Sciweavers

JCIT
2010
139views more  JCIT 2010»
13 years 6 months ago
Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model
This study explores the construction of an intermediary as a product knowledge-sharing system for design industry with the advanced features of the Extensible Markup Language (XML...
Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin
JCIT
2010
152views more  JCIT 2010»
13 years 6 months ago
Novel MicroRNAs and Targets Prediction in PRRS Virus Genome
In this paper, 4 microRNAs and their targets were predicted through a de novo prediction procedure in the genome of Porcine Reproductive and Respiratory Syndrome virus. Through cl...
Zhenlin Wei
JCIT
2010
161views more  JCIT 2010»
13 years 6 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
JCIT
2010
115views more  JCIT 2010»
13 years 6 months ago
Metadata Version Management for DW 2, 0 Environment
As a new paradigm for data warehousing demanded by today's decision support community, DW 2.0 recognized the life cycle of data with it, that make metadata evolution mechanis...
Ding Pan
JCIT
2010
83views more  JCIT 2010»
13 years 6 months ago
Key Technologies of Modeling for Equipment Training Environment
For the purpose of equipment training, realistic training environments need to be built and makes operators having an immersed sense. Aiming at present military requirement for eq...
Gang Chen, Huifang Lv, Jun Yang, Yue Zhang
JCIT
2010
162views more  JCIT 2010»
13 years 6 months ago
Traffic Prediction Based on Improved Neural Network
Artificial neural networks and genetic algorithms derived from the corresponding simulation of biology, anatomy. The paper analyzes the advantages and the disadvantages of the art...
Jian-ming Cui
JCIT
2010
150views more  JCIT 2010»
13 years 6 months ago
Characteristic Description of Coupled Task Sets Based on Design Structure Matrix and Its Optimal Time and Efforts Solution by Ge
The complicated interactions among tasks lead to iterations in product design and development. To maintain the market share, enterprises should effectively manage their product de...
Ting-gui Chen, Chun-hua Ju
JCIT
2010
142views more  JCIT 2010»
13 years 6 months ago
A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
In this paper a novel adaptive load balancing routing algorithm in Ad hoc networks based on a gossiping mechanism is proposed. Unlike previously published algorithms, this algorit...
Zhu Bin, Zeng Xiao-ping, Xiong Xian-sheng, Chen Qi...
JCIT
2010
158views more  JCIT 2010»
13 years 6 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He
JCIT
2010
148views more  JCIT 2010»
13 years 6 months ago
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers
Probability theory is the framework for making decision under uncertainty. In classification, Bayes' rule is used to calculate the probabilities of the classes and it is a bi...
Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi...