Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2013 Issue 11
A Color Image Encryption Algorithm Based on Multiple Fractional-order Chaotic Systems
WU Xiang-jun;WANG Chun-lin;KAN Hai-bin
..............page:1-7
A Method for Key-frames Extraction Based on LBP Feature
ZHANG Xin;XIE Yu-xiang;LUAN Xi-dao
..............page:8-12
Non-local Mean Algorithm Based on Wavelet Packet Transform
LONG Jun-yu;YU Ai-min
..............page:13-16
Image Edge Detection Based on G-L Fractional Differential
GOU Rong
..............page:17-19,24
Image Split-and-merge Segmentation Algorithm Based on Information Bottleneck Method
LI De-dong;XIAO Chu-wan;PANG Wei
..............page:20-24
Target Detection and Extraction Based on C-V Model
PU Xin-hua;LI Yong-jiu
..............page:25-27,33
An Automatic Traffic Congestion Detection Method
SHE Yong-ye;ZHAO Li-xuan;LUO Dong-hua;LI Xi-ying;YU Zhi
..............page:28-33
Medical Image Processing System Based on Android
YANG Ping;NI Jun;LIU Zai-ying
..............page:34-37,42
A New Four-dimensional Chaotic System and Its Sliding Mode Control
WU Feng-jiao;ZHANG Jian-wei;WANG Lei
..............page:38-42
A Monotonicity-preserving Quadratic Spline Hermite Interpolation Method
SI Jing-guo;LIU Jian-bin;GAO Feng;LIU Wei-jia
..............page:49-51
A Scalable Co-clustering Algorithm Based on MapReduce
MA Qiao;WAN Jian-yi;WANG Ming-wen
..............page:52-57
Query Optimization on PAR Database
TANG Qin;XUE Jin-yun
..............page:58-60
Feature Extraction for Indoor Four-rotor UAV
KANG Yu-hang;ZHOU Shao-lei;LI Rui-tao;QI Ya-hui
..............page:61-64
Ship Lock Arrangement in Yangtze Gorges Based on Simulated Annealing Algorithm
LIU Rui-jie;QIN Fang;ZHAI Yue;WANG Li-juan
..............page:65-67,73
Cloud Computing Scheduling Algorithm in Meteorological Environment
WANG Jun-song;HAO Yong-sheng
..............page:68-73
A Buffer Management Algorithm Based on Flash Memory
SHANG Xiao-wei;LIN Yi
..............page:74-76,81
Leakage Resilient Encryption Against Adaptive Chosen Ciphertext Attack
YU Qi-hong;LI Kai;LIANG Feng-lan
..............page:77-81
Improvement on Discrete Logarithm Digital Signature Algorithm
WEI Min;XIAO Xin;SHEN Yan;ZHOU Ke-yuan
..............page:82-84
Intrusion Detection Model Based on Factor Neural Networks
WANG Ao-min;CAO Xie-dong;FAN Yong
..............page:85-87,90
Application of Spring Security Framework in Web Development
ZHOU Wen-hong;YAN Su-fen;JIANG Yu-fang;DENG Zhao-hui
..............page:88-90
Software Design of RS485 Serial/Ethernet Converter Based on Double-buffer Queue
MA Ling-juan;LI Chang-qing;LIU Hui
..............page:95-99
Data Acquisition System Based on LabVIEW Passive Receiving Serial Port Communication
YANG Xu-dong;XU Hai-ting;WANG Jun
..............page:100-103
Checkpoint Protocol Based on Byzantine Fault Tolerance
ZHOU Wei;CHEN Liu
..............page:104-107
Candidates Voluntary Reporting System Based on Java Mobile Phone
CHEN Su-qing;DUAN Wei-jun
..............page:108-111
Reputation Model of P2P Networks Based on Simulation
YU Xin;JIN Peng-fei;SHI Chuan;WU Qi
..............page:112-115
Using PVLAN to Design Campus Network for Informatization Teaching
LI Huai-xin
..............page:116-118,123
A New Double Radio Wireless Mesh Network
ZHANG Zhi-chao;YAN Chu-ping;YUAN Hai-tao;ZHANG Jun-yuan;JI Long;ZHANG Li-ru
..............page:119-123
A Multi-media Sharing Project of Android Device Based on DLNA Protocol
GUO Yong-xin;LE Jia-jin;XIA Xiao-ling
..............page:124-127,132
Design of CIM Storage Solution in Relational Database
DONG Zhang-zhuo;KONG Yong-chao;LUO Ning;ZHAO Yuan-peng
..............page:128-132
Temperature and Humidity Acquisition System Based on Sensor DHT11
BU Yong-bo;LUO Xiao-ling;CHEN Yi
..............page:133-135
ActiveX Technology in Security RFID System
WANG Na;YANG Guo-qiang
..............page:136-138
Video Surveillance System Based on SIP, RTP/RTCP and RTSP
CHU Dian;JIANG Chun-hua;HAO Zong-bo;JIANG Wei
..............page:139-142
A Public Meteorology Product System
ZHANG Zheng-wen;ZHANG Zhen-tao
..............page:143-146
A Method of Cancer Proteins Network Analysis
HU Xin-yu;ZHU Fei
..............page:151-154
Building Embedded Linux System Based on S3C6410 Processor
SUN Lian-wen;ZHU Zheng-li;MA Yan-ting
..............page:155-157
Intelligent Design System of MEMS Inertial Switch
WANG Jia-ning;LU Jing;YAO Zhi-yong;WANG Jiong
..............page:158-162
A Web Application Based on Spring MVC Framework
SHU Li-lian
..............page:167-168,173
Realization of BIOS Rootkit Technology
MI Qi;ZONG Jun-jun;XU Chao
..............page:174-176,181
Design of Space Plant Cultivation Device Monitoring System
WANG Jing;LI De-tian;WANG Chang-sheng;GAO Bo;ZHOU Ying
..............page:177-181
Application of Soft Set in Mobile Combo Recommendation
SONG Jing-wen
..............page:182-183,187
An Administration System Based on General Underlying Data Access Layer and Portal Integration
ZHAO Zhuo-jun;LU Liang-gang;WEI Zhi-jun;ZHANG Xiao-yan;WU Jing-lan;GUO Ying-hong
..............page:184-187
SSO Technology in SAP-ERP System
ZHANG Zheng
..............page:188-191,195
Electric Vehicle Monitoring Terminal Based on CAN Bus
GONG Wen;ZHANG Hui;CHEN Chao
..............page:192-195
General Form Dynamic Generation Technology Based on Metadata
ZHANG Gui-ping
..............page:196-198,206
Subway Terminal Equipment Monitoring System
ZHANG Yong-bin;XU Jun-shan
..............page:203-206
Design of Artificial Intelligence Conversation System Based on Micro-blogging Content and Text Segmentation
SHI Xun-zhi;SUN Ning-yuan;LI Cheng-gang
..............page:207-209,213
Facial Age Recognition by Fusing Error-correcting Output Coding
YU Mian-shui;ZHU An-qing;XIE Xiao-meng
..............page:210-213
Monitoring Technology of Computer in Cluster
WU Yi-feng;GUI Qiang;LUO Ming-yu;CAI Wen-ju;XU Ming
..............page:218-222