[1] |
Yi ZHANG, Yongrong SUN, Kedong ZHAO, Hua LI, Qinghua ZENG.
Joint detection and tracking algorithm of target in aerial refueling scenes
[J]. Journal of Computer Applications, 2022, 42(9): 2893-2899.
|
[2] |
Meiying LIU, Qiuhui YANG, Xiao WANG, Chuang CAI.
Test suite selection method based on commit prioritization and prediction model
[J]. Journal of Computer Applications, 2022, 42(8): 2534-2539.
|
[3] |
Zheng DI, Yifan CAO, Chao QIU, Tao LUO, Xiaofei WANG.
New computing power network architecture and application case analysis
[J]. Journal of Computer Applications, 2022, 42(6): 1656-1661.
|
[4] |
Dingkang YANG, Shuai HUANG, Shunli WANG, Peng ZHAI, Yidan LI, Lihua ZHANG.
EE-GAN:facial expression recognition method based on generative adversarial network and network integration
[J]. Journal of Computer Applications, 2022, 42(3): 750-756.
|
[5] |
Xiao GUO, Chunshan LI, Yuyue ZHANG, Dianhui CHU.
Service integration method based on adaptive multi‑objective reinforcement learning
[J]. Journal of Computer Applications, 2022, 42(11): 3500-3505.
|
[6] |
WEI Wenle, JIN Guodong, TAN Lining, LU Libin, CHEN Danqi.
Real-time SLAM algorithm with keyframes determined by inertial measurement unit
[J]. Journal of Computer Applications, 2020, 40(4): 1157-1163.
|
[7] |
DENG Xuan, LIAO Kaiyang, ZHENG Yuanlin, YUAN Hui, LEI Hao, CHEN Bing.
Person re-identification based on deep multi-view feature distance learning
[J]. Journal of Computer Applications, 2019, 39(8): 2223-2229.
|
[8] |
YANG Hao, WANG Yu, ZHANG Zhongyuan.
Integration of cost-sensitive algorithms based on average distance of K-nearest neighbor samples
[J]. Journal of Computer Applications, 2019, 39(7): 1883-1887.
|
[9] |
ZHAO Shicao, XIAO Yonghao, DUAN Bowen, LI Yufeng.
HSWAP: numerical simulation workflow management platform suitable for high performance computing environment
[J]. Journal of Computer Applications, 2019, 39(6): 1569-1576.
|
[10] |
ZHAO Wei, LIN Yuming, HUANG Taoyi, LI You.
User opinion extraction based on adaptive crowd labeling with cost constrain
[J]. Journal of Computer Applications, 2019, 39(5): 1351-1356.
|
[11] |
WANG Tianrui, BAO Qianyue, QIN Pinle.
Environmental sound classification method based on Mel-frequency cepstral coefficient, deep convolution and Bagging
[J]. Journal of Computer Applications, 2019, 39(12): 3515-3521.
|
[12] |
XU Hui, FANG Ce, LIU Xiang, YE Zhiwei.
Network intrusion detection system based on improved moth-flame optimization algorithm
[J]. Journal of Computer Applications, 2018, 38(11): 3231-3235.
|
[13] |
WU Zheng, YU Hongtao, LIU Shuxin, ZHU Yuhang.
User identification across multiple social networks based on information entropy
[J]. Journal of Computer Applications, 2017, 37(8): 2374-2380.
|
[14] |
SANG Cheng, CHENG Jian, SHI Yiming.
Knowledge integration and semantic annotation in closed-loop lifecycle management system
[J]. Journal of Computer Applications, 2017, 37(6): 1728-1734.
|
[15] |
LIU Jiajun, YU Gang, HU Min.
Intelligent integration approach of big data for urban infrastructure management and maintenance
[J]. Journal of Computer Applications, 2017, 37(10): 2983-2990.
|