Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of South China University of Technology(Natural Science Edition)
1000-565X
2009 Issue 5
Algorithm of Semantic Caching Coherency Maintenance Based on Attribute Update
Li Dong;Yuan Ying-hua;Ye You;Liu Zhen-yu
..............page:139-144
Prediction of Data from Pollution Sources Based on Elman Neural Network
Zhang Qi;Xu Zhi-jian;Zhao Kun-rong
..............page:135-138
TSK Fuzzy Model Base on Least-Squares Support Vector Machines
Cai Qian-feng;Hao Zhi-feng;Yang Xiao-wei
..............page:130-134
Identity-Based Proxy Signature Scheme Secure in Standard Model
Li Ming-xiang;Han Bo-tao;Zhu Jian-yong;Zheng Xue-feng;Yan Peng
..............page:118-122,129
Identity Authentication and Key Agreement Based on Circle Properties
Ge Li-na;Tang Shao-hua
..............page:111-117
Formalized Analysis of Trusted Computing Based on Conditional Predicate Logic
Chen Shu-yi;Wen Ying-you;Zhao Hong
..............page:106-110
Design Scheme of DNS Real-Time Monitoring and Statistical System
Wang Zhen-yu;Deng Jin-fu
..............page:101-105
Behaviour Trust Control Based on Bayesian Networks and User Behavior Log Mining
Zhao Jie;Xiao Nan-feng;Zhong Jun-rui
..............page:94-100
Loss Fractal Regulator Based on Network Calculus and Its Performance Model
Zhang Lian-ming;Liu Sun-dong
..............page:90-93,105
Copy-Limited and Sociality-Based Routing Algorithm for Delay-Tolerant Networks
Wang Jian-xin;Zhu Jing;Liu Yao
..............page:84-89
Representation Method of Correlation Fringe in Speckle Pattern Interferometry Based on Cross-Entropy
Li Jun;Chen Guo-hua;Ma Tie-jun;Zeng Qi-lin
..............page:79-83
Intelligent Compound Model for Measuring Water Content of Crude Oil Based on Modal Identification
Zhang Dong-zhi;Hu Guo-qing;Xia Bo-kai
..............page:73-78
Solution of Inverse-Interpolation Problem by Power-Excitation Feedforward Neural Networks
Zhang Yu-nong;Zeng Yan;Zhong Tong-ke;Tang Zhi-shuang;Mo Hong-qiang
..............page:68-72
Application of Nondimensional Immune Detector to Slowly-Varying Fault Detection
Cen Jian;Zhang Qing-hua;Xu Bu-gong;Gao Ting-yu
..............page:64-67
Design of Adaptive Control System Based on Linearization Error Model
Jia Li;Tao Peng-ye;Chiu Min-sen
..............page:59-63
Visual Servoing Control Based on Artificial Immunity and Direct Image Feedback
Li You-xin;Mao Zong-yuan;Tian Lian-fang
..............page:54-58,89
Image Binarization Based on PCNN and Corresponding Segmentation Evaluation Method
Ma Yi-de;Su Mao-jun;Chen Rui
..............page:49-53
Preprocessing of Iris Image for Identification Recognition
Luo Zhong-liang;Lin Tu-sheng
..............page:43-48
High-Performance and Low-Memory Architecture of Wavelet Transform for JPEG2000
Guo Jie;Wu Cheng-ke;Li Yun-song;Ma Jing
..............page:38-42
Face Detection and Feature Location of Moving Men in Video
Lei Yun-qi;Liu Xiu-xia;Song Xiao-bing;Yuan Mei-ling;Ouyang Jiang-fan
..............page:31-37
An Improved ICA Algorithm and Its Application to fMRI Signals
Weng Xiao-guang;Wang Hui-nan
..............page:27-30
Evaluation of Hot Carrier Effect of SiGe HBT
Lin Xiao-ling;Kong Xue-dong;En Yun-fei;Zhang Xiao-wen;Yao Ruo-he
..............page:23-26,42
A Bandwidth Allocation Scheme Between Uplink and Downlink Flows in IEEE 802.11 WLAN
Cheng Yan-hong;Li Zhi-shu;Zhu Li
..............page:17-22
A Space-Time Cooperative Scheme Based on OFDM
Ji Yan-cheng;Ge Jian-hua;Gao Ming
..............page:12-16
Compact Omnidirectional Triple-Band Antenna Applied to WLAN/WiMAX
Ma Han-qing;Chu Qing-xin
..............page:8-11
ASTRP: A New Subarea-Tree Routing Protocol for Multi-Hop Wireless Ad hoc Networks
Liu Gui-kai;Shan Chun-li;Wei Gang;Wang Hong-jiang
..............page:1-7