[1] |
Nanjiang CHENG, Zhenxia YU, Lin CHEN, Hezhe QIAO.
Multi-source and multi-label pedestrian attribute recognition based on domain adaptation
[J]. Journal of Computer Applications, 2022, 42(8): 2401-2406.
|
[2] |
Yanfei LIU, Zheng PENG, Yihui WANG, Zhong WANG.
PID parameter tuning of brushed direct-current motor based on improved genetic algorithm
[J]. Journal of Computer Applications, 2022, 42(5): 1634-1641.
|
[3] |
Xingshuo DING, Xiang LI, Qian XIE.
Enterprise portrait construction method based on label layering and deepening modeling
[J]. Journal of Computer Applications, 2022, 42(4): 1170-1177.
|
[4] |
Xiaojie LI, Chaoran CUI, Guangle SONG, Yaxi SU, Tianze WU, Chunyun ZHANG.
Stock trend prediction method based on temporal hypergraph convolutional neural network
[J]. Journal of Computer Applications, 2022, 42(3): 797-803.
|
[5] |
Duoqin LI, Xianwen FANG.
Process modeling recommendation method based on behavioral profile definition target rules
[J]. Journal of Computer Applications, 2022, 42(1): 223-229.
|
[6] |
LUO Mingyu, LUO Xiaomeng, ZHU Wenmin, ZHANG Lei, FAN Xiumin.
Modeling technology for maintenance posture of virtual human in narrow space of ship
[J]. Journal of Computer Applications, 2021, 41(8): 2466-2472.
|
[7] |
SHEN Yumin, WANG Jinlong, HU Diankai, LIU Xingyu.
Multi-person collaborative creation system of building information modeling drawings based on blockchain
[J]. Journal of Computer Applications, 2021, 41(8): 2338-2345.
|
[8] |
SUN Heli, XU Tong, HE Liang, JIA Xiaolin.
Personalized social event recommendation method integrating user historical behaviors and social relationships
[J]. Journal of Computer Applications, 2021, 41(2): 324-329.
|
[9] |
WU Rui, LIU Yu, FENG Kai.
Pedestrian attribute recognition based on two-domain self-attention mechanism
[J]. Journal of Computer Applications, 2021, 41(2): 372-378.
|
[10] |
CAO Cejun, LIU Ju.
Overview of modeling method of emergency organization decision in disaster operations management
[J]. Journal of Computer Applications, 2020, 40(7): 2142-2149.
|
[11] |
Shuman WANG, Aiping LI, Liguo DUAN, Jia FU, Yongle CHEN.
Service discovery method for Internet of Things based on Biterm topic model
[J]. Journal of Computer Applications, 2020, 40(2): 459-464.
|
[12] |
SU Zhenyu, SONG Guixiang, LIU Yanming, ZHAO Yuan.
Threat modeling and application of server management control system
[J]. Journal of Computer Applications, 2019, 39(7): 1991-1996.
|
[13] |
LIU Weirong, ZHEN Hong.
Modeling and simulation of container transportation process in blockchain based container sharing mode
[J]. Journal of Computer Applications, 2019, 39(7): 2141-2147.
|
[14] |
NING Jin, CHEN Leiting, ZHOU Chuan, ZHANG Lei.
Intelligent trigger mechanism for model aggregation and disaggregation
[J]. Journal of Computer Applications, 2019, 39(6): 1614-1618.
|
[15] |
LI Lei, XUE Yang, LYU Nianling, FENG Min.
Online task and resource scheduling designing for container cloud queue based on Lyapunov optimization method
[J]. Journal of Computer Applications, 2019, 39(2): 494-500.
|