Biblio
“System of boosting voting with multiple learning algorithms”, Journal of Digital Information Management, vol. 8, no. 3, pp. 153 - 159, 2010.
, “Scanning-beam antenna on metamaterials coplanar structure for wireless applications”, Journal of Digital Information Management, vol. 9, no. 3, pp. 111 - 116, 2011.
, “A secure and efficient authentication protocol for mobile RFID systems”, Journal of Digital Information Management, vol. 9, no. 3, pp. 99 - 105, 2011.
, “A semantic annotation model for indexing and retrieving learning objects”, Journal of Digital Information Management, vol. 9, no. 4, pp. 159 - 166, 2011.
, “Semantic resource discovery in large scale environments”, Journal of Digital Information Management, vol. 9, no. 3, pp. 126 - 131, 2011.
, “Semantic-oriented integration and simulation-based analysis approach for healthcare information systems (HIS)”, Journal of Digital Information Management, vol. 10, no. 2, pp. 131 - 135, 2012.
, “SERCID: A secure mechanism for data collection in wireless sensor networks”, Journal of Digital Information Management, vol. 10, no. 2, pp. 79 - 85, 2012.
, “Snippets and component-based authoring tools for reusing and connecting documents”, Journal of Digital Information Management, vol. 10, no. 6, pp. 399 - 409, 2012.
, “Special issue editorial”, Journal of Digital Information Management, vol. 10, no. 2, p. - , 2012.
, “Story segmentation of xinwenlianbo based on three-level criterion of content analysis”, Journal of Digital Information Management, vol. 10, no. 2, pp. 104 - 108, 2012.
, “A strategic search method for requirement-aware functional-block selection and composition in a flexible network”, Journal of Digital Information Management, vol. 10, no. 3, pp. 194 - 201, 2012.
, “A survey on data migration management in cloud environment”, Journal of Digital Information Management, vol. 10, no. 5, pp. 324 - 331, 2012.
, “Swarm-robot system based on wireless sensor network”, Journal of Digital Information Management, vol. 10, no. 5, pp. 277 - 283, 2012.
, “Secure digital certificate design based on the RSA algorithm”, Journal of Digital Information Management, vol. 11, no. 6, pp. 423 - 429, 2013.
, “Security analysis and evaluation of random linear network coding under wiretapping attack”, Journal of Digital Information Management, vol. 11, no. 6, pp. 446 - 452, 2013.
, “Segmentation strategies for passage retrieval from internet video using speech transcripts”, Journal of Digital Information Management, vol. 11, no. 6, pp. 400 - 408, 2013.
, “The short-term wind power forecast based on phase-space reconstruction and neural networks”, Journal of Digital Information Management, vol. 11, no. 1, pp. 40 - 45, 2013.
, “Spanning tree method for minimum communication costs in grouped virtual mapreduce cluster”, Journal of Digital Information Management, vol. 11, no. 3, pp. 213 - 219, 2013.
, “The statistical analysis of family names of donators for wenchuan”, Journal of Digital Information Management, vol. 11, no. 3, pp. 235 - 239, 2013.
, “Structure optimization of ladle bottom based on finite element method”, Journal of Digital Information Management, vol. 11, no. 2, pp. 120 - 124, 2013.
, “Study of methods for constructing families of odd-periodic perfect complementary sequence pairs”, Journal of Digital Information Management, vol. 11, no. 3, pp. 194 - 196, 2013.
, “Study on a robot 3D laser radar information collection system”, Journal of Digital Information Management, vol. 11, no. 1, pp. 69 - 75, 2013.
, “Study on computer audit based on OLAP technology”, Journal of Digital Information Management, vol. 11, no. 6, pp. 409 - 417, 2013.
, “Study on current protection in distribution network with distributed generation”, Journal of Digital Information Management, vol. 11, no. 1, pp. 46 - 53, 2013.
, “Study on fuzzy evaluation of credit risk of corporate bond”, Journal of Digital Information Management, vol. 11, no. 2, pp. 102 - 107, 2013.
,