systems with uncertain parameters HU Ai-hua,XU Zhen-yuan,GUO Liu-xiao School of Science,Jiangnan University,Wuxi,Jiangsu 214122,China
Method of extracting features from DNA microarray data for classification PENG Hong-yi1,YE Yan-rui2,ZHANG Jun-hui2,LUO Ze-ju3,FENG Guo-he41.College of Science,South China Agricultural University,Guangzhou 510642,China 2.School of Bioscience & Bioengineering,South China University of Technology,Guangzhou 510006,China 3.School of Computer Science and Information Engineering,Chongqing Technology and Business University,Chongqing 400067,China 4.College of Economics and Management,South China Normal University,Guangzhou 510006,China
Notes on quantum operation MA Fei1,2,ZHANG Jian-hua1,WANG Xiao-han2,LI Li11.College of Mathematics and Information Science,Shaanxi Normal University,Xi'an 710062,China 2.College of Mathematics and Information Science,Xianyang Normal University,Xianyang,Shaanxi 712000,China
Implicative closure operators on complete residuated lattices YU Hai,ZHAN Wan-rong College of Mathematics and Science,Luoyang Normal College,Luoyang,Henan 471022,China
Research and design on carbon emission warning decision support system based on Web GIS PENG Yan-fang,PENG Jun,LI Jing,LI Zhe-qin Institute of Information Science and Engineering,Central South University,Changsha 410083,China
Study on power demand forecasting based on non-linear regression combined neural network WANG Ke-liang1,2,YANG Li2,31.School of Management,Tianjin University,Tianjin 300072,China 2.School of Economics and Management,Anhui University of Science and Technology,Huainan,Anhui 232001,China 3.School of Management,University of Science and Technology of China,Hefei 230009,China
Research on quality evaluation method of weapon system-of-systems requirement modeling LU Yan-jing,CHENG Ying-wu School of Information System and Management,National University of Defense Technology,Changsha 410073,China
Identifying kinetic parameters in microbial continuous cultures by DE algorithm YU Yong-shengSchool of Mathematics and Information Science,Shandong Institute of Business and Technology,Yantai,Shandong 264005,China
Variable step size decorrelation Volterra LMS algorithm ZHANG Xiu-mei1,ZHAO Zhi-jin1,2,SHANG Jun-na1,21.Telecommunication School,Hangzhou Dianzi University,Hangzhou 310018,China 2.State Key Lab of Information Control Technology in Communication System of No.36 Research Institute,China Electronic Technology Corporation,Jiaxing,Zhejiang 314001,China
Multi-criteria routing metric for Wireless Mesh Networks JIANG Yu-sheng,REN Jing-jing,HE Fang College of Communication Engineering,Chongqing University,Chongqing 400030,China
Construction of irregular quasi-cyclic LDPC codes with low encoding complexity ZHAN Wei1,LIANG Jun-jie21.Department of Information Development and Management,Hubei Electric Power Information and Communication Center,Wuhan 430077,China 2.Faculty of Mathematics and Computer Science,Hubei University,Wuhan 430062,China
Research on reliable multicast protocol in HF data communication JING Yuan,CAO Peng,HUANG Guo-ce,ZHAO Hui Telecommunication Institute,Air Force Engineering University,Xi'an 710077,China
Application of Hilbert-Huang transform to fine time-frequency analysis of speech signal SONG Qian-qian,YU Feng-qin College of Communications and Control Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Speech emotion recognition using ensemble methods BI Fu-kun,BIAN Ming-ming School of Information and Electronics,Beijing Institute of Technology,Beijing 100081,China
New all-zero blocks detection algorithm suitable for AVS GUO Yi-zheng,JIAO Peng-peng Department of Information Science and Technology,Nanjing Normal University Taizhou College,Taizhou,Jiangsu 225300,China
IMM-UPF algorithm in maneuvering target tracking research CAO Jie1,WEN Ru-quan1,21.College of Electrical and Information Engineering,Lanzhou University of Technology,Lanzhou 730050,China 2.Mechanical and Electronic Engineering Department,Pingxiang College,Pingxiang,Jiangxi 337000,China
Hardware/software partitioning based on combination of genetic algorithm and simulated annealing LI Lan-ying,HAN Su-juan,DIAO Shuang-jun School of Computer,Harbin University of Science and Technology,Harbin 150080,China
Distributed data mining on grid services DENG Yong,WANG Ru-chuan,DENG Song School of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
Study on 3D terrain model of plate tectonics YU Chun-yang1,ZHAO Hai-bin2,ZHAO Hai11.School of Information Science & Engineering,Northeastern University,Shenyang 110004,China 2.School of Mechanical Engineering & Automation,Northeastern University,Shenyang 110004,China
Fast adaptive constant piecewise CV model GE Qi,WEI Zhi-hui College of Computer,Nanjing University of Science & Technology,Nanjing 210094,China
Liver CT image retrieval based on non-tensor product wavelet YU Mei,LU Zhen-tai,FENG Qian-jin,CHEN Wu-fan Institute of Medical Information and Technology,School of Biomedical-Engineering,Southern Medical University,Guangzhou 510515,China
New multi-loading ant colony algorithm based on adaptive adjustment of clustering neighborhood SHEN Ming-ming,MAO Li School of Information Technology,Jiangnan University,Wuxi,Jiangsu 214122,China
Research on static analysis method for software security based on XML ZHOU Kuan-jiu,ZHENG Hong-bo,LAI Xiao-chen,LIU Chun-yan,CHI Zong-zheng Software School,Dalian University of Technology,Dalian,Liaoning 116620,China
Steganography method of Excel 2007 document LIU Yu-ling1,WAN Jing1,XIN Guo-jiang21.College of Computer and Communication,Hunan University,Changsha 410082,China 2.Department of Information and Technology,Hunan Network Engineering Vocational College,Changsha 410002,China
Real time detection of image defect for phone LCD screen LIU Bo,LI Xin-hua,QIAN Xiang,OU Shu-qin Key Laboratory of Intelligent Computing & Signal Processing,Ministry of Education,Anhui University,Hefei 230039,China
High-capacity blind digital watermarking technology based on curvelet transform GAO Huan-zhi1,PANG Guo-li2,HE Xiu-ling2,LIU Qing-jie21.Science and Technology Information Institute,General Research Institute for Nonferrous Metals,Beijing 100088,China 2.Department of Disaster Information Spaces,Institute of Disaster Prevention Science and Technology,Sanhe,Hebei 065201,China
Privacy preserving using fuzzy sets ZHANG Guo-rong1,YIN Jian21.Computer Staff Room,Guangzhou Academy of Fine Arts,Guangzhou 510260,China 2.School of Information Science & Technology,Sun Yat-sen University,Guangzhou 510275,China
Research on target tracking algorithm based on marginalized particle filter CHEN Jin-guang1,2,MA Li-li1,CHEN Liang11.School of Computer Science,Xi'an Polytechnic University,Xi'an 710048,China 2.VIPS Lab,School of Electronic Engineering,Xidian University,Xi'an 710071,China
Real-time retrieval in Chinese webpage by using inverted table WANG Yuan-ding,LIANG Jiu-zhen School of Information Engineering,Jiangnan University,Wuxi,Jiangsu 214122,China
Application research of confusion network in spoken document retrieval system SUN Cheng-li School of Information Engineering,Nanchang Hangkong University,Nanchang 330063,China
Design and implementation of encrypted data in outsourced database WANG Zheng-fei1,2,WANG Wei3,SHI Bo-le31.Department of Computer and Electronic Engineering,Hunan Business College,Changsha 410205,China 2.School of Computer Science,National University of Defense Technology,Changsha 410073,China 3.School of Information,Fudan University,Shanghai 200433,China
Mass data cleaning algorithm based on extended tree-like knowledge base YAN Cai-rong1,SUN Gui-ning2,GAO Nian-gao21.School of Computer,Donghua University,Shanghai 201620,China 2.Triman Information & Technology Ltd.,Shanghai 200040,China
Inference rules for XML strong multivalued dependencies based on XML Schema YIN Li-feng1,HAO Zhong-xiao1,21.College of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China 2.College of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China
Improved algorithm for vector viewshed on RSG terrain SUN Tao1,XIE Xiao-fang1,SUN Yong-qin21.Department of Armament Science and Engineering,Naval Aeronautical and Astronautical University,Yantai,Shandong 264001,China 2.Graduate Students'Brigade,Naval Aeronautical and Astronautical University,Yantai,Shandong 264001,China
Neighborhood preserving discriminant nonnegative matrix factorization WANG Ya-fang School of Science,Xi'an Jiaotong University,Xi'an 710049,China
Research on extracting human finger vein pattern characteristics based on residual image YU Cheng-bo1,ZHOU Zhao-min1,LI Hong-bing1,2,LI Yan-lin11.Research Institute of Remote Test and Control,Chongqing University of Technology,Chongqing 400050,China 2.Chongqing Three Gorges University,Chongqing 404000,China
Application of improved CPSO-SVM approach in face recognition LI Ming1,SUN Xiang-feng1,XING Yu-juan21.School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China 2.School of Science and Engineering,Gansu Lianhe University,Lanzhou 730000,China
Non-Local Means algorithm based on structure tensor XU Juan1,2,SUN Yu-bao2,WEI Zhi-hui21.School of Mathematics and Computing Science,Anqing Teachers College,Anqing,Anhui 246011,China 2.School of Science,Nanjing University of Science and Technology,Nanjing 210094,China
Color image segmentation by fusion of mean shift and region saliency WANG Zhao-ying1,LI Guang1,HOU Zhi-qiang1,LIN Nan-zhang21.Telecommunication Engineering College,Air Force Engineering University,Xi'an 710077,China 2.Missile Institute,Air Force Engineering University,Sanyuan,Shaanxi 713800,China
Lighting-variant face recognition based on illumination categorization CUI Rui,ZHANG Yan-ning,HU Yue-ning,ZHU Yu School of Computer Science and Technology,Northwestern Polytechnical University,Xi'an 710129,China
WEB near-duplicate image detection based on local feature LIU Hong1,2,WEN Zhao-hui21.Network Information Center,the Second Military Medical University,Shanghai 200433,China 2.School of Computer Science,Fudan University,Shanghai 200433,China
Chaos encryption algorithm based on dual scrambling of pixel position and value CAO Jian-qiu,XIAO Hua-rong,LAN Zhang-li School of Information Science & Engineering,Chongqing Jiaotong University,Chongqing 400074,China
Image partition method in face recognition HE Guang-hui1,2,TANG Yuan-yan1,FANG Bin1,ZHANG Tai-ping11.College of Computer Science,Chongqing University,Chongqing 400030,China 2.College of Mathematics and Physics,Chongqing University,Chongqing 400030,China
Hierarchical quantization technique based on hierarchical B pictures coding ZHENG Jia-li1,2,QIN Tuan-fa1,NI Guang-nan21.School of Computer and Electronic Information,Guangxi University,Nanning 530004,China 2.Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
Ray-tracing acceleration algorithm based on median-cut kd-tree HUANG Zhong1,JIANG Ju-lang1,ZHANG You-sheng2,CAI Qing-hua31.School of Physics and Electric Engineering,Anqing Teachers College,Anqing,Anhui 246011,China 2.School of Computer and Information,Hefei University of Technology,Hefei 230009,China 3.School of Computer and Information,Anqing Teachers College,Anqing,Anhui 246011,China
P2P storage system based on on-line rate and response time of node LIU Zhi-ming1,2,SHA Ji-chang1,WAN Ya-ping2,YANG Xiao-hua21.College of Information System and Management,National University of Defense Technology,Changsha 410073,China 2.School of Computer Science and Technology,University of South China,Hengyang,Hunan 421001,China
Method of Web service discovery based on semantic rule WANG Hai1,FAN Lin2,LI Zeng-zhi1,31.Institute of Computer System Structure and Networks,Xi'an Jiaotong University,Xi'an 710049,China 2.Department of Computer Science and Technology,Xi'an University of Posts and Telecommunications,Xi'an 710061,China 3.State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications),Beijing 100876,China
Anomaly network intrusion detection based on HL-Isomap and SVM ZHENG Kai-mei1,2,QIAN Xu1,HU Xiao-hong11.College of Mechatronics and Information Engineering,China University of Mining & Technology(Beijing),Beijing 100083,China 2.Department of Information Engineering,China Institute of Defense Science and Technology,Beijing 101601,China
Research on security protective framework for typical application system GONG Lei1,2,3,ZHAO Yong3,HAN Pei-sheng1,3,LI Yu31.Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China 2.Key Lab of Information Network Security,Ministry of Public Security,Shanghai 201204,China 3.Institute of Computer Science,Beijing University of Technology,Beijing 100124,China
Analysis and application of network traffic based on seasonal periodicity Elman network DANG Xiao-chao1,HAO Zhan-jun2,31.College of Network Education,Northwest Normal University,Lanzhou 730070,China 2.College of Mathematics & Information Science,Northwest Normal University,Lanzhou 730070,China 3.Department of Engineering Technology,Xijing University,Xi'an 710123,China
Design and implementation of attacker-oriented intrusion alert analysis system PENG Xue-na1,2,ZHU Hong-kai1,WEN Ying-you1,2,ZHAO Hong1,21.Education Ministry Engineering Research Center of Safety and Security of Complex Network System,Northeastern University,Shenyang 110004,China 2.Neusoft Research,Neusoft Co.Ltd,Shenyang 110179,China
Application research on data ferrying in secure portable storage WANG Tong-yang,YU Peng-fei,WU Jun-jun,ZHANG Xin-fang Institute of Information & System Technology,Huazhong University of Science and Technology,Wuhan 430074,China
Feature selection algorithm toward abnormal traffic detection WANG Xiu-ying1,2,SHAO Zhi-qing1,CHEN Li-qiong11.College of Information Science and Engineering,East China University of Science and Technology,Shanghai 200237,China 2.Department of Computer and Information,Shanghai Xinqiao Vocational and Technical College,Shanghai 200237,China
Weighted centroid relative localization algorithm in wireless sensor network ZHANG Hui-min1,2,CHAI Yi1,XU Lei21.College of Automation,Chongqing University,Chongqing 400044,China 2.Department of Communication,Chongqing College of Electronic Engineering,Chongqing 401331,China
Analysis of boundary region attribute on rough set decision table CHEN Wen1,2,ZHU William1,SHE Kun1,TANG Jian-guo11.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China 2.Computer Department,Fuzhou Polytechnic,Fuzhou 350108,China
Improved algorithm for robot online path planning SUI Ling-ling,CHEN Xiong Department of Electronic Engineering,Fudan University,Shanghai 200433,China
Improved interactive genetic algorithm with interval value fuzzy set HU Xiao-hui,CHEN Jun-lian,ZHANG Xiao-ying Institute of Electronic and Information Engineering,Lanzhou Jiaotong University,Lanzhou 730070,China
New particle swarm optimization algorithm with position mutation XU Sheng-bing,LI Guo,XU Chen College of Mathematics and Computational Science,Institute of Intelligent Computing Science,Shenzhen University,Shenzhen,Guangdong 518060,China
Genetic algorithm based on multi-population evolution LV Hui1,ZHOU Cong2,ZOU Juan2,ZHENG Jin-hua21.Institute of Mathematics and Computational Science,Xiangtan University,Xiangtan,Hunan 411105,China 2.Institute of Information Engineering,Xiangtan University,Xiangtan,Hunan 411105,China
q-composite key management scheme of multiple key spaces based on wireless sensor network YANG Shun1,2,LI Qiao-liang2,LONG Xian-ai1 1.College of Computer Science and Technology,Hunan International Economics University,Changsha 410205,China 2.School of Computer and Communication,Hunan University,Changsha 410082,China
Application of concave semi-supervised support vector machines XIAN Guang-ming1,2,QI De-yu1,FANG Qun2,KE Qing3,ZENG Bi-qing4,PANG Xiong-wen51.South China University of Technology,Guangzhou 510640,China 2.Guangzhou Tianhe Software Park MC Post-doctoral Research Station,Guangzhou 510663,China 3.Bluedon Information Security Technology Co.,Ltd,Guangzhou 510631,China 4.Nanhai Campus,South China Normal University,Foshan,Guangdong 528225,China 5.College of Computer,South China Normal University,Guangzhou 510640,China
Data fusion and application of reservoir monitoring in the Three Gorges of the Yangtze River XU Li-na,NIU Rui-qing Institute of Geophysics and Geomatics,China University of Geosciences,Wuhan 430074,China
Targets localization for proximate sensor based on neural network XU Xiao-long,XU Guo-hua School of Naval Architecture & Ocean Engineering,Huazhong University of Science and Technology,Wuhan 430074,China
Disturbance compensation control for servo tracking system mounted with small arm WANG Hong-ru,WANG Jian-zhong State Key Laboratory of Explosion Science and Technology,Beijing Institute of Technology,Beijing 100081,China
Research and application of nonlinear quantization CMAC WANG Hua-qiu1,LIAO Xiao-feng21.College of Computer Science and Engineering,Chongqing Institute of Technology,Chongqing 400050,China 2.College of Computer Science and Engineering,Chongqing University,Chongqing 400030,China
Study on ship detection with improved Dempster-Shafer theory CHEN Bo,WAN Shou-hong,YUE Li-hua Department of Computer Science and Technology,University of Science and Technology of China,Hefei 230027,China
Research on multi-Agent interaction protocols based on RASA YANG Yi,WANG Li-ming School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China
Method for parameter optimization of nonlinear PID controller SUN Wei1,ZHOU Yang-hua2,XI Mao-long11.Wuxi Institute of Technology,Wuxi,Jiangsu 214121,China 2.School of Information Technology,Southern Yangtze University,Wuxi,Jiangsu 214122,China
Construction of conflict solution system of profits sharing for high-tech virtual enterprise LIU Song1,GAO Chang-yuan21.Management College,Yangtze University,Jingzhou,Hubei 434023,China 2.Management College,Harbin University of Science and Technology,Harbin 150080,China
2010 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36]
More Issues:   [1997]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved