吉林大学学报(工学版) ›› 2018, Vol. 48 ›› Issue (4): 1231-1236.doi: 10.13229/j.cnki.jdxbgxb20170975
Previous Articles Next Articles
FU Wen-bo1, ZHANG Jie1, CHEN Yong-le2
CLC Number:
[1] 郑杰, 李建平. 物联网传感网络路由改进设计算法研究[J]. 科技通报, 2017, 33(3):92-95. Zheng Jie,Li Jian-ping.Research on improved design algorithm of internet of things sensor network[J]. Bulletin of Science and Technology, 2017, 33(3):92-95. [2] 杨秀清, 陈海燕. 光通信技术在物联网中的应用[J]. 中国光学, 2014, 7(6): 889-896. Yang Xiu-qing, Chen Hai-yan.Application of optical communication technique in the Internet of Things[J]. Chinese Optics, 2014, 7(6): 889-896. [3] 于婷婷, 马晓波, 王晓娟. 基于移动代理的无线自组网络拓扑发现算法研究[J]. 现代电子技术, 2016, 39(18):39-42. Yu Ting-ting,Ma Xiao-bo,Wang Xiao-juan.Research of mobile agent based topology discovery algorithms in wireless Ad hoc network[J]. Modern Electronics Technique, 2016, 39(18):39-42. [4] 曾光, 陈性元, 杜学绘,等. 基于多子网交汇点的以太网物理拓扑发现算法[J]. 计算机科学, 2014, 41(5):173-177. Zeng Guang,Chen Xing-yuan,Du Xue-hui, et al.Physical topology discovery algorithm for Ethernet based on intersection of multi-subnet[J]. Computer Science, 2014, 41(5):173-177. [5] 李智楠, 杨晓冬. 基于可靠路径稳定性估计的MANET路由发现算法研究[J]. 通信学报, 2016, 37(8):119-128. Li Zhi-nan,Yang Xiao-dong.Routing discovery algorithm based on reliable path stability estimation in MANET[J]. Journal on Communications, 2016, 37(8):119-128. [6] 邹柯, 姚英彪. 抵御欺骗攻击的DV-Hop安全定位算法[J]. 传感技术学报, 2017, 30(4):603-610. Zou Ke,Yao Ying-biao.DV-Hop secure localization algorithm against spoofing attack[J]. Chinese Journal of Sensors and Actuators, 2017, 30(4):603-610. [7] 李祝红, 赵灿明, 石滚,等. 动态网络环境下的链路层拓扑发现算法[J]. 计算机系统应用, 2015, 24(10):122-128. Li Zhu-hong,Zhao Can-ming,Shi Gun, et al.Link-layer topology discovery algorithm under dynamic networking environments[J]. Computer Systems & Applications, 2015, 24(10):122-128. [8] 吴辰文, 茹俊年, 刘香丽,等. 基于丢包率的多播网络拓扑推断算法[J]. 计算机工程与应用, 2014, 50(13):118-120. Wu Chen-wen, Ru Jun-nian, Liu Xiang-li,et al.Algorithm of multicast network topology inference based on packet loss rate[J]. Computer Engineering, 2014, 50(13):118-120. [9] 张宾, 刁兴春, 刘艺,等. 基于AFT满足下行约束的物理拓扑发现方法[J]. 电子学报, 2016, 44(8):1864-1872. Zhang Bin,Diao Xing-chun,Liu Yi,et al.A physical topology discovery method based on AFT of downstream constraint[J]. Acta Electronica Sinica, 2016, 44(8):1864-1872. [10] 石佳玉, 吴辰文, 孔德弟,等. 基于叶节点DFS序列的网络拓扑推断算法[J]. 计算机工程与设计, 2014, 35(2):411-415. Shi Jia-yu,Wu Chen-wen,Kong De-di,et al.Network topology inference method based on DFS sequence[J]. Computer Engineering and Design, 2014, 35(2):411-415. [11] 宋钰, 关文静, 何小利. 动态传感网络主节点恶意攻击检测仿真[J]. 计算机仿真, 2014, 31(10):326-329. Song Yu,Guan Wen-jing,He Xiao-li.Simulation on the malicious attack detection of major node of dynamic sensor network[J]. Computer Simulation, 2014, 31(10):326-329. [12] 贺筱军, 李为民, 黄仁全,等. 基于攻击策略的复杂网络拓扑结构优化模型[J]. 电讯技术, 2014, 54(9):1286-1291. He Xiao-jun,Li Wei-min,Huang Ren-quan,et al.An optimization topological structure model for complex network based on attack strategy[J]. Telecommunication Engineering, 2014, 54(9):1286-1291. [13] 毕娟, 秦志光. 基于概率主题模型的社交网络层次化社区发现算法[J]. 电子科技大学学报, 2014, 43(6):898-903. Bi Juan, Qin Zhi-guang.Hierarchical community discovery for social networks based on probabilistic topic model[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(6):898-903. [14] 李黎, 郑庆华, 管晓宏,等. 基于有限资源提升网络可生存性的拓扑重构方法[J]. 物理学报, 2014, 63(17):1-11. Li Li,Zheng Qing-hua,Guan Xiao-hong,et al.A topological reconfiguration method for enhancing networks survivability with limited resources[J]. Acta Physica Sinica, 2014, 63(17):1-11. [15] 赵文涛, 赵好好, 孟令军. 基于相关拓扑势的社团发现算法[J]. 计算机应用与软件, 2017, 34(1):258-262. Zhao Wen-tao,Zhao Hao-hao,Meng Ling-jun.Community detection algorithm based on interrelated topological potential[J]. Computer Applications and Software, 2017, 34(1):258-262. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[14] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
[15] | ZHAO Hong-wei, LIU Yu-qi, TE Ri-gen, CHEN Chang-zheng, ZANG Xue-bai. New compression algorithms based on finite sequence [J]. 吉林大学学报(工学版), 2018, 48(3): 882-886. |
|