column
An Approach of Slicing for Object-Oriented Language with Exception Handling
HAO Jie, JIANG Shu-juan,
2012, 29(3):1-5.
Abstract PDF
A Method of Text Classification Based on Key Events
ZHONG Zhao-man, LI Cun-hua,
2012, 29(3):6-9.
Abstract PDF
Application of Improved Support Vector Machines in Network Intrusion Detection
YU Jing, WANG Hui,
2012, 29(3):10-13.
Abstract PDF
Research on Network Security Evaluation Model of Chain Enterprises
CAI Jing-mei,
2012, 29(3):14-17,21.
Abstract PDF
Information Fusion Estimation Algorithm by Robust Least Squares and Wavelet Analysis
ZHU Pei-yi, SUN Shun-yuan, LIU Zhu, XU Bao-guo,
2012, 29(3):18-21.
Abstract PDF
A Novel Visual Object Tracking Algorithm Based on Multiple Clues Probability Distribution Image Fusion
LI Zi-long, BAO Rong,
2012, 29(3):22-25.
Abstract PDF
Quantum Interference Crossover Based GA and its Application
YANG Yu, DAI Hong-wei, LI Cun-hua,
2012, 29(3):26-30.
Abstract PDF
Research of Text Clustering Based on Improved Ant Colony Algorithm
LV Yan,
2012, 29(3):31-34.
Abstract PDF
Research on High Speed Network Intrusion Detection Algorithm Based on the ACBM Rules Matching
TAN Xian-ru,
2012, 29(3):35-38,42.
Abstract PDF
Network Anomaly Detection by Combination of QPSO and LSSVM
YAO Ye,
2012, 29(3):39-42.
Abstract PDF
Semantic Web Services Discovery Algorithm Research in Heterogeneous Environment
ZHEN Jing-bo, WANG Zhi-xiao, WANG Ji-lin,
2012, 29(3):43-46,50.
Abstract PDF
Analysis of Water Quality and Quantity in Yangtze River-Taihu Lake Water Transfer Project Based on Correlation Analysis and Regression Models
ZHU Yue-long, ZHU Jia-li, LI Shi-jin, WU Hao-yun, LU Ming-feng, CHEN Fang,
2012, 29(3):47-50.
Abstract PDF
Fuzzy Ideals of Rings Based on Implication Operators
SONG Lu-yao, LIAO Zu-hua, CAO Shu, WANG De-jiang, LIU Chun-zhi,
2012, 29(3):51-54,59.
Abstract PDF
Improved Missing Stream Data Interpolation Algorithm
ZHANG Zhou-feng, ZHANG Lei, WANG Zhi-chao,
2012, 29(3):55-59.
Abstract PDF
Video Abstract Based on Locally Linear Embedding
FENG Yan, WANG Hong-yuan, CHENG Qi-cai,
2012, 29(3):60-63,68.
Abstract PDF
Research on Knowledge Ontology Retrieval Mechanism of Mine Hoist
XU Xiao-lin, NIU Qiang, LIN Wei,
2012, 29(3):64-68.
Abstract PDF
A New Collaborative Recommendation Algorithm Research
LI Hui, HU Yun, LI Cun-hua,
2012, 29(3):69-72,77.
Abstract PDF
Test Case Generator for Campus-wide Card System Based on Object-Z and Markov
ZHONG Xiao-min, HOU Jian-hua, YANG Chang-qing,
2012, 29(3):73-77.
Abstract PDF
Singular Vector Space Biclustering Algorithm
XU Xiao-hua, XI Yan-qiu, PAN Zhou-jin, LU Lin, CHEN Leng,
2012, 29(3):78-83.
Abstract PDF
Saliency Detection Based on Inhibition of Blur Regions
ZHENG Yang, LIU Chun-ping, LIU Gong, WANG Zhao-hui,
2012, 29(3):84-88.
Abstract PDF
Design of Urban Traffic Publics Traveling Service System
WU Lei, HOU Zhong-wei, XU Deng-yuan,
2012, 29(3):89-92,97.
Abstract PDF
A Novel Particle Filtering Tracking Method Based on the Local Density of Particles
ZHANG Ji, WANG Hong-yuan,
2012, 29(3):93-97.
Abstract PDF
Network Traffic Prediction Based on Combination Neural Network
ZHANG Zhi,
2012, 29(3):98-101,105.
Abstract PDF
Model of Intrusion Detection Based on Means Clustering and PSO Algorithm
NIU Hong-hui, XU Tian,
2012, 29(3):102-105.
Abstract PDF
An Improved Load Balancing of Linux Cluster System of Linux
TU Jun-ying,
2012, 29(3):106-109.
Abstract PDF
Based on the Improvement of Web Association Rules Method Research
ZHANG Xiang, CHEN Sheng-yong,
2012, 29(3):110-112,116.
Abstract PDF
Based on Local Contact the Wireless Sensor Networks Abnormal Intrusion Detection
FAN Rong-zhen,
2012, 29(3):113-116.
Abstract PDF
On the Research of Nurses' Workplace Deviance Behavior Based on Weighted Association Rules
WANG Dong-yan, YU Jia-yuan,
2012, 29(3):117-120.
Abstract PDF
Combination-Based Method of Business Analyses and Cases Generated Automatically
MA Jue,
2012, 29(3):121-124.
Abstract PDF
Based on Fast Fourier Transform 3D Modeling Method to Study the Waves
LIU Xu,
2012, 29(3):125-128.
Abstract PDF
A P2P Network the Credibility of Fast Calculation Method Research
DU Feng-lei,
2012, 29(3):129-132.
Abstract PDF
Based on PLC Sewage Detection System Design and Application
LI Ji-biao, WANG Guo,
2012, 29(3):133-135,139.
Abstract PDF
Based on the Fuzzy Clustering Linux Network Dynamic Intrusion Detection
YU Dong-min, SHI Jian-zheng,
2012, 29(3):136-139.
Abstract PDF
The Triangle Frequency Conversion Technology in the Application of the Fungus Activation
LENG Bao-chun,
2012, 29(3):140-143.
Abstract PDF
Improved K-means Algorithm Network Database Intrusion Detection
HAN Zhan-zhu,
2012, 29(3):144-146,150.
Abstract PDF
Distributed Control System Consistency Control Method Research
TIAN Ping, LIU Yan-bin,
2012, 29(3):147-150.
Abstract PDF
Image Restoration Using Dimensional Reduction Method
YE Gu-ping,
2012, 29(3):151-154.
Abstract PDF
Campus Network the Identity Authentication Technology Platform
YE Ru-jun,
2012, 29(3):155-158.
Abstract PDF
Campus Network Security Abnormal Invasion of Quick Location Methods Research
WANG Hui,
2012, 29(3):159-162.
Abstract PDF
Rapid Database Search Method of Research and Application
LI Fang-fang, TIAN Zhi-jun,
2012, 29(3):163-166.
Abstract PDF
Load Balancing Based on Cloud Model
ZHAO Chao, WANG Sheng,
2012, 29(3):167-169,173.
Abstract PDF
The Moving Object's Shadow Elimination Algorithm Based on Integer Wavelet Transform
BIAN Jian-yong, XU Jian-min,
2012, 29(3):170-173.
Abstract PDF
Design and Implementation of Face Recognition System Based on Embedded
LIU Shuang,
2012, 29(3):174-177.
Abstract PDF
Eliminate Semantic Network Word Segmentation Ambiguity Method Research
CHEN Xiao-ming, LI Ling-li, LIANG Xiong-you,
2012, 29(3):178-181.
Abstract PDF
Using SVM and HMM for Serial Signal Processing
WANG Yong-tao,
2012, 29(3):182-184.
Abstract PDF