Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2016 Issue 11
Blind estimation algorithm of hop duration for frequency-hopping signals
TANG Ning;GUO Ying;ZHANG Kun-feng;ZHANG Dong-wei;YU Jian-jun;School of Information and Navigation;Air Force Engineering University;
..............page:2861-2864+2966
Improved weighted centroid localization algorithm based on RSSI
WANG Ya-min;WANG Hai-ying;HE Pei-lun;College of Sciences;Xi’an University of Science and Technology;
..............page:2865-2868
Topology control method for heterogeneous wireless sensor network based on small world concepts
XIONG Shu-ming;HU Yong-di;School of Computer Science and Communication Engineering;Jiangsu University;
..............page:2869-2875
Dynamic spectrum access of cognitive wireless networks based on mobile primary users
LIU Jue-fu;HU Jing;WANG Jian-xu;CHEN Jing-lin;School of Information Engineering;East China Jiaotong University;
..............page:2876-2880+2886
Energy-balance-based connected dominating set distributed algorithm in wireless sensor networks
A Lun;ZHANG Li-juan;SU Yi-la;College of Information Engineering;Inner Mongolia University of Technology;
..............page:2881-2886
GRPNN:Rough set PNN Gauss block based embedded expectation sorting algorithm for multi-label web recommendation
CHEN Ying;HUANG Yong-biao;PAN Hong-mei;School of College-Prep Foundation Programme for Nationalities;Guangxi University for Nationalities;
..............page:2887-2892+2991
Improved PTS algorithm for PAPR reduction in ACO-OFDM system
LI Chao;JING Yong-jian;Inner Mongolia Xinyuan Information Technology Limited Company;Center of Information and Network Technology;Inner Mongolia Agricultural University;
..............page:2893-2897
Hybrid routing protocol based on depth adjustment in underwater wireless sensor networks
ZHANG Hong-jun;ZHANG Ya-li;School of Aviation Engineering;Anyang University;
..............page:2898-2903+2938
Generation algorithm of cluster region based on chaos particle optimization matching mechanism in wireless sensor network
WANG San-hu;QIANG Yan;Department of Computer Science and Technology;Luliang University;College of Computer Science and Technology;Taiyuan University of Technology;
..............page:2904-2908+2978
Multi-source attack pattern graph intrusion detection algorithm
ZHANG Li-zhe;GU Zhao-jun;HE Bo;LIU Shu-fa;Information Technology Security Evaluation Center;Civil Aviation University of China;College of Computer Science and Technology;Civil Aviation University of China;Network Security Department;Tianjin Municipal Public Security Bureau;
..............page:2909-2916
Image steganalysis based on double feature selection of dimensionality reduction
ZHOU Jie;ZHANG Min-qing;Key Laboratory of Network and Information Security of CAPF;Engineering University of CAPF;
..............page:2917-2922+2948
Design and implementation of reconfigurable cipher stream processor simulator
WANG Shou-cheng;YAN Ying-jian;XU Jin-hui;LI Gong-li;ZHU Yu-fei;Cryptogram Engineering College;Information Engineering University;
..............page:2923-2927
Intrusion detection algorithm based on PCA-OCSVM for industrial control systems
LI Lin;SHANG Wen-li;YAO Jun;WAN Ming;ZENG Peng;College of Automation and Electrical Engineering;Shenyang Ligong University;Shenyang Institute of Automation;Chinese Academy of Sciences;Key Laboratory of Networked Control Systems;Chinese Academy of Sciences;
..............page:2928-2933
Three-party oblivious polynomial evaluation protocol
YANG Bo-wei;SUN Da-zhi;LI Xiao-hong;Shanghai Key Laboratory of Trustworthy Computing;East China Normal University;School of Computer Science and Technology;Tianjin University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:2934-2938
Improved technology of detecting and killing hiding progress
LI Xiang-ning;LING Jie;Faculty of Computer;Guangdong University of Technology;
..............page:2939-2943
Covert channels of FTP protocol based on encoding directory
YAO Cheng;TANG Zhang-guo;LI Huan-zhou;ZHANG Jian;Institute of Computer Network and Communication Technology;Sichuan Normal University;
..............page:2944-2948
Optimization method for OAuth2.0 protocol
WEI Cheng-kun;LIU Xiang-dong;SHI Zhao-jun;Institute 706;Second Academy of China Aerospace Science and Industry Corporation;
..............page:2949-2955
Application of improved Re-FCBF algorithm in intrusion detection
Sarwar Alim;Nurbol;Wushouer Silamu;College of Information Science and Engineering;Xinjiang University;
..............page:2956-2960
Gene expression data clustering algorithm using hierarchical affinity propagation
WU Yu;ZHONG Cheng;YIN Meng-xiao;School of Computer;Electronics and Information;Guangxi University;
..............page:2961-2966
Fast attribute reduction algorithm of rough set based on attribute value collection chain
WU You-xin;LI Wen-jing;ZHONG Zi-yue;School of Information Engineering;Nanchang University;Department of Computer Science;University of Montana;
..............page:2967-2970+3021
Image denoising method based on structure information of nonlinear diffusion filtering
ZHANG Jian-wei;WANG Yi-he;CHEN Yun-jie;College of Mathematics and Statistics;Nanjing University of Information Science and Technology;
..............page:2971-2978
Optimization of fast clustering algorithm based on density peaks
DAI Jiao;ZHANG Ming-xin;ZHENG Jin-long;JIANG Li-qing;SHANG Zhao-wei;School of Computer Science and Technology;China University of Mining and Technology;School of Computer Science and Engineering;Changshu Institute of Technology;College of Computer Science;Chongqing University;
..............page:2979-2984
Test case generation method based on extendedπ-calculus
LUO Ling;Institution of Southwest Electronic Technology;
..............page:2985-2991
Temperature interpolation algorithm based on improved K-means clustering algorithm
DU Jing-lin;SHEN Xiao-yan;School of Electronic and Information Engineering;Nanjing University of Information Science and Technology;
..............page:2992-2998
Scenario-driven testing framework for industrial Ethernet switch
LI Yin;ZHAO Hai-tao;Jiangsu Automation Research Institute;China Shipbuilding Industry Corporation;Navy Representative Office of Spaceflight Electromechanical System in Nanjing District;
..............page:2999-3006
Adaptive control for Smith predictor with uncertain parameters
DING Xiao-di;CUI Bao-tong;School of Internet of Things Engineering;Jiangnan University;
..............page:3007-3011
Matrix method of detecting negative cycle in negative weighted shortest path
GAO Zun-hai;YANG Bo;CHENG Guo;School of Mathematics and Computer Science;Wuhan Polytechnic University;
..............page:3012-3015
TFIDF algorithm based on dual parallel calculation model
SUN Yu-qiang;CHAO Bi-xia;School of Information Science and Engineering;Changzhou University;
..............page:3016-3021
Extraction algorithm of ROI for detecting colored box
CHEN Gong-ming;LI Feng;School of Electronics and Information;Jiangsu University of Science and Technology;
..............page:3022-3026
Multi-period decision-making model for multi-type equipment procurement and its solution algorithm
LI Qin-yu;WANG Xiu-li;Information Engineering College;Lanzhou City University;
..............page:3027-3034
Pedestrian detection based on ROI extraction
JIN Pei-fei;ZHOU Li;LIU Jian;GE Zhi-wei;CHEN Jie;Institute of Microelectronics;Chinese Academy of Sciences;
..............page:3035-3039
Improved depth image hole filling algorithm
GAO Ya-ping;CHEN Yi-min;ZOU Yi-bo;HUANG Chen;GAO Ming-ke;LI Qi-ming;School of Computer Engineering and Science;Shanghai University;
..............page:3040-3044
Application of fast search density peak clustering in image retrieval
WANG Hua-qiu;NIE Zhen;College of Computer Science and Engineering;Chongqing University of Technology;Library of Chongqing University of Technology;
..............page:3045-3050+3057
Parallel processing for accelerated edge collapse simplification algorithm with GPU
FAN Hao;LIU Jun;SUN Yu;LU Xiang-yan;LIU Yan;School of Computer and Electronic Information;Guangxi University;Guangxi Experiment Center of Information Science;Guangxi Key Laboratory of Multimedia Communications and Network Technology;Guangxi University;National Meteorological Center;
..............page:3051-3057
Level set segmentation based on clustering and local statistics for medical image
JIANG Ying;QIN Xiao;YUAN Chang-an;LIU Zhi-jin;School of Computer and Information Engineering;Guangxi Teachers Education University;
..............page:3058-3062+3079
Chip image edge detection based on improved Canny algorithm
LIU Qing-min;ZHANG Lei;LI Xue;College of Mechanical Engineering;Hangzhou Dianzi University;
..............page:3063-3067+3117
Android platform based Kazakh Slavonic recognition system
Alim·Samat;Halmurat·Mamat;Turgun·Ebrayim;Laboratory of Multi-Language Information Technology;Xinjiang University;
..............page:3068-3074+3135
Fault diagnosis based on combination of BAPSO and LSSVM
ZHONG Ying-rong;CHEN Chang-xing;REN Xiao-yue;WANG Xu-jing;School of Science;Air Force Engineering University;
..............page:3075-3079
Application of sparse subspace based particle filtering in target tracking
HE Ruo-bin;WU De-an;WU Lei;YUE Han;College of Mathematical Science;University of Electronic Science and Technology of China;
..............page:3080-3085
Extracting experiments corpus sentence in scientific literature
ZHU Li-ping;LIU Qiang;SU Fei;YANG Zhong-guo;WANG Xian-can;Beijing Key Lab of Petroleum Data Mining;China University of Petroleum;College of Geophysics and Information Engineering;China University of Petroleum;China Petroleum Information Service Technology Center;
..............page:3086-3091
Real-time human activity pattern recognition based on acceleration
WANG Yu-kun;GAO Wei-xin;WANG Zheng;WU Xiao-meng;College of Electronic Engineering;Xi’an Shiyou University;
..............page:3092-3096
Multi-license plates location based on merging of Hu moments and region moments
LIANG Da-kuan;HAN Xiao-ming;College of Information Engineering;Taiyuan University of Technology;
..............page:3097-3101
Description method of human behavior recognition
YU Hao;SUN Yan;School of Computer Science and Technology;Nanjing Normal University;Information Security Technology Engineering Research Center of Jiangsu Province;
..............page:3102-3106
Grid cipher resources scheduling strategy based on genetic algorithm
YE Wei-wei;OU Qing-yu;Department of Information Security;Naval University of Engineering;
..............page:3107-3111
Hybrid bat algorithm and its application
HE Zi-kuang;WU Wei-min;LIN Zhi-yi;School of Computer Science and Technology;Guangdong University of Technology;
..............page:3112-3117
Tracking algorithm based on MultiClass SVM and Hausdorff distance
MIAO Chao-wei;QIN Pin-le;College of Computer and Control Engineering;North University of China;
..............page:3118-3123
Real-time video image dehazing system based on FPGA
TANG Ning;ZHAO Peng;WU Shao-qi;College of Information and Communication;Guilin University of Electronic Technology;
..............page:3124-3129+3141
Design of intelligent water logging system based on ZigBee technology
ZHANG Bei-bei;ZHOU Zu-rong;College of Information Science and Technology;Qingdao University of Science and Technology;
..............page:3130-3135
Fast implementation of two dimensional Qian method and its application in digital watermarking
WU Ming-zhu;WANG Yang;LI Xing-min;Computer Department;Guangzhou College of Commerce;School of Computer;South China Normal University;
..............page:3136-3141