Speaker Identification Using Auditory Modelling and Vector Quantization
|
283-303
|
Konstantina Iliadi, Stefan Bleeck
|
DOI: 10.18280/ama_b.600201
|
The Identification of Critical Nodes in Ad Hoc Network Based on Node Degree and Clustering Coefficient
|
304-312
|
Mian Tan, Yue Wu, Bo Song
|
DOI: 10.18280/ama_b.600202
|
DNA Sequence Detector Using Finite State Machine Methodology
|
313-318
|
Jishan Mehedi, Nilkantha Rooj, Snehanjali Majumder, Anirban Mukherjee, Niladri Hore
|
DOI: 10.18280/ama_b.600203
|
A IDS Model Based on HGA and Data Mining
|
319-331
|
Lina Lin, Dezhi Wei, Fuji Chen
|
DOI: 10.18280/ama_b.600204
|
FPGA Implementation of Discrete Fourier Transform Using CORDIC Algorithm
|
332-337
|
Debaprasad De, K. Gaurav Kumar, Archisman Ghosh, Anurup Saha
|
DOI: 10.18280/ama_b.600205
|
Local Capability Analysis and Comparative Study of Kernel Functions in Support Vector Machine
|
338-356
|
Hailun Wang, Daxing Xu
|
DOI: 10.18280/ama_b.600206
|
Adaptive Wavelet Transform Vased Rake Receiver for Ultra-Wideband Sytems
|
357-371
|
Ch. Navitha, K. Sivani K., Ashoka Reddy
|
DOI: 10.18280/ama_b.600207
|
Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis
|
372-390 |
Huan Wang, Jian Gu, Jianping Zhao, Dan Liu, Xin Sui, Xiaoqiang Di, Bo Li
|
DOI: 10.18280/ama_b.600208
|
Analysis of Signal Transmission Performance of Radio Frequency Cable under Multiple Factors
|
391-402 |
Wenjing Xuan
|
DOI: 10.18280/ama_b.600209
|
Research on Algorithm for Partial Discharge of High Voltage Switchgear Based on Speech Spectrum Features
|
403-415
|
Yueqin Feng, Quan Chen, Chunguang Li, Wenchao Hao
|
DOI: 10.18280/ama_b.600210
|
Labview-based Study on the Modeling Method of Chlorophyll Content Prediction in Tomato Leaves
|
416-428
|
Ji Qian, Juan Zhou, Yang Liu
|
DOI: 10.18280/ama_b.600211
|
Design of FPGA-based Handwriting Image Recognition System
|
429-441
|
Lei Wang, Ziheng Yang, Guangqiang Xu, Meili Fu, Yu Wang
|
DOI: 10.18280/ama_b.600212
|
Virtual Machine Scheduling Model Based on Energy and Interference Awareness in Cloud Environment
|
442-454
|
Xin Sui, Li Li, Dan Liu, Huan Wang, Jilong Gong, Zetian Zhang
|
DOI: 10.18280/ama_b.600213
|
Virtual Machine Scheduling Strategy for Reliable Service Resource Supply in Cloud Environment
|
455-468
|
Dan Liu, Xin Sui, Yan Zeng, Guangcai Cui, Xu Di, Li Li
|
DOI: 10.18280/ama_b.600214
|
Adaptive Multi-copy Layout Algorithm Based on Mass Storage System
|
469-492
|
Guosong Jiang, Qing Zhang
|
DOI: 10.18280/ama_b.600215
|
Image Simulation for 3-FOV Daytime Star Sensor Based on Ray Tracing
|
493-504
|
Feng Wu, Xifang Zhu, Ruxi Xiang, Xiaoyan Jiang, Qingquan Xu, Gong Chen, Tao Wu
|
DOI: 10.18280/ama_b.600216
|
Study on Damage Identification of Beam Bridge Based on Characteristic Curvature and Improved Wavelet Threshold De-Noising Algorithm
|
505-524
|
Xi Chu, Zhixiang Zhou, Guojun Deng, Tengjiao Jiang, Yangkun Lei
|
DOI: 10.18280/ama_b.600217
|