Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2014 Issue 10
Study of Auto Evasion Time Based on Video Detection
LIU Jing-pei;,TIAN Shuang;
..............page:1-4
Courseware for Online Plotting Experiment Based on MA TLAB Web Figure
CAI Yun-lu;,LIN Zhi-guang;,YANG Jie-xia;
..............page:5-7,15
System of Multi-sensor and Multi-target Tracking and Track Fusion
FU Lin;,WAN Xiao-dong;,WANG Bao-zeng;
..............page:8-11
Trusted Component Measurement Model Based on Specific Areas
CHEN Hai-yan;,TANG Ying;,ZHANG Yu-ping;
..............page:12-15
Chronic Kidney D isease Stages and SMS Alerts System
TANG Yan;,WANG Ping;
..............page:16-19
Course-oriented Chinese FAQ Auto Question Answre ing System Model
HOU Li-min;,ZHANG Yong-qiang;
..............page:20-24
Architecture of Cloud Media Server in Video Surveillance Networking System
CHANG Jing-kun;,WANG Xin;
..............page:25-30,41
Ssytem of Semantics-base d Keyword Search over Relational Database
WAN Chang-lin;,XU De-ming;
..............page:37-41
Safety Analysis and Verification on Civil Aviation Business System
WANG Li-song;,XING Ni-zhou;
..............page:46-51,65
Android/Matlab Data Exchange Middleware Architecture
CHEN Guo-liang;,WU Yun-ping;
..............page:52-54
Campus Fault Repair System Based on Android Platform
LI Xia;,XU Rui;,ZHOU Qiao-kou;
..............page:58-60,70
Testing Method of Embedded Software Based on DSP
YANG Ke-yao;,ZENG Lei-jie;,ZHANG Xiao-fang;
..............page:61-65
Human Vital Signs Monitoring System Using Wearable Sensors in Daily Life
CHENG Yong-qiang;,JIANG Ping;,WANG Xiao-nian;,ZHU Jin;,ZHU Peng;
..............page:71-75
A Method of Service Evolution for Controlling Risk of Privacy Exposure
HUANG Zhi-qiu;,LIU Bo;,WANG Shan-shan;
..............page:76-80,107
Applications of 802.11n Wireless LAN for Building Environment
GAO Ming;,QI Ji-yun;,QIU Quan;,YU Hong-bo;
..............page:85-91
Study on APT Network Attack Technology
MI Qi;,XU Chao;,ZHU Jie;,ZONG Jun-jun;
..............page:92-94,122
Overview of Intelligent Data Retrieval Methods for Similar Waveforms in Fusion Databases
HUANG Jian-jun;,LIU Ying;,QI Bing;,RU Li-li;,WANG Fan;
..............page:95-99
Distributed AP Clustering Algorithm Based on MapReduce
LENG Yong-lin;
..............page:104-107
Improved Adaptive Wavelet Threshold Method and Its Application in Well Logging Curves Denoising
CAI Hong-kai;,CHEN Xue-song;,ZHANG Hui-yu;,ZHAO Zi-hao;
..............page:108-111,118
HTM-based Genetic Time Series Segmentation Algorithm
WU Da-hua;
..............page:112-118
Study of Improved Algorithm of Gas Concentration Based on the Largest Lyapunov Exponent
LI Ru;,WANG Jin-yu;,ZHANG Xin-yu;
..............page:119-122
An Improved Algorithm of Image Compression Based on Wavelet Transform
FAN Xiao-qing;,GUAN Hong-yun;,YANG Ting;,ZHANG Wen-kang;
..............page:123-126