Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 5
Traffic lights recognition algorithm based on Lab color space and template match
xu cheng ; tan nai qiang ; liu yan
..............page:1251-1254
Research of affective computing in intelligent virtual environment
shi lin ; li zhi gang ; wang zhi liang ; zhao wei
..............page:1367-1370
Non-backtracking multipath algorithm for test pattern generation
huang yue ; yu zong guang ; wan shu qin
..............page:1390-1393
CNGI based video surveillance system
sun yan tao ; xu song tao ; shi zhi qiang
..............page:1425-1427,1430
Hardware implementation of task management of μC/OS-Ⅱ
li yan ; cui xiao ying ; li xian yao ; zhao hong jie ; cheng ping
..............page:1386-1389
Automatic location of 3D facial feature points based on local shape map
wang mi gong ; chen duan sheng ; lin chao
..............page:1255-1258,1276
Generating stronger avalanche effect in MD5 algorithm
zhang zuo yan ; zuo de qin
..............page:1206-1208
Techniques for intrusion detection based on adaptive intuitionistic fuzzy reasoning
huang xiao wen ; zhang chi
..............page:1198-1201,1205
Weighted non-negative matrix factorization for incomplete dataset
yang zhi jun ; ye dong yi
..............page:1280-1283,1286
Capacity analysis and simulation for downlink transmissions of BF-MIMO system
guo jian xin ; cao xiao min ; zhang hui ; huo wen jun
..............page:1179-1182
Self-adaptive compensation scheduling algorithm for wireless generalized processor sharing system
li jia zuo ; yu zhen wei ; zhang ying
..............page:1159-1162
Improvement of background extraction and updating algorithm
li ; liu huai yu ; hong liu rong
..............page:1266-1267,1296
Spectral classification of polarimetric SAR images based on polarimetric similarity
li xu ; lin wei ; shi cai yun ; wen jin huan
..............page:1415-1417
Search algorithm based on budget mechanism for unstructured P2P network
wu kai gui ; zeng jia guo ; wu chang ze ; chen ming
..............page:1166-1170
Method for SAR imaging and anti-jamming by alternate frequency modulation
xie chun jian ; guo chen jiang ; xu jia dong
..............page:1383-1385,1389
Fast multi-thresholding approach
li zhe xue ; chen shu yue
..............page:1335-1337,1343
Proxy blind signature scheme based on hyperelliptic curve
chen feng lin ; hu wan bao
..............page:1224-1226
Blind digital watermarking scheme against scaling attack
zhou yong jun ; yin zhong hai ; gao da hua
..............page:1233-1235
Study on reusable test case
yin ping
..............page:1309-1311,1355
High resolution algorithm for direction of arrival estimation based on modified propagator method
liu cheng cheng ; zhao yong jun ; hu de xiu
..............page:1418-1420,1424
Improved congestion control algorithm
chen fei long ; shu qin ; su jing
..............page:1188-1190
Community recommendation algorithm based on dynamic attributes similarity of nodes in social networks
chen qiong ; li hui hui ; xiao nan feng
..............page:1268-1272
Synthesized heuristic task scheduling algorithm for heterogeneous system
zhao huan ; jiang wen ; li xue hui
..............page:1316-1320
Design and implementation of flexible and configuration RFID middleware for mobile devices
chen quan quan ; wang ru long ; peng ang ; zhang jin ; duan zhi min
..............page:1321-1323
Test and analysis of trusted platform module data protection
liu an zhan ; han yu min
..............page:1243-1245
Design and implementation of multi-user encryption file system based on eCryptfs
tang xiao dong ; fu song ling ; he lian yue
..............page:1236-1238,1242
Cultural quantum algorithm for digital filter design
gao hong yuan ; diao ming
..............page:1410-1414
Novel incremental updating algorithm for frequent subtrees
guo zuo ; huang yun ; yan yi ming ; zhou qing ping
..............page:1300-1303
ESPRIT spatial spectrum estimation algorithm based on subspace tracking
guo ying ; liu ji yuan ; kang zhi ; ai ming shun
..............page:1428-1430
Shortest-path algorithm based on direct/indirect adjacent edge concept
wang hong mei ; hu ming
..............page:1297-1299,1303
Semi-fragile digital watermarking algorithm for image content authentication
lv lin tao ; hao liang
..............page:1239-1242
New low-energy security routing protocol for wireless sensor network based on SPINS
peng zhi juan ; wang ru chuan
..............page:1149-1152
Reversible data hiding for color images based on piecewise difference expansion
xiong zhi yong ; wang jiang qing
..............page:1212-1216
Research on private permission in RBAC role inheritance
gao chuan ; zhu qun xiong
..............page:1230-1232,1235
Nonlinear periodic time series model
wang hui zhan
..............page:1394-1397
New mechanism of realizing time-synchronization in LAN based on data link layer
zuo hua jin ; he jia zhou
..............page:1183-1187
Intrusion detection based on rough set theory and kernel matching pursuit
tang ji yong ; song hua ; sun hao ; deng ya ping
..............page:1202-1205
Design and implementation of MAC protocol for wireless sensor network based on ARM
lin yi duo ; gao de yun ; liang lu lu ; zhang si dong
..............page:1145-1148
Bar code localization by extracting edge lines
wu xin sheng ; deng jun
..............page:1246-1250,1417
Definition of a kind of image distance and its application in scrambling quality evaluation
qiao zuo zuo ; wu cheng mao ; tian xiao ping
..............page:1338-1343
Delay-constrained multicast routing algorithm based on optimized Floyd shortest path algorithm
li yuan chen ; liu wei qun
..............page:1176-1178,1182
Enhanced particle swarm optimization algorithm
dai jun ; li guo ; xu chen
..............page:1293-1296
Multiple-compression of DNA sequence data
zhang li xia ; song hong zuo
..............page:1379-1382
Research on centralized network selection in wireless heterogeneous access network
sun su yun ; li yun meng
..............page:1163-1165,1170
Improved exemplar-based image completion algorithm of high reliability
wang qiang ; zou bei zuo ; zhu jian kai
..............page:1331-1332,1401
Aanalysis and improvement of two designated verifier signature schemes
zhang yong jie ; wang cai fen ; zhang yu lei
..............page:1227-1229
Stream cipher algorithm based on chaos
zhang tao
..............page:1221-1223
Approach for enhancing error-correcting capability of T-DMB system
yu shao hua ; ding zhi hong ; liu li zhu
..............page:1421-1424
Research on Java reflection-driven rules engine technology
fei ting wei ; liu shu fen ; qu zhi yong ; han nai fu
..............page:1324-1326,1330
Improved fuzzy clustering algorithm
zhou hong fang ; song zuo zuo ; luo zuo min
..............page:1277-1279
KNN query on P2P networks
liu dan ; xie wen jun
..............page:1156-1158
Normalized mutual information feature selection method based on Renyi\'s quadratic entropy
hong zhi yong ; liu can tao ; deng bao lin
..............page:1273-1276
Digital audio dual watermarking scheme based on wavelet packet analysis
yang jin xia ; ma chao yang ; zhang xue ying
..............page:1217-1220
Entropy-based algorithm to detect relative outliers in dynamic environment
sun hao ; he xiao hong
..............page:1284-1286
New wetland change detection method based on improved independent component analysis
li fang fang ; xiao ben lin ; zhang qian
..............page:1347-1350
Process analyzing method based on virtual machine
gao yong ; fan ming zuo
..............page:1327-1330
Realtime simulation of rain and snow in large-scale scene based on GPU particle system
wen zhi zhong ; liu zhi fang ; li gang ; liang wei
..............page:1398-1401
Image segmentation based on local ant colony optimization
yu wei yu ; zou ruo bing ; yu zhi ding ; tian zuo
..............page:1344-1346
Adaptive failure detection model based on message delay prediction
shi lei ; hou sen
..............page:1312-1315,1320
Core image inpainting based on total variation model
zhou chun chun ; wu xiao hong ; he xiao hai
..............page:1333-1334,1405
Structure of adaptive group of pictures for distributed video coding
yin ming ; zhang yun ; cheng liang lun ; cai shu ting
..............page:1356-1358
Research on new virtual e-book based on finger point location algorithm
guo cheng yu ; yuan zheng peng ; wu jia zuo
..............page:1402-1405
Data reuse in sliding window based on blocked storage
liu tao gang ; zhao rong cai ; yao yuan ; zuo jin
..............page:1371-1375
Mid-term conflict detection algorithm of multi-route conflict probability
cha mu yan ; feng zi liang ; luo shi qian
..............page:1406-1409
Study on distributed certificate authority system based on multi-provider model
wang wei ; ma zi tang ; sun lei ; lu ming long
..............page:1191-1193,1220
Research on sampling algorithm for median query based on wireless sensor network
liu cai ping ; li ren fa ; fu bin ; mao jian pin
..............page:1153-1155,1190
New hybrid intelligent optimization algorithm and its application in multi-objective optimization
zhang han qiang ; lu jian gang ; chen jin shui
..............page:1290-1292
New image encryption algorithm based on composite chaotic system
hu xue gang ; wang yue
..............page:1209-1211
Research and design of survivable network system inspired by biological immunology
xu hui ; zhou jian mei ; cheng xue yun
..............page:1194-1197
Voice activity detection algorithm based on sub-band weighting
zhang ling ; gu yan fei ; he wei
..............page:1262-1265,1279
xin xi
..............page:1208,封3
Data transfer technology based on overlay multi-pathing and parallel TCP
gui yong zhe ; zhang jin yu
..............page:1171-1175,1226
Measurement of system resources health based on state space and its application
zhao ning she ; wang guo qing ; di zheng jun
..............page:1376-1378,1382