Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 1
Using Gini measures to evaluate and optimize structure of cluster\'s nodes
yang yu liang ; chen shi ping ; zuo hui qi
..............page:15-17
Automatic path finding method for real-time rendering of 3D scene
li yan jun ; li zhi yong ; chen si yuan
..............page:85-89
Moving objects detection approach based on adaptive mixture Gaussian background model
huang zuo juan ; zhou jie min ; liu bo yang
..............page:71-74
Encryption approach to chaotic synchronization communication by TD-ERCS discrete system
pan bo ; li zuo ; feng jin fu ; xu jian jun ; li bin ; tao zuo
..............page:198-202
Local description and retrieval method for binary image contour
yang xiao dong ; wu ling da ; xie zuo xiang ; yang zheng ; zhou wen
..............page:65-67
Motion vector recovery for inter-frame error concealment in H.264
xia ding yuan ; yang hui
..............page:41-43
Register based algorithm for VLIW DSP cluster assignment
lei yi ming ; hong yi ; xu yun ; jiang hai tao
..............page:274-276
Investigation of visual inspection method for silicon solar cell
zhang wu jie ; li di ; ye feng
..............page:249-252
Dynamic diffusion particle swarm optimization
ren xiao bo ; yang zhong xiu
..............page:159-161
Novel scheduling algorithm in high-speed crossbar and its performance analysis
jiang xiao bo ; du xiao wei
..............page:101-103
Dynamic simulation of chemistry experimental phenomenon based on particle system
yang chun ; mao xuan ; zhu fu quan ; yi he
..............page:150-152
Novel particle filtering algorithm with application to bearing-only tracking
wang fa sheng ; zhang ying bo
..............page:167-170
Application of back propagation artificial neural networks in bug analysis
wang lei ; yang xiao hu
..............page:153-155
Split algorithm of binary tree with priority and its simulation under free access channel
li huan huan ; yin mao lin ; gao fei
..............page:140-142
Maximum matching algorithm with QoS in grid resource scheduling
duan fu hai ; ma man fu
..............page:108-110
Comparison of matching capabilities in similarity measurements
chen wei bing
..............page:98-100,110
Personalized ontology-based semantic annotation and retrieval of image model
shi zuo zuo ; zuo da shun ; shen yu li
..............page:90-93
Digital watermarking algorithm based on template and image feature
xiao ying jie ; sun jin guang ; zhang yun
..............page:50-53,57
Theft detection based on omni-directional vision sensors
tang yi ping ; hu fei hu
..............page:36-40
Source camera identification technique using large components of imaging sensor pattern noise
hu yong jian ; yu bing hua ; jian chao
..............page:31-35
Multi-class cluster support vector machines
wang zhi zuo ; yang yi fan
..............page:143-145,149
Improved model of process behavior detection and implementation
tang zhang guo ; li huan zhou ; zhong ming quan ; zhang jian
..............page:207-209,223
Voronoi diagram generation algorithm based on Delaunay triangulation
sun ji zhong ; hu yan ; ma yong qiang
..............page:75-77,97
Duration model optimization in HMM-based TTS
lv hao yin
..............page:282-284
Research on topic maps-based ontology information retrieval model
li qing mao ; yang xing jiang ; zhou xiang bing ; ma hong jiang
..............page:240-242,248
Hybrid indexing of moving objects based on B~X-tree
zhang hui ; liu yong shan ; gao yun
..............page:22-24,28
Audit and control of trust evaluation in grid
he ting nian ; ma man fu ; li yong ; qu wei li
..............page:255-258
Chironomid larvae recognition method based on wavelet packet decomposition and fuzzy support vector machine
zhao jing ying ; guo hai ; sun xing bin ; jiang yun han
..............page:227-229,232
Investigation of occupant distribution in intelligent buildings based on wireless sensor network
wang xing shi ; qi yi ping ; chen zuo ; song chen
..............page:253-254,258
Chaos-based secure dual self-recovery watermark algorithm for image authentication
zhang lei ; chen fan ; gao hui
..............page:203-206,273
Image-analogies based super resolution for remote sensing images
yu ji ye ; wu zuo ; zuo qi zhi ; shi yi xing
..............page:61-64,67
Soft interruption handling mechanism to optimize handling performance for Linux network
xiong an ping ; han song ; jiang yi
..............page:104-107,113
Enhancement technology for container X-ray images
yuan li hong ; ma xiao yan ; yang yong ; gu xin chao
..............page:44-46,49
Application of multi-label image segmentation
ding ya jun ; xu da hong
..............page:29-30,35
Revisit of B~+ -tree index in flash-based environment
cui bin ; lv yan fei ; chen xue xuan
..............page:1-4
Image enlargement based on non-uniform B-spline interpolation algorithm
feng jie fei ; han hui jian
..............page:82-84,89
Research on semantic description and retrieval of component database
niu zhi yi ; yang jun qiang ; yang ning
..............page:18-21
MPEG video authentication scheme based on content feature
cui xue bing ; feng qiao juan ; cui ping fei
..............page:213-216
Detection of suspicious communication behavior of one program based on method of difference contrast
zhong ming quan ; tang zhang guo ; li huan zhou ; zhang jian
..............page:210-212,216
zhi shen gao zhuan jia
..............page:封3
Network risk assessment model based on rough graph
huang guang qiu ; li yan
..............page:190-195
Support vector machine ensemble model based on KFCM and its application
zhang na ; zhang yong ping
..............page:175-177
Link failure tolerance scheme in clustering wireless sensor network based on network coding
lin li wei ; xu li ; pan peng gui
..............page:130-133
Node data prediction based on SVR in wireless sensor network
zou chang zhong
..............page:127-129,136
Method of specific audio retrieval based on randomly segment
yang ji chen ; wang wei ning
..............page:230-232
Task classification of intervention rules mining and advances of three technologies
tang chang jie ; duan lei ; wang yue ; yang ning ; zhu jun ; dai li
..............page:10-14
Approach for mining association rules based on rough set
he chao bo ; chen qi mai
..............page:25-28
Microbiology information service system based on object deputy database
peng zhi yong ; huang ze qian ; liu jun ; li yue ; xu bo
..............page:5-9,17
Delay performance in wireless multi-hop networks
lin ying ; xu li
..............page:134-136
Research on short message system for information support equipment based on MC75
huang zuo ; hu jian wang ; liang wei ; xu zhi wei
..............page:280-281,284
Peer-to-peer based personalized Web information retrieval
fu chong guo ; tang zhi zhong
..............page:114-117,152
Data caching algorithm in metropolitan vehicle network
song hong bin ; xiao xiao qiang ; xu ming ; lin lei
..............page:121-123
Algorithm of anomaly detection based on centroidal Voronoi diagram
wang lei ; hou zuo yu
..............page:178-180,185
Event-based merging of partial behavior models
guo zheng hu ; chen zhong yu ; zhang ji chang
..............page:266-269
Software watermark based on structure transform of PE file import table
long fei yu ; liu jia yong ; yuan zuo
..............page:217-219
Slot synchronization algorithm in Ad Hoc network based on NTP
zhou zuo ; feng wen jiang ; guo wen chao
..............page:111-113
PID control model and method based on process neural network identification
wang bing ; li pan chi ; xu shao hua
..............page:233-235,239
Application design of sustainable simulated algorithm based on hierarchical fair competition model
zhang hai ; xu li zhang ; yang guan ci ; xu hong feng
..............page:171-174
Semantics Web service composition engine based on topic maps
zhou xiang bing ; ma hong jiang ; chang gui juan
..............page:162-166,174
Lossless data hiding for color images based on prediction error difference expansion
xiong zhi yong ; jiang tian fa
..............page:186-189,202
Design of USB multi-function data acquisition system based on MCF52223
qian chou sheng ; wang yi huai
..............page:277-279
Speech spectrogram display in pseudo-color based on non-linear transform method
zhang jing ; yu xiao qing ; xu xue qiong ; chang liao yu ; wan wang gen ; li chang lian
..............page:270-273
Researches on disaster recovery methods of long-running applications based on checkpoint
chen hai tao ; lu yu tong ; wei zhong wei
..............page:246-248
Research and design of 3G file system for smart card
yin wei ; li dai ping ; guo hong zhi ; mei xiao hu
..............page:259-262
Novel approach for texture retrieval using nonsubsampled Contourlet transform
liu ming xia ; hou ying kun ; zhu xiang cai ; sun xiu hu ; yang de yun
..............page:94-97
3D data set LOD visualization based on depth-oct-tree
ma xiao chen ; kong xiao li
..............page:47-49
Cross-layer handover optimization using grey prediction model
yuan xue ming ; tang hong
..............page:137-139,177
Behavior-based virus detection method using multi-class support vector machine
han lan sheng ; zou meng song ; liu qi wen ; liu ming
..............page:181-185
Improved DBA algorithm based on traffic prediction
zheng yu ; li guang jun ; qian yu ping
..............page:124-126
Forecasting and analysis on long-term/mid-term electric load of city by GA-BP neural networks
cheng yu gui ; li ming ; lin ming yu
..............page:224-226