计算机应用
     Home |  advertisement |  About Journal |  Editorial Board |  Order |  downloads |  Message |  Contacts Us |  Q & A |  Chinese Version
Authors
 Submission
 Scope
 Author Guide
 Template
 Abstract
 Preface
 Agreement
Reviewers
 Review Policy
 Peer Review
 Editor Login
 Editorial Office
 Editor in Chief

30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

All
  
1 Task scheduling algorithm based on improved genetic algorithm in cloud computing environment 2011 Vol.31(01):184-186
null [Abstract] (1794) [HTML 0 KB][PDF 435 KB] (84851)
2 Use of RFID technology for indoor location 2008 Vol.28(7):1858-1860
HUI-FANG DENG QI-PING MA [Abstract] (1765) [HTML 0 KB][PDF 638 KB] (53301)
3 Stateless communication mechanism between an IPv4 network and the IPv6 Internet 2015 Vol.35(8):2113-2117
HAN Guoliang, SHENG Maojia, BAO Congxiao, LI Xing [Abstract] (421) [HTML 0 KB][PDF 938 KB] (48891)
4 Parallelization design of face recognition algorithm based on Matlab multi-core clusters 2011 Vol.31(10):2597-2599
ZHENG Xiao-wei YU Meng-ling [Abstract] (1140) [HTML 0 KB][PDF 485 KB] (45683)
5 Cloud computing and its key techniques 2009 Vol.29(09):2562-2567
null [Abstract] (3402) [HTML 0 KB][PDF 931 KB] (45205)
6 Joint switch scheduling and resource allocation algorithm based on energy efficiency in heterogeneous wireless networks 2015 Vol.35(6):1505-1508
QIU Changxiao, LENG Supeng, YE Yu [Abstract] (308) [HTML 0 KB][PDF 787 KB] (38883)
7 Cooperative spectrum sharing method based on spectrum contract 2015 Vol.35(7):1805-1808
ZHAO Nan, WU Minghu, ZHOU Xianjun, XIONG Wei, ZENG Chunyan [Abstract] (254) [HTML 0 KB][PDF 749 KB] (38066)
8 Unsupervised deep learning method for color image recognition 2015 Vol.35(9):2636-2639
KANG Xiaodong, WANG Hao, GUO Jun, YU Wenyong [Abstract] (379) [HTML 0 KB][PDF 578 KB] (37846)
9 Hybrid detection technique for Android kernel hook 2014 Vol.34(11):3336-3339
HUA Baojian ZHOU Aiting ZHU Hongjun [Abstract] (540) [HTML 0 KB][PDF 820 KB] (29610)
10 Message generation and store model based on HL7V2.x protocol 2011 Vol.31(12):3418-3421
FAN Xiao HUANG Qing-song [Abstract] (1047) [HTML 0 KB][PDF 561 KB] (29180)
11 Enhanced frequency-domain channel contention mechanism in wireless local area network 2015 Vol.35(2):317-321
WANG Jing, GAO Zehua, GAO Feng, PAN Xiang [Abstract] (321) [HTML 0 KB][PDF 718 KB] (28733)
12 Research and simulation of radar side-lobe suppression based on Kalman-minimum mean-square error 2015 Vol.35(5):1488-1491
ZHANG Zhaoxia, WANG Huihui, FU Zheng, YANG Lingzhen, WANG Juanfen, LIU Xianglian [Abstract] (218) [HTML 0 KB][PDF 608 KB] (28183)
13 Optimization between multiple input multiple output radar signal and target interference based on Stackelberg game 2015 Vol.35(4):1185-1189
LAN Xing, WANG Xingliang, LI Wei, WU Haotian, JIANG Mengran [Abstract] (189) [HTML 0 KB][PDF 677 KB] (27200)
14 Improved beer bottles recognition technology 2009 Vol.29(4):1168-1170
Feng FU Duan WANG [Abstract] (1316) [HTML 0 KB][PDF 492 KB] (25263)
15 Delay-aware algorithm of cross-layer design for device-to-device communication based on max-weighted queue 2015 Vol.35(5):1205-1208
YU Shengsheng, GE Wancheng, GUO Aihuang [Abstract] (367) [HTML 0 KB][PDF 564 KB] (24461)
16 Flower pollination algorithm based on simulated annealing 2015 Vol.35(4):1062-1066
XIAO Huihui, WAN Changxuan, DUAN Yanming, ZHONG Qing [Abstract] (464) [HTML 0 KB][PDF 799 KB] (24305)
17 Ear recognition based on improved 2D principal component analysis and neural network 2009 Vol.29(12):3357-3359
null [Abstract] (1436) [HTML 0 KB][PDF 447 KB] (24256)
18 Research and application of vertical search engine in networked manufacturing resource〖JP〗 2007 Vol.27(5):1116-1118
[Abstract] (2220) [HTML 0 KB][PDF 539 KB] (23277)
19 Spectrum allocation based on immune multi-objective optimization in cognitive mesh networks 2014 Vol.34(8):2239-2242
LI Yalun YANG Yanan CAI Zhengyi [Abstract] (206) [HTML 0 KB][PDF 588 KB] (23121)
20 Secret sharing scheme only needing XOR operations 2015 Vol.35(7):1877-1881
YUAN Qizhao, CAI Hongliang, ZHANG Jingzhong, XIA Hangyu [Abstract] (223) [HTML 0 KB][PDF 925 KB] (22740)
21 Rapid convergence algorithms for weight values updating based on BP network 2006 Vol.26(8):1940-1942
[Abstract] (1783) [HTML 0 KB][PDF 567 KB] (22555)
22 Lane detection algorithm based on morphological structure-elements model 2009 Vol.29(2):440-443
Tao Lei [Abstract] (1577) [HTML 0 KB][PDF 646 KB] (22309)
23 Dynamical replacement policy based on cost and popularity in named data networking 2014 Vol.34(12):3369-3372
HUANG Sheng TENG Mingnian CHEN Shenglan LIU Huanlin XIANG Jinsong [Abstract] (237) [HTML 0 KB][PDF 625 KB] (21439)
24 Color image edge detection with region homogeneous measure 2011 Vol.31(09):2485-2488
ZHENG Mei-zhu ZHAO Jing-xiu [Abstract] (1187) [HTML 0 KB][PDF 924 KB] (21062)
25 Deep packet inspection algorithm based on regular expressions 2007 Vol.27(9):2184-2186
[Abstract] (1810) [HTML 0 KB][PDF 780 KB] (21016)
26 Motion detection based on deep auto-encoder networks 2014 Vol.34(10):2934-2937
XU Pei CAI Xiaolu HE Wenwei XIE Yidao [Abstract] (305) [HTML 0 KB][PDF 747 KB] (20958)
27 Secure cross-layer transmission protocol of orthogonal frequency division multiplexing vehicular Ad-Hoc network 2014 Vol.34(5):1232-1235
REN Guofeng JI Jiang LI Haixia TIAN Zhumei [Abstract] (171) [HTML 0 KB][PDF 771 KB] (20724)
28 Modeling on box-office revenue prediction of movie based on neural network 2014 Vol.34(3):742-748
ZHENG Jian ZHOU Shangbo [Abstract] (414) [HTML 0 KB][PDF 1041 KB] (20536)
29 SIP secure authentication model based on strong authentication technology 2006 Vol.26(10):2332-2335
[Abstract] (1783) [HTML 0 KB][PDF 769 KB] (20272)


Copyright ©2005 Sichuan Computer Applications Press Co., Ltd.
Address:No. 9, 4th Section, South Renmin Road, Wuhou District, Chengdu 610041, China
新出网证(川)字026号  蜀ICP备 05010208 号
Tel:028-85224283-803 E-mailbjb@joca.cn

Supportted by Magtech