[1] |
Hao GAO, Qingke ZHANG, Xianglong BU, Junqing LI, Huaxiang ZHANG.
Teaching-learning-based optimization algorithm based on cooperative mutation and Lévy flight strategy and its application
[J]. Journal of Computer Applications, 2023, 43(5): 1355-1364.
|
[2] |
HUO Weigang, WANG Huifang.
Time series anomaly detection method based on autoencoder and HMM
[J]. Journal of Computer Applications, 2020, 40(5): 1329-1334.
|
[3] |
CHEN Yu, TIAN Bojin, PENG Yunzhu, LIAO Yong.
Gaussian mixture clustering algorithm combining elbow method and expectation-maximization for power system customer segmentation
[J]. Journal of Computer Applications, 2020, 40(11): 3217-3223.
|
[4] |
WANG Jince, DENG Yueping, SHI Ming, ZHOU Yunfei.
Time series trend prediction at multiple time scales
[J]. Journal of Computer Applications, 2019, 39(4): 1046-1052.
|
[5] |
YANG Shiqiang, LUO Xiaoyu, QIAO Dan, LIU Peilei, LI Dexin.
Continuous action segmentation and recognition based on sliding window and dynamic programming
[J]. Journal of Computer Applications, 2019, 39(2): 348-353.
|
[6] |
GUO Leiyong, LI Yu, LIN Shengyi, TAN Hongzhou.
Excitation piecewise expansion method for speech bandwidth expansion based on hidden Markov model
[J]. Journal of Computer Applications, 2017, 37(8): 2416-2420.
|
[7] |
LI Fangwei, LI Qi, ZHU Jiang.
Improved method of situation assessment method based on hidden Markov model
[J]. Journal of Computer Applications, 2017, 37(5): 1331-1334.
|
[8] |
WANG Dongli, CAO Peng, HUANG Guoce, SUN Qilu, LI Lianbao.
High frequency cognitive frequency selection mechanism based on hidden Markov model
[J]. Journal of Computer Applications, 2016, 36(5): 1179-1182.
|
[9] |
LI Qiang, CHEN Hao, CHEN Dingdang.
Voice activity detection algorithm based on hidden Markov model
[J]. Journal of Computer Applications, 2016, 36(11): 3212-3216.
|
[10] |
YU Qun, ZHANG Min, CAO Na, HE Qing, SHI Liang.
Power grid fault evolution model based on fuzzy cellular automata
[J]. Journal of Computer Applications, 2015, 35(9): 2682-2686.
|
[11] |
QIAN Shuqu, WU Huihong, XU Guofeng.
Constrained multiobjective optimization algorithm based on repairing strategy for solving dynamic environment/economic dispatch
[J]. Journal of Computer Applications, 2015, 35(8): 2249-2255.
|
[12] |
LIU Wei LI He-cheng.
Uighur characters recognition based on locality preserving projection and hidden Markov model
[J]. Journal of Computer Applications, 2012, 32(08): 2309-2312.
|
[13] |
WEN Kai GUO Fan YU Min.
Adaptive anomaly detection method of Web-based attacks
[J]. Journal of Computer Applications, 2012, 32(07): 2003-2006.
|
[14] |
YAO Xin-an SONG Fei HU Shi-ping.
Design of power supply for high-performance computer system
[J]. Journal of Computer Applications, 2012, 32(04): 1176-1179.
|
[15] |
JI De-zhi WU Wei-dong.
Wspruce: an improved method of measuring available bandwidth
[J]. Journal of Computer Applications, 2012, 32(04): 932-934.
|