Sciweavers

JDCTA
2010
150views more  JDCTA 2010»
12 years 11 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
JDCTA
2010
136views more  JDCTA 2010»
12 years 11 months ago
The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players
Combining with the characteristics of equestrian sports and the psycho diagnosis technology and using the tools such as Visual Basic, Photoshop, Microsoft Access, Psychodiagnosis ...
Bin Wang, Gaofeng Pan, Xin Li, Chunyan Su
JDCTA
2010
126views more  JDCTA 2010»
12 years 11 months ago
Continuous Neural Decoding Method Based on General Regression Neural Network
Neural decoding is an important task for understanding how the biological nervous system performs computation and communication. This paper introduces a novel continuous neural de...
Jianhua Dai, Xiaochun Liu, Shaomin Zhang, Huaijian...
JDCTA
2010
152views more  JDCTA 2010»
12 years 11 months ago
Spatial Clustering Algorithm Based on Hierarchical-Partition Tree
In spatial clustering, the scale of spatial data is usually very large. Spatial clustering algorithms need high performance, good scalability, and are able to deal with noise and ...
Zhongzhi Li, Xuegang Wang
JDCTA
2010
136views more  JDCTA 2010»
12 years 11 months ago
The Sources of China's Economics Growth during 1997-2007: An Analysis based on Input-Output Approach
The driving forces of China's Economic Growth are investigated in this paper based on the 1997 2002 and 2007 input-output data and the following conclusions are gotten: (1) T...
Ruixiang Liu
JDCTA
2010
169views more  JDCTA 2010»
12 years 11 months ago
The Partner Selection in Virtual Enterprise based on BDI Agent
This paper's research is based on the model of BDI Agent, carries out the research of the modeling and simulating the Virtual Enterprise's partner selection using Swarm ...
Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing
JDCTA
2010
161views more  JDCTA 2010»
12 years 11 months ago
Selection of Wavelet Decomposition Level in Multi-Scale Sensor Data Fusion of MEMS Gyroscope
Because the characteristic of wavelet transform is multi-resolution, their unique advantage of the data model is multi-scale analysis. Then, it's widely used the Wavelet-base...
Ren Ya-fei, Ke Xi-zheng
JDCTA
2010
182views more  JDCTA 2010»
12 years 11 months ago
Fusion Techniques for Reliable Information: A Survey
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...
JDCTA
2010
228views more  JDCTA 2010»
12 years 11 months ago
Research and Progress of Cluster Algorithms based on Granular Computing
Granular Computing (GrC), a knowledge-oriented computing which covers the theory of fuzzy information granularity, rough set theory, the theory of quotient space and interval comp...
Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang
JDCTA
2010
103views more  JDCTA 2010»
12 years 11 months ago
WEB-based Modeling and Simulation Technology in the Training of Power Plant Application -A Set of Steam Turbine for Instance
Electric power generation requires a great deal of production equipment, such as steam turbines, boilers, etc., how to insure the well-run condition of such equipment is the key f...
Hongjun Guan