Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Computer Science
FQ: 月刊
AD of Publication: 重庆市
Lanuage: 中文;
ISSN: 1002-137X
CN: 50-1075/TP
YP: 1974
Url: 重庆西南信息有限公司
Recommended Journals
Computer Science
2019 -04
Online Advertising Model via Blockchain LU Ge-hao;LI Xiang-yu;School of Software
Travel Time Analysis of SP-AS/RS with New Configuration for I/O Point TONG Ze-ping;WU Ying-qiang;REN Liang;LI Wei;School of Management
Mobile Sink Based Data Collection Strategy for Farmland WSN YANG Ying;YANG Wu-de;WU Hua-rui;MIAO Yi-sheng;College of Agriculture
On-line sEMG Hand Gesture Recognition Based on Incremental Adaptive Learning LI Yu;CHAI Guo-zhong;LU Chun-fu;TANG Zhi-chuan;Industrial Design Institute
Data Mining Algorithm of Abnormal Network Based on Fuzzy Neural Network XU Lei;WANG Jian-xin;School of Information Science & Technology
Research of Consensus in Multi-agent Systems on Complex Network ZHANG Sen;LIU Wen-qi;ZHAO Ning;Faculty of Science
Dictionary Refinement-based Localization Method Using Compressive Sensing in Wireless Sensor Networks WU Jian;SUN Bao-ming;Suzhou Institute of Trade & Commerce;No.91977of PLA;
Survey of Online Sequential Extreme Learning Algorithms for Dynamic Data Stream Analysis GUO Wei;YU Jian-jiang;TANG Ke-ming;XU Tao;College of Information Engineering
Quality Control Agent Based on Probability Inference XU Yao-li;LI Zhan-huai;School of Computer Science and Engineering
Local Path Planning of Mobile Robot Based on Situation Assessment Technology CHAI Hui-min;FANG Min;LV Shao-nan;School of Computer Science and Technology
Path Planning of Mobile Robot Based on PG-RRT Algorithm XI Feng-fei;ZENG Xi;JI Shi-ming;CHEN Guo-da;CAI Chao-peng;Key Laboratory of Special Purpose Equipment and Advanced Processing Technology of the Ministry of Education
Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism LIU Ming-cong;WANG Na;ZHOU Ning;Information Engineering University;Henan Province Key Laboratory of Information Security;Jiangnan Institute of Computing Technology;
Design Method of Semantic-driven Cyberspace Resource Symbol ZHANG Long;ZHOU Yang;TIAN Jiang-peng;ZHAO Hai-peng;Institute of Geography Spatial Information
Bidirectional Anonymous Secret Communication Protocol Based on Onion Routing ZHAO Meng-yao;LI Xiao-yu;School of Information Engineering
Client Puzzle Based Access Control Model in Public Blockchain WU Dai-yue;LI Qiang;YU Xiang;HUANG Hai-jun;National University of Defense Technology;
Alert Processing Method Based on Hierarchical Clustering WU Yi-fan;CUI Yan-peng;HU Jian-wei;Network Behavior Research Center
Weighted Oversampling Method Based on Hierarchical Clustering for Unbalanced Data XIA Ying;LI Liu-jie;ZHANG XU;BAE Hae-young;School of Computer Science and Technology
Fidelity Index in Image Magnification Based on Hierarchical Feature and Radial Basis Function LI Chun-jing;HU Jing;TANG Zhi;School of Mathematical Science
Low Expansion Rate Encryption Algorithm Based on MLWE KE Cheng-song;WU Wen-yuan;FENG Yong;College of Computer Science & Technology
Code Obfuscation Effectiveness Assessment Model Based on Nonlinear Fuzzy Matrices SU Qing;LIN Ze-ming;LIN Zhi-yi;HUANG Jian-feng;School of Computers
Massive Data Parallel Query Platform Based on Distributed Shared-nothing Architecture QIN Dong-ming;YU Jian;ZHANG Bo;ZHAO Qin;Key Laboratory of Embedded System and Service Computing of Ministry of Education
Single -Pass Short Text Clustering Based on Context Similarity Matrix HUANG Jian-yi;LI Jian-jiang;WANG Zheng;FANG Ming-zhe;School of Computer and Communication Engineering
Distributed Subgraph Matching Algorithm for Large Scale Graph Data XU Wen;SONG Wen-ai;FU Li-zhen;LV Wei;School of Software
Tag-aware Recommendation Method with Implicit Feedback LI Hong-mei;DIAO Xing-chun;CAO Jian-jun;FENG Qin;ZHANG Lei;Army Engineering University of PLA;The 63rd Research Institute
Data Scaling Method for Multi-scale Data Mining ZHANG Fang;ZHAO Shu-liang;WU Yong-liang;College of Mathematics &Information Science
Associated Users Mining Algorithm Based on Multi-information Fusion Representation Learning HAN Zhong-ming;ZHENG Chen-ye;DUAN Da-gao;DONG Jian;School of Computer and Information Engineering
RFID Data-driven Vehicle Speed Prediction Using Adaptive Kalman Filter FENG An-qi;QIAN Li-ping;HUANG Yu-pin;WU Yuan;College of Information Engineering
Location Anonymous Algorithm Based on User Collaboration under Distributed Structure WU Dan-dan;LYU Xin;College of Computer and Information
Prediction of Protein Functions Based on Bi-weighted Vote TANG Jia-qi;WU Jing-li;LIAO Yuan-xiu;WANG Jin-yan;School of Computer Science &Information Engineering
Image Fusion Algorithm Based on Improved Weighted Method and Adaptive Pulse Coupled Neural Network in Shearlet Domain WANG Ying;LIU Fan;CHEN Ze-hua;College of Electrical and Power Engineering
Multispectral Image Matching Algorithm Based on Improved SIFT SUN Xue-qiang;HUANG Min;ZHANG Gui-feng;ZHAO Bao-wei;CONG Lin-xiao;Key Laboratory of Computation Optical Imaging Technology
Color Morphology Image Processing Method Using Similarity in HSI Space HE Xiao-jun;XU Ai-gong;LI Yu;College of Innovation and Practice
Semantic Description of IoT Services:A Method of Mapping WSDL to OWL-S LING Jing;JIANG Ling-yun;College of Telecommunications & Information Engineering
Digital Image Sharing Algorithm Based on Triangular Partition YUAN Xi-xi;CAI Zhan-chuan;Faculty of Information Technology
Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things LIU Meng-jun;SHA Tao;LI Dan;LIU Shu-bo;School of Computer and Information Engineering
Security Analysis on VANETs Authentication Schemes:CPAV and ABV WANG Qing-long;QIAO Rui;DUAN Zong-tao;School of Information Engineering
Detecting Community from Bipartite Network Based on Spectral Clustering ZHANG Xiao-qin;AN Xiao-dan;CAO Fu-yuan;School of Mathematics Sciences
Point of Interest Recommendation Based on User’s Interest and Geographic Factors SU Chang;WU Peng-fei;XIE Xian-zhong;LI Ning;College of Computer Science and Technology
Personalized Recommendation Algorithm Based on Recent Neighborhood Recommendation and Combined with Context Awareness ZHANG Hong-li;BAI Xiang-yu;LI Gai-mei;College of Educational Information Technology
Image Description Model Fusing Word2vec and Attention Mechanism DENG Zhen-rong;ZHANG Bao-jun;JIANG Zhou-qin;HUANG Wen-ming;School of Computer and Information Security
Image Fusion Using Quaternion Wavelet Transform and Copula Model LI Kai;LUO Xiao-qing;ZHANG Zhan-cheng;WANG Jun;Jiangsu Laboratory of Pattern Recognition and Computational Intelligence;School of IoT Engineering
Performance Optimization of FT Program Based on SW26010 Processor TAO Xiao-han;PANG Jian-min;GAO Wei;WANG Qi;YAO Jin-yang;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
Sustainable Cooling Method of CPU Hot Spot Based on Target Matrix YAN Bing-qing;YUAN Jing-ling;CHEN Min-cheng;LIU Dong-ling;JIANG Tao;College of Computer Science and Technology
Analysis of Channel Capacity of Molecular Communication Model Based on Inter-user Interference CHENG Zhen;LIN Fei;ZHAO Hui-ting;ZHANG Yi-ming;College of Computer Science and Technology
Improved Efficient Certificateless Short Signature Scheme ZUO Li-ming;CHEN Zuo-song;XIA Ping-ping;TANG Peng-zhi;KANG Wen-yang;School of Science
Bluetooth Key Agreement Scheme with Zero Secret Storage in Slave Device LI Sen-sen;HUANG Yi-cai;YU Bin;Information Engineering University;
Reconvergence Phenomena Analysis Method in Combinational Circuits Based on SAT Solver ZHANG Lu-jie;LIU Chang;ZHANG Long;GUO Yang;College of Computer
High Order Statistics Structured Sparse Algorithm for Image Genetic Association Analysis RU Feng;XU Jin;CHANG Qi;KAN Dan-hui;School of Electronic Control
Visual Analysis Method of Traffic Accident Spatial-Temporal Pattern RAO Yong-ming;ZHANG Yan-kong;XIE Wen-jun;LIU Lu;LIU Xin-yue;LUO Yue-tong;School of Computer Science and Information Engineering
Online Obstacle Avoidance and Path Planning of Quadrotor Oriented to Urban Environment CHENG Hao-hao;YANG Sen;QI Xiao-hui;Department of Unmanned Aerial Vehicle
Dynamic Threat Assessment Model Based on Intuitionistic Fuzzy Multiple Attribute Decision Making CHEN De-jiang;WANG Jun;ZHANG Hao-wei;Air and Missile Defense College
2019 Issues:  [01] [05]
More Issues:   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved