Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2009 Issue 12
Research and improvement of LEACH protocol in wireless sensor networks
chen xue jiao ; li xiang yang
..............page:3241-3243
Design and implementation of P2P-VoD system based on BitTorrent
fang xiang ; wang wen yong ; tang yong
..............page:3244-3248
Method for estimating network structure of short term traffic flow forecasting model
xia ying ; liang zhong jun
..............page:3249-3252
Research on genetic algorithm based on asynchronous simulated annealing
tang tian bing ; xie xiang hong ; wei ling yun
..............page:3253-3255,3269
Radar echo frequency spectrum estimation based on αstable distribution covariation
long jun bo ; cha dai feng ; jiang yu lin
..............page:3224-3226,3230
Enhancement of topology preservation of self-organizing map
zhou xiang dong
..............page:3256-3258
Using CPSO-SVM and data fusion to calibrate temperature characteristic of thermal sensor
huang wei yong ; tong min ming ; ren zi zuo
..............page:3259-3262
Double coefficients support vector machine with probability and equivalence class
wang lin ; zuo de qin ; liang hong xia
..............page:3263-3266,3276
Particle swarm optimization algorithm with multidimensional asynchronism and stochastic disturbance
chen jun yan ; qi er shi ; liu liang
..............page:3267-3269
New particle swarm optimization algorithm with global-local best minimum
wu lin li ; zhao hai na ; wang tao ; liang hua
..............page:3270-3272
Chaotic particle swarm optimization algorithm based on nonlinear conjugate gradient algorithm
chen hong an ; zhang ying jie ; wu jian hui
..............page:3273-3276
Mean-Shift tracking algorithm based on FCM
tian cun wei ; ge guang ying ; shen zhe
..............page:3332-3335
Mean-Shift tracking algorithm with adaptive bandwidth of target
lin qing ; chen yuan xiang ; wang shi tong ; zhan yong zhao
..............page:3329-3331,3335
Research of metallographic image segmentation algorithm
liao zheng quan ; zuo qi zhi ; luo dai sheng
..............page:3326-3328
Multi-objects colorful segmentation algorithm for complex background
li hong bo ; wang zuo ; wu yu
..............page:3322-3325
Algorithm of C-V model combined with image entropy
ye bing gang ; jiang tao ; luo chao hui ; wu xiao ming
..............page:3320-3321,3339
Filling method for massive void data region of SRTM
li xin chun ; nan jian guo ; sheng rui
..............page:3317-3319
Sub-region data structure and its composition algorithm in pattern generator
zhang bo ; tang xiao ping ; yang yong ; yan wei
..............page:3314-3316
Improved super resolution reconstruction method for video sequence
yuan zuo ; jing shu xu
..............page:3310-3313
Cellular gene expression programming algorithm based on stack decoding method
yang liu ; he zuo ; pan xiao hai
..............page:3280-3282,3286
Fast outliers mining algorithm based on unit cell
cui guan xun ; li liang ; wang yong ; ni wei ; huang li feng
..............page:3300-3302
Study on location-based spatial queries with shared client results in mobile environments
sun xiao pei ; zhu yu quan ; chen geng ; sang qiu
..............page:3293-3295
Implementation of low cost network data transmission and storage system based on FPGA
he yi hua ; yi qing ming ; shi min
..............page:3238-3240,3243
Research of topology control algorithm in wireless mesh networks
li jia ; zhou jie
..............page:3235-3237,3248
ZIP2 strategy of limited resources under environment of continuous double auction
chen sheng feng ; wei cheng jian
..............page:3231-3234
New fast algorithm in DSP FIR filter design
yang cheng ; ma yong jie
..............page:3221-3223
Parallel algorithm of matrix multiplication based on Biswapped network
wei wen hong ; li qing xia ; wang wen feng
..............page:3218-3220
Research on relational-algebra-based schema mapping of data integration
yang yue ; guo shao zhong ; he xiao zhong
..............page:3290-3292,3306
Research and application of integrated grey support vector machine model
lin yao jin ; zhou zhong mei ; wu shun xiang
..............page:3287-3289
Research of context-based personalized customer behavior model
he hong zhou ; zhou ming tian
..............page:3283-3286
Chaos control based on pulse-coupled neural networks
wang xin ; ma yi de ; xu zhi jian ; li lian feng
..............page:3277-3279
Vision based dimension measurement method for SMT stencil
zhang wu jie ; li di ; ye feng
..............page:3375-3377,3387
Space domain approach to motion-blurred parameter identification
wu zhen yu ; yao hong li ; du shao jun
..............page:3378-3380
PC-based training of simulator of flight command system
liu jian de ; jiang guo hua
..............page:3413-3415,3448
Minimum digital video capture and display system based on Blackfin533 platform
wang zhi zhong ; xing yan chao
..............page:3416-3417,3421
Video-based simulation of landscape effects in real-time
wang chang bo ; wu liang ; zuo tian jiao ; sheng xiao yong ; xiao zhao ; chen xiao
..............page:3418-3421
Scene tune recognition and detection in film videos
yu jun qing ; huang yue
..............page:3422-3426
Kids-centered and context-aware human-computer interaction approach
zhang xiao long ; wu zhong hai ; lu yun geng ; liu hong zhi
..............page:3427-3430
Multi-channel watermarking scheme based on HVS for color image in DCT domain
bei yi lin ; sang sheng ju
..............page:3431-3433
Novel approach for feature extraction of texture images
liu ming xia ; hou ying kun ; guo xiao chun ; zhang yan ; yang de yun
..............page:3434-3436
Design on assembled real-time management system for engineering flight simulator
lu rui jie ; shen wei qun
..............page:3388-3390,3397
Adaboost face detection algorithm based on correlation of classifiers
zhang jun chang ; li zuo ; jia jing
..............page:3346-3348
Face recognition based on symmetrical linear discriminate analysis
wang wei ; zhang ming
..............page:3352-3353,3356
Singular points detection method in tented arch fingerprints
cheng xin ming ; xu dong cheng ; li tian ; dai zuo ; liu hui
..............page:3354-3356
Chinese minority script identification method based on wavelet feature and MQDF
guo hai ; zhao jing ying
..............page:3360-3362,3365
New HHT-based handwritten Chinese character recognition method
song wan gan ; yang yang ; li xin
..............page:3363-3365
Convective cloud identification algorithm based on weather radar image
zuo jun ; he xiao hai ; wang hai mei ; wu xue hong
..............page:3366-3368
Medical ultrasound image denoising based on improved anisotropic diffusion equation
li zhen heng ; sun feng rong ; liu fen ; wang qing hao ; geng jun qing ; qin xiao hong ; yao gui hua ; zhang yun
..............page:3369-3371
Two-step denoising model based on human visual property
shu yu qiang ; yang hong yu
..............page:3372-3374
Simulation of falling snow based on new distribution of domain and superimposed texture
wang jian feng ; wan ming xiu ; chen zuo
..............page:3381-3384
3D flight track and 6-DOF flight simulation based on Google Earth
tang yong ; liu chang zhong ; wu hong gang
..............page:3385-3387
Design of multimedia information display system based on template
yang yi jun ; zhou bin
..............page:3391-3393
New method for component reuse
he jian li ; chen zuo ; gu wei zuo
..............page:3394-3397
Validation of processes via Windows kernel mode driver
qian tao ; zheng kou gen
..............page:3398-3399,3402
Calculation of left ventricular volume based on GVF model and optical flow field
wei yu ; yang xiao mei ; huang shan
..............page:3400-3402
Ear recognition based on improved 2D principal component analysis and neural network
liu jia min ; liu qiang ; zhu zuo jun
..............page:3357-3359
Script virus and technology of monitoring registry table based on API HOOK
li zuo ; ning chao
..............page:3197-3200
Energy efficient dynamic pairwise key establishment algorithm for sensor network
yuan shuai ; zhou shun xian ; wang lei ; zhang bei
..............page:3194-3196,3203
Answer extraction application based on dependency semantic analysis
luo qiang ; yu hong shuang
..............page:3403-3405
Option pricing based on mixture Kalman particle filter
wang fa sheng ; zhang ying bo ; dong zong ran
..............page:3406-3408
XML update control method based on security update views
guo jin kai ; bai wen yang ; liu ming
..............page:3409-3412
New contour extracting method of MR-CT images
li yan ; li gang
..............page:3343-3345
Regional weighted comentropy and its application in image feature extraction
li ai guo ; ma zi long
..............page:3340-3342
Micro-sensor driven human model for 3D real-time movement
li gang ; wu zheng ; meng xiao li ; wu jian kang
..............page:3336-3339
Research on self-learning mechanism in symbol recognition system of architecture drawings
lu xian wei ; yang ruo zuo ; cai shi jie
..............page:3437-3441
Research and implementation of cloth simulation algorithm based on PhysX physics engine
su xin xin ; li xue qing ; qi bin
..............page:3445-3448
Laplacian editing and its improvement on OpenMesh platform
hu su mei ; li gui qing
..............page:3449-3452
Location-based push service system of tourism information
tian lei ; guo tong qiang ; ji shou cun ; wu bin zuo
..............page:3453-3457
tou gao zhu yi shi xiang
..............page:封3
New routing algorithm based on geographical location: GPSR-AD
li dao quan ; liu hai yan ; cao qi guang ; wang huai cai
..............page:3215-3217
Simulation studies on chaos demodulation of weak BPSK signal based on Simulink tools
gao qing shan ; zhang tian zuo ; huang zuo ; yu lu qin
..............page:3211-3214
Cost optimization model of relay based B3G/4G cellular network
wei yun kai ; mao yu ming ; yu qin
..............page:3207-3210
Research on aspect oriented open grid services architecture
ge jun wei ; shen yu ; fang yi qiu
..............page:3204-3206,3210
Credit evaluation model based on fuzzy logic
zuo jing long ; cui de long ; yu gui lan
..............page:3201-3203
Software watermarking algorithm based on inverse number of expression
jiang hua ; sha zong lu ; xuan ai cheng
..............page:3188-3190
CDPM: An improved packet marking tracking scheme
xu jin song ; huang ru cheng ; wang yuan jie
..............page:3185-3187,3200
Steganography algorithm of image in multiwavelet domain based on grey relational analysis
wu yue hong ; zhang zuo sen ; zhu xin gang
..............page:3182-3184
Information security risk assessment method based on extensible set
xiao min ; fan shi xi ; chai rong ; yang fu ping
..............page:3178-3181
Exploration of key points for attack of MD5 algorithm
mao ming ; qin zhi guang ; chen shao zuo
..............page:3174-3177
Survey on storage-oriented regular expressions matching algorithms
yao yuan ; liu peng ; dan zheng ; tian shuang peng
..............page:3171-3173,3177