Biblio
“Sina weibo incident monitor and Chinese disaster microblogging classification”, Journal of Digital Information Management, vol. 13, no. 3, pp. 156 - 161, 2015.
, “An SMS - Based one - Time - Password scheme with client - Side validation”, Journal of Digital Information Management, vol. 13, no. 2, pp. 69 - 75, 2015.
, “Study on the 3D information reconstruction and management of cultural relics based on the articulated arm scanner”, Journal of Digital Information Management, vol. 13, no. 1, pp. 31 - 38, 2015.
, “A SEIR model epidemic of virus on the online social network”, Journal of Digital Information Management, vol. 12, no. 2, pp. 102 - 107, 2014.
, “Soft-404 pages, a crawling problem”, Journal of Digital Information Management, vol. 12, no. 2, pp. 73 - 92, 2014.
, “Study on college student credit evaluation and prediction based on RF algorithm”, Journal of Digital Information Management, vol. 12, no. 1, pp. 26 - 30, 2014.
, “Secure digital certificate design based on the RSA algorithm”, Journal of Digital Information Management, vol. 11, no. 6, pp. 423 - 429, 2013.
, “Security analysis and evaluation of random linear network coding under wiretapping attack”, Journal of Digital Information Management, vol. 11, no. 6, pp. 446 - 452, 2013.
, “Segmentation strategies for passage retrieval from internet video using speech transcripts”, Journal of Digital Information Management, vol. 11, no. 6, pp. 400 - 408, 2013.
, “The short-term wind power forecast based on phase-space reconstruction and neural networks”, Journal of Digital Information Management, vol. 11, no. 1, pp. 40 - 45, 2013.
, “Spanning tree method for minimum communication costs in grouped virtual mapreduce cluster”, Journal of Digital Information Management, vol. 11, no. 3, pp. 213 - 219, 2013.
, “The statistical analysis of family names of donators for wenchuan”, Journal of Digital Information Management, vol. 11, no. 3, pp. 235 - 239, 2013.
, “Structure optimization of ladle bottom based on finite element method”, Journal of Digital Information Management, vol. 11, no. 2, pp. 120 - 124, 2013.
, “Study of methods for constructing families of odd-periodic perfect complementary sequence pairs”, Journal of Digital Information Management, vol. 11, no. 3, pp. 194 - 196, 2013.
, “Study on a robot 3D laser radar information collection system”, Journal of Digital Information Management, vol. 11, no. 1, pp. 69 - 75, 2013.
, “Study on computer audit based on OLAP technology”, Journal of Digital Information Management, vol. 11, no. 6, pp. 409 - 417, 2013.
, “Study on current protection in distribution network with distributed generation”, Journal of Digital Information Management, vol. 11, no. 1, pp. 46 - 53, 2013.
, “Study on fuzzy evaluation of credit risk of corporate bond”, Journal of Digital Information Management, vol. 11, no. 2, pp. 102 - 107, 2013.
, “The study on information characteristics analysis using information diffusion method”, Journal of Digital Information Management, vol. 11, no. 4, pp. 290 - 297, 2013.
, “The study on pendubot control linear quadratic regulator and particle swarm optimization”, Journal of Digital Information Management, vol. 11, no. 1, pp. 16 - 24, 2013.
, “Semantic-oriented integration and simulation-based analysis approach for healthcare information systems (HIS)”, Journal of Digital Information Management, vol. 10, no. 2, pp. 131 - 135, 2012.
, “SERCID: A secure mechanism for data collection in wireless sensor networks”, Journal of Digital Information Management, vol. 10, no. 2, pp. 79 - 85, 2012.
, “Snippets and component-based authoring tools for reusing and connecting documents”, Journal of Digital Information Management, vol. 10, no. 6, pp. 399 - 409, 2012.
, “Special issue editorial”, Journal of Digital Information Management, vol. 10, no. 2, p. - , 2012.
, “Story segmentation of xinwenlianbo based on three-level criterion of content analysis”, Journal of Digital Information Management, vol. 10, no. 2, pp. 104 - 108, 2012.
,