Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2012 Issue 9
Review of coverage and handoff technologies of 3G communication for high-speed railway
JIANG Xin-hua;ZHU Quan;ZOU Fu-min
..............page:2385-2390
Fast recovery method of effective data based on FAT32
YANG De-ming
..............page:2500-2503,2594
Enhancement algorithm for color images based on co-occurrence matrix
YANG Bing-qing;TIAN Xiao-ping;WU Cheng-mao
..............page:2573-2575,2584
Color image encryption algorithm based on cutting spectrum and 2D Arnold transform
GONG Li-hua;ZENG Shao-yang;ZHOU Nan-run
..............page:2599-2602
Analysis of communication signals based on physical-layer network coding
LIU Qin-yong;PENG Hua
..............page:2405-2407,2411
Signal sparse decomposition based on the two dictionary sets
WANG Shu-peng;WANG Wen-xiang;LI Hong-wei
..............page:2512-2515
Location algorithm based on BP neural network in OFDM system
MAO Yong-yi;LI Cheng;ZHANG Hong-jun
..............page:2426-2428
Directed diffusion gradient field based on double gradient in vehicular sensor networks
ZHENG Ming-cai;LI Yong-fan;ZHAO Xiao-chao;LI Ke-feng
..............page:2418-2421,2425
Underground pipe network spatial analysis in large plant with ArcGIS
XIAO Jing-feng;WANG Xiao-dong;YAO Yu
..............page:2675-2678
Encryption-based indirect incentive mechanism in BitTorrent
ZHANG Hong-mei;QI Fa-zhi;MAN Jin-gui;WANG Miao
..............page:2391-2394,2404
Neural network for control chart pattern recognition based on kernel principle component analysis
HU Sheng;LI Tai-fu;WEI Zheng-yuan;YAN Ke-sheng
..............page:2520-2522,2526
Routing algorithm based on link bandwidth utilization rate
YANG Xiao-qin;ZHANG Li-fang;CAO Qing-huang;SUN Hai-yan;LI Zhuo-qing
..............page:2422-2425
Ontology representation and realization of extended permission in RBAC
ZHOU Jia-gen;YE Chun-xiao
..............page:2624-2627
Algorithm of biased skeleton trim based on intersecting cortical model
ZHOU Li;HE Lin-yuan;SUN Yi;BI Du-yan;GAO Shan
..............page:2553-2555,2627
Application of improved ant colony algorithm to route planning of anti-ship missile
GAO Man;LIU Yi-an;ZHANG Qiang
..............page:2530-2533,2541
Lexical active attack on chaotic text zero-watermarking
LI Jing;FANG Ding-yi;HE Lu
..............page:2603-2605
Multi-source heterogeneous data fusion model in mobile geographic information system
LI Wen-chuang;ZHANG Yong-ping;PAN Yu-chun
..............page:2672-2674,2678
Effective immune measures on P2P botnets
FENG Li-ping;HAN Qi;WANG Hong-bin;KANG Su-ming
..............page:2617-2619,2623
Bit-split parallel algorithm for quick sorting based on Java
TUO Qing;SONG Yao-hu
..............page:2455-2457
Multiple time series autoregressive method based on support vector regression
ZHANG Wei;LIU Xian-hui;DING Yi;SHI De-ming
..............page:2508-2511,2519
Trust management model based on value-at-risk evaluation with changing time in P2P network
GUO Yi-fan;LI Teng;GUO Yu-cui
..............page:2613-2616
Web resource recommendation method based on intuitive fuzzy clustering
XIAO Man-sheng;WANG Xin-fang;ZHOU Li-juan
..............page:2480-2482,2487
Information fusion based interference solution in electronic toll collection system
WANG Liang;LU Hua-xiang;JING Wei-ping;CHEN Tian-xiang
..............page:2660-2663
Wavelet threshold algorithm analysis under non-Gaussian noise background
LI Qing-hua;Senbai Dalabaev;QIU Xin-jian;LIAO Chang;SUN Quan-fu
..............page:2445-2447
Optimal linear cooperation spectrum sensing method based on chaos harmony search algorithm
LI Yue-hong;WAN Pin;WANG Yong-hua;YANG Jian;DENG Qin
..............page:2412-2417
Extraction of text content from PDF documents based on automaton theory
WANG Xiao-juan;TAN Jian-long;LIU Yan-bing;LIU Jin-gang
..............page:2491-2495
Intrusion detection model based on LISOMAP relevant vector machine
TANG Chao-wei;LI Chao-qun;YAN Kai;YAN Ming
..............page:2606-2608
Artificial bee colony algorithm based on cloud mutation
LIN Xiao-jun;YE Dong-yi
..............page:2538-2541
Parallel algorithms for complex network clustering with GPUs
WANG Hai-feng
..............page:2458-2462
General method to estimate mixture matrix in blind source separation
ZHANG Yan-liang;ZHANG Wei-tao;DU Jing-jing
..............page:2432-2435
Seamless terrain rendering method based on binary tree and GPU
CAO Wei;DUAN Guang-yao
..............page:2548-2552
Analysis of weakened immunization strategy on complex network
TIAN Si;LI Hui-jia;ZHAO Yue
..............page:2620-2623
Parallelization of decision tree algorithm based on MapReduce
LU Qiu;CHENG Xiao-hui
..............page:2463-2465,2469
Airport capacity analysis for typical parallel runways based on simulation method
LI Xiong;LI Dong-bin;WEI Dong-xuan
..............page:2648-2651
Satellite cloud image fusion based on regional feature with nonsubsampled contourlet transform
WANG Da;BI Shuo-ben;WANG Bi-qiang;YAN Jian
..............page:2585-2587
Enhanced minimalist mutual-authentication protocol for RFID system
ZHANG Xue-jun;CAI Wen-qi;WANG Yu
..............page:2395-2399
xin xi dong tai
..............page:封2-封3
Evaluation model based on neighborhood preservation for manifold learning algorithms
SHI Lu-kui;ZHANG Jun;GONG Xiao-teng
..............page:2516-2519
Digital image scrambling technology based on three dimensional sub-affine transformation
ZOU Wei-gang;CHEN Pei-yun;HUANG Jiang-yan
..............page:2595-2598,2602
Temperature control approach in intelligent office environment
WANG Hai-zhen;LIAN Zuo-zheng;TENG Yan-ping
..............page:2545-2547
Hybrid tabu search for scheduling reentrant jobs on parallel machines
ZHAO Yue;HU Yu-mei
..............page:2451-2454
Descriptive query method based on unstructured text data in GIS
PU Hai-xia;LI Jia-tian;LI Rui;HE Yu-feng;WANG Hua
..............page:2483-2487
Exact algorithm for generating optimal homogenous strip T-shape layouts
JI Jun;LU Yi-ping;ZHA Jian-zhong;CUI Yao-dong
..............page:2634-2637
E-commerce recommendation platform based on SaaS pattern
LIU Jia;HUI Cheng-feng;DU Xing-zhong;CHEN Zhen-yu
..............page:2679-2682
Cyclical nature of matrix sequence in image information security processing
ZHONG Jin;WANG Da-gang
..............page:2592-2594
Finite Newton algorithm for Lagrangian support vector regression
ZHENG Feng-de;ZHANG Hong-bin
..............page:2504-2507
Data storage method supporting large-scale smart grid
SONG Bao-yan;ZHANG Hong-mei;WANG Yan;LI Qiong
..............page:2496-2499,2537
Parallel simulation and optimization of CUDA-based real-time huge crowd behavior
HE Yi-hui;YE Chen;LIU Zhi-zhong;PENG Wei
..............page:2466-2469
Face recognition method based on DLPP-SIFT
LI Zheng-yi;FENG Gui-yu;ZHAO Long
..............page:2588-2591
Transmission dynamics feature of enterprise marketing networks
QIN Xiao-hong;HUANG Guang-qiu
..............page:2656-2659
Feasibility analysis on method of calculating ADS-B latency
CHENG Qing
..............page:2664-2666,2671
Structural description model for video
FU Mao-sheng;LUO Bin;WU Yong-long;KONG Min
..............page:2560-2563
Performance analysis of new centroid localization algorithm in wireless sensor network
ZHANG Ai-qing;YE Xin-rong;HU Hai-feng
..............page:2429-2431,2435
Humanoid robot gait planning based on 3D linear inverted pendulum model
YU Guo-chen;LIU Yong-xin;LI Xiao-hong
..............page:2643-2647,2651
Fibonacci optimized UMHexagonS algorithm for H.264 motion estimation
LI Shi-ping;ZHENG Wen-bin;SHI Xin
..............page:2580-2584
Parameters adjustment in cognition radio spectrum allocation based on game theory
ZHANG Bei-wei;HU Kun-yuan;ZHU Yun-long
..............page:2408-2411
Improved GK clustering algorithm
ZHANG Fang-fang;QIAN Xue-zhong
..............page:2476-2479
Obstacle detection of indoor robots based on monocular vision
HE Shao-jia;LIU Zi-yang;SHI Jian-qing
..............page:2556-2559
Precise damage analysis on active load section of protective engineering
YUAN Hui;WANG Feng-shan
..............page:2667-2671
Strategy selection model for network survivability based on stochastic game
LIANG Xiao;MENG Xiang-ru;ZHUANG Xu-chun;WU Wen
..............page:2609-2612
Name disambiguation based on query expansion
YANG Xin-xin;LI Pei-feng;ZHU Qiao-ming
..............page:2488-2490,2507
Multi-view video transmission method based on depth-map and distributed video coding
WU Lin;JIN Zhi-gang;ZHAO An-an;ZHOU Yuan
..............page:2441-2444