Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 1
Study on practical fuzzy control system of traffic signal
ZHU Ming-lin;CHEN Yang-zhou
..............page:65-67
Study on robot inverse calibration
WANG Dong-shu;FU Zhi-qiang
..............page:71-73,76
Fast recovery of real-time database based on fuzzy dependency
LIU Yun-sheng;KAN Xiao-feng
..............page:74-76
A prototype selection algorithm based on voting mechanism
REN Jiang-tao;QIU Zheng-yuan;JI Qing-ge
..............page:77-79
Applications of sequential learning ahead masking model to T cell epitope prediction
ZENG An;PAN Dan;ZHENG Qi-lun;PENG Hong
..............page:80-83
Design of an immune model based on fuzzy pattern recognition
FU Hai-dong;YUAN Xi-guo
..............page:89-91
On-demand secure routing protocol based on ARAN
TIE Man-xia;LI Jian-dong;HUANG Zhen-hai
..............page:92-94
LDC-mine:algorithm for mining outlier based on local deviation coefficient
ZHANG Chang;QIU Bao-zhi
..............page:95-97
New research on DDoS/DRDoS attacks IP traceback based on HMAC
HU Zhi-gang;DAI Zhao;ZHANG Jian
..............page:98-101
Study on enhancing the capability of secure access in VPN system based on distributed security Agent
DONG Gui-shan;MENG Jiang-tao;LU Xian-liang
..............page:102-104
Mining positively correlated frequent itemsets
wang chun kai ; li zuo zuo ; fan ming
..............page:108-110,142
Reputation system for wireless sensor networks based on β distribution
FENG Jian-zhao;XIAO De-qin;YANG Bo
..............page:111-113,117
Research on attribute-based authorization and access control
SHEN Hai-bo;HONG Fan
..............page:114-117
Image encryption algorithm based on m-sequence integer modulation and image scrambling
LIU Jia-sheng;HUANG Xian-wu;ZHU Can-yan;ZHANG Yan;Lü Wan-li
..............page:118-121
Design and implementation of an attribute authority system
LIU Xin-tao;CAO Yuan-da
..............page:125-127
Intrusion detection method based on clonal network clustering
ZHANG Zhe;BAI Lin
..............page:128-131
New semi-fragile watermarking for JPEG image authentication
TIAN Bing;WANG Wei
..............page:132-134
Performance enhancement of DS/SS system using chaotic spreading sequence
ZHANG Zhi-yu;XIAO Wei;YE Jia-lu;ZHANG Jiu-long;Lǖ Yan-jun
..............page:135-138
Statistical three-class user authentication approach based on user's keystroke patterns
FU Bo;WANG Xuan;MA Jian-feng
..............page:139-142
Fast auto-focusing algorithm of two-layer objects in microscopy
XUAN Bo;MIAO Li-gang;PENG Si-long
..............page:143-145,148
Surface modeling based on 4-point subdivision scheme with two parameters
REN Shui-li;ZHANG Kai-yuan;YE Zheng-lin;ZHAO Hong-qing
..............page:146-148
Automatic medical image segmentation based on gradient vector flow
HE Yuan;LUO Yu-pin;HU Dong-cheng
..............page:149-151
Study on algorithm for skeleton features extraction of hand vein image
ZHANG Jin-yang;SUN Mao-hang
..............page:152-154
Shot boundary detection method based on SVD
HU Shuang-yan;LI Jun-shan;LI Jian-jun;WANG Rui;YANG Wei
..............page:155-156,159
Texture image segmentation based on Gabor wavelet using geodesic active contour model
WANG Kai-bin;YU Bian-zhang;ZHAO Jian
..............page:157-159
Study on edge detection of multi-spectrum remote sensing image based on cloud
XUE Li-xia;LI Yong-shu;WANG Zuo-cheng
..............page:160-162,165
Infrared image segmentation based on fast Level Set method
LIANG Min;ZHANG Ke;ZHANG Wen-luan
..............page:163-165
Control chart patterns recognition based on support vector machine
WU Shao-xiong;HUANG En-zhou
..............page:61-64
Fuzzy clustering analysis based on genetic algorithm and its application
QIN Jun-hua;ZHANG Hong-wei;ZHAO Shi-zheng
..............page:52-55
A calculation method of Lyapunov exponent and its realization
FENG Ming-ku;QIU Shui-sheng;JIN Jian-xiu
..............page:50-51,55
SVM multi-class classification based on kernel clustering algorithm
CHEN Zeng-zhao;YANG Yang;HE Xiu-ling;YU Ying;DONG Cai-lin
..............page:47-49
Compound kernel function of support vector machines
ZHANG Bing;KONG Rui
..............page:44-46
Chaotic time series forecasting based on dynamic recurrent neural networks model
MA Qian-li;ZHENG Qi-lun;PENG Hong;ZHONG Tan-wei
..............page:40-43
A new effective KeepAlive arithmetic used in embedded application
WANG Peng;XU Yi
..............page:38-39,138
Implementation of Agent-oriented programming platform based on O-O
CHEN Zhen-bao;ZHANG Jing;LI Jun-huai
..............page:35-37
Design of conformance testing based on MSTP protocol
HE Qiang;ZHANG Zu-ping
..............page:27-29
Research of dynamic load-balancing algorithm for parallel graphics rendering
PENG Min-feng;ZEN Liang;LI Si-kun
..............page:166-168
Method for fingerprint image binarization using difference
CHEN Da-hai;GUO Lei;CHANG Jiang;LI Hai
..............page:169-171
Improved fingerprint feature extraction algorithm based on ARM
YOU Lin-ru;DING Fei;LAO Zhong-jian;BI Shu-e
..............page:172-173,188
Endoscope show and measure of industrial computer tomography based on improved Snake model
ZENG Li;YUE Xiu-juan;HOU Li-hua
..............page:177-179
Study on the retrieve and re-use method of business process performance model repository
ZHOU Jian;LI Qing;XIAO Tian-yuan;LIU Xin;ZHAO Jing-liang
..............page:180-182,185
Extension and verification of Petri-net models
JIANG Yang;LUO Gui-ming
..............page:183-185
Study of cadastral data loading based on MapObjects and ArcSDE C-API
HE Yu-bing;ZOU Le-jun;SHEN Xiao-hua;LU Shan-long
..............page:186-188
Strategy of constructing minimum energy clusters in wireless sensor networks
TANG Bo;LUO Chang-jun;ZHOU Ming-tian
..............page:13-14,43
Design and implement of registering component by user in virtual laboratory
ZENG Xue-hui;YANG Lu-ming
..............page:189-192
Hierarchical UI design approach supporting multi-device interaction
GAO Huai-jin;SUN Jian-an;SHI Bing;LI Xiao-long;HOU Jin-kui
..............page:193-195
Multi-layer matching method on semantic Web services
ZHONG Mei;SONG Shun-lin
..............page:199-201,204
Clustering-based feature selection in text categorization
ZHANG Wen-liang;HUANG Ya-lou;NI Wei-jian
..............page:205-206,209
Query expansion based on local classification analysis
FENG Yun;CHEN Zhi-Ping
..............page:207-209
Efficient data organization for large scale parallel numerical simulation
LIAO Li;XU Ping-jun;ZHANG Ai-qing
..............page:213-215
Localization of moving object in color video based on ASM
GU Mei;XU Tao
..............page:234-236
Motion object detection using wavelet transform and texture feature
MA Xiao-kai;LI Shao-fa
..............page:237-239
Dual watermarking algorithm for copyright protection of digital images
WANG Ting;LIU Jiang;WANG Xi-chang
..............page:240-241,245
Design and implementation of a mechanism to recover from failed network processes
LI Hai-shan;DAI Zhen;YANG Shen-chun;YUAN You-guang
..............page:242-245
Colorized linear CCD image acquisition system for core image acquisition
LIU Bo;QING Lin-bo;WU Xiao-hong;TENG Qi-zhi
..............page:246-248
Design and realization of a model on computer performance monitoring
DAI Da-meng;LI Hu-xiong;CHEN Sai-pin
..............page:252-253,256
Design of USB interface for data recorder based on ARM
WANG An;QIAN Xiao-liang;FAN Wen-xia
..............page:254-256
Study on currency intelligence detection and control node of train network
FAN Ze-ming;SHENG Zhi-lin;QI XIN-zheng
..............page:25-26,29
Retransmission-aware energy efficient routing protocol based on AODV
BAO Yan-ru;SHU Yan-tai;CHEN Hai-ming
..............page:22-24,34
Adaptive semi-blind multiuser detection based on LMS
MENG Yan;WANG Jin-kuan;SONG Xin;ZHU Jun
..............page:19-21
Grid resource reservation algorithm based on periodical double auction
TIAN Dong;CHEN Shu-yu;WU Chang-ze
..............page:15-18
Formalizing multiple instance workflow patterns based on the π-calculus
LIANG Ai-nan;LI Chang-yun;HUANG Xian-ming
..............page:219-220,224
Research on junk SMS filtering system on mobile environment
DENG Wei-wei;PENG Hong
..............page:221-224
Parallel system model of Web information retrieval
YANG Tian-qi;ZHOU Ye
..............page:225-227
Study on the integration of SPC/EPC and its key technologies
CHU Wei;SUN Shu-dong;YU Xiao-yi
..............page:228-230
Transcoding Scheme for MPEG-2 to H.264
YANG Lei;DAI Ju-feng;SONG Xiao-wei;HOU Chun-ping
..............page:231-233
Centroid-based distributed clustering scheme for wireless sensor networks
JIANG Shao-feng;YANG Ming-hua;SONG Han-tao;WU Zheng-yu;WANG Jie-min
..............page:1-3,6
Effective distributed clustering in wireless sensor networks
LIU Qin;WANG Fu-bao;MA Jun-yan;YAN Guo-qiang
..............page:4-6
Code-based MAC algorithm for sensor networks
CHEN Kai;LIN Ya-ping;YI Ye-qing;ZHANG Jian-ming
..............page:7-9
Feed-back clustering algorithm based on coarse data correlation in sensor networks
NIE Ya-lin;LIN Ya-ping;ZHOU Si-wang;WANG Hai-jun
..............page:10-12,18