Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2007 Issue 8
A Design and Implementation of a Meta Search Engine with. NET
xu ye qing ; li jin hou ; huang ming xing
..............page:171-172,178
Research and Realization on the Concurrent UML- based Integrated Software Exploitation Environment
huang ming xing ; fang mu yun ; xu ye qing
..............page:168-170
Research and Design of Rights Management in DRMS
yang zhi ; bian xiao lin ; zhou yan ; zhao pei li
..............page:173-175
Design of the Wireless Supervision System for Infusion Pump
Yin Ming;Xie Yun
..............page:176-178
Analysis and Implementation of Porting U- Boot to S3CEV40
Chen Huafeng;Lv Yang
..............page:179-181
A Billing System of CDMA Based on Load Balancing
Deng Xuefeng
..............page:190-192
ying wen zhai yao
..............page:插1-插8
Study and Realization of E - Government Based on Workflow
Wu Lifeng;Chen Yang
..............page:165-167
Ajax and the Application in Web2.0
Yang Xiaojun
..............page:157-160
Design and Implementing of Car Trouble Tool
Hu Ting;Zhang Shijun
..............page:154-156
Fault Diagnosis Based on the D - S Evidence Theory of Information Fusion
hu guan lin ; li juan ; luo yong
..............page:151-153
A Software for Experiment Design under the Linux System
Gan Quan;Liu Manxi
..............page:149-150
Designing and Implementation for Multi -port Serial Communication Based on ARM and uClinux
wang xin ; luo zhi xiang ; shen guang
..............page:144-148
Wireless Short Distance Multi -signals Sensing Based on ARM Chip
lu rui zuo ; liu sheng ; chen xiao jie ; xiao fen luo ; shang peng ; zhang xiao tian
..............page:140-143
Application of DFT in Mark Algorithm Chip
Jiang Wen;Chen Xingwu
..............page:137-139
Electric Cable Temperature Inspecting Based on AT89C51 Singechip
bai li zuo ; qian jin ; zhang yi fei ; zhu jie
..............page:134-136
Study of a New Wideband Speech Codec VMR - WB
zhang shi xiu ; wu jun ; bian xiao lin
..............page:131-133
Research on the Distributed Algorithm of Decision Tree Technique
Wei Hogning;Yan Zhiping
..............page:127-130
Design of BP Networks Based on MATLAB
Sun Fan;Shi Xueqin
..............page:124-126
Research of RBF Neural Network in Function Approximation
sun li ying ; ge chao ; zhu yi
..............page:121-123
Pigeonhole Principle and Application
he chun ; wan lin ; ren ya li
..............page:28-30,112
Application of Three -dimensional Emulating Model to the Damaged Objects
tang zuo ; jia xi sheng ; hu qi wei
..............page:26-27,192
Research of Algorithms on Single -path Routing Protocols for Ad hoc Networks
zhu yan song ; wan run ze ; luo fei ; zuo gui qin
..............page:23-25
Application of GA in the Design of Routing Protocols for WSN
Zhu Pengfei;Jiang Tingyao
..............page:20-22
Pattern Synthesis of Antenna Array Using Genetic Algorithm
Huo De;Zhao Shuqing
..............page:17-19
Study of an Multi- threaded Synchronization Avoiding Death- lock
Wang Yitao;Zhang Li
..............page:14-16,40
Black - based Video Segmentation Algorithm
zhang zhen ming ; chen zhen yu ; liu shuang hai
..............page:8-10,44
Wavelet Nerual Networks Based on Gene Algorithm
Li Xun;Xie Hongsheng
..............page:5-7
Set up JSP WEB Server Based on Windows
hao hai feng ; xu hai feng ; ye jun
..............page:68-70
A Novel AODV with Active Link Repair Protocol
jiang guo xing ; dai jian hui ; song hai fa
..............page:65-67
SMO Parameter Selection Based on Subsection Layer Approach
Xu Sumei;Zhang Xinyi
..............page:60-61,81
Study of Class Test Order
Xie Jin;Song Zhongshan
..............page:57-59
Research on Multilevel Distributing Controlling System in CIMS
Zhou Zhaohui;Liu Yanlin
..............page:48-49,153
Design a High -available Cluster System with OpenSSI and DRBD
Gong Nian;Yuan Youguang
..............page:45-47,116
Parallel Real - time Video Processing Based on Multi - DSPs System
zhu mei neng ; li de hua ; jin liang hai ; huang xiang
..............page:41-44
Struts Framework and the Research of its Application
shen zhi wei ; li de hua ; huang gang
..............page:38-40
Research on Service- Oriented Architecture of Web Heterogeneous Data Integration
wu dan dan ; li guan yu ; yu shui ming
..............page:35-37
Algorithms of Retrieval System
Ren Zhen;Li Chen
..............page:33-34,136
Face Recognition Based on Improved LDA Algorithm
qi xing min ; yin chao qing ; li zhi bo
..............page:31-32,37
A Novel Intelligent Insulin Pump
xu zhi ; zhang hong hai ; gan zhi yin ; ma bin ; liu guo jun ; yang zhi gang ; cai xin xia ; liu sheng
..............page:117-120,123
Corrective Software Maintenance Based on Software Module -order Model
Luo Yunfeng;Ben Kerong
..............page:113-116
A DCT -based Image Watermarking Algorithm
xu shi gang ; li juan ; hu guang
..............page:109-112
Digital Image Segmentation Based on Improve Genetic Algorithm
Yu Nan;Sun Fang
..............page:107-108,164
A Survey of New Image Segmentation Methods
Zheng Xiaoxi;Yan Junlong
..............page:103-106
DNA Computing in Graph Theory
Ma Ying
..............page:100-102
Image Recognition System of Automatic Gold Wire Bonder
chen liang feng ; zhang hong hai ; ma hao
..............page:98-99,156
Research about the Character and Compression of MODIS Remote Sensing Data
Xiao Zheng;Yi Shanzhen
..............page:95-97
Dynamic Role and Context - aware Based Access Control for Grid Applications
ma de fang ; chen li ; li xiao yan
..............page:74-75,143
Usage iptables is the Firewall Research under the LINUX
Yuan Hongkuo
..............page:76-77
Discussion Based on the Changeable Computer Virus and Anti -Virus Situation
wang shan shan ; kong wei wei ; zhang jie
..............page:78-81
A Secure Mobile IP Authentication Based on PKI Protocol
tao ya hui ; yuan you guang ; dai xin fa
..............page:82-84,126
Analysis and Improvement of SET Protocol
Jiang Yanxia;Ju Jun
..............page:85-87
Applying Grid Technology to Implement the Resource Share of GIS
Chen Yuhua;Huang Kaifeng
..............page:88-89,102
Discuss about Computer Virus Attack Methods
Huang Hong
..............page:90-92,97
Image Recognition Based on Neural Networks in Matlab
Tang Xiaodong;Xu Dongping
..............page:93-94