Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue z1
Encoding scheme and system based on multi-information segment
CHEN Lin;LIU Yu;ZENG Jun-fang
..............page:273-276
New rural-area cooperative medical-care system based on UML
LU Gang;FENG Chang-qi
..............page:376-377,381
Optimized model for postal transportation network and its solution
WANG Wen-zhao;DING Gen-hong;QIU Yu-liang
..............page:378-381
Positioning algorithm with three satellites based on Chinese area position system
JIA Guang-yi;LI Guo-tong;ZHU Qiu-fang
..............page:384-386
Cooperation organization management system of electric power production based on workflow technology and B/S architecture
zhou yu; zhou yu ; wang zuo ; zhao hong bin ; ni ping hao
..............page:387-389
Conference system based on smart phones
LI Zi-jing;CHEN Xiao-hua
..............page:390-392
Emergency preparedness and response system of environmental pollution accident based on GIS
XIN Yan;WEI Zhen-gang;GONG Li-li
..............page:393-395,398
gao yue
..............page:封2
Survey on automatic structural test data generation using evolutionary algorithms
CHEN Yong;ZHONG Yong;LIU Yong
..............page:277-279,347
Development of client system for network data obtaining system
CHEN Yin-peng;GUO Li
..............page:260-262
Design of RFID middleware in storage management
DI Fei;ZHAO Wei-dong;ZHOU Zhi-ping;PENG Rui;JI Jun
..............page:257-259,262
Method of multi-serial communication by using VC + + 6.0
WANG Zhong-xun;XU chao;WANG De-fa
..............page:254-256
Algorithm for automated test data generation based on branch function linear approximation
HU Yu-zhou;WANG Lei;GU Xue-dao
..............page:250-253,256
Simulation of 3D ship waves
HU Yi-xiao;JIANG Yu-ming
..............page:247-249
Realization of trains operation visual simulation and unexpected special effects
HU Min-cong;LANG Cheng-lian;XU Xian-quan;JIANG Wei-dong;NIU Qing-hua
..............page:244-246
SVBSMP: Self-adaptive variable block size memory pool
WU Jie;TAO Zhi-rong
..............page:280-283
Information systems integration based on shared fundamental data
WANG Yuan;WU Jin-zhao;YANG Shi-han
..............page:284-286
New OS paging algorithm based on Markov process prediction
NI Sheng-qiao;WANG You-wei;TANG Chang-jie
..............page:287-290
Workflow model based on colored Petri net
GONG Ling-ling;ZHONG Yong
..............page:291-294
Query processing in Web information integration system
WANG Xiao-fang;LIU Peng
..............page:295-297,301
Pagination technology of Web-based database using Struts framework
HUANG Li-qiao;LU Xin
..............page:298-301
Design and implementation of software firewall supporting dynamic evolution
LI Kai-tuo;HU Yu;ZHANG Jia-chen
..............page:302-304
Research and implementation of hardware activation strategy based on WMI
LI Lei;XIA Ke-jian
..............page:305-306,309
Research and implementation of SOA developing framework
XU Li-ming;YAO Yao-wen
..............page:307-309
E-government oriented lightweight workflow engine
DU Chuan-ye;LI Ru
..............page:310-311,314
Efficiency analysis of HASH algorithm in Wince .embedded system
ZU Ke-ke;ZHENG Yu;HE Da-ke
..............page:312-314
Workflow process model based on Web services
SONG Feng;ZHANG Chun-hai
..............page:315-317
Organization method for main memory database
LUO Qing-song;LUO Lei
..............page:318-320,323
Web printing technique based on LAMP frame
PENG Tu-you
..............page:321-323
DBSCAN spatial clustering algorithm and its application in highway alignment selection
CHEN Li-chao;NIE Yue-guang;LI Jing;JIANG Yan
..............page:324-326
Design of terminal system based on DSP for mobile dual-polarized weather RADAR
SHE Yong;LI Yun-hong;HUANG Zhong
..............page:327-329,332
Prediction of smuggling trends based on improved BP neural network
GAO Hui-kai;WANG Chen;ZHANG Jing;JIA Lin-chuan
..............page:330-332
Application of GPS in travel time survey
HU Xiao-wen;YANG Dong-yuan;WANG Xiao-kun
..............page:355-357
Research on data processing and application model of digital ocean
WANG Xiao-min;ZHANG Xin;CHI Tian-he
..............page:358-359,363
KWMD: Water mass division algorithm based on k-means cluster method
GAO Cun-bin;QIN Bo;HONG Feng
..............page:360-363
Tourist routes vehicle delivery with fuzzy variables
CUI Zhao-quan;LIN Liang;CHEN Xi
..............page:364-365,368
Design and realization of core component for power monitoring software system
CHEN Peng-peng;GUO Zhong-wen;PAN Hong-hua;ZHANG Bing-jian
..............page:366-368
Securities clients analysis system based on data mining
ZHANG Xiao-yan;QI Chun-ying
..............page:369-371,375
Integration framework of enterprise legacy systems based on business service
ZHANG Yi-chuan;WANG De-shuai;LIU Ying;ZHANG Bin
..............page:263-265,269
Modeling and simulation of free space optical communication networks
LI Zhi-peng;ZHANG Jian-wei;WANG Liang
..............page:241-243,246
Real-time simulation of rain and snow based on particle system and Vega software
YANG Shu-hua;LIAO Shou-yi;WANG Shi-cheng;ZHANG Jin-sheng
..............page:238-240
Synthesis of virtual camouflage scene in visual band
ZHANG Yong;WU Wen-jian;LIU Zhi-ming
..............page:235-237
Simulation research on networked control systems
NIU Zhi-ping;XIA Xu-qiang;QU Lin-lin;ZHAO Yong;CAO Xue-wu
..............page:232-234
mproved GVF snake model
WANG Rong;ZHANG Rong-guo;WANG Yan-yan;LIU Kun
..............page:226-229
Identification of blur direction from motion blurred image
JIANG Hua;LIU Guo-qing;CHENG Xiao-gang
..............page:220-222
Automatic detection of contour tongue image based on active contour model
WU Rong-qiu;WANG Wei-min;YANG Jun-hua;FU Hong-guang
..............page:217-219
Performance comparison of image edge detection algorithms
ZOU Fu-hui;LI Zhong-ke
..............page:215-216,219
Document image skew detection based on mathematical morphology
ZHANG Ji-ling;WANG Xi-chang;LIU Jiang
..............page:213-214
Optimization of EBCOT algorithm in JPEG2000
ZHU Wen-wen;LIU Li-zhu
..............page:210-212
Medical image registration using improved genetic algorithm
SONG Wei-jie;ZHU Bing-lian;ZHOU Su-jie
..............page:207-209
Image segmentation method based on attribute mean clustering
YANG Ying-mao;RUAN Bo;WANG Xun
..............page:204-206
Nesting algorithm with multistage optimization
JI Hua;YU Zhi-lou
..............page:333-336
VideoGIS based on multimodal metadata
ZOU Yong-gui;XIE Ping;FENG Jiang-fan
..............page:337-339,343
Research and design of multi-sensor ranging system on mobile robot
LIANG Yu-ming;XU Li-hong
..............page:340-343
Research on flow prediction model for holiday tourism
WANG Rui-jie;YIN Yi-xin;DU Jun-ping;TU Xu-yan
..............page:344-347
Remote sensing semantic model for city planning
YU Jing
..............page:348-350,354
Geomagnetic-matching technology based on improved ICP algorithm
REN Zhi-xin;LUO Shi-tu;WU Mei-ping;LIU Ying
..............page:351-354
Image edge detection based on dual tree complex wavelet transform
ZAI Wen-jiao;WANG Hua-zhang
..............page:202-203,206
Real-time detecting and tracking of multiple moving object based on improved motion history images
LIU Jun-xue;QU Zhen-shen;REN Hang-hang;GUO Jun;WEN Fan
..............page:198-201
Fingerprint image binarization based on symmetrical orientation filter
JIA Zhe;LI Lin-sheng;TIAN Qi-chuan;ZHANG Yong-liang
..............page:196-197,249
Geometric active contour method based on support value transform for contour extraction
YANG Chang-cai;ZHENG Sheng;YE Jin
..............page:193-195
Building figure extraction in satellite images based on line detection algorithm
PANG Chi-hai;LI Guang-yao;ZHAO Jie;ZHU Heng-ye
..............page:190-192
Radar imaging of random signals based on chaos
LIU Shi-hua;WANG De-shi
..............page:187-189,192
top-k': Approximate algorithm of maintaining dynamic top-k sets in distributed environment
TIAN Hai-sheng;CHEN Li-jun;QIU Hai-yan;ZHAO Jing
..............page:169-171,174
Performance synthesis analysis system based on data warehouse
LUO Kun-li;LI Zhi-shu
..............page:166-168
An efficient intra mode decision algorithm
WANG Ying-kun;XU Bo-qing;YANG Hua
..............page:183-186
Fast intra mode selection for MPEG-2 to AVS video transcoding
CHEN Chun-han;ZHANG Xin-chen
..............page:177-179
Improved model for robust and effective decision tree
BU Ya-jie;HU Chao-ju;BAI Lan;DONG Na
..............page:172-174
Design and implementation of digital content protection under workflow environment
ZHUANG Jie;Lü Zhao;GU Jun-zhong;ZHANG Wei-xiang
..............page:85-88
Survivability-oriented taxonomy of network attacks
ZHANG Lei;DAI Hao;MA Ming-kai
..............page:63-65,70
Real-time AES decryption system for DCSS
WANG Xi-shuang;ZHU Zhen-hua;WANG Guo-hui;WEI Zheng;LI Ling;WANG Zhen-song
..............page:59-62
Research on security assurance architecture of E-government
WANG Zheng;HAN Wen-bao;LIN Yi;LI Jian-jun
..............page:55-58
An extended mining algorithm for the security audit of workflow system and its application
ZHANG Wei-xiang;Lü Zhao;GU Jun-zhong;ZHUANG Jie
..............page:82-84
Association rule application in log mining of WAP value-added service
CHENG Qi-jiang;Lü Shu-wang
..............page:163-165
Research on dynamic data mining
TENG Ming-xin;XIONG Zhong-yang;ZHANG Yu-fang
..............page:160-162,165
Influence diagram with interval probability parameters
ZHENG Hai-ying;LIU Wei-yi
..............page:156-159
Effective slide-window width determination in time series similarity search
LI Feng;XIAO Jian-hua
..............page:152-155,159
Faster escaping from local minima for back-propagation algorithm
WEN Dong-lin;LIU Xiao-jun
..............page:25-27
Multi-object intellectual test paper assembling based on adaptive operator genetic algorithm
LIU Ying;WANG Yan;DU Yan;ZHANG Jia-yi
..............page:22-24
DNA computation for integer planning problem with limited range
HU Yu-zhou;WANG Lei;GU Xue-dao
..............page:18-21,24
Mobile intelligent disease diagnosis system based on Bayesian analysis
HU Bi-song;FENG Dan;CAO Wu-chun;FANG Li-qun;GONG Jian-hua
..............page:15-17
Ontology integration based on OWL
zhang zhong-ping; zhang zhong ping ; zhao hai liang ; zhang zhi hui
..............page:10-14,103
Mail community partition and small world network
LI Jun-li;ZHAO Hong-ling;FAN Ming
..............page:146-149
Improved ID3 algorithm based on attribute importance
ZOU Yong-gui;FAN Cheng-hua
..............page:144-145,149
Improved algorithm based on decision tree
QU Zhi-yi;ZHOU Hai-bo
..............page:141-143
Text classification of accident news based on category keyword
ZHANG Yong-kui;LI Hong-juan
..............page:139-140,143
Data prefechting application research
LI Na;ZHANG Li-ping;WANG Li-li;CAO Xin-ping
..............page:136-138
Design and implementation of multicast group state checking system
MA Kun;LIN Zhao-wen;HUANG Xiao-hong;MA Yan
..............page:133-135
Application research based on non-speech information extension in SIP
LIANG Hao-ying;ZHAO Li
..............page:130-132
Blind source separation based on network component analysis
NIE Ling-ye;LI Lei;CHEN Jia-ming
..............page:123-125,129
Intelligent AP selection strategy, in 802.11 WLAN
CHEN Zheng-hao;CHEN Yong-sheng
..............page:120-122
Nonstationary network loss tomography based on recurrent multilayer perceptron
ZOU Lu;HU Guang-min;QIAN Feng
..............page:116-119,122
Communication protocol testing system for CANopen fieldbus device
GU Yan;ZHANG Feng-deng;LIU Rong-peng
..............page:113-115
Lifetime prolonging strategy based on balancing traffic-load in under-water acoustic sensor networks
ZHANG Guang-xu;DOU Jin-feng;GUO Zhong-wen;LIU Gao-ling
..............page:110-112,115
New application of iris recognition based on PKI
YE Mao-cheng;HE Xiao-hu;SHI Peng-fei
..............page:79-81
Reversible data hiding algorithm first using edges and textures
LI Jian-wei;HU Yong-jian;CHEN Kai-ying
..............page:76-78,81
An approach to maintain the integrity of XML signature
SONG Yan-zhao
..............page:73-75
Design of a two-way one-time-password authentication protocol
FAN Yu-tao;SU Gui-ping
..............page:71-72,75
Update-Factor propagation model of worms
ZHANG Dian-xu;ZHANG Yi
..............page:66-70
Method of image encryption and decryption based on iris biometric
CHAI Xiao-dong;YE Xue-yi;ZHUANG Zhen-quan
..............page:46-47,51
Analysis and realization of EAP-TLS authentication mechanism in WLAN
YANG Xin-yu;XU Qing-fei;ZHAO Rui
..............page:43-45
Tele-identity authentication of wireless network based on visual cryptography
CAO Sheng;CHEN Zheng;CUI Zhe;TANG Dan
..............page:39-42
Clustering-based intrusion detection system: a survey
XIAO Min;HAN Ji-jun;XIAO De-bao;WU Zheng;XU Hui
..............page:34-38,42
Summarization of steganalysis technology
CHEN Ming;ZHANG Ru;NIU Xin-xin;YANG Yi-xian
..............page:31-33
Adaptive particle swarm algorithm with hybrid mutation operator
AN Xiao-hui;GAO Yue-lin
..............page:28-30
Study of iterative learning control in PID controller
LI Yu-ren;ZHANG Lin;ZHENG Hong-min
..............page:5-6,9
Design and implementation of secure module in MSN client
FENG Meng;ZHANG Bin;ZHANG Peng;XIONG Hou-ren
..............page:101-103
Research and application of LDAP in uniform identity authentication
LI Xiang;CHA Ai-nong;LIU Meng-qiang
..............page:98-100
Simulation study on active frame dropping strategy for wireless media streaming
HUANG Xiao-yan;BAI Guang-wei
..............page:107-109
Research on remote-thread injection based hidden process technology
HE Zhi;FAN Ming-yu;LUO Bin-jie
..............page:92-94
Fair E-commerce protocol suitable for digital goods transaction
GUO Xun;ZHAO Yang;QIN Zhi-guang
..............page:89-91