Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Application Research of Computers
FQ: 月刊
AD of Publication: 四川省成都市
Lanuage: 中文;
ISSN: 1001-3695
CN: 51-1196/TP
YP: 1984
Url: 四川省计算机研究院
Recommended Journals
Application Research of Computers
2016 -01
Catalog
Link prediction using continuous-time quantum walk Qian Jing;Yang Lintao;Yu Zetai;Liu Shouyin;College of Physical Science & Technology
Solution based on independent-tasks POMDP problems Fang Junheng;Zhu Fei;Liu Quan;Fu Yuchen;Ling Xinghong;School of Computer Science & Technology
Complex and dynamics behavior analysis of nonlinear and time-delay supply chain system Li Zhuoqun;Yan Guangle;Business School
Modeling of heterogeneous clutter in littoral environment based on DEM Wu Qi;Zhang Wei;Key Laboratory of Integrated Electronic System for Ministry of Education
Large scale parallel method for SWAT calibration based on Kriging interpolation Li Qiang;Lu Zhonghua;Wang Yangang;Chen Xi;Luo Yi;Computer Network Information Center
Traffic signal control model and optimization based on timed colored Petri nets An Yisheng;Lei Tian;Yuan Shaoxin;Zhao Xiangmo;School of Information Engineering
Immune genetic optimization algorithm based on T cell-mediated for sequence optimization of PWM inverter Wang Yongxing;Qian Shuqu;Ye Yongqiang;College of Automatic Engineering
Research of dynamic X parameter model based on memory effects of power amplifier Tian Xiuhua;Wang Zhenxia;Nan Jingchang;School of Electrics & Information Engineering
3D NoC Zone Defense fault-tolerant routing algorithm without virtual channels Wang Yufei;Li Guangshun;Wu Junhua;School of Information Science & Engineering
Highly stable scheme of application layer multicast in heterogeneous networks Wang Junyi;Wei Yanheng;Fu Jielin;Zheng Lin;Guangxi Information Science Experiment Center
Cooperative spectrum sensing algorithm based on improved weighted sequential probability ratio test Li Yufeng;Huang Liuzhou;School of Electronics & Engineering
Research on power control algorithm based on user requirements in cognitive networks Deng Xiaofang;Xia Weiwei;Zhao Feng;School of Information & Communication
Fast DOA estimation under coexistence of both noncircular and circular sources Zeng Yaoping;Yang Yixin;Lu Guangyue;Huang Qiongdan;School of Marine Science & Technology
Data aggregation in wireless sensor networks based on deep learning Qiu Lida;Liu Tianjian;Fu Ping;Dept.of Physics & Electronic Information Engineering
Network algorithm of isolated nodes based on ZigBee technology Zhi Yu;Pan Lihu;Yang Xiaomei;Bu Chuangli;School of Computer Science & Technology
Heterogeneous multimedia adaptive cooperative diversity algorithm based on the best relay selection Zhang Hui;Business College of Shanxi University;
Conflict-aware broadcast scheduling algorithm in wireless networks An Fengyang;Li Guangshun;Wu Junhua;College of Information Science & Engineering
Two quantum secret sharing scheme based on four-qubit entangled states Zhang Jianzhong;Zhang Wenhao;College of Mathematics & Information Science
Server-aided verification scheme against collusion attack Niu Shufen;Niu Ling;Wang Caifen;Lan Caihui;College of Mathematics & Information Science
Authenticated key agreement protocol based on extended chaotic maps for multi-server environments Shu Jian;Dept.of Electronic Commercial
Practical template attacks based on pooled covariance matrix Liu Biao;Sun Ying;Beijing Electronic Science and Technology Institution;
Software-implemented mask scheme against differential power analysis attack Xu Pei;Fu Li;College of Software Engineering
Improved certificateless aggregate signature with constant length Chen Ming;School of Mathematics & Computer Science
Optimal performance strategy of cloud center under power constraint with heterogeneous servers He Huaiwen;Li Wensheng;School of Computer
Cache hierarchy-based scheduling algorithm for dynamic requests in multi-core Web servers You Guohua;Tan Yang;Zhao Ying;Center for Information Technology
Dynamic task migration of molecule docking in cloud environment Dong Yueli;Guo Quan;Sun Bin;Li Zhengfu;Dalian Neusoft University of Information;
Survey on cloud forensics Gao Yun;Fu Xiao;Luo Bin;Software Institute
Survey of spontaneous facial expression recognition He Jun;He Zhongwen;Cai Jianfeng;Fang Lingzhi;Information & Engineering College
Research on concept semantic similarity of manufacturing resource ontology Ding Bo;Miao Shidi;College of Computer Science & Technology
Learning automata-based improvement for recommendation algorithm Jing Yuchun;Ge Hao;Jiang Wen;Wang Yifan;School of Electronic Information & Electrical Engineering
Parallel hybrid PVS algorithm based on OpenMP Zou Jing;Ma Hua;Xie Kun;School of Information Science & Engineering
Practical approach of word segmentation in poor resource situation Ma Ning;Li Yachao;He Xiangzhen;Yu Hongzhi;Gansu Province Key Laboratory of National Language Intelligent Processing
Hierarchical scoring function based multi-granularity searching method Jiang Pan;Li Yuexin;School of Computer Science & Technology
Document replication locality based distributed query method Sun Wei;Lyu Qiang;Institute of Software & Service Outsourcing
Average multinomial naive Bayesian text classification based on MapReduce He Min;Wu Dean;Wu Lei;School of Mathematical Sciences
Mixed K-harmonic means clustering algorithm with improved gravitational search Wang Caixia;School of Science
Recovering traceability links using named entity recognition Wang Jinshui;Xue Xingsi;Tang Zhengyi;College of Information Science & Engineering
Research on repairing technique of test scripts for GUI regression testing Zhu Jing;Zeng Hongwei;School of Computer Engineering & Science
Evaluation method of developers in Github based on fuzzy analytic hierarchy process Li Jiahao;Liu Jing;Wu Zequn;He Lulu;State Key Laboratory of Software Engineering
Dynamic construction method of 3D user interface based on information navigation Deng Haiyan;Zhao Gang;Yu Yong;Chen Changyu;Wang Wei;School of Mechanical Engineering & Automation
Collaboration data reconstruction algorithm based on Kalman filtering for multi-sensor Song Xiaohong;Tang Jin;School of Software
Universally composable secure ownership transfer protocol for RFID tags in supply chains Zhou Zhou;Peng Changgen;Yang Yulong;Zhang Xiaopei;College of Computer Science & Technology
Layered quantitative steganalysis using rich model Zhang Cong;Zhang Minqing;Liu Jia;Key Laboratory of Network & Information Security
Median filtering detection based on local binary patterns Su Yuting;Zhang Tianjiao;Zhang Jing;Zhang Chengqian;School of Electronic Information Engineering
Privacy-preserving method for KNN query in road networks Zhou Changli;Ma Chunguang;Li Zengpeng;School of Computer Science & Technology
Fast pedestrian detection method based on combinatory features IHOG-LBP and visual selective attention computation Liu Qiong;Chen Wenbai;School of Automation
Compressed sensing 3D imaging method with dimension reduction for random array Xiang Gao;Zhang Xiaoling;Shi Jun;Wu Zongliang;Wei Shunjun;School of Electronic Engineering
Texture classification method based on theory of compressed sensing Wu Di;College of Electrical & Information Engineering
Image resizing algorithm based on visual saliency detection in DCT domain Luo Yadan;Tang Zhenhua;Qin Tuanfa;School of Computer & Electronic Information
Non-negative tensor factorization algorithm based on low rank representation Liu Ya'nan;Liu Lulu;Luo Bin;School of Computer
Image edge extraction combined with Powell-RWACO algorithms Hui Xiaowei;Chang Zhengying;Lin Sen;Cao Yihua;School of Electronic & Information Engineering
Image segmentation algorithm based on optimal region boundary map Zhao Jie;Zhang Chunmei;Zhang Xiaoyong;Yao Fenglin;Dept. of Computer Engineering
Image enhancement algorithm based on fuzzy sets and nonlinear gain Quan Yongqi;Li Taijun;Deng Jiaxian;Xie Kaiming;College of Information Science & Technology
Structural segmentation of human models based on semantic and geometric characteristics Li Lin;Han Li;Xu Jianguo;Tang Di;School of Computer & Information Technology
Overview of one-class support vector machine in intrusion detection of industrial control system Li Lin;Shang Wenli;Yao Jun;Zhao Jianming;Zeng Peng;School of Automation & Electrical Engineering
Improved Chord-based method based on genetic algorithm Wang Ting;Wu Xiaojun;Zhang Yumei;School of Computer Science
Comparative study of two common cloud computing service pricing mechanism Wu Lianggang;Zhou Saijun;Business School
Credible cooperative node selection model in hybrid streaming system Bao Xu;Li Zeping;Wan Minggang;Yang Xuan;Yang Yi;College of Computer Science & Technology
HTTP tunnel Trojan detection method based on multi-layer conjoint analysis Lan Jinghong;Liu Shengli;Li Ye;Xiao Da;Wang Dongxia;State Key Laboratory of Mathematical Engineering & Advanced Computing;
Dynamic attack network evolution and analysis model Li Yan;Huang Guangqiu;School of Management
Research on trust mechanism based on cloud model and gray system theory for P2P network Yang Benchen;Wang Cuiqin;Faculty of Electrical & Control Engineering
Analysis on runtime essences of dendritic cells algorithm Wang Li;Fang Xianjin;Liu Jia;School of Computer
General sparse multiple kernel learning Zhang Renfeng;Wu Xiaojun;Chen Sugen;School of Internet of Things Engineering
Research on robot commonsense reasoning based on improved active logic and metacognitive loop Wang Kejun;Du Tongchun;College of Automation
SVM decision-tree multi-classification strategy based on genetic algorithm with cumulative fitness Zhu Qingsheng;Cheng Ke;School of Computer Science
Research of logistics scheduling problem based on order regions Wang Zhen;Huang Lei;School of Economics & Management
Cloud model cuckoo search algorithm Li Zhiping;Wang Yong;Zhang Chengzhi;College of Information Science & Engineering
Hybrid optimization algorithm based on graph coloring problem Li Shuzhi;He Shufang;School of Information Engineering
Resource scheduling algorithm for MapReduce based on machine learning Yu Qian;Wei Chengjian;Wang Kai;Zhu Linjun;College of Electronics & Information Engineering
Improved novel metaheuristic flower pollination algorithm Xiao Huihui;Wan Changxuan;Duan Yanming;School of Information & Technology
Bayesian estimation of WFEN and its application in high dimensional prediction model Yuan Ming;Dept.of Statistics
Fast algorithm for estimation of TDOA and FDOA based on genetic algorithm Lu Zhiyu;Wang Jianhui;Wang Daming;Wang Yue;PLA Information Engineering University;
Local-world evolution model of complex supply chain network under edge benefit Cao Wenbin;Xiong Xi;School of Business
2016 Issues:  [01] [02] [03] [04] [05] [07] [09] [08] [10] [11] [12] [06]
More Issues:   [1997]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2017]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved