[1] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[2] |
LI Zhongdao, LIU Yuansheng, CHANG Feixiang, ZHANG Jun, LU Ming.
Research on UWB and LiDAR Fusion Positioning Algorithm in Indoor Environment
[J]. Computer Engineering and Applications, 2021, 57(6): 260-266.
|
[3] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[4] |
ZHAO Yi, GAO Shuping, HE Di.
Eye Movement and Tracking Data Fusion Algorithm Based on Deep Learning
[J]. Computer Engineering and Applications, 2021, 57(10): 211-217.
|
[5] |
ZHANG Hong, CHENG Chuanqi, XU Zhigang, LI Jianhua.
Survey of Data Fusion Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(24): 1-11.
|
[6] |
CAO Wenwen1, KANG Bin2, YAN Jun1, DING Wan1.
Sparse Representation Target Tracking via Multi-Source Data Fusion
[J]. Computer Engineering and Applications, 2019, 55(6): 1-7.
|
[7] |
WU Huihui1, GAO Shuping1, PENG Hongming2, ZHAO Yi1.
Adaptive Fuzzy [C]-Means Clustering Data Fusion Algorithm
[J]. Computer Engineering and Applications, 2019, 55(5): 26-35.
|
[8] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[9] |
GUO Lin, SUN Qinglin, CHEN Sai, CHEN Zengqiang, JIA Hongchen.
Design of Powered Parafoil System Based on Real-Time Multitask Operating System
[J]. Computer Engineering and Applications, 2019, 55(16): 227-234.
|
[10] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[11] |
DU Yongwen, WANG Zhangmin, HU Xiaohui, XU Ning.
A Survey on Software-Defined Wireless Sensor Network
[J]. Computer Engineering and Applications, 2019, 55(1): 1-8.
|
[12] |
PAN Jie1, WATANABE Masahiko2, ZHOU Kuanjiu1, LIANG Haoran1, CUI Kai1.
Formal modeling approach for embedded software
[J]. Computer Engineering and Applications, 2018, 54(8): 61-71.
|
[13] |
WEI Yu, SONG Tian.
Lightweight and robust data reduction algorithms for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2018, 54(3): 100-108.
|
[14] |
QI Gang, ZHENG Lin.
Transmission protocol based on network coding for Wireless Sensor Networks of power lines system
[J]. Computer Engineering and Applications, 2018, 54(12): 86-92.
|
[15] |
ZHAO Bo1,2, LI Erhui1,2, MA Jun1,2, HUANG Yuqing1,2.
Security-enhanced key generation scheme based on USB Key
[J]. Computer Engineering and Applications, 2018, 54(10): 135-142.
|