[1] |
Xiaomeng SHAO, Meng ZHANG.
Temporal convolutional knowledge tracing model with attention mechanism
[J]. Journal of Computer Applications, 2023, 43(2): 343-348.
|
[2] |
Jun WU, Aijia OUYANG, Lin ZHANG.
Statistically significant sequential patterns mining algorithm under influence degree
[J]. Journal of Computer Applications, 2022, 42(9): 2713-2721.
|
[3] |
Yiyang GUO, Jiong YU, Xusheng DU, Shaozhi YANG, Ming CAO.
Outlier detection algorithm based on autoencoder and ensemble learning
[J]. Journal of Computer Applications, 2022, 42(7): 2078-2087.
|
[4] |
Shunkun YU, Hongxu YAN.
Heuristic attribute value reduction model based on certainty factor
[J]. Journal of Computer Applications, 2022, 42(2): 469-474.
|
[5] |
MENG Fan, CHEN Guang, WANG Yong, GAO Yang, GAO Dequn, JIA Wenlong.
Multi-granularity temporal structure representation based outlier detection method for prediction of oil reservoir
[J]. Journal of Computer Applications, 2021, 41(8): 2453-2459.
|
[6] |
LIU Shize, QIN Yanjun, WANG Chenxing, SU Lin, KE Qixue, LUO Haiyong, SUN Yi, WANG Baohui.
Traffic flow prediction algorithm based on deep residual long short-term memory network
[J]. Journal of Computer Applications, 2021, 41(6): 1566-1572.
|
[7] |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng.
Self-generated deep neural network based 4D trajectory prediction
[J]. Journal of Computer Applications, 2021, 41(5): 1492-1499.
|
[8] |
LI Guorong, YE Jimin, ZHEN Yuanting.
Time series clustering based on new robust similarity measure
[J]. Journal of Computer Applications, 2021, 41(5): 1343-1347.
|
[9] |
CHEN Kai, YU Yanwei, ZHAO Jindong, SONG Peng.
Work location inference method with big data of urban traffic surveillance
[J]. Journal of Computer Applications, 2021, 41(1): 177-184.
|
[10] |
NING Jin, CHEN Leiting, LUO Zijuan, ZHOU Chuan, ZENG Huiru.
Evaluation metrics of outlier detection algorithms
[J]. Journal of Computer Applications, 2020, 40(9): 2622-2627.
|
[11] |
SUN Jianjun, XU Yan.
Estimation of underdetermined mixing matrix based on improved weighted fuzzy C-means clustering
[J]. Journal of Computer Applications, 2020, 40(6): 1769-1773.
|
[12] |
LONG Yangyang, CHEN Yuling, XIN Yang, DOU Hui.
Secure energy transaction scheme based on alliance blockchain
[J]. Journal of Computer Applications, 2020, 40(6): 1668-1673.
|
[13] |
DU Xusheng, YU Jiong, YE Lele, CHEN Jiaying.
Outlier detection algorithm based on graph random walk
[J]. Journal of Computer Applications, 2020, 40(5): 1322-1328.
|
[14] |
XU Zhoubo, YANG Jian, LIU Huadong, HUANG Wenwen.
Protein complex identification algorithm based on XGboost and topological structural information
[J]. Journal of Computer Applications, 2020, 40(5): 1510-1514.
|
[15] |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke.
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing
[J]. Journal of Computer Applications, 2020, 40(3): 783-787.
|