Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Application Research of Computers
FQ: 月刊
AD of Publication: 四川省成都市
Lanuage: 中文;
ISSN: 1001-3695
CN: 51-1196/TP
YP: 1984
Url: 四川省计算机研究院
Recommended Journals
Application Research of Computers
2014 -01
Application of social network analysis in research of intergovernmental organizations LIU Jian-sheng;FENG Xiao-sheng;HE Wan-hui;LI Li-bo;College of Information System & Management,National University of Defense Technology;State Key Laboratory of High Performance Computing,National University of Defense Technology;Changsha Military Representative Agency,Wuhan Military Representative Bureau of General Arma-ment Department;
Research on prediction of micro-blog information dissemination based on PA algorithm TIAN Zhan-wei;LIU Chen;WANG Lei;SUI Yang;School of Engineering,Northeast Agricultural University;School of Management,University of Shanghai for Science & Technology;School of Journalism & Communication,Heilongjiang University;
General model and simulation on passenger-dedicated line section based on timed predicate / transition-system LI Wang;NI Shao-quan;School of Transportation & Logistics,Southwest Jiaotong University;National Railway Train Diagram Research & Training Center,Southwest Jiaotong University;
Union pricing mechanism of traffic information and road congestion based on game theory perspective YUAN Peng-cheng;JUAN Zhi-cai;Antai College of Economics & Management,Shanghai Jiao Tong University;
Track patching method for incomplete track in track-oriented traffic survey and analysis WANG Long-fei;CHEN Hong;LI Yang;DENG Ya-juan;Traffic Engineering Research Institute,School of Highway,Chang'an University;
Decoupling mode-based shape optimization method for vehicle door in conceptual design stage SU Xuan;WANG Hu;State Key Laboratory of Advanced Design & Manufacture for Vehicle Body,Hunan University;
Synchronizing characteristics of neural network subject to external electric field YU Kai;WANG Jiang;DENG Bin;WEI Xi-le;School of Electrical Engineering & Automation,Tianjin University;
Secure certificate-based encryption against entropy and key leakage YU Qi-hong;LI Ji-guo;Dept. of Computer Science, Suqian College;College of Computer & Information Engineering,Hehai University;
Deniable attribute-based designated confirmer signature REN Yan;TANG Chun-ming;College of Mathematics & Information Science,Guangzhou University;Dept. of Applied Mathematics, Yuncheng University;
New construction methods for MDS matrices and involution MDS matrices GUO Lei;ZHENG Hao-ran;FU Zeng-qiang;WANG Yue;Institution No. 3,Information Engineering University;The Air Force Xi'an Flight Academy;
Strong privacy protection scheme based on oblivious transfer and group signature in VANET ZHU Xiao-ling;LU Yang;HOU Zheng-feng;ZHU Xiao-juan;School of Computer & Information,Hefei University of Technology;Anhui Provincial Key Laboratory of Mine IoT & Mine Safety Supervisory Control;
Level-based adaptive geo-routing for underwater sensor network LAN Sheng-lin;DU Xiu-juan;LIU Fan;FENG Zhen-xing;School of Computer,Qinghai Normal University;
Research of IPQAM resource management method based on optimal cache model JU Zhao-ming;WANG Ling-fang;LIU Lei;University of Chinese Academy of Sciences;National Network New Media Engineering Research Center,Institute of Acoustics Chinese Academy of Sciences;
Improved distributed data aggregation scheduling algorithm in WSNs LIU Wen-bin;LIU Hong-bing;FU Sha;WEN Zhi-qiang;Dept. of Information & Management,Hunan University of Finance & Economics;School of Computer & Communication,Hunan University of Technology;
Mobility management for 6LoWPAN wireless sensor networks WANG Xiao-nan;QIAN Huan-yan;Changshu Institute of Technology;Nanjing University of Science & Technology;
Joint carrier frequency offset and double selective channel estimation based on EM-MAP algorithm TIAN Wei;ZHONG Zi-fa;GE Mei-bao;Anhui Province Key Laboratory of Electronic Restriction,Electronic Engineering Institute;NO. 54 Institute from Headquarters of the General Staff;
Research of segmented autocorrelation frequency estimation algorithm ZHANG Xiao-wei;LI Yang-yang;MENG Fan-ming;College of Science,Harbin Engineering University;
Performance analysis of FastICA and RobustICA on blind sources separation WU Wei;PENG Hua;ZHANG Fan;Institute of Information System Engineering,Information Engineering University of PLA;Training Dept. ,Information Engineering University of PLA;
Lattice-based public-key encryption with resistance of ciphertext-only attack LI Jun;Dept. of Computer Science & Technology,East China Normal University;
Lightweight and high security key management for wireless sensor networks ZENG Ping;ZHANG Li;YANG Ya-tao;LIU Yu-xin;CHU Xu;Dept. of Communication Engineering,Beijing Electronic Science & Technology Institute;
Identify traceable threshold attribute-based signature scheme XING Han-rui;LU Wan-yi;WEI Li-xian;HAN Yi-liang;Key Laboratory of Network & Information Security under the Chinese Armed Police Force,Dept. of Electronic Technology,Engineering University of the Chinese Armed Police Force;Institute of Network & Information Security under the Chinese Armed Police Force,Dept. of Electronic Technology,Engineering University of the Chinese Armed Police Force;
Research of task scheduling algorithm on heterogeneous cluster LIU Li;JIANG Ming-hua;College of Mathematics & Computer Science,Wuhan Textile University;Graduate Department,Wuhan Textile University;
Routing decision algorithm based on limit arrangement SHI Lan;LV Jian-hui;College of Information Science & Engineering,Northeastern University;
Improvement of content-based image retrieval system by incrementally learning semantic attributes of images DING Xue-dong;LIU Yuan;XIE Zhen-ping;School of Digital Medium,Jiangnan University;
Nonlinear dimensionality reduction method by fusing LLE and ISOMAP ZHANG Shao-long;GONG Zhi-le;LIAO Hai-bin;School of Computer & Software Engineering,Pingdingshan Institute of Industry Technology;School of Computer Science & Technology,Hubei University of Science Technology;
Liver contour extraction based on priori knowledge model WANG Xiao-dong;FENG Jun;LU Ding-guo;LI Zhan;HAN Xin;School of Information & Technology,Northwest University;
Interest point detection based on Gabor multiscale-space XIE Jin;CAI Zi-xing;WANG Lu-cai;School of Information Science & Engineering,Central South University;College of Polytechnic,Hunan Normal University;
Salient objects detection based on global color contrast YANG Jun;LIN Tu-sheng;XIAO Ying-wang;School of Electronic & Information Engineering,South China University of Technology;Dept. of Informa-tion Engineering & Technology,Nanhai Compus of South China Normal University;
Image matching algorithm based on affine-invariant closed region and SURF DU Jie;LIU Ya-qiu;SUN Yao;College of Information & Computer Engineering,Northeast Forestry University;
Face recognition based on orthogonal SRDA and SRKDA CHEN Da-yao;CHEN Xiu-hong;DONG Chang-jian;School of Digital Media,Jiangnan University;
Research on single image defogging algorithm based on dark primary colors HE Xiao-jun;QIAO Yin;School of Information Science & Engineering,Shenyang Ligong University;
PERCLOS implementation computing method of eye open degree based on finite state machine GONG Xiao-qian;PU Yi-fei;YANG Zhi-yong;ZHOU Ji-liu;School of Computer Science,Sichuan University;
Research human action reconstruction based on LLE and KRR LIU Jian;GONG Zhi-heng;WU Cheng-dong;GAO En-yang;College of Information & Control Engineering,Shenyang Jianzhu University;College of Information Science & Engineering,Northeastern University;Shenyang Institute of Automation (SIA),Chinese Academy of Sciences;
MRI image segmentation method based on anisotropic diffusion and spatial FCM ZENG Wen-quan;HE Yong-jun;CUI Xiao-kun;College of Computer Engineering Technical,Guangdong Institute of Science & Technology;
Review on superpixel segmentation algorithms WANG Chun-yao;CHEN Jun-zhou;LI Wei;College of Information Science & Technology,Southwest Jiaotong University;
Review on full reference image quality assessment algorithms CHU Jiang;CHEN Qiang;YANG Xi-chen;School of Computer Science & Engineering,Nanjing University of Science & Technology;
Survey of proxy re-signature technology CHEN Liang;CHEN Xing-yuan;SUN Yi;DU Xue-hui;Henan Provincial Key Laboratory of Information Security,PLA Information Engineering University;
Construction of clustering validity evaluation function based on noise suppression ZHAI Li-li;ZHANG Xue;PENG Ding-hong;LI Yan-lai;High-tech Industrial Development Research Center,Harbin University of Science & Technology;
Chinese word sense disambiguation based on parsing analysis ZHANG Chun-xiang;LUAN Bo;GAO Xue-yao;LU Zhi-mao;School of Computer Science & Technology,Harbin University of Science & Technology;School of Software,Harbin University of Science & Technology;College of Information & Communication Engineering,Harbin Engineering University;
Detection algorithm research for hot topics in micro-blog based on time characteristics YAN Guang-hui;ZHAO Hong-yun;REN Ya-jin;CHEN Yong;College of Electronic & Information Engineering,Lanzhou Jiaotong University;
Consumer's perceptual needs clustering based on DSM and GA YANG Yan-pu;YU Sui-huai;CHEN Deng-kai;LI Bo;QI Bin;Institute of Industrial Design,Northwestern Polytechnical University;
Automatic repairing short-path violations FPGA routing algorithm LIU Yang;YANG Hai-gang;YU Wei;CAI Gang;XU Wei-tao;Programmable Chip & System Research Laboratory,Institute of Electronics,Chinese Academy of Sciences;University of Chinese Academy of Sciences;
Old man fall detection algorithm research based on discriminant analysis of statistical JIN Chun;YIN Yuan-yang;Wireless Transmission Key Laboratory,School of Communication & Information Engineering,Chongqing University of Posts & Telecommuni-cations;Chongqing Jinou Science & Technology Development Co. ,Ltd.;
Neighborhood linear rival alignment dimensionality reduction algorithm YAN De-qin;LV Zhi-chao;LIU Sheng-lan;College of Computer & Information Technology,Liaoning Normal University;College of Computer, Faculty of Electronic Information & Electrical Engineering,Dalian University of Technology;
Methodology for session identification based on combination of referenced heuristic and URL-semantic ZHANG Shuai;CHEN Xing-shu;TONG Hao;CUI Xiao-jing;College of Computer,Sichuan University;
Decision-making method of computer generated forces based on fuzzy Petri-net CHEN Jian;LIAO Shou-yi;YANG Yan-li;ZHANG Jin-sheng;Dept. of Control Engineering,The Second Artillery Engineering University;
Spatial resource index and top-k query research YU Shi-long;HUANG Hong-bin;DENG Su;Science & Technology on Information System Engineering Laboratory,National University of Defense Technology;
Automated detection and optimization research on code defects and code smells LIU Wei;LIU Hong-tao;HU Zhi-gang;School of Information Science & Engineering,Central South University;School of Software,Central South University;
Method for repairing program automatically with mutation MA Chun-yan;LIU Jie;LAI Wen-yu;School of Software & Microelectronics,Northwestern Polytechnical University;School of Information,Renmin University of China;
Speculative task scheduling algorithm based on locality of data in Hadoop LIU Kui;LIU Xiang-dong;MA Bao-lai;WANG Cui-rong;College of Computer & Communication,Northeastern University at Qinhuangdao;College of Information & Engineering,Northeastern University;
Test data generation based on binary tree search space reduction SHAO Nan;ZHOU Yan-zhou;HUI Wen-tao;QIAO Hui;Information Engineering University;
Technology research of attack path identification based on immune intrusion detection ZHANG Feng-bin;SUN Gang;ZHANG Bin;College of Computer Science & Technology,Harbin University of Science & Technology;
Access control security model of virtual machines LIANG Biao;QIN Zhong-yuan;SHEN Ri-sheng;CHEN Qi;LV You;QIANG Yong;GUO Ai-wen;Nanjing Sample Technology Co. ,LTD;School of Information Science & Engineering,Southeast University;Key Laboratory of Information Network Security,Ministry of Public Security;Wu Jianxiong Dept. ,Southeast University;
Design of DTN routing algorithm based average delivery probability LV Jie-lin;ZHANG Shan-shan;Dept. of Continual Education,Zhejiang Business College;School of Software,Beijing Institute of Technology;
Research on reliable coverage algorithm based on grid trust value for wireless sensor networks DONG Shu-hao;LI Xiao-long;School of Computer Science & Engineering,Guilin University of Electronic Technology;School of Electronic & Computer Engineering,University of Manitoba;
Nexthop-selectable aggregation based on suffix digest for forwarding information base DU Chuan-zhen;TIAN Ming;LAN Ju-long;National Digital Switching System Engineering & Technological R&D Center;
Summarize of detection methods on hardware-based virtualization machine rootkit SHI Jiang-yong;WANG Hui-mei;XIAN Ming;RONG Hong;JIN Cong-jun;State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics & Information System,National University of Defense Technology;Science & Technology on Space System Simulation Laoratory,Beijing Simulation Center;
Centrality based microblog influence entity discovery ZHU Jing-yi;Dept. of Computer & Information Technology,Zhejiang Changzheng Vocational & Technical College;
Load balancing composition model for military information service SHEN Di;LI Jian-hua;ZHANG Qiang;ZHU Rui;School of Information & Navigation,Air Force Engineering University;PLA 93801 Troop;
Comparison between Follow and Retweet on Twitter ZENG Xue;WU Yue;School of Computer Science & Engineering,University of Electronic Science & Technology of China;
Application of weighted conditional entropy in anomaly detection FAN Xiao-shi;LI Cheng-hai;School of Air & Missile Defense,Air Force Engineering University;
Kinect-based depth image fusion method GUO Wei;HU Tao;ZHU Xin-yan;State Key Laboratory for Information Engineering in Surveying,Mapping & Remote Sensing,Wuhan University;
Balance-sampling based light-weighted advertisement CTR prediction method SHI Meng-yuan;GU Jin-ji;National Laboratory for Novel Software Technology,Nanjing University;Dept. of Union Development,Baidu Inc;
Modeling of ant colony foraging behavior based on agent and application of model in robotic path planning BAI Ji-yun;LI Shi-yong;Dept. of Control Science & Engineering,Harbin Institute of Technology;College of Science,Northeast Agricultu-ral University;
Further analysis on global asymptotical stability of genetic regulatory networks with time delays WU Hai-xia;FENG Wei;RAN Wei;College of Automation, Chongqing University;Dept. of Mathematics & Information Engineering, Chongqing University of Education;
Instance selection based on probabilistic neural network and K-L divergence ZHAI Jun-hai;LI Chang;LI Ta;WANG Xi-zhao;Hebei Province Key Laboratory of Machine Learning & Computational Intelligence,College of Mathematics & Computer Science,Hebei University;
Optimized genetic algorithm for shortest-path problem in game engine LI Zhong-wen;QIN Zhi-dong;WANG Quan-yu;NI Zhong-yu;School of Information Science & Technology,Chengdu University;School of Computer Science & Technology, Donghua University;School of Mathematics & Computer Engineering,Xihua University;
Consumer satisfaction genetic algorithm in cloud computing ZOU Wei-ming;YU Jiong;College of Information Science & Technology,Xinjiang University;
Robust optimization method based on slope YANG Zhao;DAI Guang-ming;PENG Lei;WANG Mao-cai;School of Computer Science,China University of Geosciences (Wuhan);
New evidence fusion method based on average deviation CAO Jie;GUO Lei-lei;LI Wei;WU Di;College of Computer & Communication,Lanzhou University of Technology;College of Electrical & Information Engineering,Lanzhou University of Technology;
Research of training feedforward neural networks based on hybrid chaos particle swarm optimization-back-propagation ZHU Qun-xiong;DONG Chun-yan;LIN Xiao-yong;College of Information Science & Technology,Beijing University of Chemical Technology;
Parameter estimation of nonlinear systems model based on improved differential evolution XIONG Wei-li;CHEN Min-fang;ZHANG Qian;XU Bao-guo;Key Laboratory of Advanced Process Control for Light Industry of Ministry of Education,Jiang-nan University;School of Internet of Things Engineering,Jiangnan University;
Fault diagnosis for uneven-length batch processes based on statistic features GUO Jin-yu;ZHAO Lu-lu;LI Yuan;College of Information Engineering,Shenyang University of Chemical Technology;
Design and implementation of multi-satellites ground systems based on OGC service standards YANG Zhong;LI Guo-qing;XIE Ji-bo;YU Wen-yang;DENG Hong-shuai;LEI Xing-song;Key Laboratory of Digital Earth,Institute of Remote Sensing & Digital Earth,Chinese Academy of Sciences;University of Chinese Academy of Sciences;
Research on optimal decision game models of closed-loop supply chain considering influence of advertising investment CHU Ye-ping;ZHANG Shu-hong;Research Center of Hubei Logistics Development,Hubei Province Key Research Institute of Humanities & Social Science,Hubei University of Eco-nomics;
2014 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12]
More Issues:   [1997]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2015]   [2016]   [2017]   [2019]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved