Biblio
“A Novel Algorithm for Generating pseudo Random Number-”, Journal of Digital Information Management, vol. 18, no. 4, pp. 151-156, 2020.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network”, Journal of Digital Information Management, vol. 16, no. 5, pp. 246-257, 2018.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network-”, Journal of Digital Information Management, vol. 15, no. 5, pp. 246-257, 2018.
, “Hot topic extraction and public opinion classification of tibetan texts”, Journal of Digital Information Management, vol. 14, no. 3, pp. 160 - 167, 2016.
, “Trajectory prediction of vessels based on data mining and machine learning”, Journal of Digital Information Management, vol. 14, no. 1, pp. 33 - 40, 2016.
, “Tibetan Word Sense Disambiguation Based on a Semantic knowledge Network Diagram”, Journal of Digital Information Management, vol. 13, no. 5, pp. 346 - 353, 2015.
, “Analysis of information management and scheduling technology in hadoop”, Journal of Digital Information Management, vol. 12, no. 2, pp. 133 - 138, 2014.
, “An indirect security trust method based on credibility evaluation”, Journal of Digital Information Management, vol. 12, no. 2, pp. 139 - 150, 2014.
, “A SEIR model epidemic of virus on the online social network”, Journal of Digital Information Management, vol. 12, no. 2, pp. 102 - 107, 2014.
, “The analysis of network structure model and innovation network characteristics for industrial cluster: Using complicated network perspective”, Journal of Digital Information Management, vol. 11, no. 4, pp. 277 - 283, 2013.
, “The statistical analysis of family names of donators for wenchuan”, Journal of Digital Information Management, vol. 11, no. 3, pp. 235 - 239, 2013.
, “A comparison of pattern classification approaches for structural damage identification”, Journal of Digital Information Management, vol. 10, no. 2, pp. 126 - 130, 2012.
, “A comparison of pattern classification approaches for structural damage identification”, Journal of Digital Information Management, vol. 10, no. 2, pp. 126 - 130, 2012.
, “Exploration in to reform in computer application technology major in higher vocational colleges based on tripartite linkage”, Journal of Digital Information Management, vol. 10, no. 2, pp. 147 - 152, 2012.
, “Swarm-robot system based on wireless sensor network”, Journal of Digital Information Management, vol. 10, no. 5, pp. 277 - 283, 2012.
, “A taxonomic relationship learning approach for log ontology content event”, Journal of Digital Information Management, vol. 10, no. 2, pp. 109 - 113, 2012.
, “Word combination kernel for text categorization”, Journal of Digital Information Management, vol. 10, no. 3, pp. 202 - 211, 2012.
, “Towards building ranking models with annual reports”, Journal of Digital Information Management, vol. 8, no. 5, pp. 338 - 343, 2010.
, “A query answering surveillance system for detecting and tracking moving objects using bounding rectangles”, Journal of Digital Information Management, vol. 7, no. 1, pp. 15 - 20, 2009.
, “Anomaly detection through quasi-functional dependency analysis”, Journal of Digital Information Management, vol. 5, no. 4, pp. 191 - 200, 2007.
, “Robust self embedding watermarking technique in the DWT domain for digital colored images”, Journal of Digital Information Management, vol. 5, no. 4, pp. 211 - 219, 2007.
,