Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2011 Issue 2
Watershed segmentation algorithm based on gradient modification and region merging
ZHANG Jian-ming;ZHANG Ju;WANG Juan
..............page:369-371
Fuzzy inference system based on B-spline membership function
LI Jing;TIAN Wei-dong
..............page:490-492,497
Department-role based finely granular access control model in management information system
YAN Jun;SU Zheng-lian;LING Hai-feng;ZHU Liang;ZHANG Jiao-jiao
..............page:523-526
Improved LEACH-ID algorithm for wireless sensor networks
SHI Ye-ling;CHEN Bin-bing
..............page:324-327
Design of fuzzy self-tuning PID controller based on field programmable analog array
WANG Yan;LIU Hong-li;WANG Chao
..............page:466-469,472
Fast construction algorithm based on FP-tree
CHEN Zhi-ping;TAN Yi-hong;LI Xue-yong;LUAN Xi-dao
..............page:438-440,453
Parallel PSO combined with K-means clustering algorithm based on MPI
L(U) Yi-qing;LIN Jin-xian
..............page:428-431,437
Correlation power analysis and implementation on KATAN32 cipher
ZHANG Lei;GU Da-wu;GUO Zheng;ZHAO Jian-jie
..............page:504-506,510
Access technology of remote database integrated Spring and Aglet
HUANG Da-rong;HUANG Hui-min
..............page:458-461
3D flight path planning based on optimized potential field theory
LIU Li-feng;ZHANG Shu-qing
..............page:581-583
Inverse insert algorithm based on segment hash
TANG Ming;SHI Chang-qiong;ZHOU Kai-qing;ZHANG Da-fang
..............page:514-516
Decentralized adaptive control of large-scale nonaffine time-varying delay systems
ZHOU Shu-jie;ZHANG Tian-ping
..............page:478-482,489
Encryption algorithm based on non-uniform B-spline curve
WU Sheng;GUO Xin-yu;XIAO Bo-xiang;LU Sheng-lian;WEN Wei-liang
..............page:517-519
Clustering ensemble method based on co-occurrence similarity
LING Guang;WANG Ming-chun;FENG Jia-yi
..............page:441-445,461
Entropy-based adaptive QoS routing for wireless sensor networks
SHI Wei-ren;YAN Ming-meng;HUANG He
..............page:298-300,319
Collision detection based on topology hierarchy graph
WANG Hai-ling;YIN Gui-sheng;CHEN Huai-you;ZHANG Jing
..............page:347-350
New FCM algorithm based on real-coded chaotic quantum-inspired genetic algorithm for remote sensing image segmentation
LU Bin-bin;JIA Zhen-hong;HE Di;YANG Jie;PANG Shao-ning
..............page:402-405
Range profile target recognition based on second-order fuzzy clustering
PENG Xiang;ZHOU Dai-ying
..............page:399-401
Bayesian network classifier based on PSO with predatory escape behavior
KONG Yu-yan;YAO Jin-tao;LI Qiang;ZHU Sheng-lin;ZHANG Ming-wu
..............page:454-457
New color image multi-level-inpainting method
ZHOU Shan-shan;ZHAO Zhi-jin;YE Xue-yi
..............page:362-365,382
Research and implementation of intelligent selection mechanism in P2P
CHEN Xing-shu;LIN Da-yun;WANG Wen-xian
..............page:293-297
Parameter optimization algorithm for support vector machine based on predatory search genetic algorithm
WANG Ping-ping;MAO Zhi-liang;CHEN Jin-dong;PAN Feng
..............page:498-500
Multi-scale Harris corner detection based on image block
ZHANG Hai-yan;LI Yuan-yuan;CHU Chen-yun
..............page:356-357
PID controller design of closed-loop gain shaping in CSTR process
LI Shu-qing;ZHANG Sheng-xiu;ZHANG Yu-dong;HU Bo
..............page:483-484
Enterprise unified authentication and authorization system based on Web services
HU He;ZHANG Qin;CHEN Guo-qing;YANG Yang
..............page:577-580
Design and implementation of Android phone based access and control in smart space
GENG Dong-jiu;SUO Yue;CHEN Yu;WEN Jun;L(U) Yong-qiang
..............page:559-561,571
Improved PDE image denoising method based on logarithmic image processing
GUO Mao-yin;TIAN You-xian
..............page:383-385,389
QoS routing algorithm research based on cognitive radio
HAN Qing-wen;SHANG Shu-min;WANG Tao;HUANG Mi
..............page:301-303,307
Ant colony optimization applied in Ad Hoc network routing
ZHOU Shao-qiong;XU Yi;JIANG Li;WANG Rui
..............page:332-334
Ant colony optimization and energy management routing algorithm for ZigBee network
PENG You;YANG Hui-xian;MAN Sha
..............page:335-337
XML document clustering method based on quantum genetic algorithm
JIANG Yong;TAN Huai-liang;LI Guang-wen
..............page:446-449
Relationship between makespan of grid job and granularity of job partitioning
LI Rong-sheng;ZHAO Wen-feng;XU Hui-min
..............page:530-532,547
Optimal credible rules based on rough sets in concept hierarchies
LIANG De-cui;HU Pei
..............page:493-497
Extracting disparity map from bifocal monocular stereo vision in a novel way
XU Shu-shu;WANG Yuan-qing;ZHANG Zhao-yang
..............page:341-343,378
Data recovery algorithm based on file feature on Windows platform
HU Min;YANG Ji-yun;JIANG Wei
..............page:527-529
Particle swarm optimization algorithm based on adaptive Tent chaos search
HUANG Mei-ling;ZHAO Zhi-jie;PU Li-na;WU Fei;ZHAO Mei-ling;CHEN Hao;CHEN Ming-zhe
..............page:485-489
Dorsal hand vein recognition based on wavelet decomposition and K2DPCA-2DLDA
L(U) Cen;CHENG Cheng;ZHAO Dong-xia
..............page:423-425
Paper currency number recognition based on binary tree and Adaboost algorithm
PAN Hu;CHEN Bin;LI Quan-wen
..............page:396-398
Improved FCM algorithm using difference of neighborhood information
LIN Ya-zhong;HAO Gan;GU Jin-ku
..............page:375-378
Effective video feature for action recognition
LI Ying-jie;YIN Yi-xin;DENG Fei
..............page:406-409,419
Joint power control for trunking communication system in TD-SCDMA network
ZHOU Wei;SHU Peng
..............page:313-316,327
Dressing simulation system for costume structure design
MAO Gang;HUAI Yan;ZHOU Gang
..............page:351-355
Adaptive digital audio watermarking method based on DCT and lifting wavelet transform
CHEN Xin-long;LI Xiao-yan;HU Guo-qing;SHEN Jia-hao
..............page:520-522,526
Algorithm for underdetermined blind source separation based on DSNMF
LU Hong;ZHAO Zhi-jin;YANG Xiao-niu
..............page:553-555,558
Design and analysis of USB-Key based strong password authentication scheme
YU Jiang;SU Jin-hai;ZHANG Yong-fu
..............page:511-513
Improved K-means algorithm and its implementation based on density
FU De-sheng;ZHOU Chen
..............page:432-434
Face recognition algorithm fusing 2DPCA and fuzzy 2DLDA
ZHAO Dong-juan;LIANG Jiu-zhen
..............page:420-422,449
Coverage optimization of wireless sensor networks based on chaos particle swarm algorithm
LIU Wei-ting;FAN Zhou-yuan
..............page:338-340,361
Independent component analysis with innovation model
SHU Lang;SHU Qin;SU Jing
..............page:556-558
3D sculpture algorithm based on hierarchical slicing theory
WANG Zheng-you;HUANG Lin-lin;ZHANG Guo-xian
..............page:379-382
Dynamic window-based adaptive median filter algorithm
LIU Ming
..............page:390-392,405
Scheme of BitTorrent traffic control
TANG Hong;ZHANG Yun-long
..............page:304-307
Sudden violence identification algorithm based on motion feature
PU Jing;FU Rao;HU Dong;LU Xuan
..............page:410-412,425
High-order FIR filter design on FPGA using MA distributed algorithm
LI Fei;ZENG Yi-cheng;AN Chao-qun;YU Yun-xia
..............page:533-536
Effectiveness and implementation of low frequency rule based on Apriori algorithm
ZHANG Chun-sheng;ZHUANG Li-yan;LI Yan
..............page:435-437
3D voxel reconstruction under multiple constraints in multi-view environment
CHEN Ning;LI Xiu-xiu;ZHENG Jiang-bin
..............page:344-346
Available bandwidth measurement accuracy based on non-fluid model
ZHAO Wei-hu;MENG Xiang-ru;ZHANG Ya-pu;MA Hai-yuan
..............page:320-323,355
Image segmentation by fissive K-mean clustering method
ZHANG Jian;SONG Gang
..............page:372-374
Directed level graph-based approach to automatic Web services composition
FENG Xing-jie;WANG Hui;XU Ya-juan
..............page:568-571
Threshold rekeying protocol based on multi-receiver signcryption algorithm
BAI Jun;ZHANG Chuan-rong;CUI Xiao-chen
..............page:507-510
New fast prediction mode selection algorithm in H.264/AVC frame
SU Qi;ZHANG Fa-cun
..............page:393-395
Feature extraction and recognition based on banana-radar echo images
MENG Hong-fei;NIU Jian-qiang;YANG Rui-rui;DUAN Shi-zhong
..............page:413-415
Mining frequent items on stream data
TU Li;CHEN Ling
..............page:450-453
Correlation analysis of LSF and differential LSF parameters
HAN Xiao-lei;ZHAO Xiao-qun;FANG Teng-long;JIA Xiao-guang
..............page:548-552
Key frame extraction based on particle swarm optimization
ZHANG Jian-ming;JIANG Xing-jie;LI Guang-cui;JIANG Liang
..............page:358-361
P2P trust model for resisting collusion and dynamic behavior of node
CHEN Zuo-han;REN Xu-peng;LU Peng-li
..............page:308-312
Variable discourse fuzzy control of VAV air-conditioning terminal unit
WANG Cheng-li;LU Jian-gang
..............page:470-472