计算机应用
     Home |  advertisement |  About Journal |  Editorial Board |  Order |  downloads |  Message |  Contacts Us |  Q & A |  Chinese Version
Authors
 Submission
 Scope
 Author Guide
 Template
 Abstract
 Preface
 Agreement
Reviewers
 Review Policy
 Peer Review
 Editor Login
 Editorial Office
 Editor in Chief

Quick Search  
  Adv Search   Help
 
 
Journal of Computer Applications
2019, Vol.39 No.7
Published  10 July 2019

Advanced computing
Computer software technology
Cyber security
Virtual reality and multimedia computing
Frontier & interdisciplinary applications
Network and communications
Artificial intelligence
Artificial intelligence
1869 ZHANG Yonglai, ZHOU Yaojian
Review of clustering algorithms
2019 Vol. 39 (7): 1869-1882 [Abstract] ( 16 ) [HTML] [PDF 1156KB] ( 29 )
1883 YANG Hao, WANG Yu, ZHANG Zhongyuan
Integration of cost-sensitive algorithms based on average distance of K-nearest neighbor samples
2019 Vol. 39 (7): 1883-1887 [Abstract] ( 48 ) [HTML] [PDF 797KB] ( 20 )
1888 KIM Chungsong, LI Dong
Deep learning neural network model for consumer preference prediction
2019 Vol. 39 (7): 1888-1893 [Abstract] ( 15 ) [HTML] [PDF 1216KB] ( 20 )
1894 WEI Xing, LE Yue, HAN Jianghong, LU Yang
Vehicle behavior dynamic recognition network based on long short-term memory
2019 Vol. 39 (7): 1894-1898 [Abstract] ( 22 ) [HTML] [PDF 3707KB] ( 13 )
1899 HU Liang, XIAO Renbin, LI Hao
Bee colony double inhibition labor division algorithm and its application in traffic signal timing
2019 Vol. 39 (7): 1899-1904 [Abstract] ( 6 ) [HTML] [PDF 1080KB] ( 3 )
1905 HE Hailin, ZHENG Jianbin, YU Fangli, YU Lie, ZHAN Enqi
Exoskeleton robot gait detection based on improved whale optimization algorithm
2019 Vol. 39 (7): 1905-1911 [Abstract] ( 17 ) [HTML] [PDF 963KB] ( 18 )
1912 SHI Wenxu, YANG Yang, BAO Shengli
Greedy core acceleration dynamic programming algorithm for solving discounted {0-1} knapsack problem
2019 Vol. 39 (7): 1912-1917 [Abstract] ( 43 ) [HTML] [PDF 1047KB] ( 26 )
1918 CHEN Jiafeng, TENG Chong
Joint entity and relation extraction model based on reinforcement learning
2019 Vol. 39 (7): 1918-1924 [Abstract] ( 8 ) [HTML] [PDF 1599KB] ( 9 )
1925 YAN Mengxiang, JI Donghong, REN Yafeng
Deceptive review detection via hierarchical neural network model with attention mechanism
2019 Vol. 39 (7): 1925-1930 [Abstract] ( 3 ) [HTML] [PDF 958KB] ( 7 )
1931 MENG Shilin, ZHAO Yunlong, GUAN Donghai, ZHAI Xiangping
Sentiment analysis method combining sentiment and semantic information
2019 Vol. 39 (7): 1931-1935 [Abstract] ( 2 ) [HTML] [PDF 825KB] ( 9 )
1936 CHEN Zhenghao, FENG Ao, HE Jia
Text sentiment classification based on 1D convolutional hybrid neural network
2019 Vol. 39 (7): 1936-1941 [Abstract] ( 15 ) [HTML] [PDF 4868KB] ( 9 )
1942 XIANG Jinyong, YANG Wenzhong, SILAMU·Wushouer
Text sentiment classification algorithm based on feature selection and deep belief network
2019 Vol. 39 (7): 1942-1947 [Abstract] ( 3 ) [HTML] [PDF 984KB] ( 3 )
1948 WU Hao, WANG Xincan, LI Xinyun, LIU Zhifen, CHEN Junjie, GUO Hao
Brain function network feature selection and classification based on multi-level template
2019 Vol. 39 (7): 1948-1953 [Abstract] ( 2 ) [HTML] [PDF 1024KB] ( 6 )
Cyber security
1954 LIU Yudong, WANG Xu'an, TU Guangsheng, WANG Han
Cloud outsourcing data secure auditing protocol throughout whole lifecycle
2019 Vol. 39 (7): 1954-1958 [Abstract] ( 9 ) [HTML] [PDF 878KB] ( 9 )
1959 FU Menglin, WU Lifa, HONG Zheng, FENG Wenbo
Research on vulnerability mining technique for smart contracts
2019 Vol. 39 (7): 1959-1966 [Abstract] ( 12 ) [HTML] [PDF 674KB] ( 16 )
1967 YANG Hongyu, LI Bochao
Network abnormal behavior detection model based on adversarially learned inference
2019 Vol. 39 (7): 1967-1972 [Abstract] ( 4 ) [HTML] [PDF 908KB] ( 3 )
1973 MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun
Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system
2019 Vol. 39 (7): 1973-1978 [Abstract] ( 8 ) [HTML] [PDF 1621KB] ( 4 )
1979 CAO Weidong, XU Zhixiang
Efficient semi-supervised multi-level intrusion detection algorithm
2019 Vol. 39 (7): 1979-1984 [Abstract] ( 7 ) [HTML] [PDF 712KB] ( 4 )
1985 MA Fangfang, LIU Shubo, XIONG Xingxing, NIU Xiaoguang
Privacy protection based on local differential privacy for numerical sensitive data of wearable devices
2019 Vol. 39 (7): 1985-1990 [Abstract] ( 17 ) [HTML] [PDF 1205KB] ( 12 )
1991 SU Zhenyu, SONG Guixiang, LIU Yanming, ZHAO Yuan
Threat modeling and application of server management control system
2019 Vol. 39 (7): 1991-1996 [Abstract] ( 22 ) [HTML] [PDF 4492KB] ( 7 )
1997 WANG Zhong, HAN Yiliang
Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem
2019 Vol. 39 (7): 1997-2000 [Abstract] ( 12 ) [HTML] [PDF 719KB] ( 7 )
Advanced computing
2001 LIN Li, XIONG Jinbo, XIAO Ruliang, LIN Mingwei, CHEN Xiuhua
Gaming@Edge: low latency cloud gaming system based on edge nodes
2019 Vol. 39 (7): 2001-2007 [Abstract] ( 8 ) [HTML] [PDF 846KB] ( 4 )
2008 HE Xi, WU Yantao, DI Zhenwei, CHEN Jia
GPU-based morphological reconstruction system
2019 Vol. 39 (7): 2008-2013 [Abstract] ( 10 ) [HTML] [PDF 956KB] ( 4 )
Network and communications
2014 HE Lifang, CHEN Jun, ZHANG Tianqi
Correlation delay-DCSK chaotic communication scheme without inter-signal interference
2019 Vol. 39 (7): 2014-2018 [Abstract] ( 12 ) [HTML] [PDF 792KB] ( 4 )
2019 YANG Zhijun, LIU Zheng, DING Hongwei
Research of continuous time two-level polling system performance of exhaustive service and gated service
2019 Vol. 39 (7): 2019-2023 [Abstract] ( 10 ) [HTML] [PDF 653KB] ( 3 )
2024 FU Lidong, HAO Wei, LI Dan, LI Fan
Community dividing algorithm based on similarity of common neighbor nodes
2019 Vol. 39 (7): 2024-2029 [Abstract] ( 8 ) [HTML] [PDF 954KB] ( 6 )
2030 LI Shibao, WANG Yixin, ZHAO Dayin, YE Wei, GUO Lin, LIU Jianhang
Partial interference alignment scheme with limited antenna resource in heterogeneous network
2019 Vol. 39 (7): 2030-2034 [Abstract] ( 16 ) [HTML] [PDF 3728KB] ( 5 )
2035 HE Qing, XU Qinshuai, WEI Kangyuan
Enhanced sine cosine algorithm based node deployment optimization of wireless sensor network
2019 Vol. 39 (7): 2035-2043 [Abstract] ( 42 ) [HTML] [PDF 1225KB] ( 45 )
2044 ZHANG Chao, LI Ke, FAN Pingzhi
Online-hot video cache replacement policy based on cooperative small base stations and popularity prediction
2019 Vol. 39 (7): 2044-2050 [Abstract] ( 24 ) [HTML] [PDF 4755KB] ( 11 )
2051 WEN Kai, TAN Xiao
Device-to-device caching algorithm based on user preference and replica threshold
2019 Vol. 39 (7): 2051-2055 [Abstract] ( 16 ) [HTML] [PDF 2831KB] ( 5 )
2056 LIU Lishuang, WEI Zhongcheng, ZHANG Chunhua, WANG Wei, ZHAO Jijun
Lifetime estimation for human motion with WiFi channel state information
2019 Vol. 39 (7): 2056-2060 [Abstract] ( 32 ) [HTML] [PDF 3639KB] ( 15 )
2061 TAN Xin, LI Xiaohui, LIU Zhenxing, DING Yuemin, ZHAO Min, WANG Qi
Sampling awareness weighted round robin scheduling algorithm in power grid
2019 Vol. 39 (7): 2061-2064 [Abstract] ( 2 ) [HTML] [PDF 636KB] ( 2 )
Computer software technology
2065 YUAN Yue, LI Yi
Polynomial ranking function detection method based on Dixon resultant and successive difference substitution
2019 Vol. 39 (7): 2065-2073 [Abstract] ( 11 ) [HTML] [PDF 900KB] ( 3 )
2074 WANG Yafang, LIU Dongsheng, HOU Min
Clone code detection based on image similarity
2019 Vol. 39 (7): 2074-2080 [Abstract] ( 7 ) [HTML] [PDF 865KB] ( 3 )
Virtual reality and multimedia computing
2081 WANG Ping, PANG Wenhao
Two-stream CNN for action recognition based on video segmentation
2019 Vol. 39 (7): 2081-2086 [Abstract] ( 7 ) [HTML] [PDF 755KB] ( 37 )
2087 WAGN Keqiang, ZHANG Yushuai, WANG Baoqun
Multi-exposure image fusion algorithm based on Retinex theory
2019 Vol. 39 (7): 2087-2092 [Abstract] ( 1 ) [HTML] [PDF 994KB] ( 3 )
2093 BO Dan, LI Zongchun, WANG Xiaonan, QIAO Hanwen
Accelerated KAZE-SIFT feature extraction algorithm for oblique images
2019 Vol. 39 (7): 2093-2097 [Abstract] ( 11 ) [HTML] [PDF 1005KB] ( 14 )
2098 LUO Yuan, YUN Mingjing, WANG Yi, ZHAO Liming
Human fatigue detection based on eye information characteristics
2019 Vol. 39 (7): 2098-2102 [Abstract] ( 49 ) [HTML] [PDF 748KB] ( 25 )
2103 LI Wenjun, CHEN Bin, LI Jianming, QIAN Jide
Surface scratch recognition method based on deep neural network
2019 Vol. 39 (7): 2103-2108 [Abstract] ( 5 ) [HTML] [PDF 997KB] ( 9 )
2109 DENG Zhonghao, CHEN Xiaodong
Pulmonary nodule detection algorithm based on deep convolutional neural network
2019 Vol. 39 (7): 2109-2115 [Abstract] ( 12 ) [HTML] [PDF 841KB] ( 8 )
2116 XUE Qian, LUO Qijun, WANG Yue
Crack detection for aircraft skin based on image analysis
2019 Vol. 39 (7): 2116-2120 [Abstract] ( 14 ) [HTML] [PDF 924KB] ( 6 )
2121 ZHU Kai, FU Zhongliang, CHEN Xiaoqing
Left ventricular segmentation method of ultrasound image based on convolutional neural network
2019 Vol. 39 (7): 2121-2124 [Abstract] ( 2 ) [HTML] [PDF 690KB] ( 3 )
2125 WANG Lishun, ZHONG Yong, LI Zhendong, HE Yilong
On-line fabric defect recognition algorithm based on deep learning
2019 Vol. 39 (7): 2125-2128 [Abstract] ( 15 ) [HTML] [PDF 737KB] ( 11 )
2129 SHUI Liucheng, LIU Weizhong, FENG Zhuoming
Automatic image annotation based on generative adversarial network
2019 Vol. 39 (7): 2129-2133 [Abstract] ( 2 ) [HTML] [PDF 875KB] ( 3 )
2134 CHEN Li, CHEN Xiaoyun
Detection method of hard exudates in fundus images by combining local entropy and robust principal components analysis
2019 Vol. 39 (7): 2134-2140 [Abstract] ( 0 ) [HTML] [PDF 1062KB] ( 3 )
Frontier & interdisciplinary applications
2141 LIU Weirong, ZHEN Hong
Modeling and simulation of container transportation process in blockchain based container sharing mode
2019 Vol. 39 (7): 2141-2147 [Abstract] ( 5 ) [HTML] [PDF 4676KB] ( 7 )
2148 GAN Jun, LI Qiang, CHEN Zihao, ZHANG Chao
Improvement of blockchain practical Byzantine fault tolerance consensus algorithm
2019 Vol. 39 (7): 2148-2155 [Abstract] ( 1 ) [HTML] [PDF 1409KB] ( 3 )
2156 XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai
Public welfare time bank system based on blockchain technology
2019 Vol. 39 (7): 2156-2161 [Abstract] ( 14 ) [HTML] [PDF 4430KB] ( 9 )
2162 HUANG Jiacheng, XU Xinhua, WANG Shichun
Improved scheme of delegated proof of stake consensus mechanism
2019 Vol. 39 (7): 2162-2167 [Abstract] ( 9 ) [HTML] [PDF 1113KB] ( 14 )
2168 YANG Xiaohua, GUO Jianquan
Multi-period multi-decision closed-loop logistics network for fresh products with fuzzy variables
2019 Vol. 39 (7): 2168-2174 [Abstract] ( 8 ) [HTML] [PDF 1107KB] ( 9 )
2175 DU Xiaolei, CHEN Zhigang, ZHANG Nan, XU Xu
Train fault identification based on compressed sensing and deep wavelet neural network
2019 Vol. 39 (7): 2175-2180 [Abstract] ( 5 ) [HTML] [PDF 981KB] ( 4 )
计算机应用
Readers
eJournal
 Forthcoming
 Current Issue
 Next Issue
 Archive
 Search
 Top Read
 Top Download
 Email Alert
 

ICT
CNKI



Copyright ©2005 Sichuan Computer Applications Press Co., Ltd.
Address:No. 9, 4th Section, South Renmin Road, Wuhou District, Chengdu 610041, China
新出网证(川)字026号  蜀ICP备 05010208 号
Tel:028-85224283-803 E-mailbjb@joca.cn

Supportted by Magtech