scispace - formally typeset
Search or ask a question
JournalISSN: 1673-629X

Computer Technology and Development 

China Computer Federation
About: Computer Technology and Development is an academic journal. The journal publishes majorly in the area(s): Web service & Cluster analysis. Over the lifetime, 1616 publications have been published receiving 3378 citations.

Papers published on a yearly basis

Papers
More filters
Journal Article
TL;DR: The simulation experiment with IRIS data set shows that the proposed algorithm converges faster and the value k found is close to the actual value, which proves the validity of the algorithm.
Abstract: Aiming at the problemsof too much iterative times in selecting initial centroids stochastically for K-Means algorithm,a method is proposed to optimize the initial centroids through cutting the set into k segmentations and select one point in each segmentation as initial centroids for iterative computing. A new valid function called clustering-index is defined as the sum of clustering-density and clustering-significance and can be used to search the optimization of k in the internal of [1,n(1/2) ]. The simulation experiment with IRIS data set shows that the proposed algorithm converges faster and the value k found is close to the actual value,which proves the validity of the algorithm.

88 citations

Journal Article
TL;DR: Presents a fast fingerprint enhancement and minutiae extraction algorithm which improves the clarity of the ridge and valley structures of the input fingerprint images based on the frequency and orientation of the local ridges and thereby extracts correctminutiae.
Abstract: Automatic and reliable extraction of minutiae from fingerprint images is a critical step in fingerprint matching.The quality of input fingerprint images plays an important role in the performance of automatic identification and verification algorithms.Presents a fast fingerprint enhancement and minutiae extraction algorithm which improves the clarity of the ridge and valley structures of the input fingerprint images based on the frequency and orientation of the local ridges and thereby extracts correct minutiae.Experimental results show that the method performs well.

66 citations

Journal Article
Chen Sheng-tan1
TL;DR: With the rapid development of technology of multimedia, the traditional information retrieval techniques based on methods based on x-ray crystallization, X-ray diffraction, and other techniques have changed dramatically.
Abstract: With the rapid development of technology of multimedia,the traditional information retrieval techniques based on

30 citations

Journal Article
XU Hong-wei1
TL;DR: The article describes the RBAC with time character, the temporal authorization and the temporal role-based access control model are presented by cycle restraint and constructed one role access control system about the time restraint.
Abstract: The research work of RBAC is greatly emphasized in recent years.However,the main work focuses on some characters which have nothing to do with the time character.In the real life many access control with the time related cannot obtain very good solution,especially some request very high timeliness or the very strong rule periodic access control.The article describes the RBAC with time character,the temporal authorization and the temporal role-based access control model are presented by cycle restraint.And constructed one role access control system about the time restraint,solved a series problem of time and the role of the access control,enhanced the efforts of access control.

30 citations

Journal Article
TL;DR: In this paper, some key questions about wireless sensor network are introduced and analyzed, and the future of the wireless sensors network is presented according to the current research development.
Abstract: Wireless sensor network,composed by sensors,microprocessor and wireless communication interface is an interesting field,and gains more and more attentions.The wide application prospects make it developing rapidly in some fields such as health care,environment monitoring and military field.In this paper,some key questions about wireless sensor network are introduced and analyzed.At the last part,the future of the wireless sensor network is presented according to the current research development.

27 citations

Network Information
Related Journals (5)
Computer Engineering
10K papers, 19.5K citations
84% related
Computer Engineering and Applications
6.5K papers, 16.1K citations
84% related
Journal of Computer Applications
6.4K papers, 11.7K citations
83% related
Application Research of Computers
4.4K papers, 10.5K citations
81% related
Journal of Computer Research and Development
3.1K papers, 13.6K citations
78% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
201515
201461
2013125
2012136
2011180
2010192