Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
1673-825X
2014 Issue 6
Full coverage testing method for 2-Way concurrent behaviors in software
SUN Tao;YE Xinming;College of Computer Science;Inner Mongolia University;
..............page:727-736
Virtual machine scheduling system for multiple traffic sensor data processing applications hosting
ZHAO Zhuofeng;DING Weilong;LI Xiang;Cloud Computing Research Center;North China University of Technology;College of Information Science and Engineering;Shandong University of Science and Technology;
..............page:737-744
A routing algorithm for wireless sensor networks based on interval connection number
LI Guoqing;ZHENG Xin;KONG Xiangsheng;School of Information Engineering;Xuchang University;College of Information Engineering;Huanghuai University;Department of Computer & Information Engineering;Xinxiang University;
..............page:745-749
Reliable transfer mechanism based on digital fountain codes and performance analysis for underwater sensor networks
LIU Xiuxiu;DU Xiujuan;PENG Chunyan;LIU Yuchi;School of Computer Science;Qinghai Normal University;
..............page:750-755
Mining interested browsing path of tenants based on LQN model
XIE Qiqi;CHEN Yan;CHEN Ningjiang;LI Xiang;LIANG Xiaoyu;College of Computer;Electronic and Information;Guangxi University;
..............page:756-762
Cross-universities wireless roaming authentication scheme based on fuzzy attribute
ZHU Shuhua;ZHAN Li;QIANG Hengchang;FU Danlong;SUN Wei;TANG Yong;School of Information Science and Technology;Sun Yat-Sen University;School of Information Science and Technology;Jinan University;School of Software;Sun Yat-Sen University;School of Computer Science;South China Normal University;
..............page:763-770
Clustering method based on near neighbour influence of grid cells
CHEN Xinquan;School of Computer Science & Engineering;Chongqing Three Gorges University;Web of Sciences;University of Electronic Science & Technologhy of China;
..............page:771-777
Malware detection system for windows using machine learning
ZHANG Yueqian;HE Jingsha;School of Software Engineering;Beijing University of Technology;
..............page:778-784
Network intrusion detection model based on MACO-SVM
LI Zhengang;GAN Quan;Information Center;Tianjin Chengjian University;Computer Science and Technical Academy Department;Pingdingshan University;
..............page:785-789
Feedback correction method of text classification based on error network
LU Ling;YANG Wu;LIU Hengyang;College of Computer Science and Engineering;Chongqing University of Technology;
..............page:790-795
Method for new sentiment word extraction based on boundary feature
ZHU Bo;HOU Min;Broadcast Media Language Branch;National Language Resources Monitoring and Research Center;Communication University of China;
..............page:796-802
Hot topic prediction model based on AGSO-LSSVM
LIU Yukun;XIA Dongliang;MA Li;Software Engineering School of Pingdingshan University;
..............page:803-808
Research on infusion monitoring system based on wireless sensor network
XU Yabin;ZHAO Hui;School of Computer;Beijing Information Science & Technology University;Beijing ECHO Technologies Co.;Ltd.;
..............page:809-814
Research and performance analysis of enterprise private cloud platform
MA Jianhong;ZHAO Heng;ZHOU Jianye;Computer Science and Software Engineering;Hebei University of Technology;
..............page:815-818+855
Reliable distributed spectrum sensing strategy in cognitive radio networks
DU Yun;HUANG Chuan;WAN Xiaoyu;LIN Hui;Department of Mathematics;Liupanshui Normal University;School of Math and Computer Science;Fujian Normal University;School of Economics and Management;Chongqing University of Posts and Telecommunications;
..............page:819-825
A vertical handoff algorithm based on priority for heterogeneous wireless networks
JIANG Qing;REN Xingfan;ZHANG Jiaxing;Chongqing Key Lab of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;
..............page:826-831
An advanced GPSR routing protocol based on two hops and adaptive beacon mechanism for aeronautical use
JIA Hangchuan;LV Na;ZHANG Hengyang;OUYANG Chao;ZHANG Weilong;School of Information and Navigation;Airforce Engineering University;
..............page:832-837
Distributed network traffic optimization based on random ADD algorithms
LIU Lin;YANG Lifang;Computer College;Chongqing College of Electronic Engineering;
..............page:838-844
Channel coding in the data link of unmanned aerial vehicle
YU Gefei;WANG Zhenhua;LI Ying;HAN Hui;Chongqing Communication Institute;
..............page:845-849
Symbol property accurate weight clustering method based on information entropy
CHEN Xiaohui;ZHANG Gongxuan;School of Computer Science and engineering;Nanjing University of Science and Technology;School of Computer Science and Technology;Huaiying Normal University;
..............page:850-855
Blind evaluation of blocking artifacts in images based on machine learning
WANG Lufeng;LIU Huiyuan;Chongqing Industry Polytechnic College;Chongqing Industrial School;
..............page:856-860
Fuzzy comprehensive evaluation of online e-journal based on principal component analysis
HE Xiangang;MA Yue;XIAN Shidong;WANG Cai’e;Chongqing University of Posts and Telecommunications;School of Software;Chongqing University;
..............page:861-865