序号 | 论文题目 | 发表/出版时间 | 发表刊物/论文集 | 论文收录 |
1 | Research on the network data stream conversion based on different specifications of flow | 2011 | CISE2010 | EI检索 |
2 | Image Scrambling Degree Evaluation Algorithm based on Grey Relation Analysis | 2011 | ICCIS论文集 | EI收录 |
3 | Research of E-Business Security Based on SOAP Protocol | 2011 | advanced materials research | EI收录 |
4 | The building of offshore facilities power system | 2011 | 论文集 | EI收录 |
5 | Research on the Reliable Video Multicast Based on Wireless Ad hoc networks | 2011 | CSIE2011 | EI收录 |
6 | One Kind of Improved Load Balancing Algorithm in Grid Computing | 2011 | NCIS'11-CMSP'11 | EI收录 |
7 | The security routing based on convergence detected about route in DHT | 2011 | NCIS 2011 | EI收录 |
8 | Application of Multi-dimensional analysis technology in telecom industry | 2011 | 论文集 | EI收录 |
9 | Grid Dependent Tasks Security Scheduling Model and DPSO Algorithm | 2011 | Journal of Networks | EI收录 |
10 | The performance analysis of image encryption algorithm based on chaotic system | 2011 | Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology, EMEIT 2011 | EI收录 |
11 | The Research of Hilbert R-Tree Spatial Index Algorithm Based on Hybrid Clustering | 2011 | 2011 EMEIT2011 | EI收录 |
12 | Stepwise Ratio GM(1,1) Model for Image Denoising | 2011 | IEEE International Conference on Grey Systems and Intelligent Services | EI收录 |
13 | Research of Key Technologies in Development in Thesis Management System | 2011 | Advances in Intelligent | EI收录 |
14 | A Novel Two-stage Analysis Method for Customer’s Requirement | 2011 | CIS2011 国际会议 | EI收录 |
15 | 3D Facial Reconstruction Based on Non-absolute Positive Photos and Skin Models | 2011 | Proceedings 2011 International Conference on Transportation, Mechanical and Electrical Engineering | EI收录 |
16 | Research and Implementation of the Optimal Design Pattern of Electronic Commerce Based on J2EE | 2012 | Applied Mechanics and Materials | EI收录 |
17 | Analyzing requirements of customer for WLAN using novel two-stage method | 2012 | International Journal of Digital Content Technology and its Applications | EI收录 |
18 | Research on error control of multicast in ad hoc | 2012 | ICCSEE2012 | EI收录 |
19 | Numerical Simulation About Thermal Environment of Solar Energy Airship in Stratosphere | 2012 | procedia engineering | EI收录 |
20 | Design and Application of Small Scale Cluster System Based on OpenFOAM | 2012 | Conference Publishing Service | EI收录 |
21 | The study of network traffic identification based on machine learning algorithm | 2012 | 4th International Conference on Computational Intelligence and Communication Networks, CICN 2012 | EI收录 |
22 | AN EFFECTIVE DENOISING METHOD FOR MEDICAL ULTRASOUND IMAGE | 2012 | Journal of Theoretical and Applied Information Technology | EI收录 |
23 | 基于UDP流量的P2P流媒体流量识别算法研究 | 2012 | 通信学报 | EI收录 |
24 | Traffic classification model based on integration of multiple classifiers | 2012 | Journal of Computational Information Systems | EI收录 |
25 | THE DESIGN ANF RESEARCH OF SECURITY MECHANISM FOR WIRELESS CAMPUS NETWORK | 2012 | Journal of Theoretical and Applied Information Techology | EI收录 |
26 | Research on network traffic identification based on improved BP neural network | 2013 | Applied Mathematics & Information Science | SCI收录 |
27 | Research on the Evaluate Quality of Image Fusion Based on Visual Information Fidelity | 2013 | International Journal of Digital Content Technology and its Applications | EI收录 |
28 | Research on Optimization Algorithm for Information Interaction Model among Social Behavior Agents | 2013 | International Journal of Digital Content Technology and its Applications | EI收录 |
29 | Flow Cluster Algorithm Based on Improved K-means Method | 2013 | IETE Journal of Research | EI,SCI |
30 | 基于流记录偏好度的多分类器融合流量识别模型 | 2013 | 通信学报 | EI检索 |
31 | 一种基于模糊逻辑的P2P僵尸网络防御模型 | 2013 | 清华大学学报.自然科学版 | EI收录 |
32 | Based on WDM of Disk Immunity Systems | 2014 | International Journal of Security and Its Applications | EI收录 |
33 | Based on WDM of disk immunity systems | 2014 | International Journal of Security and its Applications | EI |
34 | A Dynamic Broadcast Restrain Algorithm Based on Neighbors in MANET | 2014 | Journal of Chemical and Pharmaceutical Research | EI, |
35 | 平衡理论的P2P网络分布式信任模型 | 2014 | 重庆大学学报.自然科学版 | EI |
36 | Some New Sufficent Conditions for Generalized Strictly Diagonally Dominant Matrices | 2014 | Journal of Chemical and Pharmaceutical Research | EI |
37 | 具有完全学习策略的量子行为粒子群癌症基因聚类算法 | 2014 | 北京邮电大学学报 | EI |
38 | Auto Adaptive Identification Algorithm Based on Network Traffic Flow | 2014 | International Journal of Computer Communication & Control | SCIE,SCI |
39 | 图书资料管理系统中分布式数据库技术的应用探析 | 2014 | 计算机光盘软件与应用 | SCI,SCIE |
40 | Research on a Robust Method for Image Steganography Transmission in network | 2014 | The Open Automation and Control Systems Journal | EI |
41 | Enterprise Computer Network Reliability Analysis | 2015 | International Journal of Muitimedia and Ubiquitous Engineering | EI |
42 | Multi-user Detection Based on the Accelerated EM Algorithm | 2015 | The Open Automation and Control Systems Journal | EI |
43 | 基于多线程的AES-ECB改进设计与性能分析 | 2015 | 计算机测量与控制 | EI |
44 | Design and Application of Small Scale Cluster System Based on OpenFOAM | 2015 | International journal of Hybrid information Technology | EI |
45 | Implementation of Instrument for Testing Performance of Network Based on RFC2544 Test | 2015 | International Journal of Hybrid Information Technology | EI |
46 | Information systems security assessment based on system dynamics | 2015 | International Journal of Security and its Application | EI |
47 | Ion Mobility based Non-Volatile ReRAM and Optimal Design of FPGA Switch Matrix | 2015 | DDNS | SCI |
48 | A note on stronger forms of sensitivity for inverse limit dynamical systems | 2015 | Advances in Difference Equations | SCI |
49 | Based on the ant colony algorithm is a distributed intrusion detection method | 2015 | international journal of security and its application | EI |
50 | 基于软件定义数据中心网络的节能路由算法 | 2015 | 计算机研究与发展 | EI |
51 | Real-valued dual negative selection technique for intrusion detection | 2015 | International Journal of Security and its Applications | EI |
52 | Design of a Remote data monitoring system based on Sensor network | 2015 | International Journal of Smart Home | EI |
53 | A Modified Method Combined with a Support Vector Machine and Bayesian Algorithms in Biological Information | 2015 | International Journal Bioautomation | EI |
54 | 路径重链接的GRASP最优化无线自组织网络能耗 | 2015 | 北京邮电大学学报 | EI |
55 | LDPC Code Based on Cyclic Shift Register Structure | 2015 | IJCA | EI |
56 | Optimized Architecture Design of Shared MDS Storage Systems with Hotspot Buffer | 2015 | IJHIT | EI |
57 | Network Design and Implementation of Synchronization Software | 2015 | IJFGCN | EI |
58 | Technique for Intrusion Detection based on Cutting-based Realvalued Negative Selection | 2015 | ternational Journal of Security and Its Applications | EI |
59 | Toeplitz型线性方程组的拟对称化快速算法 | 2015 | 科技通报 | EI |
60 | Study on Maximum Likelihood Estimation of Time Delay Based on Importance Sampling | 2015 | Journal of Computational Information Systems | EI |
61 | Adaptive Fusion Design Using Multiscale Unscented Kalman Filter Approach for Multisensor Data Fusion | 2015 | Mathematical Problems in Engineering | SCI |
62 | A license plate recognition algorithm based on image processing technology | 2015 | Metallurgical and Mining Industy | EI |
63 | NSVM: a new SVM algorithm based on traffic flow metric | 2015 | Journal of Internet Technology | SCI,EI |
64 | TechniqueforIntrusionDetectionbasedonMinkowskyDistance NegativeSelectionAlgorithm | 2015 | International Journal of Security and Its Applications | EI |
65 | Improvement in multiple nodes positioning accuracy | 2015 | Int. J. Reasoning-based Intelligent Systems | EI |
66 | Traffic Identification Method Based on Multiple Probabilistic Neural Network Model[J] | 2015 | .International Journal of network management | SCI收录 |
67 | selection algorithm based on correlation between multi metric traffic flow feature | 2015 | International Arab Journal of Information Technology | SCI,EI |
68 | An Improved Localization Algorithm for Wireless Sensor Networks | 2015 | WSEAS TRANSACTIONS ON COMMUNICATIONS | EI期刊 |
69 | Adaptive Fusion Design Using Multiscale Unscented Kalman Filter Approach for Multisensor Data Fusion | 2015 | Mathematical Problems in Engineering | SCI期刊 |
70 | Cross Layer Optimization Routing Algorithm for Wireless AD HOC | 2015 | International Journal of Smart Home | EI期刊 |
71 | An Opportunistic Networks Routing Algorithm based on Network Coding | 2015 | International Journal of Future Generation Communication and Networking, | EI期刊 |