Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2012 Issue 11
Algorithm for generating weighted Voronoi diagram based on quadtree structure
LI Rui;LI Jia-tian;WANG Hua;PU Hai-xia;HE Yu-feng
..............page:3078-3081
Study on efficiency of Sunday algorithm
PAN Guan-hua;ZHANG Xing-zhong
..............page:3082-3084,3088
Graphical meta-model construction method of embedded control system
CHEN De-sheng;WANG Bin;XUE Jie;YU Li
..............page:3085-3088
Semantic detection of video events based on probabilistic hyper-graph
REN Mei;ZHAN Yong-zhao;PAN Dao-yuan;SUN Jia-yao
..............page:3014-3017
Enhanced binary search algorithm based on stack storage
YUAN Zheng-wu;DUAN Li-dan
..............page:3089-3091
Web clustering based on hybrid probabilistic latent semantic analysis model
WANG Zhi-he;WANG Ling-yun;DANG Hui;PAN Li-na
..............page:3018-3022
Biogeography-based optimization algorithm of differential evolution
YE Kai-wen;LIU San-yang;GAO Wei-feng
..............page:2981-2984
Separation of the high speed rail GSM-R interference signal based on the multi-frame statistical spectrum
YAN Tian-feng;ZHAO Jie;FENG Chao;MENG Ling-wei
..............page:3092-3095
Semantic orientation study on Chinese network comments
LI Hua;CHU He-lan;GAO Min
..............page:3023-3025,3033
Improved indicator-based evolutionary algorithm based on grid
XIAO Bao-qiu;LIU Yang;DAI Guang-ming
..............page:2985-2988
Improved spectrum sensing algorithm based on index belief degree function
LI Shi-yin;XIAO Shu-yan;SUN Qian;WANG Miao-miao
..............page:3096-3099
User ranking algorithm for microblog search based on MapReduce
LIANG Qiu-shi;WU Yi-lei;FENG Lei
..............page:2989-2993
Document sensitive information retrieval based on interest ontology
CHEN Hua-cheng;DU Xue-hui;CHEN Xing-yuan;XIA Chun-tao
..............page:3030-3033
New rapid algorithm for detecting girth of low-density Parity-check codes
LI Jiong-cheng;LI Gui-yu;XIAO Heng-hui;HUANG Hai-yi
..............page:3100-3101,3106
Network coding based reliable data transmission policy in wireless sensor network
CHEN Zhuo;CHEN Yang;FENG Da-quan
..............page:3102-3106
Application of domain decomposition method in parallel computing of CoLM
SHI Jian-hui;JIANG Zong-li;ZHOU Wen-bo
..............page:2994-2997
Energy-balanced adaptive clustering algorithm for wireless sensor network
L(U) Tao;ZHU Qing-xin;ZHU Yu-yu
..............page:3107-3111
Application of active learning to recommender system in communication network
CHEN Ke-jia;HAN Jing-yu;ZHENG Zheng-zhong;ZHANG Hai-jin
..............page:3038-3041
Survey of physical unclonable function
ZHANG Zi-nan;GUO Yuan-bo
..............page:3115-3120
Intuitionistic fuzzy multiple attributes decision making method based on entropy and correlation coefficient
WANG Cui-cui;YAO Deng-bao;MAO Jun-jun;SUN Li
..............page:3002-3004,3017
Evolutionary K-means algorithm based on global splitting operator
WANG Liu-zheng;HE Zhen-feng
..............page:3005-3008
Fast calculation of number of binary signed digit representations of an integer
LI Zhong;PENG Dai-yuan
..............page:3121-3124
Domain knowledge semantic distance and its application in expert system
LI Jian-xun;SHEN Bing;XIE Jian-cang;JIANG Ren-gui
..............page:3009-3013
Network security risk evaluation model based on grey linguistic variables in mobile bank
SHEN Li-xiang;CAO Guo;ZHU Yu-guang
..............page:3136-3139
Control strategy parameter analysis of parallel hybrid electric vehicles based on multiindex orthogonal experiment
YANG Guan-ci;LI Shao-bo;TANG Xiang-hong;QU Jing-lei;ZHONG Yong
..............page:3047-3049,3053
New certificateless threshold proxy blind signature scheme
WANG Zhen;LIU Pei-yu;LI Feng-yin
..............page:3140-3142
Reversible data hiding based on prediction-error and histogram pairs
ZHANG Xiao-jie;TONG Xue-feng;XUAN Guo-rong;YANG Zhi-qiang;SHI Yun-qing
..............page:3125-3128
Application of particle swarm optimization to space-time two-dimensional parameter estimation
QIU Xin-jian;SENBAI Dalabaev;XUE Feng-feng
..............page:3054-3056
Large-capacity dynamic multiple watermarking with tamperable localization based on Sudoku
ZHANG Li;LI Hong-song;YAN Xi-lan;LIAN De-liang
..............page:3129-3131,3146
Research of modern geometry based on mass point method
LI Tao;ZOU Yu
..............page:3057-3061
Deep packet inspection algorithm based on parallel Bloom filters
HU Guo-liang;LIN Ya-ping;WANG Gang;YAO Xin
..............page:3132-3135
Stereotype based pattern notation method
LIU Wei;HU Zhi-gang
..............page:3062-3066
Verifiable rational secret sharing scheme based on Chinese remainder theorem
ZHANG Li-yuan;ZHANG En
..............page:3143-3146
Improved two-party authenticated key agreement protocol
ZHANG Long-xiang
..............page:3147-3148,3152
Seam-line removal method based on correction-ratio of average value
ZHENG Yue;CHENG Hong;SUN Wen-bang
..............page:3168-3170
Immersive display system based on single projector and cylindrical reflector
YIN Xiao-qing;LI Jing;XIONG Zhi-hui;WANG Wei;ZHANG Mao-jun
..............page:3149-3152
Method of blind image forensics based on Lambert-Phong model
DU Hong-ye;YAO Wang-shu
..............page:3171-3173
Formal analysis and verification of randomness resources for Internetware
XIA Qi;WANG Zhong-qun
..............page:3067-3070
Color image enhancement based on improved intersecting cortical model
PU Tian;LI Ying-hua;CHENG Jian;ZHENG Hu
..............page:3153-3156
Property preserving operation for simplifying Petri nets with inhibitor arcs
MO Li-ping;YUE Xiao-bo;ZHOU Kai-qing;ZHANG Zhao-hai
..............page:3071-3074
Complete path coverage testing based on change
LIU Ji-hua;CHEN Ce
..............page:3075-3077,3081
Improvement of the adversarial optimization approach for outlier removal in image matching
XUE Zhen-hua;WANG Ping;ZHANG Chu-han;CAI Si-jia
..............page:3157-3160
Moving object tracking with related multi-regions based on Kalman filter
WANG Wei;GUO Yu;YU Xin
..............page:3174-3177
Online multiple instance boost random ferns for visual tracking
HUANG Ye-jue;ZHENG He-rong
..............page:3178-3181,3184
Image matching method by using Hausdorff distance based on vector length
ZHANG Wei;CHEN He-ping;YANG Ling-xian
..............page:3161-3163,3167
Quick identification of Data Matrix two-dimensional bar code based on chain code tracking
XU Yi-zhao;BAI Rui-lin;YU Zhen-hong;JI Feng
..............page:3206-3209
New edge preserving enlargement algorithm for images
YUAN Ye;TIAN Zhong-xu
..............page:3182-3184
2D bar code recognition marking in metal parts
WANG Cui-yan;ZHANG Jian-chao
..............page:3210-3213
Underwater targets extraction method based on Blob analysis and Bayesian design-making
SHI Xiao-cheng;HAO Li-chao;ZHANG Wei;WU Di
..............page:3214-3217
Trajectory tracking control based on Lyapunov method and terminal sliding mode
ZHANG Yang-ming;LIU Guo-rong;LIU Dong-bo;LIU Huan
..............page:3243-3246
Fast browser and index for large volume surveillance video
ZHOU Yu-bin
..............page:3185-3188,3197
Improved anisotropic diffusion ultrasound image denoising method based on logarithmic compression
YANG Jin;LIU Zhi-qin;WANG Yao-bin;GAO Xiao-ming
..............page:3218-3220
Track prediction of vessel in controlled waterway based on improved Kalman filter
ZHAO Shuai-bing;TANG Cheng;LIANG Shan;WANG De-jun
..............page:3247-3250
Vehicle positioning system design for forest fire patrolling and fighting
FAN Dong-ming;YU Jian-guo
..............page:3251-3253,3261
High-speed automatic train operation optimization algorithm
LI Yue-zong;WANG Peng-ling;LIN Xuan;WANG Qing-yuan
..............page:3221-3224
3D face reconstruction and recognition based on feature division
LU Le;ZHOU Da-ke;HU Yang-ming
..............page:3189-3192
New design of finger-vein identification algorithm against image rotation
TANG Lu;PENG Shuang-ping
..............page:3193-3197
Character segmentation method of check under complex background
YE Long-huan;WANG Jun-feng;GAO Lin;YUAN Jun
..............page:3198-3200,3205
Improved clonal selection algorithm for multi-class data classification
ZHENG Xian-hua;LUO Yan-min
..............page:3201-3205
Application of NSGA-Ⅱ algorithm to emergency task of space service
TONG Jing-hua;DAI Guang-ming;ZHU Huai-jun;WU Wei;WANG Lei-lei
..............page:3254-3258
Design of portable train general comfort testing system
DENG Fei;CHEN Jian-zheng;LI Wen-bao
..............page:3225-3227,3231
New GPS weak signal high-sensitivity acquisition algorithm
CHEN Jing-xia;LI Jian-wen
..............page:3262-3267
Characterization and classification of EEG attention level
XU Lu-qiang;LIU Jing-xia;XIAO Guang-can;JIN Wei-dong
..............page:3268-3270
3D simulation of A-SMGCS surface movement based on FlightGear
TANG Yong;HU Ming-hua;WU Hong-gang;HUANG Zhong-tao;XU Zi-li;HE Dong-lin
..............page:3228-3231
xin xi dong tai
..............page:封2-封3
Virtual assembly modeling method of disassembly process based on matrix calculation
GAO Qin-he;DENG Gang-feng
..............page:3232-3234,3239
Dynamic model and control law design of heavy-equipment airdrop
HE Lei;SUN Xiu-xia;DONG Wen-han;LI Da-dong
..............page:3235-3239
Simulation of broken branches based on Perlin noise function and dynamics
SUN Jin-ping;TANG Xiang;SUN Tian-kai
..............page:3240-3242