[1] |
WANG Haoxiang, LI Na, LI Qiangyi.
Research on Improved Virtual Force Maximum Coverage Location Algorithm
[J]. Computer Engineering and Applications, 2020, 56(20): 220-225.
|
[2] |
DAI Yaonan, CHEN Xubing.
Design and Implementation of Moxibustion Robot with Constant Temperature on Human Back Spine
[J]. Computer Engineering and Applications, 2019, 55(9): 216-222.
|
[3] |
HE Wentao, HE Defeng, CUI Jinglong, PENG Binbin.
Design of Verification Platform for Adaptive Cruise Control Algorithm of Connected Vehicles
[J]. Computer Engineering and Applications, 2019, 55(14): 235-241.
|
[4] |
XU Lang, SHEN Bin, ZHOU Xiaoyong, JIN Chun.
Key technology analysis of LWA
[J]. Computer Engineering and Applications, 2018, 54(15): 6-12.
|
[5] |
YANG Xiaojing, WANG Siqi.
Precise detection of micro nano component based on micro machine vision
[J]. Computer Engineering and Applications, 2017, 53(5): 227-230.
|
[6] |
WANG Weiting1,2, LI Jinjie2, ZHANG Wenxu1.
Research of implementing DDS without phase truncation spur based on phase code compensation
[J]. Computer Engineering and Applications, 2017, 53(4): 244-250.
|
[7] |
ZHANG Xiantao.
Attribute reductions on generalized multi-granulation rough set and matlab computation
[J]. Computer Engineering and Applications, 2016, 52(8): 43-48.
|
[8] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[9] |
LI Hang, ZHOU Guobin, WANG Chuanguang.
Detection of irregularity crack based on MATLAB image processing toolbox
[J]. Computer Engineering and Applications, 2016, 52(5): 209-214.
|
[10] |
SUN Hao1,2, GONG Peirong2.
Processing operation data of beamline in SSRF based on Matlab neuron networks
[J]. Computer Engineering and Applications, 2016, 52(16): 233-237.
|
[11] |
LIN Jun, LIU Long, GU Bing.
Research on evaluation function of path optimization search using PCNN
[J]. Computer Engineering and Applications, 2016, 52(1): 151-156.
|
[12] |
ZHOU Leqian, GUO Siyu, WEN He, ZHANG Yi.
Improved algorithm of large structural elements basic binary morphological operations
[J]. Computer Engineering and Applications, 2016, 52(1): 190-194.
|
[13] |
LIAO Dan, ZHOU Ming, LIU Dan, TIAN Zhong.
Assessment method of automatic optimizing CVSS v2.0 vulnerability indicators
[J]. Computer Engineering and Applications, 2015, 51(2): 103-107.
|
[14] |
YU Quan, XU Baoguo.
Improved DV-Hop algorithm in wireless sensor network
[J]. Computer Engineering and Applications, 2015, 51(15): 92-95.
|
[15] |
WANG Huicong, CHEN Youling, ZHANG Shuliang.
Method for determining man-hour in mass customization based on error correction coefficient
[J]. Computer Engineering and Applications, 2015, 51(11): 228-232.
|