Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 6
Optimal node density control algorithm based on cooperation in WSNs
YANG Bai-wei;YU Hong-yi;ZHANG Xia
..............page:1493-1496
Iris recognition based on the analysis of local regions
LU Guang-ming;YANG Wen;LIAO Qing-min
..............page:1490-1492
Line type identification method based on least trimmed squares
KANG Chuan-li;YAO Lian-bi
..............page:1488-1489,1492
Study on recognition for parasite ovum images based on new method of feature extraction
LUO Ze-ju;SONG Li-hong;WU Xiao-ming;ZHAN Xi-mei
..............page:1485-1487
Algorithm of accurate eye detection of frontal facial images
MA Yu;WANG You-gang;CHEN Lu
..............page:1482-1484,1487
Visual and quick method of smoothing interpolation curve
HE Kun-jin;CHEN Zheng-ming
..............page:1479-1481
Improved image registration based on second-order mutual information
CHEN Bei-jing;LI Jun-li;CHEN Gang
..............page:1475-1478
Gait contour extraction based on improved snake model
LI Xiao;LI Ping;WEN Yu-mei;YE Bo;GUO Jun
..............page:1468-1471
MRI image denoising based on improved wavelet thresholding
ZHANG Hai-jian;CHEN Xiang-dong;XING Hao-yang
..............page:1465-1467
Study on general extracting method of Web topic text
PU Qiang;LI Xin;LIU Qi-he;YANG Guo-wei
..............page:1394-1396
Online self-maintenance of materialized view based on source view increment
LIU Hai;TANG Yong;CHEN Qi-mai
..............page:1397-1399
New clustering method based on hybrid of SOM and PAM
ZHANG Zhao;WANG Suo-zhu;ZHANG Yu
..............page:1400-1402
Application of an incremental updating algorithm in data mining
ZENG Xiao-ning;XIAO Shui-jing
..............page:1403-1406,1410
Regression change-points detection based on fuzzy point data
WANG Hui-hui;WEI Li-li
..............page:1407-1410
Chaos optimization design for a fuzzy-neural network structure
LI Xiang-fei;ZOU Li-hua;PENG Ke
..............page:1411-1414
Improved multiple patterns string matching algorithm
CAI Xiao-yan;DAI Guan-zhong;YANG Li-bin
..............page:1415-1417
LS-SVM parameters selection based on genetic algorithm and its application in economic forecasting
ZHOU Hui-ren;ZHENG Pi-e;ZHAO Chun-xiu
..............page:1418-1419,1429
Software components composition based on interfaces matching
ZHANG Chi
..............page:1420-1422
Development and representation method of business ontology
LIU Yun-jie;GONG Chuan-xin;LIU Tie-lin
..............page:1423-1425
Genetic and tabu search algorithm for the optimization of neural network structure
WANG Shu-ling;LI Zhen-tao;XING Mian
..............page:1426-1429
MIM-based extended model measure the software maintainability
ZHAO Jin-wei;HAO Ke-gang;GE Wei
..............page:1430-1433
Tracking video object based on regional-centroid and vector-direction
ZHANG Bei-bei;XIAO Guo-qiang;JIANG Jian-min
..............page:1502-1504
Title amino acid sequence alognment algorithm based on ant colony optimization genetic algorithm
GUO Jun-en;WANG Shi-tong;XU Hong-lin
..............page:1434-1437
Remote sensing data acquisition and monitor system based on FPGA
YANG Shu-qin;AN Deng-feng
..............page:1442-1444
Research of STEP-based RMS information model and its implementation
GUO Jian-bin;ZENG Sheng-kui;CHEN Yun-xia
..............page:1445-1447,1451
Study on workflow model checking
YAN Zhi-hua;LI Cheng;ZHENG Yan-ping
..............page:1448-1451
New compression algorithm of image sequence coding based on 3-D wavelet transform
HE Tong-lin;YOU Chun-yan;ZHENG Peng
..............page:1452-1454,1457
Research and implementation of denoising algorithm for low-Illumination image
PENG Bo;WANG Yi-ming
..............page:1455-1457
Research and implementation of granule separation based on H-dome reconstruction
WANG Shu-mei;ZHAO Wei-dong;LI Ji-chao
..............page:1458-1459,1462
Effective de-blocking algorithm for block-DCT images
SHI Min;YI Qing-ming;LIU Jin-mei
..............page:1460-1462
Image classification based on transductive support vector machines
SHEN Xin-yu;XU Hong-li;GUAN Teng-fei
..............page:1463-1464,1467
Fine-grained protection domain model in a process and its implementation
WANG Zhi-qiang;HUANG Hao;XIA Lei
..............page:1356-1359
Distributed network intrusion detection system based on Netfilter
WU Zhong;LIU Yan-heng;TIAN Da-xin;ZHANG Yuan-yuan
..............page:1353-1355
Design and analysis of C2C-oriented and reputation-based trust model
JING Bo-xian;XU Feng;WANG Yuan;Lü Jian
..............page:1349-1352,1359
Information disguising for DEM data Via EMD
HE Mi;LUO Yong;CHENG Li-zhi;LI Sheng-guo
..............page:1345-1348
Authentication and key agreement protocol in mobile communication system
TAN Li-ping;LI Fang-wei
..............page:1343-1344,1348
Application of Online SVM in real-time intrusion detection
LI Heng-jie
..............page:1339-1342
Study on recommendation algorithm based on multi-level association rules
YU Xiao-peng
..............page:1392-1393,1402
Pixel-level image modification authentication algorithm
XIE Jian-quan;YANG Chun-hua
..............page:1337-1338,1342
Design and implementation of low-cost embedded interconnected system
WANG Qin-yu;MA Wei-hua
..............page:1334-1336
Analysis of a self-organized network model based on two-dimensional cellular automaton
HE Zheng-qiu;HE Jian-min;ZHANG Ye-lin
..............page:1330-1333
Study of passive communication based on time reversal
SUN Lin;LI Hai-sen;CHEN Bao-wei;YAO Bin
..............page:1326-1329
Research on an adaptive control algorithm with quality of service
OU Xiao-ou;WANG Zhi-li;WEI Jian-xiang
..............page:1301-1303
Research of K-means algorithm based on particle swarm optimization in network intrusion detection
GU Bao-ping;XU Xiao-yuan;GUO Hong-yan
..............page:1368-1370
Intrusion detection based on neural network ensemble
CHAI Chen-yang;SUN Xing-ming;WU Zhi-bin;ZHI Yun-sheng
..............page:1363-1364,1367
Dynamically symmetrical area broadcast algorithm in Ad hoc network
ZHANG Xi-huang;QIAN Shu
..............page:1298-1300
Scheduling algorithms of forward link for CDMA2000 1xEV-DO system
LUO Xing-guo;ZHAO Hai-bo;TANG Xiao-mei
..............page:1293-1297
Particle swarm optimization based degree reduction of rational Bézier curves
JIANG Ming;LUO Yu-pin;YANG Shi-yuan
..............page:1524-1526,1530
New and effective JPEG steganographic content detecting system
TAO Yan-yun;XU Cui-hua;MAO Jia-fa;LIN Jia-jun
..............page:1527-1530
Multiple description coding scheme for P2P VOD system
HONG Ze-guo;ZHENG Quan;WANG Zi-lei;DAI-Wei
..............page:1531-1533,1538
Hierarchy security model for networked storage
CAI Tao;JU Shi-guang;ZHAO Jun-jie;ZHONG Wei
..............page:1534-1538
Improved proxy blind signature scheme
HUANG Hui;QIN Jing;LI Li
..............page:1539-1541
Data fragment algorithm based on granular computing
WU Run-xiu;WU Shui-xiu;LIU Qing
..............page:1388-1391
Attack prediction model based on dynamic bayesian games
CAO Hui;WANG Qing-qing;MA Yi-zhong;LUO Ping
..............page:1545-1547,1550
Fizz network structure mining based on na(i)ve bayes classification
XU Bing;GUO Shao-zhong;HUANG Yong-zhong
..............page:1548-1550
Multitask real-time measurement and control system based on RTX and LabVIEW
GONG Hou-liang;CHEN Zeng-han
..............page:1551-1552,1555
An identity-based signcryption scheme with public verifiability
XU Ji-bin;YE Zhen
..............page:1553-1555
Real-time hair animation of virtual characters
QI Jin;GU Yao-lin
..............page:1556-1558
gao yue
..............page:1559
Using SVM-based LLSI for text classification
ZHANG Qiu-yu;LIU Yang
..............page:1382-1384
Mapping transform of query plan model in grid database based on Petri net
HU Nai-jing;LUO Yuan;WANG Ying-ying
..............page:1378-1381,1391
Gradual gray-watermark embedding algorithm in the wavelet domain
WANG Chang-yuan;PENG Dai-yuan;XU Li;YI Xiong-shu
..............page:1374-1377
Design and implementation of malicious code detection system based on AEC
LI Xiao-dong;LI Yi-chao
..............page:1371-1373,1377
Research of SIP signaling compression algorithm based on LZSS in IMS
JIA Hong;WAN Xiao-yu;FAN Zi-fu
..............page:1320-1322
Design and implementation of interception model in SIP network
GE Lin;XU Tian-shun;MA Hong
..............page:1317-1319
Study of virtual private network based on layer two tunneling protocol
ZHOU Shu;PAN Wei
..............page:1314-1316,1322
Improved scheduling algorithm for real-time uplink services in IEEE802.16e
DONG Guo-jun;DAI Ju-feng
..............page:1310-1313
Capacity of a backbone wireless mesh network using directional antennas
HUANG Li-ying;WEI Gang;JIANG Sheng-ming
..............page:1306-1309
Method for measuring end-to-end minimum packet delay based on simulation analysis
LI Wen-wei;ZHANG Da-fang;ZENG Bin
..............page:1304-1305,1309
Feature extraction and recognition of iris based on ICA-MJE and SVM
HE Zhen-hong;Lü Lin-tao
..............page:1505-1507
Adaptive control of time-varying delay system based on generalize predictive control
GAO Qin-he;WANG Sun-an
..............page:1508-1509,1512
New method for estimation of DOA based on fast independent component analysis
SUN Zheng-nai;XIAO Fang;ZHANG Hong
..............page:1510-1512
IBidi——bidirectional algorithm oriented to information processing
LI Pei-feng;ZHU Qiao-ming;QIAN Pei-de
..............page:1513-1517
Fast reconstruction system of medical images based on VTK
DU Jun-li;GUO Qing-yu;HUANG Xin-han
..............page:1518-1520,1523
Application of dynamic array in reliability and maintainability simulation
YU Yu;DENG Zhi-ping
..............page:1521-1523