Paper Title
Page
Authors: Yan Qing Wang, Rong Yu, Rong Ling Chen
Abstract:By a transfer matrix-Newmark formulation iteration method, shock response analysis in time domain was performed for a propulsion shaft...
2534
Authors: Sheng Han Zhou, Wen Bing Chang, Ze Jian Xiong
Abstract:The paper aims to develop a risk assessment model with the fuzzy temporal information. The traditional model assess risk with the risk matrix...
2540
Authors: Cheng Guo, Hao Qian Wang
Abstract:Most of the traditional block-matching algorithms for motion estimation (ME) can only yield local optimal motion vectors (MVs). In this...
2546
Authors: Hao Jun Li, Yue Sheng Zhu
Abstract:Rather than based on the stereo vision principle and the relationship between the camera position and the video scene objects used in most of...
2552
Authors: Zhi Hu Huang, Jin Song Leng
Abstract:Automatic seal imprint identification system is highly demanded in oriental countries. Even though several seal identification techniques...
2558
Authors: Li Xia Qi, Xue Yang
Abstract:Coal mine safety production is of great significance in China. Modern information management and network technology are used to establish a...
2564
Authors: Wen Bang Sun, He Xin Chen, Wen Bing Sun, Mai Yu Zhou
Abstract:With the development of information processing technology, 2-D DCT has been used more and more widely. But the 2-D DCT is accomplished by...
2570
Authors: Shi Feng Liu
Abstract:For the lack of unified professional networks topology presentation system, the whole network topology of network units can not be presented...
2576
Authors: Jing Li Wang
Abstract:Circuit optimization method should include the topology of automatic design circuit and automatically determine components parameters of the...
2581
Authors: Bing Yuan Cheng, Kai Jin Qiu, Zu Yong Yang
Abstract:The amount of intrusion detection calculation based on software is heavy, which can not satisfy the needs of modern network bandwidth; the...
2585
Showing 441 to 450 of 468 Paper Titles