Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2009 Issue 12
Research of Fault Diagnosis System of Intelligent BIT Based on BP Neural Network
jia ai mei ; mei xiao shun
..............page:54-56,157
Orthogonal Defects Classification for the Component-based Software
li hua ying ; hu jing yu ; chai li ya
..............page:64-66,179
Application of Wavelet Transform in Remote Sensing Image Fusion
zhang li ning ; shen li rong ; zhou yu
..............page:130-134
Block-based Management and Implementation of NOR Flash in Embedded System
du wei qing ; su kai xiong
..............page:80-82
Design and Implementation of Workflow Management System
he ben ; liu pei pei ; feng hai xin ; hu ting ; shen hai jun
..............page:163-166
Optimization Technology for Queries in Relational Database
fan xin hua
..............page:188-192
Research on Orthogonal Transformation in Digital Image Processing
liu cheng cheng ; wu gang
..............page:151-154
A Buyer-Seller Watermarking Algorithm for Color Images Based on Lifting Wavelet
yuan zhi min ; zhao bao qin
..............page:122-125,138
Research on Improved Particle Filtering Algorithms in the Multiple-Target Tracking
zhang nian ci ; zhong zuo ; yu chang zuo
..............page:1-3,192
Application of .NET Remoting in Distributed Modeling and Simulation Environment
zhang yan zuo ; chen deng ; peng li
..............page:67-69,150
Strorage Management of Main Memory Database
zhong shi guo ; lu zheng xin
..............page:50-53,134
Tactical Data Link-16 Network Research Based on Weather Factor
liu hong bo ; chen tao ; huang xiang qing
..............page:47-49,92
A Freight Train Marshalling-Scheduling Model and Algorithms
wan wu zu ; wang xiao feng
..............page:24-27
FPGA Implementation of NCO Based on CORDIC Algorithm
wang yu liang ; li hong sheng ; xia dun zhu
..............page:21-23,82
Revised Algorithm of Mining Association Rules Based on Graph
huang hong xing
..............page:38-41,162
Research of Meridian User Interface Based on Semantic Network
lin you de ; chen guo dong ; yu lun
..............page:119-121,206
Influences and Countermeasures of Web Crawler on Network Security
liang xue song ; zhang rong
..............page:86-88,166
Expand Lagrange Polynomial Interpolation Based on VB & MATLAB
wang de dong ; zhu ben hao
..............page:17-20
Method for Unstructured Viscous Cartesian Grid
he yue long ; li dun
..............page:31-33
Design and Implementation of Community Health Management System Based on the SSH Framework
zhang jian ying ; bai shang wang ; dang wei chao ; ling hu bin
..............page:207-211
Application of the Binocular Orientation in the Digital Camera Image Calibration
chen lin ; chen xiang ; duan xiao wei ; zhang lei
..............page:155-157
Study on Object Tracking Technology Based on Color-Space 2D Histogram
lin zuo ; zhang hua jun
..............page:126-129
Design of Vibration Data Transfers Security Based Remote Diagnosis
zhao chang sheng ; li hong kun ; zhao li hua
..............page:97-100
Design of Relational Database and Research on Algorithm for BOM
peng ke qin ; yue qing
..............page:14-16
Folder Embellsihed Programing on Windows
han zuo qing ; wang sheng zheng
..............page:202-206
Development and Applications of Bar Code
li jun hong ; zhan shao bin
..............page:115-118,154
Research on Authorization and Access Control Based on CLM
li xiao yan ; wang xu mei ; yang sha
..............page:101-104
Design and Realization of Unidirectional Network Data Controller Based on FPGA
zhou bo ; fu hou kui ; gao qi
..............page:93-96,201
A Fast and Practical Method for Universal Form Analysis
jie zheng mei ; han yang
..............page:158-162
Usage of FPGA Technology in Digital Studio Transmission System
wang jian song ; men ai dong ; yang bo
..............page:175-179
An Intrusion-tolerant Agent Based Traitor Tracing Scheme
zhou min ; yang chen
..............page:83-85
Implementation of T-MAC Protocol for Wireless Sensor Networks
kang zuo jie
..............page:180-183
Research and Application of Fingerprint Image Quality Estimation
guo guo wei ; liu da mao
..............page:144-146,197
Research on AUML-based Agent Modeling
lin yong ; liu wei guo ; huang zhi gang ; gao peng yi ; he yan
..............page:70-75
Implementation of Video Monitoring Server Based on Power Line Communication and Streaming Media
li chuan ; tian feng chun ; wang zuo zuo
..............page:170-174
Application of LVQ Neural Network in Classification of Surface Defects for Arc Segments Ceramic Magnet
yan jun long ; zheng xiao zuo ; li tie yuan
..............page:147-150
Network-based IDS in the Institute of Design and Application
song qing da ; zhu wen ; zhao liang liang
..............page:105-107,111
Research of UDP Penetrating NAT in the P2P Network
liu zuo dong ; chen tian huang
..............page:112-114,143
Approximate Algorithm of Nash Equilibrium in Some n×n Matrix Game
zhang dan ; xu dao yun
..............page:10-13
ORACLE User Role-based Rights Management Design
zhao xiao juan
..............page:89-92
Improved Discrete Competition Evolutionary Algorithm for Solving Traveling Salesman Problems
wang jie ; peng zhao sheng ; liu le
..............page:34-37
Research on Ontology-based Semantic Retrieval Model
liu lin ; qin jie
..............page:60-63
Design of Wireless Temperature Monitoring System for High-voltage Equipment
chen yan bing ; chen zhong hui ; chen xin
..............page:193-197
Application of Bayesian Theory in Robotic Data Fusion
yu hua ; wu wen quan ; liu zhong
..............page:4-9
A Search Engine Based on User Behavior Clustering
zheng shuang yang ; lin jin xian
..............page:28-30,75