381. Event-triggered sensor data transmission policy for receding horizon recursive state estimation. Issue 2 (June 2017) Authors: Li, Yunji; Peng, Li Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 178 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
382. Isolation-based hyperbox granular classification computing. Issue 2 (June 2017) Authors: Liu, Hongbing; Zhang, Fan; Li, Ran; Wu, Chang-an Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 110 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
383. Color multi-focus image fusion algorithm based on fuzzy theory and dual-tree complex wavelet transform. Issue 2 (June 2017) Authors: Sun, Yan; Jiang, Ling Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 163 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
384. A new algorithm for finding the K shortest paths in a time-schedule network with constraints on arcs. Issue 2 (June 2017) Authors: Guo, Jianyuan; Jia, Limin Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 170 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
385. Stability region of two-point variable step–block backward differentiation formulae. Issue 2 (June 2017) Authors: Yatim, SAM; Asnor, AI; Ibrahim, ZB Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 192 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
386. Hierarchical remote data possession checking method based on massive cloud files. Issue 2 (June 2017) Authors: Haifeng, Ma; Zhenguo, Gao; Nianmin, Yao Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 126 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
387. A novel algorithm L-NCD for redundant reader elimination in P2P-RFID network. Issue 2 (June 2017) Authors: Xu, He; Shen, Weiwei; Li, Peng; Zhu, Jiawei; Wang, Ruchuan Journal: Journal of algorithms & computational technology Issue: Volume 11:Issue 2(2017) Page Start: 135 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
388. Asymmetric Windows and Their Application in Frequency Estimation. Issue 4 (December 2015) Authors: Luo, Jiufei; Xie, Zhijiang; Li, Xinyi Journal: Journal of algorithms & computational technology Issue: Volume 9:Issue 4(2015) Page Start: 389 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
389. L(α)-Stable Multi-Derivative GLM. Issue 4 (December 2015) Authors: Okuonghae, R. I.; Ikhile, M. N. O. Journal: Journal of algorithms & computational technology Issue: Volume 9:Issue 4(2015) Page Start: 339 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
390. Sarsa(Λ)-Based Logistics Planning Approximated by Value Function with Policy Iteration. Issue 4 (December 2015) Authors: Tang, Yu Journal: Journal of algorithms & computational technology Issue: Volume 9:Issue 4(2015) Page Start: 449 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗