Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2011 Issue 10
Self-healing group key management scheme with collusion resistance
CAO Shuai;ZHANG Chuan-rong;SONG Cheng-yuan
..............page:2692-2693,2777
Early-warning model of logistics transport based on fuzzy comprehensive evaluation
YANG Ying-xin;FENG Zhi-yong;RAO Guo-zheng;SHI Hong
..............page:2844-2848
Application of real-time analytic method in inverse kinematics of NAO model
WANG Fan;LI Long-shu
..............page:2825-2827,2840
Multi-manufacturers-to-multi-supppliers order allocation model based on production load equilibrium
SONG Fa-shuai;XIANG Wei;YE Fei-fan
..............page:2837-2840
Real-time inspection and control system for six DOF platform based on INtime
HUANG Mang-mang;ZHOU Xiao-jun;WEI Yan-ding
..............page:2858-2860
PLL-based synchronization of rational dither modulation watermarking
YAN Bin;WANG Xiao-ming;HAO Jian-jun;ZHANG Ren-yan
..............page:2674-2677
Semi-supervised classification algorithm based on relative transformation
YI Miao;LIU Xiao-lan
..............page:2793-2795
Precision test method based on continued-fraction approximation
XU Jin-chen;GUO Shao-zhong;ZHAO Jie;WANG Qian
..............page:2600-2602,2605
Quality evaluation of halftone based on visual perception similarity
ZHANG Han-bing
..............page:2750-2752
CBR-based emergency case ontology model
ZHANG Xian-kun;LIU Dong;GAO Shan;DU Lei
..............page:2800-2803,2820
Watermarking scheme for 3D models in combination with tendency detection of vertices
WANG Xin-yu;ZHAN Yong-zhao
..............page:2665-2669
Real-time scan conversion for ultrasound based on CUDA
WANG Wei-min;WANG He-chuang;WANG Hua-jun
..............page:2760-2763,2769
Supervised boundary detection for small sample problem
GAO Liang;LIAO Zhi-wu;LIU Xiao-yun;CHEN Wu-fan
..............page:2697-2701
Contour connecting method based on interzone line
ZHENG Li-ping;LI Guang-yao;JIANG Hua
..............page:2708-2710,2785
Anti-occlusion object tracking algorithm based on adaptive multiple cues fusion
CAO Jie;FU De-qiang
..............page:2731-2733,2857
Lesion area segmentation in leukoaraiosis\'s magnetic resonance image based on C-V model
ZHENG Xing-hua;YANG Yong;ZHANG Wen;ZHU Ying-jun;XU Wei-dong;LOU Min
..............page:2757-2759,2807
Autonomous localization of mobile robot based on odometer and PTZ vision
NIU Guo-chen;XU Ping;FENG Qi
..............page:2821-2824
Image encryption and sharing based on Arnold transform
HOU Wen-bin;WU Cheng-mao
..............page:2682-2686
Theoretical study on bandwidth utilization in FlexRay network
WANG Gang;DING Tian-bao;RONG Jian;ZHANG Zhuo;L(U) Yi-bin
..............page:2634-2637
Design knowledge sharing platform based on functional ontology
XIONG Jing;LIU Yong;XU Jian-liang
..............page:2804-2807
Facial feature point localization based on MR-AAM dual-fitting
YE Chao;LI Tian-rui;GONG Xun
..............page:2724-2727
Fusion algorithm of remote sensing images based on wavelet packet and edge features
ZENG Yu-yan;HE Jian-nong
..............page:2742-2744
Analysis of arrival time localization using kernel locality preserving projection
ZHANG Yong-qiang;ZHAO Chun-yan
..............page:2876-2879
Workflow modeling and simulation for implementation stage of construction project based on Petri net
LI Hai-ling;SHI Ben-shan;LIU Ke-jian
..............page:2828-2831,2868
Research on optimal thread quantity of real-time signals acquisition system
WANG Ke-te;WANG Li-sheng
..............page:2593-2596
Three-dimensional detection range of radar in complex environment
ZHANG Jing-zhuo;YUAN Xiu-jiu;ZHAO Xue-jun;MENG Hui-jun
..............page:2738-2741
Self-organizing fuzzy neural network algorithm based on unscented particle filter
CHENG Hong-bing;NI Shi-hong;HUANG Guo-rong;LIU Hua-wei;JIANG Zheng-yong
..............page:2770-2773
Scoring system for training simulator of military power
MENG Fei-xiang;CHENG Pei-yuan;YANG Xu-feng
..............page:2865-2868
Low-power NoC router design
ZHOU Duan;PENG Jing;ZHANG Jian-xian;ZHANG Han
..............page:2621-2624
Congestion control algorithm of non-linear high-order random early detection
TIAN Shuo;GAO Zhong-he
..............page:2650-2653
Independent online fusion algorithm for multi-sensor data
ZHANG Jian-ye;WANG Zhan-lei;ZHANG Peng;DU Ji-yong
..............page:2869-2871
Image segmentation based on grayscale iteration threshold pulse coupled neural network
LI Hai-yan;ZHANG Yu-feng;SHI Xin-ling;CHEN Jian-hua
..............page:2753-2756
cTwigStack: Improved twig pattern matching algorithm
YAO Quan-zhu;GUO Zhen;FANG Mei-jun
..............page:2782-2785
Binary large object access algorithm based on file segmentation
XIE Hua-cheng;ZHANG Kun-peng;FAN Li-lin;LIU Dao-hua
..............page:2612-2616
Parallelization design of face recognition algorithm based on Matlab multi-core clusters
ZHENG Xiao-wei;YU Meng-ling
..............page:2597-2599
Online automated grading of pearl surface perfection based on computer vision
XU Shu-chang;QIU Xian;ZHANG San-yuan
..............page:2764-2766
Denoising method of non-spherical distributed data set
ZHANG Yan;YAN De-qin;ZHENG Hong-liang
..............page:2786-2789
Path editing technique based on motion graphs
DU Yu;CHEN Zhi-hua;XU Jun-jian
..............page:2745-2749
Multicast routing algorithm based on congestion control for NoC
YUAN Jing-ling;LIU Hua;XIE Wei;JIANG Xing
..............page:2630-2633,2637
Parallel ray tracing model based on.NET Remoting
WANG Li-dong;LI Chao-kui;TAO Jian-jun;YANG Gang
..............page:2603-2605
Efficient data collection algorithm in sensor networks with optimal-path mobile sink
LI Bin;LIN Ya-ping;ZHOU Si-wang;HUANG Cen-xi;LUO Qing
..............page:2625-2629,2653
Intrusion prevention system against SIP distributed flooding attacks
LI Hong-bin;LIN Hu;L(U) Xin;YANG Xue-hua
..............page:2660-2664
Blue-green algae bloom forecast platform with Internet of things
YANG Hong-wei;WU Ting-feng;ZHANG Wei-yi;LI Wei
..............page:2841-2843,2860
Harris corner detection algorithm based on adaptive fractional differential
WANG Cheng-liang;QIAO He-song;CHEN Juan-juan
..............page:2702-2704,2741
New three-party password-based authenticated key agreement protocol with elliptic curve
LIU Zhu-wen;LI Li-lin
..............page:2687-2688,2691
Expansion of task scheduling module in μC/OS-Ⅱ kernel
YIN Zuo-wei;GUO Bing;SHEN Yan
..............page:2606-2608,2616
Adaptive active queue management algorithm based on internal model control
LIN Kai-si;LIN Kai-wu;ZHANG Lu
..............page:2654-2656
Improvement of dynamic multi-objective evolutionary and orthogonal test for four-branch satellite antenna
GUO Jin-cui;ZOU Jin-xin;SUN Peng-hui;ZHUANG Yan
..............page:2880-2882
Shape recognition algorithm for ST-segment of ECG signal
WANG Zhen-xing;ZHANG Si-jie;ZENG Xiao-ping
..............page:2811-2813,2817
Arrival direction estimation of wideband linear frequency modulation signal based on DPT
GAO Chun-xia;ZHANG Tian-qi;JIN Xiang;BAI Juan
..............page:2872-2875
Design of video preprocessing IP core for online inspection system of elastomer workpiece
LIN Hui;WU Li-ming;PAN Qi-jun
..............page:2609-2611,2620
Improvement of semantic distance-based concept similarity computation in Web service matching
XU Hong-yan;FANG Xin;FENG Yong
..............page:2808-2810
Flight data denoising method based on stationary wavelet transform
LI Zheng-xin;ZHANG Feng-ming;ZHANG Xiao-feng;FEI Wen
..............page:2790-2792,2810
Customization of validation rule based on NXOpen
HUA Feng
..............page:2861-2864
Network conversion gateway based on DSP and FPGA
CHEN Ming;SONG Bao;TANG Xiao-qi
..............page:2617-2620
Efficient RFID mutual authentication protocol
WANG Ming-hui;WANG Jian-dong
..............page:2694-2696
Ellipse detection algorithm based on center extraction
FAN Yi;FU Ji-wu
..............page:2705-2707
Multi-resolution simplification algorithm for point cloud
YANG Bin;FAN Yuan-yuan;WANG Ji-dong
..............page:2717-2720,2789
Image inpainting method based on structure tensor
LIU Kui;SU Ben-yue;ZHAO Xiao-jing
..............page:2711-2713
Single sample face recognition based on sample augment and improved 2DPCA
ZHAO Ya-ying;TAN Yan-qi;MA Xiao-hu
..............page:2728-2730,2756
Outlier detection algorithm based on global nearest neighborhood
HU Yun;SHI Jun;WANG Chong-jun;LI Hui
..............page:2778-2781
Overlap-based connectivity restoration approach for wireless sensor and actor network
ZHAO Xin-yuan;WANG Neng
..............page:2638-2643,2649
Anonymous credentials scheme based on ring signature for trust negotiation
LI Wei;FAN Ming-yu;WANG Guang-wei;YUAN Jian-ting
..............page:2689-2691