UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Explicitly self-similar solutions for the Euler/Navier–Stokes–Korteweg equations in RN Journal article
Yang Chen, Engui Fan, Manwai Yuen. Explicitly self-similar solutions for the Euler/Navier–Stokes–Korteweg equations in RN[J]. Applied Mathematics Letters, 2017, 67, 46-52.
Authors:  Yang Chen;  Engui Fan;  Manwai Yuen
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:2.9/2.6 | Submit date:2019/02/12
Analytical Self-similar Solutions  Euler/navier–stokes–korteweg Equations  Variable Separation  
A fractal-based BEMD method for image texture analysis Conference paper
JianJia Pan, Dan Zhang, YuanYan Tang. A fractal-based BEMD method for image texture analysis[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2010, 3817-3820.
Authors:  JianJia Pan;  Dan Zhang;  YuanYan Tang
Favorite | TC[WOS]:0 TC[Scopus]:10 | Submit date:2019/02/11
Bemd  Self-similar  Texture Analysis  
A new image denoising method based on BEMD and self-similar feature Conference paper
Pan J.-J., Tang Y.. A new image denoising method based on BEMD and self-similar feature[C], 2010, 1-5.
Authors:  Pan J.-J.;  Tang Y.
Favorite | TC[WOS]:100 TC[Scopus]:4 | Submit date:2019/02/11
Bemd  Image Denoising  Self-similar  
Decision analysis of network-based intrusion detection systems for denial-of-service attacks Conference paper
Li M., Jia W., Zhao W.. Decision analysis of network-based intrusion detection systems for denial-of-service attacks[C], 2001, 1-6.
Authors:  Li M.;  Jia W.;  Zhao W.
Favorite | TC[Scopus]:15 | Submit date:2019/02/11
Denial-of-service Attacks  Detection  Network Security  Pattern Matching  Self-similar Traffic