Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2012 Issue 10
Railway freight volume prediction based on grey neural network with improved particle swarm optimization
LEI Bin;TAO Hai-long;XU Xiao-guang
..............page:2948-2951,2962
Feature selection algorithm based on multi-label ReliefF
HUANG Li-li;TANG Jin;SUN Deng-di;LUO Bin
..............page:2888-2890,2898
Curtain dynamic simulation based on particle constraint algorithm
han li ; jia
..............page:2806-2808
Skinning developable mesh surface of optimal topology
CUI Xiao-kun;CHEN Ming
..............page:2798-2801,2813
Simulation of knowledge diffusion among enterprise clusters based on cognitive perspective
NIU Jia-yang;WANG Hong-guo;SHAO Zeng-zhen;SONG Chao-chao
..............page:2879-2883
ECG waveform similarity analysis based on window-slope representation
LIU Tong-tong;DAI Min;LI Zhong-yi
..............page:2969-2972
Three dimensional reconstruction algorithm based on uncalibrated multiple images
zhao zuo zuo ; geng guo hua ; wang xiao feng ; liu zuo
..............page:2802-2805
Optimal routing algorithm based on user experience estimation model
zhang da lu ; cao xiao jing ; hu zhi guo
..............page:2683-2688,2695
Improved Chameleon algorithm using weighted nearest neighbors graph
xue wen juan ; liu pei yu ; liu dong
..............page:2884-2887
Multi-semantic audio classification method based on tensor neural network
xing ling ; he mei ; ma qiang ; zhu min
..............page:2895-2898
Model predictive control and PID control on servo motor
huang yu zuo ; qu dao kui ; xu fang ; ren xiao lei
..............page:2944-2947
Multi-feature fusion Camshift algorithm and its further improvement
LIN Jian-hua;LIU Dang-hui;SHAO Xian-kui
..............page:2814-2816,2820
Research on decentralized communication decision in multi-Agent system
ZHENG Yan-bin;GUO Ling-yun;LIU Jing-jing
..............page:2875-2878
Phrase based Uyghur language text categorization
ALIMJAN Aysa;TURGUN Ibrahim;KURBAN Obul;LI Zhe
..............page:2923-2926
Encryption algorithm based on double chaos system with mutual feedback
MAO Yong-yi;WANG Yao
..............page:2768-2770,2775
Sigmoid inertia weight adjustment strategy with particle spacing feedback for PSO
ZUO Xu-kun;SU Shou-bao
..............page:2724-2727
Visibility enhancing algorithm based on optical imaging model for underwater images
guo xiang feng ; jia jian fang ; yang rui feng ; ge zhong feng
..............page:2836-2839
Node localization algorithm of wireless sensor network in marine monitoring
ren xiu li ; han jing jing
..............page:2692-2695
Hierarchical feature selection method for detection of obfuscated malicious code
ZHANG Jian-fei;CHEN Li-fei;GUO Gong-de
..............page:2761-2767
Passive queue management algorithm based on synchronized queue
xie li chun
..............page:2716-2718
Digital watermarking algorithm based on structure of PDF document
zhong zheng yan ; guo yan hui ; xu guo ai
..............page:2776-2778,2782
Packet marking algorithm with consistency probability based on router interface
zuo qiao ; yao xi yan
..............page:2757-2760
Differential evolution with self-accelerated property and variable neighborhood search
ZHAO Yang;HE Yi-chao;LI Xi
..............page:2911-2915,2919
Nonlinear analysis of ECG and HRV signals with two types of emotional states
yang min ; liu guang yuan ; wen wan hui
..............page:2963-2965,2976
Heuristic ontology search mechanism based on user behavior
li jiang hua ; zheng jian
..............page:2891-2894
Optimization algorithm of electronic system condition monitoring data
YANG Sen;MENG Chen;WANG Cheng
..............page:2927-2930
Effective forecast of circular error probability in underwater robots
ji da xiong ; liu jian
..............page:2960-2962
Color image feature extracting method with small space occupying and fast speed
luo zuo juan ; zhu jia gang ; lu xiao
..............page:2827-2831
Echo cancellation based on blind source separation
WANG Zhu-yi;YANG Jian-po;YIN Yong-chao;WANG Zhen-chao
..............page:2707-2710
Lock-free implementation of concurrent binary search tree
LIU Shao-dong;XING Yong-kang;LIU Heng
..............page:2736-2741
Improved AdaBoost ensemble approach based on loss function
LEI Lei;WANG Xiao-dan
..............page:2916-2919
Detection and defense scheme for selective forwarding attacks in wireless sensor network
FU Xiang-yan;LI Ping;WU Jia-ying
..............page:2711-2715,2718
model on cartoon-texture decomposition based on curvelet transform and sparse representation
kang xiao dong ; wang zuo ; guo hong ; guo jun
..............page:2786-2789
Smith-immune predictive control for steel uncertain time-delay system
XU Xue-song;OUYANG Yao
..............page:2956-2959
Cluster head election based on trust mechanism in wireless sensor network
WANG Wei-long;MA Man-fu
..............page:2696-2699
Image retrieval based on combined features of interest points
SONG Zhen;YAN Yong-feng
..............page:2840-2842,2847
Simulink-based uncertain abnormal pattern recognition of quality control chart
HOU Shi-wang;ZHU Hui-ming;LI Rong
..............page:2940-2943
Multi-threshold image segmentation based on combining Fisher criterion and potential function
ZHANG Xin-ming;LI Zhen-yun;ZHENG Ying
..............page:2843-2847
Reputation incentive mechanism based on dynamic topology
li shao jing
..............page:2752-2756
Probability distribution estimation for Web service QoS based on max entropy principle
DAI Zhi-hua;FU Xiao-dong;HUANG Yuan;JIA Nan
..............page:2728-2731
Iterated parallel diagonal dominant algorithm for tridiagonal systems
li tai quan ; xiao bai xun
..............page:2742-2744
Research on pressor strategy of Web application system load testing
WENG Lei-lei;CAI Wan-dong;YAO Ye
..............page:2973-2976
New image edge detection model based on fractional-order partial differention
JIANG Wei;DING Zhi-quan;LIU Ya-wei
..............page:2848-2850,2858
New implementation of 2-aidc finite state machines
LIN Zhi-qiang
..............page:2783-2785,2789
Salt and pepper noise detection algorithm based on directional median
CHEN Jian;ZHENG Shao-hua
..............page:2790-2792,2797
Survey on program algorithm recognition research
lu qiang ; li xiao lian ; wang zhi guang
..............page:2863-2868
Voronoi diagram-based sleeping algorithm in wireless sensor networks
DENG Ya-ping;LIU Sa;LIU Ya-fei
..............page:2689-2691
CWENO-type entropy consistent scheme for two dimensional scalar hyperbolic conservation laws
ZHENG Su-pei;FENG Jian-hu;LIU Cai-xia
..............page:2745-2747,2751
Real-time image fusion based on morphological un-decimated wavelets
DENG Miao;ZHANG Ji-hong;LIU Wei;LIANG Yong-sheng
..............page:2809-2813
Lossless video compression method based on fuzzy logic
xing long ping ; li dong zuo ; hu chuan chuan
..............page:2859-2862
Intelligent method for word grouping based on frequent pattern mining in Uyghur language
TUERDI Tuoheti;WEINILA Mushajiang;AISIKAER Aimudula
..............page:2920-2922,2926
Task classification method oriented to cloud computing
CHEN Ting-wei;ZHOU Shan-jie;QIN Ming-da
..............page:2719-2723,2727
Service composition in cloud manufacturing based on adaptive mutation particle swarm optimization
LIU Wei-ning;LI Yi-ming;LIU Bo
..............page:2869-2874,2878
Denosing of ECG signal based on FIR and aTrous wavelet transform
zhong li hui ; wei guan jun ; shi li
..............page:2966-2968
Research of equation solution algorithm about Sudoku puzzle
XIAO Hua-yong;CHENG Hai-jiao;WANG Yue-xing
..............page:2907-2910
Analysis on improvement of particle memory in gravitational search algorithm
li chun long ; dai juan ; pan feng
..............page:2732-2735
Sketch drawing method with hierarchical sketch texture
li zhi hui ; fan tie sheng ; tang chun ge ; liu lei
..............page:2851-2854
Lower energy adaptive clustering hierarchy routing protocol for wireless sensor network
LI Ling;WANG Lin;ZHANG Fei-ge;WANG Xiao-zhe
..............page:2700-2703
Security analysis of digital rights management system based on usage control
WANG Chang-da;GONG Ting-ting;ZHOU Cong-hua
..............page:2771-2775
Reliable assurance model for distributed system survivability
GENG Ji;CHEN Fei;NIE Peng;CHEN Wei;QIN Zhi-guang
..............page:2748-2751
Improved artificial fish swarm mixed algorithm for multimodal function optimization
DENG Tao;YAO Hong;DU Jun
..............page:2904-2906,2910
Real-time data stream analysis and entire process quality monitoring based on plant information
bian xiao yong ; zhang xiao long ; yu hai
..............page:2935-2939
Fast image interpolation algorithm based on gradient
YANG He-meng;HUANG Zhan-hua
..............page:2821-2823,2826
Image denoising algorithms based on Laplacian operator and image inpainting
TIAN Su-yun;WANG Xiao-ming;ZHAO Xue-qing
..............page:2793-2797
Adaptive high-capacity reversible data hiding algorithm for medical images
HUANG Bin;SHI Liang;DENG Xiao-hong;CHEN Zhi-gang
..............page:2779-2782
Application of ant colony algorithm for parameter optimization of water demand prediction model
hou jing wei ; kong yun feng ; sun jiu lin
..............page:2952-2955,2959
Vertical handoff algorithm based on fuzzy logic control
wang jia
..............page:2704-2706