Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2011 Issue 8
C-V model with H《\'1》 regular term
ZHANG Shao-hua
..............page:2214-2216
Borrowed address assignment algorithm for ZigBee network
YAO Yu-kun;LI Peng-xiang;REN Zhi;GU Yuan
..............page:2044-2047,2064
Embedded gas detection system and its image analysis algorithm
LUO Xiao-gang;WANG De-nuan;BAI Xing-hong
..............page:2270-2274,2278
Indoor location algorithm of wireless sensor network based on fuzzy control
DENG Chen;WANG Yong-qi
..............page:2062-2064
tou gao zhu yi shi xiang
..............page:封3
Design and implementation of hybrid index mechanism for real-time database
LIU Bo;FAN Shi-ming;LIU Hua
..............page:2265-2269
Parallel granularity selection technique for high performance SAR imaging program
DU Jing;AO Fu-jiang;WANG Hua-bin;WANG Lian-dong
..............page:2079-2082
Design and application of middleware for Web full-text retrieval
ZHANG Wei-gang;XU Yong-dong;LEI Xiao-qiang;HE Hui
..............page:2261-2264
Innovation extrapolation method for GPS/SINS tightly coupled system
HUANG Guo-rong;PENG Xing-zhao;GUO Chuang;CHENG Hong-bing
..............page:2289-2292
Solution to complex container loading problem based on ant colony algorithm
DU Li-ning;ZHANG De-zhen;CHEN Shi-feng
..............page:2275-2278
Design and realization of communication protocol based on Manchester code
ZHOU Qing-shan;WANG Jue;TAN Hui
..............page:2065-2067,2086
Evaluation on information transmission ability of command information system network
WANG Xin;YAO Pei-yang;ZHOU Xiang-xiang;ZHANG Jie-yong
..............page:2033-2036
HC_AL: New active learning method based on hierarchical clustering
JIA Jun-fang
..............page:2134-2137
Short coding sequence identification of human genes based on YKW graphical representation
LUO Jia-wei;YAN Jun;HE Hai-feng
..............page:2087-2091
Parameter estimation of complex moving target based on micro-Doppler analysis
CHEN Guang-feng;ZHANG Lin-rang;LIU Gao-gao;WANG Chun
..............page:2282-2285
Fault diagnostic method for power converter based on wavelet neural network with improved algorithm
DUAN Qi-chang;ZHANG Liang;YUAN Jing-ming
..............page:2143-2145
Semantic matching mechanism based on algebraic expression in workflow integration
QI Jun;ZHANG Yue-ju;WANG Tao
..............page:2253-2257
IIHT: New improved iterative hard thresholding algorithm for compressive sensing
ZHANG Zong-nian;LI Jin-hui;HUANG Ren-tai
..............page:2123-2125,2129
Filtering of ground point cloud based on scanning line and self-adaptive angle-limitation algorithm
GUO Jie;LIU Jian-yong;ZHANG You-liang;ZHU Yu
..............page:2243-2245
New context caching replacement algorithm in ubiquitous computing
WANG Bin;ZOU Wen;SHENG Jin-fang;SUN Ying
..............page:2075-2078
Approximation algorithm of variable elimination of Bayesian network
GAO Wen-yu;ZHANG Li
..............page:2072-2074,2091
Trust evaluation based on community discovery in multi-Agent system
YANG Xing-hua;WANG Wen-jie;WANG Xiao-feng;SHI Zhong-zhi
..............page:2068-2071,2082
Illumination invariant face recognition based on wavelet transform and denoising model
CAO Xue;YU Li-gong;YANG Jing-yu
..............page:2126-2129
Video quality evaluation model of variable weight no-reference
WANG Hai-feng
..............page:2232-2235
Semi-fragile watermarking algorithm based on dynamic image segmentation and information entropy
WANG Hai-yang;CHE Sheng-bing;SHU Xu
..............page:2169-2173
Professional literature annotation method based on domain ontology
WEI Mo-ji;YU Tao
..............page:2138-2142
Fractured surface segmentation of triangular mesh of fragments for solid reconstruction
LI Qun-hui;ZHOU Ming-quan;GENG Guo-hua
..............page:2204-2205,2216
Blind watermarking algorithm for 2D vector map
CHEN Xiao-guang;LI Yan
..............page:2174-2177
Wireless broadband video transmission system based on adaptive choice of multiple networks
WU Yi;LIN Xiao;CAI Jian-yong
..............page:2029-2032,2036
Joint precoding scheme under condition of channel asymmetry
ZHENG Li-qing;HUANG Kai-zhi;LI Yin-hai
..............page:2025-2028
Service similarity checking based on event for Internet of things
XIE Chuan;WANG Fang
..............page:2258-2260
Fatigue pattern recognition of human face based on Gabor wavelet transform
CHENG Fen-hua;YANG Hai-yan
..............page:2119-2122
Regularized Gmres method of image restoration
MIN Tao;ZHAO Miao-miao;CHENG Yao
..............page:2201-2203,2209
Multiplicative watermarking algorithm based on wavelet visual model
HUANG Er-song;LIU Jin-hua;WEN Ru-hong
..............page:2165-2168,2173
Secure batch steganographic model without carrying secret information
WU Yu-liang;CHEN Gou-xi;SHEN Hong-lei;ZHANG Peng-chen
..............page:2162-2164,2182
Application of improved information gain algorithm in intrusion forensics
JIA Xian;LIU Pei-yu;GONG Wei
..............page:2156-2158,2177
Design of cement calcination process controller based on dual heuristic programming algorithm
YANG Bao-sheng;MA Xiu-shui
..............page:2286-2288,2292
Unsupervised feature selection approach based on spectral analysis
PAN Feng;WANG Jian-dong;NIU Ben
..............page:2108-2110,2114
Robust least square support vector regression
WANG Kuai-ni;MA Jin-feng;DING Xiao-shuai
..............page:2111-2114
Double-threshold cooperative spectrum sensing algorithm based on multi-fusion rule
ZHU Qing;SONG Chun-lin;TAN Cai-ping;JIANG Xing-ge
..............page:2040-2043
Anti-collision algorithm for RFID system with moving tags
HE Hong-jiang;DING Xiao-ye;ZHAI Yao-xu
..............page:2048-2051,2055
Rough attack model based on object Petri net of expanded time
HUANG Guang-qiu;WANG Chun-zi;ZHANG Bin
..............page:2146-2151,2155
Detection of copy-move forgery image based on fractal and statistics
LIU Mei-hong;XU Wei-hong
..............page:2236-2239
Anonymous fingerprinting scheme with straight-line extractors
LIU Xin
..............page:2187-2191,2200
Adaptive light radiation intensity estimation based on variable kernel
WANG Hai-bo;ZHANG Wen-hui;YANG Hui-hua;ZHOU Huan
..............page:2240-2242,2245
Improved algorithm of feather image segmentation based on active contour model
LIU Hong-jiang;WANG Ren-huang;LI Xue-cong
..............page:2246-2248,2260
Object recognition based on one-class support vector machine in hyperspectral image
CHEN Wei;YU Xu-chu;ZHANG Peng-qiang;WANG Zhi-chao;WANG He
..............page:2092-2096,2100
Trajectory tracking control of three-wheeled mobile robot
ZHANG Guo-liang;AN Lei;TANG Wen-jun
..............page:2293-2296
Target recognition for low-resolution radar based on compressed sensing
MI Hong-mei;QIU Tian-shuang
..............page:2105-2107
Cryptanalysis and improvement of two signcryption schemes
FAN Han;ZHANG Shao-wu
..............page:2196-2200
Research survey on physical layer network coding
ZHAO Ming-feng;ZHOU Ya-jian;YUAN Quan;YANG Yi-xian
..............page:2015-2020,2028
Load-balanced adaptive group clustering algorithm for wireless sensor network
HU Ya-ming;DENG Ya-ping;YANG Jia
..............page:2056-2058,2061
Anti-jamming performance of frequency-hopping based on LDPC code
XUE Ming-hao;MA Lin-hua;LIN Zhi-guo;YE Xiao-dong
..............page:2037-2039
Joint pollution model in Kad network
KONG Jie;CAI Wan-dong
..............page:2152-2155
Volume rendering acceleration method based on optimal bricking for large volume data
PENG Wei;LI Jian-xin;YAN Bin;TONG Li;CHEN Jian;GUAN Shi-yong
..............page:2221-2224,2228
Grading model of seed cotton based on fuzzy pattern recognition
YUAN Rong-chang;SUN Long-qing;DONG Chen-xi;WANG Li
..............page:2097-2100
Image segmentation based on fast converging loopy belief propagation algorithm
XU Sheng-jun;LIU Xin;ZHAO Liang
..............page:2229-2231,2235
Speaker recognition based on linear log-likelihood kernel function
HE Liang;LIU Jia
..............page:2083-2086
Super-peer topology construction based on k-perfect difference graph
TAN Yi-hong;CHEN Zhi-ping;LI Xue-yong;LIN Ya-ping
..............page:2021-2024,2043
Segmentation of microscopic images based on image patch classifier and conditional random field
YANG Wei;ZHANG Shu-heng;WANG Lian-yun;ZHANG Su
..............page:2249-2252
Equivalent proof of two 2-D cross entropy thresholding methods and their fast implementation
ZHANG Xin-ming;LI Zhen-yun;ZHENG Yan-bin
..............page:2210-2213,2220