SPECIAL ISSUE
Information Technology Journal Volume 12, Number 3, 0-0, 2013
PDF
Virtualization-based Recovery Approach for Intrusion Tolerance
Jian-Hua Huang, Jun Huang, Rong Li and Xiao-Ming Li
Information Technology Journal Volume 12, Number 3, 385-390, 2013
Abstract PDF Fulltext Citations XML References
Multi-model Switching Predictive Functional Control of Boiler Main Steam Temperature
Zhang Hua, Lu Wei, Yang Jianhua, Sheng Shengqiang and Guo Huibin
Information Technology Journal Volume 12, Number 3, 391-396, 2013
Abstract PDF Fulltext Citations XML References
Domain-based Software Concurrent Engineering
Yuwan Gu, Guodong Shi, Dean Zhao and Yuqiang Sun
Information Technology Journal Volume 12, Number 3, 397-402, 2013
Abstract PDF Fulltext Citations XML References
A Hybrid P2P-CDN Based on Locality-awareness and Interest-awareness
Shen Fuke and Zhu Yuhong
Information Technology Journal Volume 12, Number 3, 403-408, 2013
Abstract PDF Fulltext Citations XML References
Customer Segmentation for Telecom with the k-means Clustering Method
Luo Ye, Cai Qiuru, Xi Haixu, Liu Yijun and Zhu Guangping
Information Technology Journal Volume 12, Number 3, 409-413, 2013
Abstract PDF Fulltext Citations XML References
Continuously Essential Set of Nash Equilibria for n-person Noncooperative
Games
Lei Sun and Xiaodong Fan
Information Technology Journal Volume 12, Number 3, 414-418, 2013
Abstract PDF Fulltext Citations XML References
A Priority-queuing Model for Heterogeneous Traffic Scheduling in Inter-vehicular
Communication
Wen-Xiang Li, Yan-Qing Sun, Qing-guo Xiong and Ya-Jie Ma
Information Technology Journal Volume 12, Number 3, 419-423, 2013
Abstract PDF Fulltext Citations XML References
System Level Performance of a Novel Dynamic CoMP Scheduling in 3GPP LTE-Advanced
Heterogeneous Networks
Yuan Gao, Yi Li, Hongyi Yu, Xianfeng Wang and Shihai Gao
Information Technology Journal Volume 12, Number 3, 424-428, 2013
Abstract PDF Fulltext Citations XML References
On Coupling Analysis of Complex Network and Pathogenesis Dynamics of Gastroduodenal
Disease
Information Technology Journal Volume 12, Number 3, 429-433, 2013
Abstract PDF Fulltext Citations XML References
Analysis and Comparison of Relay Node Selection Algorithm of Cooperative
Communication
Information Technology Journal Volume 12, Number 3, 434-438, 2013
Abstract PDF Fulltext Citations XML References
Consensus Analysis of Multi-agent-based Rural-urban Migration by Relative
Lyapunov Function Method
Information Technology Journal Volume 12, Number 3, 439-443, 2013
Abstract PDF Fulltext Citations XML References
An Efficient Differential Evolution Algorithm For Function Optimization
Chao-Xue Wang, Chang-Hua Li, Hui Dong and Fan Zhang
Information Technology Journal Volume 12, Number 3, 444-448, 2013
Abstract PDF Fulltext Citations XML References
Application Study of Computer Color Measuring Technology Used in the Process
of Aluminum Coloring
Information Technology Journal Volume 12, Number 3, 449-453, 2013
Abstract PDF Fulltext Citations XML References
TH-interval-valued Fuzzy Rings and Their Homomorphism Properties
Information Technology Journal Volume 12, Number 3, 454-457, 2013
Abstract PDF Fulltext Citations XML References
Web 2.0 Application in Subject Services of High School Libraries
Information Technology Journal Volume 12, Number 3, 458-461, 2013
Abstract PDF Fulltext Citations XML References
E-commerce Promote the Development of Low-carbon Economy in Jilin Province
Lixia Wang and Yinghua Yu
Information Technology Journal Volume 12, Number 3, 462-465, 2013
Abstract PDF Fulltext Citations XML References
Security of Proxy Blind Signature Scheme
Jianhong Zhang, Yuanbo Cui and Zhipeng Chen
Information Technology Journal Volume 12, Number 3, 466-469, 2013
Abstract PDF Fulltext Citations XML References
Modeling and Formal Analysis of Communication Protocols Based on Game
Information Technology Journal Volume 12, Number 3, 470-473, 2013
Abstract PDF Fulltext Citations XML References
Research on Information Self-organization Complex Computer Simulation of
Network Affairs
Information Technology Journal Volume 12, Number 3, 474-477, 2013
Abstract PDF Fulltext Citations XML References
Service Oriented Enterprise Based on Value-aware Service Engineering
Information Technology Journal Volume 12, Number 3, 478-481, 2013
Abstract PDF Fulltext Citations XML References
The Study of Cooperation and Interaction Between Family and Kindergarten
Based on Network
Information Technology Journal Volume 12, Number 3, 482-485, 2013
Abstract PDF Fulltext Citations XML References
The Bottleneck and Strategy of the Informatization of Local University
Information Technology Journal Volume 12, Number 3, 486-489, 2013
Abstract PDF Fulltext Citations XML References
An Anticollision Protocol for Large-Scale Single-Reader RFID Systems
Hao Jutao, Chen Qingkui and Yan Xiaolian
Information Technology Journal Volume 12, Number 3, 490-493, 2013
Abstract PDF Fulltext Citations XML References
Risk Types and Risk Amplification of Online Finance
Information Technology Journal Volume 12, Number 3, 494-497, 2013
Abstract PDF Fulltext Citations XML References
Production Management Modelling of Ship Repair Process Based on MAS
Li He, Xuewen Huang and Xiaobing Liu
Information Technology Journal Volume 12, Number 3, 498-501, 2013
Abstract PDF Fulltext Citations XML References
A Localization Algorithm Based On SFLA and PSO for Wireless Sensor Network
Information Technology Journal Volume 12, Number 3, 502-505, 2013
Abstract PDF Fulltext Citations XML References
On Covering Multi-granulation Fuzzy Rough Sets
Information Technology Journal Volume 12, Number 3, 506-509, 2013
Abstract PDF Fulltext Citations XML References
Polarity Analysis of Stock Comments in Chinese Based on Word Clustering
Information Technology Journal Volume 12, Number 3, 510-513, 2013
Abstract PDF Fulltext Citations XML References
Optimized Multilevel Immune Learning Algorithm in Abnormal Detection
Information Technology Journal Volume 12, Number 3, 514-517, 2013
Abstract PDF Fulltext Citations XML References
Shadow Verification Based on Feature Matching and Image Matting
Liang Zhang, Xiaomei He and Haili Wang
Information Technology Journal Volume 12, Number 3, 518-521, 2013
Abstract PDF Fulltext Citations XML References
Security Analysis of Practical Anonymous User Authentication Scheme with
Security Proof
Chenglian Liu, Changlu Lin and Shuliang Sun
Information Technology Journal Volume 12, Number 3, 522-525, 2013
Abstract PDF Fulltext Citations XML References
Research and Design of MW-SVM Image Enhancement Algorithm in Embedded Network
Video Monitor System
Chen Qisong, Gong Wei and Chen Xiaowei
Information Technology Journal Volume 12, Number 3, 526-529, 2013
Abstract PDF Fulltext Citations XML References
Type Selection of Gating System Based on Bayesian Reasoning
Wang Bin, Tan Gui-Qin, Liu De-Fang and Chen Xin-Bo
Information Technology Journal Volume 12, Number 3, 530-533, 2013
Abstract PDF Fulltext Citations XML References
Dynamic Evaluation Model of Networked Manufacturing Resources Based on Grey
Target Decision
Wang Bin, Tao Jun-Long, Liu De-Fang and Chen Xin-Bo
Information Technology Journal Volume 12, Number 3, 534-537, 2013
Abstract PDF Fulltext Citations XML References
An Experiment Research on Different Damping Distributions of Isolation Bearings
of Lateral-torsional Coupling Isolated System
Xiangzhen Li, Huangchang Fu and Yifeng Xie
Information Technology Journal Volume 12, Number 3, 538-541, 2013
Abstract PDF Fulltext Citations XML References
The Optimizational Pitch Control Strategy with the Clonal Selection on Quantum Genetic
Algorithm
Information Technology Journal Volume 12, Number 3, 542-544, 2013
Abstract PDF Fulltext Citations XML References
Factors Influencing Social Networking Website Loyalty
Information Technology Journal Volume 12, Number 3, 545-547, 2013
Abstract PDF Fulltext Citations XML References
Interval-valued Information Systems Rough Set Model Based on Multi-granulations
Information Technology Journal Volume 12, Number 3, 548-550, 2013
Abstract PDF Fulltext Citations XML References
An Indoor User Location Estimation Method in Wireless Sensor Networks
Yuanguo Cheng and Shaochang Chen
Information Technology Journal Volume 12, Number 3, 551-553, 2013
Abstract PDF Fulltext Citations XML References
Application of Minimum Subordinative Degree on Choice of Key Defense Site in Battle
Information Technology Journal Volume 12, Number 3, 554-555, 2013
Abstract PDF Fulltext Citations XML References
ACKNOWLEDGEMENT TO THE REVIEWERS
Information Technology Journal Volume 12, Number 3, 556-557, 2013
PDF