Search

Showing total 638 results

Search Constraints

Start Over You searched for: Topic computer algorithms Remove constraint Topic: computer algorithms Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Language chinese Remove constraint Language: chinese
638 results

Search Results

1. 基于计算机视觉的工业人员行为分析实验平台.

2. 端到端的嵌套命名实体识别方法研究.

3. 皮肤肿瘤图像自动分类的研究进展.

4. 基于机械臂混凝土加工系统的非线性建筑建造工程应用研究 —以上海智慧弯步行桥为例.

5. 基于引力搜索的布尔函数生成算法.

6. 一种基于张量分解的医学数据缺失模态的补全算法.

7. 多尺度双通道卷积神经网络下的刺绣模拟.

8. 基于全局更新规则蚁群优化的 决策实体配置问题求解方法.

9. UFMC 系统载波干扰抑制改进算法.

10. 应用于机器人路径规划的双向时效A*算法.

11. Optimization of AES and RSA algorithm and its mixed encryption system.

12. The Extraction of Bamboo's Inner and Outer Contours Using Sobel Operator to Ant Colony Algorithm.

13. 基于知识库的象棋机器博弈搜索算法研究.

14. 跨系统协同过滤推荐算法的隐私保护技术研究.

15. 一种融合抗差的共线秩亏平差算法.

16. Hot topic detection method on micro-blog based on comments tree.

17. Optimization research of Gauss matrices in compressive sensing.

18. Rapid Symbol Rate Estimation Algorithm for MFSK Signal in Fading Channel.

19. TDOA Passive Location Based on Improvement of Second Cone Relaxation and Taylor-series Estimation.

20. High Resolution Wide Swath Repeat Acquisition SAR Imaging Mode and Algorithm with Near Space Platform.

21. Speech Recovery Model and Algorithm over Sparse Representation based on Compressive Sensing.

22. Identification Algorithm for LDPC Codes Using Maximum Deviation Ratio.

23. New optimization algorithm of 0-1 knapsack problem.

24. Research on reconfigurable security carrying network construction and reconfiguration algorithm.

25. Real-valued Immune Detector Dimension-reducing Optimization Algorithm with Entropy.

26. Uncertain continuous time series Top-K anomaly detection method.

27. Research of algorithms for vertex-distinguishing edge coloring of graphs.

28. Research on similarity mapping algorithm for high-speed Ethernet.

29. Rational fairness exchange protocols based on maximum entropy principle.

30. Electronic cash system with multiple banks based on TPM for cloud computing.

31. Application of data model for guidance system in deploying guide signs.

32. Spread model and application of shortage of supplies for emergency logistics network.

33. Research on space-time accessibility considering direction of travel.

34. Supernetwork-based method on division of community structure in complex network.

35. Pseudoinverse solution to construction of cubic splines.

36. Efficient hierarchical group signature based on elliptic curve.

37. Data correlation analysis assists vulnerability detection.

38. Research on reliable coverage algorithm based on grid trust value for wireless sensor networks.

39. Technology research of attack path identification based on immune intrusion detection.

40. Review on full reference image quality assessment algorithms.

41. Domain-Doppler Doubly Selective Channel Estimation Using Compressed Sensing.

42. Design and Research of Web Pages Detection Algorithms Based on MD5.

43. Research of fusing image classification into object localization.

44. Colored hillshading map based on HSV color model.

45. Design and implement of 3D virtual robot kinematics simulation system.

46. Based on machine vision encoder grating assembled eccentric adjustment system design.

47. Mean-Shift tracking algorithm based on background weighted update approach.

48. Modeling and algorithm of prediction about pollutants' emission reduction by combining gray theory and Markov chain.

49. Research of cloud scheduling algorithm for traffic information.

50. Rotational attack on Luffa hash function.