[1] |
WU Peng, WU Jinzhao.
Reasoning method based on linear error assertion
[J]. Journal of Computer Applications, 2021, 41(8): 2199-2204.
|
[2] |
SHI Xuesong, LI Xianhua, SUN Qing, SONG Tao.
Noise image segmentation by adaptive wavelet transform based on artificial bee swarm and fuzzy C-means
[J]. Journal of Computer Applications, 2021, 41(8): 2312-2317.
|
[3] |
LI Tong, QIU Runhe.
Relay selection and performance analysis of multi-relay cooperative spatial modulation
[J]. Journal of Computer Applications, 2021, 41(7): 2019-2025.
|
[4] |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan.
Optimized CKKS scheme based on learning with errors problem
[J]. Journal of Computer Applications, 2021, 41(6): 1723-1728.
|
[5] |
GAN Lan, SHEN Hongfei, WANG Yao, ZHANG Yuejin.
Data augmentation method based on improved deep convolutional generative adversarial networks
[J]. Journal of Computer Applications, 2021, 41(5): 1305-1313.
|
[6] |
JIANG Kaolin, BAI Wei, ZHANG Lei, CHEN Jun, PAN Zhisong, GUO Shize.
Malicious code detection based on multi-channel image deep learning
[J]. Journal of Computer Applications, 2021, 41(4): 1142-1147.
|
[7] |
HE Jiean, WU Xiaohong, HE Xiaohai, HU Jianrong, QIN Linbo.
Imperfect wheat kernel recognition combined with image enhancement and conventional neural network
[J]. Journal of Computer Applications, 2021, 41(3): 911-916.
|
[8] |
LIU Yu, ZHU Chaoyang, LI Jinze, LAO Yuanji, QIN Tuanfa.
d-PBFT:detection consensus algorithm for alliance blockchain
[J]. Journal of Computer Applications, 2021, 41(3): 756-762.
|
[9] |
ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong.
Adaptive network transmission mechanism based on forward error correction
[J]. Journal of Computer Applications, 2021, 41(3): 825-832.
|
[10] |
ZHANG Qilin, LI Fangwei, WANG Mingyue.
Time of arrival positioning based on time reversal
[J]. Journal of Computer Applications, 2021, 41(3): 820-824.
|
[11] |
SHE Yulong, ZHANG Xiaolong, CHENG Ruoqin, DENG Chunhua.
Semantic segmentation method based on edge attention model
[J]. Journal of Computer Applications, 2021, 41(2): 343-349.
|
[12] |
HUI Fei, XING Meihua, GUO Jing, TANG Shuyu.
Forward collision warning strategy based on vehicle-to-vehicle communication
[J]. Journal of Computer Applications, 2021, 41(2): 498-503.
|
[13] |
XIAO Yuelei, ZHANG Yunjiao.
Terrorist attack organization prediction method based on feature selection and hyperparameter optimization
[J]. Journal of Computer Applications, 2020, 40(8): 2262-2267.
|
[14] |
CAO Jianfang, ZHAO Aidi, ZHANG Zibang.
Application of convolutional neural network with threshold optimization in image annotation
[J]. Journal of Computer Applications, 2020, 40(6): 1587-1592.
|
[15] |
ZHANG Haoran, WANG Xueyuan, LI Xiaoxia.
Low SNR denoising algorithm based on adaptive voice activity detection and minimum mean-square error log-spectral amplitude estimation
[J]. Journal of Computer Applications, 2020, 40(6): 1763-1768.
|