Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Application Research of Computers
FQ: 月刊
AD of Publication: 四川省成都市
Lanuage: 中文;
ISSN: 1001-3695
CN: 51-1196/TP
YP: 1984
Url: 四川省计算机研究院
Recommended Journals
Application Research of Computers
2017 -01
Catalog
Routing strategy for complex networks based on traffic gravitational field Luo Kaitian;Liu Gang;Dept.of Computer Science
Optimization method of integrate deep learning into PLS Zhu Zhipeng;Du Jianqiang;Yu Riyue;Nie Bin;Yu Fang;School of Computer Science
Improved cat map and chaotic system based fast color image encryption algorithm Sun Qian;Hu Su;Dept.of Informationization Management
Packet forwarding protocol in coal mine opportunistic networks based on terminal attribute Zou Yanfang;Yu Hongyi;Li Qing;Liu Jianhui;National Digital Switching System Engineering & Technology R&D Center;
Multi-agent based artificial immune network algorithm for data classification Hong Ming;Liu Peizhong;Luo Yanming;College of Engineering
Short-term traffic flow prediction based on deep learning Luo Xianglong;Jiao Qinqin;Niu Liyao;Sun Zhuangwen;School of Information Engineering
Prediction method of global transportation network flow with cellular automata Zhang Fengqin;Wang Mengfei;Guan Hua;Li Xiaoqing;Chen Dawu;Chen Guirong;College of Information & Navigation
PID control strategy of tractor driving anti slip control based on improved PSO algorithm Cheng Zhun;Lu Zhixiong;Tang Di;Jiang Chunxia;Zhou Jing;College of Engineering
Path tracking method of unmanned surface vehicle with two fixed propellers under wave disturbance Zheng Tiqiang;Wang Jianhua;Zhao Mengkai;Wu Gongxing;Key Laboratory of Marine Technology & Control Engineering
Multi-label CRF based method for disease extraction Wang Pengyuan;Ji Donghong;School of Computer
Method for pulmonary nodules segmentation based on low dose CT images Hei Xiaoji;Jiang Huiqin;Ma Ling;Yang Xiaopeng;Liu Yumin;College of Information Engineering
Prediction of PLK1 PBD activity based on deep learning Gao Shuangyin;Tian Shengwei;Yu Long;Shi Xinyu;School of Software
Research on NoC mapping based on quantum ant colony algorithm Fan Shaocong;Liu Yijun;School of Computer
Guided image filter and application based on adaptive fractional-order differential Xie Wei;You Min;Zhou Yuqin;School of Computer
Research on fault localization algorithm for SoC based on bipartite graph maximum weight matching Zhang Peng;Zhu Li;Du Xiaozhi;School of Software Engineer
New kind of carrier frequency offset estimation algorithm for OFDM systems Yu Kanmin;Huang Yang;Yang Xiaopeng;Liu Mingzhen;School of Information & Navigation
Pseudo-code acquisition algorithm based on MF-FRFT Huang Mingjun;Wang Yongmin;Niu Jiahong;School of Information & Navigation
Research on network topology density control based on stochastic geometry Wang Zhen;Kang Lin;Shan Hong;You Jingwen;Dept.of Network
Study full-view of strong barrier coverage based on heterogeneous nodes Guo Kaidong;Feng Xiufang;College of Computer Science & Technology
Target coverage scheme for WSN based on LA algorithm and node power adaptive adjustment Jin Qiu;Pei Fei;Lin Fu;School of Computer Science
Research on wireless sensor networks clustering algorithm based on K-means Yu Xiuya;Liu Dongping;Yang Jun;Network Administration Center
Moving node localization algorithm based on cooperated prediction for wireless sensor networks Li Jianpo;Mu Baochun;School of Information Engineering
Target tracking using elliptic-Cartesian transformation and LKF in multi-static radar system Zhao Xi;Li Ying;Xu Jiang;Guangdong Institute of Science & Technology;Tongji University;
Channel assignment algorithm for wireless Mesh network based on Lagrange dual optimization and PSO Zheng Jinfang;Shao Quanyi;Zhi Jianhong;Institute of Information Engineering
Novel blind estimation method of number of OFDM subcarriers Zhang Haichuan;Lei Yingke;Electronic Engineering Institute;
Integral cryptanalytic on reduced-round of CAST-256 Zheng Xiangqian;Zhang Wenying;Xiao Zhen;Li Qingqing;School of Information Science & Engineering
Analysis of PRESENT block cipher based on MILP Wang Heng;Zhang Wenying;College of Information Science & Engineering
Cube test and analysis for reduced SIMON family of block ciphers Wan Liuchan;Wei Yongzhuang;Key Laboratory of Cognitive Radio & Information Processing for Ministry of Education
Scale transformation of dual tree complex wavelet network covert channel detection depth Lu Lu;Ling Jie;School of Computer Science & Tchnology
Based on tag's ID wireless key generation for RFID system algorithm Zhang Zhaohui;Liu Yue;Liu Daowei;Guangdong Province Education Examination;College of Information Engineering
Soft error vulnerability controlling based on matching of instruction flow mix and functional unit configuration Tang Liu;Huang Zhangqin;Zhang Huibing;College of Physics & Electronics Engineering
New regenerating codes reducing repair bandwidth by replication Ding Bingchen;Li Weizhong;Air & Missile Defense College
Topic mining based on U_BTM model in social networks Li Lei;Zhu Yuting;Shi Huaji;Zhou Conghua;School of Computer Science & Telecommunication Engineering
Research on important places identification method based on improved CFSFDP algorithm Ma Chunlai;Shan Hong;Ma Tao;Zhu Lixin;Electronic Engineering Institute;
Research on effect of entities semantic information on Chinese entity relation extraction Duan Liguo;Xu Qing;Li Aiping;Cui Minjun;College of Computer Science & Technology
Improved SNM algorithm based on length filtering and dynamic fault-tolerance Liu Yasi;Cheng Li;Li Xiao;Xinjiang Technical Institute of Physics & Chemistry
Identity-based broadcast encryption from ideal lattice Xiang Wen;Yang Xiaoyuan;Wu Liqiang;Key Laboratory of Network & Information Security under Chinese Armed Police Force
Dynamic type-based proxy re-encryption scheme based on lattice Li Zichen;Zhang Yulong;Yang Yatao;Beijing Institute of Graphic Communication;School of Telecommunications Engineering
Ideal lattice-based oblivious transfer protocol of provably secure Li Zichen;Zhang Yaze;Zhang Fengjuan;Yang Yatao;School of Communications Engineering
Research on authenticity detection model for digital image based on characteristics of life period Lu Ming;Niu Shaozhang;School of Computer Science
Foreground seeds generation algorithm based on hierarchical grouping used in parametric min-cut Zhu Junguang;Ji Lixin;Li Shaomei;Gao Chao;Chinese People's Liberation Army 78102 Troops;National Digital Switching System Engineering & Technological R & D Center;
Object tracking on weighted super pixel level spatio-temporal context Wang Shumin;Gong Ningsheng;Chen Yitao;College of Computer Science & Technology
Equivalence partitioning anti-aliasing algorithm for ray tracing Cao Xiaopeng;Han Jungang;Dept.of Computer
Method of image registration based on ZM phase feature description Zheng Kouquan;Yang Wenjing;Zhang Jizhou;Lei Yingjie;Wei Qiang;Xi'an Communication Institue;Information & Education Technology Center
Movie summarization method based on audio-visual feature fusion Luan Xidao;Xie Yuxiang;Li Chen;Niu Xiao;Dept.of Mathematics & Computer Science
Conformal extension of cubic uniform B-spline curve Yan Lanlan;Han Xuli;College of Science
Human action recognition method based on spatio-temporal image segmentation and interactive area detection Zhang Jie;Wu Jianzhang;Tang Jiali;Fan Honghui;School of Computer Engineering
Velocity estimation method and simulation of motion marine target based on computer vision Sun Shaojie;Yang Xiaodong;Dept.of Navigational Instrument
Infrared image enhancement based on human visual properties Chen Hongyu;Hui Bin;Chang Zheng;Luo Haibo;Shenyang Institute of Automation
Blind image forgery detection method based on noise variance estimation Li Hang;Zheng Jiangbin;School of Computer Science & Engineering
Lossy image compression using SVD and Contourlet transform Chen Yaxiong;Huang Zhangcan;Feng Lei;School of Science
Urban community classification algorithm based on cloud aggregation theory Gu Hongbo;Xu Minghai;Xi Jiejie;Wu Jing;Nanjing University of Posts & Telecommunications;
Survey of data provenance security Shi Libo;Sun Lianshan;Wang Yixing;Dept.of Computer Science
Research on classification of subjective-object semantic classes Li Tingyu;Wang Ya;Cao Cong;Zhang Zaiyue;Cao Cungen;School of Computer Science & Engineering
New framework based on SLP Zhang Suping;Wang Dong;Ding Lili;Wang Pengxiang;Gong Yi;Yu Haining;State Key Laboratory of Mathematical Engineering & Advanced Computing
Dynamic resource awareness framework for parallel fuzzing Lian Mei;Zou Yanyan;Huo Wei;Zou Wei;Beijing Key Laboratory of Network Security & Proctection Technology
Microblog recommendation algorithm based on user's tag Wang Ningning;Lu Ran;Wang Zhihao;Liu Chengyun;School of Information Science & Engineering
Study on influences of different Chinese word segmentation methods to text automatic classification based on LDA model Li Xiangdong;Gao Fan;Ding Cong;School of Information Management
Agglomerative hierarchical clustering based on ant colony optimization algorithm Lyu Lin;Wei Yongqing;Ren Min;Pan Xiao;School of Information Science & Engineering
Topic information extraction of history evolution based on PAM and topical TextRank Tian Changbo;Lin Min;Siriguleng;College of Computer & Information Engineering
Fuzzy session association rule mining algorithm based on time decay model Yang Yingjie;Qiu Wei;PLA Information Engineering University;Henan Province Key Laboratory of Information Security;
Research on component evolving model based on high-order π calculus He Haiyang;Li Qiang;Yu Xiang;Han Xiangyu;Electronic Engineering Institute;
Study on datagram source address validation solution in SAVI DHCPv6 Huang Shenglin;Lyu Fengchang;Wang Wei;University of Chinese Academy of Sciences;Computer Network Information Center
Game-based hybrid routing algorithm in software defined networking Ren Zerong;Chen Shuqiao;Fang Xinwei;Jiang Yiming;National Digital Switching System Engineering R&D Center;
Research on cache size allocation scheme based on node weight in information-centric networking Xu Changbiao;Lyu Shun;Measuring-Control & Information Transmission Research Institute
Moving target defense approach of HSS Zhao Xing;Tang Hongbo;Wang Wenbo;Zhao Yu;National Digital Switching System Engineering R&D Center;
Survey on traffic features in Internet traffic classification Liu Zhen;Wang Ruoyu;Cai Xianfa;Tang Deyu;School of Medical Information Engineering
Event-triggered consensus control of second-order multi-agent systems Huang Hongwei;Huang Tianmin;Wu Sheng;School of Electronic Engineering
Attribute reduction method based on enhanced positive region Shi Bowen;Li Guohe;Wu Weijiang;Hong Yunfeng;Zhou Xiaoming;College of Geophysics & Information Engineering
Decision-theoretic rough set based on incomplete interval-valued information system Zhang Xin;Li Xuwu;Lu Yanli;Chen Yujin;Air & Missile Defence College
Efficient parallel algorithm for linear RankSVM on multi-core systems Nie Hui;Peng Jiao;Jin Jing;Li Kangshun;Dept.of Computer Science
Risk averse closed-loop supply chain coordination mechanism with rebate and penalty contracts under emergency events Huo Liang'an;Jiang Jiehui;Zhao Yuping;Chen Binbin;Business School
2017 Issues:  [01] [03] [02] [04] [05] [06] [07] [08]
More Issues:   [1997]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2010]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2019]   [2018]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved