[1] |
CHEN Shiming, LIN Zipeng, GAO Yanli, PEI Huiqin.
Heterogeneous Group Consensus Under Adaptive Coupling Weights
[J]. Computer Engineering and Applications, 2021, 57(4): 231-235.
|
[2] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[3] |
LIAO Liefa, YANG Hong.
Review of Beetle Antennae Search
[J]. Computer Engineering and Applications, 2021, 57(12): 54-64.
|
[4] |
ZHU Shuqin, LIU Rongyue, ZHOU Ranran, WANG Wenhong.
New Image Encryption Algorithm Based on Key Dynamic Selection Mechanism
[J]. Computer Engineering and Applications, 2019, 55(9): 56-64.
|
[5] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[6] |
FENG Jianxin1,2, LI Hui1,2, LIU Zhiguo1,2.
New Flame Color Space—IFCS
[J]. Computer Engineering and Applications, 2019, 55(5): 203-210.
|
[7] |
HUANG Yuda1, WANG Yiran2, NIU Sijie3.
Analysis and Optimization of GSO Algorithm Based on Chaos and Self-Adaptive Search Strategy
[J]. Computer Engineering and Applications, 2019, 55(3): 147-153.
|
[8] |
CHEN Jie, ZHANG Wendong, SU Linlin, SANG Shengbo.
Spacecraft Attitude-Orbit Control Algorithm Based on Lyapunov Stability Criterion and CPSO Algorithm
[J]. Computer Engineering and Applications, 2019, 55(24): 229-234.
|
[9] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[10] |
WU Weimin, ZHANG Jingjing, PENG Jiajin, ZHANG Junyuan, SU Qing.
Lightweight RFID tag ownership transfer protocol based on chaotic encryption
[J]. Computer Engineering and Applications, 2018, 54(9): 62-66.
|
[11] |
LI Longshu1,2, ZHANG Xiaojian2.
New chaos particle swarm optimization based on adaptive inertia weight
[J]. Computer Engineering and Applications, 2018, 54(9): 139-144.
|
[12] |
XIE Guobo, JIANG Xianzhi.
Double chaotic image encryption algorithm based on two dimensional discrete fractional Fourier transform
[J]. Computer Engineering and Applications, 2018, 54(3): 40-45.
|
[13] |
WU Dongkai, ZHANG Fengbin, XI Liang.
Research on clonal selection algorithm of adaptive hybrid mutation
[J]. Computer Engineering and Applications, 2018, 54(21): 78-83.
|
[14] |
GAO Fei, CAO Wenjing.
Dynamics analysis of three-dimensional supply chain fractional order difference game model
[J]. Computer Engineering and Applications, 2018, 54(2): 246-252.
|
[15] |
WANG Yong1,2, CHEN Yan1, ZHAO Yi1.
Parallel Hash function construction based on piecewise Logistic map
[J]. Computer Engineering and Applications, 2018, 54(15): 38-43.
|