Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2012 Issue 6
3D visualization algorithm of color gradual interpolation for mine pre-warning data sets
QIU Xing-guo;WANG Bo-hui
..............page:1601-1604,1612
Mutual information-based feature selection approach for software defect prediction
WANG Pei;JIN Cong;GE He-he
..............page:1738-1740
Information granularity in interval-valued intuitionistic fuzzy information systems
YANG Wei-ping;LIN Meng-lei
..............page:1657-1661,1665
Multi-modal function optimization based on immune quantum genetic algorithm
XU Xue-song;WANG Si-chun
..............page:1674-1677
Implementation of LTE spatial multiplexing based on FPGA
DU Fang;YUAN Ling;LIU Li-cheng
..............page:1503-1505,1512
Uygur handwriting identification based on edge stroke feature structure
ZHANG Wei-yu;KAMIL Moydi
..............page:1594-1597,1600
Texture design method of ceramic product based on genetic evolution
ZHAN Qun;DU Zhao-fang
..............page:1778-1781
Fault diagnostic method of elevator control system based on finite state machine
BAO Jian;WEI Li-na;ZHAO Jian-yong
..............page:1692-1695
Parameter estimation for reaction kinetics model based on composite genetic algorithm
LONG Wen;JIAO Jian-jun;XU Song-jin
..............page:1704-1706,1737
Topology control algorithm of wireless sensor network based on cellular automata
REN Xiu-li;DENG Cai-li
..............page:1495-1498
Generalized incremental manifold learning algorithm based on local smoothness
ZHOU Xue-yan;HAN Jian-min;ZHAN Yu-bin
..............page:1670-1673
Fast three-dimensional Otsu image segmentation algorithm based on decomposition
GONG Qu;NI Lin;TANG Ping-feng;WANG Fei-fei
..............page:1526-1528
Modified adaptive genetic algorithms for solving 0/1 knapsack problems
WANG Na;XIANG Feng-hong;MAO Jian-lin
..............page:1682-1684
Question classification in restricted domain using syntactic parsing-based quadratic-Bayesian model
JI Yu;WANG Rong-bo;CHEN Zhi-qun
..............page:1685-1687,1691
Dalvik virtual machine performance improvement based on hybrid concurrent model
LI Qian;XIAO Ping
..............page:1727-1729,1733
Network performance data clustering method based on semantic description and optimization
JIANG Da-qing;ZHOU Yong;XIA Shi-xiong
..............page:1522-1525
Improved approach for cooperative obstacle-avoidance in mobile wireless sensor network
CHEN Zuo;WAN Xin;TU Yuan-yuan;LI Ren-fa
..............page:1506-1512
Implementation of encryption and authentication on VLIW DSP
XU Jie;MA Jun-ping;HE Hu
..............page:1650-1653
Fusion prediction of mine multi-sensor chaotic time series data
MU Wen-yu;LI Ru;YIN Zhi-zhou;WANG Qi;ZHANG Bao-yan
..............page:1769-1773
Token-based cross domain single sign on
WANG Guo-wei;XUE Man-jun
..............page:1766-1768,1773
Switched optimization algorithm of piecewise contractive path
ZHU Geng;WANG Bin
..............page:1700-1703
Genetic algorithm with master-slave structure for forklift truck dispatching in bulk cargo logistics
ZHANG Wei-cun;KANG Kai;CUI Ting-yu
..............page:1741-1744,1748
Enhanced hierarchical mobile IPv6 based on route optimized communication
ZHOU Lian-ying;WANG Liang
..............page:1491-1494,1498
Design and implementation of single sign-on system in regional health informatization
LUO Jia-wei;TANG Guo-ying
..............page:1782-1786
Seam tracking algorithm based on multi-information sensor of vision and arc
HU Hai-lin;LI Jing;LI Jian;XU Zhong-lu;ZHU Wei
..............page:1760-1765
Reliable and double-blind IP covert timing channel
GUAN Xing-xing;WANG Chang-da;LI Zhi-guo;BO Zhao-jun
..............page:1636-1639
Video-based method for highway traffic flow detection
WANG Xiao-peng;GUO Li-qiong
..............page:1585-1588
Data fusion algorithm based on meanvalue iteration
MAO Guan-lihua;DU Chang-ping
..............page:1757-1759,1765
Source camera identification using noise variance and texture complexity analysis
CHEN Zong-min;ZHOU Zhi-ping
..............page:1563-1566
Portrait image based random sequence generator
TAN Yang;TANG De-quan;TANG Zhao-yi
..............page:1623-1626,1631
Design and implementation of IAP on-line upgrading technology based on software trigger
JIANG Jian-chun;WANG Zheng-shu;FENG Hui-zong;LIU Tao
..............page:1721-1723
Distributed detection pilot jamming scheme against OFDM systems
XIE Si-rui;HUANG Kai-zhi;JI Jiang
..............page:1519-1521,1525
Semantic annotation based on image segmentation
PENG Yan-fei;SUN Lu
..............page:1548-1551
Fuzzy programming models of supplier selection based on network reputation
JIANG Hua;LU Zhi-gang
..............page:1749-1752
Chaotic dynamic disturbance algorithm based on RFID system
TANG You;LU Yuan-yuan;ZAHANG Yi-wei
..............page:1643-1645,1695
Output impedance optimization for bus converter in high-performance computer
YAO Xin-an;HU Shi-ping;SONG Fei
..............page:1774-1777,1781
Web data extraction based on edit distance
HUANG Liang;ZHAO Ze-mao;LIANG Xing-kai
..............page:1662-1665
Human action recognition based on cascaded structure
PENG Jiang-ping
..............page:1578-1580,1608
Medical image fusion with multi-feature based on evidential theory in wavelet domain
YAO Li-sha;ZHAO Hai-feng;LUO Bin;ZHU Zhen-yuan
..............page:1544-1547
Computation on orientation for subiective sentence based on sentiment words ontology
WANG Xiao-dong;WANG Juan;ZHANG Zheng
..............page:1678-1681,1684
Crowd evacuation system simulation based on artificial potential field and Agent
ZHANG Jun-na;FAN Hai-ju
..............page:1753-1756
Automatic extraction of bead-like particle regions of fly ash in scanning electron microscope images
LI Ying-ying;TAN Jie-qing;ZHONG Jin-qin;LI Yan
..............page:1570-1573
Image recognition of agricultural products in supermarket based on multi-instance learning
LUO Cheng-cheng;LI Shu-qin;TANG Jing-lei
..............page:1560-1562,1566
Clothing simulation with classified strain limiting
XIANG Yu;HOU Jin;XU Fang;WU Ling
..............page:1589-1593
Local feature based intelligent image fusion
LI Ling-ling;HUANG Qiu-yan;YAN Cheng-xin
..............page:1536-1538
Efficient key management protocol based on matrix space
ZHANG Cai-xia;CHENG Liang-lun;WANG Xiang-dong
..............page:1605-1608
New key pre-distribution scheme for wireless sensor networks
MU Ying-ying;WANG Cai-fen
..............page:1613-1615,1619
Background modeling based on credibility evaluation
QU Zhi-yi;TIAN Nan;WEN Li-juan
..............page:1532-1535,1556
Image noise detection technology based on spatial domain
YU Yan-fei;ZHENG Quan;WANG Song;LI Wei;YUAN Jing;SUN Zhi-jun
..............page:1552-1556
New approach of fabric defects detection based on saliency region feature
ZHAO Bo;ZHENG Li-xin;PAN Xu-ling;ZHOU Hai-ting;XU Yuan-yuan
..............page:1574-1577
File prefetching with multiple prefetching points in multithreading environment
LIU Jin;HU Chuang;HU Ming;GONG Yi-li
..............page:1713-1716,1720
Anomaly detection model based on support vector machine and Bayesian classification
QUAN Liang-liang;WU Wei-dong
..............page:1632-1635,1639
New method for fast image dehazing
MA Jiang-feng;YANG Zhong-bin;BI Du-yan;LI Quan-he
..............page:1567-1569,1593
Combinatorial optimization filter based on median filter and multi-scale filter
XU Guo-bao;YIN Yi-xin;ZHOU Mei-juan;XIE Shi-yi
..............page:1557-1559,1573
Spot color separation of printing images based on fuzzy rules
YANG Ling;ZHONG Yun-fei;WANG Bin
..............page:1598-1600
Analysis on stability of continuous chaotic systems
LIU Jing-lin;FENG Ming-ku
..............page:1640-1642
Web service evolution framework based on hybrid co-evolution algorithm
WANG Meng;LI Shu-yu
..............page:1717-1720
Hadoop-based storage architecture for mass MP3 files
ZHAO Xiao-yong;YANG Yang;SUN Li-li;CHEN Yu
..............page:1724-1726
Multi-factor trust model for wireless sensor networks
LIU Yan-fei;PENG Xin-guang
..............page:1616-1619
New page ranking algorithm based on website force
ZHANG Fang;GUO Chang-ying
..............page:1666-1669
Cluster boundary detection technology for categorical data
QIU Bao-zhi;WANG Bo
..............page:1654-1656,1669
Implementation of precision timed instructions for systems processors in cyber-physical
GAO Zhen-hua;YANG Fan;CHEN Wen-jie;CHAI Zhi-lei
..............page:1730-1733
Color image segmentation based on graph theory and uniformity measurement
HUANG Shan-shan;ZHANG Yong-liang;XIAO Gang;XIAO Jian-wei;ZHANG Shen-xu
..............page:1529-1531,1547
Improved artificial immune intrusion detection model
WANG Bo;LIU Jiu-jun
..............page:1627-1631
Application of improved RSA algorithm in wireless sensor network
DU Zhi-guo;HU Da-hui
..............page:1609-1612
Improved program evaluate review technique based on particle swarm optimization algorithm
WANG Ruo-yang;XIONG Xuan-dong;ZHANG Liang-zhong;WANG Song-feng
..............page:1734-1737