Paper Title
Page
Authors: Zhong Chen
Abstract:In this paper, we present two parallel multiplicative algorithms for convex programming. If the objective function is differentiable and...
105
Authors: Jian Hong Zhang, Xue Liu, Cheng Lian Liu
Abstract:Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group...
111
Authors: Chao Yang, Sheng Hong, Cheng Gao, Dong Zhang, Ying Li
Abstract:This paper proposes an improvement test approach of Look-Up Table in SRAM-based FPGAs from the third-party testing. This approach solves the...
116
Authors: Jiang Zhou, Xin Yu Ma
Abstract:Recently, semantic based 3D object retrieval has been paid more attention to because it focuses on obtaining the retrieved objects in a...
124
Authors: Jiang Zhou, Xin Yu Ma
Abstract:In the case of traditional 3D shape retrieval systems, the objects retrieved are based mainly on the computation of low-level features that...
128
Authors: Da Gen Sun, Jiang Xiao, Li Yan Huang
Abstract:A ultrasonic detection system is constructed with CPLD and single chip as the core, including ultrasonic sensors, launch circuit, and...
132
Authors: Jian Xi Yang, Jian Ting Zhou
Abstract:BHM is an important means to assess and predict the safety operation of large bridge in service around the world. Given the missing of...
138
Authors: Bin Li Wang, Yan Guang Shen
Abstract:This paper introduces the association rules and Apriori algorithm in data mining, considering the disadvantages of Apriori algorithm, a new...
144
Authors: Xin Xia, Qin Li Gong, Juan Feng Jin, Yi Jie Zhang, Feng Yuan Zou
Abstract:The article selected 55 typical dress fabrics to study the sharp style of half-circle skirt. The skirts were simulated by using 3D virtual...
149
Authors: Jin Tao Jiang, Yu Zhang, Jian Ping Hu
Abstract:With rapid technology scaling, the proportion of the leakage power catches up with dynamic power gradually. The leakage dissipation through...
155
Showing 21 to 30 of 135 Paper Titles