[1] |
WANG Ning, SONG Huihui, ZHANG Kaihua.
Accurate object tracking algorithm based on distance weighting overlap prediction and ellipse fitting optimization
[J]. Journal of Computer Applications, 2021, 41(4): 1100-1105.
|
[2] |
ZHAO Guoxin, DING Ruofan, YOU Jianzhou, LYU Shichao, PENG Feng, LI Fei, SUN Limin.
Design and implementation of high-interaction programmable logic controller honeypot system based on industrial control business simulation
[J]. Journal of Computer Applications, 2020, 40(9): 2650-2656.
|
[3] |
KONG Yazhou, ZHANG Liancheng, WANG Zhenxing.
Address hopping proactive defense model in IPv6 based on sliding time window
[J]. Journal of Computer Applications, 2018, 38(7): 1936-1940.
|
[4] |
LI Fumin, TONG Lingling, DU Cuilan, LI Yangxi, ZHANG Yangsen.
Weibo users credibility evaluation based on user relationships
[J]. Journal of Computer Applications, 2017, 37(3): 654-659.
|
[5] |
CAO Junli, LI Jufeng.
Improved ellipse fitting algorithm based on Letts criterion
[J]. Journal of Computer Applications, 2017, 37(1): 273-277.
|
[6] |
WANG Lin, BI Duyan, LI Xiaohui, HE Linyuan.
Fast image dehazing based on negative correction and contrast stretching transform
[J]. Journal of Computer Applications, 2016, 36(4): 1106-1110.
|
[7] |
CAO Xu, FEI Jinlong, ZHU Yuefei.
Anti-fingerprinting model of operation system based on network deception
[J]. Journal of Computer Applications, 2016, 36(3): 661-664.
|
[8] |
HUAN Hai, HUANG Lingxiao, ZHANG Yu, LU Song.
Detection of elliptical hole group based on maximum inscribed circle
[J]. Journal of Computer Applications, 2015, 35(4): 1101-1105.
|
[9] |
HUANG Zucheng YUAN Feng LI Yin.
Implementation of IPv6 over low power wireless personal area network based on wireless sensor network in smart lighting
[J]. Journal of Computer Applications, 2014, 34(10): 3029-3033.
|
[10] |
ZHOU Zhiping ZHUANG Xuebo.
Node identity authentication scheme for clustered WSNs based on P-ECC and congruence equation
[J]. Journal of Computer Applications, 2014, 34(1): 104-107.
|
[11] |
BAI Qing SU Yang.
Design of distributed honeypot system based on clustering and data shunting algorithm
[J]. Journal of Computer Applications, 2013, 33(04): 1077-1080.
|
[12] |
WANG Zheng-yi ZHAO Jun-ge.
Resisting power analysis attack scheme based on signed double-based number system
[J]. Journal of Computer Applications, 2011, 31(11): 2973-2974.
|
[13] |
ZHOU Yu-ting LIU Guang-yuan LAI Xiang-wei.
Applications of simulated annealing-immune particle swarm optimization in emotion recognition of galvanic skin response signal
[J]. Journal of Computer Applications, 2011, 31(10): 2814-2817.
|
[14] |
FAN Yi FU Ji-wu.
Ellipse detection algorithm based on center extraction
[J]. Journal of Computer Applications, 2011, 31(10): 2705-2707.
|
[15] |
Qi-nan LIAO.
TD-ERCS chaotic sequences' improvement and color image encryption algorithm
[J]. Journal of Computer Applications, 2011, 31(08): 2178-2182.
|