|
|
Other articles related with "na":
|
|
427 |
Hanyue WEI, Chenjuan GUO, Jieyuan MEI, Jindong TIAN, Peng CHEN, Ronghui XU, Bin YANG |
| |
|
MATCH: multimodal stock prediction framework integrating time-frequency features and hybrid text |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 427-436
[Abstract]
(8)
[HTML 0 KB]
[PDF 2000 KB]
(5)
|
|
|
0 |
|
| |
|
Orthogonal constraint and attention-guided augmentation for class-incremental learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 964 KB]
()
|
|
|
0 |
|
| |
|
Fake news detection model based on cross-social media dissemination features |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
()
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Survey on the concepts, core technologies and challenges of retrieval augmented generation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
()
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
High-order feature migration flow network model for intercity population mobility prediction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(5)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Attributed graph anomaly detection method based on multi-level con-textual correlation analysis |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
()
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Review of methods and applications for analyzing user-generated content |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Review of feature learning for pedestrian re-identification under occlusion conditions |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Light detection and ranging simultaneous localization and mapping system based on ground segmentation and loop optimization in dynamic environment |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
EfficientDepth: A Lightweight Depth Estimation Method for Low-cost Robot Deployment in Marine Environments |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Machine reading comprehension model integrating dynamic interaction and contrastive learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
()
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Tobacco baking temperature and humidity prediction model based on global-local feature fusion network in image space-frequency domain |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Detection algorithm for tennis ball and curtain object in tennis scene |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 0 KB]
(2)
|
|
|
0 |
|
| |
|
Research on the Enterprise Key Funds Supervision Model Based on the Kunlun Large Model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(4)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Fraudulent Phone Recognition by Integrating Graph Structure and Multi Channel Attention Mechanism |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(4)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Heterogeneous multi-agent reinforcement learning enabled co-optimization of UAV 3D obstacle avoidance and edge computing#br# |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 1880 KB]
(14)
|
|
|
0 |
|
| |
|
A Criminal Psychological Attribution Classification Model Based on Hybrid Prompt Learning and TF-Chi Probability Features |
| |
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(1)
[HTML 0 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Hybrid Causal Model Learning Algorithm Based on Relational Data |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 674 KB]
(8)
|
|
|
0 |
|
| |
|
Coal-Mine Load Forecasting Based on Adaptive Multi-Scale EMA and Multi-Path Signal Feature Fusion |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 2379 KB]
(10)
|
|
|
0 |
|
| |
|
CBAM-CGRU-SVM based Android malware detection method |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(101)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
A malicious traffic detection method based on multi model parallel fusion network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Learnable query-based efficient multi-object gesture recognition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
|
0 |
|
| |
|
Performance Optimization of Distributed Storage Systems for Power Scenarios |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
()
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Research on autonomous localization and navigation of surveillance robot in complex industrial environments |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Memory-augmented Spatio-temporal Graph Transformer based Unsupervised Anomaly Detection for IoT Time Series |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Prediction Method for Telecom Operator User Package Selection Based on K-means and XGBoost |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
|
0 |
|
| |
|
Argument component classification model with dual-level attention and improved global pointer network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(6)
[HTML 1 KB]
[PDF 711 KB]
(7)
|
|
|
0 |
|
| |
|
Spectral Metric Lattice Sampling-Based Identity Authentication Mechanism for Federated Prototype Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 0 KB]
(4)
|
|
|
0 |
|
| |
|
Cloud-edge-device multi-agent collaborative communication and task scheduling framework driven by large-small model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(62)
[HTML 1 KB]
[PDF 0 KB]
(15)
|
|
|
0 |
|
| |
|
Wavelet-domain sparse Bayesian learning for uncertainty-aware MRI reconstruction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 1512 KB]
(12)
|
|
|
0 |
|
| |
|
Heuristic repair method for inconsistent data violating conditional functional dependency with built-in predicates |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 637 KB]
(2)
|
|
|
0 |
|
| |
|
CSL-YOLOv12: small target detection algorithm for UAV images based on improved YOLOv12n |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(28)
[HTML 1 KB]
[PDF 1124 KB]
(10)
|
|
|
0 |
|
| |
|
GMF-Net: Alzheimer's disease classification method based on cross-modal generation and multimodal fusion |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(11)
[HTML 1 KB]
[PDF 858 KB]
(10)
|
|
|
0 |
|
| |
|
Learning recommendation combining large language models and multimodal knowledge graph neighborhood aggregation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1231 KB]
(24)
|
|
|
0 |
|
| |
|
Chinese medical named entity recognition fused with prompt and metric learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(25)
[HTML 1 KB]
[PDF 717 KB]
(4)
|
|
|
0 |
|
| |
|
CSAF-YOLO: improved YOLO11 algorithm for underwater small object detection |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(35)
[HTML 1 KB]
[PDF 2318 KB]
(13)
|
|
|
0 |
LI Yuchen, LI Wanggen, WANG Cheng, GAO Shangshu, ZHANG Chunsheng |
| |
|
Action recognition based on fusion of temporal convolution and multi-dimensional attention |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 6083 KB]
(8)
|
|
|
0 |
|
| |
|
Graph recommendation model based on dynamic embedding enhancement and hybrid sampling fusion |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(34)
[HTML 1 KB]
[PDF 1496 KB]
(4)
|
|
|
0 |
|
| |
|
Low-cost architecture search method for low-value-density time series signals#br#
#br#
|
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 877 KB]
(59)
|
|
|
0 |
WEI Hongtu, XIA Wei |
| |
|
Dynamic modification method for vehicle routing problem model based on chain of experts |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 2075 KB]
(3)
|
|
|
0 |
DONG Yukun, LIU Xiaoshan, LIU Shuai, MENG Xinran, WEN Yunhao |
| |
|
Unit test case generation based on path guidance and iterative optimization#br#
#br#
|
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 1419 KB]
(33)
|
|
|
0 |
WANG Han, YU Ruiqi, REN Shuang |
| |
|
Survey on differentiable neural architecture search methods |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 504 KB]
(18)
|
|
|
0 |
ZHANG Ziheng, QIN Jin |
| |
|
Policy optimization method integrating overestimated and underestimated value functions |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 2098 KB]
(12)
|
|
|
0 |
|
| |
|
Drug repositioning method based on meta-path and principal component analysis |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 1550 KB]
(23)
|
|
|
0 |
|
| |
|
Low-altitude dynamic navigation method based on visual AI and three-dimensional grid computing |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 2054 KB]
(8)
|
|
|
0 |
|
| |
|
Interpretation method based on selective Softmax gradient for layer-wise relevance propagation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 1555 KB]
(3)
|
|
|
0 |
|
| |
|
Reinforcement learning-based particle swarm optimization algorithm with adaptive dynamic strategy |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 1709 KB]
(14)
|
|
|
0 |
|
| |
|
Secure sharing scheme for high-dimensional power data based on flow models |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 2139 KB]
(10)
|
|
|
0 |
ZHANG Rui, ZHENG Zhicheng, PAN Lihu, GUO Huanyuan, ZHANG Linliang, YAN Huimin |
| |
|
Mesoscopic modeling-based multi-agent simulation method for dynamic traffic |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 2041 KB]
(7)
|
|
|
0 |
LI Huaijin, ZHANG Shibing, YANG Min |
| |
|
DDoS attack detection method based on DeepInsight and hybrid quantum convolutional neural network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1795 KB]
(8)
|
|
|
0 |
|
| |
|
Generative Adversarial Link Prediction Algorithm Based on Node Encoding for Undirected and Unweighted Graphs |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(27)
[HTML 1 KB]
[PDF 1334 KB]
(2)
|
|
|
0 |
|
| |
|
Probabilistic Structural Damage Identification Based on Hypersphere Ring Description |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1206 KB]
(4)
|
|
|
0 |
|
| |
|
Attribute reduction in fuzzy rough sets integrating weight and relative distance |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(23)
[HTML 1 KB]
[PDF 807 KB]
(5)
|
|
|
0 |
|
| |
|
Greedy Shapley game for multimodal recommendation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(29)
[HTML 1 KB]
[PDF 586 KB]
(1)
|
|
|
0 |
|
| |
|
SiamGAN
-
CNNBiLSTM
:
respiratory state classification system with WiFi signal
-
based data augmentation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 1917 KB]
(5)
|
|
|
0 |
|
| |
|
Application of quantum alternating operator Ansatz in maximum distance k matching |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 616 KB]
(11)
|
|
|
0 |
|
| |
|
Traffic flow prediction based on spatio-temporal attention with decoupled dynamic residual map convolution |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(25)
[HTML 1 KB]
[PDF 1189 KB]
(16)
|
|
|
0 |
|
| |
|
Dynamic reasoning-based contract review method using large language models |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(29)
[HTML 1 KB]
[PDF 1826 KB]
(8)
|
|
|
0 |
|
| |
|
Post-hoc detection method for wafer map unknown defects based on hyperdimensional computing |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(35)
[HTML 1 KB]
[PDF 571 KB]
(17)
|
|
|
0 |
WANG Mengting, GAO Shuanliang, LIAO Wenrui, LI Geng, ZHANG Jiaxing, ZHU Yuanfang, ZHAO Tiange, LIU Yonghui, LIANG Hongru |
| |
|
Message consistency parsing framework for aviation domain |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(22)
[HTML 1 KB]
[PDF 1147 KB]
(22)
|
|
|
0 |
YANG Pei, LIU Youliang |
| |
|
Multi-modal image fusion algorithm based on temporal dynamic fusion and adaptive feature refinement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(28)
[HTML 1 KB]
[PDF 4745 KB]
(11)
|
|
|
0 |
|
| |
|
CNN pruning and quantization compression method for reconfigurable structures |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(23)
[HTML 1 KB]
[PDF 4022 KB]
(8)
|
|
|
0 |
|
| |
|
Dual-role interaction mechanism-based large language model for mental health |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 885 KB]
(3)
|
|
|
0 |
|
| |
|
Blind image super-resolution reconstruction method by integrating degradation estimation and dynamic residual dense blocks |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 4205 KB]
(8)
|
|
|
0 |
|
| |
|
Adaptive constrained multi-objective evolutionary algorithm guided by effective information |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 994 KB]
(6)
|
|
|
0 |
|
| |
|
Construction of software defect prediction dataset with explainability |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 2282 KB]
(22)
|
|
|
0 |
|
| |
|
Cross
-
domain handover authentication scheme for vanets with vehicle type verification |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(30)
[HTML 1 KB]
[PDF 1287 KB]
(6)
|
|
|
0 |
|
| |
|
Rock thin section lithology identification model based on improved GhostNet |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 3173 KB]
(7)
|
|
|
0 |
MIN Wanxiong, YAN Yicheng, WANG Jiuyin, LIANG Yukuan, LIANG Wenyang, PAN Zuozhou, LIAO Yong |
| |
|
Fault diagnosis method integrating dual-threshold preliminary screening and edge-level dynamic graph convolution |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 1500 KB]
(9)
|
|
|
3872 |
Jingfeng WEI, Zhongyuan YAO, Shuosen MA, Chao WANG, Shangkun GUO, Ziqiang ZHU, Xueming SI |
| |
|
Review of blockchain technology applications in carbon emission trading system |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3872-3880
[Abstract]
(207)
[HTML 1 KB]
[PDF 656 KB]
(58)
|
|
|
0 |
|
| |
|
Multivariate time series data analysis method based on transposed self-attention mechanism and convolutional autoencoder |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(46)
[HTML 1 KB]
[PDF 1081 KB]
(19)
|
|
|
0 |
|
| |
|
DCSFFuzzer:Dual-channel semantic feature fusion-based fuzz testing method for industrial control protocols |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 2033 KB]
(1)
|
|
|
0 |
|
| |
|
Object detection algorithm based on improved YOLOv11 in foggy weather |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(81)
[HTML 1 KB]
[PDF 1540 KB]
(25)
|
|
|
0 |
|
| |
|
Bi-directional diffusion dynamic graph convolutional network with multi-source information fusion and graph-level attention for traffic flow prediction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(40)
[HTML 1 KB]
[PDF 1143 KB]
(3)
|
|
|
0 |
|
| |
|
User-oriented multi-behavior reinforcement learning model for learning path recommendation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(36)
[HTML 1 KB]
[PDF 1102 KB]
(4)
|
|
|
0 |
|
| |
|
Two-stage energy consumption feature selection method based on tree-based models |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 995 KB]
(2)
|
|
|
0 |
|
| |
|
Syntactically enhanced aspect-based sentiment analysis via mutual information maximization and contrastive learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1074 KB]
(1)
|
|
|
0 |
|
| |
|
Deepfake detection method based on fusion of multimodal physical prior features |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(54)
[HTML 1 KB]
[PDF 2570 KB]
(6)
|
|
|
0 |
|
| |
|
Aspect-level sentiment triplet extraction based on graph convolutional network and cross-domain data enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(18)
[HTML 1 KB]
[PDF 1264 KB]
(4)
|
|
|
0 |
|
| |
|
Differential-linear analysis method for data encryption algorithms LiCi |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(18)
[HTML 1 KB]
[PDF 873 KB]
(2)
|
|
|
0 |
|
| |
|
Elevator multivariate time series anomaly detection method based on dynamic spatial-temporal encoder |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 1576 KB]
(2)
|
|
|
0 |
XU Xiaolong, WANG Junfeng, WU Peng, CAO Xiansheng |
| |
|
Unit test generation method via path constraint sharding driven LLM |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(38)
[HTML 1 KB]
[PDF 3585 KB]
(11)
|
|
|
0 |
|
| |
|
Graph Convolutional Network Enhanced by Graph Diffusion and Dual-View Feature Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(34)
[HTML 1 KB]
[PDF 1408 KB]
(3)
|
|
|
0 |
|
| |
|
MATCH: Multimodal Analysis of Time-Frequency Features and Cross-source Hybrid Text for Stock Prediction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(83)
[HTML 1 KB]
[PDF 1281 KB]
(157)
|
|
|
0 |
|
| |
|
Heterogeneous Enhancement and Multi-Source Knowledge Fusion for Aspect-Based Sentiment Analysis |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(75)
[HTML 1 KB]
[PDF 1008 KB]
(64)
|
|
|
0 |
|
| |
|
Curriculum Reinforcement Learning-Based Robotic End-to-End Dynamic Grasping |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(30)
[HTML 1 KB]
[PDF 1055 KB]
(6)
|
|
|
0 |
|
| |
|
Time series forecasting model based on dynamic weighted ensemble |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(29)
[HTML 1 KB]
[PDF 1178 KB]
(3)
|
|
|
0 |
|
| |
|
Video snapshot compressive imaging reconstruction method based on dense spatio-temporal deformable attention |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(30)
[HTML 1 KB]
[PDF 1203 KB]
(3)
|
|
|
0 |
|
| |
|
Speech Emotion Recognition with Global-Aware Fusion on Binary Multi-Scale Features(CCF Bigdata2025 + P00151) |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1850 KB]
(7)
|
|
|
0 |
|
| |
|
Data Center PUE Prediction and Analysis Based on LSTM-Transformer |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 2901 KB]
(18)
|
|
|
0 |
|
| |
|
Zynco: A High-Performance Framework for Coordinated Data Updates |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 1753 KB]
(14)
|
|
|
0 |
|
| |
|
Multimodal Sentiment Analysis Model for Missing Modalities under Shared Semantic Conditions |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(25)
[HTML 1 KB]
[PDF 1230 KB]
(13)
|
|
|
0 |
|
| |
|
Large Language Model-Enhanced Ant Colony Optimization for Multi-Solution Traveling Salesman Problem |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(38)
[HTML 1 KB]
[PDF 2760 KB]
(12)
|
|
|
0 |
|
| |
|
A Complex Event Extraction Method Based on Event Argument Relation Recognition and Maximal Clique Search |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(47)
[HTML 1 KB]
[PDF 1071 KB]
(20)
|
|
|
0 |
|
| |
|
Knowledge-aware recommendation performance enhancement method based on hierarchical multi-topology collaborative contrastive learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1634 KB]
(1)
|
|
|
0 |
|
| |
|
Dynamic targeted recovery method for backdoor model purification |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(39)
[HTML 1 KB]
[PDF 12336 KB]
(4)
|
|
|
0 |
|
| |
|
Short-term power load forecasting model based on dynamic convolution decomposition and multi-scale graphs |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 3674 KB]
(2)
|
|
|
0 |
|
| |
|
Horizon detection method for cross-camera bird’s-eye-view road alignment |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1035 KB]
(1)
|
|
|
0 |
|
| |
|
Zero-shot human-object interaction detection method via multimodal collaborative prompt optimization |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(28)
[HTML 1 KB]
[PDF 1288 KB]
(3)
|
|
|
0 |
|
| |
|
Master-apprentice evolutionary algorithm based on improved local search for minimum weakly connected dominating set problem |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 789 KB]
(2)
|
|
|
0 |
|
| |
|
Channel estimation algorithm for orthogonal frequency division multiplexing system based on deep neural network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 3075 KB]
(1)
|
|
|
0 |
|
| |
|
Non-intrusive load monitoring method combining BiLSTM-Transformer and Kolmogorov-Arnold network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(22)
[HTML 1 KB]
[PDF 1675 KB]
(3)
|
|
|
0 |
MA Kaiguang, CHEN Xuebin, JIAN Yinlong, WANG Liu, GAO Yuan |
| |
|
Network intrusion detection based on hybrid sequence model and federated class balance algorithm |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(48)
[HTML 1 KB]
[PDF 529 KB]
(10)
|
|
|
0 |
|
| |
|
Graph Neural Network Framework for Topology Semantic Dual-Domain Collaboration |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 2327 KB]
(16)
|
|
|
0 |
|
| |
|
A Traffic Signal Optimization Method Based on Dual-Policy Network in Reinforcement Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(34)
[HTML 1 KB]
[PDF 1667 KB]
(3)
|
|
|
0 |
|
| |
|
Lightweight Residual and Brightness-Aware Dynamic Feature Fusion for Low-Light Image Enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(43)
[HTML 1 KB]
[PDF 2688 KB]
(10)
|
|
|
0 |
|
| |
|
Dual-channel fusion representations method for short text clustering based on large language model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(60)
[HTML 1 KB]
[PDF 746 KB]
(10)
|
|
|
0 |
|
| |
|
Large language model-driven method for qualifier enhancement in hyper-relational knowledge graphs |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(71)
[HTML 1 KB]
[PDF 1949 KB]
(11)
|
|
|
0 |
|
| |
|
Frequency-domain driven and diffusion fused sonar image enhancement algorithm |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(57)
[HTML 1 KB]
[PDF 2353 KB]
(7)
|
|
|
0 |
|
| |
|
Dual-channel Multimodal Sentiment Analysis Model Based on Contrast Invariance And Enhance Specificity |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(67)
[HTML 1 KB]
[PDF 1189 KB]
(9)
|
|
|
0 |
|
| |
|
Complex query answering model integrated with bidirectional sequence embeddings#br#
#br#
|
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(37)
[HTML 1 KB]
[PDF 554 KB]
(9)
|
|
|
0 |
|
| |
|
Hypergraph learning via Block Diagonal Representation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 1848 KB]
(4)
|
|
|
0 |
|
| |
|
Appearance-Motion Collaborative Modeling for Video Anomaly Detection |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 1966 KB]
(16)
|
|
|
0 |
|
| |
|
Prediction-Evaluation Framework for Fault Detection in EV Lithium-Ion Batteries |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(39)
[HTML 1 KB]
[PDF 1617 KB]
(6)
|
|
|
0 |
|
| |
|
Supervised Contrastive Generative Sentiment Analysis with Uncertainty-Aware Unlikelihood Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(45)
[HTML 1 KB]
[PDF 902 KB]
(5)
|
|
|
0 |
|
| |
|
3D human pose estimation model based on temporal-spatial feature pyramid network and multi-hypothesis interaction mechanism |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(67)
[HTML 1 KB]
[PDF 1399 KB]
(11)
|
|
|
0 |
|
| |
|
Urban traffic flow prediction based on dual-layer multi-scale dynamic graph convolutional network model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(68)
[HTML 1 KB]
[PDF 805 KB]
(28)
|
|
|
0 |
|
| |
|
Time-Interdependency-Aware Dynamic Bayesian Network for Traffic Prediction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(92)
[HTML 1 KB]
[PDF 1204 KB]
(40)
|
|
|
2457 |
Ao SHEN, Ruizhang HUANG, Jingjing XUE, Yanping CHEN, Yongbin QIN |
| |
|
Deep variational text clustering model based on distribution augmentation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2457-2463
[Abstract]
(185)
[HTML 0 KB]
[PDF 2197 KB]
(36)
|
|
|
0 |
|
| |
|
MD-FVR: a cascade finger vein recognition network based on multi-domain feature fusion |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(58)
[HTML 1 KB]
[PDF 831 KB]
(48)
|
|
|
0 |
|
| |
|
Task-free online sparse continual learning method for high-speed data streams |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(46)
[HTML 1 KB]
[PDF 1041 KB]
(14)
|
|
|
546 |
Rifeng ZHANG, Guangming LI, Yurong OUYANG |
| |
|
Low-light image enhancement network guided by reflection prior map |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 546-554
[Abstract]
(49)
[HTML 1 KB]
[PDF 11604 KB]
(26)
|
|
|
587 |
Tinghu WEI, Haoyan LIU, Jianning WU |
| |
|
Graph spatiotemporal learning model-based method for detecting dynamic changes of leg length discrepancy |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 587-595
[Abstract]
(33)
[HTML 1 KB]
[PDF 1252 KB]
(9)
|
|
|
640 |
Kejian CUI, Zhiming WANG, Zhaowen QIU |
| |
|
Method for retinal vessel segmentation and coronary artery disease prediction using optical coherence tomography angiography |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 640-651
[Abstract]
(48)
[HTML 1 KB]
[PDF 5546 KB]
(15)
|
|
|
0 |
WANG Rilong, LI Zhenping, LI Xiaosong, GAO Qiang, HE Ya, ZHONG Yong, Zhao Yingxiao |
| |
|
Multi-Agent collaborative knowledge reasoning framework |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(49)
[HTML 1 KB]
[PDF 417 KB]
(61)
|
|
|
0 |
|
| |
|
A Subregion-Based Many-objective Evolutionary Algorithm |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(33)
[HTML 1 KB]
[PDF 4257 KB]
(11)
|
|
|
0 |
|
| |
|
Obfuscation-Based Protection Method for Scenario Data in Autonomous Driving Simulation Testing |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(47)
[HTML 1 KB]
[PDF 624 KB]
(10)
|
|
|
0 |
|
| |
|
Fine-grained Chinese herbal medicine image classification based on feature fusion and channel information compensation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(76)
[HTML 1 KB]
[PDF 988 KB]
(12)
|
|
|
0 |
|
| |
|
Construction and Recommendation Application of Expert Communities Based on User-Centric Approach |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 916 KB]
(4)
|
|
|
0 |
|
| |
|
Bispectrum-Based Nonlinear Feature Coupling for Speech Enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 1427 KB]
(17)
|
|
|
0 |
|
| |
|
Key phrase extraction model based on multi-perspective information enhancement and hierarchical weighting |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(46)
[HTML 1 KB]
[PDF 764 KB]
(16)
|
|
|
0 |
|
| |
|
Unsupervised face attribute editing method based on dynamic convolutional autoencoder |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(44)
[HTML 1 KB]
[PDF 1146 KB]
(12)
|
|
|
0 |
CHEN Huihui, SUN Hongtao, GUAN Boliang, HENG Zhongqin |
| |
|
Ancient Chinese character image retrieval algorithm based on NetVLAD feature encoding |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 3243 KB]
(18)
|
|
|
0 |
|
| |
|
Certificateless linkable ring signature scheme based on elliptic curves |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 649 KB]
(4)
|
|
|
0 |
HUANG Ping, LI Qing, QIU Haifeng, WANG Chengsi, HUANG Anzi, FAN Long |
| |
|
Light method for transmission line defect detection |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(43)
[HTML 1 KB]
[PDF 2271 KB]
(44)
|
|
|
0 |
|
| |
|
Human-centric detail-enhanced virtual try-on method |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(73)
[HTML 1 KB]
[PDF 986 KB]
(13)
|
|
|
0 |
|
| |
|
Transformer image dehazing based on component collaborative optimization pruning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(75)
[HTML 1 KB]
[PDF 1037 KB]
(24)
|
|
|
1833 |
Longbo YAN, Wentao MAO, Zhihong ZHONG, Lilin FAN |
| |
|
Robust unsupervised multi-task anomaly detection method for defect diagnosis of urban drainage pipe network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1833-1840
[Abstract]
(199)
[HTML 0 KB]
[PDF 5059 KB]
(54)
|
|
|
3916 |
Lin WEI, Shihao ZHANG, Mengyang HE |
| |
|
Workflow task optimization and energy-efficient offloading method for computing power network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3916-3924
[Abstract]
(243)
[HTML 1 KB]
[PDF 1230 KB]
(68)
|
|
|
2941 |
Jing YANG, Jianbin ZHAO, Lu CHEN, Haotian CHI, Tao YAN, Bin CHEN |
| |
|
Dynamic dictionary learning based spatio-spectral fusion for noisy hyper-spectral images |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2941-2948
[Abstract]
(259)
[HTML 1 KB]
[PDF 3860 KB]
(60)
|
|
|
604 |
Feng HAN, Yongfeng BU, Haoxiang LIANG, Shuwen HUANG, Zhaoyang ZHANG, Shijie SUN |
| |
|
Vehicle trajectory anomaly detection based on multi-level spatio-temporal interaction dependency |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 604-612
[Abstract]
(32)
[HTML 1 KB]
[PDF 1904 KB]
(29)
|
|
|
368 |
Haoqian JIANG, Dong ZHANG, Guanyu LI, Heng CHEN |
| |
|
SetaCRS: Conversational recommender system with structure-enhanced hierarchical task-oriented prompting strategy |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 368-377
[Abstract]
(30)
[HTML 1 KB]
[PDF 2341 KB]
(12)
|
|
|
0 |
|
| |
|
LoRA-KANConv SAM: efficient method for small object medical image segmentation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(197)
[HTML 1 KB]
[PDF 614 KB]
(115)
|
|
|
536 |
Xiaowei LA, Lihua HU, Jianhua HU, Xiaoling YAO, Xinbo WANG |
| |
|
Low-overlap point cloud registration network integrating position encoding and overlap masks |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 536-545
[Abstract]
(53)
[HTML 1 KB]
[PDF 1184 KB]
(22)
|
|
|
0 |
HUANG Yiming, ZOU Xihua, DENG Guo, ZHENG Di |
| |
|
Pre-answering and retrieval filtering: dual-stage optimization approach for RAG-based question-answering systems |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(38)
[HTML 1 KB]
[PDF 542 KB]
(14)
|
|
|
395 |
Qianlong XIONG, Jin QIN |
| |
|
Neural network architecture search algorithm guided by hybrid heuristic information |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 395-405
[Abstract]
(93)
[HTML 1 KB]
[PDF 1352 KB]
(101)
|
|
|
0 |
XUE Suling, HE Jinxu, WEI Wenjie, HE Yingying, LOU Lu |
| |
|
Fast implicit neural surface reconstruction based on dynamic occupancy grid |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(52)
[HTML 1 KB]
[PDF 1995 KB]
(12)
|
|
|
0 |
JIANG Yongwei, CHEN Xiaoqing, FU Linjie |
| |
|
Medical image deformable registration model with high frequency holding based on spectrum decomposition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(53)
[HTML 1 KB]
[PDF 2763 KB]
(228)
|
|
|
3502 |
Jingjing WANG, Mengze CHEN, Ziwei YAN, Jiaxun WANG, Zan LUO, Yakun REN, Kai LEI |
| |
|
Open chain-network integration architecture with semantic-rich non-fungible data element |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3502-3509
[Abstract]
(125)
[HTML 1 KB]
[PDF 987 KB]
(22)
|
|
|
85 |
Ziyang CHENG, Ruizhang HUANG, Jingjing XUE |
| |
|
Deep evolutionary topic clustering model |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 85-94
[Abstract]
(105)
[HTML 1 KB]
[PDF 1855 KB]
(21)
|
|
|
2672 |
Jin ZHOU, Yuzhi LI, Xu ZHANG, Shuo GAO, Li ZHANG, Jiachuan SHENG |
| |
|
Modulation recognition network for complex electromagnetic environments |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2672-2682
[Abstract]
(234)
[HTML 1 KB]
[PDF 5665 KB]
(174)
|
|
|
181 |
Luhui ZHOU, Xuezhi YUE |
| |
|
Hybrid particle swarm optimization for solving vehicle routing problems with time windows |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 181-187
[Abstract]
(136)
[HTML 1 KB]
[PDF 682 KB]
(33)
|
|
|
0 |
LI Qiong, CHEN Chunyi, ZHANG Zhenzhong, YU Bo, YU Haiyang, HU Xiaojuan |
| |
|
Differential-based multi-level quantization shared key extraction scheme |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(58)
[HTML 1 KB]
[PDF 538 KB]
(12)
|
|
|
0 |
SHEN Bin, CHEN Xiaoning, CHENG Hua, FANG Yiquan, WANG Huifeng |
| |
|
Intelligent undergraduate teaching evaluation system based on large language models |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(78)
[HTML 1 KB]
[PDF 2320 KB]
(95)
|
|
|
4004 |
Jiali CUI, Yongji LIU, Zihe LI, Han ZHENG |
| |
|
HG-YOLO: lightweight and high-precision enhancement pose detection network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 4004-4011
[Abstract]
(195)
[HTML 1 KB]
[PDF 940 KB]
(20)
|
|
|
216 |
Jinyu LIANG, Hongjuan GAO, Xiaofei DU |
| |
|
3D face generation method based on latent feature enhancement for disentanglement |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 216-223
[Abstract]
(113)
[HTML 1 KB]
[PDF 3985 KB]
(9)
|
|
|
305 |
Yanan LI, Mengyang GUO, Guojun DENG, Yunfeng CHEN, Jianji REN, Yongliang YUAN |
| |
|
Method for life prediction of parallel branching engine based on multi-modal fusion features |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 305-313
[Abstract]
(134)
[HTML 1 KB]
[PDF 907 KB]
(12)
|
|
|
10 |
Kejia ZHANG, Zhijun FANG, Nanrun ZHOU, Zhicai SHI |
| |
|
Personalized federated learning method based on model pre-assignment and self-distillation |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 10-20
[Abstract]
(136)
[HTML 1 KB]
[PDF 1406 KB]
(681)
|
|
|
322 |
Xiuyan ZHANG, Wentao LIU, Xin WANG |
| |
|
Feature extraction method of flight pitch operation based on quick access recorder data |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 322-330
[Abstract]
(96)
[HTML 1 KB]
[PDF 1401 KB]
(124)
|
|
|
314 |
Tingting WANG, Tingshun LI, Wen TAN, Bo LYU, Yixuan CHEN |
| |
|
Cable temperature prediction model based on multi-scale patch and convolution interaction |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 314-321
[Abstract]
(131)
[HTML 1 KB]
[PDF 2052 KB]
(105)
|
|
|
0 |
|
| |
|
Trusted sharing method of electricity metering data based on metering chain |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(37)
[HTML 1 KB]
[PDF 993 KB]
(10)
|
|
|
3771 |
Yuqi ZHANG, Ying SHA |
| |
|
Chinese semantic error recognition model based on hierarchical information enhancement |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3771-3778
[Abstract]
(234)
[HTML 1 KB]
[PDF 615 KB]
(425)
|
|
|
3764 |
Haoxiang XU, Dunhui YU, Yichen DENG, Kui XIAO |
| |
|
Knowledge graph constrained question answering model based on hierarchical reinforcement learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3764-3770
[Abstract]
(287)
[HTML 1 KB]
[PDF 761 KB]
(60)
|
|
|
198 |
Zifen HE, Deze ZENG, Lifeng TIAN, Yuepeng LI, Jiayu ZHANG |
| |
|
Low-latency data transmission routing method for LEO satellites considering laser antenna alignment overhead |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 198-206
[Abstract]
(73)
[HTML 1 KB]
[PDF 1323 KB]
(22)
|
|
|
475 |
Ming LI, Mengqi WANG, Aili ZHANG, Hua REN, Yuqiang DOU |
| |
|
Image steganography method based on conditional generative adversarial networks and hybrid attention mechanism |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 475-484
[Abstract]
(28)
[HTML 1 KB]
[PDF 1262 KB]
(45)
|
|
|
497 |
Haiyue CHEN, Xiuwen YI, Shan YAN, Shijiao LI, Tianrui LI, Yu ZHENG |
| |
|
Virus transmission analysis and visualization based on agent-based modeling |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 497-504
[Abstract]
(41)
[HTML 1 KB]
[PDF 1816 KB]
(51)
|
|
|
485 |
Chunyu ZHANG, Jianchang LIU, Yuanchao LIU, Wei ZHANG |
| |
|
Two-stage infill sampling-based expensive multi-objective evolutionary algorithm |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (2): 485-496
[Abstract]
(52)
[HTML 1 KB]
[PDF 1770 KB]
(36)
|
|
|
3786 |
Xingchen LYU, Weijun LIN, Hongxing HUANG |
| |
|
Multi-sentiment analysis of network public opinion and review text in food safety based on topics and blogs |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3786-3795
[Abstract]
(258)
[HTML 1 KB]
[PDF 907 KB]
(60)
|
|
|
3573 |
Mengnan XU, Hailiang YE, Feilong CAO |
| |
|
Neighborhood-attention and topology-aware graph convolution method for robust point cloud registration |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3573-3582
[Abstract]
(132)
[HTML 1 KB]
[PDF 3219 KB]
(29)
|
|
|
3666 |
Shuai ZHOU, Hao FU, Wei LIU |
| |
|
Spatial-temporal Transformer-based hybrid return implicit Q-learning for crowd navigation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3666-3673
[Abstract]
(141)
[HTML 1 KB]
[PDF 1343 KB]
(247)
|
|
|
4064 |
Min HE, Tianjian LUO |
| |
|
Multi-stage distribution adaptation model for cross-subject motor imagery EEG decoding |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 4064-4072
[Abstract]
(157)
[HTML 1 KB]
[PDF 1157 KB]
(499)
|
|
|
4012 |
Jianhua REN, Jiahui CAO, Di JIA |
| |
|
Hand pose estimation based on mask prompts and attention |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 4012-4020
[Abstract]
(192)
[HTML 1 KB]
[PDF 2368 KB]
(33)
|
|
|
3121 |
Yonggang GONG, Shuhan CHEN, Xiaoqin LIAN, Qiansheng LI, Hongming MO, Hongyu LIU |
| |
|
Entity-relation extraction strategy in Chinese open-domains based on large language model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3121-3130
[Abstract]
(356)
[HTML 1 KB]
[PDF 3025 KB]
(170)
|
|
|
3779 |
Zhengyue ZHANG, Juhong PENG, Zixu DING, Xinyu FAN, Changyu HU |
| |
|
Aspect sentiment triplet extraction model with multi-view linguistic features and sentiment lexicon |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3779-3785
[Abstract]
(198)
[HTML 1 KB]
[PDF 729 KB]
(26)
|
|
|
3881 |
Yilin CHEN, Xiaoyu LI |
| |
|
Blockchain coin mixing scheme based on one-time ring signature |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3881-3887
[Abstract]
(214)
[HTML 1 KB]
[PDF 650 KB]
(12)
|
|
|
1325 |
Yiding WANG, Zehao WANG, Yaoli LI, Shaoqing CAI, Yuan YUAN |
| |
|
Multi-scale 2D-Adaboost microscopic image recognition algorithm of Chinese medicinal materials powder |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1325-1332
[Abstract]
(361)
[HTML 0 KB]
[PDF 3858 KB]
(493)
|
|
|
1271 |
Qingqing ZHAO, Bin HU |
| |
|
Moving pedestrian detection neural network with invariant global sparse contour point representation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1271-1284
[Abstract]
(204)
[HTML 0 KB]
[PDF 7106 KB]
(76)
|
|
|
1263 |
Dingmu YANG, Longqiang NI, Jing LIANG, Zhaoyuan QIU, Yongzhen ZHANG, Zhiqiang QI |
| |
|
Protocol conversion method based on semantic similarity |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1263-1270
[Abstract]
(201)
[HTML 0 KB]
[PDF 2168 KB]
(166)
|
|
|
1256 |
Yuchen LI, Junyi WU, Mengjia GE, Lili PAN, Xiaorong JING |
| |
|
Joint beamforming and power allocation in RIS-assisted multi-cluster NOMA-DFRC system |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1256-1262
[Abstract]
(232)
[HTML 0 KB]
[PDF 3211 KB]
(36)
|
|
|
1223 |
Weichao DANG, Chujun SONG, Gaimei GAO, Chunxia LIU |
| |
|
Multi-behavior recommendation based on cascading residual graph convolutional network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1223-1231
[Abstract]
(208)
[HTML 0 KB]
[PDF 2164 KB]
(72)
|
|
|
1199 |
Jie YANG, Tashi NYIMA, Dongrub RINCHEN, Jindong QI, Dondrub TSHERING |
| |
|
Tibetan word segmentation system based on pre-trained model tokenization reconstruction |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1199-1204
[Abstract]
(208)
[HTML 0 KB]
[PDF 1442 KB]
(173)
|
|
|
1077 |
Yufei XIANG, Zhengwei NI |
| |
|
Edge federation dynamic analysis for hierarchical federated learning based on evolutionary game |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1077-1085
[Abstract]
(285)
[HTML 0 KB]
[PDF 2452 KB]
(436)
|
|
|
3796 |
Jiana MENG, Chenhao BAI, Di ZHAO, Bolin WANG, Linlin GAO |
| |
|
Multimodal named entity recognition under causal intervention |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3796-3803
[Abstract]
(191)
[HTML 1 KB]
[PDF 902 KB]
(33)
|
|
|
3987 |
Jing HUANG, Xin PENG, Wenhao LI, Kai HU, Teng WANG, Yamin HUANG, Yuanqiao WEN |
| |
|
High-quality sonar image generation method based on multi-scale feature fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3987-3994
[Abstract]
(184)
[HTML 1 KB]
[PDF 2757 KB]
(23)
|
|
|
280 |
Chaoyun MAI, Hongyi ZHANG, Chuanbo QIN, Junying ZENG, Dong WANG |
| |
|
Multi-scale and spatial frequency feature-based image segmentation network for pheochromocytoma |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 280-288
[Abstract]
(156)
[HTML 1 KB]
[PDF 3313 KB]
(17)
|
|
|
3547 |
Xiaoman WANG, Yanping CHEN, Caiwei YANG, Ruizhang HUANG, Yongbin QIN |
| |
|
Nested named entity recognition method for multi-directional gradient feature extraction |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3547-3554
[Abstract]
(119)
[HTML 1 KB]
[PDF 1777 KB]
(30)
|
|
|
3529 |
Jinghua ZHAO, Zhu ZHANG, Xiting LYU, Huidan LIN |
| |
|
Multiscale information diffusion prediction model based on hypergraph neural network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3529-3539
[Abstract]
(178)
[HTML 1 KB]
[PDF 993 KB]
(753)
|
|
|
113 |
Junheng WU, Xiaodong WANG, Qixue HE |
| |
|
Time series prediction model based on statistical distribution sensing and frequency domain dual-channel fusion |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 113-123
[Abstract]
(161)
[HTML 1 KB]
[PDF 1286 KB]
(47)
|
|
|
3747 |
Zhongrui JING, Xuebin CHEN, Yinlong JIAN, Qi ZHONG, Zhenbo ZHANG |
| |
|
Federated learning fairness algorithm based on personalized submodel and K-means clustering |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3747-3756
[Abstract]
(350)
[HTML 1 KB]
[PDF 995 KB]
(187)
|
|
|
169 |
Na FAN, Chuang LUO, Zehui ZHANG, Mengyao ZHANG, Ding MU |
| |
|
Semantic privacy protection mechanism of vehicle trajectory based on improved generative adversarial network |
| |
|
|
Journal of Computer Applications
2026 Vol.46 (1): 169-180
[Abstract]
(104)
[HTML 1 KB]
[PDF 1490 KB]
(15)
|
|
|
3470 |
Xinyang LUO, Wunan WAN, Shibin ZHANG, Jinquan ZHANG |
| |
|
Trust management scheme for internet of vehicles based on blockchain and multi-attribute decision making |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3470-3476
[Abstract]
(172)
[HTML 1 KB]
[PDF 901 KB]
(34)
|
|
|
3036 |
Chao SHI, Yuxin ZHOU, Qian FU, Wanyu TANG, Ling HE, Yuanyuan LI |
| |
|
Action recognition algorithm for ADHD patients using skeleton and 3D heatmap |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 3036-3044
[Abstract]
(273)
[HTML 1 KB]
[PDF 2932 KB]
(371)
|
|
|
2783 |
Binbin ZHANG, Yongbin QIN, Ruizhang HUANG, Yanping CHEN |
| |
|
Judgment document summarization method combining large language model and dynamic prompts |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2783-2789
[Abstract]
(273)
[HTML 1 KB]
[PDF 1239 KB]
(400)
|
|
|
3739 |
Donghong ZHAO, Chuangxin ZHAO, Hewei NIE, Quhui ZHANG, Jiaqi YANG |
| |
|
Design of a longitudinal trajectory tracking control law for somersault maneuver flight |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3739-3746
[Abstract]
(93)
[HTML 1 KB]
[PDF 1965 KB]
(43)
|
|
|
3957 |
Weigang LI, Dong WANG, Yongqiang WANG, Jinling LI |
| |
|
Point cloud filtering based on adaptive feature extraction and feature fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3957-3963
[Abstract]
(215)
[HTML 1 KB]
[PDF 2618 KB]
(60)
|
|
|
3446 |
Minghao LIU, Jianlei HONG, Chengxiang WANG, Jindong ZHAO |
| |
|
Blockchain storage optimization strategy based on consistent hashing |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3446-3452
[Abstract]
(154)
[HTML 1 KB]
[PDF 867 KB]
(535)
|
|
|
3804 |
Yonghong FAN, Heming HUANG |
| |
|
CnnPRL: progressive representation learning method for speech emotion recognition |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (12): 3804-3812
[Abstract]
(192)
[HTML 1 KB]
[PDF 2403 KB]
(550)
|
|
|
3067 |
Guoyu XU, Xiaolong YAN, Yidan ZHANG |
| |
|
DU-FastGAN: lightweight generative adversarial network based on dynamic-upsample |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3067-3073
[Abstract]
(354)
[HTML 1 KB]
[PDF 3450 KB]
(293)
|
|
|
883 |
Huahua WANG, Zijian FAN, Ze LIU |
| |
|
Image adversarial example generation method based on multi-space probability enhancement |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 883-890
[Abstract]
(150)
[HTML 0 KB]
[PDF 2764 KB]
(52)
|
|
|
3138 |
Zhangtao JIANG, Xin LI, Shihao ZHANG, Xinyang ZHAO |
| |
|
Analysis and prediction model of Weibo public opinion heat by integrating BERT and X-means algorithm |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3138-3145
[Abstract]
(206)
[HTML 1 KB]
[PDF 2525 KB]
(107)
|
|
|
685 |
Xiaolin QIN, Xu GU, Dicheng LI, Haiwen XU |
| |
|
Survey and prospect of large language models |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 685-696
[Abstract]
(1234)
[HTML 1 KB]
[PDF 2035 KB]
(2373)
|
|
|
3252 |
You SHANG, Xianghua MIAO |
| |
|
Bayesian membership inference attacks for generative adversarial networks |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3252-3258
[Abstract]
(151)
[HTML 1 KB]
[PDF 1395 KB]
(295)
|
|
|
3642 |
Yanpeng ZHANG, Yuqian ZHAO, Fan ZHANG, Tenghai QIU, Gui GUI, Lingli YU |
| |
|
Capacitated vehicle routing problem solving method based on improved MAML and GVAE |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3642-3648
[Abstract]
(153)
[HTML 1 KB]
[PDF 779 KB]
(148)
|
|
|
362 |
Ming JIANG, Linqin WANG, Hua LAI, Shengxiang GAO |
| |
|
End-to-end Vietnamese text normalization method based on editing constraints |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 362-370
[Abstract]
(243)
[HTML 0 KB]
[PDF 1452 KB]
(63)
|
|
|
3621 |
Xintao DUAN, Mengru BAO, Yinhang WU, Chuan QIN |
| |
|
Active protection method for deep neural network model based on four-dimensional Chen chaotic system |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3621-3631
[Abstract]
(123)
[HTML 1 KB]
[PDF 1955 KB]
(219)
|
|
|
3593 |
Qiuyan YAN, Hui JIANG, Zhujun JIANG, Boxue LI |
| |
|
Probabilistic generative graph attention network method for multi-dimensional time series root cause analysis |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3593-3600
[Abstract]
(132)
[HTML 1 KB]
[PDF 875 KB]
(214)
|
|
|
3601 |
Shijiao LI, Boyang HAN, Chuishi MENG, Xiaolong ZHANG, Tianrui LI, Yu ZHENG |
| |
|
Interactive visualization method for multi-category urban spatiotemporal big data based on point aggregation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3601-3608
[Abstract]
(136)
[HTML 1 KB]
[PDF 1671 KB]
(137)
|
|
|
3658 |
Jiahao ZHANG, Qi WANG, Mingming LIU, Xiaofeng WANG, Biao HUANG, Pan LIU, Zhi YE |
| |
|
Prediction of drug-target interactions based on sequence and multi-view networks |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3658-3665
[Abstract]
(164)
[HTML 1 KB]
[PDF 1595 KB]
(448)
|
|
|
3510 |
Jian YUN, Xinru GAO, Tao LIU, Wenjie BI |
| |
|
New federated learning scheme balancing efficiency and security |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3510-3518
[Abstract]
(141)
[HTML 1 KB]
[PDF 1323 KB]
(1245)
|
|
|
3111 |
Jintao FAN, Yanping CHEN, Caiwei YANG, Chuan LIN |
| |
|
Nested named entity recognition by contrastive learning with boundary information |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3111-3120
[Abstract]
(178)
[HTML 1 KB]
[PDF 2573 KB]
(78)
|
|
|
765 |
Yanmin DONG, Jiajia LIN, Zheng ZHANG, Cheng CHENG, Jinze WU, Shijin WANG, Zhenya HUANG, Qi LIU, Enhong CHEN |
| |
|
Design and practice of intelligent tutoring algorithm based on personalized student capability perception |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 765-772
[Abstract]
(370)
[HTML 1 KB]
[PDF 2239 KB]
(395)
|
|
|
3381 |
Zhaoyao GAO, Zhan ZHANG, Liangliang HU, Guangyu XU, Sheng ZHOU, Yuxin HU, Zijie LIN, Chao ZHOU |
| |
|
7T ultra-high field magnetic resonance parallel imaging algorithm based on residual complex convolution network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3381-3389
[Abstract]
(117)
[HTML 1 KB]
[PDF 4071 KB]
(57)
|
|
|
79 |
Jiayuan LI, Xiaodong WANG, Qixue HE |
| |
|
Application and performance optimization of CNN enhanced Informer model in industrial time series prediction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 79-83
[Abstract]
(182)
[HTML 0 KB]
[PDF 760 KB]
(1155)
|
|
|
72 |
Haigang JIANG, Min ZHU, Xiaoqiang JIANG |
| |
|
Device fault diagnosis method based on knowledge graph and multi-task learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 72-78
[Abstract]
(123)
[HTML 0 KB]
[PDF 2501 KB]
(1627)
|
|
|
66 |
Xiaozhi XU, Yanfang MAO, Xiaoxiang LYU |
| |
|
Named entity recognition of electric power research results based on Transformer and keyword information aggregation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 66-71
[Abstract]
(57)
[HTML 0 KB]
[PDF 1795 KB]
(27)
|
|
|
61 |
Yang GAO, Han LI, Weihe ZHONG |
| |
|
Chemical safety accident named entity recognition based on self-attention and SoftLexicon |
| |
|
|
Journal of Computer Applications
0 Vol. (): 61-65
[Abstract]
(72)
[HTML 0 KB]
[PDF 1191 KB]
(91)
|
|
|
50 |
Deyang KONG, Yun ZHANG, Weiguang WANG, Zijie CHEN, Yongguo LIU |
| |
|
Multilevel-component joint Chinese word embedding model and application of core drug identification |
| |
|
|
Journal of Computer Applications
0 Vol. (): 50-54
[Abstract]
(105)
[HTML 0 KB]
[PDF 2668 KB]
(732)
|
|
|
375 |
Wenke JIANG, Xueli XIN, Yongxu MU, Xiaoshuang WANG |
| |
|
Application of artificial intelligence in field of financial and accounting audit |
| |
|
|
Journal of Computer Applications
0 Vol. (): 375-380
[Abstract]
(46)
[HTML 0 KB]
[PDF 572 KB]
(114)
|
|
|
370 |
Yuchun XU, Jianjun XU |
| |
|
Automatic detection method of epileptic EEG based on residual network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 370-374
[Abstract]
(58)
[HTML 0 KB]
[PDF 1793 KB]
(16)
|
|
|
35 |
Wei ZHANG, Zhuyu CHU, Xueqi CHEN, Xuehui FU, Chenchen WANG, Chen LI, Haiyan WU |
| |
|
Aspect-based sentiment analysis with syntactic prompt |
| |
|
|
Journal of Computer Applications
0 Vol. (): 35-43
[Abstract]
(74)
[HTML 0 KB]
[PDF 2571 KB]
(133)
|
|
|
349 |
Yunhao ZHOU, Tianhong WANG, Dunjie YOU, Yiping XU, Junjie MAO |
| |
|
Plunger lift intelligent control evaluation algorithm based on convolutional neural network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 349-356
[Abstract]
(57)
[HTML 0 KB]
[PDF 5947 KB]
(57)
|
|
|
316 |
Jingyu LI, Juxia DING |
| |
|
Development and key system analysis of intelligent rail transit |
| |
|
|
Journal of Computer Applications
0 Vol. (): 316-322
[Abstract]
(92)
[HTML 0 KB]
[PDF 1957 KB]
(1839)
|
|
|
296 |
Ke ZHANG, Yuangang PENG, Yueming WANG, Jianxin TANG |
| |
|
Test tube and liquid level recognition algorithm based on improved YOLOv8 |
| |
|
|
Journal of Computer Applications
0 Vol. (): 296-301
[Abstract]
(69)
[HTML 0 KB]
[PDF 2535 KB]
(401)
|
|
|
280 |
Jiayu CAO, Guifang QIAO, Mengyuan CHEN, Xu ZOU, Di LIU |
| |
|
Improvement strategy of YOLO algorithm for small target detection from high-altitude view |
| |
|
|
Journal of Computer Applications
0 Vol. (): 280-285
[Abstract]
(80)
[HTML 0 KB]
[PDF 3952 KB]
(256)
|
|
|
257 |
Ji WANG, Yuanjia HUANG, Wei FANG, Wenwu XIE, Wenchang XIONG, Xingwang LI |
| |
|
End-to-end license plate recognition method based on 2D space traversal LSTM network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 257-261
[Abstract]
(54)
[HTML 0 KB]
[PDF 2015 KB]
(22)
|
|
|
212 |
Fangrong ZHOU, Yifan WANG, Yi MA, Gang WEN, Guofang WANG, Yutang MA, Hao GENG |
| |
|
Remote sensing image fusion enhancement model for power facilities based on deep convolutional network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 212-216
[Abstract]
(212)
[HTML 0 KB]
[PDF 2643 KB]
(35)
|
|
|
184 |
Yuwan LIU, Zhiyi GUO, Guanyu XING, Yanli LIU |
| |
|
Variation-aware online dynamic illumination estimation method for indoor scenes |
| |
|
|
Journal of Computer Applications
0 Vol. (): 184-191
[Abstract]
(92)
[HTML 0 KB]
[PDF 4045 KB]
(99)
|
|
|
18 |
Siyuan REN, Cheng PENG, Ke CHEN, Zhiyi HE |
| |
|
Cross-lingual knowledge transfer method based on alignment of representational space structures |
| |
|
|
Journal of Computer Applications
0 Vol. (): 18-23
[Abstract]
(108)
[HTML 0 KB]
[PDF 737 KB]
(297)
|
|
|
170 |
Na QIN, Yantao LIU |
| |
|
DAP-NAD algorithm for emergency multicast communications |
| |
|
|
Journal of Computer Applications
0 Vol. (): 170-175
[Abstract]
(69)
[HTML 0 KB]
[PDF 2496 KB]
(255)
|
|
|
159 |
Linlong ZENG, Miao CHENG, Shaobing ZHANG, Yu ZENG |
| |
|
High-resolution real-time semantic segmentation algorithm for edge deployment |
| |
|
|
Journal of Computer Applications
0 Vol. (): 159-163
[Abstract]
(105)
[HTML 0 KB]
[PDF 1520 KB]
(385)
|
|
|
143 |
Yunlong PENG, Han LI, Tian SANG, Hongming CHENG |
| |
|
Pollutant transmission model in marine food web based on complex network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 143-147
[Abstract]
(87)
[HTML 0 KB]
[PDF 2327 KB]
(45)
|
|
|
101 |
Zhihui TAO, Pengliu TAN, Teng XU, Sijia YANG, Ruoxin TU |
| |
|
Multi-notary consensus cross-chain method based on elliptic curve cryptography |
| |
|
|
Journal of Computer Applications
0 Vol. (): 101-105
[Abstract]
(125)
[HTML 0 KB]
[PDF 2358 KB]
(88)
|
|
|
3682 |
Mengjia GE, Jing DAI, Yuchen LI, Lili PAN, Xiaorong JING |
| |
|
Joint beamforming and power allocation for multi-IRS- assisted NOMA-SWIPT cooperative transmission model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (11): 3682-3691
[Abstract]
(112)
[HTML 1 KB]
[PDF 920 KB]
(29)
|
|
|
3187 |
Shixiong KUANG, Junbo YAO, Jiawei LU, Qibing WANG, Gang XIAO |
| |
|
Data augmentation method for abnormal elevator passenger behaviors based on dynamic graph convolutional network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3187-3194
[Abstract]
(235)
[HTML 1 KB]
[PDF 3930 KB]
(68)
|
|
|
1528 |
Qing ZHANG, Fan YANG, Yuhan FANG |
| |
|
Chinese spelling correction algorithm based on multi-modal information fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1528-1534
[Abstract]
(404)
[HTML 1 KB]
[PDF 1480 KB]
(133)
|
|
|
1317 |
Yang HOU, Qiong ZHANG, Zixuan ZHAO, Zhengyu ZHU, Xiaobo ZHANG |
| |
|
YOLOv5s-MRD: efficient fire and smoke detection algorithm for complex scenarios based on YOLOv5s |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1317-1324
[Abstract]
(399)
[HTML 1 KB]
[PDF 4304 KB]
(754)
|
|
|
3131 |
Lei WANG, Jie HU, Bo PENG |
| |
|
Distribution adaptation and dynamic curriculum pseudo-label framework for semi-supervised fire detection |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3131-3137
[Abstract]
(211)
[HTML 1 KB]
[PDF 1610 KB]
(34)
|
|
|
3214 |
Yuhe XIA, Xiaodong WANG, Qixue HE |
| |
|
Time series anomaly detection based on frequency domain enhanced graph variational learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3214-3220
[Abstract]
(202)
[HTML 1 KB]
[PDF 1460 KB]
(373)
|
|
|
3179 |
Zhuoran LI, Hua LI, Tong WANG, Chaozhe JIANG |
| |
|
Lightweight human pose estimation based on merge state space model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (10): 3179-3186
[Abstract]
(144)
[HTML 1 KB]
[PDF 2113 KB]
(290)
|
|
|
2817 |
Bohan ZHANG, Le LYU, Junchang JING, Dong LIU |
| |
|
Genetic algorithm-based community hiding method in attribute networks |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2817-2826
[Abstract]
(187)
[HTML 1 KB]
[PDF 1994 KB]
(19)
|
|
|
2838 |
Hongjun ZHANG, Gaojun PAN, Hao YE, Yubin LU, Yiheng MIAO |
| |
|
Multi-source heterogeneous data analysis method combining deep learning and tensor decomposition |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2838-2847
[Abstract]
(214)
[HTML 1 KB]
[PDF 1860 KB]
(977)
|
|
|
2773 |
Yiming LIANG, Jing FAN, Wenze CHAI |
| |
|
Multi-scale feature fusion sentiment classification based on bidirectional cross attention |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2773-2782
[Abstract]
(273)
[HTML 1 KB]
[PDF 1855 KB]
(608)
|
|
|
2873 |
Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU |
| |
|
Blockchain-based identity management system for internet of things |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2873-2881
[Abstract]
(267)
[HTML 1 KB]
[PDF 1995 KB]
(223)
|
|
|
2666 |
Quan JIANG, Wenqing HUANG, Zhiyong GOU |
| |
|
Lagrangian particle flow simulation by equivariant graph neural network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2666-2671
[Abstract]
(244)
[HTML 1 KB]
[PDF 2667 KB]
(13)
|
|
|
2296 |
Chen LIANG, Yisen WANG, Qiang WEI, Jiang DU |
| |
|
Source code vulnerability detection method based on Transformer-GCN |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2296-2303
[Abstract]
(406)
[HTML 1 KB]
[PDF 3389 KB]
(887)
|
|
|
2712 |
Jinhao LIN, Chuan LUO, Tianrui LI, Hongmei CHEN |
| |
|
Thoracic disease classification method based on cross-scale attention network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2712-2719
[Abstract]
(188)
[HTML 1 KB]
[PDF 1831 KB]
(39)
|
|
|
0 |
|
| |
|
Heterogeneous Environment Aware Streaming Graph Partitioning for Power-Law Graphs |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(81)
[HTML 1 KB]
[PDF 1612 KB]
(22)
|
|
|
2378 |
Yongpeng TAO, Shiqi BAI, Zhengwen ZHOU |
| |
|
Neural architecture search for multi-tissue segmentation using convolutional and transformer-based networks in glioma segmentation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2378-2386
[Abstract]
(231)
[HTML 1 KB]
[PDF 3485 KB]
(101)
|
|
|
3045 |
Jinyang HUANG, Fengqi CUI, Changxiu MA, Wendong FAN, Meng LI, Jingyu LI, Xiao SUN, Linsheng HUANG, Zhi LIU |
| |
|
Sleep apnea detection based on universal wristband |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 3045-3056
[Abstract]
(253)
[HTML 1 KB]
[PDF 2441 KB]
(694)
|
|
|
1632 |
Daquan ZHANG, Jiarui DONG, Yang LEI, Shikang LI, Xiangyu SHI, Zonghui LI, Yangdong DENG, Weimin WU |
| |
|
Survey on hardware acceleration schemes for ray tracing |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1632-1644
[Abstract]
(284)
[HTML 1 KB]
[PDF 2672 KB]
(1563)
|
|
|
1895 |
Runlian ZHANG, Ruifeng TANG, Hao WANG, Xiaonian WU |
| |
|
Correlation power analysis method of advanced encryption standard algorithm based on uniform manifold approximation and projection |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1895-1901
[Abstract]
(184)
[HTML 1 KB]
[PDF 4616 KB]
(36)
|
|
|
2507 |
Biao ZHAO, Yuhua QIN, Rongkun TIAN, Yuehang HU, Fangrui CHEN |
| |
|
Dependency type and distance enhanced aspect based sentiment analysis model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2507-2514
[Abstract]
(211)
[HTML 1 KB]
[PDF 2245 KB]
(46)
|
|
|
2546 |
Binhong XIE, Yingkun LA, Yingjun ZHANG, Rui ZHANG |
| |
|
Semi-supervised object detection framework guided by self-paced learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2546-2554
[Abstract]
(229)
[HTML 1 KB]
[PDF 1517 KB]
(305)
|
|
|
2656 |
Zhichao YUAN, Lei YANG, Jinglin TIAN, Xiaowei WEI, Kangshun LI |
| |
|
Dual-population dual-stage evolutionary algorithm for complex constrained multi-objective optimization problems |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2656-2665
[Abstract]
(395)
[HTML 1 KB]
[PDF 2608 KB]
(413)
|
|
|
2515 |
Peng PENG, Ziting CAI, Wenling LIU, Caihua CHEN, Wei ZENG, Baolai HUANG |
| |
|
Speech emotion recognition method based on hybrid Siamese network with CNN and bidirectional GRU |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2515-2521
[Abstract]
(212)
[HTML 1 KB]
[PDF 1899 KB]
(181)
|
|
|
709 |
Jing HE, Yang SHEN, Runfeng XIE |
| |
|
Recognition and optimization of hallucination phenomena in large language models |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 709-714
[Abstract]
(414)
[HTML 1 KB]
[PDF 1539 KB]
(806)
|
|
|
2882 |
Runyu YAN, Rui GUO, Yongbo YAN, Guangjun LIU |
| |
|
Verifiable searchable encryption scheme of fine-grained result by designated tester in cloud |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2882-2892
[Abstract]
(218)
[HTML 1 KB]
[PDF 3867 KB]
(126)
|
|
|
2600 |
Yan YAN, Feifei LI, Yaqin LYU, Tao FENG |
| |
|
Secure and efficient frequency estimation method based on shuffled differential privacy |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2600-2611
[Abstract]
(211)
[HTML 1 KB]
[PDF 3001 KB]
(23)
|
|
|
2288 |
Lixiao ZHANG, Yao MA, Yuli YANG, Dan YU, Yongle CHEN |
| |
|
Large-scale IoT binary component identification based on named entity recognition |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2288-2295
[Abstract]
(161)
[HTML 1 KB]
[PDF 1953 KB]
(46)
|
|
|
2169 |
Xiaoyang ZHAO, Xinzheng XU, Zhongnian LI |
| |
|
Research review on explainable artificial intelligence in internet of things applications |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2169-2179
[Abstract]
(293)
[HTML 1 KB]
[PDF 2756 KB]
(2080)
|
|
|
2123 |
Hongyang ZHANG, Shufen ZHANG, Zheng GU |
| |
|
Federated learning algorithm for personalization and fairness |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2123-2131
[Abstract]
(320)
[HTML 1 KB]
[PDF 3790 KB]
(538)
|
|
|
2203 |
Yingjun ZHANG, Weiwei YAN, Binhong XIE, Rui ZHANG, Wangdong LU |
| |
|
Gradient-discriminative and feature norm-driven open-world object detection |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2203-2210
[Abstract]
(205)
[HTML 1 KB]
[PDF 2461 KB]
(111)
|
|
|
2245 |
Xiaoqiang ZHAO, Yongyong LIU, Yongyong HUI, Kai LIU |
| |
|
Batch process quality prediction model using improved time-domain convolutional network with multi-head self-attention mechanism |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2245-2252
[Abstract]
(344)
[HTML 1 KB]
[PDF 4130 KB]
(241)
|
|
|
2043 |
Jinxian SUO, Liping ZHANG, Sheng YAN, Dongqi WANG, Yawen ZHANG |
| |
|
Review of interpretable deep knowledge tracing methods |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2043-2055
[Abstract]
(421)
[HTML 1 KB]
[PDF 2726 KB]
(1537)
|
|
|
773 |
Xuefei ZHANG, Liping ZHANG, Sheng YAN, Min HOU, Yubo ZHAO |
| |
|
Personalized learning recommendation in collaboration of knowledge graph and large language model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 773-784
[Abstract]
(475)
[HTML 1 KB]
[PDF 1570 KB]
(1046)
|
|
|
2079 |
Zhiqiang ZHENG, Ruiqi WANG, Zijing FAN, Famei HE, Yepeng YAO, Qiuyun WANG, Zhengwei JIANG |
| |
|
Survey of DNS tunneling detection technology research |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2079-2091
[Abstract]
(294)
[HTML 1 KB]
[PDF 1890 KB]
(473)
|
|
|
2229 |
Zhangjie XU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN |
| |
|
Nested named entity recognition combined with boundary generation by multi-objective learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2229-2236
[Abstract]
(163)
[HTML 1 KB]
[PDF 1419 KB]
(44)
|
|
|
2351 |
Pingping YU, Yuting YAN, Xinliang TANG, He SU, Jianchao WANG |
| |
|
Multi-object tracking algorithm for construction machinery in transmission line scenarios |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2351-2360
[Abstract]
(178)
[HTML 1 KB]
[PDF 11294 KB]
(34)
|
|
|
2278 |
Binhan LI, Lunzhi DENG, Huan LIU |
| |
|
Cloud-based conditional broadcast proxy re-encryption scheme |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2278-2287
[Abstract]
(163)
[HTML 1 KB]
[PDF 1578 KB]
(23)
|
|
|
2333 |
Liang CHEN, Xuan WANG, Kun LEI |
| |
|
Helmet wearing detection algorithm for complex scenarios based on cross-layer multi-scale feature fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2333-2341
[Abstract]
(206)
[HTML 1 KB]
[PDF 4986 KB]
(58)
|
|
|
2484 |
Wei ZHANG, Jiaxiang NIU, Jichao MA, Qiongxia SHEN |
| |
|
Chinese spelling correction model ReLM enhanced with deep semantic features |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2484-2490
[Abstract]
(322)
[HTML 1 KB]
[PDF 1067 KB]
(741)
|
|
|
2522 |
Jing YU, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN |
| |
|
Sequence labeling optimization method combined with entity boundary offset |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2522-2529
[Abstract]
(197)
[HTML 1 KB]
[PDF 2456 KB]
(30)
|
|
|
2491 |
Qing YANG, Yan ZHU |
| |
|
Metaphor detection for improving representation in linguistic rules |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2491-2496
[Abstract]
(196)
[HTML 1 KB]
[PDF 768 KB]
(682)
|
|
|
2572 |
Jun WU, Aijia OUYANG, Ya WANG |
| |
|
Non-redundant and statistically significant discriminative high utility pattern mining algorithm |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2572-2581
[Abstract]
(154)
[HTML 1 KB]
[PDF 1526 KB]
(192)
|
|
|
2694 |
Zhexu LIU, Aobing ZHANG, Zhiyong FAN |
| |
|
Layered solving method for virtual maintenance posture in narrow aircraft space |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2694-2703
[Abstract]
(157)
[HTML 1 KB]
[PDF 4570 KB]
(202)
|
|
|
0 |
|
| |
|
The SLAM Algorithm Based on Point-Line Features and Multi-IMU Fusion |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(77)
[HTML 1 KB]
[PDF 2515 KB]
(100)
|
|
|
0 |
|
| |
|
Knowledge graph representation learning model incorporating multi-step relational paths and entity description information |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(23)
[HTML 1 KB]
[PDF 940 KB]
(16)
|
|
|
3639 |
Ruiyan LIANG, Hui YANG |
| |
|
Lightweight fall detection algorithm framework based on RPEpose and XJ-GCN |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3639-3646
[Abstract]
(256)
[HTML 0 KB]
[PDF 1283 KB]
(253)
|
|
|
3487 |
Shuaihua ZHANG, Shufen ZHANG, Mingchuan ZHOU, Chao XU, Xuebin CHEN |
| |
|
Malicious traffic detection model based on semi-supervised federated learning |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3487-3494
[Abstract]
(368)
[HTML 0 KB]
[PDF 748 KB]
(233)
|
|
|
3403 |
Guoxiang CHEN, Ziqiang YU, Haoyu ZHAO |
| |
|
Distributed
k-nearest neighbor query algorithm for moving objects in dynamic road network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3403-3410
[Abstract]
(273)
[HTML 0 KB]
[PDF 758 KB]
(60)
|
|
|
794 |
Kun SHENG, Zhongqing WANG |
| |
|
Synaesthesia metaphor analysis based on large language model and data augmentation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 794-800
[Abstract]
(272)
[HTML 1 KB]
[PDF 1164 KB]
(245)
|
|
|
2497 |
Zhiyuan WANG, Tao PENG, Jie YANG |
| |
|
Integrating internal and external data for out-of-distribution detection training and testing |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2497-2506
[Abstract]
(181)
[HTML 1 KB]
[PDF 1773 KB]
(24)
|
|
|
2790 |
Li LI, Han SONG, Peihe LIU, Hanlin CHEN |
| |
|
Named entity recognition for sensitive information based on data augmentation and residual networks |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2790-2797
[Abstract]
(206)
[HTML 1 KB]
[PDF 1579 KB]
(59)
|
|
|
2984 |
Jiaxiang ZHANG, Xiaoming LI, Jiahui ZHANG |
| |
|
Few-shot object detection algorithm based on new category feature enhancement and metric mechanism |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2984-2992
[Abstract]
(262)
[HTML 1 KB]
[PDF 2348 KB]
(40)
|
|
|
2926 |
Huaizhe ZHAO, Zheng YANG, Li ZOU, Yi LIU |
| |
|
Association rule extraction method based on triadic fuzzy linguistic formal context |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2926-2933
[Abstract]
(166)
[HTML 1 KB]
[PDF 1391 KB]
(35)
|
|
|
2798 |
Dengran REN, Shuying WANG |
| |
|
Nested named entity recognition model for wind power equipment based on differential boundary enhancement |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 2798-2805
[Abstract]
(187)
[HTML 1 KB]
[PDF 1444 KB]
(53)
|
|
|
3017 |
Fang WANG, Jing HU, Rui ZHANG, Wenting FAN |
| |
|
Medical image segmentation network with content-guided multi-angle feature fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (9): 3017-3025
[Abstract]
(231)
[HTML 1 KB]
[PDF 2148 KB]
(43)
|
|
|
3521 |
Jinxing TU, Zhixiong LI, Jianqiang HUANG |
| |
|
Dynamic partition algorithm for diagonal sparse matrix vector multiplication based on GPU |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3521-3529
[Abstract]
(339)
[HTML 1 KB]
[PDF 1105 KB]
(73)
|
|
|
1849 |
Tiantong ZHOU, Yanqi ZHENG, Tao WEI, Yakang DAI, Ling ZOU |
| |
|
Cognitive load EEG recognition model integrating variational graph autoencoder and local-global graph network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1849-1857
[Abstract]
(166)
[HTML 1 KB]
[PDF 2006 KB]
(44)
|
|
|
1827 |
Jian SHUAI, Zhongqing WANG, Jiali CHEN |
| |
|
Aspect-based sentiment analysis method based on code generation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1827-1832
[Abstract]
(176)
[HTML 1 KB]
[PDF 1029 KB]
(57)
|
|
|
1980 |
Weigang LI, Xinyi LI, Yongqiang WANG, Yuntao ZHAO |
| |
|
Point cloud classification and segmentation method based on adaptive dynamic graph convolution and parameter-free attention |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1980-1986
[Abstract]
(185)
[HTML 1 KB]
[PDF 2200 KB]
(52)
|
|
|
2007 |
Yingtao CHEN, Kangkang FANG, Jin’ao ZHANG, Haoran LIANG, Huanbin GUO, Zhaowen QIU |
| |
|
Segmentation network of coronary artery structure from CT angiography images based on multi-scale spatial features |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 2007-2015
[Abstract]
(178)
[HTML 1 KB]
[PDF 2646 KB]
(48)
|
|
|
3307 |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG |
| |
|
Multi-organization collaborative data sharing scheme with dual authorization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3307-3314
[Abstract]
(240)
[HTML 0 KB]
[PDF 2796 KB]
(238)
|
|
|
3288 |
Wanting JI, Wenyi LU, Yuhang MA, Linlin DING, Baoyan SONG, Haolin ZHANG |
| |
|
Machine reading comprehension event detection based on relation-enhanced graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3288-3293
[Abstract]
(225)
[HTML 0 KB]
[PDF 996 KB]
(65)
|
|
|
3275 |
Yanbo LI, Qing HE, Shunyi LU |
| |
|
Aspect sentiment triplet extraction integrating semantic and syntactic information |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3275-3280
[Abstract]
(276)
[HTML 0 KB]
[PDF 1353 KB]
(81)
|
|
|
3260 |
Nengqiang XIANG, Xiaofei ZHU, Zhaoze GAO |
| |
|
Information diffusion prediction model of prototype-aware dual-channel graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3260-3266
[Abstract]
(272)
[HTML 0 KB]
[PDF 1549 KB]
(218)
|
|
|
3223 |
Xiaoyu HUA, Dongfen LI, You FU, Kejun BI, Shi YING, Ruijin WANG |
| |
|
Industrial chain risk assessment and early warning model combining hierarchical graph neural network and long short-term memory |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3223-3231
[Abstract]
(365)
[HTML 0 KB]
[PDF 2113 KB]
(68)
|
|
|
3191 |
Cheng WANG, Yang WANG, Yingjiao RONG |
| |
|
YOLOv7-MSBP target location algorithm for character recognition of power distribution cabinet |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3191-3199
[Abstract]
(283)
[HTML 0 KB]
[PDF 3829 KB]
(520)
|
|
|
3185 |
Xukang KAN, Gefei SHI, Xuerong YANG |
| |
|
ORB-SLAM2 algorithm based on dynamic feature point filtering and optimization of keyframe selection |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3185-3190
[Abstract]
(278)
[HTML 0 KB]
[PDF 3326 KB]
(373)
|
|
|
3177 |
Pengbo WANG, Wuyang SHAN, Jun LI, Mao TIAN, Deng ZOU, Zhanfeng FAN |
| |
|
Robust splicing forensic algorithm against high-intensity salt-and-pepper noise |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3177-3184
[Abstract]
(251)
[HTML 0 KB]
[PDF 2871 KB]
(200)
|
|
|
3167 |
Hua HUANG, Ziyi YANG, Xiaolong LI, Chuang LI |
| |
|
Predictive business process monitoring method based on concept drift |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3167-3176
[Abstract]
(277)
[HTML 0 KB]
[PDF 2286 KB]
(156)
|
|
|
3151 |
Antai SUN, Ye LIU, Dongmei XU |
| |
|
Dynamic surface asymptotic compensation algorithm for multi-agent systems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3151-3157
[Abstract]
(352)
[HTML 0 KB]
[PDF 2187 KB]
(67)
|
|
|
3105 |
Shengmin ZHENG, Xiaodong FU |
| |
|
Incomplete ordinal preference prediction using mixture of Plackett-Luce models |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3105-3113
[Abstract]
(218)
[HTML 0 KB]
[PDF 995 KB]
(284)
|
|
|
3074 |
Feng CAO, Xiaoling YANG, Jianbing YI, Jun LI |
| |
|
Contradiction separation super-deduction method and application |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3074-3080
[Abstract]
(293)
[HTML 0 KB]
[PDF 1422 KB]
(134)
|
|
|
3067 |
Yushan JIANG, Yangsen ZHANG |
| |
|
Large language model-driven stance-aware fact-checking |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3067-3073
[Abstract]
(581)
[HTML 0 KB]
[PDF 1036 KB]
(98)
|
|
|
3039 |
Linhao LI, Xiaoqian ZHANG, Yao DONG, Xu WANG, Yongfeng DONG |
| |
|
Knowledge tracing based on personalized learning and deep refinement |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3039-3046
[Abstract]
(296)
[HTML 0 KB]
[PDF 2200 KB]
(870)
|
|
|
3032 |
Han WANG, Yuan WAN, Dong WANG, Yiming DING |
| |
|
Robust weight matrix combination selection method of broad learning system |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3032-3038
[Abstract]
(349)
[HTML 0 KB]
[PDF 3288 KB]
(282)
|
|
|
2983 |
Renke SUN, Zhiyu HUANGFU, Hu CHEN, Zhongnian LI, Xinzheng XU |
| |
|
Survey of neural architecture search |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 2983-2994
[Abstract]
(592)
[HTML 0 KB]
[PDF 3686 KB]
(962)
|
|
|
891 |
Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU |
| |
|
Data tamper-proof batch auditing scheme based on industrial cloud storage systems |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 891-895
[Abstract]
(140)
[HTML 1 KB]
[PDF 1386 KB]
(45)
|
|
|
1104 |
Jie HU, Qiyang ZHENG, Jun SUN, Yan ZHANG |
| |
|
Multi-label classification model based on multi-label relational graph and local dynamic reconstruction learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1104-1112
[Abstract]
(253)
[HTML 1 KB]
[PDF 1080 KB]
(396)
|
|
|
996 |
Zhanjun JIANG, Yang LI, Jing LIAN, Xinfa MIAO |
| |
|
Coordinate enhancement and multi-source sampling for brain tumor image segmentation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 996-1002
[Abstract]
(110)
[HTML 1 KB]
[PDF 2626 KB]
(66)
|
|
|
2034 |
Linjia SUN, Lei QIN, Meijin KANG, Yinglin WANG |
| |
|
Automatic speech segmentation algorithm based on syllable type recognition |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 2034-2042
[Abstract]
(119)
[HTML 1 KB]
[PDF 1715 KB]
(36)
|
|
|
1858 |
Zonghang WU, Dong ZHANG, Guanyu LI |
| |
|
Multimodal fusion recommendation algorithm based on joint self-supervised learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1858-1868
[Abstract]
(196)
[HTML 1 KB]
[PDF 1860 KB]
(75)
|
|
|
1455 |
Pengcheng XU, Lei HE, Chuan LI, Weiqi QIAN, Tun ZHAO |
| |
|
Deep symbolic regression method based on Transformer |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1455-1463
[Abstract]
(362)
[HTML 1 KB]
[PDF 3565 KB]
(888)
|
|
|
2237 |
Yihan WANG, Chong LU, Zhongyuan CHEN |
| |
|
Multimodal sentiment analysis model with cross-modal text information enhancement |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (7): 2237-2244
[Abstract]
(328)
[HTML 1 KB]
[PDF 1163 KB]
(68)
|
|
|
1963 |
Yuanyuan SONG, Maodong PAN |
| |
|
3D domain parameterization method based on high-dimensional quasi-conformal mapping |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1963-1970
[Abstract]
(182)
[HTML 1 KB]
[PDF 2805 KB]
(32)
|
|
|
1841 |
Daoquan LI, Zheng XU, Sihui CHEN, Jiayu LIU |
| |
|
Network traffic classification model integrating variational autoencoder and AdaBoost-CNN |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1841-1848
[Abstract]
(197)
[HTML 1 KB]
[PDF 2173 KB]
(46)
|
|
|
1817 |
Shuang LIU, Daqing LIU, Jiana MENG, Di ZHAO |
| |
|
Hyper-relational knowledge graph completion method fusing noise filtering |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1817-1826
[Abstract]
(163)
[HTML 1 KB]
[PDF 3183 KB]
(49)
|
|
|
1372 |
Yufei LONG, Yuchen MOU, Ye LIU |
| |
|
Multi-source data representation learning model based on tensorized graph convolutional network and contrastive learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1372-1378
[Abstract]
(351)
[HTML 1 KB]
[PDF 821 KB]
(291)
|
|
|
1395 |
Bo XU, Dezhi HAO, Erchen YU, Hongfei LIN, Linlin ZONG |
| |
|
Psychological counseling human-machine dialogue dataset construction for dialogue generation and mental disorder detection |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1395-1402
[Abstract]
(190)
[HTML 1 KB]
[PDF 2665 KB]
(467)
|
|
|
1520 |
Junyan ZHANG, Yiming ZHAO, Bing LIN, Yunping WU |
| |
|
Chinese image captioning method based on multi-level visual and dynamic text-image interaction |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1520-1527
[Abstract]
(164)
[HTML 1 KB]
[PDF 3653 KB]
(63)
|
|
|
2931 |
Zhigang XU, Chuang ZHANG |
| |
|
Multi-level color restoration of mural image based on gated positional encoding |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2931-2937
[Abstract]
(340)
[HTML 0 KB]
[PDF 2838 KB]
(112)
|
|
|
2855 |
Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE |
| |
|
Distributed power allocation algorithm based on graph convolutional network for D2D communication systems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2855-2862
[Abstract]
(404)
[HTML 0 KB]
[PDF 2647 KB]
(133)
|
|
|
2829 |
Guanglei YAO, Juxia XIONG, Guowu YANG |
| |
|
Flower pollination algorithm based on neural network optimization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2829-2837
[Abstract]
(437)
[HTML 0 KB]
[PDF 1631 KB]
(70)
|
|
|
1480 |
Man CHEN, Xiaojun YANG, Huimin YANG |
| |
|
Pedestrian trajectory prediction based on graph convolutional network and endpoint induction |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1480-1487
[Abstract]
(216)
[HTML 1 KB]
[PDF 3068 KB]
(120)
|
|
|
1922 |
Xiaolin CHEN, Yaqiang ZHANG, Hongzhi SHI |
| |
|
Review of checkpoint technology for multiple computing scenarios |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1922-1933
[Abstract]
(161)
[HTML 1 KB]
[PDF 2781 KB]
(77)
|
|
|
2470 |
Jiaxin YAN, Yanping CHEN, Weizhe YANG, Ruizhang HUANG, Yongbin QIN |
| |
|
Heterogeneous graph attention network for relation extraction based on feature combination |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2470-2476
[Abstract]
(223)
[HTML 1 KB]
[PDF 1228 KB]
(32)
|
|
|
0 |
|
| |
|
WISA2024+70 Deep Variational Text Clustering Model Based on Distribution Augmentation |
| |
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(16)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
|
2437 |
Yu WANG, Minghui ZHENG, Jingyi YANG, Shicheng HUANG |
| |
|
Certificateless ring signature scheme based on SM2 |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (8): 2437-2441
[Abstract]
(165)
[HTML 1 KB]
[PDF 919 KB]
(79)
|
|
|
1793 |
Sheping ZHAI, Yan HUANG, Qing YANG, Rui YANG |
| |
|
Multi-view entity alignment combining triples and text attributes |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1793-1800
[Abstract]
(291)
[HTML 1 KB]
[PDF 1754 KB]
(122)
|
|
|
1945 |
Shudong LIU, Hao WU, Jia CONG, Boyu GU |
| |
|
Port operation scheduling algorithm based on enhanced NSGA-Ⅱ under goals of carbon peaking and carbon neutrality |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1945-1953
[Abstract]
(169)
[HTML 1 KB]
[PDF 2637 KB]
(85)
|
|
|
1511 |
Jie HU, Shuaixing WU, Zhilan CAO, Yan ZHANG |
| |
|
Named entity recognition model based on global information fusion and multi-dimensional relation perception |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1511-1519
[Abstract]
(215)
[HTML 1 KB]
[PDF 1503 KB]
(255)
|
|
|
1496 |
Jie HU, Cui WU, Jun SUN, Yan ZHANG |
| |
|
Document-level relation extraction model based on anaphora and logical reasoning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1496-1503
[Abstract]
(300)
[HTML 1 KB]
[PDF 986 KB]
(140)
|
|
|
1564 |
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI |
| |
|
Privacy protection method for consortium blockchain based on SM2 linkable ring signature |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1564-1572
[Abstract]
(221)
[HTML 1 KB]
[PDF 1976 KB]
(62)
|
|
|
1556 |
Yueduan XU, Jianwei CHEN, Hengliang ZHU |
| |
|
Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1556-1563
[Abstract]
(199)
[HTML 1 KB]
[PDF 1317 KB]
(167)
|
|
|
1766 |
Tianyu XUE, Aiping LI, Liguo DUAN |
| |
|
Vehicular edge computing scheme with task offloading and resource optimization |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1766-1775
[Abstract]
(327)
[HTML 1 KB]
[PDF 3414 KB]
(102)
|
|
|
1535 |
Yi HE, Yinan XIAO, Yunkai WEI, Supeng LENG |
| |
|
User data management and control in internet of behaviors: a review |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1535-1547
[Abstract]
(176)
[HTML 1 KB]
[PDF 1223 KB]
(179)
|
|
|
1439 |
Hui LI, Bingzhi JIA, Chenxi WANG, Ziyu DONG, Jilong LI, Zhaoman ZHONG, Yanyan CHEN |
| |
|
Generative adversarial network underwater image enhancement model based on Swin Transformer |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1439-1446
[Abstract]
(261)
[HTML 1 KB]
[PDF 3642 KB]
(724)
|
|
|
1415 |
Xin CHEN, Zhonghui LIU, Fan MIN |
| |
|
Concept set construction of reduced formal context and its recommendation application |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1415-1423
[Abstract]
(154)
[HTML 1 KB]
[PDF 1014 KB]
(50)
|
|
|
1472 |
Quan WANG, Qixiang LU, Pei SHI |
| |
|
Multi-graph diffusion attention network for traffic flow prediction |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1472-1479
[Abstract]
(226)
[HTML 1 KB]
[PDF 2668 KB]
(437)
|
|
|
1724 |
Ziliang LI, Guangli ZHU, Yulei ZHANG, Jiajia LIU, Yixuan JIAO, Shunxiang ZHANG |
| |
|
Aspect-based sentiment analysis model integrating syntax and sentiment knowledge |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1724-1731
[Abstract]
(301)
[HTML 1 KB]
[PDF 1499 KB]
(99)
|
|
|
1748 |
Xin LI, Wen LIU, Jixiu LIAO, Zongchi YANG |
| |
|
Visual interaction information reconstruction method for machine understanding |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (6): 1748-1755
[Abstract]
(139)
[HTML 1 KB]
[PDF 3602 KB]
(61)
|
|
|
2588 |
Zhonghua LI, Yunqi BAI, Xuejin WANG, Leilei HUANG, Chujun LIN, Shiyu LIAO |
| |
|
Low illumination face detection based on image enhancement |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2588-2594
[Abstract]
(95)
[HTML 0 KB]
[PDF 2413 KB]
(67)
|
|
|
2551 |
Yuhan LIU, Genlin JI, Hongping ZHANG |
| |
|
Video pedestrian anomaly detection method based on skeleton graph and mixed attention |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2551-2557
[Abstract]
(604)
[HTML 0 KB]
[PDF 2081 KB]
(126)
|
|
|
2514 |
Fang LEI, Yongcai NIU |
| |
|
Channel estimation method for low earth orbit satellite MIMO-OTFS system based on improved generalized orthogonal matching pursuit |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2514-2520
[Abstract]
(337)
[HTML 0 KB]
[PDF 2232 KB]
(194)
|
|
|
2506 |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO |
| |
|
Application of improved hunter-prey optimization algorithm in WSN coverage |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2506-2513
[Abstract]
(72)
[HTML 0 KB]
[PDF 6422 KB]
(120)
|
|
|
2476 |
Quanmei ZHANG, Runping HUANG, Fei TENG, Haibo ZHANG, Nan ZHOU |
| |
|
Automatic international classification of disease coding method incorporating heterogeneous information |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2476-2482
[Abstract]
(459)
[HTML 0 KB]
[PDF 2137 KB]
(279)
|
|
|
2466 |
Qiangkui LENG, Xuezi SUN, Xiangfu MENG |
| |
|
Oversampling method for imbalanced data based on sample potential and noise evolution |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2466-2475
[Abstract]
(407)
[HTML 0 KB]
[PDF 2780 KB]
(294)
|
|
|
2455 |
Haoyu ZHAO, Ziqiang YU, Xiaomeng CHEN, Guoxiang CHEN, Hui ZHU, Bohan LI |
| |
|
Top-
K optimal route query problem with keyword search support |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2455-2465
[Abstract]
(90)
[HTML 0 KB]
[PDF 2879 KB]
(183)
|
|
|
2400 |
Pengqi GAO, Heming HUANG, Yonghong FAN |
| |
|
Fusion of coordinate and multi-head attention mechanisms for interactive speech emotion recognition |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2400-2406
[Abstract]
(549)
[HTML 0 KB]
[PDF 2819 KB]
(480)
|
|
|
2393 |
Yuqing WANG, Guangli ZHU, Wenjie DUAN, Shuyu LI, Ruotong ZHOU |
| |
|
Sentiment classification model of psychological counseling text based on attention over attention mechanism |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2393-2399
[Abstract]
(567)
[HTML 0 KB]
[PDF 1474 KB]
(570)
|
|
|
2387 |
Kaipeng XUE, Tao XU, Chunjie LIAO |
| |
|
Multimodal sentiment analysis network with self-supervision and multi-layer cross attention |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2387-2392
[Abstract]
(68)
[HTML 0 KB]
[PDF 1572 KB]
(642)
|
|
|
2381 |
Chun SUN, Chunlong HU, Shucheng HUANG |
| |
|
Consistency preserving age estimation method by ensemble ranking |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2381-2386
[Abstract]
(45)
[HTML 0 KB]
[PDF 2290 KB]
(41)
|
|
|
2372 |
Shuai FU, Xiaoying GUO, Ruyi BAI, Tao YAN, Bin CHEN |
| |
|
Age estimation method combining improved CloFormer model and ordinal regression |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2372-2380
[Abstract]
(52)
[HTML 0 KB]
[PDF 3667 KB]
(39)
|
|
|
2365 |
Chunxue ZHANG, Liqing QIU, Cheng’ai SUN, Caixia JING |
| |
|
Purchase behavior prediction model based on two-stage dynamic interest recognition |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2365-2371
[Abstract]
(87)
[HTML 0 KB]
[PDF 1474 KB]
(102)
|
|
|
2319 |
Zheyuan SHEN, Keke YANG, Jing LI |
| |
|
Personalized federated learning method based on dual stream neural network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2319-2325
[Abstract]
(631)
[HTML 0 KB]
[PDF 2185 KB]
(765)
|
|
|
1349 |
Chao GE, Shuiqing YE, Hong WANG, Zheng YAO |
| |
|
Stability analysis of nonlinear time-delay system based on memory-based saturation controller |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1349-1355
[Abstract]
(203)
[HTML 1 KB]
[PDF 1231 KB]
(60)
|
|
|
392 |
Kun FU, Shicong YING, Tingting ZHENG, Jiajie QU, Jingyuan CUI, Jianwei LI |
| |
|
Graph data augmentation method for few-shot node classification |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 392-402
[Abstract]
(252)
[HTML 1 KB]
[PDF 2174 KB]
(492)
|
|
|
920 |
Caiqi WANG, Xining CUI, Yi XIONG, Shiqian WU |
| |
|
Adaptive extended RRT
* path planning algorithm based on node-to-obstacle distance |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 920-927
[Abstract]
(185)
[HTML 1 KB]
[PDF 4518 KB]
(1161)
|
|
|
490 |
Zhiqiang REN, Xuebin CHEN |
| |
|
FedAud: adaptive defense mechanism based on historical model updates |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 490-496
[Abstract]
(209)
[HTML 1 KB]
[PDF 2229 KB]
(309)
|
|
|
1504 |
Biqing ZENG, Guangbin ZHONG, James Zhiqing WEN |
| |
|
Few-shot named entity recognition based on decomposed fuzzy span |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1504-1510
[Abstract]
(154)
[HTML 1 KB]
[PDF 1072 KB]
(81)
|
|
|
1157 |
Chun XU, Shuangyan JI, Huan MA, Enwei SUN, Mengmeng WANG, Mingyu SU |
| |
|
Consultation recommendation method based on knowledge graph and dialogue structure |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1157-1168
[Abstract]
(257)
[HTML 1 KB]
[PDF 2938 KB]
(88)
|
|
|
1595 |
Hansong ZHANG, Yichao HE, Fei SUN, Guoxin CHEN, Ju CHEN |
| |
|
Improved ring theory-based evolutionary algorithm with new repair optimization operator for solving multi-dimensional knapsack problem |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1595-1604
[Abstract]
(105)
[HTML 1 KB]
[PDF 1523 KB]
(90)
|
|
|
1613 |
Dan WANG, Wenhao ZHANG, Lijuan PENG |
| |
|
Channel estimation of reconfigurable intelligent surface assisted communication system based on deep learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1613-1618
[Abstract]
(302)
[HTML 1 KB]
[PDF 2736 KB]
(624)
|
|
|
1403 |
Jun YANG, Mengxue PANG, Lishan QIAO |
| |
|
Estimation and classification of brain functional networks based on temporal correlation information fusion |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1403-1409
[Abstract]
(183)
[HTML 1 KB]
[PDF 3057 KB]
(71)
|
|
|
1432 |
Wenbin HU, Tianxiang CAI, Tianle HAN, Zhaoman ZHONG, Changxia MA |
| |
|
Multimodal sarcasm detection model integrating contrastive learning with sentiment analysis |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (5): 1432-1438
[Abstract]
(266)
[HTML 1 KB]
[PDF 1779 KB]
(556)
|
|
|
40 |
Xueqiang LYU, Tao WANG, Xindong YOU, Ge XU |
| |
|
HTLR: named entity recognition framework with hierarchical fusion of multi-knowledge |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 40-47
[Abstract]
(275)
[HTML 1 KB]
[PDF 1466 KB]
(187)
|
|
|
3435 |
Wenbo LIU, Lianfei YU, Dongmei XIE, Chuang CAI, Zhijian QU, Chongguang REN |
| |
|
Long-term prediction model of time series based on multi-scale feature fusion |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3435-3441
[Abstract]
(240)
[HTML 1 KB]
[PDF 1095 KB]
(1256)
|
|
|
972 |
Benjie SHE, Shuzhi SU, Yanmin ZHU, Jian HUA, Chao WANG |
| |
|
Lightweight pose estimation network based on non-globally dependent integral regression |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 972-977
[Abstract]
(139)
[HTML 1 KB]
[PDF 1620 KB]
(109)
|
|
|
345 |
Yalun WANG, Yangsen ZHANG, Siwen ZHU |
| |
|
Headline generation model with position embedding for knowledge reasoning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 345-353
[Abstract]
(363)
[HTML 1 KB]
[PDF 1511 KB]
(782)
|
|
|
872 |
Haijun GENG, Yun DONG, Zhiguo HU, Haotian CHI, Jing YANG, Xia YIN |
| |
|
Encrypted traffic classification method based on Attention-1DCNN-CE |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 872-882
[Abstract]
(372)
[HTML 1 KB]
[PDF 2750 KB]
(1948)
|
|
|
2011 |
Yuan TANG, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN |
| |
|
Relation extraction model based on multi-scale hybrid attention convolutional neural networks |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2011-2017
[Abstract]
(502)
[HTML 0 KB]
[PDF 1983 KB]
(524)
|
|
|
526 |
Dixin WANG, Jiahao WANG, Min LI, Hao CHEN, Guangyao HU, Yu GONG |
| |
|
Abnormal attack detection for underwater acoustic communication network |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 526-533
[Abstract]
(292)
[HTML 1 KB]
[PDF 2570 KB]
(578)
|
|
|
896 |
Hailin XIAO, Xiangting KONG, Yu WANG, Di ZHOU, Xiaoming DAI |
| |
|
Image watermarking algorithm based on improved singular value decomposition and Haar wavelet transform |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 896-903
[Abstract]
(238)
[HTML 1 KB]
[PDF 2556 KB]
(110)
|
|
|
988 |
Baohua YUAN, Jialu CHEN, Huan WANG |
| |
|
Medical image segmentation network integrating multi-scale semantics and parallel double-branch |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 988-995
[Abstract]
(267)
[HTML 1 KB]
[PDF 2085 KB]
(1478)
|
|
|
3808 |
Qiye ZHANG, Xinrui ZENG |
| |
|
Efficient active-set method for support vector data description problem with Gaussian kernel |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3808-3814
[Abstract]
(356)
[HTML 1 KB]
[PDF 4044 KB]
(41)
|
|
|
3776 |
Zucheng WU, Xiaojun WU, Tianyang XU |
| |
|
Image-text retrieval model based on intra-modal fine-grained feature relationship extraction |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3776-3783
[Abstract]
(416)
[HTML 1 KB]
[PDF 3093 KB]
(92)
|
|
|
0 |
|
| |
|
An End-to-End Vietnamese Text Normalization Approach Based on Edit Constraints |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(22)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
|
610 |
Shijia WEN, Shijun JING |
| |
|
Dynamic visual SLAM algorithm incorporating object detection and feature point association |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 610-615
[Abstract]
(266)
[HTML 1 KB]
[PDF 5476 KB]
(160)
|
|
|
655 |
Jiayang GUI, Shunji WANG, Zhengkang ZHOU, Jiashan TANG |
| |
|
Tunnel foreign object detection algorithm based on improved YOLOv8n |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 655-661
[Abstract]
(305)
[HTML 1 KB]
[PDF 3102 KB]
(279)
|
|
|
428 |
Hanlin ZHANG, Junlu WANG, Baoyan SONG |
| |
|
Time series event classification method fused with derived features |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 428-435
[Abstract]
(258)
[HTML 1 KB]
[PDF 2121 KB]
(1388)
|
|
|
371 |
Zirong HONG, Guangqing BAO |
| |
|
Review of radar automatic target recognition based on ensemble learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 371-382
[Abstract]
(346)
[HTML 1 KB]
[PDF 1391 KB]
(2026)
|
|
|
1148 |
Sheping ZHAI, Qing YANG, Yan HUANG, Rui YANG |
| |
|
Knowledge graph completion using hierarchical attention fusing directed relationships and relational paths |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1148-1156
[Abstract]
(268)
[HTML 1 KB]
[PDF 1723 KB]
(1128)
|
|
|
3371 |
Linqin WANG, Te ZHANG, Zhihong XU, Yongfeng DONG, Guowei YANG |
| |
|
Fusing entity semantic and structural information for knowledge graph reasoning |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3371-3378
[Abstract]
(419)
[HTML 1 KB]
[PDF 705 KB]
(107)
|
|
|
670 |
Yan LI, Guanhua YE, Yawen LI, Meiyu LIANG |
| |
|
Enterprise ESG indicator prediction model based on richness coordination technology |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 670-676
[Abstract]
(309)
[HTML 1 KB]
[PDF 1400 KB]
(2917)
|
|
|
556 |
Wujiu FU, Lin ZHOU, Jianjie DENG, Yong YOU |
| |
|
Recurrence formula for initial value problems of fractional-order autonomous dynamics system and its application |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (2): 556-562
[Abstract]
(177)
[HTML 1 KB]
[PDF 5494 KB]
(313)
|
|
|
261 |
Lu WANG, Dong LIU, Weiguang LIU |
| |
|
Interpretability study on deformable convolutional network and its application in butterfly species recognition models |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 261-274
[Abstract]
(193)
[HTML 1 KB]
[PDF 8020 KB]
(63)
|
|
|
928 |
Xingwang WANG, Qingyang ZHANG, Shouyong JIANG, Yongquan DONG |
| |
|
Dynamic UAV path planning based on modified whale optimization algorithm |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 928-936
[Abstract]
(382)
[HTML 1 KB]
[PDF 7205 KB]
(1846)
|
|
|
1539 |
Min SUN, Qian CHENG, Xining DING |
| |
|
CBAM-CGRU-SVM based malware detection method for Android |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1539-1545
[Abstract]
(436)
[HTML 0 KB]
[PDF 2825 KB]
(1394)
|
|
|
1086 |
Qingli CHEN, Yuanbo GUO, Chen FANG |
| |
|
Clustering federated learning algorithm for heterogeneous data |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (4): 1086-1094
[Abstract]
(391)
[HTML 1 KB]
[PDF 2335 KB]
(2458)
|
|
|
106 |
Xiaosheng YU, Zhixin WANG |
| |
|
Sequential recommendation model based on multi-level graph contrastive learning |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 106-114
[Abstract]
(432)
[HTML 1 KB]
[PDF 2785 KB]
(672)
|
|
|
337 |
Zijun MIAO, Fei LUO, Weichao DING, Wenbo DONG |
| |
|
Traffic signal control algorithm based on overall state prediction and fair experience replay |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 337-344
[Abstract]
(320)
[HTML 1 KB]
[PDF 3199 KB]
(689)
|
|
|
196 |
Jianli DING, Yufeng HE, Jing WANG |
| |
|
Causal intervention-based root cause analysis method for microservice system faults |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 196-203
[Abstract]
(290)
[HTML 1 KB]
[PDF 2268 KB]
(608)
|
|
|
59 |
Xinran XU, Shaobing ZHANG, Miao CHENG, Yang ZHANG, Shang ZENG |
| |
|
Bearings fault diagnosis method based on multi-pathed hierarchical mixture-of-experts model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 59-68
[Abstract]
(341)
[HTML 1 KB]
[PDF 3277 KB]
(1609)
|
|
|
815 |
Chaofeng LU, Ye TAO, Lianqing WEN, Fei MENG, Xiugong QIN, Yongjie DU, Yunlong TIAN |
| |
|
Speaker-emotion voice conversion method with limited corpus based on large language model and pre-trained model |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (3): 815-822
[Abstract]
(335)
[HTML 1 KB]
[PDF 1966 KB]
(708)
|
|
|
338 |
Qinghao CHEN, Tianyu LIU, Zhangqi WANG |
| |
|
Dynamic digital twin system of overhead transmission line ice shedding |
| |
|
|
Journal of Computer Applications
0 Vol. (): 338-342
[Abstract]
(125)
[HTML 1 KB]
[PDF 2316 KB]
(514)
|
|
|
118 |
Chenfei WANG, Liyang XU, Huiqin LI, Jianxun MA |
| |
|
Network security situation awareness mechanism based on behavioral portrait construction |
| |
|
|
Journal of Computer Applications
0 Vol. (): 118-122
[Abstract]
(268)
[HTML 1 KB]
[PDF 2941 KB]
(245)
|
|
|
154 |
Yanfei WANG, Peng ZHANG, Xiangguang DAI, Huijun LI |
| |
|
Fixed-time time-varying algorithm applied to robot navigation problem |
| |
|
|
Journal of Computer Applications
0 Vol. (): 154-158
[Abstract]
(142)
[HTML 1 KB]
[PDF 2919 KB]
(72)
|
|
|
186 |
Quan TANG, Peng WANG, Gang XIN |
| |
|
Optimization algorithm entropy based on quantum dynamics |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 186-195
[Abstract]
(246)
[HTML 1 KB]
[PDF 1806 KB]
(97)
|
|
|
69 |
Shengxiang GAO, Zhe HOU, Zhengtao YU, Hua LAI |
| |
|
Chinese-Vietnamese neural machine translation model incorporating entity translation |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 69-74
[Abstract]
(257)
[HTML 1 KB]
[PDF 1039 KB]
(91)
|
|
|
3949 |
Yanran SHEN, Xin WEN, Jinhao ZHANG, Shuai ZHANG, Rui CAO, Baolu GAO |
| |
|
fMRI brain age prediction model with lightweight multi-scale convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3949-3957
[Abstract]
(345)
[HTML 1 KB]
[PDF 2350 KB]
(941)
|
|
|
3823 |
Jinhui CAI, Zhongxu YIN, Guoxiao ZONG, Junru LI |
| |
|
Integrated method of inference and taint analysis for nested branch breakthrough |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3823-3830
[Abstract]
(292)
[HTML 1 KB]
[PDF 1292 KB]
(312)
|
|
|
1386 |
Ye TIAN, Jinjin CHEN, Xingyi ZHANG |
| |
|
Hybrid optimizer combining evolutionary computation and gradient descent for constrained multi-objective optimization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1386-1392
[Abstract]
(503)
[HTML 1 KB]
[PDF 1501 KB]
(919)
|
|
|
1393 |
Fengfeng WEI, Weineng CHEN |
| |
|
Distributed data-driven evolutionary computation for multi-constrained optimization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1393-1400
[Abstract]
(502)
[HTML 1 KB]
[PDF 1005 KB]
(1307)
|
|
|
1372 |
Xiaofang LIU, Jun ZHANG |
| |
|
Probability-driven dynamic multiobjective evolutionary optimization for multi-agent cooperative scheduling |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1372-1377
[Abstract]
(494)
[HTML 1 KB]
[PDF 1353 KB]
(1885)
|
|
|
1378 |
Xuanfeng LI, Shengcai LIU, Ke TANG |
| |
|
Novel genetic algorithm for solving chance-constrained multiple-choice Knapsack problems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1378-1385
[Abstract]
(501)
[HTML 1 KB]
[PDF 1793 KB]
(224)
|
|
|
1325 |
Jiawei ZHAO, Xuefeng CHEN, Liang FENG, Yaqing HOU, Zexuan ZHU, Yew‑Soon Ong |
| |
|
Review of evolutionary multitasking from the perspective of optimization scenarios |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1325-1337
[Abstract]
(829)
[HTML 1 KB]
[PDF 1383 KB]
(2541)
|
|
|
1338 |
Yue WU, Hangqi DING, Hao HE, Shunjie BI, Jun JIANG, Maoguo GONG, Qiguang MIAO, Wenping MA |
| |
|
Research review of multitasking optimization algorithms and applications |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1338-1347
[Abstract]
(685)
[HTML 1 KB]
[PDF 1486 KB]
(1529)
|
|
|
1355 |
Wanting ZHANG, Wenli DU, Wei DU |
| |
|
Multi-timescale cooperative evolutionary algorithm for large-scale crude oil scheduling |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1355-1363
[Abstract]
(541)
[HTML 1 KB]
[PDF 2180 KB]
(702)
|
|
|
1348 |
Maojiang TIAN, Mingke CHEN, Wei DU, Wenli DU |
| |
|
Two-stage differential grouping method for large-scale overlapping problems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1348-1354
[Abstract]
(542)
[HTML 1 KB]
[PDF 738 KB]
(703)
|
|
|
1187 |
Jianqiang LI, Zhou HE |
| |
|
Hybrid NSGA-Ⅱ for vehicle routing problem with multi-trip pickup and delivery |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1187-1194
[Abstract]
(539)
[HTML 0 KB]
[PDF 1477 KB]
(1300)
|
|
|
1058 |
Xianfeng YANG, Yilei TANG, Ziqiang LI |
| |
|
Aspect-level sentiment analysis model based on alternating‑attention mechanism and graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1058-1064
[Abstract]
(494)
[HTML 0 KB]
[PDF 943 KB]
(264)
|
|
|
1049 |
Longtao GAO, Nana LI |
| |
|
Aspect sentiment triplet extraction based on aspect-aware attention enhancement |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1049-1057
[Abstract]
(552)
[HTML 1 KB]
[PDF 2126 KB]
(232)
|
|
|
1027 |
Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG |
| |
|
Network abnormal traffic detection based on port attention and convolutional block attention module |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1027-1034
[Abstract]
(416)
[HTML 1 KB]
[PDF 1692 KB]
(1002)
|
|
|
1018 |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU |
| |
|
Network security risk assessment method for CTCS based on
α-cut triangular fuzzy number and attack tree |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1018-1026
[Abstract]
(360)
[HTML 1 KB]
[PDF 2359 KB]
(742)
|
|
|
3915 |
Xin ZHAO, Xinjie LI, Jian XU, Buyun LIU, Xiang BI |
| |
|
Parallel medical image registration model based on convolutional neural network and Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3915-3921
[Abstract]
(385)
[HTML 1 KB]
[PDF 2554 KB]
(163)
|
|
|
3335 |
Xinrong HU, Jingxue CHEN, Zijian HUANG, Bangchao WANG, Xun YAO, Junping LIU, Qiang ZHU, Jie YANG |
| |
|
Graph convolution network-based masked data augmentation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3335-3344
[Abstract]
(456)
[HTML 1 KB]
[PDF 788 KB]
(386)
|
|
|
3831 |
Rui GAO, Xuebin CHEN, Zucuan ZHANG |
| |
|
Dynamic social network privacy publishing method for partial graph updating |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3831-3838
[Abstract]
(454)
[HTML 1 KB]
[PDF 3239 KB]
(838)
|
|
|
204 |
Ying HUANG, Changsheng LI, Hui PENG, Su LIU |
| |
|
Dual-branch network guided by local entropy for dynamic scene high dynamic range imaging |
| |
|
|
Journal of Computer Applications
2025 Vol.45 (1): 204-213
[Abstract]
(282)
[HTML 1 KB]
[PDF 7127 KB]
(68)
|
|
|
3021 |
Rui ZHANG, Junming PAN, Xiaolu BAI, Jing HU, Rongguo ZHANG, Pengyun ZHANG |
| |
|
Agent model for hyperparameter self-optimization of deep classification model |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3021-3031
[Abstract]
(396)
[HTML 1 KB]
[PDF 2779 KB]
(1079)
|
|
|
3354 |
Siqi YANG, Tianjian LUO, Xuanhui YAN, Guangju YANG |
| |
|
Transfer kernel learning method based on spatial features for motor imagery EEG |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3354-3363
[Abstract]
(319)
[HTML 1 KB]
[PDF 1026 KB]
(1313)
|
|
|
3345 |
Jie WU, Xuezhong QIAN, Wei SONG |
| |
|
Personalized federated learning based on similarity clustering and regularization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3345-3353
[Abstract]
(525)
[HTML 1 KB]
[PDF 1016 KB]
(658)
|
|
|
2674 |
Jinjin LI, Guoming SANG, Yijia ZHANG |
| |
|
Multi-domain fake news detection model enhanced by APK-CNN and Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2674-2682
[Abstract]
(636)
[HTML 1 KB]
[PDF 1378 KB]
(1934)
|
|
|
2791 |
Xudong LI, Yukang FENG, Junsheng CHEN |
| |
|
Multi-key page-level encryption system for SQLite |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2791-2801
[Abstract]
(375)
[HTML 1 KB]
[PDF 3204 KB]
(389)
|
|
|
2683 |
Qi SHUAI, Hairui WANG, Guifu ZHU |
| |
|
Chinese story ending generation model based on bidirectional contrastive training |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2683-2688
[Abstract]
(449)
[HTML 1 KB]
[PDF 909 KB]
(216)
|
|
|
2903 |
Yun LI, Fuyou WANG, Peiguang JING, Su WANG, Ao XIAO |
| |
|
Uncertainty-based frame associated short video event detection method |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2903-2910
[Abstract]
(725)
[HTML 1 KB]
[PDF 2161 KB]
(371)
|
|
|
2947 |
Xin YANG, Xueni CHEN, Chunjiang WU, Shijie ZHOU |
| |
|
Short-term traffic flow prediction of urban highway based on variant residual model and Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2947-2951
[Abstract]
(441)
[HTML 1 KB]
[PDF 1254 KB]
(367)
|
|
|
3723 |
Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN |
| |
|
Cross-chain identity management scheme based on identity-based proxy re-encryption |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3723-3730
[Abstract]
(436)
[HTML 1 KB]
[PDF 2492 KB]
(238)
|
|
|
3709 |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN |
| |
|
Linkable ring signature scheme based on SM9 algorithm |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3709-3716
[Abstract]
(455)
[HTML 1 KB]
[PDF 1254 KB]
(554)
|
|
|
3766 |
Jingxin LIU, Wenjing HUANG, Liangsheng XU, Chong HUANG, Jiansheng WU |
| |
|
Unsupervised feature selection model with dictionary learning and sample correlation preservation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3766-3775
[Abstract]
(506)
[HTML 1 KB]
[PDF 7520 KB]
(112)
|
|
|
3717 |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN |
| |
|
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3717-3722
[Abstract]
(301)
[HTML 1 KB]
[PDF 1330 KB]
(133)
|
|
|
3941 |
Jianli DING, Hui HUANG, Weidong CAO |
| |
|
Dynamic monitoring method of flight chain operation status |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3941-3948
[Abstract]
(286)
[HTML 1 KB]
[PDF 2366 KB]
(368)
|
|
|
1995 |
Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG |
| |
|
Enhanced deep subspace clustering method with unified framework |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 1995-2003
[Abstract]
(666)
[HTML 1 KB]
[PDF 3432 KB]
(569)
|
|
|
3530 |
Jie HUANG, Ruizi WU, Junli LI |
| |
|
Efficient adaptive robustness optimization algorithm for complex networks |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3530-3539
[Abstract]
(372)
[HTML 1 KB]
[PDF 1046 KB]
(432)
|
|
|
3503 |
Qingyuan PENG, Xiaofeng WANG, Junxia WANG, Yingying HUA, Ao TANG, Fei HE |
| |
|
Review of phase transition in satisfiability problems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3503-3512
[Abstract]
(291)
[HTML 1 KB]
[PDF 739 KB]
(147)
|
|
|
2777 |
Zhizheng ZHANG, Xiaojian ZHANG, Junqing WANG, Guanghui FENG |
| |
|
Federated spatial data publication method with differential privacy and secure aggregation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2777-2784
[Abstract]
(363)
[HTML 1 KB]
[PDF 2235 KB]
(248)
|
|
|
628 |
Rui ZHANG, Siqi SONG, Jing HU, Yongmei ZHANG, Yanfeng CHAI |
| |
|
Performance evaluation of industry-university-research based on statistics and adaptive ParNet |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 628-637
[Abstract]
(236)
[HTML 0 KB]
[PDF 3247 KB]
(283)
|
|
|
604 |
Huzhen GAO, Changping DU, Yao ZHENG |
| |
|
Gimbal system control algorithm of unmanned aerial vehicle based on extended state observer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 604-610
[Abstract]
(361)
[HTML 0 KB]
[PDF 3518 KB]
(496)
|
|
|
588 |
Zhiliang SHI, Shiqi LIAO, Zibo GAN, Shaobo ZHU |
| |
|
Automatic preoperative planning algorithm for three-dimensional wedge osteotomy of radius |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 588-594
[Abstract]
(290)
[HTML 0 KB]
[PDF 2804 KB]
(132)
|
|
|
469 |
Zhiwen JING, Yujia ZHANG, Boting SUN, Hao GUO |
| |
|
Two-stage recommendation algorithm of Siamese graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 469-476
[Abstract]
(372)
[HTML 0 KB]
[PDF 2896 KB]
(1604)
|
|
|
452 |
Siyi ZHOU, Tianrui LI |
| |
|
Visual analysis of multivariate spatio-temporal data for origin-destination flow |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 452-459
[Abstract]
(266)
[HTML 0 KB]
[PDF 3328 KB]
(1254)
|
|
|
432 |
Fuqin DENG, Huifeng GUAN, Chaoen TAN, Lanhui FU, Hongmin WANG, Tinlun LAM, Jianmin ZHANG |
| |
|
Multi-robot reinforcement learning path planning method based on request-response communication mechanism and local attention mechanism |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 432-438
[Abstract]
(582)
[HTML 0 KB]
[PDF 1916 KB]
(1287)
|
|
|
385 |
Xinran LUO, Tianrui LI, Zhen JIA |
| |
|
Chinese medical named entity recognition based on self-attention mechanism and lexicon enhancement |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 385-392
[Abstract]
(461)
[HTML 0 KB]
[PDF 2158 KB]
(622)
|
|
|
2818 |
Shanglong LI, Jianhua LIU, Heming JIA |
| |
|
Reptile search algorithm based on multi-hunting coordination strategy |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2818-2828
[Abstract]
(382)
[HTML 1 KB]
[PDF 1883 KB]
(294)
|
|
|
2747 |
Lilin FAN, Fukang CAO, Wanting WANG, Kai YANG, Zhaoyu SONG |
| |
|
Intermittent demand forecasting method based on adaptive matching of demand patterns |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2747-2755
[Abstract]
(503)
[HTML 1 KB]
[PDF 1955 KB]
(666)
|
|
|
2785 |
Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU |
| |
|
Differential property evaluation method based on GPU for large-state cryptographic S-boxes |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2785-2790
[Abstract]
(396)
[HTML 1 KB]
[PDF 1245 KB]
(80)
|
|
|
2911 |
Xiyuan WANG, Zhancheng ZHANG, Shaokang XU, Baocheng ZHANG, Xiaoqing LUO, Fuyuan HU |
| |
|
Unsupervised cross-domain transfer network for 3D/2D registration in surgical navigation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2911-2918
[Abstract]
(717)
[HTML 1 KB]
[PDF 2025 KB]
(1667)
|
|
|
2970 |
Jing QIN, Zhiguang QIN, Fali LI, Yueheng PENG |
| |
|
Diagnosis of major depressive disorder based on probabilistic sparse self-attention neural network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2970-2974
[Abstract]
(707)
[HTML 1 KB]
[PDF 1067 KB]
(2235)
|
|
|
1816 |
Shibin LI, Jun GONG, Shengjun TANG |
| |
|
Semi-supervised heterophilic graph representation learning model based on Graph Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1816-1823
[Abstract]
(398)
[HTML 1 KB]
[PDF 2420 KB]
(762)
|
|
|
3581 |
Ziyi LI, Tingting QU, Qianpeng CHONG, Jindong XU |
| |
|
Remote sensing image segmentation network based on fuzzy multiscale features |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3581-3586
[Abstract]
(392)
[HTML 1 KB]
[PDF 1521 KB]
(384)
|
|
|
3315 |
Li ZENG, Jingru YANG, Gang HUANG, Xiang JING, Chaoran LUO |
| |
|
Survey on hypergraph application methods: issues, advances, and challenges |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3315-3326
[Abstract]
(871)
[HTML 1 KB]
[PDF 795 KB]
(498)
|
|
|
2848 |
Min HUA, Jia’nan WEI, Wei ZHAO, Shuo MENG |
| |
|
Interference analysis and performance research of LoRa signals |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2848-2854
[Abstract]
(331)
[HTML 1 KB]
[PDF 1962 KB]
(1142)
|
|
|
2726 |
Yu DU, Yan ZHU |
| |
|
Constructing pre-trained dynamic graph neural network to predict disappearance of academic cooperation behavior |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2726-2731
[Abstract]
(594)
[HTML 1 KB]
[PDF 1708 KB]
(300)
|
|
|
3090 |
Xingyao YANG, Hongtao SHEN, Zulian ZHANG, Jiong YU, Jiaying CHEN, Dongxiao WANG |
| |
|
Sequential recommendation based on hierarchical filter and temporal convolution enhanced self-attention network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3090-3096
[Abstract]
(455)
[HTML 1 KB]
[PDF 1877 KB]
(1113)
|
|
|
1114 |
Tianhua CHEN, Jiaxuan ZHU, Jie YIN |
| |
|
Bird recognition algorithm based on attention mechanism |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1114-1120
[Abstract]
(555)
[HTML 1 KB]
[PDF 2874 KB]
(676)
|
|
|
2437 |
Huanliang SUN, Siyi WANG, Junling LIU, Jingke XU |
| |
|
Help-seeking information extraction model for flood event in social media data |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2437-2445
[Abstract]
(428)
[HTML 1 KB]
[PDF 2708 KB]
(391)
|
|
|
2952 |
Guixiang XUE, Hui WANG, Weifeng ZHOU, Yu LIU, Yan LI |
| |
|
Port traffic flow prediction based on knowledge graph and spatio-temporal diffusion graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2952-2957
[Abstract]
(670)
[HTML 1 KB]
[PDF 1614 KB]
(908)
|
|
|
2493 |
Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG |
| |
|
Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2493-2499
[Abstract]
(928)
[HTML 1 KB]
[PDF 1194 KB]
(1582)
|
|
|
0 |
|
| |
|
An oversampling method for imbalanced data based on sample potential and noise evolution |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(68)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
|
0 |
|
| |
|
Video Pedestrian Anomaly Detection Method Based on Skeleton Graph and Mixed Attention |
| |
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(72)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Fusion of Coordinate and Multi-Head Attention Mechanisms for Interactive Speech Emotion Recognition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(112)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
|
0 |
|
| |
|
Automatic ICD coding method incorporating heterogeneous information |
| |
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(83)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Sentiment classification of psychological counseling based on attention over attention mechanism |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(63)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
|
0 |
|
| |
|
Consistency preserving age estimation method by ensemble ranking |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(216)
[HTML 1 KB]
[PDF 0 KB]
(10)
|
|
|
0 |
|
| |
|
Relation extraction based on multi-scale mixed attention convolutional neural networks |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(78)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
|
0 |
|
| |
|
Low illumination face detection based on image enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(275)
[HTML 1 KB]
[PDF 2413 KB]
(65)
|
|
|
0 |
|
| |
|
Improved age assessment method combining Cloformer with ordinal regression |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(309)
[HTML 1 KB]
[PDF 3667 KB]
(72)
|
|
|
0 |
|
| |
|
Purchase behavior prediction model based on two-stage dynamic interest recognition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(365)
[HTML 1 KB]
[PDF 1474 KB]
(46)
|
|
|
0 |
|
| |
|
Personalized federated learning method based on dual stream neural network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(260)
[HTML 1 KB]
[PDF 2185 KB]
(204)
|
|
|
0 |
|
| |
|
Application of improved hunter-prey optimization algorithm in WSN coverage |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(276)
[HTML 1 KB]
[PDF 6422 KB]
(136)
|
|
|
0 |
|
| |
|
Multimodal sentiment analysis network with self-supervision and multi-layer cross attention |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(314)
[HTML 1 KB]
[PDF 1572 KB]
(413)
|
|
|
0 |
|
| |
|
Multi-level Color Restoration of Mural Image based on Gated Positional Encoding |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(46)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
|
0 |
|
| |
|
Graph convolutional network-based distributed power allocation algorithm for D2D communication systems |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(67)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Top-K optimal route query problem with keyword search support |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(232)
[HTML 1 KB]
[PDF 2879 KB]
(34)
|
|
|
0 |
|
| |
|
Bagging-DyFAS: A model ensemble algorithm with dynamic fine-tuning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(63)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Application of Improved VGG16 in Rice Blast Image Recognition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(69)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
|
0 |
|
| |
|
Research on X-ray Image Enhancement of Complex workpieces Based on Gradient Field and Local Deviation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(57)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
945 |
Kui ZHAO, Huiqi QIU, Xu LI, Zhifei XU |
| |
|
Real-time pulmonary nodule detection algorithm combining attention and multipath fusion |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 945-952
[Abstract]
(467)
[HTML 1 KB]
[PDF 2387 KB]
(1538)
|
|
|
1248 |
Xiangjie SUN, Qiang WEI, Yisen WANG, Jiang DU |
| |
|
Survey of code similarity detection technology |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1248-1258
[Abstract]
(634)
[HTML 1 KB]
[PDF 1868 KB]
(2627)
|
|
|
1209 |
Rui TANG, Shibo YUE, Ruizhi ZHANG, Chuan LIU, Chuanlin PANG |
| |
|
Energy efficiency optimization mechanism for UAV-assisted and non-orthogonal multiple access-enabled data collection system |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1209-1218
[Abstract]
(412)
[HTML 1 KB]
[PDF 2575 KB]
(667)
|
|
|
683 |
Yuanlong WANG, Wenbo HU, Hu ZHANG |
| |
|
Knowledge-guided visual relationship detection model |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 683-689
[Abstract]
(355)
[HTML 1 KB]
[PDF 1592 KB]
(583)
|
|
|
0 |
|
| |
|
Aspect sentiment triplet extraction based on aspect-aware attention enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(132)
[HTML 1 KB]
[PDF 533 KB]
(199)
|
|
|
0 |
|
| |
|
Aspect-level sentiment analysis model based on alternating attention mechanism and graph convolutional network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(225)
[HTML 1 KB]
[PDF 422 KB]
(194)
|
|
|
671 |
Wei SHE, Yang LI, Lihong ZHONG, Defeng KONG, Zhao TIAN |
| |
|
Hyperparameter optimization for neural network based on improved real coding genetic algorithm |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 671-676
[Abstract]
(767)
[HTML 1 KB]
[PDF 1532 KB]
(603)
|
|
|
2704 |
Xingyao YANG, Yu CHEN, Jiong YU, Zulian ZHANG, Jiaying CHEN, Dongxiao WANG |
| |
|
Recommendation model combining self-features and contrastive learning |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2704-2710
[Abstract]
(743)
[HTML 1 KB]
[PDF 1737 KB]
(669)
|
|
|
1862 |
Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI |
| |
|
Multi-object cache side-channel attack detection model based on machine learning |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1862-1871
[Abstract]
(539)
[HTML 1 KB]
[PDF 3387 KB]
(123)
|
|
|
2285 |
Huaxia LI, Xiaorong HUANG, Anlin SHEN, Peng JIANG, Yiqiang PENG, Liqi SUI |
| |
|
Trajectory tracking of caster-type omnidirectional mobile platform based on MPC and PID |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2285-2293
[Abstract]
(404)
[HTML 1 KB]
[PDF 4693 KB]
(208)
|
|
|
2080 |
Zhi ZHANG, Xin LI, Naifu YE, Kaixi HU |
| |
|
DKP: defending against model stealing attacks based on dark knowledge protection |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2080-2086
[Abstract]
(503)
[HTML 1 KB]
[PDF 1427 KB]
(83)
|
|
|
2018 |
Dianhui MAO, Xuebo LI, Junling LIU, Denghui ZHANG, Wenjing YAN |
| |
|
Chinese entity and relation extraction model based on parallel heterogeneous graph and sequential attention mechanism |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2018-2025
[Abstract]
(673)
[HTML 1 KB]
[PDF 2387 KB]
(1376)
|
|
|
2065 |
Huanhuan LI, Tianqiang HUANG, Xuemei DING, Haifeng LUO, Liqing HUANG |
| |
|
Public traffic demand prediction based on multi-scale spatial-temporal graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2065-2072
[Abstract]
(783)
[HTML 1 KB]
[PDF 1969 KB]
(369)
|
|
|
1987 |
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG |
| |
|
Deep network compression method based on low-rank decomposition and vector quantization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 1987-1994
[Abstract]
(637)
[HTML 1 KB]
[PDF 1506 KB]
(633)
|
|
|
2034 |
Qianhui LU, Yu ZHANG, Mengling WANG, Tingwei WU, Yuzhong SHAN |
| |
|
Classification model of nuclear power equipment quality text based on improved recurrent pooling network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2034-2040
[Abstract]
(402)
[HTML 1 KB]
[PDF 1893 KB]
(89)
|
|
|
2160 |
Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG |
| |
|
Binary code identification based on user system call sequences |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2160-2167
[Abstract]
(350)
[HTML 1 KB]
[PDF 2494 KB]
(74)
|
|
|
2208 |
Xun SUN, Ruifeng FENG, Yanru CHEN |
| |
|
Monocular 3D object detection method integrating depth and instance segmentation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2208-2215
[Abstract]
(663)
[HTML 1 KB]
[PDF 4804 KB]
(350)
|
|
|
2183 |
Wenliang WEI, Yangping WANG, Biao YUE, Anzheng WANG, Zhe ZHANG |
| |
|
Deep learning model for infrared and visible image fusion based on illumination weight allocation and attention |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2183-2191
[Abstract]
(458)
[HTML 1 KB]
[PDF 3503 KB]
(520)
|
|
|
2279 |
Junhao ZHENG, Hongfeng TAO |
| |
|
High-order internal model based robust iterative learning control with varying trajectory |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2279-2284
[Abstract]
(366)
[HTML 1 KB]
[PDF 2195 KB]
(61)
|
|
|
2041 |
Hao CHAO, Shuqi FENG, Yongli LIU |
| |
|
Convolutional recurrent neural network optimized by multiple context vectors in EEG-based emotion recognition |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2041-2046
[Abstract]
(411)
[HTML 1 KB]
[PDF 1601 KB]
(350)
|
|
|
2151 |
Shuo SUN, Wei ZHANG, Wendi FENG, Yuwei ZHANG |
| |
|
Automatic foreign function interface generation method based on source code analysis |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2151-2159
[Abstract]
(360)
[HTML 1 KB]
[PDF 3540 KB]
(93)
|
|
|
2116 |
Shiyang LI, Shaojie NI, Ding DENG, Lei CHEN, Honglei LIN |
| |
|
Reliability enhancement algorithm for physical unclonable function based on non-orthogonal discrete transform |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2116-2122
[Abstract]
(360)
[HTML 1 KB]
[PDF 2608 KB]
(246)
|
|
|
2192 |
Song XU, Wenbo ZHANG, Yifan WANG |
| |
|
Lightweight video salient object detection network based on spatiotemporal information |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2192-2199
[Abstract]
(697)
[HTML 1 KB]
[PDF 2111 KB]
(824)
|
|
|
2073 |
Junchi GE, Weihua ZHAO |
| |
|
Distance weighted discriminant analysis based on robust principal component analysis for matrix data |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2073-2079
[Abstract]
(484)
[HTML 1 KB]
[PDF 3828 KB]
(307)
|
|
|
2168 |
Runze TIAN, Yulong ZHOU, Hong ZHU, Gang XUE |
| |
|
Local information based path selection algorithm for service migration |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2168-2174
[Abstract]
(502)
[HTML 1 KB]
[PDF 1021 KB]
(163)
|
|
|
2233 |
Yangyi GAO, Tao LEI, Xiaogang DU, Suiyong LI, Yingbo WANG, Chongdan MIN |
| |
|
Crowd counting and locating method based on pixel distance map and four-dimensional dynamic convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2233-2242
[Abstract]
(647)
[HTML 1 KB]
[PDF 4123 KB]
(441)
|
|
|
2310 |
Yiqun ZHAO, Zhiyu ZHANG, Xue DONG |
| |
|
Anisotropic travel time computation method based on dense residual connection physical information neural networks |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2310-2318
[Abstract]
(734)
[HTML 1 KB]
[PDF 7009 KB]
(771)
|
|
|
0 |
|
| |
|
Automatic Preoperative Planning Algorithm for Three-Dimensional Wedge Osteotomy of Radius |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(50)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
1423 |
Jia SU, Hong YU |
| |
|
Missing value imputation algorithm using dual discriminator based on conditional generative adversarial imputation network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1423-1427
[Abstract]
(298)
[HTML 1 KB]
[PDF 872 KB]
(347)
|
|
|
1832 |
Zixuan YUAN, Xiaoqing WENG, Ningzhen GE |
| |
|
Early classification model of multivariate time series based on orthogonal locality preserving projection and cost optimization |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1832-1841
[Abstract]
(473)
[HTML 1 KB]
[PDF 1806 KB]
(141)
|
|
|
1699 |
Yao LIU, Yumeng LI, Miaomiao SONG |
| |
|
Cognitive graph based on business process |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1699-1705
[Abstract]
(438)
[HTML 1 KB]
[PDF 988 KB]
(183)
|
|
|
47 |
Jia WANG-ZHU, Zhou YU, Jun YU, Jianping FAN |
| |
|
Video dynamic scene graph generation model based on multi-scale spatial-temporal Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 47-57
[Abstract]
(566)
[HTML 1 KB]
[PDF 2900 KB]
(2008)
|
|
|
3217 |
Bennian YU, Yongzhao ZHAN, Qirong MAO, Wenlong DONG, Honglin LIU |
| |
|
Double complex convolution and attention aggregating recurrent network for speech enhancement |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3217-3224
[Abstract]
(442)
[HTML 0 KB]
[PDF 1993 KB]
(1169)
|
|
|
3142 |
Binwei SONG, Yao WANG |
| |
|
Low-cost pay-per-use licensing scheme for FPGA intellectual property protection |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3142-3148
[Abstract]
(411)
[HTML 0 KB]
[PDF 1413 KB]
(134)
|
|
|
3121 |
Lei MA, Chuan LUO, Tianrui LI, Hongmei CHEN |
| |
|
Fuzzy-rough set based unsupervised dynamic feature selection algorithm |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3121-3128
[Abstract]
(440)
[HTML 0 KB]
[PDF 511 KB]
(312)
|
|
|
1927 |
Xiaohui CHENG, Yuntian HUANG, Ruifang ZHANG |
| |
|
Lightweight infrared road scene detection model based on multiscale and weighted coordinate attention |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1927-1934
[Abstract]
(379)
[HTML 1 KB]
[PDF 3120 KB]
(1318)
|
|
|
1842 |
Mei WANG, Xuesong SU, Jia LIU, Ruonan YIN, Shan HUANG |
| |
|
Time series classification method based on multi-scale cross-attention fusion in time-frequency domain |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1842-1847
[Abstract]
(780)
[HTML 1 KB]
[PDF 2511 KB]
(1159)
|
|
|
1781 |
Xun YAO, Zhongzheng QIN, Jie YANG |
| |
|
Generative label adversarial text classification model |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1781-1785
[Abstract]
(667)
[HTML 1 KB]
[PDF 1142 KB]
(690)
|
|
|
79 |
Junhao LUO, Yan ZHU |
| |
|
Multi-dynamic aware network for unaligned multimodal language sequence sentiment analysis |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 79-85
[Abstract]
(351)
[HTML 1 KB]
[PDF 1299 KB]
(1606)
|
|
|
1636 |
Juxiang ZHOU, Jinsheng LIU, Jianhou GAN, Di WU, Zijie LI |
| |
|
Classroom speech emotion recognition method based on multi-scale temporal-aware network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1636-1643
[Abstract]
(488)
[HTML 1 KB]
[PDF 4548 KB]
(969)
|
|
|
2216 |
Zhe KONG, Han LI, Shaowei GAN, Mingru KONG, Bingtao HE, Ziyu GUO, Ducheng JIN, Zhaowen QIU |
| |
|
Structure segmentation model for 3D kidney images based on asymmetric multi-decoder and attention module |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2216-2224
[Abstract]
(368)
[HTML 1 KB]
[PDF 2905 KB]
(444)
|
|
|
1760 |
Xiting LYU, Jinghua ZHAO, Haiying RONG, Jiale ZHAO |
| |
|
Information diffusion prediction model based on Transformer and relational graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1760-1766
[Abstract]
(582)
[HTML 1 KB]
[PDF 2150 KB]
(249)
|
|
|
1965 |
Xiaolu WANG, Wangfei QIAN |
| |
|
Gait recognition method based on two-branch convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1965-1971
[Abstract]
(355)
[HTML 1 KB]
[PDF 1361 KB]
(567)
|
|
|
1796 |
Junfeng SHEN, Xingchen ZHOU, Can TANG |
| |
|
Dual-channel sentiment analysis model based on improved prompt learning method |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1796-1806
[Abstract]
(423)
[HTML 1 KB]
[PDF 3205 KB]
(143)
|
|
|
788 |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU |
| |
|
Analysis of consistency between sensitive behavior and privacy policy of Android applications |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 788-796
[Abstract]
(547)
[HTML 1 KB]
[PDF 1850 KB]
(226)
|
|
|
1972 |
Yue LIU, Fang LIU, Aoyun WU, Qiuyue CHAI, Tianxiao WANG |
| |
|
3D object detection network based on self-attention mechanism and graph convolution |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1972-1977
[Abstract]
(703)
[HTML 1 KB]
[PDF 3215 KB]
(1205)
|
|
|
2055 |
Tian MA, Runtao XI, Jiahao LYU, Yijie ZENG, Jiayi YANG, Jiehui ZHANG |
| |
|
Mobile robot 3D space path planning method based on deep reinforcement learning |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2055-2064
[Abstract]
(790)
[HTML 1 KB]
[PDF 5732 KB]
(1140)
|
|
|
1706 |
Youren YU, Yangsen ZHANG, Yuru JIANG, Gaijuan HUANG |
| |
|
Chinese named entity recognition model incorporating multi-granularity linguistic knowledge and hierarchical information |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1706-1712
[Abstract]
(492)
[HTML 1 KB]
[PDF 1485 KB]
(220)
|
|
|
1751 |
Jianjing LI, Guanfeng LI, Feizhou QIN, Weijun LI |
| |
|
Multi-relation approximate reasoning model based on uncertain knowledge graph embedding |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1751-1759
[Abstract]
(609)
[HTML 1 KB]
[PDF 1027 KB]
(555)
|
|
|
1911 |
Mengyuan HUANG, Kan CHANG, Mingyang LING, Xinjie WEI, Tuanfa QIN |
| |
|
Progressive enhancement algorithm for low-light images based on layer guidance |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1911-1919
[Abstract]
(710)
[HTML 1 KB]
[PDF 6161 KB]
(212)
|
|
|
1786 |
Tianci KE, Jianhua LIU, Shuihua SUN, Zhixiong ZHENG, Zijie CAI |
| |
|
Aspect-level sentiment analysis model combining strong association dependency and concise syntax |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1786-1795
[Abstract]
(398)
[HTML 1 KB]
[PDF 2399 KB]
(280)
|
|
|
619 |
Yuanyuan MA, Leilei XIE, Nan DONG, Na LIU |
| |
|
Opinion propagation model considering user initiative and mobility |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 619-627
[Abstract]
(367)
[HTML 1 KB]
[PDF 3396 KB]
(421)
|
|
|
556 |
Weipeng JING, Qingxin XIAO, Hui LUO |
| |
|
Channel compensation algorithm for speaker recognition based on probabilistic spherical discriminant analysis |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 556-562
[Abstract]
(386)
[HTML 1 KB]
[PDF 1543 KB]
(355)
|
|
|
331 |
Mengmei YAN, Dongping YANG |
| |
|
Review of mean field theory for deep neural network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 331-343
[Abstract]
(736)
[HTML 1 KB]
[PDF 1848 KB]
(2729)
|
|
|
490 |
Yu ZHANG, Yan CHANG, Shibin ZHANG |
| |
|
Adversarial example detection algorithm based on quantum local intrinsic dimensionality |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 490-495
[Abstract]
(307)
[HTML 1 KB]
[PDF 1918 KB]
(367)
|
|
|
0 |
|
| |
|
Visual analysis of multivariate spatio-temporal data for orgin-destination streams |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(124)
[HTML 1 KB]
[PDF 0 KB]
(11)
|
|
|
0 |
|
| |
|
Two-stage siamese graph convolutional neural network recommendation algorithm |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(71)
[HTML 1 KB]
[PDF 0 KB]
(9)
|
|
|
0 |
|
| |
|
Performance evaluation of industry-university-research based on statistics and adaptive ParNet |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(45)
[HTML 1 KB]
[PDF 0 KB]
(7)
|
|
|
360 |
Xing WANG, Guijuan LIU, Zhihao CHEN |
| |
|
Fake review detection algorithm combining Gaussian mixture model and text graph convolutional network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 360-368
[Abstract]
(477)
[HTML 1 KB]
[PDF 4451 KB]
(221)
|
|
|
418 |
Hua LAI, Tong SUN, Wenjun WANG, Zhengtao YU, Shengxiang GAO, Ling DONG |
| |
|
Text punctuation restoration for Vietnamese speech recognition with multimodal features |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 418-423
[Abstract]
(476)
[HTML 1 KB]
[PDF 3010 KB]
(672)
|
|
|
377 |
Ziqi HUANG, Jianpeng HU |
| |
|
Entity category enhanced nested named entity recognition in automotive domain |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 377-384
[Abstract]
(522)
[HTML 1 KB]
[PDF 1347 KB]
(715)
|
|
|
1905 |
Feiyu ZHAI, Handa MA |
| |
|
Hybrid classical-quantum classification model based on DenseNet |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1905-1910
[Abstract]
(441)
[HTML 1 KB]
[PDF 2793 KB]
(1676)
|
|
|
1471 |
Wenshuo GAO, Xiaoyun CHEN |
| |
|
Point cloud classification network based on node structure |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1471-1478
[Abstract]
(668)
[HTML 1 KB]
[PDF 2562 KB]
(1041)
|
|
|
1099 |
Zongyu LI, Siwei QIANG, Xiaobo GUO, Zhenfeng ZHU |
| |
|
Re-weighted adversarial variational autoencoder and its application in industrial causal effect estimation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1099-1106
[Abstract]
(579)
[HTML 1 KB]
[PDF 2192 KB]
(575)
|
|
|
1493 |
Junna ZHANG, Xinxin WANG, Tianze LI, Xiaoyan ZHAO, Peiyan YUAN |
| |
|
Task offloading method based on dynamic service cache assistance |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1493-1500
[Abstract]
(448)
[HTML 1 KB]
[PDF 2414 KB]
(375)
|
|
|
3697 |
Yu LING, Zhilong SHAN |
| |
|
Knowledge concept recommendation system based on interest enhancement |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3697-3702
[Abstract]
(521)
[HTML 1 KB]
[PDF 1346 KB]
(651)
|
|
|
3551 |
Fangxing GENG, Zhuo LI, Xin CHEN |
| |
|
Incentive mechanism design for hierarchical federated learning based on multi-leader Stackelberg game |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3551-3558
[Abstract]
(591)
[HTML 1 KB]
[PDF 2438 KB]
(2423)
|
|
|
3510 |
Chunyong YIN, Yangchun ZHANG |
| |
|
Unsupervised log anomaly detection model based on CNN and Bi-LSTM |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3510-3516
[Abstract]
(540)
[HTML 1 KB]
[PDF 1759 KB]
(3142)
|
|
|
3616 |
Bolu LI, Li WU, Xiaoying WANG, Jianqiang HUANG, Tengfei CAO |
| |
|
Multi-site wind speed prediction based on graph dynamic attention network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3616-3624
[Abstract]
(365)
[HTML 1 KB]
[PDF 4716 KB]
(439)
|
|
|
3816 |
Longbao WANG, Yinqi LUAN, Liang XU, Xin ZENG, Shuai ZHANG, Shufang XU |
| |
|
Route planning method of UAV swarm based on dynamic cluster particle swarm optimization |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3816-3823
[Abstract]
(486)
[HTML 1 KB]
[PDF 2693 KB]
(403)
|
|
|
3464 |
Yonggui WANG, Qiwen SHI |
| |
|
Social recommendation by enhanced GNN with heterogeneous relationship |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3464-3471
[Abstract]
(336)
[HTML 1 KB]
[PDF 1897 KB]
(1313)
|
|
|
3896 |
Qihong SONG, Jianxun LIU, Haize HU, Xiangping ZHANG |
| |
|
Code search model based on collaborative fusion network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3896-3902
[Abstract]
(379)
[HTML 1 KB]
[PDF 1457 KB]
(365)
|
|
|
3149 |
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG |
| |
|
Medical image privacy protection based on thumbnail encryption and distributed storage |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3149-3155
[Abstract]
(456)
[HTML 1 KB]
[PDF 4138 KB]
(356)
|
|
|
3457 |
Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN |
| |
|
Nonuniform time slicing method based on prediction of community variance |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3457-3463
[Abstract]
(314)
[HTML 1 KB]
[PDF 1001 KB]
(123)
|
|
|
3368 |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG |
| |
|
Efficient certificateless ring signature scheme based on elliptic curve |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3368-3374
[Abstract]
(445)
[HTML 1 KB]
[PDF 740 KB]
(330)
|
|
|
3504 |
Hongliang TIAN, Ping GE, Mingjie XIAN |
| |
|
Distribution network operation exception management mechanism based on blockchain |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3504-3509
[Abstract]
(361)
[HTML 1 KB]
[PDF 2084 KB]
(154)
|
|
|
3607 |
Yutang JIN, Yisong WANG, Lihui WANG, Pengli ZHAO |
| |
|
Speech enhancement algorithm based on multi-scale ladder-type time-frequency Conformer GAN |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3607-3615
[Abstract]
(367)
[HTML 1 KB]
[PDF 4515 KB]
(510)
|
|
|
3599 |
Xin ZHAO, Qianqian ZHU, Cong ZHAO, Jialing WU |
| |
|
Segmentation of breast nodules in ultrasound images based on multi-scale and cross-spatial fusion |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3599-3606
[Abstract]
(318)
[HTML 1 KB]
[PDF 3808 KB]
(1057)
|
|
|
3038 |
Yimin SHAO, Fan ZHAO, Yi WANG, Baoquan WANG |
| |
|
Survey of visualization research based on blockchain technology and application |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3038-3046
[Abstract]
(480)
[HTML 1 KB]
[PDF 8589 KB]
(551)
|
|
|
3351 |
Kun YOU, Qinhui WANG, Xin LI |
| |
|
General multi-unit false-name-proof auction mechanism for cloud computing |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3351-3357
[Abstract]
(498)
[HTML 1 KB]
[PDF 1731 KB]
(112)
|
|
|
3358 |
Guishuang XU, Xinchun YIN |
| |
|
Certificateless conditional privacy-preserving authentication scheme for VANET |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3358-3367
[Abstract]
(374)
[HTML 1 KB]
[PDF 867 KB]
(425)
|
|
|
855 |
Yi ZHENG, Cunyi LIAO, Tianqian ZHANG, Ji WANG, Shouyin LIU |
| |
|
Image denoising-based cell-level RSRP estimation method for urban areas |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 855-862
[Abstract]
(483)
[HTML 1 KB]
[PDF 4442 KB]
(364)
|
|
|
1511 |
Zhiyuan XI, Chao TANG, Anyang TONG, Wenjian WANG |
| |
|
Driver behavior recognition based on dual-path spatiotemporal network |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1511-1519
[Abstract]
(463)
[HTML 1 KB]
[PDF 3642 KB]
(294)
|
|
|
1107 |
Jie WANG, Hua MENG |
| |
|
Image classification algorithm based on overall topological structure of point cloud |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1107-1113
[Abstract]
(460)
[HTML 1 KB]
[PDF 2456 KB]
(1000)
|
|
|
1236 |
Huahua WANG, Xu ZHANG, Feng LI |
| |
|
Secondary signal detection algorithm for high-speed mobile environments |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1236-1241
[Abstract]
(424)
[HTML 1 KB]
[PDF 2710 KB]
(109)
|
|
|
1415 |
Kaiwen ZHAO, Peng WANG, Xiangrong TONG |
| |
|
Two-stage search-based constrained evolutionary multitasking optimization algorithm |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1415-1422
[Abstract]
(568)
[HTML 1 KB]
[PDF 1756 KB]
(679)
|
|
|
916 |
Ruifeng HOU, Pengcheng ZHANG, Liyuan ZHANG, Zhiguo GUI, Yi LIU, Haowen ZHANG, Shubin WANG |
| |
|
Iterative denoising network based on total variation regular term expansion |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 916-921
[Abstract]
(571)
[HTML 1 KB]
[PDF 2529 KB]
(907)
|
|
|
2100 |
Yuan WEI, Yan LIN, Shengnan GUO, Youfang LIN, Huaiyu WAN |
| |
|
Prediction of taxi demands between urban regions by fusing origin-destination spatial-temporal correlation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2100-2106
[Abstract]
(449)
[HTML 0 KB]
[PDF 1507 KB]
(519)
|
|
|
2065 |
Shaoquan CHEN, Jianping CAI, Lan SUN |
| |
|
Differential privacy generative adversarial network algorithm with dynamic gradient threshold clipping |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2065-2072
[Abstract]
(614)
[HTML 0 KB]
[PDF 1824 KB]
(2567)
|
|
|
2026 |
Fangshu CHEN, Wei ZHANG, Xiaoming HU, Yufei ZHANG, Xiankai MENG, Linxiang SHI |
| |
|
Dynamic aggregate nearest neighbor query algorithm in weighted road network space |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2026-2033
[Abstract]
(410)
[HTML 0 KB]
[PDF 2757 KB]
(405)
|
|
|
2017 |
Jinhui LAI, Zichen XU, Yicheng TU, Guolong TAN |
| |
|
OmegaDB: concurrent computing framework of relational operators for heterogeneous architecture |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2017-2025
[Abstract]
(402)
[HTML 0 KB]
[PDF 2915 KB]
(426)
|
|
|
2001 |
Zifang XIA, Yaxin YU, Ziteng WANG, Jiaqi QIAO |
| |
|
Explainable recommendation mechanism by fusion collaborative knowledge graph and counterfactual inference |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2001-2009
[Abstract]
(492)
[HTML 0 KB]
[PDF 1898 KB]
(1627)
|
|
|
1994 |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG |
| |
|
Dictionary partition vector space model for ciphertext ranked search in cloud environment |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 1994-2000
[Abstract]
(466)
[HTML 0 KB]
[PDF 1846 KB]
(307)
|
|
|
1987 |
Zhenyu LIU, Chaokun WANG, Gaoyang GUO |
| |
|
Parallel algorithm of betweenness centrality for dynamic networks |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 1987-1993
[Abstract]
(645)
[HTML 1 KB]
[PDF 1663 KB]
(975)
|
|
|
819 |
Xiaoxin DU, Wei ZHOU, Hao WANG, Tianru HAO, Zhenfei WANG, Mei JIN, Jianfei ZHANG |
| |
|
Survey of subgroup optimization strategies for intelligent algorithms |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 819-830
[Abstract]
(723)
[HTML 1 KB]
[PDF 2404 KB]
(2485)
|
|
|
411 |
Kaitian WANG, Qing YE, Chunlei CHENG |
| |
|
Classification method for traditional Chinese medicine electronic medical records based on heterogeneous graph representation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 411-417
[Abstract]
(688)
[HTML 1 KB]
[PDF 1643 KB]
(844)
|
|
|
960 |
Zhaojun TANG, Meiyan XIA, Hua ZHANG, Ting XIE |
| |
|
Fixed-time consensus of dynamic event-triggered multi-agent systems |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 960-965
[Abstract]
(501)
[HTML 1 KB]
[PDF 1279 KB]
(654)
|
|
|
876 |
Jingxian ZHOU, Xina LI |
| |
|
UAV detection and recognition based on improved convolutional neural network and radio frequency fingerprint |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 876-882
[Abstract]
(632)
[HTML 1 KB]
[PDF 2693 KB]
(372)
|
|
|
938 |
Zhanjun JIANG, Baijing WU, Long MA, Jing LIAN |
| |
|
Faster-RCNN water-floating garbage recognition based on multi-scale feature and polarized self-attention |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 938-944
[Abstract]
(591)
[HTML 1 KB]
[PDF 4460 KB]
(597)
|
|
|
1900 |
Shangjing LIN, Ji MA, Bei ZHUANG, Yueying LI, Ziyi LI, Tie LI, Jin TIAN |
| |
|
Wireless traffic prediction based on federated learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1900-1909
[Abstract]
(671)
[HTML 1 KB]
[PDF 4071 KB]
(333)
|
|
|
145 |
Li’an CHEN, Yi GUO |
| |
|
Text sentiment analysis model based on individual bias information |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 145-151
[Abstract]
(344)
[HTML 1 KB]
[PDF 766 KB]
(287)
|
|
|
3947 |
Haiyong ZHANG, Xianjin FANG, Enwan ZHANG, Baoyu LI, Chao PENG, Jianxiang MU |
| |
|
Fingerprint positioning method based on measurement report signal clustering |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3947-3954
[Abstract]
(385)
[HTML 1 KB]
[PDF 2357 KB]
(110)
|
|
|
269 |
Yongjian MA, Xuhua SHI, Peiyao WANG |
| |
|
Constrained multi-objective evolutionary algorithm based on two-stage search and dynamic resource allocation |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 269-277
[Abstract]
(630)
[HTML 1 KB]
[PDF 2145 KB]
(174)
|
|
|
182 |
Kuo TIAN, Yinghan WU, Feng HU |
| |
|
Identification method of influence nodes in multilayer hypernetwork based on evidence theory |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 182-189
[Abstract]
(346)
[HTML 1 KB]
[PDF 2830 KB]
(88)
|
|
|
300 |
Jie LONG, Liang XIE, Haijiao XU |
| |
|
Integrated deep reinforcement learning portfolio model |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 300-310
[Abstract]
(634)
[HTML 1 KB]
[PDF 3723 KB]
(234)
|
|
|
292 |
Hao CHEN, Zhenping XIA, Cheng CHENG, Xing LIN-LI, Bowen ZHANG |
| |
|
Lightweight image super-resolution reconstruction network based on Transformer-CNN |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 292-299
[Abstract]
(862)
[HTML 1 KB]
[PDF 1855 KB]
(428)
|
|
|
123 |
Yunyun GAO, Lasheng ZHAO, Qiang ZHANG |
| |
|
Acoustic word embedding model based on Bi-LSTM and convolutional-Transformer |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 123-128
[Abstract]
(391)
[HTML 1 KB]
[PDF 1311 KB]
(141)
|
|
|
318 |
Kai XU, Qikai GAO, Ming YIN, Jingjing TAN |
| |
|
Trajectory similarity measurement algorithm based on three-dimensional space area division |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 318-323
[Abstract]
(396)
[HTML 1 KB]
[PDF 1595 KB]
(109)
|
|
|
311 |
Hanxiao SHI, Leichun WANG |
| |
|
Short-term power load forecasting by graph convolutional network combining LSTM and self-attention mechanism |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 311-317
[Abstract]
(744)
[HTML 1 KB]
[PDF 2173 KB]
(369)
|
|
|
101 |
Chenghao FENG, Zhenping XIE, Bowen DING |
| |
|
Selective generation method of test cases for Chinese text error correction software |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 101-112
[Abstract]
(521)
[HTML 1 KB]
[PDF 3173 KB]
(130)
|
|
|
199 |
Du CHEN, Yuanyuan LI, Yu CHEN |
| |
|
Directed gene regulatory network inference algorithm based on t-test and stepwise network search |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (1): 199-205
[Abstract]
(376)
[HTML 1 KB]
[PDF 1783 KB]
(87)
|
|
|
3755 |
Wenquan LI, Yimin MAO, Xindong PENG |
| |
|
Agglomerative hierarchical clustering algorithm based on hesitant fuzzy set |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3755-3763
[Abstract]
(550)
[HTML 1 KB]
[PDF 626 KB]
(135)
|
|
|
767 |
Shengjie MENG, Wanjun YU, Ying CHEN |
| |
|
Feature selection algorithm for high-dimensional data with maximum correlation and maximum difference |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 767-771
[Abstract]
(448)
[HTML 1 KB]
[PDF 698 KB]
(286)
|
|
|
512 |
Jintao RAO, Zhe CUI |
| |
|
Electronic voting scheme based on SM2 threshold blind signature |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 512-518
[Abstract]
(483)
[HTML 1 KB]
[PDF 1208 KB]
(762)
|
|
|
677 |
Shipan JIANG, Shuwei CHEN, Guoyan ZENG |
| |
|
Strategy of invalid clause elimination in first-order logic theorem prover |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 677-682
[Abstract]
(349)
[HTML 1 KB]
[PDF 905 KB]
(191)
|
|
|
702 |
Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG |
| |
|
Chinese named entity recognition combining prior knowledge and glyph features |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 702-708
[Abstract]
(550)
[HTML 1 KB]
[PDF 750 KB]
(767)
|
|
|
645 |
Xuan CAO, Tianjian LUO |
| |
|
Dynamic multi-domain adversarial learning method for cross-subject motor imagery EEG signals |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 645-653
[Abstract]
(1024)
[HTML 1 KB]
[PDF 3364 KB]
(263)
|
|
|
3790 |
Qian CHEN, Zheng CHAI, Zilong WANG, Jiawei CHEN |
| |
|
Poisoning attack detection scheme based on generative adversarial network for federated learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3790-3798
[Abstract]
(923)
[HTML 1 KB]
[PDF 2367 KB]
(1470)
|
|
|
972 |
Shuai REN, Yuanfa JI, Xiyan SUN, Zhaochuan WEI, Zian LIN |
| |
|
Prediction of landslide displacement based on improved grey wolf optimizer and support vector regression |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 972-982
[Abstract]
(440)
[HTML 1 KB]
[PDF 3878 KB]
(243)
|
|
|
3443 |
Chuyuan WEI, Mengke WANG, Chuanhao HU, Guangqi ZHANG |
| |
|
Deep review attention neural network model for enhancing explainability of recommendation system |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3443-3448
[Abstract]
(548)
[HTML 1 KB]
[PDF 1652 KB]
(669)
|
|
|
3086 |
Dan XU, Hongfang GONG, Rongrong LUO |
| |
|
Aspect sentiment analysis with aspect item and context representation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3086-3092
[Abstract]
(394)
[HTML 1 KB]
[PDF 1011 KB]
(263)
|
|
|
403 |
Jiawei ZHANG, Guandong GAO, Ke XIAO, Shengzun SONG |
| |
|
Violent crime hierarchy algorithm by joint modeling of improved hierarchical attention network and TextCNN |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (2): 403-410
[Abstract]
(456)
[HTML 1 KB]
[PDF 1110 KB]
(694)
|
|
|
696 |
Lei GUO, Zhen JIA, Tianrui LI |
| |
|
Relational and interactive graph attention network for aspect-level sentiment analysis |
| |
|
|
Journal of Computer Applications
2024 Vol.44 (3): 696-701
[Abstract]
(426)
[HTML 1 KB]
[PDF 1072 KB]
(712)
|
|
|
1578 |
Jianhui HE, Chunlong HU, Xin SHU |
| |
|
Multi-task age estimation method based on multi-peak label distribution learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1578-1583
[Abstract]
(548)
[HTML 0 KB]
[PDF 1036 KB]
(83)
|
|
|
1409 |
Jiahong SUI, Yingchi MAO, Huimin YU, Zicheng WANG, Ping PING |
| |
|
Global image captioning method based on graph attention network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1409-1415
[Abstract]
(523)
[HTML 0 KB]
[PDF 2508 KB]
(220)
|
|
|
1394 |
Rui XU, Shuang LIANG, Hang WAN, Yimin WEN, Shiming SHEN, Jian LI |
| |
|
Extraction of PM
2.5 diffusion characteristics based on candlestick pattern matching |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1394-1400
[Abstract]
(418)
[HTML 0 KB]
[PDF 2423 KB]
(111)
|
|
|
1378 |
Yafei ZHANG, Jing WANG, Yaoshuai ZHAO, Zhihao WU, Youfang LIN |
| |
|
Stock movement prediction with market dynamic hierarchical macro information |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1378-1384
[Abstract]
(453)
[HTML 0 KB]
[PDF 1401 KB]
(190)
|
|
|
1372 |
Guangyao ZHANG, Chunfeng SONG |
| |
|
Pedestrian head tracking model based on full-body appearance features |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1372-1377
[Abstract]
(542)
[HTML 0 KB]
[PDF 2258 KB]
(250)
|
|
|
1330 |
Qinghai XU, Shifei DING, Tongfeng SUN, Jian ZHANG, Lili GUO |
| |
|
Improved capsule network based on multipath feature |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1330-1335
[Abstract]
(605)
[HTML 0 KB]
[PDF 1560 KB]
(290)
|
|
|
1323 |
Haitao TANG, Hongjun WANG, Tianrui LI |
| |
|
Discriminative multidimensional scaling for feature learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1323-1329
[Abstract]
(758)
[HTML 1 KB]
[PDF 1101 KB]
(487)
|
|
|
3711 |
Fei XIA, Shuaiqi CHEN, Min HUA, Bihong JIANG |
| |
|
Chinese word segmentation method in electric power domain based on improved BERT |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3711-3718
[Abstract]
(635)
[HTML 1 KB]
[PDF 1953 KB]
(253)
|
|
|
3955 |
Zhenggang WANG, Zhong LIU, Jin JIN, Wei LIU |
| |
|
Customs risk control method based on improved butterfly feedback neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3955-3964
[Abstract]
(350)
[HTML 1 KB]
[PDF 2964 KB]
(128)
|
|
|
3008 |
Rui MEN, Shujia FAN, Axida SHAN, Shaoyu DU, Xiumei FAN |
| |
|
Survey on combination of computation offloading and blockchain in internet of things |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3008-3016
[Abstract]
(704)
[HTML 1 KB]
[PDF 882 KB]
(341)
|
|
|
3093 |
Yuhang LI, Yuli YANG, Yao MA, Dan YU, Yongle CHEN |
| |
|
Text adversarial example generation method based on BERT model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3093-3098
[Abstract]
(637)
[HTML 1 KB]
[PDF 971 KB]
(282)
|
|
|
3848 |
Hairong XUE, Xiaolong HAN |
| |
|
Integrated scheduling considering automated guided vehicle charging strategy based on improved NSGA-Ⅱ |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3848-3855
[Abstract]
(517)
[HTML 1 KB]
[PDF 3405 KB]
(165)
|
|
|
3647 |
Yu ZHANG, Ying CAI, Jianyang CUI, Meng ZHANG, Yanfang FAN |
| |
|
Gradient descent with momentum algorithm based on differential privacy in convolutional neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3647-3653
[Abstract]
(975)
[HTML 1 KB]
[PDF 1985 KB]
(737)
|
|
|
3490 |
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU |
| |
|
SM4 resistant differential power analysis lightweight threshold implementation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3490-3496
[Abstract]
(571)
[HTML 1 KB]
[PDF 3082 KB]
(567)
|
|
|
3559 |
Chenghao YU, Runhe QIU |
| |
|
Performance analysis of bit error rate on RIS assisted index modulation cooperative system |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3559-3567
[Abstract]
(511)
[HTML 1 KB]
[PDF 2563 KB]
(207)
|
|
|
3297 |
Junpeng ZHANG, Yujie SHI, Rui JANG, Jingjing DONG, Changjian QIU |
| |
|
Review on advances in recognition and classification of cognitive impairment based on EEG signals |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3297-3308
[Abstract]
(715)
[HTML 1 KB]
[PDF 1199 KB]
(625)
|
|
|
3418 |
Shuying YANG, Haiming GUO, Xin LI |
| |
|
EEG classification based on channel selection and multi-dimensional feature fusion |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3418-3427
[Abstract]
(574)
[HTML 1 KB]
[PDF 3363 KB]
(287)
|
|
|
3129 |
Yu YANG, Weiwei DUAN |
| |
|
Spectral clustering based dynamic community discovery algorithm in social network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3129-3135
[Abstract]
(586)
[HTML 1 KB]
[PDF 2785 KB]
(1981)
|
|
|
3449 |
Zhuangzhuang XUE, Peng LI, Weibei FAN, Hongjun ZHANG, Fanshuo MENG |
| |
|
Multiple clustering algorithm based on dynamic weighted tensor distance |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3449-3456
[Abstract]
(363)
[HTML 1 KB]
[PDF 2437 KB]
(468)
|
|
|
3236 |
Suolan LIU, Zhenzhen TIAN, Hongyuan WANG, Long LIN, Yan WANG |
| |
|
Human action recognition method based on multi-scale feature fusion of single mode |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3236-3243
[Abstract]
(629)
[HTML 1 KB]
[PDF 1425 KB]
(1235)
|
|
|
0 |
|
| |
|
Double complex convolutional and attention aggregating recurrent network for speech enhancement |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(144)
[HTML 1 KB]
[PDF 528 KB]
(106)
|
|
|
0 |
Lei Ma Chuan Luo LI Tian-rui Hongmei Chen |
| |
|
Fuzzy-rough set based unsupervised dynamic feature selection algorithm |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(44)
[HTML 1 KB]
[PDF 535 KB]
(14)
|
|
|
1176 |
Yingqi LI, Weifeng JI, Jiang WENG, Xuan WU, Xiuyu SHEN, Yan SUN |
| |
|
Virus propagation model and stability analysis of heterogeneous backup network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1176-1182
[Abstract]
(451)
[HTML 0 KB]
[PDF 2043 KB]
(84)
|
|
|
1160 |
Chunyong YIN, Rui QU |
| |
|
Federated learning algorithm based on personalized differential privacy |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1160-1168
[Abstract]
(1109)
[HTML 0 KB]
[PDF 1800 KB]
(631)
|
|
|
1056 |
Cheng FANG, Bei LI, Ping HAN, Qiong WU |
| |
|
Fine-grained emotion classification of Chinese microblog based on syntactic dependency graph |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1056-1061
[Abstract]
(582)
[HTML 0 KB]
[PDF 1598 KB]
(220)
|
|
|
1021 |
Yongbing GAO, Juntian GAO, Rong MA, Lidong YANG |
| |
|
User granularity-level personalized social text generation model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1021-1028
[Abstract]
(541)
[HTML 0 KB]
[PDF 2546 KB]
(184)
|
|
|
1005 |
Zhoubo XU, Puqing CHEN, Huadong LIU, Xin YANG |
| |
|
Deep graph matching model based on self-attention network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1005-1012
[Abstract]
(742)
[HTML 0 KB]
[PDF 2118 KB]
(298)
|
|
|
3275 |
Zhiang ZHANG, Guangzhong LIAO |
| |
|
Multi-scale feature enhanced retinal vessel segmentation algorithm based on U-Net |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3275-3281
[Abstract]
(511)
[HTML 1 KB]
[PDF 2624 KB]
(191)
|
|
|
3309 |
Min ZUO, Hong WANG, Wenjing YAN, Qingchuan ZHANG |
| |
|
Gene splice site identification based on BERT and CNN |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3309-3314
[Abstract]
(483)
[HTML 1 KB]
[PDF 1829 KB]
(240)
|
|
|
3703 |
Jianle CAO, Nana LI |
| |
|
Semantically enhanced sentiment classification model based on multi-level attention |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3703-3710
[Abstract]
(519)
[HTML 1 KB]
[PDF 1638 KB]
(226)
|
|
|
3230 |
Chuanbiao LI, Yuanwei BI |
| |
|
Stereo matching algorithm based on cross-domain adaptation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3230-3235
[Abstract]
(472)
[HTML 1 KB]
[PDF 2684 KB]
(152)
|
|
|
3267 |
Wei LI, Sixin LIANG, Jianzhou ZHANG |
| |
|
Long-tailed image defect detection based on gradient-guide weighted-deferred negative gradient decay loss |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3267-3274
[Abstract]
(432)
[HTML 1 KB]
[PDF 2403 KB]
(170)
|
|
|
2611 |
Meijia LIANG, Xinwu LIU, Xiaopeng HU |
| |
|
Small target detection algorithm for train operating environment image based on improved YOLOv3 |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2611-2618
[Abstract]
(535)
[HTML 1 KB]
[PDF 5709 KB]
(201)
|
|
|
2819 |
Maozu GUO, Yazhe ZHANG, Lingling ZHAO |
| |
|
Electric vehicle charging station siting method based on spatial semantics and individual activities |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2819-2827
[Abstract]
(562)
[HTML 1 KB]
[PDF 6390 KB]
(146)
|
|
|
3062 |
Mingyue WU, Dong ZHOU, Wenyu ZHAO, Wei QU |
| |
|
Sentence embedding optimization based on manifold learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3062-3069
[Abstract]
(424)
[HTML 1 KB]
[PDF 1411 KB]
(168)
|
|
|
2784 |
Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI |
| |
|
Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2784-2788
[Abstract]
(444)
[HTML 1 KB]
[PDF 1455 KB]
(151)
|
|
|
2812 |
Xuyan ZHAO, Yunhe CUI, Chaohui JIANG, Qing QIAN, Guowei SHEN, Chun GUO, Xianchao LI |
| |
|
CHAIN: edge computing node placement algorithm based on overlapping domination |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2812-2818
[Abstract]
(426)
[HTML 1 KB]
[PDF 1484 KB]
(154)
|
|
|
2963 |
Kunting LU, Rongrong FEI, Xuande ZHANG |
| |
|
Remote sensing image pansharpening by convolutional neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2963-2969
[Abstract]
(649)
[HTML 1 KB]
[PDF 3323 KB]
(177)
|
|
|
3178 |
Erchao LI, Shenghui ZHANG |
| |
|
Dynamic multi-objective optimization algorithm based on adaptive prediction of new evaluation index |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3178-3187
[Abstract]
(549)
[HTML 1 KB]
[PDF 3391 KB]
(188)
|
|
|
2753 |
Xinyue ZHANG, Rong LIU, Chiyu WEI, Ke FANG |
| |
|
Aspect-based sentiment analysis method with integrating prompt knowledge |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2753-2759
[Abstract]
(935)
[HTML 1 KB]
[PDF 1699 KB]
(260)
|
|
|
583 |
Yating SU, Cuixiang LIU |
| |
|
Three-dimensional human reconstruction model based on high-resolution net and graph convolutional network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 583-588
[Abstract]
(442)
[HTML 0 KB]
[PDF 2124 KB]
(182)
|
|
|
575 |
Ruoying WANG, Fan LYU, Liuqing ZHAO, Fuyuan HU |
| |
|
Floorplan generation algorithm integrating user requirements and boundary constraints |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 575-582
[Abstract]
(592)
[HTML 0 KB]
[PDF 2582 KB]
(232)
|
|
|
349 |
Ming XU, Linhao LI, Qiaoling QI, Liqin WANG |
| |
|
Abductive reasoning model based on attention balance list |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 349-355
[Abstract]
(604)
[HTML 0 KB]
[PDF 1484 KB]
(170)
|
|
|
335 |
Chengyu LIN, Lei WANG, Cong XUE |
| |
|
Weakly-supervised text classification with label semantic enhancement |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 335-342
[Abstract]
(744)
[HTML 0 KB]
[PDF 1987 KB]
(405)
|
|
|
2747 |
Haodong ZHENG, Hua MA, Yingchao XIE, Wensheng TANG |
| |
|
Knowledge tracing model based on graph neural network blending with forgetting factors and memory gate |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2747-2752
[Abstract]
(764)
[HTML 1 KB]
[PDF 1266 KB]
(372)
|
|
|
2828 |
Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU |
| |
|
Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2828-2835
[Abstract]
(591)
[HTML 1 KB]
[PDF 3025 KB]
(169)
|
|
|
2910 |
Qiuyu ZHANG, Yongwang WEN |
| |
|
Triplet deep hashing method for speech retrieval |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2910-2918
[Abstract]
(361)
[HTML 1 KB]
[PDF 2003 KB]
(140)
|
|
|
2581 |
Doudou LI, Wanggen LI, Yichun XIA, Yang SHU, Kun GAO |
| |
|
Skeleton-based action recognition based on feature interaction and adaptive fusion |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2581-2587
[Abstract]
(433)
[HTML 1 KB]
[PDF 2179 KB]
(453)
|
|
|
2382 |
Zexi JIN, Lei LI, Ji LIU |
| |
|
Transfer learning model based on improved domain separation network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2382-2389
[Abstract]
(509)
[HTML 1 KB]
[PDF 1973 KB]
(1433)
|
|
|
2426 |
Kezheng CHEN, Xiaoran GUO, Yong ZHONG, Zhenping LI |
| |
|
Relation extraction method based on negative training and transfer learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2426-2430
[Abstract]
(518)
[HTML 1 KB]
[PDF 922 KB]
(364)
|
|
|
2406 |
Xiaoyan ZHANG, Zhengyu DUAN |
| |
|
Cross-lingual zero-resource named entity recognition model based on sentence-level generative adversarial network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2406-2411
[Abstract]
(533)
[HTML 1 KB]
[PDF 963 KB]
(225)
|
|
|
2420 |
Haiwei FAN, Xinsiyu LU, Limiao ZHANG, Yisheng AN |
| |
|
Citation recommendation algorithm fusing knowledge graph and graph attention network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2420-2425
[Abstract]
(646)
[HTML 1 KB]
[PDF 1853 KB]
(329)
|
|
|
2390 |
Bin LIU, Qian ZHANG, Yaqin WEI, Xueying CUI, Hongying ZHI |
| |
|
Graph to equation tree model based on expression layer-by-layer aggregation and dynamic selection |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2390-2395
[Abstract]
(320)
[HTML 1 KB]
[PDF 2057 KB]
(99)
|
|
|
2412 |
Hongjun HENG, Dingcheng YANG |
| |
|
Knowledge enhanced aspect word interactive graph neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2412-2419
[Abstract]
(496)
[HTML 1 KB]
[PDF 1210 KB]
(138)
|
|
|
2448 |
Shijie PENG, Hongmei CHEN, Lizhen WANG, Qing XIAO |
| |
|
Hybrid point-of-interest recommendation model based on geographic preference ranking |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2448-2455
[Abstract]
(501)
[HTML 1 KB]
[PDF 1284 KB]
(172)
|
|
|
2602 |
Huan LIU, Lianghong WU, Lyu ZHANG, Liang CHEN, Bowen ZHOU, Hongqiang ZHANG |
| |
|
Leukocyte detection method based on twice-fusion-feature CenterNet |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2602-2610
[Abstract]
(404)
[HTML 1 KB]
[PDF 4702 KB]
(173)
|
|
|
2537 |
Dongying ZHU, Yong ZHONG, Guanci YANG, Yang LI |
| |
|
Research progress on motion segmentation of visual localization and mapping in dynamic environment |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2537-2545
[Abstract]
(491)
[HTML 1 KB]
[PDF 2687 KB]
(277)
|
|
|
67 |
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng |
| |
|
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 67-73
[Abstract]
(462)
[HTML 0 KB]
[PDF 2162 KB]
(96)
|
|
|
61 |
ZOU Bin, ZHANG Cong |
| |
|
Dense crowd detection algorithm based on Faster R-CNN |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 61-66
[Abstract]
(592)
[HTML 0 KB]
[PDF 3411 KB]
(238)
|
|
|
265 |
LIN Jianzhuang, YANG Wenzhong, TAN Sixiang, ZHOU Lexin, CHEN Danni |
| |
|
Fusing filter enhancement and reverse attention network for polyp segmentation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 265-272
[Abstract]
(525)
[HTML 0 KB]
[PDF 2283 KB]
(192)
|
|
|
169 |
LIN Yangping, LIU Jia, CHEN Pei, ZHANG Mingshu, YANG Xiaoyuan |
| |
|
Semi-generative video steganography scheme based on deep convolutional generative adversarial net |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 169-175
[Abstract]
(515)
[HTML 0 KB]
[PDF 3023 KB]
(203)
|
|
|
15 |
YAO Huayong, YE Dongyi, CHEN Zhaojiong |
| |
|
Multi-round conversational reinforcement learning recommendation algorithm via multi-granularity feedback |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 15-21
[Abstract]
(637)
[HTML 0 KB]
[PDF 1249 KB]
(342)
|
|
|
147 |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin |
| |
|
Analysis and improvement of certificateless signature scheme |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 147-153
[Abstract]
(751)
[HTML 1 KB]
[PDF 910 KB]
(264)
|
|
|
3225 |
Yuntao ZHAO, Wanqi XIE, Weigang LI, Jiaming HU |
| |
|
Robot hand-eye calibration algorithm based on covariance matrix adaptation evolutionary strategy |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3225-3229
[Abstract]
(493)
[HTML 1 KB]
[PDF 1281 KB]
(159)
|
|
|
2798 |
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU |
| |
|
Identity-based ring signature scheme on number theory research unit lattice |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2798-2805
[Abstract]
(607)
[HTML 1 KB]
[PDF 962 KB]
(245)
|
|
|
2619 |
Shengwei DUAN, Xinyu CHENG, Haozhou WANG, Fei WANG |
| |
|
Dam surface disease detection algorithm based on improved YOLOv5 |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2619-2629
[Abstract]
(637)
[HTML 1 KB]
[PDF 7862 KB]
(391)
|
|
|
2855 |
Bin LI, Zhibin TANG |
| |
|
Multiple level binary imperialist competitive algorithm for solving heterogeneous multiple knapsack problem |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2855-2867
[Abstract]
(422)
[HTML 1 KB]
[PDF 2507 KB]
(74)
|
|
|
1151 |
Jian CUI, Kailang MA, Yu SUN, Dou WANG, Junliang ZHOU |
| |
|
Deep explainable method for encrypted traffic classification |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1151-1159
[Abstract]
(650)
[HTML 1 KB]
[PDF 3314 KB]
(230)
|
|
|
1318 |
Haiyu YANG, Wenpu GUO, Kai KANG |
| |
|
Signal modulation recognition method based on convolutional long short-term deep neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1318-1322
[Abstract]
(493)
[HTML 1 KB]
[PDF 2318 KB]
(180)
|
|
|
0 |
|
| |
|
Fine-Grained Emotion Classification of Chinese Microblogs Based on syntactic dependence graph |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(122)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
1826 |
Huibin ZHANG, Liping FENG, Yaojun HAO, Yining WANG |
| |
|
Ancient mural dynasty identification based on attention mechanism and transfer learning |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1826-1832
[Abstract]
(557)
[HTML 1 KB]
[PDF 1804 KB]
(259)
|
|
|
3913 |
Jia XU, Jing LIU, Ge YU, Pin LYU, Panyuan YANG |
| |
|
Review of peer grading technologies for online education |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3913-3923
[Abstract]
(485)
[HTML 0 KB]
[PDF 1682 KB]
(209)
|
|
|
3870 |
Yi WANG, Liu YANG, Tongkuai ZHANG |
| |
|
Channel estimation based on compressive sensing in RIS-assisted millimeter wave system |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3870-3875
[Abstract]
(745)
[HTML 0 KB]
[PDF 1756 KB]
(347)
|
|
|
3785 |
Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA |
| |
|
Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3785-3791
[Abstract]
(494)
[HTML 0 KB]
[PDF 1481 KB]
(139)
|
|
|
2370 |
Hui LU, Ruizhang HUANG, Jingjing XUE, Lina REN, Chuan LIN |
| |
|
DDDC: deep dynamic document clustering model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2370-2375
[Abstract]
(529)
[HTML 1 KB]
[PDF 1962 KB]
(145)
|
|
|
2721 |
Xiaomin ZHOU, Fei TENG, Yi ZHANG |
| |
|
Automatic international classification of diseases coding model based on meta-network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2721-2726
[Abstract]
(569)
[HTML 1 KB]
[PDF 1032 KB]
(151)
|
|
|
2352 |
Jingyi WANG, Chao LI, Heng SONG, Di LI, Junwu ZHU |
| |
|
Spectrum combinatorial auction mechanism based on random walk algorithm |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2352-2357
[Abstract]
(396)
[HTML 1 KB]
[PDF 1187 KB]
(131)
|
|
|
2345 |
Saijuan XU, Zhenyu PEI, Jiawei LIN, Genggeng LIU |
| |
|
Constrained multi-objective evolutionary algorithm based on multi-stage search |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2345-2351
[Abstract]
(609)
[HTML 1 KB]
[PDF 1529 KB]
(220)
|
|
|
2217 |
Bona XUAN, Jin LI, Yafei SONG, Zexuan MA |
| |
|
Malicious code classification method based on improved MobileNetV2 |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2217-2225
[Abstract]
(624)
[HTML 1 KB]
[PDF 3547 KB]
(220)
|
|
|
1750 |
Hui WANG, Jianhong LI |
| |
|
Few-shot recognition method of 3D models based on Transformer |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1750-1758
[Abstract]
(482)
[HTML 1 KB]
[PDF 3334 KB]
(284)
|
|
|
1655 |
Yongfeng DONG, Yacong WANG, Yao DONG, Yahan DENG |
| |
|
Survey of online learning resource recommendation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1655-1663
[Abstract]
(936)
[HTML 1 KB]
[PDF 824 KB]
(585)
|
|
|
3603 |
Chenguang LI, Bo ZHANG, Qian ZHAO, Xiaoping CHEN, Xingfu WANG |
| |
|
Empathy prediction from texts based on transfer learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3603-3609
[Abstract]
(434)
[HTML 0 KB]
[PDF 777 KB]
(145)
|
|
|
3513 |
Rui XIAO, Mingyi LIU, Zhiying TU, Zhongjie WANG |
| |
|
Personal event detection method based on text mining in social media |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3513-3519
[Abstract]
(528)
[HTML 0 KB]
[PDF 2013 KB]
(139)
|
|
|
1796 |
Zhixiong ZHENG, Jianhua LIU, Shuihua SUN, Ge XU, Honghui LIN |
| |
|
Aspect-based sentiment analysis model fused with multi-window local information |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1796-1802
[Abstract]
(522)
[HTML 1 KB]
[PDF 1323 KB]
(128)
|
|
|
2261 |
Lei LI, Guofu ZHANG, Zhaopin SU, Feng YUE |
| |
|
Software testing resource allocation algorithm for dynamic changes in architecture |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2261-2270
[Abstract]
(441)
[HTML 1 KB]
[PDF 1050 KB]
(102)
|
|
|
2155 |
Jing ZHOU, Yiyu HU, Chengyu HU, Tianjiang WANG |
| |
|
Weakly perceived object detection method based on point cloud completion and multi-resolution Transformer |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2155-2165
[Abstract]
(444)
[HTML 1 KB]
[PDF 3409 KB]
(198)
|
|
|
3018 |
Changhong LIU, Sheng ZENG, Bin ZHANG, Yong CHEN |
| |
|
Cross-modal tensor fusion network based on semantic relation graph for image-text retrieval |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3018-3024
[Abstract]
(567)
[HTML 0 KB]
[PDF 2407 KB]
(227)
|
|
|
1109 |
Peng LI, Shilin WANG, Guangwu CHEN, Guanghui YAN |
| |
|
Key node mining in complex network based on improved local structural entropy |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1109-1114
[Abstract]
(899)
[HTML 1 KB]
[PDF 1367 KB]
(305)
|
|
|
1855 |
Lianpeng QIU, Chengyun SONG |
| |
|
Noise robust dynamic time warping algorithm |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1855-1860
[Abstract]
(538)
[HTML 1 KB]
[PDF 3337 KB]
(111)
|
|
|
2182 |
Jiaming HE, Jucheng YANG, Chao WU, Xiaoning YAN, Nenghua XU |
| |
|
Person re-identification method based on multi-modal graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2182-2189
[Abstract]
(775)
[HTML 1 KB]
[PDF 1887 KB]
(344)
|
|
|
1719 |
Nannan SUN, Chunhui PIAO, Xinna MA |
| |
|
Group buying recommendation method based on social relationship and time-series information |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1719-1729
[Abstract]
(544)
[HTML 1 KB]
[PDF 3041 KB]
(189)
|
|
|
1736 |
Wenju LI, Mengying LI, Liu CUI, Wanghui CHU, Yi ZHANG, Hui GAO |
| |
|
Monocular depth estimation method based on pyramid split attention network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1736-1742
[Abstract]
(469)
[HTML 1 KB]
[PDF 2767 KB]
(182)
|
|
|
2295 |
Yiyu GUO, Luoyu ZHOU, Xinyu LIU, Yao LI |
| |
|
Dangerous goods detection method in elevator scene based on improved attention mechanism |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2295-2302
[Abstract]
(534)
[HTML 1 KB]
[PDF 5447 KB]
(209)
|
|
|
1438 |
Jingsheng LEI, Kaijun LA, Shengying YANG, Yi WU |
| |
|
Joint entity and relation extraction based on contextual semantic enhancement |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1438-1444
[Abstract]
(699)
[HTML 1 KB]
[PDF 1612 KB]
(312)
|
|
|
2358 |
Yuan LIU, Yongquan DONG, Rui JIA, Haolin YANG |
| |
|
Hierarchical and phased attention network model for personalized course recommendation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2358-2363
[Abstract]
(453)
[HTML 1 KB]
[PDF 979 KB]
(249)
|
|
|
37 |
LIU Huan, DOU Quansheng |
| |
|
Aspect-based sentiment analysis model embedding different neighborhood representations |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 37-44
[Abstract]
(511)
[HTML 1 KB]
[PDF 1680 KB]
(144)
|
|
|
0 |
|
| |
|
Explainable Recommendation Mechanism based on collaborative knowledge graph and counterfactuals |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(201)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
|
0 |
|
| |
|
OmegaDB, A Relational Operator Concurrent Computing Framework for Heterogeneous Architectures |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(204)
[HTML 0 KB]
[PDF 0 KB]
(16)
|
|
|
2010 |
Menglin HUANG, Lei DUAN, Yuanhao ZHANG, Peiyan WANG, Renhao LI |
| |
|
Prompt learning based unsupervised relation extraction model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2010-2016
[Abstract]
(877)
[HTML 1 KB]
[PDF 1353 KB]
(305)
|
|
|
0 |
|
| |
|
Dictionary Partition Vector Space Model for Encrypted Ranked Search in the Cloud |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(111)
[HTML 0 KB]
[PDF 0 KB]
(8)
|
|
|
1979 |
Yi ZHANG, Zhenmei WANG |
| |
|
circRNA-disease association prediction by two-stage fusion on graph auto-encoder |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1979-1986
[Abstract]
(593)
[HTML 1 KB]
[PDF 1805 KB]
(136)
|
|
|
0 |
|
| |
|
Differential privacy generative adversarial network algorithm for dynamic gradient threshold clipping |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(559)
[HTML 0 KB]
[PDF 0 KB]
(19)
|
|
|
0 |
|
| |
|
Parallel Calculation Method of Betweenness Centrality for Dynamic Networks |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(119)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
|
0 |
|
| |
|
Wireless Traffic Prediction Based on Federated Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(178)
[HTML 0 KB]
[PDF 0 KB]
(8)
|
|
|
2311 |
Yuanyuan QIN, Hong ZHANG |
| |
|
Pulmonary nodule detection algorithm based on attention feature pyramid networks |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2311-2318
[Abstract]
(481)
[HTML 1 KB]
[PDF 2687 KB]
(204)
|
|
|
2226 |
Erchao LI, Yanli CHENG |
| |
|
Dynamic multi-objective optimization algorithm based on weight vector clustering |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2226-2236
[Abstract]
(387)
[HTML 1 KB]
[PDF 3030 KB]
(100)
|
|
|
2288 |
Anyang LIU, Huaici ZHAO, Wenlong CAI, Zechao XU, Ruideng XIE |
| |
|
Adaptive image deblurring generative adversarial network algorithm based on active discrimination mechanism |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2288-2294
[Abstract]
(512)
[HTML 1 KB]
[PDF 2675 KB]
(186)
|
|
|
2125 |
Yi ZHANG, Gangsheng CAI, Zhenmei WANG |
| |
|
Long non-coding RNA-disease association prediction model based on semantic and global dual attention mechanism |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2125-2132
[Abstract]
(521)
[HTML 1 KB]
[PDF 781 KB]
(223)
|
|
|
1705 |
Zhongping ZHANG, Xin GUO, Yuting ZHANG, Ruibo ZHANG |
| |
|
Outlier detection algorithm based on hologram stationary distribution factor |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1705-1712
[Abstract]
(389)
[HTML 1 KB]
[PDF 3993 KB]
(149)
|
|
|
2116 |
Yuxin TUO, Tao XUE |
| |
|
Joint triple extraction model combining pointer network and relational embedding |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2116-2124
[Abstract]
(595)
[HTML 1 KB]
[PDF 1576 KB]
(163)
|
|
|
2868 |
Bo WANG, Hao WANG, Xiaoxin DU, Xiaodong ZHENG, Wei ZHOU |
| |
|
Hybrid dragonfly algorithm based on subpopulation and differential evolution |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2868-2876
[Abstract]
(426)
[HTML 1 KB]
[PDF 2338 KB]
(181)
|
|
|
1768 |
Yao LIU, Xin TONG, Yifeng CHEN |
| |
|
Algorithm path self-assembling model for business requirements |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1768-1778
[Abstract]
(433)
[HTML 1 KB]
[PDF 1992 KB]
(85)
|
|
|
2237 |
Meiying CHENG, Qian QIAN, Weiqing XIONG |
| |
|
Symbiotic organisms search algorithm for information transfer multi-task optimization |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2237-2247
[Abstract]
(395)
[HTML 1 KB]
[PDF 3862 KB]
(98)
|
|
|
1687 |
Jing QIN, Xueqian MA, Fujie GAO, Changqing JI, Zumin WANG |
| |
|
Survey of Parkinson’s disease auxiliary diagnosis methods based on gait analysis |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1687-1695
[Abstract]
(703)
[HTML 1 KB]
[PDF 2009 KB]
(352)
|
|
|
2462 |
Dongdong LIN, Manman LI, Shaozhen CHEN |
| |
|
Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2462-2470
[Abstract]
(412)
[HTML 1 KB]
[PDF 2057 KB]
(194)
|
|
|
2943 |
Chuan ZHAO, Luyao LI, Haoxiong YANG, Min ZUO |
| |
|
Optimization model of inventory system under stochastic disturbance based on active disturbance rejection control |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2943-2951
[Abstract]
(439)
[HTML 0 KB]
[PDF 3630 KB]
(99)
|
|
|
2909 |
Hanqing LIU, Xiaodong KANG, Fuqing ZHANG, Xiuyuan ZHAO, Jingyi YANG, Xiaotian WANG, Mengfan LI |
| |
|
Image detection algorithm of cerebral arterial stenosis by improved Libra region-convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2909-2916
[Abstract]
(532)
[HTML 0 KB]
[PDF 5263 KB]
(210)
|
|
|
2693 |
Guanyou XU, Weisen FENG |
| |
|
Python named entity recognition model based on transformer |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2693-2700
[Abstract]
(692)
[HTML 0 KB]
[PDF 1723 KB]
(252)
|
|
|
2686 |
Xudong HOU, Fei TENG, Yi ZHANG |
| |
|
Medical named entity recognition model based on deep auto-encoding |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2686-2692
[Abstract]
(386)
[HTML 0 KB]
[PDF 979 KB]
(150)
|
|
|
706 |
Yu WANG, Yubo YUAN, Yi GUO, Jiajie ZHANG |
| |
|
Sentiment boosting model for emotion recognition in conversation text |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 706-712
[Abstract]
(883)
[HTML 1 KB]
[PDF 1123 KB]
(392)
|
|
|
1606 |
Yang LIU, Zhiyang LU, Jun WANG, Jun SHI |
| |
|
Gibbs artifact removal algorithm for magnetic resonance imaging based on self-attention connection UNet |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1606-1611
[Abstract]
(620)
[HTML 1 KB]
[PDF 1363 KB]
(211)
|
|
|
930 |
Haifeng LI, Fan ZHANG, Minnan PIAO, Huaichao WANG, Nansha LI, Zhongcheng GUI |
| |
|
Automatic detection of targets under airport pavement based on channel and spatial attention |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 930-935
[Abstract]
(522)
[HTML 1 KB]
[PDF 1874 KB]
(175)
|
|
|
949 |
Tian CHEN, Jianyong LU, Jun LIU, Huaguo LIANG, Yingchun LU |
| |
|
Reconfigurable test scheme for 3D stacked integrated circuits based on 3D linear feedback shift register |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 949-955
[Abstract]
(411)
[HTML 1 KB]
[PDF 2075 KB]
(123)
|
|
|
736 |
Tao PENG, Yalong KANG, Feng YU, Zili ZHANG, Junping LIU, Xinrong HU, Ruhan HE, Li LI |
| |
|
Pedestrian trajectory prediction based on multi-head soft attention graph convolutional network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 736-743
[Abstract]
(699)
[HTML 1 KB]
[PDF 5673 KB]
(236)
|
|
|
943 |
You YANG, Ruhui ZHANG, Pengcheng XU, Kang KANG, Hao ZHAI |
| |
|
Improved U-Net for seal segmentation of Republican archives |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 943-948
[Abstract]
(562)
[HTML 1 KB]
[PDF 1722 KB]
(139)
|
|
|
1220 |
Tianzouzi XIAO, Xiaobo ZHOU, Xin LUO, Qipeng TANG |
| |
|
Robust RGB-D SLAM system incorporating instance segmentation and clustering in dynamic environment |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1220-1225
[Abstract]
(472)
[HTML 1 KB]
[PDF 2537 KB]
(184)
|
|
|
1255 |
Qingyu JIA, Liang CHANG, Xianyi YANG, Baohua QIANG, Shihao ZHANG, Wu XIE, Minghao YANG |
| |
|
Real-time reconstruction method of visual information for manipulator operation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1255-1260
[Abstract]
(545)
[HTML 1 KB]
[PDF 2136 KB]
(254)
|
|
|
1297 |
Lu CHEN, Daoxi CHEN, Yiming LU, Weizhong LU |
| |
|
Handwritten mathematical expression recognition model based on attention mechanism and encoder-decoder |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1297-1302
[Abstract]
(695)
[HTML 1 KB]
[PDF 1695 KB]
(277)
|
|
|
1115 |
Caiqian BAO, Jianmin XU, Guofang ZHANG |
| |
|
Extended belief network recommendation model based on user dynamic interaction behavior |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1115-1121
[Abstract]
(461)
[HTML 1 KB]
[PDF 1378 KB]
(106)
|
|
|
1261 |
Xiaoyu FAN, Suzhen LIN, Yanbo WANG, Feng LIU, Dawei LI |
| |
|
Reconstruction algorithm for highly undersampled magnetic resonance images based on residual graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1261-1268
[Abstract]
(662)
[HTML 1 KB]
[PDF 2569 KB]
(173)
|
|
|
0 |
|
| |
|
Stacking algorithm based on dynamic clustering and its application |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(127)
[HTML 1 KB]
[PDF 888 KB]
(351)
|
|
|
1676 |
Zhihui GAO, Meng HAN, Shujuan LIU, Ang LI, Dongliang MU |
| |
|
Survey of high utility itemset mining methods based on intelligent optimization algorithm |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1676-1686
[Abstract]
(764)
[HTML 1 KB]
[PDF 1951 KB]
(270)
|
|
|
1461 |
Senqi YANG, Xuliang DUAN, Zhan XIAO, Songsong LANG, Zhiyong LI |
| |
|
Text classification of agricultural news based on ERNIE+DPCNN+BiGRU |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1461-1466
[Abstract]
(731)
[HTML 1 KB]
[PDF 1813 KB]
(374)
|
|
|
0 |
|
| |
|
Global image caption method based on graph attention network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(246)
[HTML 1 KB]
[PDF 590 KB]
(92)
|
|
|
2440 |
Jian ZHANG, Peiyuan CHENG, Siyu SHAO |
| |
|
Rotary machine fault diagnosis based on improved residual convolutional auto-encoding network and class adaptation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2440-2449
[Abstract]
(476)
[HTML 0 KB]
[PDF 1320 KB]
(105)
|
|
|
2401 |
Nanjiang CHENG, Zhenxia YU, Lin CHEN, Hezhe QIAO |
| |
|
Multi-source and multi-label pedestrian attribute recognition based on domain adaptation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2401-2406
[Abstract]
(504)
[HTML 0 KB]
[PDF 658 KB]
(211)
|
|
|
2394 |
Xianjie ZHANG, Zhiming ZHANG |
| |
|
Handwritten English text recognition based on convolutional neural network and Transformer |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2394-2400
[Abstract]
(780)
[HTML 0 KB]
[PDF 703 KB]
(372)
|
|
|
2386 |
Xiaoyu CHEN, Wei WANG |
| |
|
Semantic extraction of domain-dependent mathematical text |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2386-2393
[Abstract]
(399)
[HTML 0 KB]
[PDF 791 KB]
(92)
|
|
|
356 |
Qingtang LIU, Xinqian MA, Jie ZHOU, Linjing WU, Pengxiao ZHOU |
| |
|
Understanding of math word problems integrating commonsense knowledge base and grammatical features |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 356-364
[Abstract]
(506)
[HTML 1 KB]
[PDF 1525 KB]
(138)
|
|
|
51 |
SHEN Zhijun, MU Lina, GAO Jing, SHI Yuanhang, LIU Zhiqiang |
| |
|
Review of fine-grained image categorization |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 51-60
[Abstract]
(1440)
[HTML 1 KB]
[PDF 2674 KB]
(734)
|
|
|
1534 |
Jihui LIU, Chengwan HE |
| |
|
Online detection of SQL injection attacks based on ECA rules and dynamic taint analysis |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1534-1542
[Abstract]
(583)
[HTML 1 KB]
[PDF 2389 KB]
(299)
|
|
|
1401 |
Bin WANG, Tian XIANG, Yidong LYU, Xiaofan WANG |
| |
|
Adaptive multi-scale feature channel grouping optimization algorithm based on NSGA‑Ⅱ |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1401-1408
[Abstract]
(518)
[HTML 1 KB]
[PDF 3248 KB]
(180)
|
|
|
1511 |
Kejun JIN, Hongtao YU, Yiteng WU, Shaomei LI, Jianpeng ZHANG, Honghao ZHENG |
| |
|
Improved defense method for graph convolutional network based on singular value decomposition |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1511-1517
[Abstract]
(553)
[HTML 1 KB]
[PDF 760 KB]
(190)
|
|
|
1584 |
Liyao FU, Mengxiao YIN, Feng YANG |
| |
|
Transformer based U-shaped medical image segmentation network: a survey |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1584-1595
[Abstract]
(2391)
[HTML 1 KB]
[PDF 1887 KB]
(1219)
|
|
|
2239 |
Yuanliang XUE, Guodong JIN, Lining TAN, Jiankun XU |
| |
|
Pixel classification-based multiscale UAV aerial object rotational tracking algorithm |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2239-2247
[Abstract]
(522)
[HTML 0 KB]
[PDF 4732 KB]
(98)
|
|
|
2118 |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG |
| |
|
Intrusion detection system with dynamic weight loss function based on internet of things platform |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2118-2124
[Abstract]
(568)
[HTML 0 KB]
[PDF 1166 KB]
(164)
|
|
|
2112 |
Chunming TANG, Yuqing CHEN, Zidi ZHANG |
| |
|
Improved consensus algorithm based on binomial swap forest and HotStuff |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2112-2117
[Abstract]
(571)
[HTML 0 KB]
[PDF 2344 KB]
(131)
|
|
|
2104 |
Jie ZHANG, Shanshan XU, Lingyun YUAN |
| |
|
Internet of things access control model based on blockchain and edge computing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2104-2111
[Abstract]
(751)
[HTML 0 KB]
[PDF 3421 KB]
(201)
|
|
|
2094 |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN |
| |
|
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2094-2103
[Abstract]
(643)
[HTML 0 KB]
[PDF 1632 KB]
(187)
|
|
|
1993 |
Juan WANG, Xuliang YUAN, Minghu WU, Liquan GUO, Zishan LIU |
| |
|
Real-time semantic segmentation method based on squeezing and refining network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1993-2000
[Abstract]
(543)
[HTML 0 KB]
[PDF 2950 KB]
(175)
|
|
|
869 |
Qing YE, Xin SHI, Mengwei SUN, Jian ZHU |
| |
|
Greedy synchronization topology algorithm based on formal concept analysis for traffic surveillance based sensor network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 869-875
[Abstract]
(423)
[HTML 1 KB]
[PDF 1587 KB]
(100)
|
|
|
909 |
Qiuyu ZHANG, Yukun WANG |
| |
|
Speech classification model based on improved Inception network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 909-915
[Abstract]
(629)
[HTML 1 KB]
[PDF 1970 KB]
(145)
|
|
|
329 |
Xingbin LIAO, Xiaolin QIN, Siqi ZHANG, Yangge QIAN |
| |
|
Review of interactive machine translation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 329-334
[Abstract]
(1012)
[HTML 1 KB]
[PDF 1870 KB]
(564)
|
|
|
365 |
Jie HU, Xiaoxi CHEN, Yan ZHANG |
| |
|
Answer selection model based on pooling and feature combination enhanced BERT |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 365-373
[Abstract]
(537)
[HTML 1 KB]
[PDF 1248 KB]
(229)
|
|
|
0 |
|
| |
|
CCDM2022+250 Extraction of PM2.5Diffusion Characteristics Based on Candlestick Pattern Matching |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(114)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
|
0 |
|
| |
|
Research on user granularity-level personalized social text generation technology |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(97)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
|
0 |
|
| |
|
Virus propagation model and stability analysis of heterogeneous backup network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(59)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
|
0 |
|
| |
|
A deep graph matching model via self-attention network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(73)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
|
0 |
|
| |
|
Federated Learning with Personalized Differential Privacy |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(219)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Stock Movement Prediction with Dynamic and Hierarchical Macro Information of Market(CCDM2022+ 94) |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(96)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
0 |
|
| |
|
Discriminative multidimensional scaling for feature learning(CCDM2022+219) |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(78)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
|
0 |
|
| |
|
CCDM 2022+65: An improved capsule network based on multipath feature |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(85)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
|
1922 |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI |
| |
|
Smart contract-based access control architecture and verification for internet of things |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1922-1931
[Abstract]
(668)
[HTML 0 KB]
[PDF 3580 KB]
(257)
|
|
|
1898 |
Meng YU, Wentao HE, Xuchuan ZHOU, Mengtian CUI, Keqi WU, Wenjie ZHOU |
| |
|
Review of recommendation system |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1898-1913
[Abstract]
(2480)
[HTML 0 KB]
[PDF 3152 KB]
(1833)
|
|
|
1876 |
Guangkai LIAO, Zheng ZHANG, Zhiguo SONG |
| |
|
Convolutional network-based vehicle re-identification combining wavelet features and attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1876-1883
[Abstract]
(533)
[HTML 0 KB]
[PDF 2250 KB]
(142)
|
|
|
1869 |
Lei YANG, Hongdong ZHAO, Kuaikuai YU |
| |
|
End-to-end speech emotion recognition based on multi-head attention |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1869-1875
[Abstract]
(695)
[HTML 0 KB]
[PDF 2133 KB]
(203)
|
|
|
1862 |
Yumin HAN, Xiaoyan HAO |
| |
|
Material entity recognition based on subword embedding and relative attention |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1862-1868
[Abstract]
(422)
[HTML 0 KB]
[PDF 1612 KB]
(129)
|
|
|
1844 |
Weikang ZHANG, Sheng LIU, Qian HUANG, Yuxin GUO |
| |
|
Equilibrium optimizer considering distance factor and elite evolutionary strategy |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1844-1851
[Abstract]
(458)
[HTML 0 KB]
[PDF 1083 KB]
(109)
|
|
|
1504 |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG |
| |
|
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1504-1510
[Abstract]
(477)
[HTML 1 KB]
[PDF 503 KB]
(131)
|
|
|
111 |
MA Yongqiang, CHEN Xiaomeng, YU Ziqiang |
| |
|
Range query algorithm for large scale moving objects in distributed environment |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 111-121
[Abstract]
(474)
[HTML 1 KB]
[PDF 3320 KB]
(94)
|
|
|
250 |
WANG Youxin, CHEN Bin |
| |
|
Print defect detection method based on deep comparison network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 250-258
[Abstract]
(753)
[HTML 1 KB]
[PDF 2660 KB]
(522)
|
|
|
903 |
Kai LUO, Liang CHEN, Wei LIANG, Yongqiang CHEN |
| |
|
Sparse representation-based reconstruction algorithm for filtered back-projection ultrasound tomography |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 903-908
[Abstract]
(444)
[HTML 1 KB]
[PDF 1939 KB]
(138)
|
|
|
507 |
Qing JIA, Laihua WANG, Weisheng WANG |
| |
|
Anomaly detection in video via independently recurrent neural network and variational autoencoder network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 507-513
[Abstract]
(584)
[HTML 1 KB]
[PDF 2994 KB]
(160)
|
|
|
374 |
Yang WANG, Hongliang FU, Huawei TAO, Jing YANG, Yue XIE, Li ZHAO |
| |
|
Cross-corpus speech emotion recognition based on decision boundary optimized domain adaptation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 374-379
[Abstract]
(584)
[HTML 1 KB]
[PDF 3084 KB]
(257)
|
|
|
1616 |
Youzhi LI, Zhihua HU, Chun CHEN, Peibei YANG, Yajing DONG |
| |
|
Prediction model of transaction pricing in internet freight transport platform based on combination of dual long short-term memory networks |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1616-1623
[Abstract]
(542)
[HTML 1 KB]
[PDF 2220 KB]
(145)
|
|
|
1563 |
Ye ZHANG, Rong LIU, Ming LIU, Ming CHEN |
| |
|
Image super-resolution reconstruction network based on multi-channel attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1563-1569
[Abstract]
(449)
[HTML 1 KB]
[PDF 3016 KB]
(172)
|
|
|
1531 |
Xinyu GE, Shiping CHEN, Zhong LIU |
| |
|
Real root isolation algorithm for exponential function polynomials |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1531-1537
[Abstract]
(393)
[HTML 1 KB]
[PDF 503 KB]
(84)
|
|
|
1431 |
Zhen QU, Kunting LI, Zhixi FENG |
| |
|
Remote sensing image scene classification based on effective channel attention |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1431-1439
[Abstract]
(659)
[HTML 1 KB]
[PDF 2678 KB]
(191)
|
|
|
1391 |
Daili CHEN, Guoliang XU |
| |
|
Cross-domain person re-identification method based on attention mechanism with learning intra-domain variance |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1391-1397
[Abstract]
(542)
[HTML 1 KB]
[PDF 2210 KB]
(316)
|
|
|
1367 |
Han MENG, Liang MA, Yong LIU |
| |
|
Human learning optimization algorithm based on learning psychology |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1367-1374
[Abstract]
(514)
[HTML 1 KB]
[PDF 1244 KB]
(321)
|
|
|
1355 |
Lin SUN, Jing ZHAO, Jiucheng XU, Xinya WANG |
| |
|
Feature selection algorithm based on neighborhood rough set and monarch butterfly optimization |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1355-1366
[Abstract]
(490)
[HTML 1 KB]
[PDF 1375 KB]
(134)
|
|
|
1347 |
Xueqin CHEN, Tao TAO, Zhongwang ZHANG, Yilei WANG |
| |
|
Long short-term session-based recommendation algorithm combining paired coding scheme and two-dimensional conventional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1347-1354
[Abstract]
(555)
[HTML 1 KB]
[PDF 1011 KB]
(124)
|
|
|
1339 |
Li’e WANG, Xiaocong LI, Hongyi LIU |
| |
|
News recommendation method with knowledge graph and differential privacy |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1339-1346
[Abstract]
(618)
[HTML 1 KB]
[PDF 1421 KB]
(203)
|
|
|
1330 |
Liqing QIU, Fushuai QU |
| |
|
Emotional map of emergency based on sentiment analysis and influence evaluation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1330-1338
[Abstract]
(538)
[HTML 1 KB]
[PDF 3347 KB]
(404)
|
|
|
1317 |
Xianfeng YANG, Jiahe ZHAO, Ziqiang LI |
| |
|
Text classification model combining word annotations |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1317-1323
[Abstract]
(595)
[HTML 1 KB]
[PDF 1662 KB]
(333)
|
|
|
312 |
LIAO Fakang, ZHOU Yali, ZHANG Qizhi |
| |
|
Walking control and stability analysis of flexible biped robot with variable length legs |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 312-320
[Abstract]
(519)
[HTML 1 KB]
[PDF 4678 KB]
(163)
|
|
|
306 |
ZHENG Wanbo, CHEN Huimin, WU Yanqing, XIA Yunni |
| |
|
Simulation of information sharing strategy based on emergency rescue |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 306-311
[Abstract]
(570)
[HTML 1 KB]
[PDF 1217 KB]
(108)
|
|
|
728 |
Yingmao YAO, Xiaoyan JIANG |
| |
|
Video-based person re-identification method based on graph convolution network and self-attention graph pooling |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 728-735
[Abstract]
(612)
[HTML 1 KB]
[PDF 2665 KB]
(252)
|
|
|
608 |
Wenju LI, Gan ZHANG, Liu CUI, Wanghui CHU |
| |
|
Lightweight traffic sign recognition model based on coordinate attention |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 608-614
[Abstract]
(694)
[HTML 1 KB]
[PDF 2351 KB]
(304)
|
|
|
45 |
LIU Hui, MA Xiang, ZHANG Linyu, HE Rujin |
| |
|
Aspect-based sentiment analysis model integrating match-LSTM network and grammatical distance |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 45-50
[Abstract]
(520)
[HTML 1 KB]
[PDF 1828 KB]
(305)
|
|
|
154 |
NONG Qiang, ZHANG Bangbang, OUYANG Yuhao |
| |
|
Lattice-based hierarchical certificateless proxy signature scheme |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 154-159
[Abstract]
(490)
[HTML 1 KB]
[PDF 749 KB]
(186)
|
|
|
3527 |
Jiaju ZHANG, Huiping LIN |
| |
|
Product and service quality analysis based on customer service dialogues |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3527-3533
[Abstract]
(536)
[HTML 1 KB]
[PDF 2371 KB]
(103)
|
|
|
467 |
Jie LIANG, Xiaoyan HAO, Yongle CHEN |
| |
|
Poisoning attack toward visual classification model |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 467-473
[Abstract]
(962)
[HTML 1 KB]
[PDF 3264 KB]
(302)
|
|
|
529 |
Ping WANG, Nan CHEN, Lei LU |
| |
|
Fall detection algorithm based on scene prior and attention guidance |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 529-535
[Abstract]
(559)
[HTML 1 KB]
[PDF 1544 KB]
(170)
|
|
|
413 |
Chunyong YIN, Ying LI |
| |
|
Fast sanitization algorithm based on BCU-Tree and dictionary for high-utility mining |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 413-422
[Abstract]
(516)
[HTML 1 KB]
[PDF 2958 KB]
(160)
|
|
|
209 |
SUN Yuan, SHEN Wenjian, NI Pengbo, MAO Min, XIE Yaqi, XU Chaonong |
| |
|
Sink location algorithm of power domain nonorthogonal multiple access for real-time industrial internet of things |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 209-214
[Abstract]
(497)
[HTML 1 KB]
[PDF 2234 KB]
(126)
|
|
|
1125 |
Teng TENG, Haiwei PAN, Kejia ZHANG, Xuelian MU, Ximing ZHANG, Weipeng CHEN |
| |
|
Attention mechanism based Stack-CNN model to support Chinese medical questions and answers |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1125-1130
[Abstract]
(645)
[HTML 1 KB]
[PDF 726 KB]
(303)
|
|
|
1050 |
Shoulong JIAO, Youxiang DUAN, Qifeng SUN, Zihao ZHUANG, Chenhao SUN |
| |
|
Knowledge representation learning method incorporating entity description information and neighbor node features |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1050-1056
[Abstract]
(581)
[HTML 0 KB]
[PDF 671 KB]
(244)
|
|
|
1011 |
Yingjie WANG, Jiuqi ZHU, Zumin WANG, Fengbo BAI, Jian GONG |
| |
|
Review of applications of natural language processing in text sentiment analysis |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1011-1020
[Abstract]
(3092)
[HTML 0 KB]
[PDF 783 KB]
(1701)
|
|
|
3679 |
Zhijin LI, Hua LAI, Yonghua WEN, Shengxiang GAO |
| |
|
Neural machine translation integrating bidirectional-dependency self-attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3679-3685
[Abstract]
(467)
[HTML 1 KB]
[PDF 961 KB]
(186)
|
|
|
521 |
Ranyan NI, Yi ZHANG |
| |
|
Action recognition method based on video spatio-temporal features |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 521-528
[Abstract]
(616)
[HTML 1 KB]
[PDF 2494 KB]
(152)
|
|
|
972 |
Jinyue LIU, Huiyu LI, Xiaohui JIA, Jiarui LI |
| |
|
Dynamic gait recognition method based on human model constraints |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 972-977
[Abstract]
(560)
[HTML 1 KB]
[PDF 3439 KB]
(191)
|
|
|
615 |
Chao GE, Yaxin ZHANG, Yue LIU, Hong WANG |
| |
|
Non-fragile dissipative control scheme for event-triggered networked systems |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 615-621
[Abstract]
(474)
[HTML 1 KB]
[PDF 2029 KB]
(89)
|
|
|
848 |
Weikang CHEN, Qiqing ZHAI, Youguo WANG |
| |
|
Multivariate communication system based on discrete bidirectional associative memory neural network |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 848-852
[Abstract]
(433)
[HTML 1 KB]
[PDF 2244 KB]
(89)
|
|
|
552 |
Guihui CHEN, Jinyu LIN, Yuehua LI, Zhongbing LI, Yuli WEI, Kai LU |
| |
|
Multi-stage low-illuminance image enhancement network based on attention mechanism |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 552-559
[Abstract]
(558)
[HTML 1 KB]
[PDF 4056 KB]
(224)
|
|
|
2593 |
Jiehang DENG, Wenquan GUO, Hanjie CHEN, Guosheng GU, Jingjian LIU, Yukun DU, Chao LIU, Xiaodong KANG, Jian ZHAO |
| |
|
Few-shot diatom detection combining multi-scale multi-head self-attention and online hard example mining |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2593-2600
[Abstract]
(589)
[HTML 1 KB]
[PDF 1490 KB]
(166)
|
|
|
3831 |
Jingwei LEI, Peng YI, Xiang CHEN, Liang WANG, Ming MAO |
| |
|
PDF document detection model based on system calls and data provenance |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3831-3840
[Abstract]
(538)
[HTML 1 KB]
[PDF 3249 KB]
(160)
|
|
|
3033 |
Yuhao ZHANG, Mengwen YUAN, Yujing LU, Rui YAN, Huajin TANG |
| |
|
Neural network conversion method for dynamic event stream |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3033-3039
[Abstract]
(658)
[HTML 1 KB]
[PDF 2014 KB]
(274)
|
|
|
3011 |
Lanlan ZENG, Yisong WANG, Panfeng CHEN |
| |
|
Named entity recognition based on BERT and joint learning for judgment documents |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3011-3017
[Abstract]
(718)
[HTML 1 KB]
[PDF 1601 KB]
(283)
|
|
|
3111 |
Hongqiao MA, Wenzhong YANG, Peng KANG, Jiankang YANG, Yuanshan LIU, Yue ZHOU |
| |
|
Survey of named data networking |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3111-3123
[Abstract]
(878)
[HTML 1 KB]
[PDF 2976 KB]
(420)
|
|
|
3275 |
Jingyi QU, Liu YANG, Xuyang CHEN, Qian WANG |
| |
|
Flight delay prediction model based on Conv-LSTM with spatiotemporal sequence |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3275-3282
[Abstract]
(648)
[HTML 1 KB]
[PDF 3421 KB]
(193)
|
|
|
0 |
|
| |
|
Cross-Modal Tensor Fusion Network based on Semantic Relation Graph for Image-Text Retrieval |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(246)
[HTML 1 KB]
[PDF 888 KB]
(94)
|
|
|
3091 |
Dong ZHU, Xinchun YIN, Jianting NING |
| |
|
Certificateless signature scheme with strong privacy protection for internet of vehicles |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3091-3101
[Abstract]
(589)
[HTML 1 KB]
[PDF 1079 KB]
(261)
|
|
|
0 |
|
| |
|
Empathy Prediction from Texts based on Transfer Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(79)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
|
1814 |
Min WEN, Rongcun WANG, Shujuan JIANG |
| |
|
Source code vulnerability detection based on relational graph convolution network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1814-1821
[Abstract]
(740)
[HTML 1 KB]
[PDF 1719 KB]
(351)
|
|
|
1796 |
Hao LI, Yanping CHEN, Ruixue TANG, Ruizhang HUANG, Yongbin QIN, Guorong WANG, Xi TAN |
| |
|
Relation extraction method based on entity boundary combination |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1796-1801
[Abstract]
(487)
[HTML 1 KB]
[PDF 1005 KB]
(121)
|
|
|
1776 |
Yu XIA, Junwu ZHU, Yi JIANG, Xin GAO, Maosheng SUN |
| |
|
Cross-regional order allocation strategy for ride-hailing under tight transport capacity |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1776-1781
[Abstract]
(638)
[HTML 1 KB]
[PDF 1163 KB]
(110)
|
|
|
1116 |
Haifeng ZHANG, Cheng ZENG, Lie PAN, Rusong HAO, Chaodong WEN, Peng HE |
| |
|
News topic text classification method based on BERT and feature projection network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1116-1124
[Abstract]
(876)
[HTML 1 KB]
[PDF 1536 KB]
(422)
|
|
|
1253 |
Guifang QIAO, Shouming HOU, Yanyan LIU |
| |
|
Facial expression recognition algorithm based on combination of improved convolutional neural network and support vector machine |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1253-1259
[Abstract]
(820)
[HTML 1 KB]
[PDF 1504 KB]
(318)
|
|
|
1044 |
Changqing JI, Zhiyong GAO, Jing QIN, Zumin WANG |
| |
|
Review of image classification algorithms based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1044-1049
[Abstract]
(2973)
[HTML 1 KB]
[PDF 605 KB]
(1678)
|
|
|
1029 |
Jing QIN, Fali SUN, Fang HUI, Zumin WANG, Bing GAO, Changqing JI |
| |
|
Review of key technology and application of wearable electroencephalogram device |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1029-1035
[Abstract]
(1002)
[HTML 1 KB]
[PDF 725 KB]
(716)
|
|
|
962 |
Xianbojun FAN, Lijia CHEN, Shen LI, Chenlu WANG, Min WANG, Zan WANG, Mingguo LIU |
| |
|
Robust joint modeling and optimization method for visual manipulators |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (3): 962-971
[Abstract]
(538)
[HTML 1 KB]
[PDF 6333 KB]
(220)
|
|
|
980 |
Xin LING, Minzheng LI |
| |
|
Hybrid beamforming method with high spectral efficiency for unmanned aerial vehicle patrol system |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 980-984
[Abstract]
(393)
[HTML 0 KB]
[PDF 596 KB]
(100)
|
|
|
968 |
Gong GAO, Hongyu YANG, Hong LIU |
| |
|
Quality judgment of 3D face point cloud based on feature fusion |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 968-973
[Abstract]
(467)
[HTML 0 KB]
[PDF 861 KB]
(110)
|
|
|
960 |
Cong HU, Gang HUA |
| |
|
Weakly supervised action localization method based on attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 960-967
[Abstract]
(494)
[HTML 0 KB]
[PDF 573 KB]
(106)
|
|
|
953 |
Dejian WEI, Wenming WANG, Quanyu WANG, Haopan REN, Yanyan GAO, Zhi WANG |
| |
|
Improved 3D hand pose estimation network based on anchor |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 953-959
[Abstract]
(501)
[HTML 0 KB]
[PDF 659 KB]
(130)
|
|
|
930 |
Leping LIN, Hongmin ZHOU, Ning OUYANG |
| |
|
Compressed sensing image reconstruction method fusing spatial location and structure information |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 930-937
[Abstract]
(425)
[HTML 0 KB]
[PDF 2281 KB]
(135)
|
|
|
911 |
Jingwen WU, Xinchun YIN, Jianting NING |
| |
|
Revocable aggregate signature authentication scheme for vehicular ad hoc networks |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 911-920
[Abstract]
(519)
[HTML 0 KB]
[PDF 684 KB]
(142)
|
|
|
904 |
An YANG, Qun JIANG, Gang SUN, Jie YIN, Ying LIU |
| |
|
Power data analysis based on financial technical indicators |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 904-910
[Abstract]
(537)
[HTML 0 KB]
[PDF 785 KB]
(131)
|
|
|
874 |
Fangxin NIE, Yujia WANG, Xin JIA |
| |
|
Teaching and learning information interactive particle swarm optimization algorithm |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 874-882
[Abstract]
(566)
[HTML 0 KB]
[PDF 1395 KB]
(128)
|
|
|
867 |
Zengzhen DU, Dongxin TANG, Dan XIE |
| |
|
Method of generating rhetorical questions based on deep neural network in intelligent consultation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 867-873
[Abstract]
(489)
[HTML 0 KB]
[PDF 758 KB]
(211)
|
|
|
860 |
Qiujie SUN, Jinggui LIANG, Si LI |
| |
|
Chinese grammatical error correction model based on bidirectional and auto-regressive transformers noiser |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 860-866
[Abstract]
(735)
[HTML 0 KB]
[PDF 625 KB]
(326)
|
|
|
833 |
Wenqiu ZHU, Guang ZOU, Zhigao ZENG |
| |
|
Object tracking algorithm with hierarchical features and hybrid attention |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 833-843
[Abstract]
(575)
[HTML 0 KB]
[PDF 9505 KB]
(240)
|
|
|
804 |
Bin LIU, Gangqing LI, Chengquan AN, Shuigen WANG, Jiansheng WANG |
| |
|
Infrared monocular ranging algorithm based on multiscale feature fusion |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 804-809
[Abstract]
(601)
[HTML 0 KB]
[PDF 1946 KB]
(223)
|
|
|
713 |
Shuting XUAN, Jinglei LIU |
| |
|
Clustering based on discrete hashing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 713-723
[Abstract]
(485)
[HTML 0 KB]
[PDF 1072 KB]
(178)
|
|
|
708 |
Renjie XU, Baodi LIU, Kai ZHANG, Weifeng LIU |
| |
|
Model agnostic meta learning algorithm based on Bayesian weight function |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 708-712
[Abstract]
(605)
[HTML 0 KB]
[PDF 466 KB]
(192)
|
|
|
3371 |
Bin ZHANG, Li WANG, Yanjie YANG |
| |
|
Process tracking multi‑task rumor verification model combined with stance |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3371-3378
[Abstract]
(387)
[HTML 1 KB]
[PDF 1420 KB]
(137)
|
|
|
3003 |
Binhong XIE, Shuning LI, Yingjun ZHANG |
| |
|
Fine-grained entity typing method based on hierarchy awareness |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3003-3010
[Abstract]
(608)
[HTML 1 KB]
[PDF 1252 KB]
(301)
|
|
|
343 |
Xiaomeng SHAO, Meng ZHANG |
| |
|
Temporal convolutional knowledge tracing model with attention mechanism |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 343-348
[Abstract]
(1369)
[HTML 1 KB]
[PDF 2110 KB]
(570)
|
|
|
2511 |
Yu SHEN, Hecheng LI, Lijuan CHEN |
| |
|
Evolutionary algorithm based on approximation technique for solving bilevel programming problems |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2511-2518
[Abstract]
(484)
[HTML 1 KB]
[PDF 701 KB]
(125)
|
|
|
2617 |
Kuineng CHEN, Xiaofang YUAN |
| |
|
Multi-objective hybrid evolutionary algorithm for solving open-shop scheduling problem with controllable processing time |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2617-2627
[Abstract]
(606)
[HTML 1 KB]
[PDF 1515 KB]
(159)
|
|
|
1979 |
Yuanlong WANG, Xiaomin LIU, Hu ZHANG |
| |
|
Machine reading comprehension model based on event representation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1979-1984
[Abstract]
(606)
[HTML 1 KB]
[PDF 916 KB]
(363)
|
|
|
2281 |
Houming FAN, Shuang MU, Lijun YUE |
| |
|
Collaborative optimization of automated guided vehicle scheduling and path planning considering conflict and congestion |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2281-2291
[Abstract]
(815)
[HTML 1 KB]
[PDF 4118 KB]
(230)
|
|
|
2177 |
Rongli GAI, Shouchuan GAO, Mingxia LI |
| |
|
Non-uniform rational B spline curve fitting of particle swarm optimization algorithm solving optimal control points |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2177-2183
[Abstract]
(638)
[HTML 1 KB]
[PDF 3931 KB]
(176)
|
|
|
2022 |
Liang ZHU, Hua XU, Jinhai CHENG, Shen ZHU |
| |
|
Analysis and improvement of AdaBoost’s sample weight and combination coefficient |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2022-2029
[Abstract]
(623)
[HTML 1 KB]
[PDF 1311 KB]
(98)
|
|
|
1554 |
Li LI, Kexin SHI, Zhenkang REN |
| |
|
Cross-project defect prediction method based on feature selection and TrAdaBoost |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1554-1562
[Abstract]
(654)
[HTML 1 KB]
[PDF 2257 KB]
(138)
|
|
|
2248 |
Wenjun FAN, Shuguang ZHAO, Lizheng GUO |
| |
|
Ship detection algorithm based on improved RetinaNet |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2248-2255
[Abstract]
(829)
[HTML 1 KB]
[PDF 4946 KB]
(296)
|
|
|
2146 |
Hongqiu LUO, Shengbo HU |
| |
|
Data naming mechanism of low earth orbit satellite mega-constellation for internet of things |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2146-2154
[Abstract]
(713)
[HTML 1 KB]
[PDF 3015 KB]
(103)
|
|
|
1516 |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU |
| |
|
Cloud computing task scheduling based on orthogonal adaptive whale optimization |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1516-1523
[Abstract]
(655)
[HTML 1 KB]
[PDF 1821 KB]
(114)
|
|
|
3692 |
Yuqi DU, Jin ZHENG, Yang WANG, Cheng HUANG, Ping LI |
| |
|
Text segmentation model based on graph convolutional network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3692-3699
[Abstract]
(608)
[HTML 1 KB]
[PDF 2746 KB]
(251)
|
|
|
3506 |
Jialiang HAN, Yudong HAN, Xuanzhe LIU, Yaoshuai ZHAO, Di FENG |
| |
|
Personalized recommendation service system based on cloud-client-convergence |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3506-3512
[Abstract]
(640)
[HTML 1 KB]
[PDF 1160 KB]
(132)
|
|
|
630 |
Jianqiang LIU, Yepin QU, Yuhai LYU |
| |
|
Design of very short antipollution error correcting code based on global distance optimization |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (2): 630-635
[Abstract]
(474)
[HTML 1 KB]
[PDF 1784 KB]
(89)
|
|
|
3520 |
Jiaqi ZHANG, Yanchun SUN, Gang HUANG |
| |
|
Recommendation service for API use cases based on open source community analysis |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3520-3526
[Abstract]
(495)
[HTML 1 KB]
[PDF 1339 KB]
(177)
|
|
|
0 |
|
| |
|
Three-dimensional human reconstruction model based on HRNet and GCN |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(180)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
3564 |
Xingquan CAI, Dingwei FENG, Tong WANG, Chen SUN, Haiyan SUN |
| |
|
Violence detection in video based on temporal attention mechanism and EfficientNet |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3564-3572
[Abstract]
(610)
[HTML 1 KB]
[PDF 2885 KB]
(156)
|
|
|
2578 |
Chengxia XU, Qing YAN, Teng LI, Kaichao MIAO |
| |
|
De-raining algorithm based on joint attention mechanism for single image |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2578-2585
[Abstract]
(525)
[HTML 1 KB]
[PDF 1959 KB]
(172)
|
|
|
1662 |
Jingling YUAN, Huihua MAO, Nana WANG, Yao XIANG |
| |
|
Dynamic service deployment strategy in resource constrained mobile edge computing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1662-1667
[Abstract]
(687)
[HTML 1 KB]
[PDF 1940 KB]
(215)
|
|
|
1748 |
Jiachen GUO, Yushen YANG, Yan WANG, Shilong MAO, Lijun SUN |
| |
|
Refined short-term traffic flow prediction model and migration deployment scheme |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1748-1755
[Abstract]
(572)
[HTML 1 KB]
[PDF 3372 KB]
(80)
|
|
|
1756 |
Qingqing NIE, Dingsheng WAN, Yuelong ZHU, Zhijia LI, Cheng YAO |
| |
|
Hydrological model based on temporal convolutional network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1756-1761
[Abstract]
(517)
[HTML 1 KB]
[PDF 2132 KB]
(380)
|
|
|
1702 |
Shan SU, Yang ZHANG, Dongwen ZHANG |
| |
|
Coupling related code smell detection method based on deep learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1702-1707
[Abstract]
(510)
[HTML 1 KB]
[PDF 1071 KB]
(175)
|
|
|
1762 |
Yingqi ZHANG, Dawei PENG, Sen LI, Ying SUN, Qiang NIU |
| |
|
Lip language recognition algorithm based on single-tag radio frequency identification |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1762-1769
[Abstract]
(561)
[HTML 1 KB]
[PDF 4019 KB]
(147)
|
|
|
592 |
Wei LI, Yaochi FAN, Qiaoyong JIANG, Lei WANG, Qingzheng XU |
| |
|
Variable convolutional autoencoder method based on teaching-learning-based optimization for medical image classification |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 592-598
[Abstract]
(545)
[HTML 0 KB]
[PDF 634 KB]
(154)
|
|
|
457 |
Su GAO, Junzhong BAO, Xin WANG, Lidong WANG |
| |
|
Interpretable ordered clustering method and its application analysis |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 457-462
[Abstract]
(500)
[HTML 0 KB]
[PDF 3370 KB]
(132)
|
|
|
426 |
Yuxi LIU, Yuqi LIU, Zonglin ZHANG, Zhihua WEI, Ran MIAO |
| |
|
News recommendation model with deep feature fusion injecting attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 426-432
[Abstract]
(796)
[HTML 1 KB]
[PDF 755 KB]
(319)
|
|
|
357 |
Kun FU, Jinhui GAO, Xiaomeng ZHAO, Jianing LI |
| |
|
Topology optimization based graph convolutional network combining with global structural information |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 357-364
[Abstract]
(710)
[HTML 0 KB]
[PDF 1079 KB]
(360)
|
|
|
343 |
Yan LI, Jie GUO, Bin FAN |
| |
|
Feature construction and preliminary analysis of uncertainty for meta-learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 343-348
[Abstract]
(695)
[HTML 0 KB]
[PDF 483 KB]
(229)
|
|
|
0 |
|
| |
|
Anomaly detection method of distribution automation system based on double chain structure |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(114)
[HTML 1 KB]
[PDF 1570 KB]
(36)
|
|
|
2361 |
Fei LUO, Mengwei BAI |
| |
|
Decision optimization of traffic scenario problem based on reinforcement learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2361-2368
[Abstract]
(763)
[HTML 1 KB]
[PDF 735 KB]
(224)
|
|
|
2378 |
Xinyu ZHANG, Sheng DING, Zhipei YANG |
| |
|
Traffic sign detection algorithm based on improved attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2378-2385
[Abstract]
(683)
[HTML 1 KB]
[PDF 1664 KB]
(325)
|
|
|
3354 |
Zhuoran LI, Zhonglin YE, Haixing ZHAO, Jingjing LIN |
| |
|
Graph convolutional network method based on hybrid feature modeling |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3354-3363
[Abstract]
(749)
[HTML 1 KB]
[PDF 3410 KB]
(198)
|
|
|
3700 |
Jiana MENG, Pin LYU, Yuhai YU, Shichang SUN, Hongfei LIN |
| |
|
Aspect-level cross-domain sentiment analysis based on capsule network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3700-3707
[Abstract]
(600)
[HTML 1 KB]
[PDF 1921 KB]
(185)
|
|
|
3493 |
Peng LI, Zhuofeng ZHAO, Han LI |
| |
|
Event‑driven dynamic collection method for microservice invocation link data |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3493-3499
[Abstract]
(471)
[HTML 1 KB]
[PDF 2643 KB]
(150)
|
|
|
2423 |
Liying ZHANG, Chunjiang PANG, Xinying WANG, Guoliang LI |
| |
|
Multi-scale object detection algorithm based on improved YOLOv3 |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2423-2431
[Abstract]
(708)
[HTML 1 KB]
[PDF 1714 KB]
(250)
|
|
|
2571 |
Huazhong JIN, Xiuyang ZHANG, Zhiwei YE, Wenqi ZHANG, Xiaoyu XIA |
| |
|
Image denoising model based on approximate U-shaped network structure |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2571-2577
[Abstract]
(716)
[HTML 1 KB]
[PDF 952 KB]
(180)
|
|
|
2052 |
Bo LIU, Linbo QING, Zhengyong WANG, Mei LIU, Xue JIANG |
| |
|
Group activity recognition based on partitioned attention mechanism and interactive position relationship |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2052-2057
[Abstract]
(426)
[HTML 1 KB]
[PDF 2504 KB]
(136)
|
|
|
2471 |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG |
| |
|
Data management method for building internet of things based on Hashgraph |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2471-2480
[Abstract]
(612)
[HTML 1 KB]
[PDF 1264 KB]
(144)
|
|
|
2353 |
Zhenhu LYU, Xinzheng XU, Fangyan ZHANG |
| |
|
Lightweight attention mechanism module based on squeeze and excitation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2353-2360
[Abstract]
(817)
[HTML 1 KB]
[PDF 1124 KB]
(447)
|
|
|
3379 |
Xiayang SHI, Fengyuan ZHANG, Jiaqi YUAN, Min HUANG |
| |
|
Detection of unsupervised offensive speech based on multilingual BERT |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3379-3385
[Abstract]
(633)
[HTML 1 KB]
[PDF 1536 KB]
(402)
|
|
|
3465 |
Chao LIN, Debiao HE, Xinyi HUANG |
| |
|
Blockchain‑based electronic medical record secure sharing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3465-3472
[Abstract]
(740)
[HTML 1 KB]
[PDF 1451 KB]
(236)
|
|
|
280 |
Lu ZHANG, Jiapeng LIU, Dongmei TIAN |
| |
|
Application of Stacking-Bagging-Vote multi-source information fusion model for financial early warning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 280-286
[Abstract]
(627)
[HTML 0 KB]
[PDF 948 KB]
(158)
|
|
|
265 |
Huiqing XU, Bin CHEN, Jingfei WANG, Zhiyi CHEN, Jian QIN |
| |
|
Elongated pavement distress detection method based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 265-272
[Abstract]
(540)
[HTML 0 KB]
[PDF 2146 KB]
(207)
|
|
|
245 |
Hengxin LI, Kan CHANG, Yufei TAN, Mingyang LING, Tuanfa QIN |
| |
|
Color image demosaicking network based on inter-channel correlation and enhanced information distillation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 245-251
[Abstract]
(463)
[HTML 0 KB]
[PDF 1841 KB]
(106)
|
|
|
191 |
Yu ZHANG, Chenglin LIU |
| |
|
Average consensus tracking of multi-agent system with time-varying reference inputs |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 191-197
[Abstract]
(486)
[HTML 0 KB]
[PDF 812 KB]
(84)
|
|
|
3170 |
Jingyun CHENG, Buhong WANG, Peng LUO |
| |
|
Static code defect detection method based on deep semantic fusion |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3170-3176
[Abstract]
(614)
[HTML 1 KB]
[PDF 2119 KB]
(199)
|
|
|
2865 |
Wentao ZHANG, Yuanyu WANG, Saize LI |
| |
|
Depth estimation model of single haze image based on conditional generative adversarial network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2865-2875
[Abstract]
(399)
[HTML 1 KB]
[PDF 7354 KB]
(616)
|
|
|
3074 |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG |
| |
|
Blockchain-based data frame security verification mechanism in software defined network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3074-3083
[Abstract]
(596)
[HTML 1 KB]
[PDF 2979 KB]
(114)
|
|
|
3259 |
Yinping GAO, Daofang CHANG, Chun‑Hsien CHEN |
| |
|
Optimization of automated stacking crane operation based on NSGA Ⅱ with dynamic rules in mixed stacking mode |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3259-3267
[Abstract]
(439)
[HTML 1 KB]
[PDF 2428 KB]
(100)
|
|
|
3300 |
Yu DU, Meng YAN, Xin WU |
| |
|
Non-intrusive load identification algorithm based on convolutional neural network with upsampling pyramid structure |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3300-3306
[Abstract]
(424)
[HTML 1 KB]
[PDF 3366 KB]
(105)
|
|
|
2996 |
Jianqing LYU, Xianbing WANG, Gang CHEN, Hua ZHANG, Minggang WANG |
| |
|
Chinese Text-to-SQL model for industrial production |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 2996-3002
[Abstract]
(826)
[HTML 1 KB]
[PDF 1886 KB]
(318)
|
|
|
2858 |
Zanxia QIANG, Xianfu BAO |
| |
|
Residual attention deraining network based on convolutional long short-term memory |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2858-2864
[Abstract]
(501)
[HTML 1 KB]
[PDF 3598 KB]
(180)
|
|
|
3084 |
Rongkang XI, Manchun CAI, Tianliang LU, Yanlin LI |
| |
|
Tor website traffic analysis model based on self-attention mechanism and spatiotemporal features |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3084-3090
[Abstract]
(699)
[HTML 1 KB]
[PDF 2633 KB]
(202)
|
|
|
2936 |
Kaiwang ZHANG, Fei HUI, Guoxiang ZHANG, Qi SHI, Zhizhong LIU |
| |
|
Car-following model of intelligent connected vehicles based on time-delayed velocity difference and velocity limit |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2936-2942
[Abstract]
(435)
[HTML 1 KB]
[PDF 2663 KB]
(115)
|
|
|
3200 |
Dawei LI, Zhiyong ZENG |
| |
|
Cross-modal person re-identification model based on dynamic dual-attention mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3200-3208
[Abstract]
(554)
[HTML 1 KB]
[PDF 1713 KB]
(172)
|
|
|
3124 |
Anyi WANG, Heng ZHANG |
| |
|
Multi-input multi-output intelligent receiver model based on multi-label classification algorithm |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3124-3129
[Abstract]
(422)
[HTML 1 KB]
[PDF 2392 KB]
(127)
|
|
|
3069 |
Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO |
| |
|
Design and analysis of dynamic S-box based on anti-degradation chaotic system |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3069-3073
[Abstract]
(641)
[HTML 1 KB]
[PDF 3094 KB]
(192)
|
|
|
2674 |
Hongjun HENG, Tianbao XU |
| |
|
Attention sentiment analysis model based on multi-scale convolution and gating mechanism |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2674-2679
[Abstract]
(673)
[HTML 1 KB]
[PDF 682 KB]
(287)
|
|
|
2009 |
Cheng HUANG, Qianrui ZHAO |
| |
|
Sensitive information detection method based on attention mechanism-based ELMo |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2009-2014
[Abstract]
(1068)
[HTML 1 KB]
[PDF 973 KB]
(513)
|
|
|
3763 |
Yangyang SUN, Junping YAO, Xiaojun LI, Shouxiang FAN, Ziwei WANG |
| |
|
Materialized view asynchronous incremental maintenance task generation under hybrid transaction/analytical processing for single record |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3763-3768
[Abstract]
(516)
[HTML 1 KB]
[PDF 660 KB]
(96)
|
|
|
3715 |
Kangzhe MA, Jiatian PI, Zhoubing XIONG, Jia LYU |
| |
|
6D pose estimation incorporating attentional features for occluded objects |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3715-3722
[Abstract]
(653)
[HTML 1 KB]
[PDF 2051 KB]
(247)
|
|
|
3900 |
You YANG, Lizhi CHEN, Xiaolong FANG, Longyue PAN |
| |
|
Image caption generation model with adaptive commonsense gate |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3900-3905
[Abstract]
(440)
[HTML 1 KB]
[PDF 2101 KB]
(148)
|
|
|
3708 |
Dan HE, Xiping HE, Yue LI, Rui YUAN, Yuanyuan NIU |
| |
|
Face anti-spoofing method based on regional blocking and lightweight network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3708-3714
[Abstract]
(506)
[HTML 1 KB]
[PDF 1601 KB]
(121)
|
|
|
98 |
CHEN Haiyan, JIA Mingming, ZHAO Wenli, WANG Chanfei |
| |
|
Target detection of Ochotona curzoniae based on embedded Jetson TX2 |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 98-103
[Abstract]
(557)
[HTML 1 KB]
[PDF 2996 KB]
(159)
|
|
|
8 |
YUAN Lining, LIU Zhao |
| |
|
Graph representation learning by autoencoder with one-shot aggregation |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (1): 8-14
[Abstract]
(683)
[HTML 1 KB]
[PDF 2556 KB]
(275)
|
|
|
3322 |
Yongjian QIAO, Xiaolin LIU, Liang BAI |
| |
|
K‑nearest neighbor imputation subspace clustering algorithm for high‑dimensional data with feature missing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3322-3329
[Abstract]
(721)
[HTML 1 KB]
[PDF 1207 KB]
(423)
|
|
|
3386 |
Longchao GONG, Junjun GUO, Zhengtao YU |
| |
|
Neural machine translation method based on source language syntax enhanced decoding |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3386-3394
[Abstract]
(634)
[HTML 1 KB]
[PDF 1267 KB]
(231)
|
|
|
3404 |
Xin LI, Tao JIA |
| |
|
Deep fusion model for predicting differential gene expression by histone modification data |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3404-3412
[Abstract]
(461)
[HTML 1 KB]
[PDF 1734 KB]
(200)
|
|
|
2072 |
Wanjun LIU, Jiaming WANG, Haicheng QU, Libing DONG, Xinyu CAO |
| |
|
Music genre classification algorithm based on attention spectral-spatial feature |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2072-2077
[Abstract]
(709)
[HTML 1 KB]
[PDF 2397 KB]
(271)
|
|
|
3692 |
Zhisheng SHAO, Guofu ZHANG, Zhaopin SU, Lei LI |
| |
|
Dynamic testing resource allocation algorithm based on software architecture and generalized differential evolution |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3692-3701
[Abstract]
(554)
[HTML 0 KB]
[PDF 717 KB]
(154)
|
|
|
3637 |
Bowen YAO, Biqing ZENG, Jian CAI, Meirong DING |
| |
|
Chinese character relation extraction model based on pre-training and multi-level information |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3637-3644
[Abstract]
(636)
[HTML 0 KB]
[PDF 822 KB]
(349)
|
|
|
3632 |
Jihou WANG, Peiguang LIN, Jiaqian ZHOU, Qingtao LI, Yan ZHANG, Muwei JIAN |
| |
|
Stock index forecasting method based on corporate financial statement data |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3632-3636
[Abstract]
(548)
[HTML 0 KB]
[PDF 580 KB]
(179)
|
|
|
3626 |
Xueying PENG, Yongquan JIANG, Yan YANG |
| |
|
Transfer learning based on graph convolutional network in bearing service fault diagnosis |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3626-3631
[Abstract]
(619)
[HTML 0 KB]
[PDF 561 KB]
(685)
|
|
|
3614 |
Tengqi JI, Jun MENG, Siyuan ZHAO, Hehuan HU |
| |
|
Prediction model of lncRNA-encoded short peptides based on representation learning and deep forest |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3614-3619
[Abstract]
(443)
[HTML 0 KB]
[PDF 891 KB]
(237)
|
|
|
3608 |
Hongliang CAO, Ying ZHANG, Bin WU, Fanyu LI, Xubo NA |
| |
|
Prediction method of liver transplantation complications based on transfer component analysis and support vector machine |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3608-3613
[Abstract]
(520)
[HTML 0 KB]
[PDF 699 KB]
(129)
|
|
|
3602 |
Wanqing XU, Baodong WANG, Yimei HUANG, Jinping LI |
| |
|
Smoking behavior detection algorithm based on human skeleton key points |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3602-3607
[Abstract]
(763)
[HTML 0 KB]
[PDF 1345 KB]
(408)
|
|
|
3551 |
Yate FENG, Yimin WEN |
| |
|
Vietnamese scene text detection based on modified Mask R-CNN |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3551-3557
[Abstract]
(464)
[HTML 0 KB]
[PDF 1209 KB]
(141)
|
|
|
3485 |
Zenghui ZHANG, Gaoxia JIANG, Wenjian WANG |
| |
|
Label noise filtering method based on dynamic probability sampling |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3485-3491
[Abstract]
(443)
[HTML 0 KB]
[PDF 1379 KB]
(268)
|
|
|
3480 |
Zilong LI, Yong ZHOU, Rong BAO, Hongdong WANG |
| |
|
Deep distance metric learning method based on optimized triplet loss |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3480-3484
[Abstract]
(526)
[HTML 0 KB]
[PDF 581 KB]
(280)
|
|
|
3468 |
Haoyun LEI, Zenwen REN, Yanlong WANG, Shuang XUE, Haoran LI |
| |
|
Multiple kernel clustering algorithm based on capped simplex projection graph tensor learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3468-3474
[Abstract]
(691)
[HTML 1 KB]
[PDF 6316 KB]
(194)
|
|
|
3455 |
Han DU, Xianzhong LONG, Yun LI |
| |
|
Graph learning regularized discriminative non-negative matrix factorization based face recognition |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3455-3461
[Abstract]
(643)
[HTML 0 KB]
[PDF 790 KB]
(190)
|
|
|
3432 |
Huibo LI, Yunxiao ZHAO, Liang BAI |
| |
|
Dynamic graph representation learning method based on deep neural network and gated recurrent unit |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3432-3437
[Abstract]
(543)
[HTML 0 KB]
[PDF 869 KB]
(847)
|
|
|
3419 |
Erchao LI, Yuyan MAO |
| |
|
Constrained multi-objective evolutionary algorithm based on space shrinking technique |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3419-3425
[Abstract]
(594)
[HTML 0 KB]
[PDF 979 KB]
(211)
|
|
|
1308 |
Kunpeng LI, Pengcheng ZHANG, Hong SHANGGUAN, Yanling WANG, Jie YANG, Zhiguo GUI |
| |
|
Time-frequency domain CT reconstruction algorithm based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1308-1316
[Abstract]
(594)
[HTML 1 KB]
[PDF 3307 KB]
(200)
|
|
|
3426 |
Zhaoxia DAI, Yudong CAO, Guangming ZHU, Peiyi SHEN, Xu XU, Lin MEI, Liang ZHANG |
| |
|
Specific knowledge learning based on knowledge distillation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3426-3431
[Abstract]
(549)
[HTML 1 KB]
[PDF 648 KB]
(229)
|
|
|
3337 |
Hao FU, Hegen XU, Zhiming ZHANG, Shaohua QI |
| |
|
Visual simultaneous localization and mapping based on semantic and optical flow constraints in dynamic scenes |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3337-3344
[Abstract]
(571)
[HTML 1 KB]
[PDF 2125 KB]
(568)
|
|
|
3288 |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN |
| |
|
Searchable encryption scheme based on splittable inverted index |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3288-3294
[Abstract]
(789)
[HTML 1 KB]
[PDF 639 KB]
(203)
|
|
|
3156 |
Zhichao LI, Tohti TURDI, Hamdulla ASKAR |
| |
|
Answer selection model based on dynamic attention and multi-perspective matching |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3156-3163
[Abstract]
(460)
[HTML 1 KB]
[PDF 599 KB]
(187)
|
|
|
3139 |
Xujian ZHAO, Chongwei WANG |
| |
|
Storyline extraction method from Weibo news based on graph convolutional network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3139-3144
[Abstract]
(645)
[HTML 1 KB]
[PDF 860 KB]
(418)
|
|
|
825 |
Guangzhu XU, Wenjie LIN, Sha CHEN, Wan KUANG, Bangjun LEI, Jun ZHOU |
| |
|
Fundus vessel segmentation method based on U-Net and pulse coupled neural network with adaptive threshold |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 825-832
[Abstract]
(598)
[HTML 1 KB]
[PDF 1357 KB]
(223)
|
|
|
676 |
Qinghua LIU, Shizhong LIAO |
| |
|
Online kernel regression based on random sketching method |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 676-682
[Abstract]
(515)
[HTML 1 KB]
[PDF 628 KB]
(135)
|
|
|
724 |
Runze LI, Xuejiao SUN |
| |
|
Data stream preference query based on extraction sequence according to temporal condition |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 724-730
[Abstract]
(443)
[HTML 1 KB]
[PDF 635 KB]
(103)
|
|
|
797 |
Xiaojie LI, Chaoran CUI, Guangle SONG, Yaxi SU, Tianze WU, Chunyun ZHANG |
| |
|
Stock trend prediction method based on temporal hypergraph convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 797-803
[Abstract]
(1745)
[HTML 1 KB]
[PDF 742 KB]
(893)
|
|
|
757 |
Lu ZHANG, Chun FANG, Ming ZHU |
| |
|
Indoor fall detection algorithm based on Res2Net-YOLACT and fusion feature |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (3): 757-763
[Abstract]
(775)
[HTML 1 KB]
[PDF 1061 KB]
(247)
|
|
|
404 |
Renzhi PAN, Fulan QIAN, Shu ZHAO, Yanping ZHANG |
| |
|
Recommendation model for user attribute preference modeling based on convolutional neural network interaction |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 404-411
[Abstract]
(734)
[HTML 1 KB]
[PDF 633 KB]
(278)
|
|
|
412 |
Zhonghui LIU, Ziyou WANG, Fan MIN |
| |
|
Genetic algorithm for approximate concept generation and its recommendation application |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 412-418
[Abstract]
(642)
[HTML 1 KB]
[PDF 477 KB]
(109)
|
|
|
449 |
Meng KANG, Zuqiang MENG |
| |
|
Efficient attribute reduction algorithm based on local conditional discernibility |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 449-456
[Abstract]
(502)
[HTML 1 KB]
[PDF 635 KB]
(96)
|
|
|
419 |
Jie MENG, Li WANG, Yanjie YANG, Biao LIAN |
| |
|
Multi-modal deep fusion for false information detection |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 419-425
[Abstract]
(900)
[HTML 1 KB]
[PDF 1079 KB]
(431)
|
|
|
0 |
|
| |
|
The Construction and Preliminary Analyses of Uncertainty Measures for Meta-Learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(119)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
140 |
Ziqi JING, Zhaonian ZOU |
| |
|
Design and implementation of multi-version concurrency control on embedded database SQLite |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 140-147
[Abstract]
(718)
[HTML 1 KB]
[PDF 785 KB]
(238)
|
|
|
2823 |
Yuyu MENG, Jing GUO |
| |
|
Link prediction algorithm based on information entropy improved PCA model |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2823-2829
[Abstract]
(537)
[HTML 1 KB]
[PDF 971 KB]
(112)
|
|
|
1275 |
Haifeng LI, Bifan ZHAO, Jinyi HOU, Huaichao WANG, Zhongcheng GUI |
| |
|
Automatic detection algorithm for underground target based on adaptive double threshold |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1275-1283
[Abstract]
(520)
[HTML 1 KB]
[PDF 1999 KB]
(170)
|
|
|
2960 |
Yuefeng LIU, Xiaoyan ZHANG, Wei GUO, Haodong BIAN, Yingjie HE |
| |
|
Remaining useful life prediction method of aero-engine based on optimized hybrid model |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2960-2968
[Abstract]
(479)
[HTML 1 KB]
[PDF 2754 KB]
(253)
|
|
|
3070 |
LAI Zicheng, ZHANG Yuping, MA Yan |
| |
|
Prediction of organic reaction based on gated graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3070-3074
[Abstract]
(432)
[HTML 1 KB]
[PDF 1291 KB]
(571)
|
|
|
3017 |
XIAO Qi, YIN Zengshan, GAO Shuang |
| |
|
Extremely dim target search algorithm based on detection and tracking mutual iteration |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3017-3024
[Abstract]
(499)
[HTML 1 KB]
[PDF 1788 KB]
(487)
|
|
|
2979 |
PEI Yiyao, GUO Huiming, ZHANG Danpu, CHEN Wenbo |
| |
|
Robust 3D object detection method based on localization uncertainty |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2979-2984
[Abstract]
(664)
[HTML 1 KB]
[PDF 1259 KB]
(412)
|
|
|
2959 |
TU Hongyan, ZHANG Ting, XIA Pengfei, DU Yi |
| |
|
Reconstruction method for uncertain spatial information based on improved variational auto-encoder |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2959-2963
[Abstract]
(429)
[HTML 1 KB]
[PDF 1274 KB]
(367)
|
|
|
2820 |
YUAN Jingling, DING Yuanyuan, PAN Donghang, LI Lin |
| |
|
Chinese implicit sentiment classification model based on sequence and contextual features |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2820-2828
[Abstract]
(548)
[HTML 1 KB]
[PDF 839 KB]
(510)
|
|
|
2058 |
Zhenyu WANG, Lei ZHANG, Wenbin GAO, Weiming QUAN |
| |
|
Human activity recognition based on progressive neural architecture search |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2058-2064
[Abstract]
(498)
[HTML 1 KB]
[PDF 1638 KB]
(146)
|
|
|
1036 |
Zumin WANG, Zhihao ZHANG, Jing QIN, Changqing JI |
| |
|
Review of mechanical fault diagnosis technology based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1036-1043
[Abstract]
(931)
[HTML 1 KB]
[PDF 532 KB]
(597)
|
|
|
2780 |
Wenting BI, Haitao LIN, Liqun ZHANG |
| |
|
Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2780-2787
[Abstract]
(563)
[HTML 1 KB]
[PDF 2390 KB]
(325)
|
|
|
2001 |
Yayao ZUO, Haoyu CHEN, Zhiran CHEN, Jiawei HONG, Kun CHEN |
| |
|
Named entity recognition method combining multiple semantic features |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2001-2008
[Abstract]
(767)
[HTML 1 KB]
[PDF 2326 KB]
(305)
|
|
|
1194 |
Haojie CHEN, Jiangting FAN, Yong LIU |
| |
|
Solving dynamic traveling salesman problem by deep reinforcement learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1194-1200
[Abstract]
(965)
[HTML 1 KB]
[PDF 795 KB]
(510)
|
|
|
2139 |
Linxiu SHA, Fan NIE, Qian GAO, Hao MENG |
| |
|
Alternately optimizing algorithm based on Brownian movement and gradient information |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2139-2145
[Abstract]
(528)
[HTML 1 KB]
[PDF 2126 KB]
(172)
|
|
|
2333 |
Fengting ZHANG, Juhua YANG, Jinhui REN, Kun JIN |
| |
|
Container throughput prediction based on optimal variational mode decomposition and kernel extreme learning machine |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2333-2342
[Abstract]
(597)
[HTML 1 KB]
[PDF 1097 KB]
(196)
|
|
|
1985 |
Heng CHEN, Siyi WANG, Zhengguang LI, Guanyu LI, Xin LIU |
| |
|
Capsule network knowledge graph embedding model based on relational memory |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1985-1992
[Abstract]
(627)
[HTML 1 KB]
[PDF 1243 KB]
(276)
|
|
|
1191 |
Jian GAO, Zhi LI, Bin FAN, Chuanxian JIANG |
| |
|
Efficient robust zero-watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moment |
| |
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1191-1197
[Abstract]
(566)
[HTML 1 KB]
[PDF 2206 KB]
(197)
|
|
|
1099 |
Haoran LUO, Qing YANG |
| |
|
Sentiment analysis based on sentiment lexicon and stacked residual Bi-LSTM network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1099-1107
[Abstract]
(515)
[HTML 1 KB]
[PDF 887 KB]
(1041)
|
|
|
2800 |
Yuhang WANG, Yongxia ZHOU, Liangwu WU |
| |
|
Pooling algorithm based on Gaussian function |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2800-2806
[Abstract]
(501)
[HTML 1 KB]
[PDF 1518 KB]
(145)
|
|
|
2680 |
Jie HU, Yan HU, Mengchi LIU, Yan ZHANG |
| |
|
Chinese named entity recognition based on knowledge base entity enhanced BERT model |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2680-2685
[Abstract]
(790)
[HTML 1 KB]
[PDF 1391 KB]
(533)
|
|
|
2274 |
Haiqi WANG, Zhihai WANG, Liuke LI, Haoran KONG, Qiong WANG, Jianbo XU |
| |
|
Spatial-temporal prediction model of urban short-term traffic flow based on grid division |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2274-2280
[Abstract]
(756)
[HTML 1 KB]
[PDF 2906 KB]
(488)
|
|
|
2201 |
Zhifeng ZHONG, Yifan XIA, Dongping ZHOU, Yangtian YAN |
| |
|
Lightweight object detection algorithm based on improved YOLOv4 |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2201-2209
[Abstract]
(995)
[HTML 1 KB]
[PDF 5719 KB]
(564)
|
|
|
999 |
Ni ZHANG, Meng HAN, Le WANG, Xiaojuan LI, Haodong CHENG |
| |
|
Survey of high utility pattern mining methods based on positive and negative utility division |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 999-1010
[Abstract]
(568)
[HTML 1 KB]
[PDF 1254 KB]
(524)
|
|
|
985 |
Bing XIA, Jianmin PANG, Xin ZHOU, Zheng SHAN |
| |
|
Research progress on binary code similarity search |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 985-998
[Abstract]
(1038)
[HTML 1 KB]
[PDF 841 KB]
(1622)
|
|
|
1137 |
Le WANG, Meng HAN, Xiaojuan LI, Ni ZHANG, Haodong CHENG |
| |
|
Ensemble classification algorithm based on dynamic weighting function |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1137-1147
[Abstract]
(653)
[HTML 1 KB]
[PDF 838 KB]
(139)
|
|
|
94 |
Zhihui SHAN, Meng HAN, Qiang HAN |
| |
|
Survey of high utility pattern mining on dynamic data |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 94-108
[Abstract]
(536)
[HTML 1 KB]
[PDF 1668 KB]
(435)
|
|
|
123 |
Xiaojuan LI, Meng HAN, Le WANG, Ni ZHENG, Haodong CHENG |
| |
|
Dynamic weighted ensemble classification algorithm based on accuracy climbing |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 123-131
[Abstract]
(494)
[HTML 1 KB]
[PDF 992 KB]
(122)
|
|
|
0 |
|
| |
|
Review of applications of natural language processing in sentiment analysis |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(483)
[HTML 1 KB]
[PDF 501 KB]
(783)
|
|
|
9 |
Jijie ZHANG, Yan YANG, Yong LIU |
| |
|
Adaptive deep graph convolution using initial residual and decoupling operations |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 9-15
[Abstract]
(693)
[HTML 1 KB]
[PDF 648 KB]
(320)
|
|
|
162 |
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG |
| |
|
Nonlinear scrambling diffusion synchronization image encryption based on dynamic network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 162-170
[Abstract]
(576)
[HTML 1 KB]
[PDF 3822 KB]
(130)
|
|
|
1260 |
Zhihua LIU, Wenjie CHEN, Aibin CHEN |
| |
|
Homologous spectrogram feature fusion with self-attention mechanism for bird sound classification |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1260-1268
[Abstract]
(610)
[HTML 1 KB]
[PDF 1376 KB]
(242)
|
|
|
1207 |
Yongfeng DONG, Yuehua SUN, Lichao GAO, Peng HAN, Haipeng JI |
| |
|
Fault diagnosis method based on improved one-dimensional convolutional and bidirectional long short-term memory neural networks |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1207-1215
[Abstract]
(773)
[HTML 1 KB]
[PDF 2185 KB]
(731)
|
|
|
2192 |
Xiangyue TAN, Xiao HU, Jiaxin YANG, Junjiang XIANG |
| |
|
Camouflaged object detection based on progressive feature enhancement aggregation |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2192-2200
[Abstract]
(657)
[HTML 1 KB]
[PDF 2588 KB]
(174)
|
|
|
0 |
|
| |
|
Multi-source and multi-label pedestrian attribute recognition based on domain adaptation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(243)
[HTML 0 KB]
[PDF 0 KB]
(13)
|
|
|
3097 |
Gangzhu QIAO, Rui WANG, Chaoli SUN |
| |
|
Improved high-dimensional many-objective evolutionary algorithm based on decomposition |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3097-3103
[Abstract]
(828)
[HTML 1 KB]
[PDF 525 KB]
(517)
|
|
|
3385 |
Yi DING, Cong WANG |
| |
|
Ship stowage optimization centered on automated terminal |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3385-3393
[Abstract]
(493)
[HTML 1 KB]
[PDF 694 KB]
(195)
|
|
|
3302 |
Ying LEI, Wanbo ZHENG, Wei WEI, Yunni XIA, Xiaobo LI, Chengwu LIU, Hong XIE |
| |
|
Task offloading method based on probabilistic performance awareness and evolutionary game strategy in “cloud + edge” hybrid environment |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3302-3308
[Abstract]
(596)
[HTML 1 KB]
[PDF 1179 KB]
(155)
|
|
|
2741 |
WANG Hebing, ZHANG Chunmei |
| |
|
Facial landmark detection based on ResNeXt with asymmetric convolution and squeeze excitation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2741-2747
[Abstract]
(635)
[HTML 1 KB]
[PDF 2305 KB]
(458)
|
|
|
2552 |
NIU Ruihua, YANG Jun, XING Lanxin, WU Renbiao |
| |
|
Micro-expression recognition algorithm based on convolutional block attention module and dual path networks |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2552-2559
[Abstract]
(757)
[HTML 1 KB]
[PDF 1663 KB]
(1294)
|
|
|
1108 |
Lie PAN, Cheng ZENG, Haifeng ZHANG, Chaodong WEN, Rusong HAO, Peng HE |
| |
|
Text sentiment analysis method combining generalized autoregressive pre-training language model and recurrent convolutional neural network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1108-1115
[Abstract]
(597)
[HTML 1 KB]
[PDF 728 KB]
(401)
|
|
|
0 |
|
| |
|
Smoking Behavior Detection Algorithm Based on Human Skeleton Keypoints |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(190)
[HTML 0 KB]
[PDF 0 KB]
(10)
|
|
|
3362 |
Meng LI, Pinle QIN, Jianchao ZENG, Junbo LI |
| |
|
Super-resolution and multi-view fusion based on magnetic resonance image inter-layer interpolation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3362-3367
[Abstract]
(469)
[HTML 1 KB]
[PDF 650 KB]
(240)
|
|
|
3151 |
Yang ZHANG, Xiaoning WANG |
| |
|
Text feature selection method based on Word2Vec word embedding and genetic algorithm for biomarker selection in high-dimensional omics |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3151-3155
[Abstract]
(601)
[HTML 1 KB]
[PDF 673 KB]
(172)
|
|
|
3251 |
Li LI, Hongfei YANG, Xiuze DONG |
| |
|
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3251-3256
[Abstract]
(430)
[HTML 1 KB]
[PDF 490 KB]
(225)
|
|
|
3219 |
Jianfang CAO, Minmin YAN, Yiming JIA, Xiaodong TIAN |
| |
|
Application of Inception-v3 model integrated with transfer learning in dynasty identification of ancient murals |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3219-3227
[Abstract]
(659)
[HTML 1 KB]
[PDF 1665 KB]
(181)
|
|
|
3178 |
Junhua YAN, Ping HOU, Yin ZHANG, Xiangyang LYU, Yue MA, Gaofei WANG |
| |
|
Multiply distortion type judgement method based on multi-scale and multi-classifier convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3178-3184
[Abstract]
(563)
[HTML 1 KB]
[PDF 1034 KB]
(151)
|
|
|
0 |
|
| |
|
CCML2021 240:Prediction method of liver transplantation complications based on transfer component analysis and support vector machines |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(108)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
3499 |
Xiancong CHEN, Weike PAN, Zhong MING |
| |
|
Staged variational autoencoder for heterogeneous one-class collaborative filtering |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3499-3507
[Abstract]
(552)
[HTML 1 KB]
[PDF 785 KB]
(261)
|
|
|
3409 |
Keyang CHENG, Chunyun MENG, Wenshan WANG, Wenxi SHI, Yongzhao ZHAN |
| |
|
Research advances in disentangled representation learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3409-3418
[Abstract]
(1452)
[HTML 1 KB]
[PDF 877 KB]
(607)
|
|
|
3475 |
Xuanyi LI, Yun ZHOU |
| |
|
BNSL-FIM: Bayesian network structure learning algorithm based on frequent item mining |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3475-3479
[Abstract]
(670)
[HTML 1 KB]
[PDF 542 KB]
(139)
|
|
|
2187 |
LIU Fangming, ZHANG Hong |
| |
|
Cross-modal retrieval algorithm based on multi-level semantic discriminative guided hashing |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2187-2192
[Abstract]
(524)
[HTML 1 KB]
[PDF 1091 KB]
(649)
|
|
|
87 |
Xiaopeng WANG, Yuanyuan SUN, Hongfei LIN |
| |
|
Encoding-decoding relationship extraction model based on criminal Electra |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 87-93
[Abstract]
(446)
[HTML 1 KB]
[PDF 723 KB]
(154)
|
|
|
574 |
Xueming LI, Guohao WU, Shangbo ZHOU, Xiaoran LIN, Hongbin XIE |
| |
|
Image instance segmentation model based on fractional-order network and reinforcement learning |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 574-583
[Abstract]
(647)
[HTML 1 KB]
[PDF 2853 KB]
(313)
|
|
|
2092 |
PEI Chunyang, FAN Kuangang, MA Zheng |
| |
|
Medical image fusion based on edge-preserving decomposition and improved sparse representation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2092-2099
[Abstract]
(542)
[HTML 1 KB]
[PDF 4280 KB]
(600)
|
|
|
1983 |
YANG Longhai, WANG Xueyuan, JIANG Hesong |
| |
|
Blockchain digital signature scheme with improved SM2 signature method |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1983-1988
[Abstract]
(733)
[HTML 1 KB]
[PDF 1080 KB]
(1024)
|
|
|
1857 |
ZHANG Yuanjun, ZHANG Xihuang |
| |
|
Dynamic network representation learning model based on graph convolutional network and long short-term memory network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1857-1864
[Abstract]
(613)
[HTML 1 KB]
[PDF 1298 KB]
(1044)
|
|
|
1225 |
Hanguang LAI, Qing LI, Yong JIANG |
| |
|
Transmission control protocol congestion control switching scheme based on scenario change |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1225-1234
[Abstract]
(634)
[HTML 1 KB]
[PDF 1097 KB]
(282)
|
|
|
3213 |
Lin SUN, Yubo YUAN |
| |
|
Drowsiness recognition algorithm based on human eye state |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3213-3218
[Abstract]
(736)
[HTML 1 KB]
[PDF 1688 KB]
(458)
|
|
|
3089 |
ZHUO Yuxin, HAN Suya, ZHANG Yufeng, LI Zhiyao, DONG Yifeng |
| |
|
Automatic segmentation method of microwave ablation region based on Nakagami parameters images of ultrasonic harmonic envelope |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3089-3096
[Abstract]
(517)
[HTML 1 KB]
[PDF 4320 KB]
(378)
|
|
|
2937 |
GAO Shiwei, ZHANG Changzhu, WANG Zhuping |
| |
|
Lightweight real-time semantic segmentation algorithm based on separable pyramid |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2937-2944
[Abstract]
(556)
[HTML 1 KB]
[PDF 2525 KB]
(364)
|
|
|
310 |
Hongfei JIA, Xi LIU, Yu WANG, Hongbing XIAO, Suxia XING |
| |
|
Application of 3DPCANet in image classification of functional magnetic resonance imaging for Alzheimer’s disease |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 310-315
[Abstract]
(608)
[HTML 1 KB]
[PDF 568 KB]
(150)
|
|
|
71 |
Qiming RUAN, Yi GUO, Nan ZHENG, Yexiang WANG |
| |
|
Customs declaration good classification algorithm based on hierarchical multi-task BERT |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 71-77
[Abstract]
(828)
[HTML 1 KB]
[PDF 697 KB]
(287)
|
|
|
3010 |
ZHANG Kaiyue, ZHANG Hong |
| |
|
Shipping monitoring image recognition model based on attention mechanism network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3010-3016
[Abstract]
(412)
[HTML 1 KB]
[PDF 1343 KB]
(449)
|
|
|
2813 |
ZHU Simiao, Wei Shiwei, WEI Siheng, YU Dunhui |
| |
|
Video recommendation algorithm based on danmaku sentiment analysis and topic model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2813-2819
[Abstract]
(704)
[HTML 1 KB]
[PDF 852 KB]
(557)
|
|
|
3049 |
ZHENG Hongxing, ZHU Xutao, LI Zhenfei |
| |
|
Optimization algorithm of ship dispatching in container terminals with two-way channel |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3049-3055
[Abstract]
(553)
[HTML 1 KB]
[PDF 636 KB]
(470)
|
|
|
2799 |
DONG Yongfeng, LIU Chao, WANG Liqin, LI Yingshuang |
| |
|
Relationship reasoning method combining multi-hop relationship path information |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2799-2805
[Abstract]
(540)
[HTML 1 KB]
[PDF 763 KB]
(607)
|
|
|
2785 |
WANG Yahui, QIAN Yuhua, LIU Guoqing |
| |
|
Ordinal decision tree algorithm based on fuzzy advantage complementary mutual information |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2785-2792
[Abstract]
(610)
[HTML 1 KB]
[PDF 1344 KB]
(651)
|
|
|
2842 |
YANG Lu, HE Mingxiang |
| |
|
Chinese text sentiment analysis model based on gated mechanism and convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2842-2848
[Abstract]
(548)
[HTML 1 KB]
[PDF 717 KB]
(1146)
|
|
|
2829 |
YANG Shuxin, ZHANG Nan |
| |
|
Text sentiment analysis based on sentiment lexicon and context language model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2829-2834
[Abstract]
(477)
[HTML 1 KB]
[PDF 696 KB]
(330)
|
|
|
2893 |
SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei |
| |
|
Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2893-2899
[Abstract]
(930)
[HTML 1 KB]
[PDF 4865 KB]
(582)
|
|
|
2952 |
HUANG Juting, GAO Hongli, DAI Zhikun |
| |
|
Semantic segmentation method of power line on mobile terminals based on encoder-decoder structure |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2952-2958
[Abstract]
(469)
[HTML 1 KB]
[PDF 1631 KB]
(463)
|
|
|
2964 |
ZHANG Yanjiao, QIAO Zhiwei |
| |
|
High-precision sparse reconstruction of CT images based on multiply residual UNet |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2964-2969
[Abstract]
(592)
[HTML 1 KB]
[PDF 1075 KB]
(886)
|
|
|
2324 |
ZENG Xiangyin, ZHENG Bochuan, LIU Dan |
| |
|
Detection of left and right railway tracks based on deep convolutional neural network and clustering |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2324-2329
[Abstract]
(615)
[HTML 1 KB]
[PDF 1502 KB]
(577)
|
|
|
0 |
|
| |
|
Storyline extraction method from Weibo news based on graph convolutional network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(145)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
|
2623 |
XU Liyun, YAN Tao, QIAN Yuhua |
| |
|
Audio encryption algorithm in fractional domain based on cascaded chaotic system |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2623-2630
[Abstract]
(569)
[HTML 1 KB]
[PDF 2308 KB]
(464)
|
|
|
1652 |
JIA Chengxun, LAI Hua, YU Zhengtao, WEN Yonghua, YU Zhiqiang |
| |
|
Chinese-Vietnamese pseudo-parallel corpus generation based on monolingual language model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1652-1658
[Abstract]
(585)
[HTML 1 KB]
[PDF 1333 KB]
(450)
|
|
|
1581 |
YIN Fei, LONG Lingli, KONG Zheng, SHAO Han, LI Xin, QIAN Zhuzhong |
| |
|
Deployment method of dockers in cluster for dynamic workload |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1581-1588
[Abstract]
(511)
[HTML 1 KB]
[PDF 981 KB]
(478)
|
|
|
1589 |
ZHANG Mingming, LU Qingning, LI Wenzhong, SONG Hu |
| |
|
Deep neural network compression algorithm based on combined dynamic pruning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1589-1596
[Abstract]
(571)
[HTML 1 KB]
[PDF 1131 KB]
(449)
|
|
|
1557 |
LIU Shize, ZHU Yida, CHEN Runze, LUO Haiyong, ZHAO Fang, SUN Yi, WANG Baohui |
| |
|
Traffic mode recognition algorithm based on residual temporal attention neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1557-1565
[Abstract]
(488)
[HTML 1 KB]
[PDF 1075 KB]
(815)
|
|
|
109 |
Yongbo CHEN, Qiaoqin LI, Yongguo LIU |
| |
|
Dynamic relevance based feature selection algorithm |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 109-114
[Abstract]
(593)
[HTML 1 KB]
[PDF 445 KB]
(479)
|
|
|
0 |
|
| |
|
A Searchable Encryption Scheme Based on Splitting Inverted Index |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(180)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
|
3113 |
Wenxia LI, Linzhong LIU, Cunjie DAI, Yu LI |
| |
|
Artificial bee colony algorithm based on multi-population combination strategy |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3113-3119
[Abstract]
(681)
[HTML 0 KB]
[PDF 757 KB]
(356)
|
|
|
631 |
Yaoming MA, Yu ZHANG |
| |
|
Insulator detection algorithm based on improved Faster-RCNN |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 631-637
[Abstract]
(682)
[HTML 1 KB]
[PDF 1867 KB]
(326)
|
|
|
584 |
Junbo LI, Pinle QIN, Jianchao ZENG, Meng LI |
| |
|
CT three-dimensional reconstruction algorithm based on super-resolution network |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 584-591
[Abstract]
(753)
[HTML 1 KB]
[PDF 1088 KB]
(586)
|
|
|
64 |
Yu PENG, Xiaoyu LI, Shijie HU, Xiaolei LIU, Weizhong QIAN |
| |
|
Three-stage question answering model based on BERT |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 64-70
[Abstract]
(877)
[HTML 1 KB]
[PDF 918 KB]
(924)
|
|
|
57 |
Xueqiang LYU, Chen PENG, Le ZHANG, Zhi’an DONG, Xindong YOU |
| |
|
Text multi-label classification method incorporating BERT and label semantic attention |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 57-63
[Abstract]
(1696)
[HTML 1 KB]
[PDF 577 KB]
(1790)
|
|
|
1514 |
NI Shuiping, LI Huifang |
| |
|
Battery state-of-charge prediction method based on one-dimensional convolutional neural network combined with long short-term memory network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1514-1521
[Abstract]
(656)
[HTML 1 KB]
[PDF 2218 KB]
(612)
|
|
|
1361 |
MA Jianhong, CAO Wenbin, LIU Yuangang, XIA Shuang |
| |
|
Patent clustering method based on functional effect |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1361-1366
[Abstract]
(519)
[HTML 1 KB]
[PDF 916 KB]
(642)
|
|
|
557 |
Wei LI, Qunqun WU, Yiwen ZHANG |
| |
|
Developer recommendation method based on E-CARGO model |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 557-564
[Abstract]
(669)
[HTML 1 KB]
[PDF 649 KB]
(275)
|
|
|
3257 |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU |
| |
|
Digital rights management scheme based on secret sharing in blockchain environment |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3257-3265
[Abstract]
(644)
[HTML 1 KB]
[PDF 580 KB]
(168)
|
|
|
258 |
Yinxin BAO, Yang CAO, Quan SHI |
| |
|
Improved spatio-temporal residual convolutional neural network for urban road network short-term traffic flow prediction |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 258-264
[Abstract]
(758)
[HTML 1 KB]
[PDF 1139 KB]
(181)
|
|
|
2945 |
ZHENG Sicheng, KONG Linghua, YOU Tongfei, YI Dingrong |
| |
|
Semantic SLAM algorithm based on deep learning in dynamic environment |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2945-2951
[Abstract]
(684)
[HTML 1 KB]
[PDF 1572 KB]
(1819)
|
|
|
2517 |
LIU Yaxuan, ZHONG Yong |
| |
|
Joint extraction method of entities and relations based on subject attention |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2517-2522
[Abstract]
(558)
[HTML 1 KB]
[PDF 977 KB]
(644)
|
|
|
2489 |
XIE Defeng, JI Jianmin |
| |
|
Syntax-enhanced semantic parsing with syntax-aware representation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2489-2495
[Abstract]
(605)
[HTML 1 KB]
[PDF 1042 KB]
(508)
|
|
|
2631 |
AN Xin, YANG Haijiao, LI Jianhua, REN Fuji |
| |
|
Dynamic mapping method for heterogeneous multi-core system under thermal safety constraint |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2631-2638
[Abstract]
(461)
[HTML 1 KB]
[PDF 1107 KB]
(465)
|
|
|
2773 |
MOU Changning, WANG Haipeng, ZHOU Piyu, HOU Xinhang |
| |
|
De novo peptide sequencing by tandem mass spectrometry based on graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2773-2779
[Abstract]
(640)
[HTML 1 KB]
[PDF 11373 KB]
(449)
|
|
|
2705 |
JI Zhangjian, REN Xingwang |
| |
|
Object tracking algorithm of fully-convolutional Siamese networks with rotation and scale estimation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2705-2711
[Abstract]
(511)
[HTML 1 KB]
[PDF 2425 KB]
(330)
|
|
|
2720 |
XU Jianglang, LI Linyan, WAN Xinjun, HU Fuyuan |
| |
|
Indoor scene recognition method combined with object detection |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2720-2725
[Abstract]
(721)
[HTML 1 KB]
[PDF 1357 KB]
(617)
|
|
|
2761 |
LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling |
| |
|
Real-time fall detection method based on threshold and extremely randomized tree |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2761-2766
[Abstract]
(519)
[HTML 1 KB]
[PDF 1152 KB]
(453)
|
|
|
2496 |
ZHAO Hong, KONG Dongyi |
| |
|
Chinese description of image content based on fusion of image feature attention and adaptive attention |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2496-2503
[Abstract]
(573)
[HTML 1 KB]
[PDF 1520 KB]
(608)
|
|
|
2609 |
ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang |
| |
|
Detection method of domains generated by dictionary-based domain generation algorithm |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2609-2614
[Abstract]
(709)
[HTML 1 KB]
[PDF 893 KB]
(592)
|
|
|
2504 |
LI Kangkang, ZHANG Jing |
| |
|
Multi-layer encoding and decoding model for image captioning based on attention mechanism |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2504-2509
[Abstract]
(711)
[HTML 1 KB]
[PDF 1112 KB]
(605)
|
|
|
542 |
Feifan SHI, Xuhua SHI |
| |
|
Adaptive reference vector based constrained multi-objective evolutionary algorithm |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 542-549
[Abstract]
(594)
[HTML 1 KB]
[PDF 1068 KB]
(287)
|
|
|
433 |
Yi ZHANG, Shuangsheng WANG, Bin HE, Peiming YE, Keqiang LI |
| |
|
Named entity recognition method of elementary mathematical text based on BERT |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 433-439
[Abstract]
(773)
[HTML 1 KB]
[PDF 689 KB]
(500)
|
|
|
565 |
Wang TAN, Yi LI |
| |
|
Synthesis of loop bound functions for loop programs |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (2): 565-573
[Abstract]
(519)
[HTML 1 KB]
[PDF 596 KB]
(110)
|
|
|
2539 |
BIAN Lingzhi, WANG Zhijie |
| |
|
Credit scoring model based on enhanced multi-dimensional and multi-grained cascade forest |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2539-2544
[Abstract]
(489)
[HTML 1 KB]
[PDF 1204 KB]
(375)
|
|
|
2767 |
ZHANG Xiaofei, YANG Yang, HUANG Jiajin, ZHONG Ning |
| |
|
Degree centrality based method for cognitive feature selection |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2767-2772
[Abstract]
(477)
[HTML 1 KB]
[PDF 2920 KB]
(1117)
|
|
|
2578 |
CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian |
| |
|
Differential privacy high-dimensional data publishing method via clustering analysis |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2578-2585
[Abstract]
(625)
[HTML 1 KB]
[PDF 1281 KB]
(517)
|
|
|
2523 |
ZHANG Cheng, WAN Yuan, QIANG Haopeng |
| |
|
Deep unsupervised discrete cross-modal hashing based on knowledge distillation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2523-2531
[Abstract]
(601)
[HTML 1 KB]
[PDF 1705 KB]
(631)
|
|
|
2726 |
SONG Zhongshan, LIANG Jiarui, ZHENG Lu, LIU Zhenyu, TIE Jun |
| |
|
Remote sensing scene classification based on bidirectional gated scale feature fusion |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2726-2735
[Abstract]
(619)
[HTML 1 KB]
[PDF 3143 KB]
(815)
|
|
|
2754 |
GONG Ying, HE Yanting, CAO Cejun |
| |
|
Co-evolutionary simulation regarding emergency logistics in major public health risk governance |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2754-2760
[Abstract]
(590)
[HTML 1 KB]
[PDF 1077 KB]
(341)
|
|
|
1820 |
HUANG Li, LU Long |
| |
|
Segmentation of ischemic stroke lesion based on long-distance dependency encoding and deep residual U-Net |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1820-1827
[Abstract]
(772)
[HTML 1 KB]
[PDF 1812 KB]
(652)
|
|
|
3171 |
Mingwei GAO, Nan SANG, Maolin YANG |
| |
|
IPTV video-on-demand recommendation model based on capsule network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3171-3177
[Abstract]
(532)
[HTML 1 KB]
[PDF 555 KB]
(105)
|
|
|
316 |
Jie WU, Shitian ZHANG, Haibin XIE, Guang YANG |
| |
|
Semi-supervised knee abnormality classification based on multi-imaging center MRI data |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 316-324
[Abstract]
(533)
[HTML 1 KB]
[PDF 780 KB]
(156)
|
|
|
0 |
|
| |
|
Color image demosaicking network based on inter-channel correlation and enhanced information distillation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(232)
[HTML 0 KB]
[PDF 0 KB]
(8)
|
|
|
3402 |
Jiaqi ZHANG, Yueqin ZHANG, Jian CHEN |
| |
|
Pulse condition recognition method based on optimized reinforcement learning path feature classification |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3402-3408
[Abstract]
(597)
[HTML 1 KB]
[PDF 606 KB]
(681)
|
|
|
50 |
Yongfeng DONG, Xiangqian QU, Linhao LI, Yao DONG |
| |
|
Academic journal contribution recommendation algorithm based on author preferences |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 50-56
[Abstract]
(650)
[HTML 1 KB]
[PDF 605 KB]
(1884)
|
|
|
148 |
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG |
| |
|
Survey of anonymity and tracking technology in Monero |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 148-156
[Abstract]
(1803)
[HTML 1 KB]
[PDF 723 KB]
(1256)
|
|
|
3332 |
Yusheng HU, Bingwei HE, Qingkang DENG |
| |
|
Moving object detection and static map reconstruction with hybrid vision system |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3332-3336
[Abstract]
(530)
[HTML 1 KB]
[PDF 1596 KB]
(296)
|
|
|
3702 |
Chuang GAO, Mian TANG, Liang ZHAO |
| |
|
B-cell epitope prediction model with overlapping subgraph mining based on L-Metric |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3702-3706
[Abstract]
(403)
[HTML 1 KB]
[PDF 499 KB]
(108)
|
|
|
3120 |
Jicheng CHEN, Hongchang CHEN |
| |
|
Community detection method based on tensor modeling and evolutionary
K-means clustering |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3120-3126
[Abstract]
(721)
[HTML 1 KB]
[PDF 759 KB]
(315)
|
|
|
3666 |
Haiyong WANG, Kaixin ZHANG, Weizheng GUAN |
| |
|
Single image super-resolution reconstruction method based on dense Inception |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3666-3671
[Abstract]
(513)
[HTML 1 KB]
[PDF 740 KB]
(130)
|
|
|
287 |
Donglin MA, Sizhou MA, Weijie WANG |
| |
|
Multi-site temperature prediction model based on graph convolutional network and gated recurrent unit |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 287-293
[Abstract]
(671)
[HTML 1 KB]
[PDF 753 KB]
(293)
|
|
|
44 |
Jianming LI, Bin CHEN, Zhiwei JIANG, Jian QIN |
| |
|
Constrained differentiable neural architecture search in optimized search space |
| |
|
|
Journal of Computer Applications
2022 Vol.42 (1): 44-49
[Abstract]
(525)
[HTML 1 KB]
[PDF 603 KB]
(145)
|
|
|
3319 |
Yongpeng SHI, Junjie ZHANG, Yujie XIA, Ya GAO, Shangwei ZHANG |
| |
|
Computation offloading and resource allocation strategy in NOMA-based 5G ultra-dense network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3319-3324
[Abstract]
(532)
[HTML 1 KB]
[PDF 639 KB]
(171)
|
|
|
2346 |
DANG Weichao, LI Tao, BAI Shangwang, GAO Gaimei, LIU Chunxia |
| |
|
Real-time remaining life prediction method of Web software system based on self-attention-long short-term memory network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2346-2351
[Abstract]
(530)
[HTML 1 KB]
[PDF 1238 KB]
(523)
|
|
|
3309 |
Gang CHEN, Xiangru MENG, Qiaoyan KANG, Yong YANG |
| |
|
Virtual software defined network mapping algorithm based on topology segmentation and clustering analysis |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3309-3318
[Abstract]
(690)
[HTML 1 KB]
[PDF 2050 KB]
(187)
|
|
|
3075 |
LU Rongxiu, CHEN Mingming, YANG Hui, ZHU Jianyong |
| |
|
Element component content dynamic monitoring system based on time sequence characteristics of solution images |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3075-3081
[Abstract]
(699)
[HTML 1 KB]
[PDF 687 KB]
(348)
|
|
|
556 |
XU Shaowei, QIN Pinle, ZENG Jianchao, ZHAO Zhikai, GAO Yuan |
| |
|
Automatic segmentation algorithm of two-stage mediastinal lymph nodes using attention mechanism |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 556-562
[Abstract]
(584)
[HTML 1 KB]
[PDF 2390 KB]
(602)
|
|
|
461 |
WANG Zekun, HE Yichao, LI Huanzhe, ZHANG Fazhan |
| |
|
Binary particle swarm optimization algorithm based on novel S-shape transfer function for knapsack problem with a single continuous variable |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 461-469
[Abstract]
(487)
[HTML 1 KB]
[PDF 1113 KB]
(981)
|
|
|
3082 |
HUANG Xiaoxiang, HU Yongmei, WU Dan, REN Lijie |
| |
|
Early identification and prediction of abnormal carotid arteries based on variational autoencoder |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3082-3088
[Abstract]
(617)
[HTML 1 KB]
[PDF 662 KB]
(397)
|
|
|
1348 |
LIN Yixing, TANG Hua |
| |
|
Hybrid recommendation model based on heterogeneous information network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1348-1355
[Abstract]
(602)
[HTML 1 KB]
[PDF 1265 KB]
(690)
|
|
|
0 |
|
| |
|
Measurement model of cardiovascular frailty based on Gaussian mixture model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(167)
[HTML 1 KB]
[PDF 0 KB]
(15)
|
|
|
2242 |
ZHANG Guohui, LU Xixi, HU Yifan, SUN Jinghe |
| |
|
Machine breakdown rescheduling of flexible job shop based on improved imperialist competitive algorithm |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2242-2248
[Abstract]
(589)
[HTML 1 KB]
[PDF 1072 KB]
(505)
|
|
|
2258 |
HUANG Chengcheng, DONG Xiaoxiao, LI Zhao |
| |
|
Deep pipeline 5×5 convolution method based on two-dimensional Winograd algorithm |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2258-2264
[Abstract]
(705)
[HTML 1 KB]
[PDF 1087 KB]
(484)
|
|
|
2466 |
LUO Mingyu, LUO Xiaomeng, ZHU Wenmin, ZHANG Lei, FAN Xiumin |
| |
|
Modeling technology for maintenance posture of virtual human in narrow space of ship |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2466-2472
[Abstract]
(601)
[HTML 1 KB]
[PDF 1390 KB]
(523)
|
|
|
2330 |
QIN Binbin, PENG Liangkang, LU Xiangming, QIAN Jiangbo |
| |
|
Research progress on driver distracted driving detection |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2330-2337
[Abstract]
(941)
[HTML 1 KB]
[PDF 2153 KB]
(717)
|
|
|
2312 |
SHI Xuesong, LI Xianhua, SUN Qing, SONG Tao |
| |
|
Noise image segmentation by adaptive wavelet transform based on artificial bee swarm and fuzzy C-means |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2312-2317
[Abstract]
(478)
[HTML 1 KB]
[PDF 3644 KB]
(448)
|
|
|
2373 |
DING Yin, SANG Nan, LI Xiaoyu, WU Feizhou |
| |
|
Prediction method of capacity data in telecom industry based on recurrent neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2373-2378
[Abstract]
(779)
[HTML 1 KB]
[PDF 1094 KB]
(493)
|
|
|
2835 |
GUO Kexin, ZHANG Yuxiang |
| |
|
Visual-textual sentiment analysis method based on multi-level spatial attention |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2835-2841
[Abstract]
(644)
[HTML 1 KB]
[PDF 6772 KB]
(1120)
|
|
|
2273 |
CAO Yuhong, XU Hai, LIU Sun'ao, WANG Zixiao, LI Hongliang |
| |
|
Review of deep learning-based medical image segmentation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2273-2287
[Abstract]
(2359)
[HTML 1 KB]
[PDF 2539 KB]
(1792)
|
|
|
2358 |
HUANG Jishuang, ZHANG Hua, LI Yonglong, ZHAO Hao, WANG Haoran, FENG Chuncheng |
| |
|
Hydraulic tunnel defect recognition method based on dynamic feature distillation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2358-2365
[Abstract]
(528)
[HTML 1 KB]
[PDF 1838 KB]
(524)
|
|
|
2205 |
ZHOU Xianbing, FAN Xiaochao, REN Ge, YANG Yong |
| |
|
Automated English essay scoring method based on multi-level semantic features |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2205-2211
[Abstract]
(847)
[HTML 1 KB]
[PDF 935 KB]
(648)
|
|
|
2288 |
ZHU Cheng, ZHAO Xiaoqi, ZHAO Liping, JIAO Yuhong, ZHU Yafei, CHENG Jianying, ZHOU Wei, TAN Ying |
| |
|
Classification of functional magnetic resonance imaging data based on semi-supervised feature selection by spectral clustering |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2288-2293
[Abstract]
(652)
[HTML 1 KB]
[PDF 1318 KB]
(575)
|
|
|
1915 |
LI Yangzhi, YUAN Jiazheng, LIU Hongzhe |
| |
|
Human skeleton-based action recognition algorithm based on spatiotemporal attention graph convolutional network model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1915-1921
[Abstract]
(1269)
[HTML 1 KB]
[PDF 1681 KB]
(1789)
|
|
|
1902 |
YANG Su, OUYANG Zhi, DU Nisuo |
| |
|
Unsupervised parallel hash image retrieval based on correlation distance |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1902-1907
[Abstract]
(552)
[HTML 1 KB]
[PDF 967 KB]
(683)
|
|
|
1939 |
WU Zeju, JIAO Cuijuan, CHEN Liang |
| |
|
Tire defect detection method based on improved Faster R-CNN |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1939-1946
[Abstract]
(808)
[HTML 1 KB]
[PDF 1816 KB]
(643)
|
|
|
1865 |
LIU Huan, LI Xiaoge, HU Likun, HU Feixiong, WANG Penghua |
| |
|
Knowledge graph driven recommendation model of graph neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1865-1870
[Abstract]
(993)
[HTML 1 KB]
[PDF 991 KB]
(956)
|
|
|
2026 |
ZHOU Shuo, QIU Runhe, TANG Minjun |
| |
|
Power allocation algorithm for CR-NOMA system based on tabu search and Q-learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2026-2032
[Abstract]
(697)
[HTML 1 KB]
[PDF 1128 KB]
(358)
|
|
|
1956 |
LI Yafang, LIANG Ye, FENG Weiwei, ZU Baokai, KANG Yujian |
| |
|
Deep network embedding method based on community optimization |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1956-1963
[Abstract]
(743)
[HTML 1 KB]
[PDF 1616 KB]
(544)
|
|
|
1812 |
JIA Heming, LANG Chunbo, JIANG Zichao |
| |
|
Plant leaf disease recognition method based on lightweight convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1812-1819
[Abstract]
(969)
[HTML 1 KB]
[PDF 1486 KB]
(622)
|
|
|
2062 |
LIU Shuangyuan, ZHENG Wangli, LIN Yunhan |
| |
|
Adaptive binary simplification method for 3D feature descriptor |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2062-2069
[Abstract]
(436)
[HTML 1 KB]
[PDF 1286 KB]
(438)
|
|
|
1268 |
LAI Xuemei, TANG Hong, CHEN Hongyu, LI Shanshan |
| |
|
Multimodal sentiment analysis based on feature fusion of attention mechanism-bidirectional gated recurrent unit |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1268-1274
[Abstract]
(1308)
[HTML 1 KB]
[PDF 960 KB]
(2073)
|
|
|
1165 |
TAN Zhaoyi, CHEN Baifan |
| |
|
Enhanced vehicle 3D surround view based on coordinate inverse mapping |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1165-1171
[Abstract]
(558)
[HTML 1 KB]
[PDF 4343 KB]
(910)
|
|
|
164 |
CHEN Li, WANG Hongyuan, ZHANG Yunpeng, CAO Liang, YIN Yuchang |
| |
|
Video-based person re-identification method by jointing evenly sampling-random erasing and global temporal feature pooling |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 164-169
[Abstract]
(528)
[HTML 1 KB]
[PDF 1012 KB]
(517)
|
|
|
121 |
LI Mingwei, JIANG Qingyuan, XIE Yinpeng, HE Jindong, WU Dan |
| |
|
Hash learning based malicious SQL detection |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 121-126
[Abstract]
(509)
[HTML 1 KB]
[PDF 816 KB]
(704)
|
|
|
36 |
WANG Lijuan, CHEN Shaomin, YIN Ming, XU Yueying, HAO Zhifeng, CAI Ruichu, WEN Wen |
| |
|
Improved block diagonal subspace clustering algorithm based on neighbor graph |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 36-42
[Abstract]
(564)
[HTML 1 KB]
[PDF 1491 KB]
(749)
|
|
|
1378 |
GU Zhengchuan, GUO Yuanbo, FANG Chen |
| |
|
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1378-1385
[Abstract]
(604)
[HTML 1 KB]
[PDF 1130 KB]
(939)
|
|
|
721 |
JIANG Li, HUANG Shijian, YAN Wenjuan |
| |
|
Human action recognition method based on low-rank action information and multi-scale convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 721-726
[Abstract]
(573)
[HTML 1 KB]
[PDF 1376 KB]
(1030)
|
|
|
706 |
HOU Yunlong, ZHU Lei, CHEN Qin, LYU Suidong |
| |
|
Salient object detection based on difference of Gaussian feature network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 706-713
[Abstract]
(642)
[HTML 1 KB]
[PDF 1463 KB]
(978)
|
|
|
677 |
PENG Li, ZHANG Haiqing, LI Daiwei, TANG Dan, YU Xi, HE Lei |
| |
|
Imputation algorithm for hybrid information system of incomplete data analysis approach based on rough set theory |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 677-685
[Abstract]
(696)
[HTML 1 KB]
[PDF 1135 KB]
(768)
|
|
|
727 |
JIANG Kun, LIU Zheng, ZHU Lei, LI Xiaoxing |
| |
|
Fixed word-aligned partition compression algorithm of inverted list based on directed acyclic graph |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 727-732
[Abstract]
(749)
[HTML 1 KB]
[PDF 905 KB]
(585)
|
|
|
881 |
WANG Binrong, TAN Dailun, ZHENG Bochuan |
| |
|
Solving auto part spraying sequence by transforming to traveling salesman problem and genetic algorithm |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 881-886
[Abstract]
(535)
[HTML 1 KB]
[PDF 970 KB]
(586)
|
|
|
911 |
HE Jiean, WU Xiaohong, HE Xiaohai, HU Jianrong, QIN Linbo |
| |
|
Imperfect wheat kernel recognition combined with image enhancement and conventional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 911-916
[Abstract]
(626)
[HTML 1 KB]
[PDF 1123 KB]
(867)
|
|
|
939 |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang |
| |
|
Data trading scheme based on blockchain and trusted computing |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 939-944
[Abstract]
(1095)
[HTML 1 KB]
[PDF 1137 KB]
(1529)
|
|
|
2076 |
TAN Daoqiang, ZENG Cheng, QIAO Jinxia, ZHANG Jun |
| |
|
Shadow detection method based on hybrid attention model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2076-2081
[Abstract]
(538)
[HTML 1 KB]
[PDF 1583 KB]
(386)
|
|
|
1908 |
WU Guangli, LI Leiting, GUO Zhenzhou, WANG Chengxiang |
| |
|
Video summarization generation model based on improved bi-directional long short-term memory network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1908-1914
[Abstract]
(788)
[HTML 1 KB]
[PDF 1515 KB]
(865)
|
|
|
1055 |
CUI Bowen, JIN Tao, WANG Jianmin |
| |
|
Overview of information extraction of free-text electronic medical records |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1055-1063
[Abstract]
(920)
[HTML 1 KB]
[PDF 1090 KB]
(1462)
|
|
|
280 |
SUN Zhongjie, WAN Tao, CHEN Dong, WANG Hao, ZHAO Yanli, QIN Zengchang |
| |
|
Application of deep learning in histopathological image classification of aortic medial degeneration |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 280-285
[Abstract]
(751)
[HTML 1 KB]
[PDF 1150 KB]
(786)
|
|
|
1100 |
WANG Ning, SONG Huihui, ZHANG Kaihua |
| |
|
Accurate object tracking algorithm based on distance weighting overlap prediction and ellipse fitting optimization |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1100-1105
[Abstract]
(564)
[HTML 1 KB]
[PDF 2560 KB]
(479)
|
|
|
2039 |
LI Hui, WU Chuansheng, LIU Jun, LIU Wen |
| |
|
Image smoothing method based on gradient surface area and sparsity constraints |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2039-2047
[Abstract]
(599)
[HTML 1 KB]
[PDF 6854 KB]
(299)
|
|
|
1701 |
YAO Jie, CHENG Chunling, HAN Jing, LIU Zheng |
| |
|
Anomaly detection method based on multi-task temporal convolutional network in cloud workflow |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1701-1708
[Abstract]
(612)
[HTML 1 KB]
[PDF 1677 KB]
(931)
|
|
|
1128 |
LI Yan, CHEN Qiaoping |
| |
|
Internet rumor propagation model considering non-supportive comments |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1128-1135
[Abstract]
(454)
[HTML 1 KB]
[PDF 1088 KB]
(727)
|
|
|
1227 |
LI Xueqing, WANG Shi, WANG Zhujun, ZHU Junwu |
| |
|
Summarization of natural language generation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1227-1235
[Abstract]
(2971)
[HTML 1 KB]
[PDF 1165 KB]
(4012)
|
|
|
1527 |
XU Meng, WANG Yakun |
| |
|
Remaining useful life prediction of DA40 aircraft carbon brake pads based on bidirectional long short-term memory network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1527-1532
[Abstract]
(576)
[HTML 1 KB]
[PDF 1636 KB]
(1250)
|
|
|
1432 |
GUO Maozu, YANG Qiannan, ZHAO Lingling |
| |
|
Image generation based on conditional-Wassertein generative adversarial network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1432-1437
[Abstract]
(555)
[HTML 1 KB]
[PDF 2259 KB]
(628)
|
|
|
1419 |
LIU Ziyan, MA Shanshan, BAI He |
| |
|
Orthogonal matching pursuit hybrid precoding algorithm based on improved intelligent water drop |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1419-1424
[Abstract]
(446)
[HTML 1 KB]
[PDF 956 KB]
(551)
|
|
|
1299 |
ZHANG Wenye, SHANG Fangxin, GUO Hao |
| |
|
Mixed precision neural network quantization method based on Octave convolution |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1299-1304
[Abstract]
(508)
[HTML 1 KB]
[PDF 2485 KB]
(458)
|
|
|
1247 |
WANG Zhujun, WANG Shi, LI Xueqing, ZHU Junwu |
| |
|
Review of event causality extraction based on deep learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1247-1255
[Abstract]
(3247)
[HTML 1 KB]
[PDF 1460 KB]
(5196)
|
|
|
694 |
LONG Guangyu, CHEN Yiqiang, XING Yunbing |
| |
|
Text correction and completion method in continuous sign language recognition |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 694-698
[Abstract]
(612)
[HTML 1 KB]
[PDF 877 KB]
(1349)
|
|
|
774 |
REN Yiming, WANG Rangding, YAN Diqun, LIN Yuzhen |
| |
|
Speech steganalysis method based on deep residual network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 774-779
[Abstract]
(603)
[HTML 1 KB]
[PDF 1026 KB]
(860)
|
|
|
833 |
SUN Qichang, MAI Yongfeng, CHEN Xiaojun |
| |
|
Fast calibration algorithm in surgical navigation system based on augmented reality |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 833-838
[Abstract]
(682)
[HTML 1 KB]
[PDF 1272 KB]
(1005)
|
|
|
904 |
LUO Hui, JIA Chen, LU Chunyu, LI Jian |
| |
|
Rail tread block defects detection method based on improved Faster R-CNN |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 904-910
[Abstract]
(640)
[HTML 1 KB]
[PDF 1562 KB]
(878)
|
|
|
1631 |
ZHANG Sun, YIN Chunyong |
| |
|
Sequential multimodal sentiment analysis model based on multi-task learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1631-1639
[Abstract]
(1085)
[HTML 1 KB]
[PDF 1150 KB]
(1526)
|
|
|
1640 |
ZHAO Xiaohu, LI Xiao |
| |
|
Image captioning algorithm based on multi-feature extraction |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1640-1646
[Abstract]
(624)
[HTML 1 KB]
[PDF 1144 KB]
(737)
|
|
|
1659 |
DAI Yanran, DAI Guoqing, YUAN Yubo |
| |
|
Multi-face foreground extraction method based on skin color learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1659-1666
[Abstract]
(527)
[HTML 1 KB]
[PDF 1935 KB]
(661)
|
|
|
330 |
NAN Ning, YANG Chengyi, WU Zhihao |
| |
|
Multi-graph neural network-based session perception recommendation model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 330-336
[Abstract]
(816)
[HTML 1 KB]
[PDF 1052 KB]
(679)
|
|
|
537 |
DU Peide, YAN Hua |
| |
|
Crowd counting network based on multi-scale spatial attention feature fusion |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 537-543
[Abstract]
(643)
[HTML 1 KB]
[PDF 1581 KB]
(1621)
|
|
|
479 |
FU Anbing, WEI Wenhong, ZHANG Yuhui, GUO Wenjing |
| |
|
Real-valued Cartesian genetic programming algorithm based on quasi-oppositional mutation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 479-485
[Abstract]
(676)
[HTML 1 KB]
[PDF 1178 KB]
(537)
|
|
|
307 |
MENG Xiangrui, YANG Wenzhong, WANG Ting |
| |
|
Survey of sentiment analysis based on image and text fusion |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 307-317
[Abstract]
(1116)
[HTML 1 KB]
[PDF 1277 KB]
(1926)
|
|
|
590 |
KONG Lingxu, WU Haifeng, ZENG Yu, LU Xiaoling |
| |
|
Diagnosis of mild cognitive impairment using deep learning and brain functional connectivities with different frequency dimensions |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 590-597
[Abstract]
(574)
[HTML 1 KB]
[PDF 1848 KB]
(553)
|
|
|
598 |
CHANG Zheng, LUO Ping, YANG Bo, ZHANG Xiaoxiao |
| |
|
Respiratory sound recognition of chronic obstructive pulmonary disease patients based on HHT-MFCC and short-term energy |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 598-603
[Abstract]
(623)
[HTML 1 KB]
[PDF 1298 KB]
(777)
|
|
|
812 |
WANG Xiaofeng, JIANG Penglong, ZHOU Hui, ZHAO Xiongbo |
| |
|
Design of FPGA accelerator with high parallelism for convolution neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 812-819
[Abstract]
(883)
[HTML 1 KB]
[PDF 1115 KB]
(973)
|
|
|
845 |
WANG Yongjin, ZUO Yu, WU Lian, CUI Zhongwei, ZHAO Chenjie |
| |
|
Image super-resolution reconstruction based on attention mechanism |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 845-850
[Abstract]
(695)
[HTML 1 KB]
[PDF 2394 KB]
(552)
|
|
|
441 |
HUANG Siyuan, ZHANG Minqing, KE Yan, BI Xinliang |
| |
|
Image steganalysis method based on saliency detection |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 441-448
[Abstract]
(768)
[HTML 1 KB]
[PDF 1782 KB]
(939)
|
|
|
1005 |
QIN Li, HAO Zhigang, LI Guoliang |
| |
|
Construction and correlation analysis of national food safety standard graph |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1005-1011
[Abstract]
(610)
[HTML 1 KB]
[PDF 2022 KB]
(951)
|
|
|
350 |
WANG Xiaoxia, QIAN Xuezhong, SONG Wei |
| |
|
Relation extraction model via attention-based graph convolutional network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 350-356
[Abstract]
(620)
[HTML 1 KB]
[PDF 995 KB]
(1879)
|
|
|
1891 |
WU Guoliang, XU Jining |
| |
|
Chinese emergency event extraction method based on named entity recognition task feedback enhancement |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1891-1896
[Abstract]
(634)
[HTML 1 KB]
[PDF 1083 KB]
(697)
|
|
|
1723 |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan |
| |
|
Optimized CKKS scheme based on learning with errors problem |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1723-1728
[Abstract]
(1331)
[HTML 1 KB]
[PDF 760 KB]
(1085)
|
|
|
1667 |
ZHANG Hui, ZHANG Nana, HUANG Jun |
| |
|
Multi-angle head pose estimation method based on optimized LeNet-5 network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1667-1672
[Abstract]
(514)
[HTML 1 KB]
[PDF 1102 KB]
(860)
|
|
|
1438 |
LIANG Min, WANG Haorong, ZHANG Yao, LI Jie |
| |
|
Image super-resolution reconstruction method based on accelerated residual network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1438-1444
[Abstract]
(633)
[HTML 1 KB]
[PDF 2387 KB]
(518)
|
|
|
1492 |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng |
| |
|
Self-generated deep neural network based 4D trajectory prediction |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1492-1499
[Abstract]
(667)
[HTML 1 KB]
[PDF 1396 KB]
(633)
|
|
|
1933 |
GAO Qinquan, HUANG Bingcheng, LIU Wenzhe, TONG Tong |
| |
|
Bamboo strip surface defect detection method based on improved CenterNet |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1933-1938
[Abstract]
(1161)
[HTML 1 KB]
[PDF 1734 KB]
(709)
|
|
|
2108 |
YANG Zhen, MA Jianxiao, WANG Baojie |
| |
|
Signal timing optimization model of dual-ring phase under condition of setting waiting area |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2108-2112
[Abstract]
(491)
[HTML 1 KB]
[PDF 909 KB]
(402)
|
|
|
2003 |
ZHAO Qiuyun, WEI Le, SHU Hongping |
| |
|
Construction method of cloud manufacturing virtual workshop for manufacturing tasks |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2003-2011
[Abstract]
(510)
[HTML 1 KB]
[PDF 1325 KB]
(416)
|
|
|
1256 |
SUN Heli, SUN Yuzhu, ZHANG Xiaoyun |
| |
|
Event description generation based on generative adversarial network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1256-1261
[Abstract]
(609)
[HTML 1 KB]
[PDF 971 KB]
(982)
|
|
|
1236 |
LIU Ruiheng, YE Xia, YUE Zengying |
| |
|
Review of pre-trained models for natural language processing tasks |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1236-1246
[Abstract]
(1150)
[HTML 1 KB]
[PDF 1296 KB]
(3289)
|
|
|
611 |
LIU Zhuan, HAN Ruichen, ZHANG Yansong, CHEN Yueguo, ZHANG Yu |
| |
|
Database star-join optimization for multicore CPU and GPU platforms |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 611-617
[Abstract]
(851)
[HTML 1 KB]
[PDF 1026 KB]
(1063)
|
|
|
1761 |
YAN Junhua, HOU Ping, ZHANG Yin, LYU Xiangyang, MA Yue, WANG Gaofei |
| |
|
Image single distortion type judgment method based on two-channel convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1761-1766
[Abstract]
(490)
[HTML 1 KB]
[PDF 1095 KB]
(510)
|
|
|
623 |
TANG Chen, HUANG Guorui, JIN Peiquan |
| |
|
NVM-LH: non-volatile memory-friendly linear hash index |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 623-629
[Abstract]
(565)
[HTML 1 KB]
[PDF 1035 KB]
(741)
|
|
|
1767 |
JING Beibei, GUO Jia, WANG Liqing, CHEN Jing, DING Hongwei |
| |
|
Image double blind denoising algorithm combining with denoising convolutional neural network and conditional generative adversarial net |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1767-1774
[Abstract]
(496)
[HTML 1 KB]
[PDF 1447 KB]
(589)
|
|
|
1741 |
ZHANG Chen, TIAN Tian, YANG Xiuting, GONG Dunwei |
| |
|
Communication coverage reduction method of parallel programs based on dominant relation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1741-1747
[Abstract]
(464)
[HTML 1 KB]
[PDF 944 KB]
(454)
|
|
|
1805 |
WANG Xianwu, ZHANG Ting, JI Xin, DU Yi |
| |
|
3D shale digital core reconstruction method based on deep convolutional generative adversarial network with gradient penalty |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1805-1811
[Abstract]
(649)
[HTML 1 KB]
[PDF 2129 KB]
(620)
|
|
|
1748 |
CHENG Meiying, QIAN Qian, NI Zhiwei, ZHU Xuhui |
| |
|
Self-organized migrating algorithm for multi-task optimization with information filtering |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1748-1755
[Abstract]
(640)
[HTML 1 KB]
[PDF 1172 KB]
(421)
|
|
|
1484 |
LUAN Jianing, ZHANG Wei, SUN Wei, ZHANG Ao, HAN Dong |
| |
|
High-accuracy localization algorithm based on fusion of two-dimensional code vision and laser lidar |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1484-1491
[Abstract]
(1190)
[HTML 1 KB]
[PDF 2182 KB]
(1146)
|
|
|
1314 |
WANG Xin, ZHU Haohua, LIU Guangcan |
| |
|
Convolution robust principal component analysis |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1314-1318
[Abstract]
(763)
[HTML 1 KB]
[PDF 2704 KB]
(682)
|
|
|
1522 |
XU Guobao, CHEN Yuanxiao, WANG Ji |
| |
|
Drug-target association prediction algorithm based on graph convolutional network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1522-1526
[Abstract]
(593)
[HTML 1 KB]
[PDF 892 KB]
(528)
|
|
|
1290 |
JIA Heming, JIANG Zichao, LI Yao, SUN Kangjian |
| |
|
Simultaneous feature selection optimization based on improved spotted hyena optimizer algorithm |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1290-1298
[Abstract]
(681)
[HTML 1 KB]
[PDF 1335 KB]
(744)
|
|
|
133 |
ZHOU Chaoran, ZHAO Jianping, MA Tai, ZHOU Xin |
| |
|
Web page blacklist discrimination method based on attention mechanism and ensemble learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 133-138
[Abstract]
(554)
[HTML 1 KB]
[PDF 1076 KB]
(585)
|
|
|
1785 |
LI Congdong, HUANG Hao, ZHANG Fanshun |
| |
|
Knowledge sharing behavior incentive mechanism for lead users based on evolutionary game |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1785-1791
[Abstract]
(523)
[HTML 1 KB]
[PDF 1217 KB]
(410)
|
|
|
1756 |
WANG Yu, LIU Yanli, CHEN Shaowu |
| |
|
Maximum common induced subgraph algorithm based on vertex conflict learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1756-1760
[Abstract]
(661)
[HTML 1 KB]
[PDF 962 KB]
(665)
|
|
|
1386 |
GUO Shuai, SU Yang |
| |
|
Encrypted traffic classification method based on data stream |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1386-1391
[Abstract]
(791)
[HTML 1 KB]
[PDF 948 KB]
(1561)
|
|
|
738 |
GUO Jia, HAN Litao, SUN Xianlong, ZHOU Lijuan |
| |
|
Comparative density peaks clustering algorithm with automatic determination of clustering center |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 738-744
[Abstract]
(837)
[HTML 1 KB]
[PDF 2809 KB]
(712)
|
|
|
1445 |
YANG Mengmeng, ZHANG Aihua |
| |
|
Fractal image compression based on gray-level co-occurrence matrix and simultaneous orthogonal matching pursuit |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1445-1449
[Abstract]
(711)
[HTML 1 KB]
[PDF 968 KB]
(525)
|
|
|
1262 |
LI Wenhui, ZENG Shangyou, WANG Jinjin |
| |
|
Image description generation algorithm based on improved attention mechanism |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1262-1267
[Abstract]
(733)
[HTML 1 KB]
[PDF 1413 KB]
(1599)
|
|
|
1221 |
OU Lili, SHAO Fengjing, SUN Rencheng, SUI Yi |
| |
|
Cerebral infarction image recognition based on semi-supervised method |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1221-1226
[Abstract]
(669)
[HTML 1 KB]
[PDF 1167 KB]
(719)
|
|
|
150 |
LIU Nanbo, XIAO Fen, ZHANG Wenlei, LI Wangxin, WENG Zun |
| |
|
Group scanpath generation based on fixation regions of interest clustering and transferring |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 150-156
[Abstract]
(559)
[HTML 1 KB]
[PDF 2048 KB]
(543)
|
|
|
139 |
LUO Jun, CHEN Lifei |
| |
|
Sentiment classification of incomplete data based on bidirectional encoder representations from transformers |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 139-144
[Abstract]
(580)
[HTML 1 KB]
[PDF 921 KB]
(1484)
|
|
|
112 |
LI Congcong, LIU Jinglei |
| |
|
Generating CP-nets with bounded tree width based on Dandelion code |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 112-120
[Abstract]
(451)
[HTML 1 KB]
[PDF 1221 KB]
(1242)
|
|
|
43 |
XU Zhoubo, LI Zhen, LIU Huadong, LI Ping |
| |
|
Subgraph isomorphism matching algorithm based on neighbor information aggregation |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 43-47
[Abstract]
(682)
[HTML 1 KB]
[PDF 755 KB]
(719)
|
|
|
199 |
GAO Shile, WANG Ying, LI Hailin, WAN Xiaoji |
| |
|
Prediction method on financial time series data based on matrix profile |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 199-207
[Abstract]
(689)
[HTML 1 KB]
[PDF 1433 KB]
(1109)
|
|
|
636 |
ZHANG Xiaowei, JIANG Dawei, CHEN Ke, CHEN Gang |
| |
|
AAC-Hunter: efficient algorithm for discovering aggregation algebraic constraints in relational databases |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 636-642
[Abstract]
(511)
[HTML 1 KB]
[PDF 1077 KB]
(791)
|
|
|
657 |
SHEN Chen, TAI Lingxiang, PENG Yuwei |
| |
|
Dynamic workload matching method for automatic parameter tuning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 657-661
[Abstract]
(575)
[HTML 1 KB]
[PDF 867 KB]
(679)
|
|
|
1042 |
HUO Shoujun, HAO Yan, SHI Huiyu, DONG Yanqing, CAO Rui |
| |
|
Pattern recognition of motor imagery EEG based on deep convolutional network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1042-1048
[Abstract]
(694)
[HTML 1 KB]
[PDF 2049 KB]
(711)
|
|
|
976 |
CHE Bingqian, ZHOU Dong |
| |
|
Tag recommendation method combining network structure information and text content |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 976-983
[Abstract]
(579)
[HTML 1 KB]
[PDF 1060 KB]
(859)
|
|
|
1406 |
ZHENG Liping, WANG Jianqiang, ZHANG Yuzhao, DONG Zuofan |
| |
|
Vehicle number optimization approach of autonomous vehicle fleet driven by multi-spatio-temporal distribution task |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1406-1411
[Abstract]
(506)
[HTML 1 KB]
[PDF 1248 KB]
(949)
|
|
|
643 |
LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia |
| |
|
Personalized privacy protection for spatio-temporal data |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 643-650
[Abstract]
(684)
[HTML 1 KB]
[PDF 1280 KB]
(1013)
|
|
|
662 |
REN Yuanyuan, WANG Chuanjian |
| |
|
Remote sensing time-series images classification algorithm with abnormal data |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (3): 662-668
[Abstract]
(579)
[HTML 1 KB]
[PDF 1226 KB]
(1049)
|
|
|
3490 |
WANG Yajie, ZHANG Yunbo, WU Yanyan, DING Aodong, QI Bingzhi |
| |
|
General chess piece positioning method under uneven illumination |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3490-3498
[Abstract]
(545)
[HTML 1 KB]
[PDF 3060 KB]
(402)
|
|
|
3485 |
ZHANG Xiaochuan, DAI Xuyao, LIU Lu, FENG Tianshuo |
| |
|
Chinese short text classification model with multi-head self-attention mechanism |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3485-3489
[Abstract]
(853)
[HTML 1 KB]
[PDF 806 KB]
(973)
|
|
|
3413 |
LIU Jingshu, WANG Li, LIU Jinglei |
| |
|
Fast spectral clustering algorithm without eigen-decomposition |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3413-3422
[Abstract]
(574)
[HTML 1 KB]
[PDF 1407 KB]
(715)
|
|
|
3451 |
CHEN Li, DING Shifei, YU Wenjia |
| |
|
Lightweight convolutional neural network based on cross-channel fusion and cross-module connection |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3451-3457
[Abstract]
(706)
[HTML 1 KB]
[PDF 1104 KB]
(816)
|
|
|
571 |
WANG Peng, LI Yanwen, YANG Di, YANG Huamin |
| |
|
Macroscopic fundamental diagram traffic signal control model based on hierarchical control |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 571-576
[Abstract]
(619)
[HTML 1 KB]
[PDF 1351 KB]
(834)
|
|
|
318 |
QIU Ningjia, WANG Xiaoxia, WANG Peng, WANG Yanchun |
| |
|
Analysis of double-channel Chinese sentiment model integrating grammar rules |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 318-323
[Abstract]
(673)
[HTML 1 KB]
[PDF 1093 KB]
(1263)
|
|
|
544 |
FU Qianhui, LI Qingkui, FU Jingnan, WANG Yu |
| |
|
Dense crowd counting model based on spatial dimensional recurrent perception network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 544-549
[Abstract]
(558)
[HTML 1 KB]
[PDF 1486 KB]
(983)
|
|
|
1392 |
WANG Yijie, FAN Jiafei, WANG Chenyu |
| |
|
Two-stage task offloading strategy based on game theory in cloud-edge environment |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1392-1398
[Abstract]
(620)
[HTML 1 KB]
[PDF 910 KB]
(742)
|
|
|
1113 |
LI Jing, LUO Jinfei, LI Bingchao |
| |
|
Reliability analysis models for replication-based storage systems with proactive fault tolerance |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1113-1121
[Abstract]
(483)
[HTML 1 KB]
[PDF 1396 KB]
(581)
|
|
|
1305 |
GAN Lan, SHEN Hongfei, WANG Yao, ZHANG Yuejin |
| |
|
Data augmentation method based on improved deep convolutional generative adversarial networks |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1305-1313
[Abstract]
(1312)
[HTML 1 KB]
[PDF 1499 KB]
(1738)
|
|
|
1533 |
FU Zhuoxin, SUN Hao, CHEN Jianwen, GUO Yue, CHEN Jin |
| |
|
Construction of fracture reduction robot system based on cyber-physical systems |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1533-1538
[Abstract]
(495)
[HTML 1 KB]
[PDF 1497 KB]
(769)
|
|
|
1332 |
CHEN Zhengtao, HUANG Can, YANG Bo, ZHAO Li, LIAO Yong |
| |
|
Yak face recognition algorithm of parallel convolutional neural network based on transfer learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1332-1336
[Abstract]
(631)
[HTML 1 KB]
[PDF 842 KB]
(947)
|
|
|
1071 |
YAN Aijun, WEI Zhiyuan |
| |
|
Weight allocation and case base maintenance method of case-based reasoning classifier |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1071-1077
[Abstract]
(530)
[HTML 1 KB]
[PDF 871 KB]
(916)
|
|
|
1148 |
LI Shanshan, ZHAO Li, ZHANG Hongli |
| |
|
Image grey level encryption based on cat map |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1148-1152
[Abstract]
(610)
[HTML 1 KB]
[PDF 1056 KB]
(598)
|
|
|
1172 |
WU Lei, YANG Xiaomin |
| |
|
Improved remote sensing image fusion algorithm based on channel attention feedback network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1172-1178
[Abstract]
(541)
[HTML 1 KB]
[PDF 5163 KB]
(674)
|
|
|
1078 |
YANG Fengrui, HUO Na, ZHANG Xuhong, WEI Wei |
| |
|
Topic-expanded emotional conversation generation based on attention mechanism |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1078-1083
[Abstract]
(835)
[HTML 1 KB]
[PDF 937 KB]
(1209)
|
|
|
1184 |
XU Feixue, LIU Qinming, OUYANG Hailing, YE Chunming |
| |
|
Optimization of maintenance strategy model for multi-component system based on performance-based contract |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1184-1191
[Abstract]
(582)
[HTML 1 KB]
[PDF 1141 KB]
(656)
|
|
|
145 |
WU Xiaoping, ZHANG Qiang, ZHAO Fang, JIAO Lin |
| |
|
Entity relation extraction method for guidelines of cardiovascular disease based on bidirectional encoder representation from transformers |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 145-149
[Abstract]
(978)
[HTML 1 KB]
[PDF 823 KB]
(1335)
|
|
|
3701 |
HE Xiangyu, LI Jing, YANG Shuqiang, XIA Yujie |
| |
|
Extended target tracking algorithm based on ET-PHD filter and variational Bayesian approximation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3701-3706
[Abstract]
(558)
[HTML 1 KB]
[PDF 1020 KB]
(484)
|
|
|
577 |
FAN Xiaomao, XIONG Honglin, ZHAO Gansen |
| |
|
Cleaning scheduling model with constraints and its solution |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 577-582
[Abstract]
(821)
[HTML 1 KB]
[PDF 876 KB]
(553)
|
|
|
324 |
SUN Heli, XU Tong, HE Liang, JIA Xiaolin |
| |
|
Personalized social event recommendation method integrating user historical behaviors and social relationships |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 324-329
[Abstract]
(598)
[HTML 1 KB]
[PDF 919 KB]
(850)
|
|
|
422 |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang |
| |
|
Efficient dynamic data audit scheme for resource-constrained users |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 422-432
[Abstract]
(699)
[HTML 1 KB]
[PDF 1658 KB]
(633)
|
|
|
433 |
HANG Mengxin, CHEN Wei, ZHANG Renjie |
| |
|
Abnormal flow detection based on improved one-dimensional convolutional neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 433-440
[Abstract]
(976)
[HTML 1 KB]
[PDF 1011 KB]
(889)
|
|
|
357 |
XU Li, LI Jianhua |
| |
|
Biomedical named entity recognition with graph network based on syntactic dependency parsing |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 357-362
[Abstract]
(656)
[HTML 1 KB]
[PDF 845 KB]
(1232)
|
|
|
127 |
TAN Jinyuan, DIAO Yufeng, QI Ruihua, LIN Hongfei |
| |
|
Automatic summary generation of Chinese news text based on BERT-PGN model |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 127-132
[Abstract]
(1651)
[HTML 1 KB]
[PDF 857 KB]
(2927)
|
|
|
191 |
LIANG Zhen, FANG Tiyu, LI Jinping |
| |
|
Precise visual navigation method for agricultural robot based on virtual navigation line |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 191-198
[Abstract]
(596)
[HTML 1 KB]
[PDF 1980 KB]
(646)
|
|
|
265 |
MA Tingting, JI Tianjiao, YANG Guanyu, CHEN Yang, XU Wenbo, LIU Hongtu |
| |
|
Incidence trend prediction of hand-foot-mouth disease based on long short-term memory neural network |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 265-269
[Abstract]
(546)
[HTML 1 KB]
[PDF 892 KB]
(829)
|
|
|
185 |
LIU Sijia, TONG Xiangrong |
| |
|
Urban transportation path planning based on reinforcement learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 185-190
[Abstract]
(1164)
[HTML 1 KB]
[PDF 1042 KB]
(871)
|
|
|
3563 |
LI Ming, HU Jiangping, CAO Xiaoli, PENG Peng |
| |
|
Heterogeneous directional sensor node scheduling algorithm for differentiated coverage |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3563-3570
[Abstract]
(508)
[HTML 1 KB]
[PDF 986 KB]
(468)
|
|
|
550 |
LI Weiqiang, LEI Hang, ZHANG Jingyu, WANG Xupeng |
| |
|
3D hand pose estimation based on label distribution learning |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 550-555
[Abstract]
(598)
[HTML 1 KB]
[PDF 1109 KB]
(688)
|
|
|
3534 |
ZHU Lin, NING Qian, LEI Yinjie, CHEN Bingcai |
| |
|
Remaining useful life prediction for turbofan engines by genetic algorithm-based selective ensembling and temporal convolutional network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3534-3540
[Abstract]
(648)
[HTML 1 KB]
[PDF 970 KB]
(1192)
|
|
|
3558 |
SHI Wenxu, BAO Jiahui, YAO Yu |
| |
|
Remote sensing image target detection and identification based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3558-3562
[Abstract]
(980)
[HTML 1 KB]
[PDF 1188 KB]
(1433)
|
|
|
87 |
CHEN Zhen, ZHONG Yiwen, LIN Juan |
| |
|
Hybrid greedy genetic algorithm for solving 0-1 knapsack problem |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 87-94
[Abstract]
(841)
[HTML 1 KB]
[PDF 974 KB]
(871)
|
|
|
2455 |
ZHU Lin, YU Haitao, LEI Xinyu, LIU Jing, WANG Ruofan |
| |
|
Brain network feature identification algorithm for Alzheimer's patients based on MRI image |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2455-2459
[Abstract]
(711)
[HTML 1 KB]
[PDF 915 KB]
(430)
|
|
|
2171 |
WU Haiyan, LIU Ying |
| |
|
Stylistic multiple features mining based on attention network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2171-2181
[Abstract]
(598)
[HTML 1 KB]
[PDF 1584 KB]
(910)
|
|
|
2531 |
YANG Yunlong, SUN Jianqiang, SONG Guochao |
| |
|
Text sentiment analysis based on gated recurrent unit and capsule features |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2531-2535
[Abstract]
(507)
[HTML 1 KB]
[PDF 781 KB]
(667)
|
|
|
2586 |
GOU Zi'an, ZHANG Xiao, WU Dongnan, WANG Yanqiu |
| |
|
Log analysis and workload characteristic extraction in distributed storage system |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2586-2593
[Abstract]
(625)
[HTML 1 KB]
[PDF 1136 KB]
(835)
|
|
|
2441 |
XIA Lunteng, ZHANG Li |
| |
|
Networked cane system for blind people based on K-nearest neighbor and dynamic time warping algorithms |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2441-2448
[Abstract]
(716)
[HTML 1 KB]
[PDF 1566 KB]
(1382)
|
|
|
3081 |
AN Xin, KANG An, XIA Jinwei, LI Jianhua, CHEN Tian, REN Fuji |
| |
|
Heterogeneous sensing multi-core scheduling method based on machine learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3081-3087
[Abstract]
(595)
[HTML 1 KB]
[PDF 1048 KB]
(979)
|
|
|
2743 |
YUAN Quan, WANG Yan, LI Yuxian |
| |
|
Fast algorithm for distance regularized level set evolution model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2743-2747
[Abstract]
(493)
[HTML 1 KB]
[PDF 1693 KB]
(519)
|
|
|
2639 |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei |
| |
|
Auditable signature scheme for blockchain based on secure multi-party |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2639-2645
[Abstract]
(667)
[HTML 1 KB]
[PDF 983 KB]
(858)
|
|
|
2951 |
HAO Qinxia |
| |
|
Course recommendation system based on R2 index and multi-objective differential evolution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2951-2959
[Abstract]
(531)
[HTML 1 KB]
[PDF 1063 KB]
(495)
|
|
|
2305 |
XU Qiuyan, MA Liang, LIU Yong |
| |
|
Yin-Yang-pair optimization algorithm based on chaos search and intricate operator |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2305-2312
[Abstract]
(605)
[HTML 1 KB]
[PDF 1180 KB]
(591)
|
|
|
2465 |
ZHENG Yanbin, HAN Mengyun, FAN Wenxin |
| |
|
Handwritten Chinese character recognition based on two dimensional principal component analysis and convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2465-2471
[Abstract]
(620)
[HTML 1 KB]
[PDF 1282 KB]
(649)
|
|
|
2313 |
LUO Xiangyu, LI Jianan, LUO Xiaoxia, WANG Jia |
| |
|
Improved community evolution relationship analysis method for dynamic graphs |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2313-2318
[Abstract]
(507)
[HTML 1 KB]
[PDF 3929 KB]
(512)
|
|
|
2536 |
YIN Chunyong, ZHANG Sun |
| |
|
End-to-end adversarial variational Bayes method for short text sentiment classification |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2536-2542
[Abstract]
(552)
[HTML 1 KB]
[PDF 1653 KB]
(838)
|
|
|
2479 |
WEI Wenyu, YANG Wenzhong, MA Guoxiang, HUANG Mei |
| |
|
Survey of person re-identification technology based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2479-2492
[Abstract]
(888)
[HTML 1 KB]
[PDF 1851 KB]
(1681)
|
|
|
2410 |
YAN Huajian, ZHANG Guofu, SU Zhaopin, LIU Yang |
| |
|
Modeling and solving of high-dimensional multi-objective adaptive allocation for emergency relief supplies |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2410-2419
[Abstract]
(539)
[HTML 1 KB]
[PDF 1120 KB]
(935)
|
|
|
2236 |
ZHOU Yun, CHEN Shurong |
| |
|
Behavior recognition method based on two-stream non-local residual network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2236-2240
[Abstract]
(674)
[HTML 1 KB]
[PDF 1122 KB]
(638)
|
|
|
3166 |
CAO Yudong, CAI Xibiao |
| |
|
No-reference image quality assessment algorithm with enhanced adversarial learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3166-3171
[Abstract]
(701)
[HTML 1 KB]
[PDF 1035 KB]
(761)
|
|
|
2706 |
WANG Mingfen |
| |
|
Handover access scheme in software-defined wireless local area network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2706-2711
[Abstract]
(627)
[HTML 1 KB]
[PDF 1522 KB]
(622)
|
|
|
2507 |
RONG Wei, JIANG Zheyuan, XIE Zhao, WU Kewei |
| |
|
Clustering relational network for group activity recognition |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2507-2513
[Abstract]
(592)
[HTML 1 KB]
[PDF 1376 KB]
(602)
|
|
|
2493 |
QIU Yaoru, SUN Weijun, HUANG Yonghui, TANG Yuqi, ZHANG Haochuan, WU Junpeng |
| |
|
Person re-identification method based on GAN uniting with spatial-temporal pattern |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2493-2498
[Abstract]
(563)
[HTML 1 KB]
[PDF 966 KB]
(890)
|
|
|
2737 |
CHEN Lixia, BAN Ying, WANG Xuewen |
| |
|
Background subtraction based on tensor nuclear norm and 3D total variation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2737-2742
[Abstract]
(698)
[HTML 1 KB]
[PDF 950 KB]
(648)
|
|
|
2241 |
LIN Zhixing, WANG Like |
| |
|
Network situation prediction method based on deep feature and Seq2Seq model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2241-2247
[Abstract]
(491)
[HTML 1 KB]
[PDF 1073 KB]
(707)
|
|
|
3526 |
LIU Ziwei, DENG Chunhua, LIU Jing |
| |
|
Object detection algorithm based on asymmetric hourglass network structure |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3526-3533
[Abstract]
(649)
[HTML 1 KB]
[PDF 1337 KB]
(948)
|
|
|
407 |
WEN Chaodong, ZENG Cheng, REN Junwei, ZHANG Yan |
| |
|
Patent text classification based on ALBERT and bidirectional gated recurrent unit |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (2): 407-412
[Abstract]
(893)
[HTML 1 KB]
[PDF 979 KB]
(935)
|
|
|
3658 |
PI Jiatian, YANG Jiezhi, YANG Linxi, PENG Mingjie, DENG Xiong, ZHAO Lijun, TANG Wanmei, WU Zhiyou |
| |
|
Lightweight face liveness detection method based on multi-modal feature fusion |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3658-3665
[Abstract]
(798)
[HTML 1 KB]
[PDF 1582 KB]
(856)
|
|
|
3624 |
FAN Fan, GAO Yuan, QIN Pinle, WANG Lifang |
| |
|
Abdominal MRI image multi-scale super-resolution reconstruction based on parallel channel-spatial attention mechanism |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3624-3630
[Abstract]
(526)
[HTML 1 KB]
[PDF 1111 KB]
(575)
|
|
|
22 |
LI Erchao, LI Kangwei |
| |
|
Decomposition based many-objective evolutionary algorithm based on minimum distance and aggregation strategy |
| |
|
|
Journal of Computer Applications
2021 Vol.41 (1): 22-28
[Abstract]
(570)
[HTML 1 KB]
[PDF 953 KB]
(601)
|
|
|
3520 |
WANG Yiting, ZHANG Ke, LI Jie, HAO Zongbo, DUAN Chang, ZHU Ce |
| |
|
Recognition and localization method of super-large-scale variance objects in the same scene |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3520-3525
[Abstract]
(541)
[HTML 1 KB]
[PDF 1355 KB]
(691)
|
|
|
3666 |
CHEN Fang, LIU Xiaorui, YANG Mingye |
| |
|
Face recognition security system based on liveness detection and authentication |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3666-3672
[Abstract]
(695)
[HTML 1 KB]
[PDF 1545 KB]
(814)
|
|
|
3550 |
XU Changqing, CHEN Zhenjie, HOU Renfu |
| |
|
Deep learning classification method of Landsat 8 OLI images based on inaccurate prior knowledge |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3550-3557
[Abstract]
(719)
[HTML 1 KB]
[PDF 2305 KB]
(515)
|
|
|
3586 |
HUANG Xiuli, HUANG Jin, YU Pengfei, MIAO Weiwei, YANG Ruxia, LI Yijing, YU Peng |
| |
|
Security-risk-oriented distributed resource allocation method in power wireless private network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3586-3593
[Abstract]
(558)
[HTML 1 KB]
[PDF 2051 KB]
(471)
|
|
|
3119 |
ZHAO Ji, CHENG Cheng |
| |
|
Dynamic cooperative random drift particle swarm optimization algorithm assisted by evolution information |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3119-3126
[Abstract]
(539)
[HTML 1 KB]
[PDF 941 KB]
(654)
|
|
|
2164 |
XIONG Yong, ZHANG Jia, YU Jiajun, ZHANG Benren, LIANG Xuanzhuo, ZHU Qige |
| |
|
Intelligent layout optimization algorithm for 3D pipelines of ships |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2164-2170
[Abstract]
(1033)
[HTML 1 KB]
[PDF 1094 KB]
(768)
|
|
|
2795 |
HE Haochen, ZHANG Danhong |
| |
|
Recommendation method based on multidimensional social relationship embedded deep graph neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2795-2803
[Abstract]
(639)
[HTML 1 KB]
[PDF 1544 KB]
(1474)
|
|
|
3261 |
QIN Nan, MA Liang, HUANG Rui |
| |
|
Software safety requirement analysis and verification method based on system theoretic process analysis |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3261-3266
[Abstract]
(575)
[HTML 1 KB]
[PDF 2126 KB]
(579)
|
|
|
3113 |
XU Xiaoping, XU Li, WANG Feng, LIU Long |
| |
|
Learning monkey algorithm based on Lagrange interpolation to solve discounted {0-1} knapsack problem |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3113-3118
[Abstract]
(505)
[HTML 1 KB]
[PDF 613 KB]
(635)
|
|
|
3346 |
ZHANG Junjie, SUN Guangmin, ZHENG Kun |
| |
|
Review of gaze tracking and its application in intelligent education |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3346-3356
[Abstract]
(598)
[HTML 1 KB]
[PDF 1506 KB]
(924)
|
|
|
3101 |
SUN Heli, SUN Yuzhu, ZHANG Xiaoyun |
| |
|
Social event participation prediction based on event description |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3101-3106
[Abstract]
(595)
[HTML 1 KB]
[PDF 676 KB]
(862)
|
|
|
3146 |
GONG Kaiqiang, ZHANG Chunmei, ZENG Guanghua |
| |
|
Convolution neural network model compression method based on pruning and tensor decomposition |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3146-3151
[Abstract]
(865)
[HTML 1 KB]
[PDF 1488 KB]
(786)
|
|
|
3192 |
LIU Gaojun, FANG Xiao, DUAN Jianyong |
| |
|
Query extension based on deep semantic information |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3192-3197
[Abstract]
(554)
[HTML 1 KB]
[PDF 591 KB]
(570)
|
|
|
3385 |
HUANG Weijian, LI Danyang, HUANG Yuan |
| |
|
Spatio-temporal hybrid prediction model for air quality |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3385-3392
[Abstract]
(509)
[HTML 1 KB]
[PDF 902 KB]
(770)
|
|
|
2967 |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang |
| |
|
Integral attack on PICO algorithm based on division property |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2967-2972
[Abstract]
(677)
[HTML 1 KB]
[PDF 810 KB]
(768)
|
|
|
2571 |
GAO Zhiyong, HUANG Jinzhen, DU Chenggang |
| |
|
Pulmonary nodule detection based on feature pyramid networks |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2571-2576
[Abstract]
(673)
[HTML 1 KB]
[PDF 988 KB]
(1040)
|
|
|
3280 |
LI Cuijin, QU Zhong |
| |
|
Review of image edge detection algorithms based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3280-3288
[Abstract]
(2914)
[HTML 1 KB]
[PDF 922 KB]
(4107)
|
|
|
3107 |
ZHENG Zongsheng, HU Chenyu, JIANG Xiaoyi |
| |
|
Deep transfer adaptation network based on improved maximum mean discrepancy algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3107-3112
[Abstract]
(643)
[HTML 1 KB]
[PDF 2506 KB]
(1015)
|
|
|
3178 |
LI Qian, YANG Wenzhu, CHEN Xiangyang, YUAN Tongtong, WANG Yuxia |
| |
|
Human action recognition model based on tightly coupled spatiotemporal two-stream convolution neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3178-3183
[Abstract]
(494)
[HTML 1 KB]
[PDF 2537 KB]
(592)
|
|
|
1879 |
HU Tiantian, DAN Yabo, HU Jie, LI Xiang, LI Shaobo |
| |
|
News named entity recognition and sentiment classification based on attention-based bi-directional long short-term memory neural network and conditional random field |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1879-1883
[Abstract]
(1216)
[HTML 1 KB]
[PDF 864 KB]
(1061)
|
|
|
2543 |
SUN Min, LI Yang, ZHUANG Zhengfei, YU Dawei |
| |
|
Sentiment analysis based on parallel hybrid network and attention mechanism |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2543-2548
[Abstract]
(567)
[HTML 1 KB]
[PDF 938 KB]
(938)
|
|
|
2719 |
LIU Li, HU Haibo, YANG Tao |
| |
|
Visual analysis system for exploring spatio-temporal exhibition data |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2719-2727
[Abstract]
(644)
[HTML 1 KB]
[PDF 4426 KB]
(333)
|
|
|
2117 |
MA Jinlin, WEI Meng, MA Ziping |
| |
|
Pulmonary nodule segmentation method based on deep transfer learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2117-2125
[Abstract]
(779)
[HTML 1 KB]
[PDF 1631 KB]
(1059)
|
|
|
1926 |
HU Xuemin, TONG Xiuchi, GUO Lin, ZHANG Ruohan, KONG Li |
| |
|
End-to-end autonomous driving model based on deep visual attention neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1926-1931
[Abstract]
(568)
[HTML 1 KB]
[PDF 1287 KB]
(839)
|
|
|
2016 |
LI Zhanghong, LIANG Xiaolei, TIAN Mengdan, ZHOU Wenfeng |
| |
|
Solution space dynamic compression strategy for permutation and combination problems |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2016-2020
[Abstract]
(443)
[HTML 1 KB]
[PDF 862 KB]
(460)
|
|
|
1950 |
NIE Xichan, ZHANG Yang, YU Dunhui, ZHANG Xingsheng |
| |
|
Spatial crowdsourcing task allocation algorithm for global optimization |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1950-1958
[Abstract]
(664)
[HTML 1 KB]
[PDF 1314 KB]
(847)
|
|
|
2009 |
HUANG Zhongzhan, XU Shiming |
| |
|
Automatic generation algorithm of orthogonal grid based on recurrent neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2009-2015
[Abstract]
(570)
[HTML 1 KB]
[PDF 1651 KB]
(456)
|
|
|
1884 |
WANG Minrui, GAO Shu, YUAN Ziyong, YUAN Lei |
| |
|
Sequence generation model with dynamic routing for multi-label text classification |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1884-1890
[Abstract]
(645)
[HTML 1 KB]
[PDF 978 KB]
(765)
|
|
|
3249 |
JIN Xin, WAN Taochun, LYU Chengmei, WANG Chengtian, CHEN Fulong, ZHAO Chuanxin |
| |
|
Privacy preservation algorithm of original data in mobile crowd sensing |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3249-3254
[Abstract]
(584)
[HTML 1 KB]
[PDF 631 KB]
(622)
|
|
|
2804 |
LIU Ran, LIU Yu, GU Jinguang |
| |
|
Improved AdaNet based on adaptive learning rate optimization |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2804-2810
[Abstract]
(531)
[HTML 1 KB]
[PDF 1134 KB]
(775)
|
|
|
3203 |
CHENG Qiwei, CHEN Qimai, HE Chaobo, LIU Hai |
| |
|
Overlapping community detection method based on improved symmetric binary nonnegative matrix factorization |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3203-3210
[Abstract]
(599)
[HTML 1 KB]
[PDF 750 KB]
(489)
|
|
|
3048 |
YAO Lu, SONG Huihui, ZHANG Kaihua |
| |
|
Mixed-order channel attention network for single image super-resolution reconstruction |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3048-3053
[Abstract]
(447)
[HTML 1 KB]
[PDF 3787 KB]
(657)
|
|
|
3133 |
WANG Haipeng, JIANG Ailian, LI Pengxiang |
| |
|
Newton-soft threshold iteration algorithm for robust principal component analysis |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3133-3138
[Abstract]
(614)
[HTML 1 KB]
[PDF 3222 KB]
(718)
|
|
|
1856 |
WU Chongshu, LIN Lin, XUE Yunjing, SHI Peng |
| |
|
Hierarchical segmentation of pathological images based on self-supervised learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1856-1862
[Abstract]
(1083)
[HTML 1 KB]
[PDF 2378 KB]
(982)
|
|
|
1842 |
WU Yiyuan, LIAN Peikun, GUO Jiangang, LAI Yuanwen, KANG Yaling |
| |
|
Optimization method of incremental split selection based on video queue length management |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1842-1849
[Abstract]
(484)
[HTML 1 KB]
[PDF 1558 KB]
(689)
|
|
|
1824 |
FU Lei, REN Dejun, WU Huayun, GAO Ming, QIU Lyu, HU Yunqi |
| |
|
Real-time segmentation algorithm for bubble defects of plastic bottle based on improved Fast-SCNN |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1824-1829
[Abstract]
(666)
[HTML 1 KB]
[PDF 756 KB]
(585)
|
|
|
1806 |
QIANG Baohua, ZHAI Yijie, CHEN Jinlong, XIE Wu, ZHENG Hong, WANG Xuewen, ZHANG Shihao |
| |
|
Lightweight human skeleton key point detection model based on improved convolutional pose machines and SqueezeNet |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1806-1811
[Abstract]
(809)
[HTML 1 KB]
[PDF 1242 KB]
(780)
|
|
|
1799 |
ZHANG Jiagang, LI Daping, YANG Xiaodong, ZOU Maoyang, WU Xi, HU Jinrong |
| |
|
Deformable medical image registration algorithm based on deep convolution feature optical flow |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1799-1805
[Abstract]
(729)
[HTML 1 KB]
[PDF 1420 KB]
(636)
|
|
|
1774 |
ZHANG Jie, CHANG Tianqing, DAI Wenjun, GUO Libin, ZHANG Lei |
| |
|
Object tracking algorithm based on correlation filtering and color probability model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1774-1782
[Abstract]
(497)
[HTML 1 KB]
[PDF 3751 KB]
(458)
|
|
|
1769 |
SUN Jianjun, XU Yan |
| |
|
Estimation of underdetermined mixing matrix based on improved weighted fuzzy C-means clustering |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1769-1773
[Abstract]
(485)
[HTML 1 KB]
[PDF 1377 KB]
(521)
|
|
|
1763 |
ZHANG Haoran, WANG Xueyuan, LI Xiaoxia |
| |
|
Low SNR denoising algorithm based on adaptive voice activity detection and minimum mean-square error log-spectral amplitude estimation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1763-1768
[Abstract]
(648)
[HTML 1 KB]
[PDF 2132 KB]
(565)
|
|
|
1698 |
AN Xin, XIA Jinwei, YANG Haijiao, OUYANG Yiming, REN Fuji |
| |
|
Discrete controller synthesis based resource management method of heterogeneous multi-core processor system |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1698-1706
[Abstract]
(520)
[HTML 1 KB]
[PDF 905 KB]
(389)
|
|
|
1685 |
ZHANG Daowei, DUAN Haixin |
| |
|
Website fingerprinting technique based on image texture |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1685-1691
[Abstract]
(758)
[HTML 1 KB]
[PDF 1070 KB]
(596)
|
|
|
1627 |
NIU Chunyan, XIA Kewen, ZHANG Jiangnan, HE Ziping |
| |
|
Extreme learning machine algorithm based on cloud quantum flower pollination |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1627-1632
[Abstract]
(559)
[HTML 1 KB]
[PDF 919 KB]
(489)
|
|
|
1607 |
WANG Benjie, NONG Liping, ZHANG Wenhui, LIN Jiming, WANG Junyi |
| |
|
3D point cloud classification and segmentation network based on Spider convolution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1607-1612
[Abstract]
(828)
[HTML 1 KB]
[PDF 689 KB]
(1028)
|
|
|
1601 |
XUE Lu, SONG Wei |
| |
|
Relation extraction method based on dynamic label |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1601-1606
[Abstract]
(483)
[HTML 1 KB]
[PDF 708 KB]
(443)
|
|
|
1587 |
CAO Jianfang, ZHAO Aidi, ZHANG Zibang |
| |
|
Application of convolutional neural network with threshold optimization in image annotation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 1587-1592
[Abstract]
(473)
[HTML 1 KB]
[PDF 695 KB]
(708)
|
|
|
1580 |
YANG Guofeng, YANG Yong |
| |
|
Question classification of common crop disease question answering system based on BERT |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1580-1586
[Abstract]
(868)
[HTML 1 KB]
[PDF 719 KB]
(1008)
|
|
|
1553 |
HU Min, BAI Xue, XU Wei, WU Bingjian |
| |
|
Review of anomaly detection algorithms for multidimensional time series |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1553-1564
[Abstract]
(1727)
[HTML 1 KB]
[PDF 930 KB]
(3935)
|
|
|
3236 |
YUAN Chi |
| |
|
Identity-based dynamic clustering authentication algorithm for wireless sensor networks |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3236-3241
[Abstract]
(489)
[HTML 1 KB]
[PDF 572 KB]
(493)
|
|
|
3332 |
FENG Tao, CHEN Bin, ZHANG Yuefei |
| |
|
Chromosome image segmentation framework based on improved Mask R-CNN |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3332-3339
[Abstract]
(933)
[HTML 1 KB]
[PDF 2168 KB]
(927)
|
|
|
3242 |
LI Kunming, WANG Chaoqian, NI Weiwei, BAO Xiaohan |
| |
|
High-precision histogram publishing method based on differential privacy |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3242-3248
[Abstract]
(600)
[HTML 1 KB]
[PDF 626 KB]
(593)
|
|
|
3088 |
ZHANG Xiaobo, YANG Yan, LI Tianrui, LU Fan, PENG Lilan |
| |
|
Early diagnosis and prediction of Parkinson's disease based on clustering medical text data |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3088-3094
[Abstract]
(651)
[HTML 1 KB]
[PDF 1270 KB]
(1041)
|
|
|
2838 |
WANG Kun, ZHENG Yi, FANG Shuya, LIU Shouyin |
| |
|
Long text aspect-level sentiment analysis based on text filtering and improved BERT |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2838-2844
[Abstract]
(1225)
[HTML 1 KB]
[PDF 1014 KB]
(1473)
|
|
|
3229 |
YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen |
| |
|
Detection method of physical-layer impersonation attack based on deep Q-network in edge computing |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3229-3235
[Abstract]
(631)
[HTML 1 KB]
[PDF 845 KB]
(1039)
|
|
|
3060 |
DU Nianmao, XU Jiachen, XIAO Zhiyong |
| |
|
Undersampled brain magnetic resonance image reconstruction method based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3060-3065
[Abstract]
(592)
[HTML 1 KB]
[PDF 3713 KB]
(909)
|
|
|
3340 |
WEI Xiaona, XING Jiaqi, WANG Zhenyu, WANG Yingshan, SHI Jie, ZHAO Di, WANG Hongzhi |
| |
|
Magnetic resonance image segmentation of articular synovium based on improved U-Net |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3340-3345
[Abstract]
(540)
[HTML 1 KB]
[PDF 901 KB]
(745)
|
|
|
3000 |
YUAN Zhixin, ZHOU Yanling |
| |
|
Unambiguous tracking method of AltBOC (15, 10) signal based on combined correlation function |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3000-3005
[Abstract]
(493)
[HTML 1 KB]
[PDF 1183 KB]
(484)
|
|
|
3306 |
ZHOU Jian, HUANG Zhangjin |
| |
|
3D face reconstruction and dense face alignment method based on improved 3D morphable model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3306-3313
[Abstract]
(603)
[HTML 1 KB]
[PDF 2638 KB]
(715)
|
|
|
3054 |
ZONG Chunmei, ZHANG Yueqin, CAO Jianfang, ZHAO Qingshan |
| |
|
Compressed sensing magnetic resonance imaging based on deep priors and non-local similarity |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3054-3059
[Abstract]
(594)
[HTML 1 KB]
[PDF 1058 KB]
(543)
|
|
|
2822 |
SHI Guoqiang, ZHAO Xia |
| |
|
Object tracking algorithm based on jointly-optimized strong-coupled Siamese region proposal network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2822-2830
[Abstract]
(551)
[HTML 1 KB]
[PDF 2660 KB]
(621)
|
|
|
2904 |
QI Yongjun, GU Junhua, ZHANG Yajuan, WANG Feng, TIAN Zepei |
| |
|
Deep mixed convolution model for pulmonary nodule detection |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2904-2909
[Abstract]
(587)
[HTML 1 KB]
[PDF 1572 KB]
(834)
|
|
|
2392 |
GAO Haijun, ZENG Xiangyin, PAN Dazhi, ZHENG Bochuan |
| |
|
Rectal tumor segmentation method based on improved U-Net model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2392-2397
[Abstract]
(913)
[HTML 1 KB]
[PDF 1307 KB]
(1175)
|
|
|
2817 |
ZHU Qianqian, LIU Yuan, LI Fu |
| |
|
Bio-inspired matrix reduction and quantization method for deep neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2817-2821
[Abstract]
(516)
[HTML 1 KB]
[PDF 1067 KB]
(674)
|
|
|
2137 |
CHEN Xiukai, LU Zhihua, ZHOU Yu |
| |
|
Speech separation algorithm based on convolutional encoder decoder and gated recurrent unit |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2137-2141
[Abstract]
(522)
[HTML 1 KB]
[PDF 830 KB]
(860)
|
|
|
1996 |
WANG Lei |
| |
|
Network intrusion detection method based on improved rough set attribute reduction and
K-means clustering |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1996-2002
[Abstract]
(629)
[HTML 1 KB]
[PDF 1071 KB]
(602)
|
|
|
1873 |
ZHAO Xiaohu, ZHAO Chenglong |
| |
|
Knowledge base question answering system based on multi-feature semantic matching |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1873-1878
[Abstract]
(706)
[HTML 1 KB]
[PDF 880 KB]
(905)
|
|
|
2142 |
CAO Cejun, LIU Ju |
| |
|
Overview of modeling method of emergency organization decision in disaster operations management |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2142-2149
[Abstract]
(585)
[HTML 1 KB]
[PDF 1082 KB]
(1024)
|
|
|
2973 |
CHEN Yi, ZHANG Meijing, XU Fajian |
| |
|
Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2973-2979
[Abstract]
(641)
[HTML 1 KB]
[PDF 1225 KB]
(596)
|
|
|
2845 |
WANG Jian, TANG Shan, HUANG Yuxin, YU Zhengtao |
| |
|
Chinese-Vietnamese bilingual multi-document news opinion sentence recognition based on sentence association graph |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2845-2849
[Abstract]
(520)
[HTML 1 KB]
[PDF 815 KB]
(536)
|
|
|
1483 |
TAN Wenan, WANG Hui |
| |
|
Scheme and platform of trusted fund-raising and donation based on smart contract |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1483-1487
[Abstract]
(811)
[HTML 1 KB]
[PDF 1060 KB]
(1180)
|
|
|
1529 |
ZHU Xingdong, TIAN Shaobing, HUANG Kui, FAN Jiali, WANG Zheng, CHENG Huacheng |
| |
|
Target detection of carrier-based aircraft based on deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1529-1533
[Abstract]
(619)
[HTML 1 KB]
[PDF 823 KB]
(494)
|
|
|
1488 |
CAO Yu, WANG Cheng, WANG Xin, GAO Yueer |
| |
|
Urban road short-term traffic flow prediction based on spatio-temporal node selection and deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1488-1493
[Abstract]
(728)
[HTML 1 KB]
[PDF 712 KB]
(1028)
|
|
|
1470 |
HUANG Jie, CHAOXIA Chenyu, DONG Xiangyu, GAO Yun, ZHU Jun, YANG Bo, ZHANG Fei, SHANG Weiwei |
| |
|
Faster R-CNN based color-guided flame detection |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1470-1475
[Abstract]
(787)
[HTML 1 KB]
[PDF 947 KB]
(780)
|
|
|
1465 |
CHENG Guangtao, GONG Jiachang, LI Jian |
| |
|
Smoke recognition method based on dense convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1465-1469
[Abstract]
(563)
[HTML 1 KB]
[PDF 847 KB]
(438)
|
|
|
1460 |
XIAO He, LIU Zhiqin, WANG Qingfeng, HUANG Jun, ZHOU Ying, LIU Qiyu, XU Weiyun |
| |
|
Mass and calcification classification method in mammogram based on multi-view transfer learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1460-1464
[Abstract]
(572)
[HTML 1 KB]
[PDF 1943 KB]
(479)
|
|
|
1453 |
ZENG Zhaoxin, LIU Jun |
| |
|
Microscopic image segmentation method of C.elegans based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1453-1459
[Abstract]
(652)
[HTML 1 KB]
[PDF 2638 KB]
(625)
|
|
|
1421 |
YU Guangji, LUO Weitai, WU Xiaoyun |
| |
|
Illumination calculation for large-scale scene based on improved voxel cone tracking |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1421-1424
[Abstract]
(661)
[HTML 1 KB]
[PDF 724 KB]
(484)
|
|
|
1415 |
ZHANG Yifei, LI Xinfu, TIAN Xuedong |
| |
|
Stereo matching algorithm based on image segmentation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1415-1420
[Abstract]
(691)
[HTML 1 KB]
[PDF 1843 KB]
(468)
|
|
|
1409 |
WANG Jiangkun, HE Kunjin, CAO Hongfei, WANG Jinqiang, ZHANG Yan |
| |
|
Interactive water flow heating simulation based on smoothed particle hydrodynamics method |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1409-1414
[Abstract]
(600)
[HTML 1 KB]
[PDF 2338 KB]
(582)
|
|
|
1403 |
ZHOU Xiang, TANG Liyu, LIN Ding |
| |
|
Virtual-real registration method of natural features based on binary robust invariant scalable keypoints and speeded up robust features |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1403-1408
[Abstract]
(525)
[HTML 1 KB]
[PDF 1572 KB]
(467)
|
|
|
1392 |
WANG Yueping, XU Tao |
| |
|
User association mechanism based on evolutionary game |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1392-1396
[Abstract]
(548)
[HTML 1 KB]
[PDF 546 KB]
(365)
|
|
|
1369 |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun |
| |
|
Design and implementation of Lite register model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1369-1373
[Abstract]
(536)
[HTML 1 KB]
[PDF 2258 KB]
(447)
|
|
|
1354 |
LI Tianzheng, WANG Chuntao |
| |
|
Lossy compression algorithm for encrypted binary images using Markov random field |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1354-1363
[Abstract]
(501)
[HTML 1 KB]
[PDF 1082 KB]
(415)
|
|
|
1348 |
WU Liren, LIU Zhenghao, ZHANG Hao, CEN Yueliang, ZHOU Wei |
| |
|
PS-MIFGSM: focus image adversarial attack algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1348-1353
[Abstract]
(881)
[HTML 1 KB]
[PDF 1400 KB]
(797)
|
|
|
1340 |
WU Zhijun, WANG Hang |
| |
|
System wide information management emergency response mechanism based on subscribe/publish service |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1340-1347
[Abstract]
(505)
[HTML 1 KB]
[PDF 1095 KB]
(539)
|
|
|
1315 |
XU Dai, YUE Zhang, YANG Wenxia, REN Xiao |
| |
|
Tampered image recognition based on improved three-stream Faster R-CNN |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1315-1321
[Abstract]
(720)
[HTML 1 KB]
[PDF 1699 KB]
(619)
|
|
|
1309 |
CAO Xiaowei, QU Zhijian, XU Lingling, LIU Xiaohong |
| |
|
3D model recognition based on capsule network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1309-1314
[Abstract]
(705)
[HTML 1 KB]
[PDF 2645 KB]
(557)
|
|
|
1301 |
WANG Yiding, HAO Chenyu, LI Yaoli, CAI Shaoqing, YUAN Yuan |
| |
|
Microscopic image identification for small-sample Chinese medicinal materials powder based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1301-1308
[Abstract]
(771)
[HTML 1 KB]
[PDF 1619 KB]
(832)
|
|
|
1291 |
YANG Yan, LIU Shengjian, ZHOU Yongquan |
| |
|
Greedy binary lion swarm optimization algorithm for solving multidimensional knapsack problem |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1291-1294
[Abstract]
(953)
[HTML 1 KB]
[PDF 537 KB]
(612)
|
|
|
1278 |
YANG Yunting, WANG Peng |
| |
|
Multi-scale quantum free particle optimization algorithm for solving travelling salesman problem |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1278-1283
[Abstract]
(539)
[HTML 1 KB]
[PDF 478 KB]
(613)
|
|
|
1272 |
YI Dongyi, DENG Genqiang, DONG Chaoxiong, ZHU Miaomiao, LYU Zhouping, ZHU Suisong |
| |
|
Medical insurance fraud detection algorithm based on graph convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1272-1277
[Abstract]
(1371)
[HTML 1 KB]
[PDF 2297 KB]
(1169)
|
|
|
1260 |
CHEN Chengjun, MAO Yingchi, WANG Yichao |
| |
|
CNN model compression based on activation-entropy based layer-wise iterative pruning strategy |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1260-1265
[Abstract]
(616)
[HTML 1 KB]
[PDF 718 KB]
(533)
|
|
|
2811 |
LEI Xiaokang, YIN Zhigang, ZHAO Ruilian |
| |
|
FPGA-based convolutional neural network fixed-point acceleration |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2811-2816
[Abstract]
(794)
[HTML 1 KB]
[PDF 1063 KB]
(962)
|
|
|
2299 |
WANG Shouhua, WU Lirong, JI Yuanfa, SUN Xiyan |
| |
|
Fast ambiguity resolution method based on lattice theory |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2299-2304
[Abstract]
(579)
[HTML 1 KB]
[PDF 1080 KB]
(468)
|
|
|
2182 |
ZHANG Xinyi, FENG Shimin, DING Enjie |
| |
|
Entity recognition and relation extraction model for coal mine |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2182-2188
[Abstract]
(664)
[HTML 1 KB]
[PDF 1096 KB]
(893)
|
|
|
1901 |
TIAN Baojun, LIU Shuang, FANG Jiandong |
| |
|
Hybrid recommendation algorithm by fusion of topic information and convolution neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1901-1907
[Abstract]
(629)
[HTML 1 KB]
[PDF 1419 KB]
(713)
|
|
|
2189 |
HE Hansen, SUN Guozi |
| |
|
Fake news content detection model based on feature aggregation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2189-2193
[Abstract]
(856)
[HTML 1 KB]
[PDF 845 KB]
(1010)
|
|
|
2219 |
LI Shengwu, ZHANG Xuande |
| |
|
Multi-domain convolutional neural network based on self-attention mechanism for visual tracking |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2219-2224
[Abstract]
(800)
[HTML 1 KB]
[PDF 1092 KB]
(520)
|
|
|
2202 |
CHEN Jiawei, HAN Fang, WANG Zhijie |
| |
|
Aspect-based sentiment analysis with self-attention gated graph convolutional network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2202-2206
[Abstract]
(710)
[HTML 1 KB]
[PDF 803 KB]
(709)
|
|
|
2214 |
XIONG Changzhen, LI Yan |
| |
|
Dynamic weighted siamese network tracking algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2214-2218
[Abstract]
(579)
[HTML 1 KB]
[PDF 1142 KB]
(775)
|
|
|
2358 |
SHEN Marui, LI Jincheng, ZHANG Ya, ZOU Jian |
| |
|
Magnetic resonance image reconstruction algorithm via non-convex total variation regularization |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2358-2364
[Abstract]
(718)
[HTML 1 KB]
[PDF 10893 KB]
(281)
|
|
|
2460 |
XIE Yunxia, HUANG Haiyu, HU Jianbin |
| |
|
Staging and lesion detection of diabetic retinopathy based on deep convolution neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2460-2464
[Abstract]
(727)
[HTML 1 KB]
[PDF 2044 KB]
(695)
|
|
|
2525 |
YIN Chunyong, HE Miao |
| |
|
Text classification based on improved capsule network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2525-2530
[Abstract]
(1343)
[HTML 1 KB]
[PDF 952 KB]
(1284)
|
|
|
1977 |
CONG Jing, WEI Yongzhuang, LIU Zhenghong |
| |
|
Stepwise correlation power analysis of SM4 cryptographic algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1977-1982
[Abstract]
(655)
[HTML 1 KB]
[PDF 1949 KB]
(868)
|
|
|
2155 |
GAO Yilu, HU Zhihua |
| |
|
Path planning for automated guided vehicles based on tempo-spatial network at automated container terminal |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2155-2163
[Abstract]
(615)
[HTML 1 KB]
[PDF 1282 KB]
(795)
|
|
|
2110 |
SHI Lukui, MA Hongqi, ZHANG Chaozong, FAN Shiyan |
| |
|
Detection method of pulmonary nodules based on improved residual structure |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2110-2116
[Abstract]
(584)
[HTML 1 KB]
[PDF 2429 KB]
(884)
|
|
|
0 |
|
| |
|
Video impulse noise removal method based on global and non-local low rank decomposition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(173)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
|
0 |
|
| |
|
Image caption model based on attention feature adaptive recalibration |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(231)
[HTML 1 KB]
[PDF 0 KB]
(17)
|
|
|
0 |
|
| |
|
Lightweight face recognition algorithm based on MobieNetV2 |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(595)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
|
0 |
|
| |
|
Opinion extraction and clustering of students’ teaching evaluation text based on sentiment analysis |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(298)
[HTML 1 KB]
[PDF 0 KB]
(28)
|
|
|
0 |
|
| |
|
Feature extraction method of gesture image based on cascaded convolutional neural network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(235)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
|
0 |
|
| |
|
Solving best spanning tree based on extension analytic hierarchy process |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(142)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
|
2910 |
ZHANG Zelin, XU Jun |
| |
|
Automatic segmentation of breast epithelial and stromal regions based on conditional generative adversarial network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2910-2916
[Abstract]
(444)
[HTML 1 KB]
[PDF 7615 KB]
(471)
|
|
|
0 |
LIAO Yun,DUAN Qing,LIU Junhui,ZHOU Hao |
| |
|
Water line detection algorithm based on deep learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(809)
[HTML 1 KB]
[PDF 0 KB]
(32)
|
|
|
0 |
ZHANG Huali,KANG Xiaodong,LI Bo,WANG Yage,LIU Hanqing,BAI Fang |
| |
|
Medical name entity recognition based on Bi-LSTM-CRF and attention mechanism |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(789)
[HTML 1 KB]
[PDF 0 KB]
(47)
|
|
|
0 |
DAI Jin,WU Feng |
| |
|
Speech teaching App based on speech recognition |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(206)
[HTML 1 KB]
[PDF 0 KB]
(30)
|
|
|
0 |
FENG Wei,XIE Dongxiu |
| |
|
Low rank matrix approximation with weighted nuclear norm and its application |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(170)
[HTML 1 KB]
[PDF 0 KB]
(26)
|
|
|
0 |
XU Yiliu,HE Peng,REN Dong,WANG Hui,DONG Ting,SHAO Pan |
| |
|
Timeber transport vehicle detection based on improved faster RCNN |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(358)
[HTML 1 KB]
[PDF 0 KB]
(17)
|
|
|
0 |
FANG Chenchen,SHI Fanhuai |
| |
|
Image recognition of tomato diseases based on improved deep residual network |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(282)
[HTML 1 KB]
[PDF 0 KB]
(30)
|
|
|
0 |
|
| |
|
Adaptive video analysis in edge computing |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(171)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
|
0 |
|
| |
|
Prediction of mango yield based on self-attention CNN and bidirectional GRU |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(386)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
|
0 |
|
| |
|
Design of lightweight convolutional neural network based on MobileNet and YOLOv3 |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(668)
[HTML 1 KB]
[PDF 0 KB]
(34)
|
|
|
0 |
|
| |
|
Simulation of computer room temperature and air conditioning energy saving based on computational fluid dynamics model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(269)
[HTML 1 KB]
[PDF 0 KB]
(25)
|
|
|
0 |
|
| |
|
Joint maritime search and rescue plan evaluation based on analytic hierachy process,additive ratio assessment and multi-choice goal programming |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(233)
[HTML 1 KB]
[PDF 0 KB]
(28)
|
|
|
0 |
|
| |
|
Research and implementation of OBJ model imported into industrial simulation system dynamically |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(238)
[HTML 1 KB]
[PDF 0 KB]
(32)
|
|
|
0 |
|
| |
|
Fault-tolerant resource provisioning for data-intensive applications in cloud environment |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(214)
[HTML 1 KB]
[PDF 0 KB]
(29)
|
|
|
1919 |
HU Xuemin, CHENG Yu, CHEN Guowen, ZHANG Ruohan, TONG Xiuchi |
| |
|
Motion planning for autonomous driving with directional navigation based on deep spatio-temporal Q-network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1919-1925
[Abstract]
(624)
[HTML 1 KB]
[PDF 2633 KB]
(722)
|
|
|
2881 |
CHEN Lichao, ZHANG Lei, CAO Jianfang, ZHANG Rui |
| |
|
Vehicle classification based on HOG-C CapsNet in traffic surveillance scenarios |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2881-2889
[Abstract]
(478)
[HTML 1 KB]
[PDF 3651 KB]
(484)
|
|
|
3041 |
OUYANG Ning, WEI Yu, LIN Leping |
| |
|
Image super-resolution reconstruction method combining perceptual edge constraint and multi-scale fusion network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3041-3047
[Abstract]
(514)
[HTML 1 KB]
[PDF 4821 KB]
(409)
|
|
|
2345 |
LIN Jing, HUANG Yuqing, LI Leimin |
| |
|
Image super-resolution reconstruction based on spherical moment matching and feature discrimination |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2345-2350
[Abstract]
(577)
[HTML 1 KB]
[PDF 1395 KB]
(520)
|
|
|
2104 |
CHEN Hao, QIN Zhiguang, DING Yi |
| |
|
Multi-modal brain tumor segmentation method under same feature space |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2104-2109
[Abstract]
(608)
[HTML 1 KB]
[PDF 874 KB]
(657)
|
|
|
2917 |
CHENG Kai, WANG Yan, LIU Jianfei |
| |
|
Semi-supervised learning method for automatic nuclei segmentation using generative adversarial network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2917-2922
[Abstract]
(689)
[HTML 1 KB]
[PDF 3833 KB]
(642)
|
|
|
1045 |
CHEN Lichao, ZHENG Jiamin, CAO Jianfang, PAN Lihu, ZHANG Rui |
| |
|
Intelligent traffic sign recognition method based on capsule network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1045-1049
[Abstract]
(744)
[HTML 1 KB]
[PDF 864 KB]
(755)
|
|
|
2899 |
GAO Ming, REN Dejun, HU Yunqi, FU Lei, QIU Lyu |
| |
|
Ampoule packaging quality inspection algorithm based on machine vision and lightweight neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2899-2903
[Abstract]
(667)
[HTML 1 KB]
[PDF 1784 KB]
(538)
|
|
|
2555 |
SONG Yifan, ZHANG Peng, ZONG Libo, MA Bo, LIU Libo |
| |
|
Improved redundant point filtering-based 3D object detection method |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2555-2560
[Abstract]
(639)
[HTML 1 KB]
[PDF 1674 KB]
(622)
|
|
|
2069 |
HU Xueying, GUO Hairu, ZHU Rong |
| |
|
Image super-resolution reconstruction based on hybrid deep convolutional network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2069-2076
[Abstract]
(622)
[HTML 1 KB]
[PDF 1446 KB]
(999)
|
|
|
2754 |
ZHAO Chuan, MIAO Liye, YANG Haoxiong, HE Mingke |
| |
|
Interactive dynamic optimization of dual-channel supply chain inventory under stochastic demand |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2754-2761
[Abstract]
(494)
[HTML 1 KB]
[PDF 1530 KB]
(853)
|
|
|
335 |
Cui LI, Qingkui CHEN |
| |
|
Dynamic monitoring model based on DPDK parallel communication |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 335-341
[Abstract]
(577)
[HTML 0 KB]
[PDF 846 KB]
(399)
|
|
|
162 |
WANG Bo, CAI Honghao, SU Yang |
| |
|
Classification of malicious code variants based on VGGNet |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 162-167
[Abstract]
(736)
[HTML 1 KB]
[PDF 897 KB]
(493)
|
|
|
23 |
HUANG Youwen, YOU Yadong, ZHAO Peng |
| |
|
Image caption generation model with convolutional attention mechanism |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 23-27
[Abstract]
(647)
[HTML 1 KB]
[PDF 810 KB]
(638)
|
|
|
3639 |
LIANG Bai'ou |
| |
|
Flowchart automatic generation algorithm base on Sugiyama |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3639-3643
[Abstract]
(1021)
[HTML 1 KB]
[PDF 749 KB]
(440)
|
|
|
3456 |
LIU Yalong, LI Jie, WANG Ying, WU Saifei, ZOU Pei |
| |
|
Segmentation model of neonatal punctate white matter lesion based on refined deep residual U-Net |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3456-3461
[Abstract]
(681)
[HTML 1 KB]
[PDF 1112 KB]
(414)
|
|
|
947 |
ZHAO Wei, ZHANG Wenyin, WANG Jiuru, WANG Haifeng, WU Chuankun |
| |
|
Smart contract vulnerability detection scheme based on symbol execution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 947-953
[Abstract]
(1539)
[HTML 1 KB]
[PDF 775 KB]
(2087)
|
|
|
1030 |
ZHANG Kailin, YAN Qing, XIA Yi, ZHANG Jun, DING Yun |
| |
|
Semi-supervised hyperspectral image classification based on focal loss |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1030-1037
[Abstract]
(844)
[HTML 1 KB]
[PDF 3567 KB]
(652)
|
|
|
1127 |
GUAN Hao, QIN Xiaolin, RAO Yongsheng, CAO Sheng |
| |
|
Domain model of Web-based dynamic geometry software and its applications |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1127-1132
[Abstract]
(721)
[HTML 1 KB]
[PDF 1285 KB]
(1047)
|
|
|
1237 |
SUN Peng, XIAO Jing, ZHAO Haimeng, LIU Fan, YAN Lei, ZHAO Hongying |
| |
|
Design and implementation of SIFT algorithm for UAV remote sensing image based on DSP platform |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1237-1242
[Abstract]
(1249)
[HTML 1 KB]
[PDF 1347 KB]
(992)
|
|
|
571 |
Jiangfeng XU, Yulong TAN |
| |
|
Optimization of multidimensional index query mechanism based on HBase |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 571-577
[Abstract]
(736)
[HTML 0 KB]
[PDF 1005 KB]
(415)
|
|
|
942 |
ZHAO Yulong, NIU Baoning, LI Peng, FAN Xing |
| |
|
Blockchain enhanced lightweight node model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 942-946
[Abstract]
(985)
[HTML 1 KB]
[PDF 632 KB]
(945)
|
|
|
990 |
LIU Shangwang, LIU Chengwei, ZHANG Aili |
| |
|
Real-time facial expression and gender recognition based on depthwise separable convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 990-995
[Abstract]
(1150)
[HTML 1 KB]
[PDF 1052 KB]
(879)
|
|
|
1091 |
XUE Feng, SHI Xuhua, SHI Feifan |
| |
|
Surrogate-based differential evolution constrained optimization |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1091-1096
[Abstract]
(634)
[HTML 1 KB]
[PDF 641 KB]
(731)
|
|
|
1104 |
XU Zhiqiang, JIANG Tiegang, YANG Libo |
| |
|
Stochastic support selection based generalized orthogonal matching pursuit algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1104-1108
[Abstract]
(524)
[HTML 1 KB]
[PDF 797 KB]
(448)
|
|
|
698 |
ZHU Zhe, XU Shaohua |
| |
|
Denoising autoencoder deep convolution process neural network and its application in time-varying signal classification |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 698-703
[Abstract]
(797)
[HTML 1 KB]
[PDF 709 KB]
(812)
|
|
|
3233 |
TAN Yang, TANG Dequan, CAO Shoufu |
| |
|
Many-objective particle swarm optimization algorithm based on hyper-spherical fuzzy dominance |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3233-3241
[Abstract]
(545)
[HTML 1 KB]
[PDF 1319 KB]
(408)
|
|
|
1109 |
SHEN Liang, WANG Xin, CHEN Shuhui |
| |
|
Structural signature extraction method for mobile application recognition |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1109-1114
[Abstract]
(815)
[HTML 1 KB]
[PDF 1236 KB]
(544)
|
|
|
735 |
FENG Liping, HAN Qi, ZHOU Zhigang, BAI Zengliang |
| |
|
Bad information diffusion modeling and optimal control strategy influenced by social networks |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 735-739
[Abstract]
(751)
[HTML 1 KB]
[PDF 585 KB]
(418)
|
|
|
996 |
XIAO Shihua, SANG Nan, WANG Xupeng |
| |
|
3D point cloud head pose estimation based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 996-1001
[Abstract]
(1186)
[HTML 1 KB]
[PDF 794 KB]
(786)
|
|
|
1223 |
MAO Minli, LIANG Chengji, HU Xiaoyuan |
| |
|
Optimization of quay crane assignment based on ship efficiency |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1223-1230
[Abstract]
(744)
[HTML 1 KB]
[PDF 1246 KB]
(973)
|
|
|
465 |
Dong MA, Hongmei CHEN, Lizhen WANG, Qing XIAO |
| |
|
Dominant feature mining of spatial sub-prevalent co-location patterns |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 465-472
[Abstract]
(623)
[HTML 0 KB]
[PDF 1839 KB]
(408)
|
|
|
547 |
Fuxin LIU, Jingwei LI, Yihong WANG, Lin LI |
| |
|
Design and implementation of cloud native massive data storage system based on Kubernetes |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 547-552
[Abstract]
(1007)
[HTML 0 KB]
[PDF 560 KB]
(707)
|
|
|
1177 |
SONG Yun, ZHANG Yuanke, LU Hongbing, XING Yuxiang, MA Jianhua |
| |
|
Regional-content-aware nuclear norm for low-does CT image denosing |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1177-1183
[Abstract]
(610)
[HTML 1 KB]
[PDF 5420 KB]
(401)
|
|
|
1196 |
WANG Yan, HE Hongke |
| |
|
Improved fuzzy
c-means MRI segmentation based on neighborhood information |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1196-1201
[Abstract]
(663)
[HTML 1 KB]
[PDF 1675 KB]
(509)
|
|
|
1151 |
SHI Zhiliang, CAI Wangyue, WANG Guoqiang, XIONG Linjie |
| |
|
Intrinsic shape signature algorithm based on adaptive neighborhood |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1151-1156
[Abstract]
(754)
[HTML 1 KB]
[PDF 5956 KB]
(495)
|
|
|
1171 |
GENG Yuanqian, WU Chuansheng, LIU Wen |
| |
|
Mixed non-convex and non-smooth regularization constraint based blind image restoration |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1171-1176
[Abstract]
(659)
[HTML 1 KB]
[PDF 2187 KB]
(470)
|
|
|
1164 |
WANG Ruiyao, YUE Xueting, ZHOU Zhiqing, GENG Zexun |
| |
|
Adaptive enhancement algorithm of low illumination image based on maximum difference image decision |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1164-1170
[Abstract]
(682)
[HTML 1 KB]
[PDF 1501 KB]
(591)
|
|
|
454 |
Jing QIN, Qingbo ZHANG, Bin WANG |
| |
|
Recommendation method with focus on long tail items |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 454-458
[Abstract]
(1136)
[HTML 0 KB]
[PDF 799 KB]
(821)
|
|
|
819 |
LIN Chuanjian, DENG Wei, TONG Tong, GAO Qinquan |
| |
|
Blurred video frame interpolation method based on deep voxel flow |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 819-824
[Abstract]
(651)
[HTML 1 KB]
[PDF 1085 KB]
(593)
|
|
|
1069 |
WANG Liuyang, YU Yangxin, CHEN Bolun, ZHANG Hui |
| |
|
Discrimination information method based on consensus and classification for improving document clustering |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1069-1073
[Abstract]
(726)
[HTML 1 KB]
[PDF 886 KB]
(583)
|
|
|
954 |
LI Jing, JING Xu, YANG Huijun |
| |
|
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 954-960
[Abstract]
(562)
[HTML 1 KB]
[PDF 743 KB]
(649)
|
|
|
441 |
Jingfeng GUO, Hui DONG, Tingwei ZHANG, Xiao CHEN |
| |
|
Representation learning for topic-attention network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 441-447
[Abstract]
(454)
[HTML 0 KB]
[PDF 955 KB]
(352)
|
|
|
392 |
Zhiyang ZENG, Yan CHEN, Ke WANG |
| |
|
Design and implementation of parallel genetic algorithm for cutting stock of circular parts |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 392-397
[Abstract]
(549)
[HTML 0 KB]
[PDF 658 KB]
(348)
|
|
|
621 |
XIE Binhong, ZHONG Rixin, PAN Lihu, ZHANG Yingjun |
| |
|
Accelerated compression method for convolutional neural network combining with pruning and stream merging |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 621-625
[Abstract]
(699)
[HTML 1 KB]
[PDF 740 KB]
(1021)
|
|
|
825 |
FENG Lang, ZHANG Ling, ZHANG Xiaolong |
| |
|
Image inpainting based on dilated convolution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 825-831
[Abstract]
(648)
[HTML 1 KB]
[PDF 1069 KB]
(932)
|
|
|
426 |
Ming DU, Anping YANG, Junfeng ZHOU, Ziyang CHEN, Yun YANG |
| |
|
Optimized algorithm for
k-step reachability queries on directed acyclic graphs |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 426-433
[Abstract]
(652)
[HTML 0 KB]
[PDF 654 KB]
(476)
|
|
|
416 |
Wenli WU, Guohua LIU, Junbao ZHANG |
| |
|
Complexity analysis of functional query answering on big data |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 416-419
[Abstract]
(621)
[HTML 0 KB]
[PDF 436 KB]
(347)
|
|
|
503 |
Yusheng CHENG, Fan SONG, Yibin WANG, Kun QIAN |
| |
|
Multi-label feature selection algorithm based on conditional mutual information of expert feature |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 503-509
[Abstract]
(662)
[HTML 0 KB]
[PDF 818 KB]
(440)
|
|
|
524 |
Chen CHEN, Shaowu ZHANG, Liang YANG, Dongyu ZHANG, Hongfei LIN |
| |
|
Analysis of international influence of news media for major social security emergencies |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 524-529
[Abstract]
(774)
[HTML 0 KB]
[PDF 1388 KB]
(399)
|
|
|
491 |
Meishu ZHANG, Yabin XU |
| |
|
Personalized privacy protection method for data with multiple numerical sensitive attributes |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 491-496
[Abstract]
(598)
[HTML 0 KB]
[PDF 588 KB]
(500)
|
|
|
535 |
Yue WANG, Mengxuan WANG, Sheng ZHANG, Wen DU |
| |
|
Alarm text named entity recognition based on BERT |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 535-540
[Abstract]
(1129)
[HTML 0 KB]
[PDF 642 KB]
(1191)
|
|
|
473 |
Yang LI, Wei ZHANG, Chen PENG |
| |
|
Target-dependent method for authorship attribution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 473-478
[Abstract]
(617)
[HTML 0 KB]
[PDF 650 KB]
(533)
|
|
|
530 |
Kai DENG, Jiajin HUNAG, Jin QIN |
| |
|
Item-based unified recommendation model |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 530-534
[Abstract]
(717)
[HTML 0 KB]
[PDF 565 KB]
(463)
|
|
|
1002 |
REN Haipei, LI Teng |
| |
|
FaceYoLo algorithm for face detection on mobile platform |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1002-1008
[Abstract]
(1142)
[HTML 1 KB]
[PDF 1482 KB]
(769)
|
|
|
1133 |
QIU Yunfei, LIU Xing |
| |
|
Local feature point matching algorithm with anti-affine property |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1133-1137
[Abstract]
(598)
[HTML 1 KB]
[PDF 635 KB]
(437)
|
|
|
925 |
ZHANG Zhancheng, ZHANG Dalong, LUO Xiaoqing |
| |
|
Pulmonary nodule detection method with semantic feature score |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 925-930
[Abstract]
(666)
[HTML 1 KB]
[PDF 632 KB]
(462)
|
|
|
677 |
LI Quan, XU Xinhua, LIU Xinghong, CHEN Qi |
| |
|
Next location recommendation based on spatiotemporal-aware GRU and attention |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 677-682
[Abstract]
(929)
[HTML 1 KB]
[PDF 669 KB]
(1089)
|
|
|
704 |
GONG Rui, DING Sheng, ZHANG Chaohua, SU Hao |
| |
|
Lightweight and multi-pose face recognition method based on deep learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 704-709
[Abstract]
(1166)
[HTML 1 KB]
[PDF 852 KB]
(665)
|
|
|
717 |
LI Dongbo, HUANG Lyuwen |
| |
|
Reweighted sparse principal component analysis algorithm and its application in face recognition |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 717-722
[Abstract]
(847)
[HTML 1 KB]
[PDF 868 KB]
(406)
|
|
|
854 |
LIU Ge, ZHENG Yelong, ZHAO Meirong |
| |
|
Vehicle information detection based on improved RetinaNet |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 854-858
[Abstract]
(872)
[HTML 1 KB]
[PDF 745 KB]
(471)
|
|
|
897 |
CAI Yun, LIU Pengqing, XIONG Hegen |
| |
|
Berth joint scheduling based on quantum genetic hybrid algorithm |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 897-901
[Abstract]
(538)
[HTML 1 KB]
[PDF 623 KB]
(293)
|
|
|
595 |
Xi CHEN, Guang MEI, Jinjin ZHANG, Weisheng XU |
| |
|
Student grade prediction method based on knowledge graph and collaborative filtering |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 595-601
[Abstract]
(1220)
[HTML 0 KB]
[PDF 714 KB]
(815)
|
|
|
626 |
ZENG Yuanpeng, WANG Kaijun, LIN Song |
| |
|
Interference entropy feature selection method for two-class distinguishing ability |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 626-630
[Abstract]
(591)
[HTML 1 KB]
[PDF 977 KB]
(581)
|
|
|
740 |
JIANG Zetao, XU Juanjuan |
| |
|
Heterogenous cross-domain identity authentication scheme based on signcryption in cloud environment |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 740-746
[Abstract]
(674)
[HTML 1 KB]
[PDF 693 KB]
(539)
|
|
|
3673 |
GUO Yihui, HUANG Chenghui, ZHONG Xueling, LU Jiyuan |
| |
|
Direction-perception feature recognition on mesh model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3673-3677
[Abstract]
(600)
[HTML 1 KB]
[PDF 840 KB]
(348)
|
|
|
3644 |
XU Dezhi, SUN Jifeng, LUO Shasha |
| |
|
Vehicle-based image super-resolution reconstruction based on weight quantification and information compression |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3644-3649
[Abstract]
(490)
[HTML 1 KB]
[PDF 992 KB]
(331)
|
|
|
304 |
WANG Zhizhong, LI Hongyi, HAN Chuang |
| |
|
QRS complex detection algorithm of electrocardiograph based on Shannon energy and adaptive threshold |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 304-310
[Abstract]
(692)
[HTML 1 KB]
[PDF 1024 KB]
(314)
|
|
|
3548 |
WANG Jianren, MA Xin, DUAN Ganglong, XUE Hongquan |
| |
|
Handwritten numeral recognition under edge intelligence background |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3548-3555
[Abstract]
(694)
[HTML 1 KB]
[PDF 1271 KB]
(395)
|
|
|
3541 |
LUO Guoting, LIU Zhiqin, ZHOU Ying, WANG Qingfeng, CHENG Jiezhi, LIU Qiyu |
| |
|
Pneumothorax detection and localization in X-ray images based on dense convolutional network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3541-3547
[Abstract]
(442)
[HTML 1 KB]
[PDF 1217 KB]
(406)
|
|
|
3703 |
WANG Xin, GAO Yuan, WANG Bin, SUN Jie, XIANG Jie |
| |
|
Application of multimodal network fusion in classification of mild cognitive impairment |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3703-3708
[Abstract]
(771)
[HTML 1 KB]
[PDF 997 KB]
(516)
|
|
|
3685 |
JI Yi, SHI Xin, ZHAO Xiangmo |
| |
|
Car-following model for intelligent connected vehicles based on multiple headway information fusion |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3685-3690
[Abstract]
(791)
[HTML 1 KB]
[PDF 907 KB]
(391)
|
|
|
3697 |
WANG Zhongjie, ZHANG Hong |
| |
|
Shipping monitoring event recognition based on three-dimensional convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3697-3702
[Abstract]
(510)
[HTML 1 KB]
[PDF 982 KB]
(394)
|
|
|
3528 |
GAO Yuan, WU Fan, QIN Pinle, WANG Lifang |
| |
|
Medical image fusion algorithm based on generative adversarial residual network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3528-3534
[Abstract]
(818)
[HTML 1 KB]
[PDF 1184 KB]
(479)
|
|
|
56 |
CHEN Meiyun, WANG Bisheng, CAO Guo, LIANG Yongbo |
| |
|
Crowd counting method based on pixel-level attention mechanism |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 56-61
[Abstract]
(807)
[HTML 1 KB]
[PDF 1007 KB]
(614)
|
|
|
181 |
SUN Tianqi, HU Jianpeng, HUANG Juan, FAN Ying |
| |
|
Bandwidth resource prediction and management of Web applications hosted on cloud |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 181-187
[Abstract]
(537)
[HTML 1 KB]
[PDF 1217 KB]
(596)
|
|
|
3268 |
LIU Weibo, ZENG Qingning, BU Yuting, ZHENG Zhanheng |
| |
|
Speech recognition method based on dual micro-array and convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3268-3273
[Abstract]
(643)
[HTML 1 KB]
[PDF 938 KB]
(385)
|
|
|
3604 |
FENG Wenbo, HONG Zheng, WU Lifa, FU Menglin |
| |
|
Review of network protocol recognition techniques |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3604-3614
[Abstract]
(946)
[HTML 1 KB]
[PDF 1987 KB]
(666)
|
|
|
3482 |
GUO Mingxiang, SONG Quanjun, XU Zhannan, DONG Jun, XIE Chengjun |
| |
|
Human behavior recognition algorithm based on three-dimensional residual dense network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3482-3489
[Abstract]
(576)
[HTML 1 KB]
[PDF 1300 KB]
(304)
|
|
|
3535 |
QIN Pinle, LI Pengbo, ZHANG Ruiping, ZENG Jianchao, LIU Shijie, XU Shaowei |
| |
|
Automatic recognition algorithm of cervical lymph nodes using adaptive receptive field mechanism |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3535-3540
[Abstract]
(616)
[HTML 1 KB]
[PDF 965 KB]
(426)
|
|
|
3490 |
WANG Xin, ZHANG Xin, NING Chen |
| |
|
Infrared human target recognition method based on multi-feature dimensionality reduction and transfer learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3490-3495
[Abstract]
(482)
[HTML 1 KB]
[PDF 1009 KB]
(374)
|
|
|
375 |
Jie WANG, Rangding WANG, Diqun YAN, Yuzhen LIN |
| |
|
Detection method for echo hiding based on convolutional neural network framework |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 375-380
[Abstract]
(580)
[HTML 0 KB]
[PDF 713 KB]
(528)
|
|
|
363 |
Yening ZHOU, Taoshen LI, Min ZENG, Nan XIAO |
| |
|
Minimizing transmit power sum of full-duplex relay system with simultaneous wireless information and power transmission |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 363-368
[Abstract]
(761)
[HTML 0 KB]
[PDF 718 KB]
(382)
|
|
|
566 |
Xu TENG, Hui ZHANG, Chunming YANG, Xujian ZHAO, Bo LI |
| |
|
Digital camouflage generation method based on cycle-consistent adversarial network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 566-570
[Abstract]
(814)
[HTML 0 KB]
[PDF 5080 KB]
(602)
|
|
|
561 |
Junhua GU, Feng WANG, Yongjun QI, Zheran SUN, Zepei TIAN, Yajuan ZHANG |
| |
|
Retrieval method of pulmonary nodule images based on multi-scale convolution feature fusion |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 561-565
[Abstract]
(712)
[HTML 0 KB]
[PDF 644 KB]
(422)
|
|
|
2923 |
GAN Lan, GUO Zihan, WANG Yao |
| |
|
Gastric tumor cell image recognition method based on radial transformation and improved AlexNet |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2923-2929
[Abstract]
(433)
[HTML 1 KB]
[PDF 1200 KB]
(345)
|
|
|
2883 |
WEI Xin, WU Shuhong, WANG Yaoli |
| |
|
Forest fire smoke detection model based on deep convolution long short-term memory network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2883-2887
[Abstract]
(635)
[HTML 1 KB]
[PDF 774 KB]
(460)
|
|
|
2865 |
FU Jiupeng, ZENG Guohui, HUANG Bo, FANG Zhijun |
| |
|
Narrow channel path planning based on bidirectional rapidly-exploring random tree |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2865-2869
[Abstract]
(713)
[HTML 1 KB]
[PDF 813 KB]
(325)
|
|
|
2847 |
XI Zhihong, HAN Shuangquan, WANG Hongxu |
| |
|
Simultaneous localization and semantic mapping of indoor dynamic scene based on semantic segmentation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2847-2851
[Abstract]
(579)
[HTML 1 KB]
[PDF 735 KB]
(409)
|
|
|
116 |
CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia |
| |
|
Design and implementation of intrusion detection model for software defined network architecture |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 116-122
[Abstract]
(693)
[HTML 1 KB]
[PDF 1026 KB]
(609)
|
|
|
71 |
DENG Qi, LEI Yinjie, TIAN Feng |
| |
|
Optimized convolutional neural network method for classification of pneumonia images |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 71-76
[Abstract]
(838)
[HTML 1 KB]
[PDF 889 KB]
(882)
|
|
|
90 |
HUANG Yongxin, TANG Xuefei |
| |
|
Discovery of functional dependencies in university data based on affinity propagation clustering and TANE algorithms |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 90-95
[Abstract]
(752)
[HTML 1 KB]
[PDF 1057 KB]
(567)
|
|
|
1 |
YANG Jian, LI Zhenpeng, SU Peng |
| |
|
Review of speech segmentation and endpoint detection |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 1-7
[Abstract]
(946)
[HTML 1 KB]
[PDF 1105 KB]
(1161)
|
|
|
36 |
ZHAO Guanghua, LAI Jianhui, CHEN Yanyan, SUN Haodong, ZHANG Ye |
| |
|
Residents' travel origin and destination identification method based on naive Bayes classification |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 36-42
[Abstract]
(696)
[HTML 1 KB]
[PDF 1036 KB]
(502)
|
|
|
16 |
ZHAO Hong, WANG Le, WANG Weijie |
| |
|
Text sentiment analysis based on serial hybrid model of bi-directional long short-term memory and convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 16-22
[Abstract]
(894)
[HTML 1 KB]
[PDF 1101 KB]
(826)
|
|
|
3615 |
FENG Wenbo, HONG Zheng, WU Lifa, LI Yihao, LIN Peihong |
| |
|
Application protocol recognition method based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3615-3621
[Abstract]
(546)
[HTML 1 KB]
[PDF 1254 KB]
(537)
|
|
|
258 |
ZHANG Wu, CHEN Hongmei |
| |
|
Hyperspectral band selection algorithm based on kernelized fuzzy rough set |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 258-263
[Abstract]
(625)
[HTML 1 KB]
[PDF 959 KB]
(294)
|
|
|
783 |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke |
| |
|
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 783-787
[Abstract]
(812)
[HTML 1 KB]
[PDF 785 KB]
(474)
|
|
|
651 |
ZHAO Ya'ou, ZHANG Jiachong, LI Yibin, FU Xianrui, SHENG Wei |
| |
|
Sentiment analysis using embedding from language model and multi-scale convolutional neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 651-657
[Abstract]
(671)
[HTML 1 KB]
[PDF 866 KB]
(695)
|
|
|
1157 |
WEI Wenle, JIN Guodong, TAN Lining, LU Libin, CHEN Danqi |
| |
|
Real-time SLAM algorithm with keyframes determined by inertial measurement unit |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1157-1163
[Abstract]
(740)
[HTML 1 KB]
[PDF 3649 KB]
(481)
|
|
|
978 |
WU Yuxin, CAI Ting, ZHANG Dabin |
| |
|
Automatic smart contract classification model based on hierarchical attention mechanism and bidirectional long short-term memory neural network |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (4): 978-984
[Abstract]
(790)
[HTML 1 KB]
[PDF 1079 KB]
(1866)
|
|
|
358 |
Junying HAN, Zhenyu ZHANG, Deshi KONG |
| |
|
Distributed multi-task allocation method for user area in mobile crowd sensing |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (2): 358-362
[Abstract]
(638)
[HTML 0 KB]
[PDF 575 KB]
(744)
|
|
|
43 |
WANG Jianhua, PAN Yujie, SUN Rui |
| |
|
Flexible job-shop green scheduling algorithm considering machine tool depreciation |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 43-49
[Abstract]
(614)
[HTML 1 KB]
[PDF 997 KB]
(409)
|
|
|
233 |
LIU Ying, WANG Fengwei, LIU Weihua, AI Da, LI Yun, YANG Fanchao |
| |
|
High dynamic range imaging algorithm based on luminance partition fuzzy fusion |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 233-238
[Abstract]
(668)
[HTML 1 KB]
[PDF 1027 KB]
(391)
|
|
|
3633 |
LIU Chengbin, ZHENG Wei, FAN Xin, YANG Fengyu |
| |
|
Hybrid defect prediction model based on network representation learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3633-3638
[Abstract]
(476)
[HTML 1 KB]
[PDF 946 KB]
(334)
|
|
|
207 |
YUAN Zhixin, ZHOU Yanling |
| |
|
Unambiguous tracking method based on combined correlation function for CosBOC (10, 5) signal |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 207-211
[Abstract]
(519)
[HTML 1 KB]
[PDF 749 KB]
(309)
|
|
|
202 |
ZHOU Zhen, YUAN Zhengdao |
| |
|
Efficient communication receiver design for Internet of things environment |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 202-206
[Abstract]
(680)
[HTML 1 KB]
[PDF 819 KB]
(349)
|
|
|
212 |
WANG Shuyan, ZHENG Jiani, SUN Jiaze |
| |
|
Test case generation method for Web applications based on page object |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 212-217
[Abstract]
(664)
[HTML 1 KB]
[PDF 870 KB]
(457)
|
|
|
148 |
ZHANG En, HOU Yingying, LI Gongli, LI Huimin, LI Yu |
| |
|
Adaptive hierarchical searchable encryption scheme based on learning with errors |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 148-156
[Abstract]
(658)
[HTML 1 KB]
[PDF 1430 KB]
(472)
|
|
|
891 |
ZHOU Leilei, LIANG Chengji, HU Xiaoyuan |
| |
|
Delivery truck strategy under uncertain interference constraints |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 891-896
[Abstract]
(775)
[HTML 1 KB]
[PDF 1027 KB]
(524)
|
|
|
658 |
YU Dunhui, YUAN Xu, ZHANG Wanshan, WANG Chenxu |
| |
|
Spatiotemporal crowdsourcing online task allocation algorithm based ondynamic threshold |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 658-664
[Abstract]
(524)
[HTML 1 KB]
[PDF 974 KB]
(854)
|
|
|
103 |
WU Zhenhua, ZHANG Chao, SUN He, YAN Xuexiong |
| |
|
Survey on application of binary reverse analysis in detecting software supply chain pollution |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 103-115
[Abstract]
(984)
[HTML 1 KB]
[PDF 2085 KB]
(806)
|
|
|
865 |
WANG Yunfei, WANG Yuanyu |
| |
|
MP-CGAN: night single image dehazing algorithm based on Msmall-Patch training |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 865-871
[Abstract]
(729)
[HTML 1 KB]
[PDF 2098 KB]
(556)
|
|
|
710 |
XU Ruobo, LU Tao, WANG Yu, ZHANG Yanduo |
| |
|
Face hallucination algorithm via combined learning |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 710-716
[Abstract]
(627)
[HTML 1 KB]
[PDF 1595 KB]
(559)
|
|
|
2893 |
ZHANG Fangyan, WANG Xin, XU Xinzheng |
| |
|
Partial occlusion face recognition based on structured occlusion coding and extreme learning machine |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2893-2898
[Abstract]
(566)
[HTML 1 KB]
[PDF 865 KB]
(365)
|
|
|
3140 |
ZHENG Wenbin, LI Jinjin, YU Peiqiu, LIN Yidong |
| |
|
Matrix-based algorithm for updating approximations in variable precision multi-granulation rough sets |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3140-3145
[Abstract]
(694)
[HTML 1 KB]
[PDF 801 KB]
(204)
|
|
|
3146 |
ZHANG Yu, YU Dongjun |
| |
|
Protein-ATP binding site prediction based on 1D-convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3146-3150
[Abstract]
(562)
[HTML 1 KB]
[PDF 775 KB]
(383)
|
|
|
3210 |
ZHU Fan, WANG Hongyuan, ZHANG Ji |
| |
|
Fine-grained pedestrian detection algorithm based on improved Mask R-CNN |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3210-3215
[Abstract]
(762)
[HTML 1 KB]
[PDF 935 KB]
(480)
|
|
|
3216 |
LIU Baocheng, PIAO Yan, TANG Yue |
| |
|
Person re-identification in video sequence based on spatial-temporal regularization |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3216-3220
[Abstract]
(619)
[HTML 1 KB]
[PDF 808 KB]
(401)
|
|
|
788 |
JIN Yong, LUO Ming, DONG Mingyang |
| |
|
User grouping and power allocation strategy based on NOMA system |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 788-792
[Abstract]
(937)
[HTML 1 KB]
[PDF 574 KB]
(608)
|
|
|
631 |
CHEN Meijie, XIE Zhenping, CHEN Xiaoqi, XU Peng |
| |
|
Novel bidirectional aggregation degree feature extraction method forpatent new word discovery |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (3): 631-637
[Abstract]
(565)
[HTML 1 KB]
[PDF 772 KB]
(668)
|
|
|
227 |
MA Weiping, LI Wenxin, SUN Jinchuan, CAO Pengxia |
| |
|
Binocular vision target positioning method based on coarse-fine stereo matching |
| |
|
|
Journal of Computer Applications
2020 Vol.40 (1): 227-232
[Abstract]
(616)
[HTML 1 KB]
[PDF 996 KB]
(413)
|
|
|
3440 |
DENG Yang, XIE Ning, YANG Yang |
| |
|
Siamese detection network based real-time video tracking algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3440-3444
[Abstract]
(706)
[HTML 1 KB]
[PDF 787 KB]
(491)
|
|
|
3450 |
XU Shanshan, YAN Chao, GAO Linming |
| |
|
Lake extraction algorithm based on three-dimensional convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3450-3455
[Abstract]
(702)
[HTML 1 KB]
[PDF 920 KB]
(458)
|
|
|
3445 |
LU Jingang, ZHANG Li |
| |
|
Crowd counting model based on multi-scale multi-column convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3445-3449
[Abstract]
(676)
[HTML 1 KB]
[PDF 773 KB]
(455)
|
|
|
3420 |
YANG Donghai, LIN Minmin, ZHANG Wenjie, YANG Jingmin |
| |
|
Image classification learning via unsupervised mixed-order stacked sparse autoencoder |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3420-3425
[Abstract]
(787)
[HTML 1 KB]
[PDF 1005 KB]
(515)
|
|
|
3415 |
CHEN Kejia, YANG Zeyu, LIU Zheng, LU Hao |
| |
|
Graph convolutional network model using neighborhood selection strategy |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3415-3419
[Abstract]
(902)
[HTML 1 KB]
[PDF 759 KB]
(906)
|
|
|
3575 |
ZHOU Jian, JIN Yu, HE Heng, LI Peng |
| |
|
Dynamic cloud data audit model based on nest Merkle Hash tree block chain |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3575-3583
[Abstract]
(845)
[HTML 1 KB]
[PDF 1372 KB]
(384)
|
|
|
3298 |
WANG Peng, WU Kang, YAN Fang, WANG Kenian, ZHANG Xiaochen |
| |
|
Security verification method of safety critical software based on system theoretic process analysis |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3298-3303
[Abstract]
(687)
[HTML 1 KB]
[PDF 969 KB]
(293)
|
|
|
3665 |
ZHANG Wenbin, ZHU Min, ZHANG Ning, DONG Le |
| |
|
Plant image segmentation method under bias light based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3665-3672
[Abstract]
(601)
[HTML 1 KB]
[PDF 1365 KB]
(492)
|
|
|
3328 |
SUN Min, YE Qiaonan, CHEN Zhongxiong |
| |
|
Task scheduling of variance-directional variation genetic algorithm in cloud environment |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3328-3332
[Abstract]
(567)
[HTML 1 KB]
[PDF 814 KB]
(261)
|
|
|
3257 |
LIU Xiaoming, SHEN Mingyu, HOU Zhengfeng |
| |
|
Firefly fuzzy clustering algorithm based on Levy flight |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3257-3262
[Abstract]
(720)
[HTML 1 KB]
[PDF 858 KB]
(426)
|
|
|
3349 |
JI Xiaofei, QIN Linlin, WANG Yangyang |
| |
|
Human interaction recognition based on RGB and skeleton data fusion model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3349-3354
[Abstract]
(679)
[HTML 1 KB]
[PDF 993 KB]
(437)
|
|
|
3293 |
SUN Shilei, WANG Chao, ZHAO Yuandi |
| |
|
Parameter independent clustering of air traffic trajectory based on silhouette coefficient |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3293-3297
[Abstract]
(686)
[HTML 1 KB]
[PDF 818 KB]
(226)
|
|
|
3274 |
WANG Ping, GAO Chen, ZHU Li, ZHAO Jun, ZHANG Jing, KONG Weiming |
| |
|
Segmentation algorithm of ischemic stroke lesion based on 3D deep residual network and cascade U-Net |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3274-3279
[Abstract]
(814)
[HTML 1 KB]
[PDF 959 KB]
(475)
|
|
|
3250 |
CHEN Linfeng, QI Xuemei, CHEN Junwen, HUANG Cheng, CHEN Fulong |
| |
|
Quantum-inspired migrating birds co-optimization algorithm for lot-streaming flow shop scheduling problem |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3250-3256
[Abstract]
(779)
[HTML 1 KB]
[PDF 949 KB]
(329)
|
|
|
3343 |
MIAO Sheng, DONG Liang, DONG Jian'e, ZHONG Lihui |
| |
|
Multi-objective automatic identification and localization system in mobile cellular networks |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3343-3348
[Abstract]
(689)
[HTML 1 KB]
[PDF 905 KB]
(345)
|
|
|
2870 |
BAI Liyun, HU Xuemin, SONG Sheng, TONG Xiuchi, ZHANG Ruohan |
| |
|
Motion planning model based on deep cascaded neural network for autonomous driving |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2870-2875
[Abstract]
(690)
[HTML 1 KB]
[PDF 992 KB]
(412)
|
|
|
2930 |
QIU Jinyi, LUO Jun, LI Xiu, JIA Wei, NI Fuchuan, FENG Hui |
| |
|
Multi-scale grape image recognition method based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2930-2936
[Abstract]
(736)
[HTML 1 KB]
[PDF 1038 KB]
(471)
|
|
|
3046 |
LI Hong, WANG Ruiyao, GENG Zexun, HU Haifeng |
| |
|
Low-illumination image enhancement algorithm based on multi-scale gradient domain guided filtering |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3046-3052
[Abstract]
(579)
[HTML 1 KB]
[PDF 1112 KB]
(448)
|
|
|
3018 |
QIN Biao, GUO Fan, TU Fengtao |
| |
|
Correctness verification of static taint analysis results for Android application |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3018-3027
[Abstract]
(644)
[HTML 1 KB]
[PDF 1509 KB]
(320)
|
|
|
3002 |
DONG Haiyan, YU Feng, CHENG Ke, HUANG Shucheng |
| |
|
Credibility analysis method of online user behavior based on non-interference theory |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3002-3006
[Abstract]
(505)
[HTML 1 KB]
[PDF 863 KB]
(326)
|
|
|
2937 |
WANG Kang, DONG Yuanfei |
| |
|
Angular interval embedding based end-to-end voiceprint recognition model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2937-2941
[Abstract]
(553)
[HTML 1 KB]
[PDF 827 KB]
(356)
|
|
|
2381 |
WANG Shouhua, LI Yunke, SUN Xiyan, JI Yuanfa |
| |
|
Dual-antenna attitude determination algorithm based on low-cost receiver |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2381-2385
[Abstract]
(663)
[HTML 1 KB]
[PDF 723 KB]
(367)
|
|
|
2276 |
CHEN Shanxue, CHU Chengquan |
| |
|
Hyperspectral unmixing based on sparse and orthogonal constrained non-negative matrix factorization |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2276-2280
[Abstract]
(818)
[HTML 1 KB]
[PDF 773 KB]
(388)
|
|
|
2252 |
LIU Guoqing, WANG Jieting, HU Zhiguo, QIAN Yuhua |
| |
|
Best action identification of tree structure based on ternary multi-arm bandit |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2252-2260
[Abstract]
(508)
[HTML 1 KB]
[PDF 1397 KB]
(332)
|
|
|
2223 |
DENG Xuan, LIAO Kaiyang, ZHENG Yuanlin, YUAN Hui, LEI Hao, CHEN Bing |
| |
|
Person re-identification based on deep multi-view feature distance learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2223-2229
[Abstract]
(872)
[HTML 1 KB]
[PDF 1190 KB]
(393)
|
|
|
2134 |
CHEN Li, CHEN Xiaoyun |
| |
|
Detection method of hard exudates in fundus images by combining local entropy and robust principal components analysis |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2134-2140
[Abstract]
(372)
[HTML 1 KB]
[PDF 1062 KB]
(310)
|
|
|
2121 |
ZHU Kai, FU Zhongliang, CHEN Xiaoqing |
| |
|
Left ventricular segmentation method of ultrasound image based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2121-2124
[Abstract]
(606)
[HTML 1 KB]
[PDF 690 KB]
(397)
|
|
|
2103 |
LI Wenjun, CHEN Bin, LI Jianming, QIAN Jide |
| |
|
Surface scratch recognition method based on deep neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2103-2108
[Abstract]
(625)
[HTML 1 KB]
[PDF 997 KB]
(463)
|
|
|
2087 |
WAGN Keqiang, ZHANG Yushuai, WANG Baoqun |
| |
|
Multi-exposure image fusion algorithm based on Retinex theory |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2087-2092
[Abstract]
(637)
[HTML 1 KB]
[PDF 994 KB]
(399)
|
|
|
1948 |
WU Hao, WANG Xincan, LI Xinyun, LIU Zhifen, CHEN Junjie, GUO Hao |
| |
|
Brain function network feature selection and classification based on multi-level template |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1948-1953
[Abstract]
(409)
[HTML 1 KB]
[PDF 1024 KB]
(353)
|
|
|
1931 |
MENG Shilin, ZHAO Yunlong, GUAN Donghai, ZHAI Xiangping |
| |
|
Sentiment analysis method combining sentiment and semantic information |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1931-1935
[Abstract]
(638)
[HTML 1 KB]
[PDF 825 KB]
(444)
|
|
|
1899 |
HU Liang, XIAO Renbin, LI Hao |
| |
|
Bee colony double inhibition labor division algorithm and its application in traffic signal timing |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1899-1904
[Abstract]
(508)
[HTML 1 KB]
[PDF 1080 KB]
(373)
|
|
|
3065 |
GE Wanying, ZHANG Tianqi |
| |
|
Monaural speech enhancement algorithm based on mask estimation and optimization |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3065-3070
[Abstract]
(578)
[HTML 1 KB]
[PDF 892 KB]
(356)
|
|
|
2795 |
LI Xinbin, ZHANG Shoutao, YAN Lei, HAN Song |
| |
|
Multiple autonomous underwater vehicle task allocation policy based on robust Restless Bandit model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2795-2801
[Abstract]
(512)
[HTML 1 KB]
[PDF 1025 KB]
(524)
|
|
|
2905 |
XU Yue, FENG Mengru, PI Jiatian, CHEN Yong |
| |
|
Remote sensing image segmentation method based on deep learning model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2905-2914
[Abstract]
(1029)
[HTML 1 KB]
[PDF 1531 KB]
(682)
|
|
|
2802 |
GAO Qinquan, ZHAO Yan, LI Gen, TONG Tong |
| |
|
Compression method of super-resolution convolutional neural network based on knowledge distillation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2802-2808
[Abstract]
(882)
[HTML 1 KB]
[PDF 1103 KB]
(889)
|
|
|
2636 |
MA Minyao, XU Yi, LIU Zhuo |
| |
|
Privacy preserving Hamming distance computing problem of DNA sequences |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2636-2640
[Abstract]
(775)
[HTML 1 KB]
[PDF 816 KB]
(409)
|
|
|
2669 |
SHAO Hao, WANG Lunwen, DENG Jian |
| |
|
Important node identification method for dynamic networks based on H operation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2669-2674
[Abstract]
(891)
[HTML 1 KB]
[PDF 850 KB]
(468)
|
|
|
1863 |
CHEN Tian, ZUO Yongsheng, AN Xin, REN Fuji |
| |
|
Test data compatible compression method based on tri-state signal |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1863-1868
[Abstract]
(566)
[HTML 1 KB]
[PDF 942 KB]
(331)
|
|
|
1824 |
WANG Xilong, WANG Jicheng, LUO Cheng, TIAN Xiuxia |
| |
|
Evolutionary game model under synergistic effect of time scale and selection preference |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1824-1828
[Abstract]
(639)
[HTML 1 KB]
[PDF 800 KB]
(337)
|
|
|
1780 |
DING Ning, GUAN Xinrong, YANG Weiwei |
| |
|
Quantitative analysis of physical secret key in OFDM channel based on universal software radio peripheral |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1780-1785
[Abstract]
(599)
[HTML 1 KB]
[PDF 990 KB]
(277)
|
|
|
1753 |
AN Xin, ZHANG Ying, KANG An, CHEN Tian, LI Jianhua |
| |
|
Machine learning based online mapping approach for heterogeneous multi-core processor system |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1753-1759
[Abstract]
(589)
[HTML 1 KB]
[PDF 1164 KB]
(350)
|
|
|
1747 |
KONG Jing, GUO Yuanbo, LIU Chunhui, WANG Yifeng |
| |
|
Gait feature identification method based on motion sensor in smartphone |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1747-1752
[Abstract]
(764)
[HTML 1 KB]
[PDF 1043 KB]
(395)
|
|
|
1735 |
XU Bingfeng, ZHONG Zhicheng, HE Gaofeng |
| |
|
Risk analysis of cyber-physical system based on dynamic fault trees |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1735-1741
[Abstract]
(590)
[HTML 1 KB]
[PDF 1050 KB]
(395)
|
|
|
1713 |
ZENG Jianping, CHEN Qile, WU Chengrong, FANG Xi |
| |
|
Analysis method of passwords under Chinese context |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1713-1718
[Abstract]
(648)
[HTML 1 KB]
[PDF 1028 KB]
(253)
|
|
|
1690 |
LIU Yuzhen, JIANG Zhengquan, ZHAO Na |
| |
|
Three dimensional palmprint recognition based on neighbor ternary pattern and collaborative representation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1690-1695
[Abstract]
(510)
[HTML 1 KB]
[PDF 887 KB]
(367)
|
|
|
1685 |
SANG Gaoli, YAN Chao, ZHU Rong |
| |
|
Expression-insensitive three-dimensional face recognition algorithm based on multi-region fusion |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1685-1689
[Abstract]
(591)
[HTML 1 KB]
[PDF 841 KB]
(215)
|
|
|
1675 |
ZHENG Yi, QI Donglian, WANG Zhenyu |
| |
|
YOLO network character recognition method with variable candidate box density for international phonetic alphabet |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1675-1679
[Abstract]
(552)
[HTML 1 KB]
[PDF 730 KB]
(367)
|
|
|
1669 |
SHENG Heng, HUANG Ming, YANG Jingjing |
| |
|
Laboratory personnel statistics and management system based on Faster R-CNN and IoU optimization |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1669-1674
[Abstract]
(561)
[HTML 1 KB]
[PDF 912 KB]
(395)
|
|
|
1657 |
ZHANG Dezheng, WENG Liguo, XIA Min, CAO Hui |
| |
|
Video frame prediction based on deep convolutional long short-term memory neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1657-1662
[Abstract]
(629)
[HTML 1 KB]
[PDF 1005 KB]
(396)
|
|
|
1652 |
YANG Kang, SONG Huihui, ZHANG Kaihua |
| |
|
Real-time visual tracking based on dual attention siamese network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1652-1656
[Abstract]
(766)
[HTML 1 KB]
[PDF 800 KB]
(516)
|
|
|
1646 |
WEN Chang, LIU Yu, GU Jinguang |
| |
|
Evolution relationship extraction of emergency based on attention-based bidirectional long short-term memory network model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1646-1651
[Abstract]
(590)
[HTML 1 KB]
[PDF 973 KB]
(476)
|
|
|
1639 |
CHEN Zhihao, YU Xiang, LIU Zichen, QIU Dawei, GU Bengang |
| |
|
Chinese medical question answer matching method based on attention mechanism and character embedding |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1639-1645
[Abstract]
(617)
[HTML 1 KB]
[PDF 1101 KB]
(464)
|
|
|
1632 |
WANG Wentao, WU Lintao, HUANG Ye, ZHU Rongbo |
| |
|
Link prediction model based on densely connected convolutional network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1632-1638
[Abstract]
(635)
[HTML 1 KB]
[PDF 1061 KB]
(452)
|
|
|
2992 |
CHEN Menghui, LIU Junlin, XU Jianfeng, LI Xiangjun |
| |
|
Imperialist competitive algorithm based on multiple search strategy for solving traveling salesman problem |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2992-2996
[Abstract]
(501)
[HTML 1 KB]
[PDF 802 KB]
(344)
|
|
|
3053 |
YANG Chunde, CHENG Yanfei |
| |
|
Fast image mosaic algorithm based on adaptive elimination of stitching seam and panorama alignment |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3053-3059
[Abstract]
(785)
[HTML 1 KB]
[PDF 1150 KB]
(493)
|
|
|
2568 |
LI Minze, LI Xiaoxia, WANG Xueyuan, SUN Wei |
| |
|
Real-time facial expression recognition based on convolutional neural network with multi-scale kernel feature |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2568-2574
[Abstract]
(994)
[HTML 1 KB]
[PDF 1097 KB]
(594)
|
|
|
2784 |
LI Bo, ZHANG Xiao, YAN Jingyi, LI Kewei, LI Heng, LING Yulong, ZHANG Yong |
| |
|
Application of
KNN algorithm based on value difference metric and clustering optimization in bank customer behavior prediction |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2784-2788
[Abstract]
(729)
[HTML 1 KB]
[PDF 806 KB]
(572)
|
|
|
2652 |
WANG Dan, LI Anyi, YANG Yanjuan |
| |
|
Low complexity narrowband physical downlink control channel blind detection algorithm based on correlation detection |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2652-2657
[Abstract]
(816)
[HTML 1 KB]
[PDF 1016 KB]
(379)
|
|
|
2738 |
CHEN Longbiao, CHEN Yuzhang, WANG Xiaochen, ZOU Peng, HU Xuemin |
| |
|
Underwater image super-resolution reconstruction method based on deep learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2738-2743
[Abstract]
(792)
[HTML 1 KB]
[PDF 893 KB]
(576)
|
|
|
2955 |
LI Jianxun, MA Meiling, GUO Jianhua, YAN Jun |
| |
|
False trend time series detection based on randomness analysis |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2955-2959
[Abstract]
(455)
[HTML 1 KB]
[PDF 805 KB]
(356)
|
|
|
2841 |
WANG Liya, LIU Changhui, CAI Dunbo, LU Tao |
| |
|
Chinese text sentiment analysis based on CNN-BiGRU network with attention mechanism |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2841-2846
[Abstract]
(2024)
[HTML 1 KB]
[PDF 909 KB]
(580)
|
|
|
2580 |
ZHAO Ruixiang, HOU Honghua, ZHANG Pengcheng, LIU Yi, TIAN Zhu, GUI Zhiguo |
| |
|
Welding ball edge bubble segmentation for ball grid array based on full convolutional network and
K-means clustering |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2580-2585
[Abstract]
(596)
[HTML 1 KB]
[PDF 1006 KB]
(483)
|
|
|
2712 |
LIAO Bin, TAN Daoqiang, WU Wen |
| |
|
Single image shadow removal based on attenuated generative adversarial networks |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2712-2718
[Abstract]
(597)
[HTML 1 KB]
[PDF 1327 KB]
(368)
|
|
|
3034 |
CAI Xingquan, SUN Chen, GE Yakun |
| |
|
Mesh parameterization method based on limiting distortion |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3034-3039
[Abstract]
(456)
[HTML 1 KB]
[PDF 991 KB]
(295)
|
|
|
2915 |
QIN Pinle, LI Pengbo, ZENG Jianchao, ZHU Hui, XU Shaowei |
| |
|
Automatic recognition algorithm for cervical lymph nodes using cascaded fully convolutional neural networks |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2915-2922
[Abstract]
(468)
[HTML 1 KB]
[PDF 1267 KB]
(400)
|
|
|
2695 |
CAO Yunyang, WANG Tao |
| |
|
Semi-supervised image segmentation based on prior Laplacian coordinates |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2695-2700
[Abstract]
(538)
[HTML 1 KB]
[PDF 1037 KB]
(432)
|
|
|
2541 |
LIU Ying, LIANG Nannan, LI Daxiang, YANG Fanchao |
| |
|
Hyperspectral image unmixing algorithm based on spectral distance clustering |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2541-2546
[Abstract]
(959)
[HTML 1 KB]
[PDF 997 KB]
(434)
|
|
|
2689 |
YAO Luji, ZHANG Li |
| |
|
Design and implementation of Chinese architecture history teaching system based on mixed reality technology |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2689-2694
[Abstract]
(549)
[HTML 1 KB]
[PDF 1150 KB]
(532)
|
|
|
2505 |
SONG Xiaona, RUI Ting, WANG Xinqing |
| |
|
Semantic segmentation method of road environment combined semantic boundary information |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2505-2510
[Abstract]
(711)
[HTML 1 KB]
[PDF 1018 KB]
(794)
|
|
|
2726 |
ZHANG Zheng, HE Shan, HE Jingqi |
| |
|
Video colorization method based on hybrid neural network model of long short term memory and convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2726-2730
[Abstract]
(686)
[HTML 1 KB]
[PDF 985 KB]
(434)
|
|
|
2765 |
LI Zhuo, LI Yinzhen, LI Wenxia |
| |
|
Multi-objective optimization model and solution algorithm for emergency material transportation path |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2765-2771
[Abstract]
(1318)
[HTML 1 KB]
[PDF 983 KB]
(537)
|
|
|
2658 |
LI Fangwei, ZHOU Jiawei, ZHANG Haibo |
| |
|
Secure optimized transmission scheme of artificial noise assisted time inversion in D2D cross-cell communication |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2658-2663
[Abstract]
(683)
[HTML 1 KB]
[PDF 857 KB]
(374)
|
|
|
2604 |
YANG Hongyu, WANG Fengyan |
| |
|
Network intrusion detection model based on improved convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2604-2610
[Abstract]
(816)
[HTML 1 KB]
[PDF 1032 KB]
(524)
|
|
|
2552 |
JIA Ruiming, QIU Zhenzhi, CUI Jiali, WANG Yiding |
| |
|
Deep multi-scale encoder-decoder convolutional network for blind deblurring |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2552-2557
[Abstract]
(904)
[HTML 1 KB]
[PDF 1078 KB]
(573)
|
|
|
1512 |
ZHANG Yansheng, LI Xiwang, LI Dan, YANG Hua |
| |
|
Abnormal flow monitoring of industrial control network based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1512-1517
[Abstract]
(1036)
[HTML 1 KB]
[PDF 956 KB]
(684)
|
|
|
1495 |
SHU Lingzhou, WU Jia, WANG Chen |
| |
|
Urban traffic signal control based on deep reinforcement learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1495-1499
[Abstract]
(1388)
[HTML 1 KB]
[PDF 850 KB]
(876)
|
|
|
1485 |
LI Xian, WANG Yan, LUO Yong, ZHOU Jiliu |
| |
|
Segmentation of nasopharyngeal neoplasms based on random forest feature selection algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1485-1489
[Abstract]
(549)
[HTML 1 KB]
[PDF 796 KB]
(499)
|
|
|
1440 |
LIU Yuefeng, YANG Hanxi, CAI Shuang, ZHANG Chenrong |
| |
|
Single image super-resolution reconstruction method based on improved convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1440-1447
[Abstract]
(706)
[HTML 1 KB]
[PDF 1411 KB]
(453)
|
|
|
1421 |
YANG Yanan, XIA Bin, ZHAO Lei, YUAN Wenhao |
| |
|
Ultra-wideband channel environment classification algorithm based on CNN |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1421-1424
[Abstract]
(541)
[HTML 1 KB]
[PDF 561 KB]
(352)
|
|
|
1405 |
ZHOU Fei, XIA Pengcheng |
| |
|
Signal strength difference fingerprint localization algorithm based on principal component analysis and chi-square distance |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1405-1410
[Abstract]
(586)
[HTML 1 KB]
[PDF 958 KB]
(380)
|
|
|
1394 |
ZHANG Shuxuan, KANG Haiyan, YAN Han |
| |
|
Privacy preserving for social network relational data based on Skyline computing |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1394-1399
[Abstract]
(611)
[HTML 1 KB]
[PDF 902 KB]
(424)
|
|
|
1389 |
ZHANG Hanfang, ZHOU Anmin, JIA Peng, LIU Luping, LIU Liang |
| |
|
Directed fuzzing method for binary programs |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1389-1393
[Abstract]
(799)
[HTML 1 KB]
[PDF 899 KB]
(583)
|
|
|
1378 |
HAN Si, ZHENG Baokun, CAO Qimin |
| |
|
Logical key hierarchy plus based key management program for wireless sensor network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1378-1384
[Abstract]
(633)
[HTML 1 KB]
[PDF 1118 KB]
(382)
|
|
|
1357 |
ZHANG Xingsheng, YU Dunhui, ZHANG Wanshan, WANG Chenxu |
| |
|
Time utility balanced online task assignment algorithm under spatial crowdsourcing environment |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1357-1363
[Abstract]
(1645)
[HTML 1 KB]
[PDF 1051 KB]
(565)
|
|
|
1330 |
FAN Jili, HE Pu, LI Xiaohua, NIE Tiezheng, YU Ge |
| |
|
Blockchain based decentralized item sharing and transaction service system |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1330-1335
[Abstract]
(1068)
[HTML 1 KB]
[PDF 933 KB]
(522)
|
|
|
1312 |
WANG Kun, ZENG Guohui, LU Dunke, HUANG Bo, LI Xiaobin |
| |
|
Path planning of mobile robot based on improved asymptotically-optimal bidirectional rapidly-exploring random tree algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1312-1317
[Abstract]
(788)
[HTML 1 KB]
[PDF 910 KB]
(496)
|
|
|
1299 |
TANG Chen, LI Yonghua, RAO Mengni, HU Gangjun |
| |
|
Semantic judgement method of polysemous keywords in dynamic requirement traceability |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1299-1304
[Abstract]
(684)
[HTML 1 KB]
[PDF 892 KB]
(470)
|
|
|
1288 |
YAN Hong, CHEN Xingshu, WANG Wenxian, WANG Haizhou, YIN Mingyong |
| |
|
Recognition model for French named entities based on deep neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1288-1292
[Abstract]
(655)
[HTML 1 KB]
[PDF 796 KB]
(698)
|
|
|
1261 |
SHAO Changcheng, CHEN Pinghua |
| |
|
Point-of-interest recommendation integrating social networks and image contents |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1261-1268
[Abstract]
(905)
[HTML 1 KB]
[PDF 1145 KB]
(650)
|
|
|
1247 |
XU Yi, XIAO Peng |
| |
|
Dynamic updating method of approximations in multigranulation rough sets based on tolerance relation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1247-1251
[Abstract]
(729)
[HTML 1 KB]
[PDF 717 KB]
(692)
|
|
|
2997 |
HUANG Bin, BAO Liyong, DING Hongwei |
| |
|
Construction and characteristic analysis of Chebyshev mapping system based on homogenized distribution |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2997-3001
[Abstract]
(444)
[HTML 1 KB]
[PDF 719 KB]
(249)
|
|
|
2302 |
REN Yuzhu, ZHANG Youwei, AI Chengwei |
| |
|
Survey on taint analysis technology |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2302-2309
[Abstract]
(2677)
[HTML 1 KB]
[PDF 1432 KB]
(1121)
|
|
|
2683 |
HE Huaiqing, ZHENG Liyuan, LIU Haohan, ZHANG Yumin |
| |
|
Visual analysis method for pilot eye movement data based on user-defined interest area |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2683-2688
[Abstract]
(559)
[HTML 1 KB]
[PDF 922 KB]
(427)
|
|
|
2629 |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng |
| |
|
Threshold signature scheme suitable for blockchain electronic voting scenes |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2629-2635
[Abstract]
(717)
[HTML 1 KB]
[PDF 1051 KB]
(559)
|
|
|
2744 |
WAN Yongjing, WANG Bowei, LOU Dingfeng |
| |
|
Insect sound feature recognition method based on three-dimensional convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2744-2748
[Abstract]
(791)
[HTML 1 KB]
[PDF 794 KB]
(453)
|
|
|
2333 |
LANG Dapeng, DING Wei, JIANG Haocheng, CHEN Zhiyuang |
| |
|
Malicious code classification algorithm based on multi-feature fusion |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2333-2338
[Abstract]
(598)
[HTML 1 KB]
[PDF 902 KB]
(444)
|
|
|
2535 |
JING Nianzhao, YANG Wei |
| |
|
Fine edge detection model based on RCF |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2535-2540
[Abstract]
(1671)
[HTML 1 KB]
[PDF 970 KB]
(670)
|
|
|
2181 |
CAI Guoyong, HE Xinhao, CHU Yangyang |
| |
|
Visual sentiment analysis by combining global and local regions of image |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2181-2185
[Abstract]
(786)
[HTML 1 KB]
[PDF 901 KB]
(899)
|
|
|
2210 |
DING Lianjing, LIU Guangshuai, LI Xurui, CHEN Xiaowen |
| |
|
Face recognition combining weighted information entropy with enhanced local binary pattern |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2210-2216
[Abstract]
(702)
[HTML 1 KB]
[PDF 1131 KB]
(444)
|
|
|
2402 |
LIU Hu, ZHOU Ye, YUAN Jiabin |
| |
|
Fine-grained vehicle recognition under multiple angles based on multi-scale bilinear convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2402-2407
[Abstract]
(1051)
[HTML 1 KB]
[PDF 936 KB]
(588)
|
|
|
2431 |
LI Yefei, XU Chao, XU Daoqiang, ZOU Yunfeng, ZHANG Xiaoda, QIAN Zhuzhong |
| |
|
Online task scheduling algorithm for big data analytics based on cumulative running work |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2431-2437
[Abstract]
(601)
[HTML 1 KB]
[PDF 1056 KB]
(357)
|
|
|
2081 |
WANG Ping, PANG Wenhao |
| |
|
Two-stream CNN for action recognition based on video segmentation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2081-2086
[Abstract]
(594)
[HTML 1 KB]
[PDF 1002 KB]
(537)
|
|
|
1918 |
CHEN Jiafeng, TENG Chong |
| |
|
Joint entity and relation extraction model based on reinforcement learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1918-1924
[Abstract]
(764)
[HTML 1 KB]
[PDF 1115 KB]
(531)
|
|
|
2297 |
GONG Yanlu, LYU Jia |
| |
|
Co-training algorithm with combination of active learning and density peak clustering |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2297-2301
[Abstract]
(707)
[HTML 1 KB]
[PDF 770 KB]
(355)
|
|
|
2475 |
YANG Huihua, ZHANG Tianyu, LI Lingqiao, PAN Xipeng |
| |
|
Target recognition algorithm for urban management cases by mobile devices based on MobileNet |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2475-2479
[Abstract]
(727)
[HTML 1 KB]
[PDF 819 KB]
(400)
|
|
|
2484 |
DING Yingzi, DING Xiangqian, GUO Baoqi |
| |
|
Application of improved GoogLeNet based on weak supervision in DR detection |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2484-2488
[Abstract]
(622)
[HTML 1 KB]
[PDF 750 KB]
(375)
|
|
|
2065 |
YUAN Yue, LI Yi |
| |
|
Polynomial ranking function detection method based on Dixon resultant and successive difference substitution |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2065-2073
[Abstract]
(383)
[HTML 1 KB]
[PDF 1216 KB]
(307)
|
|
|
2391 |
OUYANG Ning, LIANG Ting, LIN Leping |
| |
|
Self-attention network based image super-resolution |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2391-2395
[Abstract]
(891)
[HTML 1 KB]
[PDF 798 KB]
(469)
|
|
|
2125 |
WANG Lishun, ZHONG Yong, LI Zhendong, HE Yilong |
| |
|
On-line fabric defect recognition algorithm based on deep learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2125-2128
[Abstract]
(920)
[HTML 1 KB]
[PDF 681 KB]
(505)
|
|
|
2456 |
LYU Ruimin, YANG Fan, LU Jing, CHEN Wei |
| |
|
Gamification design and effect analysis of color education |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2456-2461
[Abstract]
(613)
[HTML 1 KB]
[PDF 875 KB]
(339)
|
|
|
2414 |
ZHANG Yubo, ZHANG Yadong, ZHANG Bin |
| |
|
Desktop dust detection algorithm based on gray gradient co-occurrence matrix |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2414-2419
[Abstract]
(819)
[HTML 1 KB]
[PDF 1004 KB]
(324)
|
|
|
1888 |
KIM Chungsong, LI Dong |
| |
|
Deep learning neural network model for consumer preference prediction |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1888-1893
[Abstract]
(876)
[HTML 1 KB]
[PDF 1094 KB]
(604)
|
|
|
2109 |
DENG Zhonghao, CHEN Xiaodong |
| |
|
Pulmonary nodule detection algorithm based on deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2109-2115
[Abstract]
(774)
[HTML 1 KB]
[PDF 1207 KB]
(524)
|
|
|
2450 |
MENG Zhao, TIAN Shengwei, YU Long, WANG Ruijin |
| |
|
Regional bullying recognition based on joint hierarchical attentional network and independent recurrent neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2450-2455
[Abstract]
(685)
[HTML 1 KB]
[PDF 983 KB]
(365)
|
|
|
1973 |
MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun |
| |
|
Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1973-1978
[Abstract]
(503)
[HTML 1 KB]
[PDF 900 KB]
(369)
|
|
|
1229 |
LIU Shuai, LIU Changliang, ZHEN Chenggang |
| |
|
Multivariate time series fault warning for wind turbine gearbox |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1229-1233
[Abstract]
(686)
[HTML 1 KB]
[PDF 820 KB]
(460)
|
|
|
1201 |
ZHOU Yujin, WANG Xiaodong, ZHANG Lige, ZHU Kai, YAO Yu |
| |
|
Feature point localization of left ventricular ultrasound image based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1201-1207
[Abstract]
(696)
[HTML 1 KB]
[PDF 1169 KB]
(420)
|
|
|
1196 |
QIU Jiajun, WU Yue, HUI Bei, LIU Yanbo |
| |
|
Fractional differential algorithm based on wavelet transform applied on texture enhancement of liver tumor in CT image |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1196-1200
[Abstract]
(657)
[HTML 1 KB]
[PDF 920 KB]
(387)
|
|
|
1183 |
PAN Peike, WANG Yan, LUO Yong, ZHOU Jiliu |
| |
|
Automatic segmentation of nasopharyngeal neoplasm in MR image based on U-net model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1183-1188
[Abstract]
(599)
[HTML 1 KB]
[PDF 970 KB]
(425)
|
|
|
1162 |
CHENG Yu, DENG Dexiang, YAN Jia, FAN Ci'en |
| |
|
Weakly illuminated image enhancement algorithm based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1162-1169
[Abstract]
(2220)
[HTML 1 KB]
[PDF 1448 KB]
(1008)
|
|
|
1138 |
XU Xingchen, CHENG Jian, TANG Jingyu, ZHANG Jian |
| |
|
Phase error analysis and amplitude improvement algorithm for asymmetric paired carry multiple access signal |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1138-1144
[Abstract]
(539)
[HTML 1 KB]
[PDF 935 KB]
(308)
|
|
|
1133 |
ZHOU Wei, XIANG Danlei, GUO Mengyu |
| |
|
Low complexity reactive tabu search detection algorithm in MIMO-GFDM systems |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1133-1137
[Abstract]
(661)
[HTML 1 KB]
[PDF 721 KB]
(307)
|
|
|
1122 |
HUANG Sheng, FU Yuanpeng, ZHANG Qianyun |
| |
|
Rate smooth switching algorithm based on DASH standard |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1122-1126
[Abstract]
(566)
[HTML 1 KB]
[PDF 887 KB]
(382)
|
|
|
1117 |
WU Jie, LYU Yongle |
| |
|
Optimal combination prediction based on polynomial coefficient autoregressive model for radar performance parameter |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1117-1121
[Abstract]
(540)
[HTML 1 KB]
[PDF 795 KB]
(372)
|
|
|
1100 |
REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun |
| |
|
Low-density 3D model information hiding algorithm based on multple fusion states |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1100-1105
[Abstract]
(774)
[HTML 1 KB]
[PDF 929 KB]
(315)
|
|
|
1095 |
ZHOU Yang, WU Qiwu, JIANG Lingzhi |
| |
|
Group key management scheme based on distributed path computing element in multi-domain optical network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1095-1099
[Abstract]
(591)
[HTML 1 KB]
[PDF 786 KB]
(288)
|
|
|
1089 |
CHEN Wanzhi, XU Dongsheng, ZHANG Jing, TANG Yu |
| |
|
Intrusion detection method for industrial control system with optimized support vector machine and
K-means++ |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1089-1094
[Abstract]
(568)
[HTML 1 KB]
[PDF 829 KB]
(377)
|
|
|
1066 |
ZOU Chengming, LIU Panwen, TANG Xing |
| |
|
Real-time defence against dynamic host configuration protocol flood attack in software defined network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1066-1072
[Abstract]
(525)
[HTML 1 KB]
[PDF 1082 KB]
(357)
|
|
|
1059 |
PANG Xiaoqiong, YAN Xiaolong, CHEN Wenjun, YU Benguo, NIE Mengfei |
| |
|
Dynamic multi-keyword ranked search over encrypted data supporting semantic extension |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1059-1065
[Abstract]
(860)
[HTML 1 KB]
[PDF 1001 KB]
(394)
|
|
|
1032 |
MAO Yimin, LIU Yinping, LIANG Tian, MAO Dinghui |
| |
|
Functional module mining in uncertain protein-protein interaction network based on fuzzy spectral clustering |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1032-1040
[Abstract]
(600)
[HTML 1 KB]
[PDF 1499 KB]
(366)
|
|
|
994 |
DENG Tianmin, FANG Fang, YUE Yunxia, YANG Qizhi |
| |
|
GNSS/INS global high-precision positioning method based on Elman neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 994-1000
[Abstract]
(721)
[HTML 1 KB]
[PDF 1000 KB]
(321)
|
|
|
989 |
HU Zhangfang, ZENG Linquan, LUO Yuan, LUO Xin, ZHAO Liming |
| |
|
Adaptive Monte-Carlo localization algorithm integrated with two-dimensional code information |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 989-993
[Abstract]
(897)
[HTML 1 KB]
[PDF 790 KB]
(459)
|
|
|
977 |
QI Ziliang, QU Hanbing, ZHAO Chuanhu, DONG Liang, LI Bozhao, WANG changsheng |
| |
|
Person re-identification based on Siamese network and bidirectional max margin ranking loss |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 977-983
[Abstract]
(880)
[HTML 1 KB]
[PDF 1221 KB]
(422)
|
|
|
972 |
YU Chongchong, CAO Shuai, PAN Bo, ZHANG Qingchuan, XU Shixuan |
| |
|
Retrieval matching question and answer method based on improved CLSM with attention mechanism |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 972-976
[Abstract]
(555)
[HTML 1 KB]
[PDF 752 KB]
(378)
|
|
|
963 |
DING Chao, ZHAO Hai, SI Shuaizong, ZHU Jian |
| |
|
Evolution model of normal aging human brain functional network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 963-971
[Abstract]
(651)
[HTML 1 KB]
[PDF 1354 KB]
(458)
|
|
|
940 |
XU Tao, WANG Xiaoming |
| |
|
Generalization error bound guided discriminative dictionary learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (4): 940-948
[Abstract]
(810)
[HTML 1 KB]
[PDF 1327 KB]
(515)
|
|
|
2480 |
HU Zhangfang, ZHANG Li, HUANG Lijia, LUO Yuan |
| |
|
Motor imagery electroencephalogram signal recognition method based on convolutional neural network in time-frequency domain |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2480-2483
[Abstract]
(1042)
[HTML 1 KB]
[PDF 643 KB]
(452)
|
|
|
2098 |
LUO Yuan, YUN Mingjing, WANG Yi, ZHAO Liming |
| |
|
Human fatigue detection based on eye information characteristics |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2098-2102
[Abstract]
(424)
[HTML 1 KB]
[PDF 799 KB]
(408)
|
|
|
2192 |
CHEN Jie, SHAO Zhiqing, ZHANG Huanhuan, FEI Jiahui |
| |
|
Short text sentiment analysis based on parallel hybrid neural network model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2192-2197
[Abstract]
(966)
[HTML 1 KB]
[PDF 884 KB]
(568)
|
|
|
1936 |
CHEN Zhenghao, FENG Ao, HE Jia |
| |
|
Text sentiment classification based on 1D convolutional hybrid neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1936-1941
[Abstract]
(501)
[HTML 1 KB]
[PDF 1060 KB]
(426)
|
|
|
1985 |
MA Fangfang, LIU Shubo, XIONG Xingxing, NIU Xiaoguang |
| |
|
Privacy protection based on local differential privacy for numerical sensitive data of wearable devices |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1985-1990
[Abstract]
(750)
[HTML 1 KB]
[PDF 956 KB]
(393)
|
|
|
1997 |
WANG Zhong, HAN Yiliang |
| |
|
Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1997-2000
[Abstract]
(438)
[HTML 1 KB]
[PDF 743 KB]
(378)
|
|
|
2242 |
JIANG Sihao, SONG Huihui, ZHANG Kaihua, TANG Runfa |
| |
|
Video object segmentation method based on dual pyramid network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2242-2246
[Abstract]
(728)
[HTML 1 KB]
[PDF 787 KB]
(318)
|
|
|
1894 |
WEI Xing, LE Yue, HAN Jianghong, LU Yang |
| |
|
Vehicle behavior dynamic recognition network based on long short-term memory |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1894-1898
[Abstract]
(639)
[HTML 1 KB]
[PDF 858 KB]
(504)
|
|
|
1991 |
SU Zhenyu, SONG Guixiang, LIU Yanming, ZHAO Yuan |
| |
|
Threat modeling and application of server management control system |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1991-1996
[Abstract]
(250)
[HTML 1 KB]
[PDF 1026 KB]
(338)
|
|
|
2030 |
LI Shibao, WANG Yixin, ZHAO Dayin, YE Wei, GUO Lin, LIU Jianhang |
| |
|
Partial interference alignment scheme with limited antenna resource in heterogeneous network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2030-2034
[Abstract]
(552)
[HTML 1 KB]
[PDF 838 KB]
(313)
|
|
|
924 |
TAO Tao, ZHOU Xi, MA Bo, ZHAO Fan |
| |
|
Abnormal time series data detection of gas station by Seq2Seq model based on bidirectional long short-term memory |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 924-929
[Abstract]
(2109)
[HTML 1 KB]
[PDF 936 KB]
(687)
|
|
|
918 |
FAN Li, ZHENG Hong, HUANG Jianhua, LI Zhongcheng, JIANG Yahui |
| |
|
Cooperative evolution method for blockchain mining pool based on adaptive zero-determinant strategy |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 918-923
[Abstract]
(581)
[HTML 1 KB]
[PDF 834 KB]
(480)
|
|
|
907 |
HUANG Fengyu, WU Yefu, CHEN Jingren, WU Bing |
| |
|
Traffic behavior spectrum analysis method based on regional road live data |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 907-912
[Abstract]
(791)
[HTML 1 KB]
[PDF 906 KB]
(434)
|
|
|
824 |
REN Xiaokui, LI Feng, CHENG Lin |
| |
|
Improved centroid localization algorithm based on dynamic loss factor and weight |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 824-828
[Abstract]
(684)
[HTML 1 KB]
[PDF 810 KB]
(341)
|
|
|
796 |
JIN Tao, DONG Xiucheng, LI Yining, REN Lei, FAN Peipei |
| |
|
Optimization of fractional PID controller parameters based on improved PSO algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 796-801
[Abstract]
(856)
[HTML 1 KB]
[PDF 931 KB]
(555)
|
|
|
734 |
MAO Yingchi, CAO Hai, PING Ping, LI Xiaofang |
| |
|
Feature selection based on maximum conditional and joint mutual information |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 734-741
[Abstract]
(1270)
[HTML 1 KB]
[PDF 1284 KB]
(535)
|
|
|
695 |
LI Qiuzhen, LUAN Chaoyang, WANG Shuangxi |
| |
|
Quality evaluation of face image based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 695-699
[Abstract]
(1170)
[HTML 1 KB]
[PDF 821 KB]
(740)
|
|
|
688 |
HAN Jianghong, YUAN Jiaxuan, WEI Xing, LU Yang |
| |
|
Pedestrian visual positioning algorithm for underground roadway based on deep learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 688-694
[Abstract]
(827)
[HTML 1 KB]
[PDF 1079 KB]
(682)
|
|
|
663 |
SHEN Ying, HUANG Zhangcan, TAN Qing, LIU Ning |
| |
|
Krill herd algorithm based on dynamic pressure control operator |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 663-667
[Abstract]
(656)
[HTML 1 KB]
[PDF 786 KB]
(366)
|
|
|
656 |
YANG Yang, PAN Dazhi, LIU Yi, TAN Dailun |
| |
|
New simplified model of discounted {0-1} knapsack problem and solution by genetic algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 656-662
[Abstract]
(798)
[HTML 1 KB]
[PDF 1164 KB]
(479)
|
|
|
644 |
QIU Ningjia, CONG Lin, ZHOU Sicheng, WANG Peng, LI Yanfang |
| |
|
SVD-CNN barrage text classification algorithm combined with improved active learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (3): 644-650
[Abstract]
(1061)
[HTML 1 KB]
[PDF 1109 KB]
(477)
|
|
|
618 |
MO Zan, GAI Yanrong, FAN Guanlong |
| |
|
Credit card fraud classification based on GAN-AdaBoost-DT imbalanced classification algorithm |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 618-622
[Abstract]
(1827)
[HTML 1 KB]
[PDF 771 KB]
(778)
|
|
|
589 |
GUO Rongzuo, FENG Chaosheng, QIN Zhiguang |
| |
|
Modeling and analysis of fault tolerant service composition for intelligent logistics systems of Internet of Things |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 589-597
[Abstract]
(663)
[HTML 1 KB]
[PDF 1487 KB]
(414)
|
|
|
556 |
LIAO Bin, WU Wen |
| |
|
Video shadow removal method using region matching guided by illumination transfer |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 556-563
[Abstract]
(508)
[HTML 1 KB]
[PDF 1465 KB]
(302)
|
|
|
551 |
TAO Yongpeng, JING Yu, XU Cong |
| |
|
Image denoising algorithm based on grouped dictionaries and variational model |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 551-555
[Abstract]
(629)
[HTML 1 KB]
[PDF 838 KB]
(424)
|
|
|
540 |
WU Zongjun, WU Wei, YANG Xiaomin, LIU Kai, Gwanggil Jeon, YUAN Hao |
| |
|
Improved panchromatic sharpening algorithm based on sparse representation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 540-545
[Abstract]
(655)
[HTML 1 KB]
[PDF 1149 KB]
(410)
|
|
|
523 |
WANG Bo, LIU Deliang |
| |
|
Two-dimensional parameter estimation of near-field sources based on iterative adaptive approach |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 523-527
[Abstract]
(543)
[HTML 1 KB]
[PDF 810 KB]
(379)
|
|
|
513 |
ZHENG Zhuoran, ZHENG Xiangwei, TIAN Jie |
| |
|
Energy-saving method for wireless body area network based on synchronous prediction with penalty error matrix |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 513-517
[Abstract]
(655)
[HTML 1 KB]
[PDF 785 KB]
(340)
|
|
|
494 |
LI Lei, XUE Yang, LYU Nianling, FENG Min |
| |
|
Online task and resource scheduling designing for container cloud queue based on Lyapunov optimization method |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 494-500
[Abstract]
(1145)
[HTML 1 KB]
[PDF 1156 KB]
(624)
|
|
|
488 |
MA Lan, WANG Jingjie, CHEN Huan |
| |
|
Business data security of system wide information management based on content mining |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 488-493
[Abstract]
(643)
[HTML 1 KB]
[PDF 1015 KB]
(384)
|
|
|
483 |
LI Qi, YAN Bin, CHEN Na, YANG Hongmei |
| |
|
3D medical image reversible watermarking algorithm based on unidirectional prediction error expansion |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 483-487
[Abstract]
(688)
[HTML 1 KB]
[PDF 830 KB]
(385)
|
|
|
453 |
GUO Xuancheng, LIN Hui, YE Xiucai, XU Chuanfeng |
| |
|
Controller deployment and switch dynamic migration strategy in software defined WAN |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 453-457
[Abstract]
(654)
[HTML 1 KB]
[PDF 801 KB]
(391)
|
|
|
409 |
HAN Zhonghua, BI Kaiyuan, SI Wen, LYU Zhe |
| |
|
Clustering by fast search and find of density peaks based on spectrum analysis |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 409-413
[Abstract]
(578)
[HTML 1 KB]
[PDF 869 KB]
(349)
|
|
|
392 |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong |
| |
|
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 392-397
[Abstract]
(564)
[HTML 1 KB]
[PDF 1084 KB]
(463)
|
|
|
388 |
XIE Zhihua, JIANG Peng, YU Xinhe, ZHANG Shuai |
| |
|
Hyperspectral face recognition system based on VGGNet and multi-band recurrent network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 388-391
[Abstract]
(944)
[HTML 1 KB]
[PDF 635 KB]
(536)
|
|
|
382 |
WANG Xin, LI Ke, XU Mingjun, NING Chen |
| |
|
Improved remote sensing image classification algorithm based on deep learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 382-387
[Abstract]
(912)
[HTML 1 KB]
[PDF 1083 KB]
(649)
|
|
|
348 |
YANG Shiqiang, LUO Xiaoyu, QIAO Dan, LIU Peilei, LI Dexin |
| |
|
Continuous action segmentation and recognition based on sliding window and dynamic programming |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 348-353
[Abstract]
(1856)
[HTML 1 KB]
[PDF 911 KB]
(531)
|
|
|
311 |
ZHANG Kejun, LI Weinan, QIAN Rong, SHI Taimeng, JIAO Meng |
| |
|
Automatic text summarization scheme based on deep learning |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (2): 311-315
[Abstract]
(999)
[HTML 1 KB]
[PDF 867 KB]
(1008)
|
|
|
292 |
LU Qiuqin, JIN Chao |
| |
|
Reliability simulation analysis of coal transportation road network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 292-297
[Abstract]
(667)
[HTML 1 KB]
[PDF 1046 KB]
(335)
|
|
|
275 |
XIANG Wen, ZHANG Ling, CHEN Yunhua, JI Qiumin |
| |
|
Single image super resolution algorithm based on structural self-similarity and deformation block feature |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 275-280
[Abstract]
(497)
[HTML 1 KB]
[PDF 1016 KB]
(367)
|
|
|
267 |
LIAO Bin, LI Haowen |
| |
|
Image depth estimation model based on atrous convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 267-274
[Abstract]
(602)
[HTML 1 KB]
[PDF 1380 KB]
(323)
|
|
|
262 |
WANG Yan, LYU Meng, MENG Xiangfu, LI Yuhao |
| |
|
Image matching method with illumination robustness |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 262-266
[Abstract]
(646)
[HTML 1 KB]
[PDF 774 KB]
(346)
|
|
|
256 |
DING Jianli, MU Tao, WANG Huaichao |
| |
|
Fast indoor positioning algorithm of airport terminal based on spectral regression kernel discriminant analysis |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 256-261
[Abstract]
(611)
[HTML 1 KB]
[PDF 899 KB]
(313)
|
|
|
239 |
GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui |
| |
|
Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 239-244
[Abstract]
(832)
[HTML 1 KB]
[PDF 978 KB]
(314)
|
|
|
227 |
ZHAO Hong, CHANG Zhaobin, WANG Le |
| |
|
Fast malicious domain name detection algorithm based on lexical features |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 227-231
[Abstract]
(675)
[HTML 1 KB]
[PDF 863 KB]
(376)
|
|
|
220 |
DUAN Zongtao, GONG Xuehui, TANG Lei, CHEN Zhe |
| |
|
Spatio-temporal trajectory retrieval and group discovery in shared transportation |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 220-226
[Abstract]
(519)
[HTML 1 KB]
[PDF 1102 KB]
(350)
|
|
|
213 |
LIU Wei, ZHANG Mingxin, AN Dezhi |
| |
|
User influence analysis algorithm for Weibo topics |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 213-219
[Abstract]
(966)
[HTML 1 KB]
[PDF 1163 KB]
(403)
|
|
|
199 |
CAO Jinmeng, NI Rongrong, YANG Biao |
| |
|
Crowd counting using multi-scale multi-task convolutional neural network |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 199-204
[Abstract]
(1391)
[HTML 1 KB]
[PDF 1063 KB]
(510)
|
|
|
186 |
CHEN Guangxi, WANG Jiaxin, HUANG Yong, ZHAN Yijun, ZHAN Baoying |
| |
|
Pedestrian detection method based on cascade networks |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 186-191
[Abstract]
(929)
[HTML 1 KB]
[PDF 967 KB]
(416)
|
|
|
160 |
ZHI Shuting, LI Xiaoge, WANG Jingbo, WANG Penghua |
| |
|
Sentiment analysis of entity aspects based on multi-attention long short-term memory |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 160-167
[Abstract]
(682)
[HTML 1 KB]
[PDF 1273 KB]
(350)
|
|
|
136 |
CHEN Hongyu, DENG Dexiang, YAN Jia, FAN Ci'en |
| |
|
Image retrieval algorithm based on saliency semantic region weighting |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 136-142
[Abstract]
(753)
[HTML 1 KB]
[PDF 1175 KB]
(417)
|
|
|
131 |
BU Tongtong, CAO Tianjie |
| |
|
Risk assessment method of Android application based on permission |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 131-135
[Abstract]
(928)
[HTML 1 KB]
[PDF 874 KB]
(578)
|
|
|
105 |
XU Yao, LI Zhuoran, MENG Jinlong, ZHAO Lipo, WEN Jianxin, WANG Guiling |
| |
|
Extraction method of marine lane boundary from exploiting trajectory big data |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 105-112
[Abstract]
(816)
[HTML 1 KB]
[PDF 1324 KB]
(490)
|
|
|
93 |
ZHANG Jiachen, CHEN Qingkui |
| |
|
Road vehicle congestion analysis model based on YOLO |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 93-97
[Abstract]
(1095)
[HTML 1 KB]
[PDF 775 KB]
(713)
|
|
|
78 |
FENG Guangsheng, ZHANG Xiaoxue, WANG Huiqiang, LI Bingyang, YUAN Quan, CHEN Shijun, CHEN Dawei |
| |
|
Classification method and updating mechanism of hierarchical 3D indoor map |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 78-81
[Abstract]
(568)
[HTML 1 KB]
[PDF 713 KB]
(325)
|
|
|
61 |
ZHANG Yang, LIANG Yanan, ZHANG Dongwen, SUN Shixin |
| |
|
Data race detection approach in concurrent programs |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 61-65
[Abstract]
(747)
[HTML 1 KB]
[PDF 857 KB]
(402)
|
|
|
33 |
ZHANG Roujia, ZHAN Qingxiang, ZHU Yuhang, TAN Guoping |
| |
|
Multi-cell uplink joint power control algorithm for LTE system |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 33-38
[Abstract]
(671)
[HTML 1 KB]
[PDF 866 KB]
(263)
|
|
|
26 |
TAN Jing, DONG Chengfeng, WANG Huiqiang, WANG Hezhe, FENG Guangsheng, LYU Hongwu, YUAN Quan, CHEN Shijun |
| |
|
ERC
2: DTN Epidemic Routing method with Congestion Control strategy |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 26-32
[Abstract]
(611)
[HTML 1 KB]
[PDF 1110 KB]
(355)
|
|
|
15 |
SONG Zihui, LI Zhuo, CHEN Xin |
| |
|
Mobile crowdsensing task distribution mechanism based on compressed sensing |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 15-21
[Abstract]
(659)
[HTML 1 KB]
[PDF 1085 KB]
(461)
|
|
|
1 |
MAO Yingchi, HAO Shuai, PING Ping, QI Rongzhi |
| |
|
Cloud resource scheduling method based on combinatorial double auction |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (1): 1-7
[Abstract]
(775)
[HTML 1 KB]
[PDF 1103 KB]
(618)
|
|
|
3643 |
CHEN Binjie, LU Zhihua, ZHOU Yu, YE Qingwei |
| |
|
Indoor speech separation and sound source localization system based on dual-microphone |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3643-3648
[Abstract]
(938)
[HTML 1 KB]
[PDF 866 KB]
(550)
|
|
|
3638 |
YUAN Yongpeng, YOU Datao, QU Shenming, WU Xiangjun, WEI Mengfan, ZHU Mengbo, GENG Xudong, JIA Nairen |
| |
|
Application of convolution neural network in heart beat recognition |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3638-3642
[Abstract]
(821)
[HTML 1 KB]
[PDF 987 KB]
(720)
|
|
|
3612 |
YU Dunhui, WANG Yi, ZHANG Wanshan |
| |
|
Ability dynamic measurement algorithm for software crowdsourcing workers |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3612-3617
[Abstract]
(939)
[HTML 1 KB]
[PDF 968 KB]
(378)
|
|
|
3607 |
LI Jinman, WANG Jianming, JIN Guanghao |
| |
|
Facial attractiveness evaluation method based on fusion of feature-level and decision-level |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3607-3611
[Abstract]
(661)
[HTML 1 KB]
[PDF 818 KB]
(432)
|
|
|
3591 |
YI Guoxian, XIONG Shuhua, HE Xiaohai, WU Xiaohong, ZHENG Xinbo |
| |
|
People counting method combined with feature map learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3591-3595
[Abstract]
(487)
[HTML 1 KB]
[PDF 841 KB]
(385)
|
|
|
3584 |
GAO Jingzhi, LIU Yi, BAI Xu, ZHANG Quan, GUI Zhiguo |
| |
|
Stationary wavelet domain deep residual convolutional neural network for low-dose computed tomography image estimation |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3584-3590
[Abstract]
(619)
[HTML 1 KB]
[PDF 1168 KB]
(414)
|
|
|
3557 |
LIU Boning, ZHAI Donghai |
| |
|
Image completion method of generative adversarial networks based on two discrimination networks |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3557-3562
[Abstract]
(688)
[HTML 1 KB]
[PDF 1246 KB]
(654)
|
|
|
3518 |
TANG Junyong, TIAN Penghui, WANG Hui |
| |
|
Network availability based on Markov chain and quality of service |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3518-3523
[Abstract]
(521)
[HTML 1 KB]
[PDF 1144 KB]
(395)
|
|
|
3490 |
YU Dekuang, YANG Yi, QIAN Jun |
| |
|
Dynamic random distribution particle swarm optimization strategy for cloud computing resources |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3490-3495
[Abstract]
(522)
[HTML 1 KB]
[PDF 1078 KB]
(374)
|
|
|
3471 |
LI Qi, XIONG Jinbo, HUANG Lizhi, WANG Xuan, MAO Qiming, YAO Lanwu |
| |
|
Attribute-based access control scheme in smart health |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3471-3475
[Abstract]
(708)
[HTML 1 KB]
[PDF 764 KB]
(439)
|
|
|
3462 |
LUO Yujie, ZHANG Jian, TANG Zhangguo, LI Huanzhou |
| |
|
Research summary of secure routing protocol for low-power and lossy networks |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3462-3470
[Abstract]
(542)
[HTML 1 KB]
[PDF 1423 KB]
(403)
|
|
|
3455 |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia |
| |
|
Efficient and provably secure short proxy signature scheme |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3455-3461
[Abstract]
(543)
[HTML 1 KB]
[PDF 1106 KB]
(407)
|
|
|
3450 |
SONG Tianyu, YANG Geng |
| |
|
Design and implementation of middleware system for ciphertext database |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3450-3454
[Abstract]
(716)
[HTML 1 KB]
[PDF 997 KB]
(494)
|
|
|
3403 |
BU Lingzheng, WANG Hongdong, ZHU Meiqiang, DAI Wei |
| |
|
Multi-source digit recognition algorithm based on improved convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3403-3408
[Abstract]
(492)
[HTML 1 KB]
[PDF 955 KB]
(704)
|
|
|
3348 |
LIU Yiming, ZHANG Pengcheng, LIU Yi, GUI Zhiguo |
| |
|
Segmentation of cervical nuclei based on fully convolutional network and conditional random field |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3348-3354
[Abstract]
(1232)
[HTML 1 KB]
[PDF 1095 KB]
(954)
|
|
|
3342 |
GAO Junqiang, TANG Xiaqing, ZHANG Huan, GUO Libin |
| |
|
Processing method of INS/GPS information delay based on factor graph algorithm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3342-3347
[Abstract]
(1085)
[HTML 1 KB]
[PDF 963 KB]
(754)
|
|
|
3336 |
YAO Xiaoqiang, HOU Zhisen |
| |
|
Financial time series prediction by long short term memory neural network with tree structure |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3336-3341
[Abstract]
(794)
[HTML 1 KB]
[PDF 941 KB]
(607)
|
|
|
3305 |
CHEN Wenbing, GUAN Zhengxiong, CHEN Yunjie |
| |
|
Data augmentation method based on conditional generative adversarial net model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3305-3311
[Abstract]
(2064)
[HTML 1 KB]
[PDF 1131 KB]
(1306)
|
|
|
3287 |
WANG Shuai, YANG Xiaodong |
| |
|
RFID tag number estimation algorithm based on sequential linear Bayes method |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3287-3292
[Abstract]
(742)
[HTML 1 KB]
[PDF 923 KB]
(591)
|
|
|
3282 |
LIU Yi, HU Zhe, JING Xiaorong |
| |
|
Downlink beamforming design based user scheduling for MIMO-NOMA systems |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3282-3286
[Abstract]
(610)
[HTML 1 KB]
[PDF 774 KB]
(552)
|
|
|
3270 |
CHEN Fatang, XING Pingping, YANG Yanjuan |
| |
|
Analysis and design of uplink resource scheduling in narrow band Internet of things |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3270-3274
[Abstract]
(620)
[HTML 1 KB]
[PDF 942 KB]
(598)
|
|
|
3258 |
ZHANG Chuanhao, GU Xuehui, MENG Caixia |
| |
|
Anti-sniffering attack method based on software defined network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3258-3262
[Abstract]
(856)
[HTML 1 KB]
[PDF 986 KB]
(529)
|
|
|
3241 |
CAO Xiangying, SUN Weimin, ZHU Youxiang, QIAN Xin, LI Xiaoyu, YE Ning |
| |
|
Plant image recoginiton based on family priority strategy |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3241-3245
[Abstract]
(942)
[HTML 1 KB]
[PDF 819 KB]
(721)
|
|
|
3236 |
HE Xueying, HAN Zhongyi, WEI Benzheng |
| |
|
Pigmented skin lesion recognition and classification based on deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3236-3240
[Abstract]
(1006)
[HTML 1 KB]
[PDF 810 KB]
(829)
|
|
|
3211 |
LAI Chuanbin, HAN Yuexing, GU Hui, WANG Bing |
| |
|
Novel virtual boundary detection method based on deep learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3211-3215
[Abstract]
(861)
[HTML 1 KB]
[PDF 875 KB]
(555)
|
|
|
3199 |
WANG Peng, ZHANG Aofan, WANG Liqin, DONG Yongfeng |
| |
|
Image automatic annotation based on transfer learning and multi-label smoothing strategy |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3199-3203
[Abstract]
(945)
[HTML 1 KB]
[PDF 960 KB]
(737)
|
|
|
3188 |
ZHANG Runlian, ZHANG Xin, ZHANG Chuyun, XI Yuang |
| |
|
Path planning algorithm based on distance and slope in regular Grid digital elevation model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3188-3192
[Abstract]
(673)
[HTML 1 KB]
[PDF 985 KB]
(482)
|
|
|
3180 |
XIE Jiyang, YAN Dong, XIE Yao, MA Zhanyu |
| |
|
Analysis of key factors in heat demand prediction based on NARX neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3180-3187
[Abstract]
(754)
[HTML 1 KB]
[PDF 1202 KB]
(620)
|
|
|
3150 |
ZHANG Fangjuan, YANG Yan, DU Shengdong |
| |
|
Stipend prediction based on enhanced-discriminative canonical correlations analysis and classification ensemble |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3150-3155
[Abstract]
(537)
[HTML 1 KB]
[PDF 893 KB]
(486)
|
|
|
3127 |
LI Wanying, HUANG Ruizhang, DING Zhiyuan, CHEN Yanping, XU Liyang |
| |
|
Multi-dimensional text clustering with user behavior characteristics |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3127-3131
[Abstract]
(1069)
[HTML 1 KB]
[PDF 970 KB]
(542)
|
|
|
3084 |
FAN Zhen, GUO Yi, ZHANG Zhenhao, HAN Meiqi |
| |
|
Sentiment analysis of movie reviews based on dictionary and weak tagging information |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3084-3088
[Abstract]
(915)
[HTML 1 KB]
[PDF 804 KB]
(814)
|
|
|
3081 |
QU Liping, WU Jiaxi |
| |
|
Cross-domain personalized recommendation method based on scoring reliability |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3081-3083
[Abstract]
(704)
[HTML 1 KB]
[PDF 589 KB]
(507)
|
|
|
3075 |
LI Yang, DONG Hongbin |
| |
|
Text sentiment analysis based on feature fusion of convolution neural network and bidirectional long short-term memory network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3075-3080
[Abstract]
(3245)
[HTML 1 KB]
[PDF 906 KB]
(1905)
|
|
|
3063 |
LIU Yuxin, WANG Li, ZHANG Hao |
| |
|
Hierarchical attention-based neural network model for spam review detection |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3063-3068
[Abstract]
(639)
[HTML 1 KB]
[PDF 1130 KB]
(800)
|
|
|
3057 |
ZHAO Junhao, LI Yuhua, HUO Lin, LI Ruixuan, GU Xiwu |
| |
|
Macroeconomic forecasting method fusing Weibo sentiment analysis and deep learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3057-3062
[Abstract]
(686)
[HTML 1 KB]
[PDF 994 KB]
(807)
|
|
|
3053 |
QU Zhaowei, WANG Yuan, WANG Xiaoru |
| |
|
Transfer learning based hierarchical attention neural network for sentiment analysis |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3053-3056
[Abstract]
(1134)
[HTML 1 KB]
[PDF 759 KB]
(1039)
|
|
|
0 |
|
| |
|
Hierarchical 3D Indoor Map Classification Method and Updating Mechanism |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(320)
[HTML 0 KB]
[PDF 0 KB]
(27)
|
|
|
0 |
|
| |
|
DPCS2018+69+ERC2: A DTN Epidemic Routing Method with Congestion Control Strategy |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(243)
[HTML 0 KB]
[PDF 0 KB]
(41)
|
|
|
3048 |
YANG Yaqian, TANG Shaoting |
| |
|
Brain node recognition method based on extended low-rank multivariate general linear model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 3048-3052
[Abstract]
(560)
[HTML 1 KB]
[PDF 764 KB]
(383)
|
|
|
3025 |
HUANG Hainan, LI Xiaofeng, LIAN Peikun, RONG Jian |
| |
|
Trigger probability model of transit signal priority strategies based on signal timing |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 3025-3029
[Abstract]
(716)
[HTML 1 KB]
[PDF 741 KB]
(394)
|
|
|
2990 |
JIA Shangkun, HE Fei |
| |
|
Software regression verification based on witness automata |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2990-2995
[Abstract]
(622)
[HTML 1 KB]
[PDF 1103 KB]
(392)
|
|
|
2965 |
CHEN Yonghong, GUO Lili, ZHANG Shibing |
| |
|
Energy efficiency analysis of relay assisted cellular network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2965-2970
[Abstract]
(979)
[HTML 1 KB]
[PDF 801 KB]
(398)
|
|
|
2960 |
LIU Yanjun, ZHAO Zhiqiang, LIU Yan, CUI Ying, WANG Dayong, RAN Peng, GUO Yijun |
| |
|
Fast intra algorithm based on quality scalable high efficiency video coding |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2960-2964
[Abstract]
(629)
[HTML 1 KB]
[PDF 786 KB]
(365)
|
|
|
2950 |
ZHOU Wei, GUO Mengyu, XIANG Danlei |
| |
|
Improved QRD-M detection algorithm for spatial modulation system |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2950-2954
[Abstract]
(660)
[HTML 1 KB]
[PDF 781 KB]
(426)
|
|
|
2945 |
WANG Meile, ZHANG Zhizhong, WANG Guangya |
| |
|
Design and implementation of PDSCH de-resource mapping in LTE-A air interface analyzer |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2945-2949
[Abstract]
(682)
[HTML 1 KB]
[PDF 762 KB]
(356)
|
|
|
2940 |
WANG Songwei, CHEN Jianhua |
| |
|
Multi-factor authentication key agreement scheme based on chaotic mapping |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2940-2944
[Abstract]
(698)
[HTML 1 KB]
[PDF 877 KB]
(415)
|
|
|
2929 |
JIANG Chen, HU Yupeng, SI Kai, KUANG Wenxin |
| |
|
Malicious file detection method based on image texture and convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2929-2933
[Abstract]
(1186)
[HTML 1 KB]
[PDF 716 KB]
(590)
|
|
|
2923 |
WANG Yaojie, NIU Ke, YANG Xiaoyuan |
| |
|
Information hiding scheme based on generative adversarial network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2923-2928
[Abstract]
(1342)
[HTML 1 KB]
[PDF 882 KB]
(912)
|
|
|
2903 |
FANG Yuan, LI Ming, WANG Ping, JIANG Xinghe, ZHANG Xinming |
| |
|
Intrusion detection model based on hybrid convolutional neural network and recurrent neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2903-2907
[Abstract]
(1342)
[HTML 1 KB]
[PDF 918 KB]
(967)
|
|
|
2899 |
FENG Liping, HAN Xie, HAN Qi, ZHENG Fang |
| |
|
Network virus propagation modeling considering social network user behaviors |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2899-2902
[Abstract]
(688)
[HTML 1 KB]
[PDF 761 KB]
(508)
|
|
|
2892 |
MIAO Junmin, FENG Chaosheng, LI Min, LIU Xia |
| |
|
Public auditing scheme of data integrity for public cloud |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2892-2898
[Abstract]
(648)
[HTML 1 KB]
[PDF 1067 KB]
(471)
|
|
|
2886 |
FENG Yong, HAN Xiaolong, FU Chenping, WANG Rongbing, XU Hongyan |
| |
|
Commodity recommendation method integrating user trust and brand recognition |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2886-2891
[Abstract]
(671)
[HTML 1 KB]
[PDF 848 KB]
(448)
|
|
|
2850 |
SHAO Lun, ZHOU Xinzhi, ZHAO Chengping, ZHANG Xu |
| |
|
Improved
K-means clustering algorithm based on multi-dimensional grid space |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2850-2855
[Abstract]
(591)
[HTML 1 KB]
[PDF 828 KB]
(400)
|
|
|
2839 |
SUN Nian, ZHANG Yi, LIN Haibo, HUANG Chao |
| |
|
Short utterance speaker recognition algorithm based on multi-featured i-vector |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2839-2843
[Abstract]
(716)
[HTML 1 KB]
[PDF 731 KB]
(394)
|
|
|
2794 |
WANG Jian, ZHANG Zhiyong, QIAO Kuoyuan |
| |
|
Evidence combination rule with similarity collision reduced |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2794-2800
[Abstract]
(531)
[HTML 1 KB]
[PDF 1010 KB]
(403)
|
|
|
1912 |
SHI Wenxu, YANG Yang, BAO Shengli |
| |
|
Greedy core acceleration dynamic programming algorithm for solving discounted {0-1} knapsack problem |
| |
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1912-1917
[Abstract]
(901)
[HTML 1 KB]
[PDF 860 KB]
(499)
|
|
|
2747 |
ZHANG Gang, GAO Junpeng |
| |
|
Weak signal detection based on combination of power and exponential function model in tri-stable stochastic resonance |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2747-2752
[Abstract]
(715)
[HTML 1 KB]
[PDF 902 KB]
(431)
|
|
|
2730 |
ZHANG Cheng, GUO Qingxiu, FENG Liwei, LI Yuan |
| |
|
Fault detection strategy based on local neighbor standardization and dynamic principal component analysis |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2730-2734
[Abstract]
(788)
[HTML 1 KB]
[PDF 785 KB]
(363)
|
|
|
2712 |
ZHANG Ming, WANG Jindong, WEI Bo |
| |
|
Satellite scheduling method for intensive tasks based on improved fireworks algorithm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2712-2719
[Abstract]
(714)
[HTML 1 KB]
[PDF 1302 KB]
(407)
|
|
|
2678 |
LI Wei, LI Weixiang, ZHANG Fan, JIE Wei |
| |
|
Rapid mismatching elimination algorithm based on motion smoothing constraints |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2678-2682
[Abstract]
(879)
[HTML 1 KB]
[PDF 1019 KB]
(454)
|
|
|
2673 |
GAO Jingang, LIU Zhiyong, ZHANG Shuang, HOU Daishuang, LIU Xiaofeng |
| |
|
Application of binocular stereo vision technology in key dimension detection of CRH body |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2673-2677
[Abstract]
(896)
[HTML 1 KB]
[PDF 1010 KB]
(463)
|
|
|
2666 |
XU Xiaodan, LI Bingjie, LI Bosen, LYU Shun |
| |
|
New 3D scene modeling language and environment based on BNF paradigm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2666-2672
[Abstract]
(854)
[HTML 1 KB]
[PDF 1259 KB]
(456)
|
|
|
2660 |
GAO Qinquan, HUANG Weiping, DU Min, WEI Mengyu, KE Dongzhong |
| |
|
Design of augmented reality navigation simulation system for pelvic minimally invasive surgery based on stereoscopic vision |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2660-2665
[Abstract]
(690)
[HTML 1 KB]
[PDF 1132 KB]
(438)
|
|
|
2644 |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu |
| |
|
Dynamic measurement of Android kernel based on ARM virtualization extension |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2644-2649
[Abstract]
(1174)
[HTML 1 KB]
[PDF 996 KB]
(545)
|
|
|
2568 |
YANG Guofeng, DAI Jiacai, LIU Xiangjun, WU Xiaolong, TIAN Yanni |
| |
|
Dynamic multi-subgroup collaborative barebones particle swarm optimization based on kernel fuzzy clustering |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2568-2574
[Abstract]
(552)
[HTML 1 KB]
[PDF 1251 KB]
(335)
|
|
|
2549 |
ZHU Zhu, FU Xiao, WANG Zhijian |
| |
|
Stealth download hijacking vulnerability of Android application package |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2549-2553
[Abstract]
(772)
[HTML 1 KB]
[PDF 1030 KB]
(391)
|
|
|
2535 |
WU Muyang, LIU Zheng, WANG Yang, LI Yun, LI Tao |
| |
|
Quality evaluation model of network operation and maintenance based on correlation analysis |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2535-2542
[Abstract]
(746)
[HTML 1 KB]
[PDF 1421 KB]
(466)
|
|
|
2500 |
SONG Jundian, DAI Bingrong, JIANG Liwen, ZHAO Yao, LI Chao, WANG Xiaoqiang |
| |
|
Data governance collaborative method based on blockchain |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2500-2506
[Abstract]
(1625)
[HTML 1 KB]
[PDF 1276 KB]
(864)
|
|
|
2489 |
WAN Yuan, ZHANG Jinghui, WU Kefeng, MENG Xiaojing |
| |
|
Image classification based on multi-layer non-negativity and locality Laplacian sparse coding |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2489-2494
[Abstract]
(839)
[HTML 1 KB]
[PDF 1164 KB]
(596)
|
|
|
2469 |
LAI Wenhui, QIAO Yupeng |
| |
|
Spam messages recognizing method based on word embedding and convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2469-2476
[Abstract]
(1217)
[HTML 1 KB]
[PDF 1380 KB]
(956)
|
|
|
2464 |
ZHANG Chen, QIAN Tao, JI Donghong |
| |
|
Joint model of microblog emotion recognition of emoticons and emotion cause detection based on neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2464-2468
[Abstract]
(868)
[HTML 1 KB]
[PDF 949 KB]
(749)
|
|
|
2411 |
LI Qiang, YU Fengqin |
| |
|
Improved pitch contour creation and selection algorithm for melody extraction |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2411-2415
[Abstract]
(901)
[HTML 1 KB]
[PDF 803 KB]
(488)
|
|
|
2370 |
XU Dong, LI Yong, LIU Dongdong, LU Yakai |
| |
|
Weight adjustable interference alignment algorithm with imperfect channel state information |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2370-2374
[Abstract]
(678)
[HTML 1 KB]
[PDF 938 KB]
(421)
|
|
|
2359 |
LU Mingchi, WANG Shouhua, LI Yunke, JI Yuanfa, SUN Xiyan, DENG Guihui |
| |
|
Bluetooth location algorithm based on feature matching and distance weighting |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2359-2364
[Abstract]
(876)
[HTML 1 KB]
[PDF 966 KB]
(568)
|
|
|
2306 |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong |
| |
|
Information hiding algorithm based on fractal graph |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2306-2310
[Abstract]
(609)
[HTML 1 KB]
[PDF 823 KB]
(542)
|
|
|
2280 |
JIANG Bingcheng, HE Qian, CHEN Yiting, LIU Peng |
| |
|
Cloud database oriented attribute based encryption and query translation middleware |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2280-2286
[Abstract]
(821)
[HTML 1 KB]
[PDF 1123 KB]
(476)
|
|
|
2261 |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan |
| |
|
Data transmission protocol based on short signature scheme for railway bridge monitoring |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2261-2266
[Abstract]
(686)
[HTML 1 KB]
[PDF 973 KB]
(388)
|
|
|
2218 |
WENG Liguo, LIU Wan'an, SHI Bicheng, XIA Min |
| |
|
Cloud/Snow classification based on multi-dimensional multi-grained cascade forest in plateau region |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2218-2223
[Abstract]
(998)
[HTML 1 KB]
[PDF 1085 KB]
(577)
|
|
|
2211 |
HU Cong, QU Jinjin, XU Chuanpei, ZHU Aijun |
| |
|
Garment image recognition based on adaptive pooling neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2211-2217
[Abstract]
(708)
[HTML 1 KB]
[PDF 1133 KB]
(491)
|
|
|
2205 |
LI Xinchun, CAO Zhiqiang, LIN Sen, ZHANG Chunhua |
| |
|
Palmprint and palmvein image fusion recognition algorithm based on super-wavelet domain |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2205-2210
[Abstract]
(689)
[HTML 1 KB]
[PDF 890 KB]
(435)
|
|
|
2192 |
YE Yuanzheng, LI Xiaoxia, LI Minze |
| |
|
Rapid stable detection of human faces in image sequence based on MS-KCF model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2192-2197
[Abstract]
(861)
[HTML 1 KB]
[PDF 1139 KB]
(679)
|
|
|
2185 |
ZHANG Cheng, GUO Qingxiu, LI Yuan |
| |
|
Batch process monitoring based on
k nearest neighbors in discriminated kernel principle component space |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2185-2191
[Abstract]
(550)
[HTML 1 KB]
[PDF 977 KB]
(381)
|
|
|
2175 |
XIONG Changzhen, CHE Manqiang, WANG Runling |
| |
|
Real-time visual tracking algorithm based on correlation filters and sparse convolutional features |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2175-2179
[Abstract]
(549)
[HTML 1 KB]
[PDF 1053 KB]
(411)
|
|
|
2170 |
YU Hui, FENG Xupeng, LIU Lijun, HUANG Qingsong |
| |
|
Identification method of user's medical intention in chatting robot |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2170-2174
[Abstract]
(930)
[HTML 1 KB]
[PDF 781 KB]
(664)
|
|
|
2141 |
XIA Min, SONG Wenzhu, SHI Bicheng, LIU Jia |
| |
|
Deep reinforcement learning method based on weighted densely connected convolutional network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2141-2147
[Abstract]
(717)
[HTML 1 KB]
[PDF 1090 KB]
(890)
|
|
|
0 |
|
| |
|
Design of AR Navigation Simulation System for Pelvic Minimally Invasive Surgery Based on Stereoscopic Vision |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(415)
[HTML 0 KB]
[PDF 0 KB]
(35)
|
|
|
2136 |
WANG Yan, LUO Qian, DENG Hui |
| |
|
Bearing fault diagnosis method based on Gibbs sampling |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2136-2140
[Abstract]
(664)
[HTML 1 KB]
[PDF 804 KB]
(413)
|
|
|
2130 |
FENG Liwei, ZHANG Cheng, LI Yuan, XIE Yanhong |
| |
|
Fault detection for multistage process based on improved local neighborhood standardization and
kNN |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2130-2135
[Abstract]
(532)
[HTML 1 KB]
[PDF 905 KB]
(364)
|
|
|
2100 |
WU Renbiao, LI Jiayi, QU Jingyi |
| |
|
Flight delay prediction model based on dual-channel convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2100-2106
[Abstract]
(940)
[HTML 1 KB]
[PDF 1206 KB]
(464)
|
|
|
2083 |
LI Yuanyuan, CAI Yiheng, GAO Xurong |
| |
|
Retinal vessel segmentation algorithm based on hybrid phase feature |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2083-2088
[Abstract]
(681)
[HTML 1 KB]
[PDF 1042 KB]
(412)
|
|
|
2076 |
LIU Xiaohui, LU Lijun, FENG Qianjin, CHEN Wufan |
| |
|
Proximal smoothing iterative algorithm for magnetic resonance image reconstruction based on Moreau-envelope |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2076-2082
[Abstract]
(747)
[HTML 1 KB]
[PDF 1157 KB]
(394)
|
|
|
2070 |
ZHANG Yonghong, XIA Guanghao, KAN Xi, HE Jing, GE Taotao, WANG Jiangeng |
| |
|
Road extraction from multi-source high resolution remote sensing image based on fully convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2070-2075
[Abstract]
(1069)
[HTML 1 KB]
[PDF 961 KB]
(587)
|
|
|
2050 |
DU Liuqing, XU Hezuo, YU Yongwei, ZHANG Jianheng |
| |
|
Fast workpiece matching method for flexible clamping robot based on improved SURF algorithm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2050-2055
[Abstract]
(673)
[HTML 1 KB]
[PDF 980 KB]
(263)
|
|
|
2020 |
WANG Aizhen, HU Jiao, HAN Hangcheng |
| |
|
Capture method of direct sequence spread spectrum signal based on cascade stochastic resonance |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2020-2023
[Abstract]
(634)
[HTML 1 KB]
[PDF 794 KB]
(383)
|
|
|
2015 |
SUO Longlong, ZHANG Gengxin, BIAN Dongming, XIE Zhidong, TIAN Xiang |
| |
|
Performance analysis of Luby transform codes under Gaussian elimination decoding |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2015-2019
[Abstract]
(696)
[HTML 1 KB]
[PDF 744 KB]
(316)
|
|
|
2001 |
HUANG Sheng, HU Lingwei, FU Yuanpeng |
| |
|
State machine based video rate adaptation algorithm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2001-2004
[Abstract]
(734)
[HTML 1 KB]
[PDF 803 KB]
(399)
|
|
|
1989 |
FANG Wenhao, LU Yang, WEI Xing |
| |
|
UWB high-precision localization in underground coal mine based on region determination |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1989-1994
[Abstract]
(807)
[HTML 1 KB]
[PDF 913 KB]
(427)
|
|
|
1981 |
WANG Ming, XU Liang, HE Xiaomin |
| |
|
RSSI collaborative location algorithm of selecting preference accuracy for wireless sensor network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1981-1988
[Abstract]
(578)
[HTML 1 KB]
[PDF 1237 KB]
(417)
|
|
|
1967 |
YANG Jie, LI Songbin, DENG Haojiang |
| |
|
Steganalysis based on Bayesian network for compressed speech |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1967-1973
[Abstract]
(613)
[HTML 1 KB]
[PDF 1111 KB]
(395)
|
|
|
1916 |
CHEN Jingren, WU Yefu, WU Bing |
| |
|
Driver behavior spectrum analysis method based on vehicle driving data |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1916-1922
[Abstract]
(1592)
[HTML 1 KB]
[PDF 1311 KB]
(677)
|
|
|
1910 |
CHANG Bingguo, ZANG Hongying |
| |
|
Time series classifier design based on piecewise dimensionality reduction and updated dynamic time warping |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1910-1915
[Abstract]
(740)
[HTML 1 KB]
[PDF 935 KB]
(404)
|
|
|
1853 |
ZOU Chengming, LUO Ying, XU Xiaolong |
| |
|
Fine-grained image classification method based on multi-feature combination |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1853-1856
[Abstract]
(1089)
[HTML 1 KB]
[PDF 862 KB]
(653)
|
|
|
1839 |
YANG Chunni, FENG Chaosheng |
| |
|
Multi-intention recognition model with combination of syntactic feature and convolution neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1839-1845
[Abstract]
(2056)
[HTML 1 KB]
[PDF 1194 KB]
(1048)
|
|
|
1831 |
ZHANG Runyan, MENG Fanrong, ZHOU Yong, LIU Bing |
| |
|
Semantic relation extraction model via attention based neural Turing machine |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1831-1838
[Abstract]
(912)
[HTML 1 KB]
[PDF 1298 KB]
(832)
|
|
|
1820 |
FAN Jun, WANG Xin, XU Hui |
| |
|
Prediction method of tectonic coal thickness based on particle swarm optimized hybrid kernel extreme learning machine |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1820-1825
[Abstract]
(614)
[HTML 1 KB]
[PDF 1149 KB]
(459)
|
|
|
1801 |
CAO Ang, ZHANG Shenjia, LIU Rui, ZOU Lian, FAN Ci'en |
| |
|
Muscle fatigue state classification system based on surface electromyography signal |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1801-1808
[Abstract]
(892)
[HTML 1 KB]
[PDF 1309 KB]
(582)
|
|
|
1795 |
CHEN Tian, WANG Jiawei, AN Xin, REN Fuji |
| |
|
Parallel test scheduling optimization method for three-dimensional chip with multi-core and multi-layer |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1795-1800
[Abstract]
(607)
[HTML 1 KB]
[PDF 1090 KB]
(407)
|
|
|
1777 |
CHEN Chen, ZHAO Jianwei, CAO Feilong |
| |
|
Image super-resolution reconstruction based on four-channel convolutional sparse coding |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1777-1783
[Abstract]
(507)
[HTML 1 KB]
[PDF 1085 KB]
(393)
|
|
|
1771 |
XIE Benming, HAN Mingming, ZHANG Pan, ZHANG Wei |
| |
|
Optimization algorithm of dynamic time warping for speech recognition of aircraft towing vehicle |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1771-1776
[Abstract]
(578)
[HTML 1 KB]
[PDF 1117 KB]
(437)
|
|
|
1765 |
XIE Yonghua, HAN Liping |
| |
|
Local binary pattern based on dominant gradient encoding for pollen image recognition |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1765-1770
[Abstract]
(664)
[HTML 1 KB]
[PDF 1090 KB]
(477)
|
|
|
1760 |
WU Liang, HE Yi, MEI Xue, LIU Huan |
| |
|
Online behavior recognition using space-time interest points and probabilistic latent-dynamic conditional random field model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1760-1764
[Abstract]
(449)
[HTML 1 KB]
[PDF 783 KB]
(458)
|
|
|
1755 |
ZUO Xiangmei, JIA Lijiao, HAN Pengcheng |
| |
|
Hierarchical three-dimensional shape ring feature extraction method |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1755-1759
[Abstract]
(541)
[HTML 1 KB]
[PDF 1054 KB]
(416)
|
|
|
1726 |
YAN Xiaoyong, LI Qing |
| |
|
Method for determining boundaries of binary protocol format keywords based on optimal path search |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1726-1731
[Abstract]
(518)
[HTML 1 KB]
[PDF 953 KB]
(464)
|
|
|
1709 |
SUN Wange, XIA Kewen, LAN Pu |
| |
|
Regularized weighted incomplete robust principal component analysis method and its application in fitting trajectory of wireless sensor network nodes |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1709-1714
[Abstract]
(473)
[HTML 1 KB]
[PDF 961 KB]
(375)
|
|
|
1675 |
LIU Zhanghu, CHENG Chunling |
| |
|
Variance reduced stochastic variational inference algorithm for topic modeling of large-scale data |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1675-1681
[Abstract]
(615)
[HTML 1 KB]
[PDF 1144 KB]
(403)
|
|
|
1653 |
ZHANG Youjie, ZHANG Qingping, WU wei, SHI Zhe |
| |
|
Security analysis and evaluation of representational state transfer based on attack graph |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1653-1657
[Abstract]
(659)
[HTML 1 KB]
[PDF 800 KB]
(473)
|
|
|
1633 |
LI Cong, YANG Xiaoyuan, WANG Xu'an |
| |
|
Effecient outsourced computing based on extended attribute-based functional encryption |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1633-1639
[Abstract]
(550)
[HTML 1 KB]
[PDF 1066 KB]
(310)
|
|
|
1628 |
GAO Baojian, WANG Shaodi, HU Yun, CAO Yanjun |
| |
|
Physical layer parallel interpolation encryption algorithm based on orthogonal frequency division multiplexing |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1628-1632
[Abstract]
(658)
[HTML 1 KB]
[PDF 777 KB]
(418)
|
|
|
1620 |
ZHOU Zhicheng, LI Lixin, GUO Song, LI Zuohui |
| |
|
Biometric and password two-factor cross domain authentication scheme based on blockchain technology |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1620-1627
[Abstract]
(750)
[HTML 1 KB]
[PDF 1299 KB]
(639)
|
|
|
1554 |
YANG Shuo, CHEN Lifang, SHI Yu, MAO Yiming |
| |
|
Semantic segmentation of blue-green algae based on deep generative adversarial net |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1554-1561
[Abstract]
(821)
[HTML 1 KB]
[PDF 1306 KB]
(661)
|
|
|
1542 |
LI ping, DAI Yueming, WU Dinghui |
| |
|
Application of dual-channel convolutional neural network in sentiment analysis |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1542-1546
[Abstract]
(1049)
[HTML 1 KB]
[PDF 780 KB]
(851)
|
|
|
1527 |
XU Yan, XIONG Yingjun, YANG Jing |
| |
|
Review of spike sequence learning methods for spiking neurons |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1527-1534
[Abstract]
(729)
[HTML 1 KB]
[PDF 1516 KB]
(703)
|
|
|
1488 |
TIAN Hao, ZHANG Gexiang, RONG Haina, Mario J. PÉREZ-JIMÉNEZ, Luis VALENCIA-CABRERA, CHEN Peng, HOU Rong, QI Dunwu |
| |
|
Population model of giant panda ecosystem based on population dynamics P system |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1488-1493
[Abstract]
(626)
[HTML 1 KB]
[PDF 1014 KB]
(458)
|
|
|
1427 |
LEI Sijia, ZHAO Fengqun |
| |
|
Foggy image enhancement based on adaptive Riesz fractional differential |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1427-1431
[Abstract]
(518)
[HTML 1 KB]
[PDF 794 KB]
(540)
|
|
|
1420 |
LIANG Zhonghao, PENG Dewei, JIN Yanxu, GUO Liang |
| |
|
Single image dehazing algorithm based on traffic scene region enhancement |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1420-1426
[Abstract]
(667)
[HTML 1 KB]
[PDF 1224 KB]
(585)
|
|
|
1393 |
XU Jiaqing, WAN Wen, CAI Dongjing, TANG Fuqiao, HE Jie, ZHANG Lei |
| |
|
Implementation of deterministic routing fault-tolerant strategies for
K-Ary
N-Bridge system |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1393-1398
[Abstract]
(499)
[HTML 1 KB]
[PDF 956 KB]
(555)
|
|
|
1346 |
YAN Hong, YANG Bo, YANG Hongyu |
| |
|
Outlier detection in time series data based on heteroscedastic Gaussian processes |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1346-1352
[Abstract]
(749)
[HTML 1 KB]
[PDF 1092 KB]
(537)
|
|
|
1304 |
WANG Keli, YUAN Hongchun |
| |
|
Aquatic animal image classification method based on transfer learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1304-1308
[Abstract]
(920)
[HTML 1 KB]
[PDF 949 KB]
(708)
|
|
|
1294 |
YANG Xiaoling, LI Zhiqing, LIU Yutong |
| |
|
Automatic image annotation based on multi-label discriminative dictionary learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1294-1298
[Abstract]
(698)
[HTML 1 KB]
[PDF 930 KB]
(581)
|
|
|
1278 |
LI Yakun, PAN Qing, WANG Feng |
| |
|
Joint Chinese word segmentation and punctuation prediction based on improved multilayer BLSTM network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1278-1282
[Abstract]
(713)
[HTML 1 KB]
[PDF 903 KB]
(675)
|
|
|
1272 |
LU Ling, YANG Wu, WANG Yuanlun, LEI Zijian, LI Ying |
| |
|
Long text classification combined with attention mechanism |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1272-1277
[Abstract]
(2763)
[HTML 1 KB]
[PDF 946 KB]
(1265)
|
|
|
1261 |
XU Yinjie, SUN Chunhua, LIU Yezheng |
| |
|
Joint sentiment/topic model integrating user characteristics |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1261-1266
[Abstract]
(513)
[HTML 1 KB]
[PDF 1024 KB]
(622)
|
|
|
1254 |
YUAN Yichuan, YANG Zhou, LUO Tingxing, QIN Jin |
| |
|
Multi-population-based competitive differential evolution algorithm for dynamic optimization problem |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1254-1260
[Abstract]
(547)
[HTML 1 KB]
[PDF 1051 KB]
(494)
|
|
|
1230 |
JI Ting, ZHANG Hua |
| |
|
Nonparametric approximation policy iteration reinforcement learning based on Dyna framework |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1230-1238
[Abstract]
(659)
[HTML 1 KB]
[PDF 1297 KB]
(680)
|
|
|
1207 |
PU Yuwen, HU Haibo, HE Lingjun |
| |
|
Visual analytics on trajectory of pseudo base-stations based on SMS spam collected from mobilephone users |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1207-1212
[Abstract]
(603)
[HTML 1 KB]
[PDF 1083 KB]
(467)
|
|
|
1201 |
WANG Jian, WANG Zhihong, ZHANG Lejun |
| |
|
Dynamic model of public opinion and simulation analysis of complex network evolution |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1201-1206
[Abstract]
(767)
[HTML 1 KB]
[PDF 868 KB]
(538)
|
|
|
1195 |
LIANG Lidong, JIA Wenyou |
| |
|
Heuristic packing algorithm based on forbearing stratified strategy |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1195-1200
[Abstract]
(611)
[HTML 1 KB]
[PDF 899 KB]
(499)
|
|
|
1189 |
WEI Yaru, ZHU Jin |
| |
|
Modeling of twin rail-mounted gantry scheduling and container slot selection in automated terminal |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1189-1194
[Abstract]
(673)
[HTML 1 KB]
[PDF 1037 KB]
(523)
|
|
|
1176 |
JIANG Maosong, WANG Dongxia, NIU Fanglin, CAO Yudong |
| |
|
Speech enhancement method based on sparsity-regularized non-negative matrix factorization |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1176-1180
[Abstract]
(630)
[HTML 1 KB]
[PDF 800 KB]
(480)
|
|
|
1141 |
SUN Yitang, SONG Huihui, ZHANG Kaihua, YAN Fei |
| |
|
Face super-resolution via very deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1141-1145
[Abstract]
(791)
[HTML 1 KB]
[PDF 890 KB]
(553)
|
|
|
1134 |
WANG Lifang, DONG Xia, QIN Pinle, GAO Yuan |
| |
|
Multi-modal brain image fusion method based on adaptive joint dictionary learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1134-1140
[Abstract]
(769)
[HTML 1 KB]
[PDF 1149 KB]
(746)
|
|
|
1072 |
FU Chaojiang, WANG Tianqi, LIN Yuerong |
| |
|
Parallel algorithm for explicit finite element analysis based on efficient parallel computational strategy |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1072-1077
[Abstract]
(516)
[HTML 1 KB]
[PDF 1072 KB]
(531)
|
|
|
1046 |
LIU Li, ZHAN Enqi, ZHENG Jianbin, WANG Yang |
| |
|
Online signature verification based on curve segment similarity matching |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1046-1050
[Abstract]
(581)
[HTML 1 KB]
[PDF 930 KB]
(465)
|
|
|
1041 |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie |
| |
|
Dynamic threshold signature scheme based on Chinese remainder theorem |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1041-1045
[Abstract]
(762)
[HTML 1 KB]
[PDF 761 KB]
(525)
|
|
|
1017 |
REN Shuai, ZHANG Tao, XU Zhenchao, WANG Zhen, HE Yuan, LIU Yunong |
| |
|
Information hiding algorithm for 3D models based on feature point labeling and clustering |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1017-1022
[Abstract]
(550)
[HTML 1 KB]
[PDF 994 KB]
(424)
|
|
|
949 |
LIU Yutong, LI Zhiqing, YANG Xiaoling |
| |
|
Application of improved convolution neural network in remote sensing image classification |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 949-954
[Abstract]
(834)
[HTML 1 KB]
[PDF 980 KB]
(992)
|
|
|
935 |
AN Xuxiao, DENG Hongmin, SHI Xingyu |
| |
|
Parking lot space detection method based on mini convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (4): 935-938
[Abstract]
(843)
[HTML 1 KB]
[PDF 638 KB]
(1067)
|
|
|
905 |
XUE Yu, MEI Xue, ZHI Youran, XU Zhixing, SHI Xiang |
| |
|
Sub-health state identification method of subway door based on time series data mining |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 905-910
[Abstract]
(699)
[HTML 1 KB]
[PDF 974 KB]
(520)
|
|
|
900 |
SUN Gongwu, XIE Jirong, WANG Junxuan |
| |
|
Ship course identification model based on recursive least squares algorithm with dynamic forgetting factor |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 900-904
[Abstract]
(837)
[HTML 1 KB]
[PDF 768 KB]
(526)
|
|
|
891 |
WANG Fei, YU Fengqing |
| |
|
Musical instrument identification based on multiscale time-frequency modulation and multilinear principal component analysis |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 891-894
[Abstract]
(541)
[HTML 1 KB]
[PDF 815 KB]
(442)
|
|
|
879 |
YIN Li, LIN Xinqi, CHEN Lifei |
| |
|
Moving object removal forgery detection algorithm in video frame |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 879-883
[Abstract]
(651)
[HTML 1 KB]
[PDF 862 KB]
(497)
|
|
|
859 |
ZOU Jiabin, SUN Wei |
| |
|
Multi-focus image fusion based on lifting stationary wavelet transform and joint structural group sparse representation |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 859-865
[Abstract]
(575)
[HTML 1 KB]
[PDF 1250 KB]
(517)
|
|
|
812 |
LI Zhen, NIU Jun, WANG Kui, XIN Yuanyuan |
| |
|
Optimization of source code search based on multi-feature weight assignment |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 812-817
[Abstract]
(755)
[HTML 1 KB]
[PDF 968 KB]
(616)
|
|
|
786 |
LI Ruying, ZHANG Zhizhong, DENG Xiangtian |
| |
|
Design and implementation of carrier aggregation in LTE-A air-interface analyzer |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 786-790
[Abstract]
(875)
[HTML 1 KB]
[PDF 765 KB]
(613)
|
|
|
780 |
ABDURAHMAN Kadir, MUTALLIP Sattar, MIREGULI Aili |
| |
|
Asynchronous hexadecimal digital secure communication system based on shift keying of coupled hyperchaotic systems |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 780-785
[Abstract]
(665)
[HTML 1 KB]
[PDF 976 KB]
(413)
|
|
|
763 |
HAO Dehua, GUAN Weiguo, ZOU Linjie, JIAO Meng |
| |
|
Fast virtual grid matching localization algorithm based on Pearson correlation coefficient |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 763-768
[Abstract]
(726)
[HTML 1 KB]
[PDF 962 KB]
(526)
|
|
|
741 |
TANG Yaxin, LI Yanlong, YANG Chao, WANG Bo |
| |
|
Time and frequency synchronization for OFDM/OQAM in ground air channel |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 741-745
[Abstract]
(702)
[HTML 1 KB]
[PDF 779 KB]
(512)
|
|
|
734 |
HE He, LI Linlin, LU Yunfei |
| |
|
Delay tolerant network clustering routing algorithm based on vehicular Ad Hoc network communication terminals and motion information |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 734-740
[Abstract]
(593)
[HTML 1 KB]
[PDF 1142 KB]
(526)
|
|
|
728 |
REN Zhi, TIAN Jieli, YOU Lei, LYU Yuhui |
| |
|
Access protocol for terahertz wireless personal area networks based on high efficient handover of piconet coordinator |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 728-733
[Abstract]
(619)
[HTML 1 KB]
[PDF 956 KB]
(492)
|
|
|
722 |
TANG Jiaqi, WU Jingli |
| |
|
Protein function prediction method based on PPI network and machine learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 722-727
[Abstract]
(914)
[HTML 1 KB]
[PDF 948 KB]
(694)
|
|
|
666 |
WANG Lin, ZHANG Hehe |
| |
|
Application of Faster R-CNN model in vehicle detection |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 666-670
[Abstract]
(1902)
[HTML 1 KB]
[PDF 877 KB]
(1323)
|
|
|
661 |
SHI En, LI Qian, GU Daquan, ZHAO Zhangming |
| |
|
Weather radar echo extrapolation method based on convolutional neural networks |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (3): 661-665
[Abstract]
(2613)
[HTML 1 KB]
[PDF 963 KB]
(1074)
|
|
|
610 |
WU Hailong, BAI Zhengyao, ZHANG Yu, HE Qian |
| |
|
Design and realization of low frequency radio astronomical signal acquisition circuit based on modulated wideband converter |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 610-614
[Abstract]
(549)
[HTML 1 KB]
[PDF 738 KB]
(557)
|
|
|
602 |
HE Chun, LI Qi, WU Ranghao, LIU Bangxin |
| |
|
Diagnosis of fault circuit by modularized BP neural network based on fault propagation |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 602-609
[Abstract]
(631)
[HTML 1 KB]
[PDF 1169 KB]
(508)
|
|
|
582 |
QIU Hanguang, ZHOU Yufeng |
| |
|
Reception box locating-vehicle routing problems in urban distribution based on nested Logit model |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 582-588
[Abstract]
(490)
[HTML 1 KB]
[PDF 1100 KB]
(479)
|
|
|
568 |
LI Zhou, CUI Chen |
| |
|
Observation matrix optimization algorithm in compressive sensing based on singular value decomposition |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 568-572
[Abstract]
(747)
[HTML 1 KB]
[PDF 756 KB]
(491)
|
|
|
563 |
ZHOU Feng, LIN Nan, CHEN Xiaoping |
| |
|
Inverse kinematics equation solving method for six degrees of freedom manipulator based on six dimensional linear interpolation |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 563-567
[Abstract]
(606)
[HTML 1 KB]
[PDF 677 KB]
(453)
|
|
|
522 |
WANG Guisheng, REN Qinghua, XU Bingzheng, LIU Yang |
| |
|
Design of transform domain communication system for long distance aeronautical communication |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 522-527
[Abstract]
(555)
[HTML 1 KB]
[PDF 869 KB]
(417)
|
|
|
497 |
SUN Limei, LI Yue, Ejike Ifeanyi Michael, CAO Keyan |
| |
|
Simplified Slope One algorithm for online rating prediction |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 497-502
[Abstract]
(605)
[HTML 1 KB]
[PDF 939 KB]
(554)
|
|
|
483 |
LI Ye, CHEN Yiyan, ZHANG Shufen |
| |
|
Design of mixed data clustering algorithm based on density peak |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 483-490
[Abstract]
(548)
[HTML 1 KB]
[PDF 1493 KB]
(417)
|
|
|
471 |
SONG Baoyan, JIA Chunjie, SHAN Xiaohuan, DING Linlin, DING Xingyan |
| |
|
Dynamic Top-
K interesting subgraph query on large-scale labeled graph |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 471-477
[Abstract]
(533)
[HTML 1 KB]
[PDF 1088 KB]
(527)
|
|
|
448 |
SUN Jinyu, WANG Hongyuan, ZHANG Ji, ZHANG Wenwen |
| |
|
Person re-identification method based on block sparse representation |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 448-453
[Abstract]
(605)
[HTML 1 KB]
[PDF 1006 KB]
(419)
|
|
|
443 |
TONG Nan, FU Qiang, ZHONG Caiming |
| |
|
Improved teaching-learning-based optimization algorithm based on self-learning mechanism |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 443-447
[Abstract]
(718)
[HTML 1 KB]
[PDF 836 KB]
(504)
|
|
|
433 |
LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng |
| |
|
Differential crow search algorithm based on Lévy flight for solving discount {0-1} knapsack problem |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 433-442
[Abstract]
(659)
[HTML 1 KB]
[PDF 1349 KB]
(502)
|
|
|
357 |
XU Bing, GUO Yuanbo, YE Ziwei, HU Yongjin |
| |
|
Abnormal user detection in enterprise network based on graph analysis and support vector machine |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 357-362
[Abstract]
(690)
[HTML 1 KB]
[PDF 971 KB]
(498)
|
|
|
352 |
ZHONG Ya, GUO Yuanbo |
| |
|
Design and implementation of log parsing system based on machine learning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 352-356
[Abstract]
(2174)
[HTML 1 KB]
[PDF 841 KB]
(1248)
|
|
|
348 |
LIU Rong, PAN Hongzhi, LIU Bo, ZU Ting, FANG Qun, HE Xin, WANG Yang |
| |
|
Data updating method for cloud storage based on ciphertext-policy attribute-based encryption |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 348-351
[Abstract]
(697)
[HTML 1 KB]
[PDF 763 KB]
(546)
|
|
|
316 |
ZHOU Zhicheng, LI Lixin, LI Zuohui |
| |
|
Efficient cross-domain authentication scheme based on blockchain technology |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 316-320
[Abstract]
(1440)
[HTML 1 KB]
[PDF 945 KB]
(1940)
|
|
|
305 |
CAI Mengjuan, CHEN Xingshu, JIN Xin, ZHAO Cheng, YIN Mingyong |
| |
|
Paging-measurement method for virtual machine process code based on hardware virtualization |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (2): 305-309
[Abstract]
(597)
[HTML 1 KB]
[PDF 1037 KB]
(682)
|
|
|
300 |
JIA Fujin, JIANG Yuan |
| |
|
Design of controller based on backstepping nonlinear pure feedback system |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 300-304
[Abstract]
(802)
[HTML 1 KB]
[PDF 666 KB]
(390)
|
|
|
290 |
NIU Guochen, YUAN Jie, GU Runping |
| |
|
Design and implementation of positioning system for embedded aeronautical ground lights |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 290-294
[Abstract]
(583)
[HTML 1 KB]
[PDF 760 KB]
(462)
|
|
|
277 |
WANG Chao, ZHU Ming, WANG Min |
| |
|
Evaluation of sector dynamic traffic capacity based on controller's cognitive load and improved ant colony algorithm |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 277-283
[Abstract]
(541)
[HTML 1 KB]
[PDF 1149 KB]
(424)
|
|
|
255 |
ZHU Junpeng, ZHAO Hongli, YANG Haitao |
| |
|
Disparity map generation technology based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 255-259
[Abstract]
(670)
[HTML 1 KB]
[PDF 1010 KB]
(504)
|
|
|
228 |
ZHENG Jianhong, ZHANG Heng, LI Fei, LI Xiang, DENG Zhan |
| |
|
Time-frequency combination de-noising algorithm based on orthogonal frequency division multiplexing/offset quadrature amplitude modulation in power line communication system |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 228-232
[Abstract]
(548)
[HTML 1 KB]
[PDF 790 KB]
(342)
|
|
|
222 |
KANG Zhaoling, XU Qinbao, WANG Changda |
| |
|
Multi-granularity topology-based stepwise refinement provenance method for wireless sensor networks |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 222-227
[Abstract]
(528)
[HTML 1 KB]
[PDF 1030 KB]
(380)
|
|
|
217 |
JIN Yong, GONG Shengli |
| |
|
Cluster-based resource allocation scheme in dense femtocell network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 217-221
[Abstract]
(551)
[HTML 1 KB]
[PDF 821 KB]
(428)
|
|
|
201 |
ZHOU Ying, FANG Yong, HUANG Cheng, LIU Liang |
| |
|
Detection of SQL injection behaviors for PHP applications |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 201-206
[Abstract]
(925)
[HTML 1 KB]
[PDF 1074 KB]
(487)
|
|
|
146 |
ZHAO Erping, LIU Wei, DANG Hong'en |
| |
|
Data compression and spatial indexing technology for massive 3D point cloud |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 146-151
[Abstract]
(600)
[HTML 1 KB]
[PDF 1209 KB]
(569)
|
|
|
137 |
LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng |
| |
|
Chaotic crow search algorithm based on differential evolution strategy for solving discount {0-1} knapsack problem |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 137-145
[Abstract]
(641)
[HTML 1 KB]
[PDF 1387 KB]
(476)
|
|
|
126 |
LI Juan, YOU Xiaoming, LIU Sheng, CHEN Jia |
| |
|
Dynamic chaotic ant colony system and its application in robot path planning |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 126-131
[Abstract]
(663)
[HTML 1 KB]
[PDF 968 KB]
(406)
|
|
|
91 |
YANG Fan, LI Jianping, LI Xin, CHEN Leiting |
| |
|
Salient object detection algorithm based on multi-task deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 91-96
[Abstract]
(683)
[HTML 1 KB]
[PDF 1057 KB]
(757)
|
|
|
84 |
LUO Ming, HUANG Hailiang |
| |
|
Information extraction method of financial events based on lexical-semantic pattern |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 84-90
[Abstract]
(619)
[HTML 1 KB]
[PDF 1071 KB]
(482)
|
|
|
79 |
LI Can, WANG Rangding, YAN Diqun |
| |
|
Recaptured speech detection algorithm based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 79-83
[Abstract]
(691)
[HTML 1 KB]
[PDF 838 KB]
(469)
|
|
|
73 |
WANG Hong, GE Lina, WANG Suqing, WANG Liying, ZHANG Yipeng, LIANG Juncheng |
| |
|
Improvement of differential privacy protection algorithm based on OPTICS clustering |
| |
|
|
Journal of Computer Applications
2018 Vol.38 (1): 73-78
[Abstract]
(896)
[HTML 1 KB]
[PDF 988 KB]
(531)
|
|
|
3592 |
WANG Shuyan, CHEN Pengyuan, SUN Jiaze |
| |
|
Reduction method of test suites based on mutation analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3592-3596
[Abstract]
(653)
[HTML 1 KB]
[PDF 825 KB]
(664)
|
|
|
3574 |
CHANG Tianyou, WEI Qiang, GENG Yangyang |
| |
|
Constructing method of PLC program model based on state transition |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3574-3580
[Abstract]
(667)
[HTML 1 KB]
[PDF 1124 KB]
(763)
|
|
|
3569 |
LIU Ying, ZHANG Tao, LI Kun, LI Nan |
| |
|
Evaluation model of mobile application crowdsourcing testers |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3569-3573
[Abstract]
(633)
[HTML 1 KB]
[PDF 937 KB]
(790)
|
|
|
3563 |
YUAN Bo |
| |
|
Application of MRF's spatial correlation model in NMF-based linear unmixing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3563-3568
[Abstract]
(585)
[HTML 1 KB]
[PDF 1038 KB]
(725)
|
|
|
3558 |
XIA Jun, LI Yinghua |
| |
|
Delaunay triangulation subdivision algorithm of spherical convex graph and its convergence analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3558-3562
[Abstract]
(570)
[HTML 1 KB]
[PDF 738 KB]
(624)
|
|
|
3554 |
GAO Yuan, JIA Ziting, QIN Pinle, WANG Lifang |
| |
|
Medical image fusion algorithm based on linking synaptic computation network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3554-3557
[Abstract]
(565)
[HTML 1 KB]
[PDF 871 KB]
(864)
|
|
|
3547 |
SUN Zengyou, DUAN Yushuai, LI Ya |
| |
|
Image feature point matching algorithm based on center surround filter detection |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3547-3553
[Abstract]
(638)
[HTML 1 KB]
[PDF 1171 KB]
(819)
|
|
|
3523 |
HU Xuegang, QIU Xiulan |
| |
|
Novel image segmentation algorithm based on Snake model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3523-3527
[Abstract]
(754)
[HTML 1 KB]
[PDF 894 KB]
(792)
|
|
|
3504 |
LIN Weiming, GAO Qinquan, DU Min |
| |
|
Convolutional neural network based method for diagnosis of Alzheimer's disease |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3504-3508
[Abstract]
(1120)
[HTML 1 KB]
[PDF 844 KB]
(1022)
|
|
|
3498 |
LU Ling, YANG Wu, YANG Youjun, CHEN Menghan |
| |
|
Chinese short text classification method by combining semantic expansion and convolutional neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3498-3503
[Abstract]
(690)
[HTML 1 KB]
[PDF 928 KB]
(1032)
|
|
|
3482 |
QIU Baozhi, TANG Yamin |
| |
|
Efficient clustering algorithm for fast recognition of density backbone |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3482-3486
[Abstract]
(648)
[HTML 1 KB]
[PDF 810 KB]
(762)
|
|
|
3458 |
WANG Zeyu, WU Yanxia, ZHANG Guoyin, BU Shuhui |
| |
|
Three-dimensional spatial structured encoding deep network for RGB-D scene parsing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3458-3466
[Abstract]
(795)
[HTML 1 KB]
[PDF 11074 KB]
(1171)
|
|
|
3442 |
CHEN Gang, GUO Yudong, WEI Xiaofeng |
| |
|
Dynamic defense method of Web server based on Linux namespace |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3442-3446
[Abstract]
(677)
[HTML 1 KB]
[PDF 811 KB]
(756)
|
|
|
3423 |
WANG Jingwei, YIN Xinchun |
| |
|
Ciphertext policy attribute-based encryption scheme with weighted attribute revocation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3423-3429
[Abstract]
(669)
[HTML 1 KB]
[PDF 1079 KB]
(887)
|
|
|
3381 |
HU Qiang, LIN Yun |
| |
|
Adaptive compressed sensing algorithm based on observation matrix optimization |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3381-3385
[Abstract]
(664)
[HTML 1 KB]
[PDF 780 KB]
(498)
|
|
|
3374 |
LI Xinchun, GAO Baisheng |
| |
|
WSN routing algorithm based on optimal number of clusters and improved gravitational search |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3374-3380
[Abstract]
(546)
[HTML 1 KB]
[PDF 1066 KB]
(635)
|
|
|
3361 |
LIAO Han, MA Dongya, YIN Lixin |
| |
|
Capacity optimization of secondary user system in MIMO cognitive networks based on non-orthogonal multiple access |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3361-3367
[Abstract]
(577)
[HTML 1 KB]
[PDF 1016 KB]
(557)
|
|
|
3356 |
FAN Zifu, HU Min, LI Yuening |
| |
|
Dynamic pilot allocation based on graph coloring in massive MIMO systems |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3356-3360
[Abstract]
(666)
[HTML 1 KB]
[PDF 785 KB]
(695)
|
|
|
3339 |
GUO Hao, LIU Lei, CHEN Junjie |
| |
|
Brain network analysis and classification for patients of Alzheimer's disease based on high-order minimum spanning tree |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3339-3344
[Abstract]
(639)
[HTML 1 KB]
[PDF 1091 KB]
(663)
|
|
|
3335 |
ZENG Ling, XIAO Ruliang |
| |
|
Session identification algorithm based on dynamic time threshold of adjacent requests |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3335-3338
[Abstract]
(707)
[HTML 1 KB]
[PDF 674 KB]
(582)
|
|
|
3330 |
WU Qingsong, YANG Hongbing, FANG Jia |
| |
|
Production scheduling and preventive maintenance integrated optimization based on catastrophe mechanism |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3330-3334
[Abstract]
(662)
[HTML 1 KB]
[PDF 769 KB]
(536)
|
|
|
3304 |
GU Zeyu, ZHANG Xingming, LIN Senjie |
| |
|
Load-aware dynamic scheduling mechanism based on security strategies |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3304-3310
[Abstract]
(750)
[HTML 1 KB]
[PDF 1196 KB]
(658)
|
|
|
3294 |
JIANG Zhongqing, ZHOU Anmin, JIA Peng |
| |
|
DEX unpacking technology in ART virtual machine |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3294-3298
[Abstract]
(882)
[HTML 1 KB]
[PDF 980 KB]
(800)
|
|
|
3288 |
ZHOU Min, ZHOU Anmin, LIU Liang, JIA Peng, TAN Cuijiang |
| |
|
Mining denial of service vulnerability in Android applications automatically |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3288-3293
[Abstract]
(782)
[HTML 1 KB]
[PDF 1044 KB]
(616)
|
|
|
3270 |
PENG Hongxing, HU Yiwen, YANG Xueqing, LI Xingwang |
| |
|
Upper bounds on sum rate of 3D distributed MIMO systems over
K fading cpmposite channels |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3270-3275
[Abstract]
(613)
[HTML 1 KB]
[PDF 861 KB]
(534)
|
|
|
3238 |
ZHU Jie, WU Shufang, XIE Bojun, MA Liyan |
| |
|
Color based compact hierarchical image representation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3238-3243
[Abstract]
(562)
[HTML 1 KB]
[PDF 1047 KB]
(554)
|
|
|
3226 |
SUN Qiang, TAN Xiaoyang |
| |
|
Super-resolution and frontalization in unconstrained face images |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3226-3230
[Abstract]
(805)
[HTML 1 KB]
[PDF 963 KB]
(589)
|
|
|
3212 |
ZHANG Yongliang, ZHOU Bing, ZHAN Xiaosi, QIU Xiaoguang, LU Tianpei |
| |
|
Small-size fingerprint matching based on deep learning |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3212-3218
[Abstract]
(1301)
[HTML 1 KB]
[PDF 1270 KB]
(972)
|
|
|
3207 |
HUANG Hongwei, GE Xiaotian, CHEN Xuansong |
| |
|
Density clustering method based on complex learning classification system |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3207-3211
[Abstract]
(681)
[HTML 1 KB]
[PDF 779 KB]
(593)
|
|
|
3182 |
DONG Linjia, QIANG Yan, ZHAO Juanjuan, YUAN jie, ZHAO Wenting |
| |
|
Automatic detection of pulmonary nodules based on 3D shape index |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3182-3187
[Abstract]
(743)
[HTML 1 KB]
[PDF 935 KB]
(704)
|
|
|
3139 |
YU Huangyue, WANG Han, GUO Mengting |
| |
|
Video keyframe extraction based on users' interests |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3139-3144
[Abstract]
(784)
[HTML 1 KB]
[PDF 1017 KB]
(614)
|
|
|
3134 |
LI Xuejun, ZHANG Kaihua, SONG Huihui |
| |
|
Unsupervised video segmentation by fusing multiple spatio-temporal feature representations |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3134-3138
[Abstract]
(673)
[HTML 1 KB]
[PDF 1045 KB]
(604)
|
|
|
3128 |
LIN Lingpeng, HUANG Tianqiang, LIN Jing |
| |
|
Object tracking based on foreground discrimination and circle search |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3128-3133
[Abstract]
(675)
[HTML 1 KB]
[PDF 1049 KB]
(610)
|
|
|
3124 |
GUO Xiao, TAN Wenan |
| |
|
High-performance image super-resolution restruction based on cascade deep convolutional network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3124-3127
[Abstract]
(784)
[HTML 1 KB]
[PDF 783 KB]
(598)
|
|
|
3107 |
TAN Zheng, LIU JingLei, YU Hang |
| |
|
Conditional preference mining based on MaxClique |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3107-3114
[Abstract]
(843)
[HTML 1 KB]
[PDF 1274 KB]
(683)
|
|
|
3101 |
ZHENG Yongguang, YUE Kun, YIN Zidu, ZHANG Xuejie |
| |
|
Efficient approach for selecting key users in large-scale social networks |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3101-3106
[Abstract]
(803)
[HTML 1 KB]
[PDF 965 KB]
(648)
|
|
|
3057 |
DAI Lijie, ZHANG Changjiang, MA Leiming |
| |
|
Dynamic forecasting model of short-term PM2.5 concentration based on machine learning |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3057-3063
[Abstract]
(906)
[HTML 1 KB]
[PDF 1092 KB]
(847)
|
|
|
0 |
|
| |
|
Online signature verification based on curve segment similarity matching |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(363)
[HTML 0 KB]
[PDF 863 KB]
(168)
|
|
|
0 |
|
| |
|
BIGDATA-34 Person re-identification method based on block sparse representation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(248)
[HTML 1 KB]
[PDF 734 KB]
(504)
|
|
|
3034 |
ZHU Linqi, ZHANG Chong, ZHOU Xueqing, WEI Yang, HUANG Yuyang, GAO Qiming |
| |
|
Nuclear magnetic resonance logging reservoir permeability prediction method based on deep belief network and kernel extreme learning machine algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3034-3038
[Abstract]
(701)
[HTML 1 KB]
[PDF 791 KB]
(604)
|
|
|
3017 |
XIU Chao, CAO Lin, WANG Dongfeng, ZHANG Fan |
| |
|
Automatic lane division method based on echo signal of microwave radar |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3017-3023
[Abstract]
(673)
[HTML 1 KB]
[PDF 990 KB]
(533)
|
|
|
3012 |
HAN Jiandong, DENG Yifan |
| |
|
Multi-channel pedestrian detection algorithm based on textural and contour features |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3012-3016
[Abstract]
(799)
[HTML 1 KB]
[PDF 950 KB]
(621)
|
|
|
2999 |
WANG Ting, WANG Qi, HUANG Yueqi, YIN Yichao, GAO Ju |
| |
|
Automatic hyponymy extracting method based on symptom components |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2999-3005
[Abstract]
(724)
[HTML 1 KB]
[PDF 1095 KB]
(625)
|
|
|
2983 |
LIU Jiajun, YU Gang, HU Min |
| |
|
Intelligent integration approach of big data for urban infrastructure management and maintenance |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2983-2990
[Abstract]
(905)
[HTML 1 KB]
[PDF 1394 KB]
(854)
|
|
|
2907 |
JIN Yanxia, MA Guangyuan, LEI Haiwei |
| |
|
Hybrid control rate algorithm based on dynamic adaptive streaming over HTTP protocol |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2907-2911
[Abstract]
(614)
[HTML 1 KB]
[PDF 801 KB]
(574)
|
|
|
2899 |
SU Jianjun, MU Shiyou, YANG bo, SUN Xiaobin, ZHAO Haiwu, GU Xiao |
| |
|
Distortion analysis of digital video transcoding |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2899-2902
[Abstract]
(533)
[HTML 1 KB]
[PDF 709 KB]
(488)
|
|
|
2888 |
LI Xiao, GE Baozhen, LUO Qijun, LI Yunpeng, TIAN Qingguo |
| |
|
Acquisition of camera dynamic extrinsic parameters in free binocular stereo vision system |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2888-2894
[Abstract]
(685)
[HTML 1 KB]
[PDF 989 KB]
(731)
|
|
|
2871 |
LIU Jingrong, DU Huimin, DU Qinqin |
| |
|
Improvement of sub-pixel morphological anti-aliasing algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2871-2874
[Abstract]
(613)
[HTML 1 KB]
[PDF 815 KB]
(586)
|
|
|
2866 |
YANG Cheng |
| |
|
Click through rate prediction algorithm based on user's real-time feedback |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2866-2870
[Abstract]
(1137)
[HTML 1 KB]
[PDF 780 KB]
(739)
|
|
|
2841 |
LIU Tong, HUANG Xiutian, MA Jianshe, SU Ping |
| |
|
Image labeling based on fully-connected conditional random field |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2841-2846
[Abstract]
(651)
[HTML 1 KB]
[PDF 939 KB]
(669)
|
|
|
2828 |
JIN Liang, YU Jiong, YANG Xingyao, LU Liang, WANG Yuefei, GUO Binglei, Liao Bin |
| |
|
Video recommendation algorithm based on clustering and hierarchical model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2828-2833
[Abstract]
(795)
[HTML 1 KB]
[PDF 1025 KB]
(788)
|
|
|
2823 |
ZHU Zhanlei, LI Zheng, ZHAO Ruilian |
| |
|
Many-objective optimization algorithm based on linear weighted minimal/maximal dominance |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2823-2827
[Abstract]
(736)
[HTML 1 KB]
[PDF 923 KB]
(606)
|
|
|
2819 |
CAO Xiaolu, XIN Yunhong |
| |
|
Probabilistic distribution model based on Wasserstein distance for nonlinear dimensionality reduction |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2819-2822
[Abstract]
(848)
[HTML 1 KB]
[PDF 669 KB]
(755)
|
|
|
2787 |
ZHANG Ning, ZHONG Shan |
| |
|
Mechanism of personal privacy protection based on blockchain |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2787-2793
[Abstract]
(1732)
[HTML 1 KB]
[PDF 1120 KB]
(1560)
|
|
|
0 |
|
| |
|
Research on inverse kinematics equation of six DOF Manipulator Based on six dimensional linear interpolation |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(289)
[HTML 0 KB]
[PDF 448 KB]
(304)
|
|
|
0 |
|
| |
|
Dynamic Top-K interesting subgraph query on large-scale labeled graph |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(205)
[HTML 1 KB]
[PDF 353 KB]
(125)
|
|
|
0 |
XUE Yu, MEI Xue, ZHI Youran, XU Zhixin, SHI Xiang |
| |
|
Method for identifying sub-health status of train door based on time series data mining |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(234)
[HTML 1 KB]
[PDF 330 KB]
(300)
|
|
|
0 |
|
| |
|
Efficient cross domain authentication scheme based on blockchain technology |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(326)
[HTML 1 KB]
[PDF 327 KB]
(640)
|
|
|
0 |
|
| |
|
Design of hybrid data clustering algorithm based on density peak |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(221)
[HTML 1 KB]
[PDF 1145 KB]
(353)
|
|
|
2433 |
WANG Xiang, HU Xuegang |
| |
|
Overview on feature selection in high-dimensional and small-sample-size classification |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2433-2438
[Abstract]
(1352)
[HTML 1 KB]
[PDF 1146 KB]
(1531)
|
|
|
2728 |
GUO Jian |
| |
|
Target detection method based on beamforming output DC response of sub-covariance matrix |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2728-2734
[Abstract]
(546)
[HTML 1 KB]
[PDF 1027 KB]
(531)
|
|
|
2722 |
DING Jianli, HAN Yuchao, WANG Jialiang |
| |
|
Estimation method for RFID tags based on rough and fine double estimation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2722-2727
[Abstract]
(806)
[HTML 1 KB]
[PDF 1041 KB]
(529)
|
|
|
2717 |
CHEN Dapeng, ZHANG Jiugen, LIANG Xing |
| |
|
Optimal control of chilled water system in central air-conditioning based on artificial immune and particle swarm optimization algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2717-2721
[Abstract]
(712)
[HTML 1 KB]
[PDF 775 KB]
(564)
|
|
|
2705 |
XU Qingyong, JIANG Shunliang, XU Shaoping, GE Yun, TANG Yiling |
| |
|
Tattoo image detection algorithm based on three-channel convolution neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2705-2711
[Abstract]
(768)
[HTML 1 KB]
[PDF 1176 KB]
(798)
|
|
|
2700 |
XIE Xiaoyu, LIU Zhejie |
| |
|
Dynamic gesture recognition method based on EMG and ACC signal |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2700-2704
[Abstract]
(1100)
[HTML 1 KB]
[PDF 823 KB]
(731)
|
|
|
2665 |
GUO Yudong, GUO Zhigang, CHEN Gang, WEI Han |
| |
|
Recommendation method based on
k nearest neighbors using data dimensionality reduction and exact Euclidean locality-sensitive hashing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2665-2670
[Abstract]
(649)
[HTML 1 KB]
[PDF 1114 KB]
(585)
|
|
|
2659 |
GUO Houqian, WANG Weiwei, SHANG Ying, ZHAO Ruilian |
| |
|
Weak mutation test case set generation based on dynamic set evolutionary algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2659-2664
[Abstract]
(701)
[HTML 1 KB]
[PDF 1113 KB]
(510)
|
|
|
2576 |
REN Shuai, ZHANG Tao, YANG Tao, SUO Li, MU Dejun |
| |
|
Information hiding algorithm based on spherical segmentation of 3D model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2576-2580
[Abstract]
(696)
[HTML 1 KB]
[PDF 779 KB]
(566)
|
|
|
2507 |
LIU Dinghao, LYU Jing, SUO Longlong, HU Xiangyu |
| |
|
Spoofing detection method of carrier tracking loop statistical property analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2507-2511
[Abstract]
(546)
[HTML 1 KB]
[PDF 774 KB]
(505)
|
|
|
2474 |
LIU Ziyan, TANG Hu, LIU Shimei |
| |
|
Multi-cell channel estimation based on compressive sensing in MASSIVE MIMO system |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2474-2478
[Abstract]
(745)
[HTML 1 KB]
[PDF 919 KB]
(838)
|
|
|
2463 |
MAO Lingchu, ZHAO Haitao |
| |
|
Distributed deployment algorithm for connected on-demand coverage in mobile sensor network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2463-2469
[Abstract]
(606)
[HTML 1 KB]
[PDF 1106 KB]
(520)
|
|
|
2454 |
FENG Kai |
| |
|
Conditional strong matching preclusion for
k-ary
n-cubes |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2454-2456
[Abstract]
(757)
[HTML 1 KB]
[PDF 623 KB]
(522)
|
|
|
2427 |
HUANG Leiming, WANG Liming, CHEN Zhongqin |
| |
|
Time synchronization of ship fault recording device based on Lagrange once interpolation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2427-2432
[Abstract]
(831)
[HTML 1 KB]
[PDF 947 KB]
(822)
|
|
|
2421 |
NAN Jingchang, CUI Hongyan |
| |
|
Modeling of power amplifier based on dynamic X-parameter of new two-dimensional kernel function |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2421-2426
[Abstract]
(664)
[HTML 1 KB]
[PDF 864 KB]
(691)
|
|
|
2416 |
GUO Leiyong, LI Yu, LIN Shengyi, TAN Hongzhou |
| |
|
Excitation piecewise expansion method for speech bandwidth expansion based on hidden Markov model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2416-2420
[Abstract]
(668)
[HTML 1 KB]
[PDF 810 KB]
(730)
|
|
|
2410 |
DAI Zhaokun, LIU Hui, WANG Wenzhe, WANG Yanan |
| |
|
Dimension reduction method of brain network state observation matrix based on Spectral Embedding |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2410-2415
[Abstract]
(669)
[HTML 1 KB]
[PDF 1084 KB]
(713)
|
|
|
2395 |
XIAO Chunjing, XIA Kewen, QIAO Yongwei, ZHANG Yuxiang |
| |
|
Tourism route recommendation based on dynamic clustering |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2395-2400
[Abstract]
(817)
[HTML 1 KB]
[PDF 916 KB]
(808)
|
|
|
2381 |
ZHENG Linjang, LIU Xu, YI Bing |
| |
|
Dynamic weighted real-time map matching algorithm considering spatio-temporal property |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2381-2386
[Abstract]
(776)
[HTML 1 KB]
[PDF 891 KB]
(780)
|
|
|
2362 |
XU Xiaowei, DU Yi, ZHOU Yuanchun |
| |
|
Resident behavior model analysis method based on multi-source travel data |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2362-2367
[Abstract]
(1039)
[HTML 1 KB]
[PDF 965 KB]
(918)
|
|
|
2349 |
YU Siqin, YAN Qiuyan, YAN Xinming |
| |
|
Clustering algorithm of time series with optimal u-shapelets |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2349-2356
[Abstract]
(865)
[HTML 1 KB]
[PDF 1191 KB]
(881)
|
|
|
2313 |
LI Tao, HE Xiaohai, TENG Qizhi, WU Xiaoqiang |
| |
|
Adaptive bi-l
p-l
2-norm based blind super-resolution reconstruction for single blurred image |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2313-2318
[Abstract]
(663)
[HTML 1 KB]
[PDF 972 KB]
(686)
|
|
|
2287 |
LI Zhenlin, ZHANG Wei, BAI Ping, WANG Xu'an |
| |
|
BGN type outsourcing the decryption of attribute-based encryption ciphertexts |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2287-2291
[Abstract]
(1145)
[HTML 1 KB]
[PDF 765 KB]
(1177)
|
|
|
2281 |
GAO Jie, WU Jiangxing, HU Yuxiang, LI Junfei |
| |
|
Research of control plane' anti-attacking in software-defined network based on Byzantine fault-tolerance |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2281-2286
[Abstract]
(656)
[HTML 1 KB]
[PDF 941 KB]
(820)
|
|
|
2264 |
CHAI Yun, XIONG Tao |
| |
|
Second-order information based formation control in multi-Agent system |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2264-2269
[Abstract]
(622)
[HTML 1 KB]
[PDF 835 KB]
(547)
|
|
|
2244 |
ZHANG Yong, YANG Hao |
| |
|
Image classification method based on optimized bag-of-visual words model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2244-2247
[Abstract]
(817)
[HTML 1 KB]
[PDF 790 KB]
(662)
|
|
|
2189 |
ZHANG Ting, ZHANG Tianqi, XIONG Mei |
| |
|
Blind estimation of combination code sequence for TDDM-BOC based on Sanger neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2189-2194
[Abstract]
(641)
[HTML 1 KB]
[PDF 845 KB]
(501)
|
|
|
2184 |
HONG Liugen, ZHENG Lin, YANG Chao |
| |
|
Multi-target detection via sparse recovery of least absolute shrinkage and selection operator model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2184-2188
[Abstract]
(1310)
[HTML 1 KB]
[PDF 828 KB]
(614)
|
|
|
2145 |
ZHANG Gang, JIANG Wei, LIU Shixiao |
| |
|
Hybrid dynamic clustering algorithm for long term evolution system in unlicensed bands |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2145-2149
[Abstract]
(715)
[HTML 1 KB]
[PDF 929 KB]
(589)
|
|
|
0 |
|
| |
|
MRI Data Classification Method Based on High-Order Minimum Spanning Tree |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(278)
[HTML 0 KB]
[PDF 306 KB]
(75)
|
|
|
0 |
Qiang Sun |
| |
|
Image super-resolution and face frontalization in unconstrained image |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(432)
[HTML 1 KB]
[PDF 396 KB]
(198)
|
|
|
0 |
|
| |
|
A CT/MR brain image fusion method via improved coupled dictionary learning |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(241)
[HTML 0 KB]
[PDF 0 KB]
(30)
|
|
|
0 |
Xi-Yang ZHAI WANG Xiao-danWANG LEI Lei |
| |
|
Improved multi-class AdaBoost algorithm based on SAMME |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2669)
[HTML 0 KB]
[PDF 0 KB]
(163)
|
|
|
0 |
|
| |
|
Speech Enhancement Method Based On OS-DL |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(188)
[HTML 0 KB]
[PDF 0 KB]
(24)
|
|
|
0 |
|
| |
|
Based on entropy theory and AHP's protection effectiveness evaluation of underground command Engineering |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(231)
[HTML 0 KB]
[PDF 0 KB]
(28)
|
|
|
2124 |
WANG Zhongqiang, CHEN Jide, PENG Jian, HUANG Feihu, TONG Bo |
| |
|
Airline predicting algorithm based on improved Markov chain |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2124-2128
[Abstract]
(777)
[HTML 1 KB]
[PDF 756 KB]
(591)
|
|
|
2067 |
ZHAN Yi, LI Meng |
| |
|
Variable exponent variational model for image interpolation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2067-2070
[Abstract]
(645)
[HTML 1 KB]
[PDF 702 KB]
(482)
|
|
|
2044 |
CUI Di, GUO Xiaoyan, CHEN Wei |
| |
|
Challenges and recent progress in big data visualization |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2044-2049
[Abstract]
(1000)
[HTML 1 KB]
[PDF 1184 KB]
(1086)
|
|
|
2034 |
WANG Jing, WANG Chunmei, ZHI Jia, YANG Jiasen, CHEN Tuo |
| |
|
Multi-Agent-based real-time self-adaptive discrimination method |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2034-2038
[Abstract]
(852)
[HTML 1 KB]
[PDF 988 KB]
(554)
|
|
|
2019 |
YANG Tao, SHI Lin, SONG Mengdie, LI Shoubin, WANG Qing |
| |
|
Design and implementation of process management system supporting multi-tool collaboration |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2019-2026
[Abstract]
(773)
[HTML 1 KB]
[PDF 1269 KB]
(621)
|
|
|
2014 |
DONG Junfei, ZHENG Bochuan, YANG Zejing |
| |
|
Character recognition of license plate based on convolution neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2014-2018
[Abstract]
(1841)
[HTML 1 KB]
[PDF 792 KB]
(1616)
|
|
|
2008 |
YE Lihua, WANG Lei, ZHAO Liping |
| |
|
Field scene recognition method for low-small-slow unmanned aerial vehicle landing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2008-2013
[Abstract]
(755)
[HTML 1 KB]
[PDF 1005 KB]
(465)
|
|
|
1999 |
ZHAO Yiding, TIAN Senping |
| |
|
Facial age estimation method based on hybrid model of classification and regression |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1999-2002
[Abstract]
(1056)
[HTML 1 KB]
[PDF 813 KB]
(647)
|
|
|
1960 |
FENG Hui, JING Xiaoyuan, ZHU Xiaoke |
| |
|
Multi-view feature projection and synthesis-analysis dictionary learning for image classification |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1960-1966
[Abstract]
(853)
[HTML 1 KB]
[PDF 1171 KB]
(479)
|
|
|
1943 |
TIAN Jiwei, WANG Buhong, SHANG Fute |
| |
|
False data injection attacks based on robust principal component analysis in smart grid |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1943-1947
[Abstract]
(859)
[HTML 1 KB]
[PDF 969 KB]
(599)
|
|
|
1906 |
ZHAI Guangming, LI Guohe, WU Weijiang, HONG Yunfeng, ZHOU Xiaoming, WANG Jing |
| |
|
Improved algorithm of artificial bee colony based on Spark |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1906-1910
[Abstract]
(741)
[HTML 1 KB]
[PDF 766 KB]
(629)
|
|
|
1877 |
LI Yangguang, BAO Jianrong, JIANG Bin, LIU Chao |
| |
|
Frequency offset estimation algorithm of time domain synchronous orthogonal frequency division multiplexing based on correlations of cyclic pseudo-random noise |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1877-1882
[Abstract]
(640)
[HTML 1 KB]
[PDF 988 KB]
(535)
|
|
|
1849 |
XU Zhongming, TAN Li, YANG Chaoyu, TANG Xiaojiang |
| |
|
Node coverage optimization algorithm in directional heterogeneous wireless sensor network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1849-1854
[Abstract]
(673)
[HTML 1 KB]
[PDF 851 KB]
(585)
|
|
|
1837 |
YANG Qiang, ZHANG Tianqi, ZHAO Liang |
| |
|
Blind period estimation of PN sequence for multipath tamed spread spectrum signal |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1837-1842
[Abstract]
(694)
[HTML 1 KB]
[PDF 893 KB]
(587)
|
|
|
1825 |
CAI Yueping, ZHANG Wenpeng, LUO Sen |
| |
|
Minimum access guaranteed bandwidth allocation mechanism in data center network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1825-1829
[Abstract]
(788)
[HTML 1 KB]
[PDF 833 KB]
(781)
|
|
|
0 |
|
| |
|
A Second Revision based Analysis and Evaluation Method for Education and Test Data |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(210)
[HTML 0 KB]
[PDF 0 KB]
(18)
|
|
|
0 |
|
| |
|
Multi-target Detection via Sparse Recovery of the Lasso Model |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(237)
[HTML 1 KB]
[PDF 0 KB]
(43)
|
|
|
1820 |
REN Dongmei, ZHANG Yuyang, DONG Xinling |
| |
|
Application of improved principal component analysis-Bayes discriminant analysis method to petroleum drilling safety evaluation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1820-1824
[Abstract]
(618)
[HTML 1 KB]
[PDF 753 KB]
(706)
|
|
|
1793 |
DAI Hepu, LIU Gang, HE Yanyan |
| |
|
Orthogonalization of regressors in functional magnetic resonance imaging based on general linear model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1793-1797
[Abstract]
(545)
[HTML 1 KB]
[PDF 904 KB]
(593)
|
|
|
1782 |
WANG Xinqing, MENG Fanjie, LYU Gaowang, REN Guoting |
| |
|
Unstructured road detection based on improved region growing with PCA-SVM rule |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1782-1786
[Abstract]
(863)
[HTML 1 KB]
[PDF 861 KB]
(701)
|
|
|
1759 |
LI Zhuo, LIU Jieyu, LI Hui, ZHOU Xiaogang, LI Weipeng |
| |
|
Feature detection and description algorithm based on ORB-LATCH |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1759-1762
[Abstract]
(805)
[HTML 1 KB]
[PDF 794 KB]
(762)
|
|
|
1741 |
WANG Yuanlong |
| |
|
Sentence composition model for reading comprehension |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1741-1746
[Abstract]
(816)
[HTML 1 KB]
[PDF 965 KB]
(817)
|
|
|
1735 |
LIU Xinxing, JI Donghong, REN Yafeng |
| |
|
Product property sentiment analysis based on neural network model |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1735-1740
[Abstract]
(833)
[HTML 1 KB]
[PDF 897 KB]
(1022)
|
|
|
1728 |
SANG Cheng, CHENG Jian, SHI Yiming |
| |
|
Knowledge integration and semantic annotation in closed-loop lifecycle management system |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1728-1734
[Abstract]
(658)
[HTML 1 KB]
[PDF 1131 KB]
(735)
|
|
|
1722 |
DONG Xia, WANG Lifang, QIN Pinle, GAO Yuan |
| |
|
CT/MR brain image fusion method via improved coupled dictionary learning |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1722-1727
[Abstract]
(785)
[HTML 1 KB]
[PDF 1146 KB]
(797)
|
|
|
1716 |
LI Zhengming, YANG Nanyue, CEN Jian |
| |
|
Dictionary learning algorithm based on Fisher discriminative criterion constraint of atoms |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1716-1721
[Abstract]
(768)
[HTML 1 KB]
[PDF 1114 KB]
(733)
|
|
|
1708 |
XU Chao, YAN Shengye |
| |
|
Improved pedestrian detection method based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1708-1715
[Abstract]
(720)
[HTML 1 KB]
[PDF 1327 KB]
(1257)
|
|
|
1702 |
YU Rujie, YANG Zhen, XIONG Huilin |
| |
|
Aircraft detection and recognition based on deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1702-1707
[Abstract]
(746)
[HTML 1 KB]
[PDF 1130 KB]
(996)
|
|
|
1692 |
ZHAI Xiyang, WANG Xiaodan, LEI Lei, WEI Xiaohui |
| |
|
Improved multi-class AdaBoost algorithm based on stagewise additive modeling using a multi-class exponential loss function |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1692-1696
[Abstract]
(684)
[HTML 1 KB]
[PDF 877 KB]
(607)
|
|
|
1680 |
XI Xi, ZHANG Fengqin, LI Xiaoqing, GUAN Hua, CHEN Guirong, WANG Mengfei |
| |
|
Linear kernel support vector machine based on dual random projection |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1680-1685
[Abstract]
(564)
[HTML 1 KB]
[PDF 809 KB]
(685)
|
|
|
1650 |
SU Zhida, ZHU Yuefei, LIU Long |
| |
|
Android malware application detection using deep learning |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1650-1656
[Abstract]
(1066)
[HTML 1 KB]
[PDF 1160 KB]
(1513)
|
|
|
1630 |
XIE Lixia, XU Weihua |
| |
|
Improved weight distribution method of vulnerability basic scoring index |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1630-1635
[Abstract]
(564)
[HTML 1 KB]
[PDF 896 KB]
(806)
|
|
|
1605 |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui |
| |
|
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1605-1608
[Abstract]
(748)
[HTML 1 KB]
[PDF 751 KB]
(597)
|
|
|
1574 |
LIU Bei, TAN Xinming, CAO Wenbin |
| |
|
Dynamic resource allocation strategy in Spark Streaming |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1574-1579
[Abstract]
(951)
[HTML 1 KB]
[PDF 982 KB]
(675)
|
|
|
1550 |
ZHANG Mingyang, CHEN Jian, WEN Yingyou, ZHAO Hong, WANG Yugang |
| |
|
Fingerprint matching indoor localization algorithm based on dynamic time warping distance for Wi-Fi network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1550-1554
[Abstract]
(851)
[HTML 1 KB]
[PDF 856 KB]
(750)
|
|
|
1539 |
WEI Mingdong, HE Xiaomin, XU Liang |
| |
|
Dynamic clustering target tracking based on energy optimization in wireless sensor networks |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1539-1544
[Abstract]
(639)
[HTML 1 KB]
[PDF 945 KB]
(592)
|
|
|
0 |
Kai FENG |
| |
|
Conditional strong matching preclusion for k-ary n-cubes |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(170)
[HTML 0 KB]
[PDF 278 KB]
(409)
|
|
|
1516 |
NAN Jingchang, ZHANG Yunxue, GAO Mingming |
| |
|
Adaptive bee colony algorithm combined with BFGS algorithm for microwave circuit harmonic balance analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1516-1520
[Abstract]
(631)
[HTML 1 KB]
[PDF 796 KB]
(579)
|
|
|
1503 |
WEI Hao, XU Qing |
| |
|
Redundant group based trajectory abstraction algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1503-1506
[Abstract]
(765)
[HTML 1 KB]
[PDF 638 KB]
(507)
|
|
|
1485 |
XIONG Ruiqi, MA Changxi |
| |
|
Robust vehicle route optimization for multi-depot hazardous materials transportation |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1485-1490
[Abstract]
(805)
[HTML 1 KB]
[PDF 1056 KB]
(625)
|
|
|
1460 |
LEI Lin, LI Lepeng, YANG Min, DONG Fangmin, SUN Shuifa |
| |
|
Non-stationary subtle motion magnification based on S transform |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1460-1465
[Abstract]
(741)
[HTML 1 KB]
[PDF 1009 KB]
(526)
|
|
|
1434 |
TAO Pan, FU Zhongliang, ZHU Kai, WANG Lili |
| |
|
Echocardiogram view recognition using deep convolutional neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1434-1438
[Abstract]
(803)
[HTML 1 KB]
[PDF 1056 KB]
(740)
|
|
|
1430 |
YANG Xuefeng, CHENG Yaoyu, WANG Gao |
| |
|
Super-resolution algorithm for remote sensing images based on compressive sensing in wavelet domain |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1430-1433
[Abstract]
(709)
[HTML 1 KB]
[PDF 856 KB]
(576)
|
|
|
1419 |
LIU Qiaoling, LI Jin, XIAO Renbin |
| |
|
Trend prediction of public opinion propagation based on parameter inversion — an empirical study on Sina micro-blog |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1419-1423
[Abstract]
(974)
[HTML 1 KB]
[PDF 790 KB]
(701)
|
|
|
1413 |
GAN Yanling, JIN Cong |
| |
|
Margin discriminant projection and its application in expression recognition |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1413-1418
[Abstract]
(626)
[HTML 1 KB]
[PDF 987 KB]
(544)
|
|
|
1407 |
SHI Qingwei, LIU Yushi, ZHANG Fengtian |
| |
|
Biterm topic evolution model of microblog |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1407-1412
[Abstract]
(850)
[HTML 1 KB]
[PDF 939 KB]
(634)
|
|
|
1347 |
LU Jintian, YAO Lili, HE Xudong, MENG Bo |
| |
|
Improvement of OpenID Connect protocol and its security analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1347-1352
[Abstract]
(1157)
[HTML 1 KB]
[PDF 1006 KB]
(664)
|
|
|
1326 |
WEI Chunling, WANG Bufei |
| |
|
Indoor activity-recognition based on received signal strength in WLAN |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1326-1330
[Abstract]
(815)
[HTML 1 KB]
[PDF 704 KB]
(659)
|
|
|
1321 |
HU Jing, ZHENG Wu |
| |
|
Proportional fairness and maximum weighted sum-rate in D2D communications underlaying cellular networks |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1321-1325
[Abstract]
(913)
[HTML 1 KB]
[PDF 752 KB]
(776)
|
|
|
1292 |
WU Congcong, HE Yichao, CHEN Yiying, LIU Xuejing, CAI Xiufeng |
| |
|
Mutated bat algorithm for solving discounted {0-1} knapsack problem |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1292-1299
[Abstract]
(661)
[HTML 1 KB]
[PDF 1156 KB]
(649)
|
|
|
1263 |
HAN Dezhi, CHEN Xuguang, LEI Yuxin, DAI Yongtao, ZHANG Xiao |
| |
|
Real-time data analysis system based on Spark Streaming and its application |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1263-1269
[Abstract]
(1253)
[HTML 1 KB]
[PDF 1159 KB]
(968)
|
|
|
1246 |
TANG Guofei, ZHOU Haifang, TAN Qingping |
| |
|
Design and implementation of space-borne parallel remote sensing image compression system based on multi-core DSP |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1246-1250
[Abstract]
(738)
[HTML 1 KB]
[PDF 774 KB]
(607)
|
|
|
1198 |
WANG Xuqiao, WANG Jinkun |
| |
|
Integrated indoor positioning algorithm based on D-S evidence theory |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1198-1201
[Abstract]
(709)
[HTML 1 KB]
[PDF 762 KB]
(677)
|
|
|
1185 |
FANG Yiguang, LIU Wu, ZHANG Ji, ZHANG Lingchen, YUAN Meigui, QU Lei |
| |
|
Learning based kernel image differential filter for face recognition |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1185-1188
[Abstract]
(599)
[HTML 1 KB]
[PDF 767 KB]
(582)
|
|
|
1179 |
LIANG Rui, ZHU Qingxin, LIAO Shujiao, NIU Xinzheng |
| |
|
Deep natural language description method for video based on multi-feature fusion |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1179-1184
[Abstract]
(684)
[HTML 1 KB]
[PDF 999 KB]
(687)
|
|
|
1169 |
LIN Jinyong, DENG Dexiang, YAN Jia, LIN Xiaoying |
| |
|
Self-adaptive group based sparse representation for image inpainting |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1169-1173
[Abstract]
(1108)
[HTML 1 KB]
[PDF 827 KB]
(934)
|
|
|
1149 |
LEI Bingbing, YAN Hua |
| |
|
Garbage collection algorithm for NAND flash memory based on logical region heat |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1149-1152
[Abstract]
(700)
[HTML 1 KB]
[PDF 808 KB]
(617)
|
|
|
1129 |
LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli |
| |
|
Benchmarks construction and evaluation for resource leak in Android apps |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1129-1134
[Abstract]
(613)
[HTML 1 KB]
[PDF 1015 KB]
(625)
|
|
|
1122 |
WANG Long, ZHANG Zheng, WANG Li |
| |
|
Improved extended Kalman filter for attitude estimation of quadrotor |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1122-1128
[Abstract]
(925)
[HTML 1 KB]
[PDF 1094 KB]
(715)
|
|
|
1083 |
ZHANG Yanan, SUN Shibao, ZHANG Jingshan, YIN Lihang, YAN Xiaolong |
| |
|
Opinion formation model of social network based on node intimacy and influence |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1083-1087
[Abstract]
(805)
[HTML 1 KB]
[PDF 778 KB]
(819)
|
|
|
1065 |
DENG Yang, ZHANG Chenxi, LI Jiangfeng |
| |
|
Video shot recommendation model based on emotion analysis using time-sync comments |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1065-1070
[Abstract]
(1220)
[HTML 1 KB]
[PDF 1074 KB]
(1138)
|
|
|
1044 |
ZHOU Shuangshuang, XU Jin'an, CHEN Yufeng, ZHANG Yujie |
| |
|
New words detection method for microblog text based on integrating of rules and statistics |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1044-1050
[Abstract]
(662)
[HTML 1 KB]
[PDF 1117 KB]
(728)
|
|
|
1038 |
WANG Xuerong, WAN Nianhong |
| |
|
Dynamic prediction model on export sales based on controllable relevance big data of cross-border e-commerce |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1038-1043
[Abstract]
(764)
[HTML 1 KB]
[PDF 1121 KB]
(764)
|
|
|
1014 |
ZHU Huijuan, JIANG Tonghai, ZHOU Xi, CHENG Li, ZHAO Fan, MA Bo |
| |
|
Data cleaning method based on dynamic configurable rules |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1014-1020
[Abstract]
(1025)
[HTML 1 KB]
[PDF 1069 KB]
(746)
|
|
|
1004 |
LIU Wei, WANG Yang, ZHENG Jianbin, ZHAN Enqi |
| |
|
Chinese signature authentication based on accelerometer |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1004-1007
[Abstract]
(706)
[HTML 1 KB]
[PDF 777 KB]
(565)
|
|
|
954 |
LI Yang, LI Qing, ZHANG Xia |
| |
|
Automatic protocol format signature construction algorithm based on discrete series protocol message |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 954-959
[Abstract]
(734)
[HTML 1 KB]
[PDF 1104 KB]
(693)
|
|
|
941 |
ZENG Qin, LI Yongsheng |
| |
|
Three dimensional strom tracking method based on distributed computing architecture |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (4): 941-944
[Abstract]
(787)
[HTML 1 KB]
[PDF 706 KB]
(616)
|
|
|
883 |
ZHOU Huizi, HU Xuemin, CHEN Long, TIAN Mei, XIONG Dou |
| |
|
Dynamic path planning for autonomous driving with avoidance of obstacles |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 883-888
[Abstract]
(1271)
[HTML 1 KB]
[PDF 1001 KB]
(1131)
|
|
|
876 |
LI Xiaolin, HUANG Shuang, LU Tao, LI Lin |
| |
|
Administrative division extracting algorithm for non-normalized Chinese addresses |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 876-882
[Abstract]
(1143)
[HTML 1 KB]
[PDF 1226 KB]
(617)
|
|
|
849 |
CHEN Benzhi, FANG Zhihong, XIA Yong, ZHANG Ling, LAN Shouren, WANG Lisheng |
| |
|
Automatic detection of blowholes defects in X-ray images of thick steel pipes |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 849-853
[Abstract]
(839)
[HTML 1 KB]
[PDF 866 KB]
(683)
|
|
|
844 |
XIAO Bing, WEI Xin, HU Wei, XIA Hongjian |
| |
|
Tooth segmentation algorithm based on segmentation of feature line |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 844-848
[Abstract]
(930)
[HTML 1 KB]
[PDF 916 KB]
(827)
|
|
|
827 |
ZHANG Jieyu |
| |
|
Binarization method with local threshold based on image blocks |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 827-831
[Abstract]
(1072)
[HTML 1 KB]
[PDF 889 KB]
(800)
|
|
|
786 |
FANG Ning, ZHOU Yu, YE Qingwei, LI Yugang |
| |
|
Modal parameter identification of vibration signal based on unsupervised learning convolutional neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 786-790
[Abstract]
(902)
[HTML 1 KB]
[PDF 905 KB]
(820)
|
|
|
760 |
LIN Kai, CHEN Guochu, ZHANG Xin |
| |
|
Multiple interactive artificial bee colony algorithm and its convergence analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 760-765
[Abstract]
(1282)
[HTML 1 KB]
[PDF 893 KB]
(572)
|
|
|
755 |
LI Zhen, ZHENG Xiangwei, ZHANG Hui |
| |
|
Virtual network embedding algorithm based on multi-objective particle swarm optimization |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 755-759
[Abstract]
(734)
[HTML 1 KB]
[PDF 940 KB]
(632)
|
|
|
736 |
ZHANG Zhaoxia, LIU Jie, ZHAO Yan, HU Xiu, YANG Lingzhen |
| |
|
Radar signal design based on nonlinear combination modulation of piecewise fitting |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 736-740
[Abstract]
(1857)
[HTML 1 KB]
[PDF 735 KB]
(533)
|
|
|
699 |
DING Pengli, LI Qingyong, ZHANG Zhen, LI Feng |
| |
|
Diabetic retinal image classification method based on deep neural network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 699-704
[Abstract]
(743)
[HTML 1 KB]
[PDF 1070 KB]
(718)
|
|
|
695 |
GUAN Feifan, YU Mei, SONG Yang, SHAO Hua, JIANG Gangyi |
| |
|
Objective quality assessment method of high dynamic range image |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 695-698
[Abstract]
(1176)
[HTML 1 KB]
[PDF 813 KB]
(904)
|
|
|
673 |
LIANG Shuang, ZHOU Lihua, YANG Peizhong |
| |
|
Query performance and data migration for social network database with shard strategy based on clustering analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 673-679
[Abstract]
(798)
[HTML 1 KB]
[PDF 1109 KB]
(474)
|
|
|
654 |
LI Fumin, TONG Lingling, DU Cuilan, LI Yangxi, ZHANG Yangsen |
| |
|
Weibo users credibility evaluation based on user relationships |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 654-659
[Abstract]
(792)
[HTML 1 KB]
[PDF 972 KB]
(502)
|
|
|
628 |
TANG Lizhe, FENG Dawei, LI Dongsheng, LI Rongchun, LIU Feng |
| |
|
Analysis of large-scale distributed machine learning systems: a case study on LDA |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (3): 628-634
[Abstract]
(1110)
[HTML 1 KB]
[PDF 1169 KB]
(749)
|
|
|
602 |
GUO Yuhan, ZHANG Meiqi, ZHOU Nan |
| |
|
Genetic algorithm with preference matrix for solving long-term carpooling problem |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 602-607
[Abstract]
(645)
[HTML 1 KB]
[PDF 918 KB]
(666)
|
|
|
587 |
PENG Xingxiong, XIAO Ruliang |
| |
|
Multi-fractal Web log simulation generation algorithm based on stable process |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 587-592
[Abstract]
(835)
[HTML 1 KB]
[PDF 939 KB]
(558)
|
|
|
569 |
HUANG Zhibiao, YAO Yu |
| |
|
Ultrasound image segmentation based on pixel clustering |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 569-573
[Abstract]
(920)
[HTML 1 KB]
[PDF 898 KB]
(756)
|
|
|
553 |
ZOU Weigang, ZHOU Zhihui, WANG Yang |
| |
|
Image inpainting algorithm based on non-subsampled contourlet transform |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 553-558
[Abstract]
(727)
[HTML 1 KB]
[PDF 1059 KB]
(659)
|
|
|
546 |
ZHOU Shangbo, WANG Liping, YIN Xuehui |
| |
|
Applications of fractional partial differential equations in image processing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 546-552
[Abstract]
(932)
[HTML 1 KB]
[PDF 1147 KB]
(936)
|
|
|
530 |
WANG Xiaobin, HUANG Jinjie, LIU Wenju |
| |
|
Traffic sign recognition based on optimized convolutional neural network architecture |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 530-534
[Abstract]
(699)
[HTML 1 KB]
[PDF 868 KB]
(1085)
|
|
|
512 |
FENG Shu |
| |
|
Unsupervised local feature learning for robust face recognition |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 512-516
[Abstract]
(822)
[HTML 1 KB]
[PDF 843 KB]
(684)
|
|
|
505 |
CHEN Qiuju, LI Ying |
| |
|
Sound recognition based on optimized orthogonal matching pursuit and deep belief network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 505-511
[Abstract]
(777)
[HTML 1 KB]
[PDF 1251 KB]
(656)
|
|
|
488 |
DENG Jingsong, LUO Yonglong, YU Qingying, CHEN Fulong |
| |
|
Privacy-preserving trajectory data publishing based on non-sensitive information analysis |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 488-493
[Abstract]
(732)
[HTML 1 KB]
[PDF 1003 KB]
(755)
|
|
|
463 |
XU Meiling, QIAO Ying, MO Yuchang, ZHONG Farong |
| |
|
Performance analysis of cluster computing systems using binary decision diagram |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 463-467
[Abstract]
(734)
[HTML 1 KB]
[PDF 869 KB]
(533)
|
|
|
445 |
FENG Huifang, WANG Junxia |
| |
|
Dynamic centrality analysis of vehicle Ad Hoc networks |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 445-449
[Abstract]
(755)
[HTML 1 KB]
[PDF 830 KB]
(549)
|
|
|
432 |
MA Yao, TIAN Ming, ZHAO Zhiwei, FAN Ruilong |
| |
|
Content delivery model based on polymorphic routing in named data networking |
| |
|
|
Journal of Computer Applications
0 Vol. (): 432-439
[Abstract]
(817)
[HTML 1 KB]
[PDF 1339 KB]
(696)
|
|
|
417 |
SUN Liang, CHEN Xiaochun, ZHENG Shujian, LIU Ying |
| |
|
Research and application for terminal location management system based on firmware |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 417-421
[Abstract]
(838)
[HTML 1 KB]
[PDF 848 KB]
(691)
|
|
|
408 |
FU Xixu, GONG Xizhang |
| |
|
Spreading activation method to encrypt data with images as references |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 408-411
[Abstract]
(825)
[HTML 1 KB]
[PDF 569 KB]
(566)
|
|
|
402 |
ZHANG Fan, ZHANG Cong, ZHAO Zemao, XU Mingdi |
| |
|
Secure instant-messaging method for mobile intelligent terminal |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 402-407
[Abstract]
(754)
[HTML 1 KB]
[PDF 1072 KB]
(686)
|
|
|
378 |
RONG Xing, ZHAO Yong |
| |
|
Trustworthiness attestation scheme for virtual machine based on certificateless ring signature |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 378-382
[Abstract]
(753)
[HTML 1 KB]
[PDF 784 KB]
(813)
|
|
|
367 |
LIU Yuanying, GUO Jingfeng, WEI Lidong, HU Xinzhuan |
| |
|
Fast influence maximization algorithm in social network under budget control |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 367-372
[Abstract]
(772)
[HTML 1 KB]
[PDF 878 KB]
(641)
|
|
|
329 |
QIN Qibing, TAN Long |
| |
|
Top-Rank-
k frequent patterns mining algorithm based on TCM prescription database |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (2): 329-334
[Abstract]
(914)
[HTML 1 KB]
[PDF 854 KB]
(620)
|
|
|
299 |
XING Zhiwei, TANG Yunxiao, LUO Qian |
| |
|
Dynamic estimation about service time of flight support based on Bayesian network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 299-304
[Abstract]
(718)
[HTML 1 KB]
[PDF 1004 KB]
(650)
|
|
|
244 |
SONG Chao, XU Xin, GUI Rong, XIE Xinfang, XU Feng |
| |
|
Polarimetric synthetic aperture radar feature analysis and classification based on multi-layer support vector machine classifier |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 244-250
[Abstract]
(682)
[HTML 1 KB]
[PDF 1250 KB]
(575)
|
|
|
233 |
HUANG Nian'e, HUANG He, WANG Rujing |
| |
|
Agriculture-related product name extraction and category labeling based on ontology and conditional random field |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 233-238
[Abstract]
(969)
[HTML 1 KB]
[PDF 940 KB]
(763)
|
|
|
217 |
XU Guoyu, WANG Yingfeng, MA Xiaofei, WANG Kefeng, YAN Ruoyu |
| |
|
Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 217-221
[Abstract]
(783)
[HTML 1 KB]
[PDF 708 KB]
(536)
|
|
|
188 |
WANG Qiang, ZHANG Peilin, WANG Huaiguang, YANG Wangcan, CHEN Yanlong |
| |
|
Survey on construction of measurement matrices in compressive sensing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 188-196
[Abstract]
(889)
[HTML 1 KB]
[PDF 1425 KB]
(1330)
|
|
|
183 |
SONG Yang, HUANG Zhiqing, ZHANG Yanxin, LI Mengjia |
| |
|
Dynamic sampling method for wireless sensor network based on compressive sensing |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 183-187
[Abstract]
(780)
[HTML 1 KB]
[PDF 948 KB]
(571)
|
|
|
120 |
TANG Zhanyong, LI Zhen, ZHANG Cong, GONG Xiaoqing, FANG Dingyi |
| |
|
Software protection method based on monitoring attack threats |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 120-127
[Abstract]
(637)
[HTML 1 KB]
[PDF 1263 KB]
(615)
|
|
|
114 |
ZHANG Jianxun, GU Zhimin |
| |
|
Real-time online evaluation method of helper thread prefetching quality |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 114-119
[Abstract]
(752)
[HTML 1 KB]
[PDF 1172 KB]
(424)
|
|
|
108 |
ZHANG Weixiang, QI Yuhua, LI Dezhi |
| |
|
Test case prioritization based on discrete particle swarm optimization algorithm |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 108-113
[Abstract]
(690)
[HTML 1 KB]
[PDF 1100 KB]
(685)
|
|
|
90 |
SONG Guozhi, WANG Cheng, TU Yao, ZHANG Dakun |
| |
|
Low power mapping based on improved genetic algorithm with Prim initial population selection for 3D network-on-chip |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 90-96
[Abstract]
(781)
[HTML 1 KB]
[PDF 1103 KB]
(543)
|
|
|
84 |
YANG Zhiwei, CHEN Haoliang, ZHANG Bo, WU Lijuan, WU Weigang |
| |
|
Data forwarding mechanism in software-defined vehicular Ad Hoc network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 84-89
[Abstract]
(856)
[HTML 1 KB]
[PDF 1090 KB]
(728)
|
|
|
79 |
HUANG Dan, HUANG Yan, HUAN Tian |
| |
|
Data forwarding strategy based on weak state in vehicular Ad Hoc network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 79-83
[Abstract]
(754)
[HTML 1 KB]
[PDF 964 KB]
(504)
|
|
|
73 |
DENG Jian, DONG Baihong, CAO Hui, WU Lijuan, ZHANG Bo, WU Weigang |
| |
|
Named data networking based data dissemination mechanism for vehicular Ad Hoc network |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 73-78
[Abstract]
(744)
[HTML 1 KB]
[PDF 917 KB]
(654)
|
|
|
65 |
BAO Wei, MAO Yingchi, WANG Longbao, CHEN Xiaoli |
| |
|
Moving target tracking scheme based on dynamic clustering |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 65-72
[Abstract]
(892)
[HTML 1 KB]
[PDF 1185 KB]
(590)
|
|
|
48 |
XU Guoyan, LUO Zhangxuan, SONG Jian, LYU Xin |
| |
|
Provenance graph query method based on double layer index structure |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 48-53
[Abstract]
(841)
[HTML 1 KB]
[PDF 858 KB]
(555)
|
|
|
42 |
HU Yuanyuan, XIE Jiang, ZHANG Wu |
| |
|
Solution of two dimensional incompressible Navier-Stokes equation by parallel spectral finite element method |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 42-47
[Abstract]
(832)
[HTML 1 KB]
[PDF 930 KB]
(894)
|
|
|
37 |
FU Chen, ZHONG Cheng, YE Bo |
| |
|
Accelerating parallel searching similar multiple patterns from data streams by using MapReduce |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 37-41
[Abstract]
(738)
[HTML 1 KB]
[PDF 941 KB]
(590)
|
|
|
24 |
MING Li, LI Tong, QIN Jianglong, ZHENG Ming, JIANG Xudong, XIE Zhongwen |
| |
|
SaaS-oriented modeling and analysis of load balancing strategy |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 24-30
[Abstract]
(763)
[HTML 1 KB]
[PDF 1177 KB]
(550)
|
|
|
6 |
YAUN Ying, WANG Cong, WANG Cuirong, SONG Xin, LYU Yanxia |
| |
|
Virtual network embedding algorithm for dynamic virtual network requests |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 6-11
[Abstract]
(774)
[HTML 1 KB]
[PDF 989 KB]
(865)
|
|
|
1 |
GAO Xianming, WANG Baosheng, LI Tongbiao, XUE Huawei |
| |
|
Design and implementation of resource management plane in virtual router platform |
| |
|
|
Journal of Computer Applications
2017 Vol.37 (1): 1-5
[Abstract]
(822)
[HTML 1 KB]
[PDF 1037 KB]
(818)
|
|
|
0 |
|
| |
|
Research on Dynamic Resource Allocation strategy in Spark Streaming |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(356)
[HTML 0 KB]
[PDF 0 KB]
(42)
|
|
|
0 |
|
| |
|
Research on Linear Kernel Support Vector Machine Based on Dual Random Projection |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(211)
[HTML 0 KB]
[PDF 0 KB]
(43)
|
|
|
0 |
|
| |
|
Echocardiogram View Recognition Using Deep Convolutional Neural Networks |
| |
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(667)
[HTML 0 KB]
[PDF 1253 KB]
(465)
|
|
|
3515 |
YUAN Guangjie, LI Xiaodong, JIANG Zhaoyi, YUAN Peng, GUO Zhiwei |
| |
|
Mobile terminal positioning method driven by road test data |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3515-3520
[Abstract]
(1061)
[HTML 1 KB]
[PDF 979 KB]
(398)
|
|
|
3476 |
PENG Xingxiong, XIAO Ruliang |
| |
|
Simulation generating algorithm of Web log based on user interest migration |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3476-3480
[Abstract]
(666)
[HTML 1 KB]
[PDF 864 KB]
(459)
|
|
|
3461 |
CHEN Zhuo, ZHANG Liping, WANG Chunhui |
| |
|
Clone genealogy extraction method based on software code evolution information |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3461-3467
[Abstract]
(918)
[HTML 1 KB]
[PDF 1115 KB]
(506)
|
|
|
3448 |
YU Hai, LI Bin, WANG Peixia, JIA Di, WANG Yongji |
| |
|
Source code comments quality assessment method based on aggregation of classification algorithms |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3448-3453
[Abstract]
(951)
[HTML 1 KB]
[PDF 1127 KB]
(700)
|
|
|
3442 |
RUAN Feng, ZHANG Hui, LI Xuanlun |
| |
|
Rapid displacement compensation method for liquid impurity detection images |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3442-3447
[Abstract]
(781)
[HTML 1 KB]
[PDF 1067 KB]
(411)
|
|
|
3436 |
TANG Hao, HE Chu |
| |
|
SAR image scene classification with fully convolutional network and modified conditional random field-recurrent neural network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3436-3441
[Abstract]
(995)
[HTML 1 KB]
[PDF 982 KB]
(686)
|
|
|
3429 |
QIAN Ying, LIAO Tingting |
| |
|
Cone-beam CT functional imaging method by using area integral model |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3429-3435
[Abstract]
(606)
[HTML 1 KB]
[PDF 1043 KB]
(505)
|
|
|
3423 |
CHENG Xiaoya, WANG Chunhong |
| |
|
Characterized dictionary-based low-rank representation for face recognition |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3423-3428
[Abstract]
(826)
[HTML 1 KB]
[PDF 876 KB]
(480)
|
|
|
3418 |
ZHANG Kuang, ZHU Yuanping |
| |
|
Text segmentation based on superpixel fusion |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3418-3422
[Abstract]
(855)
[HTML 1 KB]
[PDF 825 KB]
(461)
|
|
|
3411 |
WANG Haoran, XIA Kewen, REN Miaomiao, LI Chuo |
| |
|
Adaptive denoising method of hyperspectral remote sensing image based on PCA and dictionary learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3411-3417
[Abstract]
(946)
[HTML 1 KB]
[PDF 1265 KB]
(650)
|
|
|
3402 |
FANG Yiguang, LIU Wu, GAO Mengzhu, TAN Shoubiao, ZHANG Ji |
| |
|
Improved accurate image registration algorithm based on FREAK descriptor |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3402-3405
[Abstract]
(800)
[HTML 1 KB]
[PDF 806 KB]
(479)
|
|
|
3398 |
LI Yan, WANG Yaoli |
| |
|
Backtracking regularized stage-wised orthogonal matching pursuit algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3398-3401
[Abstract]
(1012)
[HTML 1 KB]
[PDF 596 KB]
(548)
|
|
|
3389 |
YU Yafeng, LIU Guangshuai, MA Ziheng, GAO Pan |
| |
|
Improved pairwise rotation invariant co-occurrence local binary pattern algorithm used for texture feature extraction |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3389-3393
[Abstract]
(761)
[HTML 1 KB]
[PDF 801 KB]
(505)
|
|
|
3378 |
LIU Weixiao |
| |
|
Hybrid intelligent model for fashion sales forecasting based on discrete grey forecasting model and artificial neural network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3378-3384
[Abstract]
(1370)
[HTML 1 KB]
[PDF 1039 KB]
(615)
|
|
|
3333 |
HUANG Bin, LU Jinjin, WANG Jianhua, WU Xingming, CHEN Weihai |
| |
|
Object recognition algorithm based on deep convolution neural networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3333-3340
[Abstract]
(1051)
[HTML 1 KB]
[PDF 1436 KB]
(1504)
|
|
|
3311 |
LIU Mei, ZHANG Yongbin, RAN Chongshan, SUN Lianshan |
| |
|
Mechanism of parked domain recognition based on authoritative domain name servers |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3311-3316
[Abstract]
(829)
[HTML 1 KB]
[PDF 897 KB]
(540)
|
|
|
3285 |
LIN Yang, JIANG Yu'e, LIN Jie |
| |
|
Local similarity detection algorithm for time series based on distributed architecture |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3285-3291
[Abstract]
(789)
[HTML 1 KB]
[PDF 1125 KB]
(547)
|
|
|
3269 |
LIU Dafu, SU Yang, XIE Hong'an, YANG Kai |
| |
|
Analysis of evolutionary game on client's evaluation strategy selection in e-commerce |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3269-3273
[Abstract]
(1415)
[HTML 1 KB]
[PDF 746 KB]
(541)
|
|
|
3262 |
HUANG Guangqiu, HE Tong, LU Qiuqin |
| |
|
System dynamics relevancy analysis model based on stochastic function Petri-net |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3262-3268
[Abstract]
(765)
[HTML 1 KB]
[PDF 1046 KB]
(585)
|
|
|
3256 |
HUANG Chengbing, TANG Gang, WANG Bo |
| |
|
Non-orthogonal network coding for complex field distributed detection based on super node MAC relay |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3256-3261
[Abstract]
(808)
[HTML 1 KB]
[PDF 991 KB]
(519)
|
|
|
3244 |
GUAN Zhiyan, FENG Xiufang |
| |
|
Coverage algorithm based on differential evolution and mixed virtual force for directional sensor networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3244-3250
[Abstract]
(746)
[HTML 1 KB]
[PDF 1073 KB]
(992)
|
|
|
3222 |
ZHANG Yang, ZHAO Xiaoqun, WANG Digang |
| |
|
Chinese speech segmentation into syllables based on energies in different times and frequencies |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3222-3228
[Abstract]
(763)
[HTML 1 KB]
[PDF 1015 KB]
(630)
|
|
|
3217 |
YANG Fan, CAI Chao |
| |
|
Significant visual attention method guided by object-level features |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3217-3221
[Abstract]
(871)
[HTML 1 KB]
[PDF 1006 KB]
(594)
|
|
|
3188 |
BIAN Le, HUO Guanying, LI Qingwu |
| |
|
Multi-threshold MRI image segmentation algorithm based on Curevelet transformation and multi-objective particle swarm optimization |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3188-3195
[Abstract]
(701)
[HTML 1 KB]
[PDF 1337 KB]
(568)
|
|
|
3161 |
YAN Mengdi, QIN Linlin, WU Gang |
| |
|
File type detection algorithm based on principal component analysis and
K nearest neighbors |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3161-3164
[Abstract]
(734)
[HTML 1 KB]
[PDF 583 KB]
(677)
|
|
|
3146 |
FENG Yanhong, YU Hong, SUN Geng, ZHAO Yujin |
| |
|
Domain-specific term recognition method based on word embedding and conditional random field |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3146-3151
[Abstract]
(818)
[HTML 1 KB]
[PDF 982 KB]
(797)
|
|
|
3136 |
YANG Jie, GAO Hong, LIU Tao, LIU Wei |
| |
|
Integrated berth and quay-crane scheduling based on improved genetic algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3136-3140
[Abstract]
(723)
[HTML 1 KB]
[PDF 771 KB]
(657)
|
|
|
3131 |
YU Shunkun, YAN Hongxu |
| |
|
Evaluation model based on dual-threshold constrained tolerance dominance relation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3131-3135
[Abstract]
(733)
[HTML 1 KB]
[PDF 831 KB]
(463)
|
|
|
3127 |
SHEN Li, LI Jie, ZHU Huayong |
| |
|
Task coordination and workload balance method for multi-robot based on trading-tree |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3127-3130
[Abstract]
(702)
[HTML 1 KB]
[PDF 765 KB]
(637)
|
|
|
3098 |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong |
| |
|
Partially blind signature scheme with ID-based server-aided verification |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3098-3102
[Abstract]
(718)
[HTML 1 KB]
[PDF 704 KB]
(567)
|
|
|
3093 |
TANG Yan, LYU Guonian, ZHANG Hong |
| |
|
Advanced marking scheme algorithm based on multidimensional pseudo-random sequences |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3093-3097
[Abstract]
(680)
[HTML 1 KB]
[PDF 946 KB]
(636)
|
|
|
3050 |
MA Junfeng, WANG Yan |
| |
|
Efficient file management system based on cloud instances in smartphone |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3050-3054
[Abstract]
(665)
[HTML 1 KB]
[PDF 1004 KB]
(646)
|
|
|
3033 |
XIE Bin, YANG Liqing, CHEN Qin |
| |
|
Improved adaptive linear minimum mean square error channel estimation algorithm in discrete wavelet transform domain based on empirical mode decomposition-singular value decomposition difference spectrum |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3033-3038
[Abstract]
(782)
[HTML 1 KB]
[PDF 948 KB]
(611)
|
|
|
2974 |
BAI Xiaohong, WEN Jing, ZHAO Xue, CHEN Jinguang |
| |
|
target tracking algorithm based on the speeded up robust features and multi-instance learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (11): 2974-2978
[Abstract]
(755)
[HTML 1 KB]
[PDF 797 KB]
(511)
|
|
|
2933 |
YE Weidong, YANG Tao |
| |
|
Single-channel vibration signal blind source separation by combining extreme-point symmetric mode decomposition with time-frequency analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2933-2939
[Abstract]
(595)
[HTML 0 KB]
[PDF 1014 KB]
(568)
|
|
|
2927 |
WANG Sixiu, XU Zhou, WANG Xiaojie, WANG Jianghua |
| |
|
Whole parameters estimation for linear frequency modulation pulse based on partial correlationtle |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2927-2932
[Abstract]
(633)
[HTML 0 KB]
[PDF 877 KB]
(545)
|
|
|
2922 |
JIA Yulan, HUO Zhanqiang, HOU Zhanwei, WANG Zhiheng |
| |
|
Automatic positioning and detection method for jewelry based on principal component analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2922-2926
[Abstract]
(576)
[HTML 0 KB]
[PDF 739 KB]
(532)
|
|
|
2916 |
HE Lin, ZHANG Quan, SHANGGUAN Hong, ZHANG Wen, ZHANG Pengcheng, LIU Yi, GUI Zhiguo |
| |
|
Statistical iterative algorithm based on adaptive weighted total variation for low-dose CT |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2916-2921
[Abstract]
(622)
[HTML 0 KB]
[PDF 888 KB]
(564)
|
|
|
2900 |
FENG Aijing, XIAO Deqin |
| |
|
Motion parameter extraction algorithm for pigs under natural conditions |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2900-2906
[Abstract]
(434)
[HTML 0 KB]
[PDF 1164 KB]
(581)
|
|
|
2895 |
GAN Lan, ZHANG Yonghuan |
| |
|
Regularized robust coding for tumor cell image recognition based on dictionary learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2895-2899
[Abstract]
(572)
[HTML 0 KB]
[PDF 928 KB]
(543)
|
|
|
2885 |
SHANG Changjun, DING Rui |
| |
|
Gesture feature extraction of depth image based on curvature and local binary pattern |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2885-2889
[Abstract]
(658)
[HTML 0 KB]
[PDF 956 KB]
(615)
|
|
|
2875 |
WANG Peiyao, CAO Jiangtao, JI Xiaofei |
| |
|
Two-person interaction recognition based on improved spatio-temporal interest points |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2875-2879
[Abstract]
(532)
[HTML 0 KB]
[PDF 972 KB]
(567)
|
|
|
2849 |
WANG Hanguang, WANG Xuguang, WANG Haoyuan |
| |
|
Multi-channel real-time video stitching based on circular region of interest |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2849-2853
[Abstract]
(767)
[HTML 0 KB]
[PDF 909 KB]
(549)
|
|
|
2842 |
WEN Peizhi, ZHU Likun, HUANG Jia |
| |
|
Realistic real-time rendering method for translucent three-dimensional objects |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2842-2848
[Abstract]
(697)
[HTML 0 KB]
[PDF 1158 KB]
(633)
|
|
|
2811 |
TANG Yang, ZENG Fanping, WANG Jiankang, HUANG Xinyi |
| |
|
Android GUI traversal method based on static analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2811-2815
[Abstract]
(636)
[HTML 0 KB]
[PDF 759 KB]
(601)
|
|
|
2794 |
LIU Chunli, LI Xiaoge, LIU Rui, FAN Xian, DU Liping |
| |
|
Chinese word segment based on character representation learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2794-2798
[Abstract]
(745)
[HTML 1 KB]
[PDF 754 KB]
(736)
|
|
|
2767 |
LI Xueming, ZHANG Chaoyang, SHE Weijun |
| |
|
Review helpfulness based on opinion support of user discussion |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2767-2771
[Abstract]
(544)
[HTML 1 KB]
[PDF 941 KB]
(921)
|
|
|
2758 |
ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong |
| |
|
Improved certificate-based aggregate proxy signature scheme |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2758-2761
[Abstract]
(539)
[HTML 1 KB]
[PDF 708 KB]
(547)
|
|
|
2742 |
ABDURAHMAN Kadir, MIREGULI Aili, MUTALLIP Sattar |
| |
|
Adaptive asynchronous and anti-noise secure communication scheme based on hyper-chaotic Lorenz system |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2742-2746
[Abstract]
(618)
[HTML 1 KB]
[PDF 670 KB]
(461)
|
|
|
2738 |
WANG Xiong, DENG Lunzhi |
| |
|
Provably secure undeniable signature scheme based on identity |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2738-2741
[Abstract]
(631)
[HTML 1 KB]
[PDF 749 KB]
(603)
|
|
|
2704 |
LU Haoyang, CHEN Shiping |
| |
|
Resource allocation framework based on cloud computing package cluster mapping |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2704-2709
[Abstract]
(1485)
[HTML 1 KB]
[PDF 914 KB]
(560)
|
|
|
2647 |
WANG Jun, YANG Yang, CHENG Yong |
| |
|
Data preprocessing based recovery model in wireless meteorological sensor network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2647-2652
[Abstract]
(815)
[HTML 1 KB]
[PDF 1082 KB]
(904)
|
|
|
2642 |
LUO Qi, HAN Hua, GONG Jiangtao, WANG Haijun |
| |
|
Random matrix denoising method based on Monte Carlo simulation as amended |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2642-2646
[Abstract]
(651)
[HTML 1 KB]
[PDF 708 KB]
(316)
|
|
|
2620 |
LI Zhongxun, HUA Jinzhi, LIU Zhen, ZHENG Jianbin |
| |
|
Comprehensive evaluation on merchants based on G1 method improved by composite power function |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2620-2625
[Abstract]
(710)
[HTML 1 KB]
[PDF 911 KB]
(392)
|
|
|
2609 |
QIN Chuxiong, ZHANG Lianhai |
| |
|
Acoustic modeling approach of multi-stream feature incorporated convolutional neural network for low-resource speech recognition |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2609-2615
[Abstract]
(804)
[HTML 1 KB]
[PDF 1145 KB]
(461)
|
|
|
2605 |
WU Xi, XU Qing, BU Hongjuan, WANG Zheng |
| |
|
Metropolis ray tracing based integrated filter |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2605-2608
[Abstract]
(508)
[HTML 1 KB]
[PDF 658 KB]
(280)
|
|
|
2601 |
LI Weiwei, MEI Xue, ZHOU Yu |
| |
|
fMRI time series stepwise denoising based on wavelet transform |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2601-2604
[Abstract]
(583)
[HTML 1 KB]
[PDF 734 KB]
(312)
|
|
|
2597 |
ZHANG Gengning, WANG Jiabao, LI Yang, MIAO Zhuang, ZHANG Yafei, LI Hang |
| |
|
Person re-identification based on feature fusion and kernel local Fisher discriminant analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2597-2600
[Abstract]
(815)
[HTML 1 KB]
[PDF 785 KB]
(349)
|
|
|
2590 |
MA Zhiqiang, LI Haisheng |
| |
|
Fast and effective compression for 3D dynamic scene based on KD-tree division |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2590-2596
[Abstract]
(707)
[HTML 1 KB]
[PDF 1150 KB]
(294)
|
|
|
2540 |
TANG Deyou, ZHOU Zilin |
| |
|
No-fit-polygon-based heuristic nesting algorithm for irregular shapes |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2540-2544
[Abstract]
(914)
[HTML 1 KB]
[PDF 778 KB]
(391)
|
|
|
2526 |
LI Yan, ZHANG Bowen, HAO Hongwei |
| |
|
Query expansion with semantic vector representation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2526-2530
[Abstract]
(683)
[HTML 1 KB]
[PDF 905 KB]
(322)
|
|
|
2508 |
LI Yandong, HAO Zongbo, LEI Hang |
| |
|
Survey of convolutional neural network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2508-2515
[Abstract]
(6742)
[HTML 1 KB]
[PDF 1569 KB]
(17899)
|
|
|
2486 |
ZHANG Lei, ZHU Yixin, XU Chun, YU Kai |
| |
|
Software defect detection algorithm based on dictionary learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2486-2491
[Abstract]
(585)
[HTML 1 KB]
[PDF 881 KB]
(375)
|
|
|
2481 |
ZHAO Di, HUA Baojian, ZHU Hongjun |
| |
|
Design and implementation of performance comparing frame for higher-order code elimination |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2481-2485
[Abstract]
(635)
[HTML 1 KB]
[PDF 713 KB]
(357)
|
|
|
2475 |
JIN Yan, PENG Xinguang |
| |
|
Composite classification model learned on multiple isolated subdomains for imbalanced class |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2475-2480
[Abstract]
(688)
[HTML 1 KB]
[PDF 878 KB]
(253)
|
|
|
2452 |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang |
| |
|
Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2452-2458
[Abstract]
(638)
[HTML 1 KB]
[PDF 1002 KB]
(326)
|
|
|
2447 |
XIE Hong'an, LI Dong, SU Yang, YANG Kai |
| |
|
Trusted network management model based on clustering analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2447-2451
[Abstract]
(734)
[HTML 1 KB]
[PDF 936 KB]
(401)
|
|
|
2427 |
XIAO Mansheng, XIAO Zhe |
| |
|
Improvement of penalty factor in suppressed fuzzy C-means clustering |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2427-2431
[Abstract]
(612)
[HTML 1 KB]
[PDF 795 KB]
(314)
|
|
|
2409 |
YUAN Bin, LI Wenwei |
| |
|
Design and implementation of QoE measuring tool for personal cloud storage services |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2409-2415
[Abstract]
(639)
[HTML 1 KB]
[PDF 1117 KB]
(305)
|
|
|
2402 |
WANG Yuefei, YU Jiong, LU Liang |
| |
|
Coordinator selection strategy based on RAMCloud |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2402-2408
[Abstract]
(465)
[HTML 1 KB]
[PDF 1102 KB]
(312)
|
|
|
2396 |
DENG Li, YAO Li, JIN Yu |
| |
|
Dynamic resource configuration based on multi-objective optimization in cloud computing |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2396-2401
[Abstract]
(722)
[HTML 1 KB]
[PDF 1092 KB]
(487)
|
|
|
2390 |
HE Jie, XIAO Kun |
| |
|
Performance analysis of OSTBC-MIMO systems over i.n.i.d. generalized-K fading channels |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2390-2395
[Abstract]
(724)
[HTML 1 KB]
[PDF 783 KB]
(476)
|
|
|
2386 |
WANG Shanshan, LENG Supeng |
| |
|
Friend recommendation method for mobile social networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2386-2389
[Abstract]
(664)
[HTML 1 KB]
[PDF 771 KB]
(381)
|
|
|
2374 |
HAO Jing, DU Taihang, JIANG Chundong, SUN Shuguang, FU Chao |
| |
|
Application of parameter-tuning stochastic resonance for detecting weak signal with ultrahigh frequency |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2374-2380
[Abstract]
(920)
[HTML 1 KB]
[PDF 1141 KB]
(469)
|
|
|
2362 |
WANG Changzheng, MAO Jianlin, FU Lixa, GUO Ning, QU Weixian |
| |
|
Coverage optimization algorithm for three-dimensional directional heterogeneous sensor network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2362-2366
[Abstract]
(702)
[HTML 1 KB]
[PDF 913 KB]
(538)
|
|
|
2357 |
WANG Renqun, PENG Li |
| |
|
Topology-aware congestion control algorithm in data center network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2357-2361
[Abstract]
(886)
[HTML 1 KB]
[PDF 819 KB]
(720)
|
|
|
2335 |
ZHANG Guangsheng, LIU Wei |
| |
|
Coordinating emergency task allocation of logistics service supply chain under time-to-service |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2335-2339
[Abstract]
(509)
[HTML 0 KB]
[PDF 825 KB]
(459)
|
|
|
2327 |
ZHANG Jianfa, ZHANG Fengfeng, SUN Lining, KUANG Shaolong |
| |
|
Camera calibration method of surgical navigation based on C-arm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2327-2331
[Abstract]
(898)
[HTML 0 KB]
[PDF 756 KB]
(644)
|
|
|
2306 |
HE Wei, QI Qi, ZHANG Guoyun, WU Jianhui |
| |
|
Moving object detection method based on multi-information dynamic fusion |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2306-2310
[Abstract]
(582)
[HTML 0 KB]
[PDF 843 KB]
(422)
|
|
|
2292 |
HUANG Xiaodong, SUN Liang |
| |
|
Retrieval method of images based on robust Cosine-Euclidean metric dimensionality reduction |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2292-2295
[Abstract]
(593)
[HTML 0 KB]
[PDF 766 KB]
(498)
|
|
|
2252 |
TENG Fei, ZHENG Chaomei, LI Wen |
| |
|
Multidimensional topic model for oriented sentiment analysis based on long short-term memory |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2252-2256
[Abstract]
(948)
[HTML 0 KB]
[PDF 784 KB]
(869)
|
|
|
2219 |
ZENG Xiaofei, LU Jianzhu, WANG Jie |
| |
|
Broadcast authentication using cooperative sensor nodes |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2219-2224
[Abstract]
(1558)
[HTML 0 KB]
[PDF 966 KB]
(396)
|
|
|
2207 |
YANG Wanchun, ZHANG Chenxi, MU Bin |
| |
|
Optimal QoS-aware service selection approach considering semantics and transactional properties |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2207-2212
[Abstract]
(1727)
[HTML 0 KB]
[PDF 875 KB]
(416)
|
|
|
2197 |
LI Wenjie, YANG Tao, MEI Yanying |
| |
|
Two-dimensional direction-of-arrival estimation based on sparse representation of reduced covariance matrix |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2197-2201
[Abstract]
(572)
[HTML 0 KB]
[PDF 726 KB]
(435)
|
|
|
2192 |
WANG Youguo, DONG Hongcheng, LIU Jian |
| |
|
Using noise to improve information transmission in optimal matching array stochastic resonance system |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2192-2196
[Abstract]
(585)
[HTML 0 KB]
[PDF 771 KB]
(367)
|
|
|
2170 |
LIU Xing, ZHANG Hao, XU Lingwei |
| |
|
Beamforming based localization algorithm in 60GHz wireless local area networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2170-2174
[Abstract]
(530)
[HTML 0 KB]
[PDF 731 KB]
(433)
|
|
|
2163 |
DUAN Ruijie, YAO Fuqiang, LI Yonggui, GUO Pengcheng |
| |
|
Dynamic spectrum allocation algorithm of HF radio access network based on intelligent frequency hopping |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2163-2169
[Abstract]
(545)
[HTML 0 KB]
[PDF 1127 KB]
(489)
|
|
|
2157 |
LIU Baojian, ZHANG Xiaoyi, LI Qing |
| |
|
Evolutionary game theory based clustering algorithm for multi-target localization in wireless sensor network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2157-2162
[Abstract]
(565)
[HTML 0 KB]
[PDF 952 KB]
(522)
|
|
|
2144 |
GAO Panpan, WANG Ning, ZHOU Xuezhong, LIU Guangming, WANG Huixin |
| |
|
Functional homogeneity analysis on topology module of human interaction network for disease classification |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2144-2149
[Abstract]
(702)
[HTML 0 KB]
[PDF 1006 KB]
(440)
|
|
|
2128 |
LIU Xi, ZHANG Xiaolu, ZHANG Xuejie |
| |
|
Fair allocation of multi-dimensional resources based on intelligent optimization algorithm in heterogeneous cloud environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2128-2133
[Abstract]
(620)
[HTML 1 KB]
[PDF 1014 KB]
(508)
|
|
|
2121 |
WANG Yingjie, CAI Zhipeng, TONG Xiangrong, PAN Qingxian, GAO Yang, YIN Guisheng |
| |
|
Online incentive mechanism based on reputation for mobile crowdsourcing system |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2121-2127
[Abstract]
(1765)
[HTML 1 KB]
[PDF 1144 KB]
(779)
|
|
|
2114 |
HAO Zhifeng, CHEN Wei, CAI Ruichu, HUANG Ruihui, WEN Wen, WANG Lijuan |
| |
|
Performance optimization of wireless network based on canonical causal inference algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2114-2120
[Abstract]
(839)
[HTML 1 KB]
[PDF 1089 KB]
(742)
|
|
|
2092 |
XIN Guanlin, LIU Jinglei |
| |
|
Mining Ceteris Paribus preference from preference database |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2092-2098
[Abstract]
(518)
[HTML 1 KB]
[PDF 1198 KB]
(557)
|
|
|
2087 |
HU Weijian, TENG Fei, LI Lingfang, WANG Huan |
| |
|
Improved adaptive collaborative filtering algorithm to change of user interest |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2087-2091
[Abstract]
(603)
[HTML 1 KB]
[PDF 767 KB]
(456)
|
|
|
2076 |
WEN Wen, WU Biao, CAI Ruichu, HAO Zhifeng, WANG Lijuan |
| |
|
Emotion classification for news readers based on multi-category semantic word clusters |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2076-2081
[Abstract]
(788)
[HTML 1 KB]
[PDF 966 KB]
(616)
|
|
|
2066 |
YANG Huihua, WANG Ke, LI Lingqiao, WEI Wen, HE Shengtao |
| |
|
K-means clustering algorithm based on adaptive cuckoo search and its application |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2066-2070
[Abstract]
(797)
[HTML 1 KB]
[PDF 803 KB]
(828)
|
|
|
2056 |
ZHANG Wenying, HE Kunjin, ZHANG Rongli, LIU Yuxing |
| |
|
3-D visualization and information management system design based on open scene graph |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 2056-2060
[Abstract]
(699)
[HTML 0 KB]
[PDF 830 KB]
(336)
|
|
|
2021 |
ZHANG Jiujie, ZHAI Ye, WANG Chunhui, ZHANG Liping, LIU Dongsheng |
| |
|
Evolution pattern recognition and genealogy construction based on clone mapping of versions |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 2021-2030
[Abstract]
(615)
[HTML 1 KB]
[PDF 1721 KB]
(374)
|
|
|
1993 |
MA Youzhong, JIA Shijie, ZHANG Yongxin |
| |
|
Chi-square distribution based similarity join query algorithm on high-dimensional data |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1993-1997
[Abstract]
(758)
[HTML 1 KB]
[PDF 829 KB]
(370)
|
|
|
1981 |
LI Bin, DI Lan, WANG Shaohua, YU Xiaotong |
| |
|
Clustering algorithm with maximum distance between clusters based on improved kernel fuzzy C-means |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1981-1987
[Abstract]
(497)
[HTML 1 KB]
[PDF 886 KB]
(385)
|
|
|
1965 |
DU Kun, TAN Taizhe |
| |
|
General method for gesture recognition in complex environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1965-1970
[Abstract]
(1209)
[HTML 1 KB]
[PDF 948 KB]
(385)
|
|
|
1904 |
SONG Tao, WANG Xing |
| |
|
Customer behavior prediction for card consumption based on two-step clustering and hidden Markov chain |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1904-1908
[Abstract]
(524)
[HTML 1 KB]
[PDF 786 KB]
(335)
|
|
|
1899 |
LU Xiaoyong, CHEN Musheng, WU Jhenglong, CHANG Peichan |
| |
|
Web spam detection based on immune clonal feature selection and under-sampling ensemble |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1899-1903
[Abstract]
(711)
[HTML 1 KB]
[PDF 808 KB]
(316)
|
|
|
1870 |
WANG Xingfu, CHEN Jing, WANG Lin |
| |
|
Mutation fruit fly optimization algorithm based on adaptive dynamic step size |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1870-1874
[Abstract]
(559)
[HTML 1 KB]
[PDF 768 KB]
(355)
|
|
|
1866 |
JIANG Tiejin, REN Yanli |
| |
|
Secure outsourcing algorithm of bilinear pairings with single server |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1866-1869
[Abstract]
(538)
[HTML 1 KB]
[PDF 546 KB]
(386)
|
|
|
1861 |
SUN Yiru, LIANG Xiangqian, SHANG Yufang |
| |
|
Identity based ring signature scheme in ideal lattice |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1861-1865
[Abstract]
(572)
[HTML 1 KB]
[PDF 889 KB]
(475)
|
|
|
1816 |
ZHANG Xinpeng, XU Chunxiang, ZHANG Xinyan, SAI Wei, HAN Xingyang, LIU Guoping |
| |
|
Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1816-1821
[Abstract]
(658)
[HTML 1 KB]
[PDF 927 KB]
(422)
|
|
|
1811 |
GAO Chao, ZHENG Xiaomei, JIA Xiaoqi |
| |
|
Diversified malware detection framework toward cloud platform |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1811-1815
[Abstract]
(584)
[HTML 1 KB]
[PDF 949 KB]
(388)
|
|
|
1789 |
FENG Huifang, LI Caihong |
| |
|
Invulnerability analysis of vehicular Ad Hoc network based on complex network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1789-1792
[Abstract]
(628)
[HTML 1 KB]
[PDF 791 KB]
(368)
|
|
|
1724 |
HE Chuanyang, WANG Ping, ZHANG Xiaohua, SONG Danni |
| |
|
Abnormal behavior detection of small and medium crowd based on intelligent video surveillance |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1724-1729
[Abstract]
(834)
[HTML 1 KB]
[PDF 905 KB]
(816)
|
|
|
1719 |
PAN Lei, ZHOU Huan, WANG Minghui |
| |
|
Real-time detection method of abnormal event in crowds |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1719-1723
[Abstract]
(722)
[HTML 1 KB]
[PDF 735 KB]
(484)
|
|
|
1673 |
LI Na, ZHOU Pengbo, GENG Guohua, JIA Hui |
| |
|
Quality evaluation method for color restoration image |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1673-1676
[Abstract]
(644)
[HTML 1 KB]
[PDF 645 KB]
(435)
|
|
|
1654 |
LI Xin, CUI Ziguan, SUN Linhui, ZHU Xiuchang |
| |
|
Image super-resolution reconstruction based on local regression model |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1654-1658
[Abstract]
(715)
[HTML 1 KB]
[PDF 798 KB]
(378)
|
|
|
1650 |
LUO Bo, LI Tao, WANG Jie |
| |
|
Tracking mechanism of service provenance based on graph |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1650-1653
[Abstract]
(524)
[HTML 1 KB]
[PDF 691 KB]
(352)
|
|
|
1639 |
CHEN Mingwei, SUN Lihua, XU Jianfeng |
| |
|
Temporal similarity algorithm of coarse-granularity based dynamic time warping |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1639-1644
[Abstract]
(614)
[HTML 1 KB]
[PDF 974 KB]
(460)
|
|
|
1613 |
SU Ying, ZHANG Yong, HU Po, TU Xinhui |
| |
|
Sentiment analysis research based on combination of naive Bayes and latent Dirichlet allocation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1613-1618
[Abstract]
(749)
[HTML 1 KB]
[PDF 947 KB]
(738)
|
|
|
1605 |
CHEN Xue, HU Xiaofeng, XU Hao |
| |
|
Burst-event evolution process expression based on short-text |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1605-1612
[Abstract]
(629)
[HTML 1 KB]
[PDF 1215 KB]
(504)
|
|
|
1567 |
MAN Yujia, YIN Qing, ZHU Xiaodong |
| |
|
Fine-grained data randomization technique based on field-sensitive pointer analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1567-1572
[Abstract]
(571)
[HTML 1 KB]
[PDF 842 KB]
(461)
|
|
|
1558 |
LIU Jianhua, MAO Kefei, HU Junwei |
| |
|
Certificateless aggregate signcryption scheme based on bilinear pairings |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1558-1562
[Abstract]
(681)
[HTML 1 KB]
[PDF 763 KB]
(515)
|
|
|
1538 |
ZHANG Jing, LI Xiaopeng, WANG Hengjun, LI Junquan, YU Bin |
| |
|
Real-time alert correlation approach based on attack planning graph |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1538-1543
[Abstract]
(596)
[HTML 1 KB]
[PDF 840 KB]
(371)
|
|
|
1510 |
WANG Feng, LI Lixin, CAO Jingyuan, PAN Cong |
| |
|
Research on replication consistency of cache in publish/subscribe systems |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1510-1514
[Abstract]
(510)
[HTML 1 KB]
[PDF 804 KB]
(388)
|
|
|
1496 |
OU Zhengbao, GUO Chengjun |
| |
|
Unambiguous capture model for binary offset carrier modulated signals based on correlation function |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1496-1501
[Abstract]
(777)
[HTML 1 KB]
[PDF 738 KB]
(453)
|
|
|
1486 |
LIU Xiankai |
| |
|
Establishment of virtual chain network in ZigBee network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1486-1491
[Abstract]
(752)
[HTML 1 KB]
[PDF 850 KB]
(458)
|
|
|
1469 |
MENG Tangyu, PU Jiantao, FANG Jianjun, LIANG Lanzhen |
| |
|
Synchronization estimation algorithm for attitude algorithm and external force acceleration |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1469-1474
[Abstract]
(639)
[HTML 1 KB]
[PDF 871 KB]
(1240)
|
|
|
1464 |
ZHANG Minlong, WANG Tao, WANG Xuping, CHANG Hongwei, WANG Fang |
| |
|
Step dynamic auto-regression kernel principal component analysis and its application in fault diagnosis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1464-1468
[Abstract]
(553)
[HTML 1 KB]
[PDF 731 KB]
(485)
|
|
|
1430 |
WANG Jinyang, YAN Hua |
| |
|
Wear-leveling algorithm for NAND flash memory based on separation of hot and cold logic pages |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1430-1433
[Abstract]
(598)
[HTML 1 KB]
[PDF 671 KB]
(624)
|
|
|
1410 |
ZHANG Yang, ZHAO Xiaoqun, WANG Digang |
| |
|
Chinese speech segmentation method based on Gauss distribution of time spans of syllables |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1410-1414
[Abstract]
(850)
[HTML 1 KB]
[PDF 957 KB]
(487)
|
|
|
1394 |
MO Jianwen, ZENG Ermeng, ZHANG Tong, YUAN Hua |
| |
|
Super-resolution reconstruction based on multi-dictionary learning and image patches mapping |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1394-1398
[Abstract]
(659)
[HTML 1 KB]
[PDF 960 KB]
(519)
|
|
|
1387 |
LI Hua, WANG Xuyang, YANG Huamin, HAN Cheng |
| |
|
Illumination direction measurement based on halo analysis in high-dynamic range images |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1387-1393
[Abstract]
(507)
[HTML 1 KB]
[PDF 1084 KB]
(469)
|
|
|
1383 |
YANG Wenhao, LI Xiaoman |
| |
|
Single Gaussian model for background using block-based gradient and linear prediction |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1383-1386
[Abstract]
(678)
[HTML 1 KB]
[PDF 642 KB]
(482)
|
|
|
1341 |
LIU Jiao, MA Di, MA Tengbo, ZHANG Wei |
| |
|
Dynamic multi-species particle swarm optimization based on food chain mechanism |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1341-1346
[Abstract]
(651)
[HTML 1 KB]
[PDF 856 KB]
(595)
|
|
|
1319 |
GENG Huantong, LI Huijian, ZHAO Yaguang, CHEN Zhengpeng |
| |
|
Improved NSGA-Ⅱ algorithm based on adaptive hybrid non-dominated individual sorting strategy |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1319-1324
[Abstract]
(621)
[HTML 1 KB]
[PDF 1017 KB]
(661)
|
|
|
1313 |
SUN Xinyu, WU Jiang, PU Qiang |
| |
|
Relevance model estimation based on stable semantic clustering |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1313-1318
[Abstract]
(546)
[HTML 1 KB]
[PDF 1012 KB]
(470)
|
|
|
1290 |
ZHANG Junchi, HU Jie, LIU Mengchi |
| |
|
Chinese natural language interface based on paraphrasing |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1290-1295
[Abstract]
(659)
[HTML 1 KB]
[PDF 1117 KB]
(569)
|
|
|
1284 |
XU Tao, MENG Ye |
| |
|
Importance sorting method of organizational enities based on trace clustering |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1284-1289
[Abstract]
(631)
[HTML 1 KB]
[PDF 901 KB]
(527)
|
|
|
1257 |
HU Zhihua, YAN Shuo, XIONG Kuanjiang |
| |
|
Dynamic S-box construction method and dynamic cryptography property analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1257-1261
[Abstract]
(633)
[HTML 1 KB]
[PDF 736 KB]
(602)
|
|
|
1246 |
LI Jie, YU Yan, WU Jiashun |
| |
|
Vulnerability detection algorithm of DOM XSS based on dynamic taint analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1246-1249
[Abstract]
(955)
[HTML 1 KB]
[PDF 801 KB]
(736)
|
|
|
1236 |
LI Yun, CHEN Pangsen, SUN Shanlin |
| |
|
Security analysis and implementation for wireless local area network access protocol via near field communication authentication |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1236-1245
[Abstract]
(643)
[HTML 1 KB]
[PDF 1362 KB]
(667)
|
|
|
1222 |
WANG Yuefei, YU Jiong, LU Liang |
| |
|
Strategy for object index based on RAMCloud |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1222-1227
[Abstract]
(486)
[HTML 1 KB]
[PDF 876 KB]
(523)
|
|
|
1216 |
KE Zunwang, YU Jiong, LIAO Bin |
| |
|
Adaptive multi-resource scheduling dominant resource fairness algorithm for Mesos in heterogeneous clusters |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1216-1221
[Abstract]
(601)
[HTML 1 KB]
[PDF 870 KB]
(602)
|
|
|
1212 |
HUANG Wei, LIN Jie, JIANG Yu'e |
| |
|
Improved automatic classification algorithm of software bug report in cloud environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1212-1215
[Abstract]
(641)
[HTML 1 KB]
[PDF 705 KB]
(532)
|
|
|
1192 |
TIAN Zengshan, DAI Haipeng |
| |
|
WiFi fingerprint database updating based on surface fitting |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1192-1195
[Abstract]
(540)
[HTML 1 KB]
[PDF 571 KB]
(658)
|
|
|
1183 |
LIU Yang, PENG Jian, LIU Tang, WANG Bin |
| |
|
Routing algorithm based on layered mechanism in river underwater sensor networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1183-1187
[Abstract]
(625)
[HTML 1 KB]
[PDF 723 KB]
(645)
|
|
|
1173 |
WANG Yong, ZHAO Xianli, FU Chengqun, XIE Lijun |
| |
|
Laser bathymetry waveform processing based on robust least square support vector machine |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1173-1178
[Abstract]
(604)
[HTML 1 KB]
[PDF 801 KB]
(579)
|
|
|
1167 |
WANG Lifu, SUN Yi |
| |
|
Inpainting of seismic signal using consistent sparse representation method |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1167-1172
[Abstract]
(692)
[HTML 1 KB]
[PDF 860 KB]
(526)
|
|
|
1163 |
LIU Dongming, CHEN Lian, LI Xinyan |
| |
|
Geometric structure analysis method based on scalable vector graphics |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1163-1166
[Abstract]
(649)
[HTML 1 KB]
[PDF 766 KB]
(578)
|
|
|
1096 |
NI Hao, RUAN Ruolin, LIU Fanghua, WANG Jianfeng |
| |
|
Single image super-resolution via independently adjustable sparse coefficients |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1096-1099
[Abstract]
(690)
[HTML 1 KB]
[PDF 849 KB]
(488)
|
|
|
1092 |
JI Xiaohong, XIONG Shuhua, HE Xiaohai, CHEN Honggang |
| |
|
Adaptive video super-resolution reconstruction algorithm based on multi-order derivative |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1092-1095
[Abstract]
(597)
[HTML 1 KB]
[PDF 717 KB]
(545)
|
|
|
1085 |
LI Peng, PENG Zongju, LI Chihang, CHEN Fen |
| |
|
Fast intra hierarchical algorithm for high efficiency video coding based on texture property and spatial correlation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1085-1091
[Abstract]
(635)
[HTML 1 KB]
[PDF 1056 KB]
(517)
|
|
|
1054 |
QIU Gui, YAN Renwu |
| |
|
Distributed collaborative filtering recommendation algorithm based on gray association analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1054-1059
[Abstract]
(805)
[HTML 1 KB]
[PDF 883 KB]
(533)
|
|
|
1045 |
GAO Yan, CHEN Baifan, CHAO Xuyao, MAO Fang |
| |
|
Sentiment analysis of product reviews based on contrastive divergence- restricted Boltzmann machine deep learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1045-1049
[Abstract]
(874)
[HTML 1 KB]
[PDF 767 KB]
(862)
|
|
|
1033 |
ZHANG Wenda, XU Yuelei, NI Jiacheng, MA Shiping, SHI Hehuan |
| |
|
Image target recognition method based on multi-scale block convolutional neural network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1033-1038
[Abstract]
(1141)
[HTML 1 KB]
[PDF 891 KB]
(1408)
|
|
|
1015 |
ZHANG Wenqiang, LU Jiaming, ZHANG Hongmei |
| |
|
Fast multi-objective hybrid evolutionary algorithm for flow shop scheduling problem |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1015-1021
[Abstract]
(577)
[HTML 1 KB]
[PDF 974 KB]
(672)
|
|
|
973 |
SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi |
| |
|
Behavior oriented method of Android malware detection and its effectiveness |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 973-978
[Abstract]
(776)
[HTML 1 KB]
[PDF 856 KB]
(799)
|
|
|
966 |
JIN Jianguo, XIAO Ying, DI Zhigang |
| |
|
Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 966-972
[Abstract]
(567)
[HTML 1 KB]
[PDF 1115 KB]
(579)
|
|
|
956 |
HUANG Wenzhen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang |
| |
|
Identity-based broadcast encryption based on lattice |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 956-961
[Abstract]
(704)
[HTML 1 KB]
[PDF 883 KB]
(582)
|
|
|
941 |
ZHANG Yang, LIU Tingwen, SHA Hongzhou, SHI Jinqiao |
| |
|
Malicious domain detection based on multiple-dimensional features |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 941-944
[Abstract]
(939)
[HTML 1 KB]
[PDF 688 KB]
(917)
|
|
|
899 |
LIAO Yunfeng, CHEN Yong, SUN Aiwei, SHAO Hongxiang |
| |
|
Dynamic spectrum access based on budget and quality of service |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 899-904
[Abstract]
(642)
[HTML 1 KB]
[PDF 765 KB]
(524)
|
|
|
889 |
XIE Zehua, ZHOU Jinhe, TANG Zhijun |
| |
|
Dynamic weight traffic queue scheduling algorithm for network energy efficiency optimization |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (4): 889-893
[Abstract]
(572)
[HTML 1 KB]
[PDF 655 KB]
(718)
|
|
|
849 |
CHEN Xi, YANG Tao, HE Hongsen |
| |
|
Orientation angle estimation based on improved 2-D ESPRIT-like algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 849-853
[Abstract]
(828)
[HTML 1 KB]
[PDF 820 KB]
(360)
|
|
|
843 |
FAN Lubin, LIANG Chengji, SHE Wenjing |
| |
|
Coupling model and its algorithm for coordinated scheduling of quay crane and truck under uncertain environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 843-848
[Abstract]
(786)
[HTML 1 KB]
[PDF 977 KB]
(380)
|
|
|
833 |
ZHOU Nan, TIAN Xuedong |
| |
|
Analyzing and indexing method on LaTeX formulae |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 833-836
[Abstract]
(791)
[HTML 1 KB]
[PDF 704 KB]
(421)
|
|
|
811 |
JIANG Zibo, ZHAO Jingxiu, ZHANG Yuanke, MENG Jing |
| |
|
Fast reconstruction algorithm for photoacoustic computed tomography in vivo |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 811-814
[Abstract]
(607)
[HTML 1 KB]
[PDF 602 KB]
(531)
|
|
|
800 |
ZHAO Xiaole, WU Yadong, TIAN Jinsha, ZHANG Hongying |
| |
|
Single image super-resolution algorithm based on unified iterative least squares regulation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 800-805
[Abstract]
(576)
[HTML 1 KB]
[PDF 984 KB]
(440)
|
|
|
789 |
TIAN Jinsha, HAN Yongguo, WU Yadong, ZHAO Xiaole, ZHANG Hongying |
| |
|
No-reference image quality assessment based on scale invariance |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 789-794
[Abstract]
(658)
[HTML 1 KB]
[PDF 1088 KB]
(452)
|
|
|
783 |
MA Yun, WANG Xiaodong, ZHANG Lianjun |
| |
|
No-reference stereoscopic image quality assessment model based on natural scene statistics |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 783-788
[Abstract]
(1694)
[HTML 1 KB]
[PDF 897 KB]
(495)
|
|
|
774 |
LONG Chao, HAN Bo, ZHANG Yu |
| |
|
Three-dimensional SLAM using Kinect and visual dictionary |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 774-778
[Abstract]
(652)
[HTML 1 KB]
[PDF 849 KB]
(472)
|
|
|
770 |
KONG Weiting, ZHAN Yongzhao |
| |
|
Video semantic detection based on topographic independent component analysis and Gaussian mixture model |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 770-773
[Abstract]
(676)
[HTML 1 KB]
[PDF 772 KB]
(558)
|
|
|
740 |
LU Zhigang, SUN Yadan |
| |
|
Multidimensional collaborative intelligence recommendation based on social media context |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 740-745
[Abstract]
(595)
[HTML 1 KB]
[PDF 1137 KB]
(461)
|
|
|
726 |
YAN Yang, ZHAO Jiapeng, LI Quangang, ZHANG Yang, LIU Tingwen, SHI Jinqiao |
| |
|
Personal relation extraction based on text headline |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 726-730
[Abstract]
(901)
[HTML 1 KB]
[PDF 754 KB]
(750)
|
|
|
713 |
LI Jin, QIAN Xu |
| |
|
Image recognition algorithm based on dual-view discriminant correlation analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 713-717
[Abstract]
(620)
[HTML 1 KB]
[PDF 850 KB]
(449)
|
|
|
708 |
WANG Peichong |
| |
|
Improved dynamic self-adaptive teaching-learning-based optimization algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 708-712
[Abstract]
(715)
[HTML 1 KB]
[PDF 816 KB]
(535)
|
|
|
703 |
REN Hongge, LI Dongmei, LI Fujin |
| |
|
Dynamic neural network structure design based on semi-supervised learning |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 703-707
[Abstract]
(686)
[HTML 1 KB]
[PDF 881 KB]
(517)
|
|
|
697 |
DENG Junfeng, ZHANG Xiaolong |
| |
|
Deep learning algorithm optimization based on combination of auto-encoders |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 697-702
[Abstract]
(1161)
[HTML 1 KB]
[PDF 899 KB]
(1313)
|
|
|
687 |
AI Bing, DONG Minggang |
| |
|
Improved particle swarm optimization algorithm based on Gaussian disturbance and natural selection |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 687-691
[Abstract]
(699)
[HTML 1 KB]
[PDF 781 KB]
(491)
|
|
|
670 |
LIU Chao, HU Chengyu, YAO Hong, LIANG Qingzhong, YAN Xuesong |
| |
|
Non-relational data storage management mechanism for massive unstructured data |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 670-674
[Abstract]
(842)
[HTML 1 KB]
[PDF 819 KB]
(556)
|
|
|
665 |
HE Zhixue, LIAO Husheng |
| |
|
Query processing method of XML streaming data using list |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 665-669
[Abstract]
(600)
[HTML 1 KB]
[PDF 845 KB]
(435)
|
|
|
647 |
WANG Yujie, JIANG Weiwei |
| |
|
Audio steganalysis method based on fuzzy C-means clustering and one class support vector machine |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 647-652
[Abstract]
(806)
[HTML 1 KB]
[PDF 912 KB]
(546)
|
|
|
642 |
REN Shuai, SHI Fangxia, ZHANG Tao |
| |
|
Information hiding scheme for 3D model based on profile analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 642-646
[Abstract]
(708)
[HTML 1 KB]
[PDF 658 KB]
(400)
|
|
|
633 |
SHENG Xiaodong, LI Qiang, LIU Zhaozhao |
| |
|
Task scheduling method based on template genetic algorithm in cloud environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 633-636
[Abstract]
(817)
[HTML 1 KB]
[PDF 529 KB]
(451)
|
|
|
628 |
CAI Yong, LI Sheng |
| |
|
Graphics processor unit parallel computing in Matlab and its application in topology optimization |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 628-632
[Abstract]
(1058)
[HTML 1 KB]
[PDF 892 KB]
(686)
|
|
|
620 |
WANG Yang, WANG Bin, JIANG Tianli, LIU Huaixing, CHEN Ting |
| |
|
Existence detection algorithm for non-cooperative burst signals in wideband |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 620-627
[Abstract]
(780)
[HTML 1 KB]
[PDF 1062 KB]
(431)
|
|
|
610 |
LIU Linlin, GUO Chengjun, TIAN Zhong |
| |
|
Multipath error of deep coupling system based on integrity |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 610-615
[Abstract]
(685)
[HTML 1 KB]
[PDF 885 KB]
(373)
|
|
|
601 |
LI Yong, CHENG Zhirui |
| |
|
Dynamic scheduling mechanism for wireless video transmission |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (3): 601-605
[Abstract]
(681)
[HTML 1 KB]
[PDF 926 KB]
(557)
|
|
|
568 |
XU Haining, CHEN Enqing, LIANG Chengwu |
| |
|
Three-dimensional spatio-temporal feature extraction method for action recognition |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 568-573
[Abstract]
(806)
[HTML 1 KB]
[PDF 1005 KB]
(960)
|
|
|
556 |
HUANG Zhi, FU Xingwu, LIU Wanjun |
| |
|
Non-local means denoising algorithm with hybrid similarity weight |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 556-562
[Abstract]
(659)
[HTML 1 KB]
[PDF 1247 KB]
(964)
|
|
|
551 |
ZHAO Jingkun, ZHOU Yingyue, LIN Maosong |
| |
|
Image denoising algorithm based on sparse representation and nonlocal similarity |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 551-555
[Abstract]
(896)
[HTML 1 KB]
[PDF 1050 KB]
(984)
|
|
|
546 |
HE Chen, WANG Lei, WANG Chunmeng |
| |
|
Mesh slicer: novel algorithm for 3D mesh compression |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 546-550
[Abstract]
(1010)
[HTML 1 KB]
[PDF 818 KB]
(802)
|
|
|
531 |
LIU Bing, ZHANG Hong |
| |
|
Image retrieval algorithm based on convolutional neural network and manifold ranking |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 531-534
[Abstract]
(1240)
[HTML 1 KB]
[PDF 802 KB]
(1308)
|
|
|
521 |
YANG Cunqiang, HAN Xiaojun, ZHANG Nan |
| |
|
Super-resolution image reconstruction algorithm based on image patche iteration and sparse representation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 521-525
[Abstract]
(807)
[HTML 1 KB]
[PDF 830 KB]
(871)
|
|
|
516 |
HANG Bo, WANG Yi, KANG Changqing |
| |
|
Computational complexity optimization for mobile audio bandwidth extension |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 516-520
[Abstract]
(704)
[HTML 1 KB]
[PDF 761 KB]
(846)
|
|
|
492 |
FANG Jianchao, MAO Xuesong |
| |
|
Fourier spectrum analysis for non-uniform sampled signals |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 492-494
[Abstract]
(1592)
[HTML 1 KB]
[PDF 629 KB]
(1163)
|
|
|
483 |
XU Xiaoqiong, ZHOU Zhaorong, MA Xiaoxia, YANG Liu |
| |
|
Cooperative behavior based on evolutionary game in delay tolerant networks |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 483-487
[Abstract]
(642)
[HTML 1 KB]
[PDF 883 KB]
(921)
|
|
|
478 |
TANG Haijian, BAO Yu, MIN Xuan, LUO Yuxuan, ZOU Yuchi |
| |
|
Autonomous mobile strategy of carrier in wireless sensor network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 478-482
[Abstract]
(641)
[HTML 1 KB]
[PDF 806 KB]
(861)
|
|
|
465 |
MA Jianhong, ZHANG Mingyue, ZHAO Yanan |
| |
|
Patent knowledge extraction method for innovation design |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 465-471
[Abstract]
(658)
[HTML 1 KB]
[PDF 1005 KB]
(920)
|
|
|
455 |
YU Dong, LIU Chunhua, TIAN Yue |
| |
|
Personal title and career attributes extraction based on distant supervision and pattern matching |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 455-459
[Abstract]
(847)
[HTML 1 KB]
[PDF 1000 KB]
(969)
|
|
|
449 |
SUN Liping, GUO Yi, TANG Wenwu, XU Yongbin |
| |
|
Enterprise abbreviation prediction based on constitution pattern and conditional random field |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 449-454
[Abstract]
(950)
[HTML 1 KB]
[PDF 990 KB]
(1148)
|
|
|
444 |
ZHANG Li, ZHANG Dongming, ZHENG Hong |
| |
|
Vehicle logo recognition using convolutional neural network combined with multiple layer feature |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 444-448
[Abstract]
(734)
[HTML 1 KB]
[PDF 800 KB]
(1012)
|
|
|
428 |
CAI Guoyong, XIA Binbin |
| |
|
Multimedia sentiment analysis based on convolutional neural network |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 428-431
[Abstract]
(956)
[HTML 1 KB]
[PDF 787 KB]
(1594)
|
|
|
419 |
LIANG Junjie, GAN Wenting, YU Dunhui |
| |
|
Personalized recommendation algorithm based on location bitcode tree |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 419-423
[Abstract]
(584)
[HTML 1 KB]
[PDF 915 KB]
(896)
|
|
|
408 |
LIU Panpan, HONG Xudong, GUO Jianyi, YU Zhengtao, WEN Yonghua, CHEN Wei |
| |
|
Recognition of Chinese news event correlation based on grey relational analysis |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 408-413
[Abstract]
(593)
[HTML 1 KB]
[PDF 895 KB]
(912)
|
|
|
402 |
CHI Yaping, WANG Yan, WANG Huili, LI Xin |
| |
|
Cross-domain access control for e-government cloud based on classification |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 402-407
[Abstract]
(630)
[HTML 1 KB]
[PDF 875 KB]
(1026)
|
|
|
382 |
XIONG Hao, REN Yanzhen, WANG Lina |
| |
|
Universal steganalysis scheme of advanced audio coding |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 382-386
[Abstract]
(820)
[HTML 1 KB]
[PDF 893 KB]
(977)
|
|
|
377 |
TIAN Shoucai, SUN Xili, LU Yonggang |
| |
|
Stochastic nonlinear dimensionality reduction based on nearest neighbors |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 377-381
[Abstract]
(756)
[HTML 1 KB]
[PDF 781 KB]
(963)
|
|
|
372 |
WU Jieqi, LI Xiaoyu, YUAN Xiaotong, LIU Qingshan |
| |
|
Parallel sparse subspace clustering via coordinate descent minimization |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 372-376
[Abstract]
(854)
[HTML 1 KB]
[PDF 877 KB]
(1009)
|
|
|
364 |
LI Yuanhao, LU Ping, WU Yifan, WEI Wei, SONG Guojie |
| |
|
Mobile social network oriented user feature recognition of age and sex |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 364-371
[Abstract]
(690)
[HTML 1 KB]
[PDF 1248 KB]
(1097)
|
|
|
358 |
SONG Baoyan, JI Wanting, DING Linlin |
| |
|
Similarity nodes query algorithm on large dynamic graph based on the snapshots |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 358-363
[Abstract]
(926)
[HTML 1 KB]
[PDF 951 KB]
(940)
|
|
|
353 |
ZHOU Guoliang, SA Churila, ZHU Yongli |
| |
|
Star join algorithm based on multi-dimensional Bloom filter in Spark |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 353-357
[Abstract]
(1105)
[HTML 1 KB]
[PDF 765 KB]
(922)
|
|
|
348 |
SA Churila, ZHOU Guoliang, SHI Lei, WANG Liuwang, SHI Xin, ZHU Yongli |
| |
|
Parallel cube computing in Spark |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 348-352
[Abstract]
(628)
[HTML 1 KB]
[PDF 769 KB]
(996)
|
|
|
301 |
ZHAO Hong, GUO Lilu |
| |
|
Space coordinate transformation algorithm for built-in accelerometer data of smartphone |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (2): 301-306
[Abstract]
(2394)
[HTML 1 KB]
[PDF 896 KB]
(1642)
|
|
|
287 |
DING Jiaru, DU Changping, ZHAO Yao, YIN Dengyu |
| |
|
Path planning algorithm for unmanned aerial vehicles based on improved artificial potential field |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 287-290
[Abstract]
(1087)
[HTML 1 KB]
[PDF 678 KB]
(913)
|
|
|
266 |
SUN Jiaze, GENG Guohua |
| |
|
Global optimal matching method for 3D fragments based on swarm intelligence |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 266-270
[Abstract]
(551)
[HTML 1 KB]
[PDF 781 KB]
(365)
|
|
|
254 |
LIU Xinrui, REN Fengyu, LEI Guoping |
| |
|
Research of domain ontology driven enterprise on-line analytical processing systems |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 254-259
[Abstract]
(607)
[HTML 1 KB]
[PDF 997 KB]
(377)
|
|
|
248 |
YANG Yipu, YANG Fan, PAN Guofeng, ZHANG Huimin |
| |
|
River information extraction from high resolution remote sensing image based on homomorphic system filtering |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 248-253
[Abstract]
(467)
[HTML 1 KB]
[PDF 1143 KB]
(429)
|
|
|
227 |
WANG Chengxiao, HUANG Huixian, YANG Hui, XU Jianmin |
| |
|
New improved 1-2-order fractional differential edge detection model based on Riemann-Liouville integral |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 227-232
[Abstract]
(647)
[HTML 1 KB]
[PDF 962 KB]
(482)
|
|
|
222 |
DUAN Fengfeng, WANG Yongbin, YANG Lifang, PAN Shujing |
| |
|
Feature extraction for stereoscopic vision depth map based on principal component analysis and histogram of oriented depth gradient |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 222-226
[Abstract]
(588)
[HTML 1 KB]
[PDF 794 KB]
(765)
|
|
|
216 |
LI Chengwen, WANG Xiaoming |
| |
|
Outsourced data encryption scheme with access privilege revocation |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 216-221
[Abstract]
(681)
[HTML 1 KB]
[PDF 958 KB]
(367)
|
|
|
212 |
TANG Shang, LI Yonggui, ZHU Yonggang |
| |
|
Wireless communication security strategy based on differential flag byte |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 212-215
[Abstract]
(466)
[HTML 1 KB]
[PDF 757 KB]
(322)
|
|
|
194 |
WANG Kun, QIU Hui, YANG Haopu |
| |
|
Network security situation evaluation method based on attack pattern recognition |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 194-198
[Abstract]
(674)
[HTML 1 KB]
[PDF 945 KB]
(607)
|
|
|
171 |
WANG Fuqiang, PENG Furong, DING Xiaohuan, LU Jianfeng |
| |
|
Location-based asymmetric similarity for collaborative filtering recommendation algorithm |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 171-174
[Abstract]
(666)
[HTML 1 KB]
[PDF 702 KB]
(455)
|
|
|
154 |
HU Qinghui, WEI Shiwei, XIE Zhongqian, REN Yafeng |
| |
|
Correlation between phrases in advertisement based on recursive autoencoder |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 154-157
[Abstract]
(752)
[HTML 1 KB]
[PDF 737 KB]
(436)
|
|
|
143 |
LI Kangshun, ZUO Lei, LI Wei |
| |
|
Novel differential evolution algorithm based on simplex-orthogonal experimental design |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 143-149
[Abstract]
(530)
[HTML 1 KB]
[PDF 1013 KB]
(365)
|
|
|
128 |
GAO Qingji, LI Yongsheng, LUO Qijun |
| |
|
Optimization of baggage tag reader layout based on improved particle swarm optimization |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 128-132
[Abstract]
(531)
[HTML 1 KB]
[PDF 699 KB]
(460)
|
|
|
101 |
LONG Zhaohua, GONG Tengfei |
| |
|
Estimation algorithm of radio frequency identification tags based on non-empty slot number |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 101-106
[Abstract]
(593)
[HTML 1 KB]
[PDF 874 KB]
(363)
|
|
|
87 |
ZHAO Zhijin, CHEN Jinglai |
| |
|
Wide-band spectrum sensing algorithm using sparsity estimation based on Gerschgorin theorem |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 87-90
[Abstract]
(708)
[HTML 1 KB]
[PDF 706 KB]
(453)
|
|
|
21 |
DING Xinzhe, ZHANG Zhaogong, LI Jianzhong, TAN Long, LIU Yong |
| |
|
Relational algebraic operation algorithm on compressed data |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 21-26
[Abstract]
(793)
[HTML 1 KB]
[PDF 923 KB]
(470)
|
|
|
1 |
WENG Haixing, GONG Xueqing, ZHU Yanchao, HU Hualiang |
| |
|
Implementation of distributed index in cluster environment |
| |
|
|
Journal of Computer Applications
2016 Vol.36 (1): 1-7
[Abstract]
(1088)
[HTML 1 KB]
[PDF 1303 KB]
(836)
|
|
|
3602 |
XIE Yu, HU Xintong, MENG Xiyun, LIU Yunjie |
| |
|
Passenger counting system based on intelligent detection of polyvinylidene fluoride human gait |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3602-3606
[Abstract]
(598)
[HTML 1 KB]
[PDF 741 KB]
(331)
|
|
|
3597 |
WANG Fuqiang, LI Xiaoli, ZHANG Qiusheng, ZHANG Jinying |
| |
|
Fast calculation method of multivariable control for reheat steam temperature based on Smith control and predictive functional control |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3597-3601
[Abstract]
(539)
[HTML 1 KB]
[PDF 700 KB]
(362)
|
|
|
3592 |
WANG Chong, AN Weiqiang, WANG Hongjuan |
| |
|
Tunnel intersection modeling based on cylinder-axis aligned bounding box detection |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3592-3596
[Abstract]
(672)
[HTML 1 KB]
[PDF 677 KB]
(340)
|
|
|
3586 |
KONG Yu, WANG Shuying |
| |
|
Information acquisition solution for automotive after-sales service based on Android platform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3586-3591
[Abstract]
(1387)
[HTML 1 KB]
[PDF 991 KB]
(509)
|
|
|
3581 |
LAO Jiajun, YANG Jiang, ZHU Wuming |
| |
|
Dynamic obstacle avoidance method of mobile online water quality monitoring platform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3581-3585
[Abstract]
(1495)
[HTML 1 KB]
[PDF 876 KB]
(418)
|
|
|
3550 |
YU Liyang, FAN Chunxiao, MING Yue |
| |
|
Improved target tracking algorithm based on kernelized correlation filter |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3550-3554
[Abstract]
(1273)
[HTML 1 KB]
[PDF 798 KB]
(971)
|
|
|
3520 |
WANG Lei, WANG Bidou, LUO Gangyin, NIE Lanshun, ZHAN Dechen, TIAN Haoran |
| |
|
Application of time-Petri net for process modeling of point-of-care testing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3520-3523
[Abstract]
(650)
[HTML 1 KB]
[PDF 699 KB]
(395)
|
|
|
3515 |
PAN Xiong, JIANG Wei, WEN Liang, ZHOU Keran, DONG Qi, WANG Junlong |
| |
|
Energy consumption optimization of stochastic real-time tasks for dependable embedded system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3515-3519
[Abstract]
(684)
[HTML 1 KB]
[PDF 864 KB]
(467)
|
|
|
3502 |
GUO Qiang, SONG Wenjun, HU Zhaolong, HOU Lei, ZHANG Yilu, CHEN Fangjiao |
| |
|
Non-equilibrium mass diffusion recommendation algorithm based on popularity |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3502-3505
[Abstract]
(595)
[HTML 1 KB]
[PDF 605 KB]
(389)
|
|
|
3487 |
MA Huifang, SHI Yakai, XIE Meng, ZHUANG Fuzhen |
| |
|
User influence algorithm based on user content and relational structure |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3487-3490
[Abstract]
(616)
[HTML 1 KB]
[PDF 768 KB]
(287)
|
|
|
3481 |
LIU Li, WANG Yongheng, WEI Hang |
| |
|
Fine-grained sentiment analysis oriented to product comment |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3481-3486
[Abstract]
(996)
[HTML 1 KB]
[PDF 1058 KB]
(889)
|
|
|
3450 |
ZOU Yu, XUE Xiaoping, ZHANG Fang, PAN Yong, PAN Teng |
| |
|
Error detection algorithm of program loop control |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3450-3455
[Abstract]
(525)
[HTML 1 KB]
[PDF 945 KB]
(375)
|
|
|
3424 |
XUE Feng, WANG Ding, CAO Pinjun, LI Yong |
| |
|
Cryptanalysis of two anonymous user authentication schemes for wireless sensor networks |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3424-3428
[Abstract]
(669)
[HTML 1 KB]
[PDF 931 KB]
(449)
|
|
|
3419 |
PAN Lei, LI Tingyuan |
| |
|
Dynamic information security evaluation model in mobile Ad Hoc network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3419-3423
[Abstract]
(648)
[HTML 1 KB]
[PDF 726 KB]
(316)
|
|
|
3392 |
GUO Gang, YU Jiong, LU Liang, YING Changtian, YIN Lutong |
| |
|
Data migration model based on RAMCloud hierarchical storage architecture |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3392-3397
[Abstract]
(636)
[HTML 1 KB]
[PDF 878 KB]
(388)
|
|
|
3368 |
WANG Donghui, HAN Jianmin, ZHUANG Jiaqi |
| |
|
Efficient memory management algorithm based on segment tree and its space optimization |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3368-3373
[Abstract]
(915)
[HTML 1 KB]
[PDF 951 KB]
(518)
|
|
|
3357 |
ZHOU Yun, LU Xiaxia, YU Xuelian, WANG Xuegang |
| |
|
Multiple input multiple output radar orthogonal waveform design of joint frequency-phase modulation based on chaos |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3357-3361
[Abstract]
(576)
[HTML 1 KB]
[PDF 655 KB]
(366)
|
|
|
3352 |
WANG Sixiu, GUO Wenqiang, TANG Jianguo, WANG Xiaojie |
| |
|
Detection method of linear frequency modulated signal based on frequency domain phase variance weighting |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3352-3356
[Abstract]
(1348)
[HTML 1 KB]
[PDF 906 KB]
(308)
|
|
|
3348 |
DING Yaojun |
| |
|
Imbalanced network traffic classification method based on improved forest rotation algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3348-3351
[Abstract]
(749)
[HTML 1 KB]
[PDF 611 KB]
(510)
|
|
|
3316 |
FU Hui, WU Bin, HAN Dongxuan, HUANG Yangqiang |
| |
|
Fast visual optimization defogging algorithm based on atmospheric physical model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3316-3320
[Abstract]
(701)
[HTML 0 KB]
[PDF 840 KB]
(641)
|
|
|
3308 |
ZHAO Wei, TIAN Zheng, YANG Lijuan, YAN Weidong, WEN Jinhuan |
| |
|
Scale invariant feature transform mismatches removal based on canonical correlation analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3308-3311
[Abstract]
(641)
[HTML 0 KB]
[PDF 654 KB]
(723)
|
|
|
3280 |
FAN Lei, QI Guoqing |
| |
|
High accuracy frequency estimation algorithm of sinusoidal signals based on fast Fourier transform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3280-3283
[Abstract]
(763)
[HTML 0 KB]
[PDF 574 KB]
(712)
|
|
|
3265 |
XIE Bin, CHEN Bo, LE Honghao |
| |
|
Improved linear minimum mean square error channel estimation algorithm based on orthogonal frequency division multiplexing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3265-3269
[Abstract]
(594)
[HTML 0 KB]
[PDF 768 KB]
(513)
|
|
|
3261 |
CAO Kaitian, CHEN Xiaosi, ZHU Wenjun |
| |
|
Compressive wideband spectrum blind detection based on high-order statistics |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3261-3264
[Abstract]
(682)
[HTML 0 KB]
[PDF 803 KB]
(576)
|
|
|
3252 |
QIU Wenhao, HUANG Kaoli, JIN Saisai, LIAN Guangyao |
| |
|
Fault prediction model based on health analysis and harmony search-ant colony algorithm-support vector machine |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3252-3255
[Abstract]
(679)
[HTML 0 KB]
[PDF 730 KB]
(558)
|
|
|
3247 |
YIN Lutong, YU Jiong, LU Liang, YING Changtian, GUO Gang |
| |
|
Video recommendation algorithm fusing comment analysis and latent factor model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3247-3251
[Abstract]
(609)
[HTML 0 KB]
[PDF 790 KB]
(701)
|
|
|
3227 |
WANG Shaohua, DI Lan, LIANG Jiuzhen |
| |
|
Multi-dimensional fuzzy clustering image segmentation algorithm based on kernel metric and local information |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3227-3231
[Abstract]
(664)
[HTML 0 KB]
[PDF 1025 KB]
(600)
|
|
|
3222 |
CHEN Lifang, WANG Yun, ZHANG Feng |
| |
|
Research and application of dynamic rule extraction algorithm based on rough set and decision tree |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3222-3226
[Abstract]
(604)
[HTML 0 KB]
[PDF 713 KB]
(552)
|
|
|
3208 |
LIN Yidong, ZHANG Yanlan, LIN Menglei |
| |
|
Rough set based matrix method for dynamic change covering family |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3208-3212
[Abstract]
(552)
[HTML 0 KB]
[PDF 630 KB]
(529)
|
|
|
3187 |
LI Jinjing, CHEN Qingkui, LIU Baoping, LIU Bocheng |
| |
|
Binary probability segmentation of video based on graphics processing unit |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3187-3193
[Abstract]
(586)
[HTML 0 KB]
[PDF 1079 KB]
(594)
|
|
|
3172 |
ZHANG Dongwen, LIU Chenguang, ZHANG Yang |
| |
|
Fork/Join-oriented software refactoring and performance analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3172-3177
[Abstract]
(517)
[HTML 0 KB]
[PDF 853 KB]
(607)
|
|
|
3151 |
YUAN Lei, LIANG Dingwen, CAI Zhihua, WU Zhao, GU Qiong |
| |
|
Short-term traffic flow prediction algorithm based on orthogonal differential evolution unscented Kalman filter |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3151-3156
[Abstract]
(598)
[HTML 0 KB]
[PDF 861 KB]
(531)
|
|
|
3139 |
LI Huiyong, CHEN Yixiang |
| |
|
Improved heterogereous earliest finish time scheduling algorithm with multi-dimensional quality of service for data stream processing task in Internet of vehicles |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3139-3145
[Abstract]
(661)
[HTML 0 KB]
[PDF 1089 KB]
(675)
|
|
|
3112 |
HUA Qing, XU Guoyan, ZHANG Ye |
| |
|
Improved Kalman algorithm for abnormal data detection based on multidimensional impact factors |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3112-3115
[Abstract]
(658)
[HTML 0 KB]
[PDF 705 KB]
(687)
|
|
|
3106 |
MAO Yingchi, JIE Qing, CHEN Hao |
| |
|
Online abnormal event detection with spatio-temporal relationship in river networks |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3106-3111
[Abstract]
(645)
[HTML 0 KB]
[PDF 1073 KB]
(594)
|
|
|
3083 |
YIN Yi, WANG Yun |
| |
|
Analysis method of inclusion relations between firewall rules |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3083-3086
[Abstract]
(630)
[HTML 0 KB]
[PDF 747 KB]
(649)
|
|
|
3063 |
ZHANG Qian, CHEN Chaogen, LIANG Hong |
| |
|
Private cloud platform design based on virtualization technology |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3063-3069
[Abstract]
(789)
[HTML 0 KB]
[PDF 1140 KB]
(898)
|
|
|
3055 |
NAN Yang, CHEN Lin |
| |
|
Performance evaluation method based on objective weight determination for data center network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3055-3058
[Abstract]
(617)
[HTML 1 KB]
[PDF 764 KB]
(807)
|
|
|
3026 |
MA Haifeng, YI Hebali, WANG Ye, YANG Jiahai, ZHANG Chao |
| |
|
Cloud migration performance of tsinghua cloud monitoring platform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3026-3030
[Abstract]
(718)
[HTML 1 KB]
[PDF 919 KB]
(839)
|
|
|
3021 |
DANG Xiaochao, YANG Dongdong, HAO Zhanjun |
| |
|
Three-dimensional coverage algorithm based on virtual force in sensor network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3021-3025
[Abstract]
(633)
[HTML 1 KB]
[PDF 727 KB]
(920)
|
|
|
3013 |
ZENG Wenhua |
| |
|
3D geoinformation network sharing based on decomposition and combination method |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 3013-3016
[Abstract]
(507)
[HTML 1 KB]
[PDF 666 KB]
(571)
|
|
|
3008 |
XU Yuanchao, SUN Fengyun, YAN Junfeng, WAN Hu |
| |
|
Directory-adaptive journaling mode selective mechanism for Android systems |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 3008-3012
[Abstract]
(602)
[HTML 1 KB]
[PDF 798 KB]
(554)
|
|
|
2980 |
LI Xinye, SUN Zhihua, CHEN Mingyu |
| |
|
Fast algorithm for object tracking based on binary feature and structured output support vector machine |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2980-2984
[Abstract]
(580)
[HTML 1 KB]
[PDF 732 KB]
(549)
|
|
|
2963 |
WANG Bing, MAO Qian, SU Dongqi |
| |
|
Image authentication agorithm based on two-dimensional histogram shifting |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2963-2968
[Abstract]
(577)
[HTML 1 KB]
[PDF 856 KB]
(546)
|
|
|
2905 |
LI Chaoxiong, HUANG Faliang, WEN Xiaoqian, LI Xuan, YUAN Chang'an |
| |
|
Evolution analysis method of microblog topic-sentiment based on dynamic topic sentiment combining model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2905-2910
[Abstract]
(609)
[HTML 1 KB]
[PDF 921 KB]
(645)
|
|
|
2901 |
WANG Jingzhong, QIU Tongxiang |
| |
|
Focused topic Web crawler based on improved TF-IDF alogorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2901-2904
[Abstract]
(695)
[HTML 1 KB]
[PDF 797 KB]
(631)
|
|
|
2896 |
DONG Qihai, WANG Yagang |
| |
|
Partition-based binary file similarity comparison method |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2896-2900
[Abstract]
(498)
[HTML 1 KB]
[PDF 983 KB]
(586)
|
|
|
2883 |
YAO Wei, WANG Juan, ZHANG Shengli |
| |
|
Intrusion detection model based on decision tree and Naive-Bayes classification |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2883-2885
[Abstract]
(558)
[HTML 1 KB]
[PDF 465 KB]
(719)
|
|
|
2867 |
WANG Qian, ZHENG Dong, REN Fang |
| |
|
Code-based blind signature scheme |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2867-2871
[Abstract]
(446)
[HTML 1 KB]
[PDF 746 KB]
(423)
|
|
|
2858 |
SUN Li, SONG Xizhong |
| |
|
Multi-slot allocation data transmission algorithm based on dynamic tree topology for wireless sensor network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2858-2862
[Abstract]
(508)
[HTML 1 KB]
[PDF 765 KB]
(1097)
|
|
|
2838 |
MO Yiwen, JI Donghong, HUANG Jiangping |
| |
|
Slight-pause marks boundary identification based on conditional random field |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2838-2842
[Abstract]
(586)
[HTML 1 KB]
[PDF 786 KB]
(500)
|
|
|
2833 |
WANG Xiuqing, HOU Zengguang, PAN Shiying, TAN Min, WANG Yongji, ZENG Hui |
| |
|
Corridor scene recognition for mobile robots based on multi-sonar-sensor information and NeuCube |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2833-2837
[Abstract]
(641)
[HTML 1 KB]
[PDF 769 KB]
(538)
|
|
|
2824 |
SHI Jiarong, ZHENG Xiuyun, YANG Wei |
| |
|
Regularized approach for incomplete robust principal component analysis and its applications in background modeling |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2824-2827
[Abstract]
(775)
[HTML 1 KB]
[PDF 782 KB]
(550)
|
|
|
2813 |
LU Huiling, ZHOU Tao, WANG Huiqun, WANG Wenwen |
| |
|
Prostate tumor CAD model based on neural network with feature-level fusion in magnetic resonance imaging |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2813-2818
[Abstract]
(515)
[HTML 1 KB]
[PDF 894 KB]
(7720)
|
|
|
2808 |
XU Wenxuan, ZHANG Li |
| |
|
Human promoter recognition based on single nucleotide statistics and support vector machine ensemble |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2808-2812
[Abstract]
(618)
[HTML 1 KB]
[PDF 756 KB]
(456)
|
|
|
2798 |
HUANG Xiaojuan, ZHANG Li |
| |
|
Modified multi-class support vector machine recursive feature elimination for cancer multi-classification |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2798-2802
[Abstract]
(827)
[HTML 1 KB]
[PDF 716 KB]
(957)
|
|
|
2781 |
ZHENG Fengfei, HUANG Wenpei, JIA Mingzheng |
| |
|
Matrix factorization recommendation algorithm based on Spark |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2781-2783
[Abstract]
(828)
[HTML 1 KB]
[PDF 570 KB]
(646)
|
|
|
2771 |
HUANG Guoshun, WEN Han |
| |
|
Conditional information entropy and attribute reduction based on boundary region |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2771-2776
[Abstract]
(498)
[HTML 1 KB]
[PDF 830 KB]
(552)
|
|
|
2761 |
TAN Hefeng, LIU Zhengyi |
| |
|
Multi-label
K nearest neighbor algorithm by exploiting label correlation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2761-2765
[Abstract]
(691)
[HTML 1 KB]
[PDF 656 KB]
(775)
|
|
|
2752 |
WU Jinhua, ZUO Kaizhong, JIE Biao, DING Xintao |
| |
|
New discriminative feature selection method |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2752-2756
[Abstract]
(579)
[HTML 1 KB]
[PDF 666 KB]
(493)
|
|
|
2747 |
LIN Jianghao, ZHOU Yongmei, YANG Aimin, CHEN Yuhong, CHEN Xiaofan |
| |
|
Analysis of public emotion evolution based on probabilistic latent semantic analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2747-2751
[Abstract]
(526)
[HTML 1 KB]
[PDF 900 KB]
(656)
|
|
|
2721 |
SHI Shaoliang, WEN Yimin, MIAO Yuqing |
| |
|
Simple multi-label ranking for Chinese microblog sentiment classification |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2721-2726
[Abstract]
(1043)
[HTML 1 KB]
[PDF 1000 KB]
(838)
|
|
|
2710 |
LI Jingzhe, LI Taifu, GU Xiaohua, QIU Kui |
| |
|
Anomaly detection and diagnosis of high sulfur natural gas purification process based on dynamic kernel independent component analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2710-2714
[Abstract]
(625)
[HTML 1 KB]
[PDF 739 KB]
(511)
|
|
|
2701 |
HAN Min, SUN Zhuoran |
| |
|
Epileptic EEG signals classification based on wavelet transform and AdaBoost extreme learning machine |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2701-2705
[Abstract]
(619)
[HTML 1 KB]
[PDF 934 KB]
(574)
|
|
|
2673 |
ZHOU Jingxian, HU Zhihua |
| |
|
Scheduling optimization for cross-over twin automated stacking cranes in automated container terminal |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2673-2677
[Abstract]
(732)
[HTML 1 KB]
[PDF 743 KB]
(415)
|
|
|
2652 |
LIU Yu, CAO Guo, ZHOU Licun, QU Baozhu |
| |
|
Building-damage detection based on combination of multi-features |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2652-2655
[Abstract]
(625)
[HTML 1 KB]
[PDF 828 KB]
(387)
|
|
|
2640 |
CHEN Xianyi, ZHAO Liping, CHEN Zhizhong, LIN Tao |
| |
|
2D intra string copy for screen content coding |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2640-2647
[Abstract]
(548)
[HTML 1 KB]
[PDF 1264 KB]
(350)
|
|
|
2624 |
ZHENG Bin, NIU Yuzhen, KE Lingling |
| |
|
New multi-object image dataset construction and evaluation of visual saliency analysis algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2624-2628
[Abstract]
(639)
[HTML 1 KB]
[PDF 966 KB]
(357)
|
|
|
2619 |
CHEN Binbin, DENG Xinpu, YANG Jungang |
| |
|
Orientation-invariant generalized Hough transform algorithm based on U-chord curvature |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2619-2623
[Abstract]
(630)
[HTML 1 KB]
[PDF 704 KB]
(353)
|
|
|
2616 |
YANG Huiling, LIU Hongyan, LI Yan, SUN Huiting |
| |
|
Fast removal algorithm for trailing smear effect in CCD drift-scan star image |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2616-2618
[Abstract]
(741)
[HTML 1 KB]
[PDF 491 KB]
(533)
|
|
|
2611 |
GUO Hongshuai, SUN Dianzhu, LI Yanrui, LI Cong |
| |
|
Dynamic spatial index of mesh surface for supporting STL data source |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2611-2615
[Abstract]
(598)
[HTML 1 KB]
[PDF 743 KB]
(412)
|
|
|
2606 |
XU Youcai, WAN Zhou |
| |
|
Bearing fault diagnosis method based on conditional local mean decomposition and variable predictive model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2606-2610
[Abstract]
(578)
[HTML 1 KB]
[PDF 708 KB]
(412)
|
|
|
2590 |
LONG Wen, ZHAO Dongquan, XU Songjin |
| |
|
Improved grey wolf optimization algorithm for constrained optimization problem |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2590-2595
[Abstract]
(2442)
[HTML 1 KB]
[PDF 842 KB]
(1181)
|
|
|
2584 |
TAN Yang, NING Ke, CHEN Lin |
| |
|
Chromosomal translocation-based Dynamic evolutionary algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2584-2589
[Abstract]
(589)
[HTML 1 KB]
[PDF 863 KB]
(413)
|
|
|
2569 |
ZHENG Xiangyun, CHEN Zhigang, HUANG Rui, LI Bo |
| |
|
Personalized book recommendation algorithm based on topic model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2569-2573
[Abstract]
(736)
[HTML 1 KB]
[PDF 762 KB]
(18486)
|
|
|
2560 |
CHEN Yongheng, ZUO Wanli, LIN Yaojing |
| |
|
Sentiment-aspect analysis method based on seed words |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2560-2564
[Abstract]
(662)
[HTML 1 KB]
[PDF 884 KB]
(446)
|
|
|
2546 |
FU Rong |
| |
|
Practical power analysis of smart card implementation of block cipher |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2546-2552
[Abstract]
(679)
[HTML 1 KB]
[PDF 1064 KB]
(11969)
|
|
|
2508 |
CHEN Peng, MENG Chen, WANG Cheng, CHEN Hua |
| |
|
Simultaneous iterative hard thresholding for joint sparse recovery based on redundant dictionaries |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2508-2512
[Abstract]
(624)
[HTML 1 KB]
[PDF 756 KB]
(342)
|
|
|
2497 |
SHAO Tian, CHEN Guangsheng, JING Weipeng |
| |
|
Cut-GAR: solution to determine cut-off point in cloud storage system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2497-2502
[Abstract]
(739)
[HTML 1 KB]
[PDF 864 KB]
(350)
|
|
|
2492 |
XIA Hao, LI Liuliu |
| |
|
Internal model control based automatic tuning method for PID controller |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2492-2496
[Abstract]
(921)
[HTML 1 KB]
[PDF 699 KB]
(374)
|
|
|
2465 |
LI Yinuo, XIAO Ruliang, NI Youcong, SU Xiaomin, DU Xin, CAI Shengzhen |
| |
|
Indoor positioning algorithm with dynamic environment attenuation based on particle filtering |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2465-2469
[Abstract]
(915)
[HTML 1 KB]
[PDF 796 KB]
(420)
|
|
|
2461 |
XIE Bin, LE Honghao, CHEN Bo |
| |
|
Channel estimation algorithm for orthogonal frequency division multiplexing based on wavelet de-noising and discrete cosine transform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2461-2464
[Abstract]
(599)
[HTML 1 KB]
[PDF 757 KB]
(480)
|
|
|
2453 |
SHI Lixing, HU Fangyu |
| |
|
Users' mobility analysis based on call detail record in two-dimensional space |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2453-2456
[Abstract]
(1012)
[HTML 1 KB]
[PDF 752 KB]
(393)
|
|
|
2424 |
ZHANG Qingfeng, WANG Sheng, LIAO Dan |
| |
|
Nash bargaining based resource allocation in peer-to-peer network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2424-2429
[Abstract]
(621)
[HTML 1 KB]
[PDF 994 KB]
(503)
|
|
|
2397 |
LI Feng, GAO Feng, KOU Peng |
| |
|
Integrating piecewise linear representation and Gaussian process classification for stock turning points prediction |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2397-2403
[Abstract]
(1026)
[HTML 1 KB]
[PDF 1083 KB]
(786)
|
|
|
2386 |
ZENG Xiangfei, GUO Fan, TU Fengtao |
| |
|
Object-based dynamic taint analysis for J2EE program |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2386-2391
[Abstract]
(901)
[HTML 1 KB]
[PDF 937 KB]
(592)
|
|
|
2371 |
HUANG Shengbing, ZHENG Qilong, GUO Lianwei |
| |
|
SIMD compiler optimization by selecting single or double word mode for clustered VLIW DSP |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2371-2374
[Abstract]
(830)
[HTML 1 KB]
[PDF 606 KB]
(465)
|
|
|
2350 |
PENG Xindong, YANG Yong |
| |
|
Information measures for interval-valued fuzzy soft sets and their clustering algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2350-2354
[Abstract]
(972)
[HTML 1 KB]
[PDF 793 KB]
(474)
|
|
|
2345 |
WAN Jing, LIU Fang |
| |
|
Membership of mixed dependency set in strong partial ordered temporal scheme |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2345-2349
[Abstract]
(593)
[HTML 1 KB]
[PDF 919 KB]
(408)
|
|
|
2341 |
MA Jinlong, ZENG Qingning, HU Dan, LONG Chao, XIE Xianming |
| |
|
Speech enhancement algorithm based on microphone array under multiple noise environments |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2341-2344
[Abstract]
(608)
[HTML 1 KB]
[PDF 591 KB]
(543)
|
|
|
2336 |
JIN Liyan, CHEN Li, FAN Taiting, GAO Jing |
| |
|
Speech denoising algorithm based on singular spectrum analysis and Wiener filtering |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2336-2340
[Abstract]
(800)
[HTML 1 KB]
[PDF 727 KB]
(676)
|
|
|
2316 |
CHEN Pengzhan, LI Jie, LUO Man |
| |
|
Study of human motion tracking system based on wireless sensor network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2316-2320
[Abstract]
(558)
[HTML 1 KB]
[PDF 942 KB]
(438)
|
|
|
2301 |
WANG Xiaoyuan, ZHANG Hongying, WU Yadong, LIU Yan |
| |
|
Low-illumination image enhancement based on physical model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2301-2304
[Abstract]
(806)
[HTML 1 KB]
[PDF 825 KB]
(762)
|
|
|
2285 |
ZHANG Heng, LIU Dayong, LIU Yanli, NIE Chenxi |
| |
|
Improved binary robust invariant scalable keypoints algorithm fusing depth information |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2285-2290
[Abstract]
(709)
[HTML 1 KB]
[PDF 1012 KB]
(708)
|
|
|
2280 |
LYU Ruimin, CHEN Wei, MENG Lei, CHEN Lifang, WU Haotian, LI Jingyuan |
| |
|
Fourier representation, rendering techniques and applications of periodic dynamic images |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2280-2284
[Abstract]
(585)
[HTML 1 KB]
[PDF 896 KB]
(407)
|
|
|
2274 |
LIN Zecheng, ZHU Jianqing, LIAO Shengcai, LI Stan Z. |
| |
|
Uniform SILTP based background modeling and its implementation on Intel HD graphics |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2274-2279
[Abstract]
(784)
[HTML 1 KB]
[PDF 934 KB]
(496)
|
|
|
2266 |
ZHAO Xiaole, WU Yadong, ZHANG Hongying, ZHAO Jing |
| |
|
Polynomial interpolation algorithm framework based on osculating polynomial approximation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2266-2273
[Abstract]
(661)
[HTML 1 KB]
[PDF 1379 KB]
(459)
|
|
|
2249 |
QIAN Shuqu, WU Huihong, XU Guofeng |
| |
|
Constrained multiobjective optimization algorithm based on repairing strategy for solving dynamic environment/economic dispatch |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2249-2255
[Abstract]
(876)
[HTML 1 KB]
[PDF 967 KB]
(428)
|
|
|
2227 |
LI Ruiguo, ZHANG Hongli, WANG Ya |
| |
|
New orthogonal basis neural network based on quantum particle swarm optimization algorithm for fractional order chaotic time series single-step prediction |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2227-2232
[Abstract]
(624)
[HTML 1 KB]
[PDF 975 KB]
(18344)
|
|
|
2174 |
LU Jingqiao, FU Xiufen |
| |
|
Cascading failure model based on community theory in complex network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2174-2177
[Abstract]
(552)
[HTML 1 KB]
[PDF 616 KB]
(543)
|
|
|
2164 |
WEN Zhicheng, CAO Chunli, ZHOU Hao |
| |
|
Network security situation assessment method based on Naive Bayes classifier |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2164-2168
[Abstract]
(665)
[HTML 1 KB]
[PDF 778 KB]
(607)
|
|
|
2137 |
GAO Wenyu, LI Hua |
| |
|
Approximation algorithm of cluster vertex deletion |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2137-2139
[Abstract]
(465)
[HTML 1 KB]
[PDF 562 KB]
(500)
|
|
|
2129 |
ZHANG Guangyu, CHEN Hong, CAI Xiaoxia |
| |
|
Blind source separation method for mixed digital modulation signals based on RobustICA |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2129-2132
[Abstract]
(750)
[HTML 1 KB]
[PDF 597 KB]
(425)
|
|
|
2105 |
YAN Dong, ZHANG Zhaoxia, ZHAO Yan, WANG Juanfen, YANG Lingzhen, SHI Junpeng |
| |
|
Cognitive radar waveform design for extended target detection based on signal-to-clutter-and-noise ratio |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2105-2108
[Abstract]
(734)
[HTML 1 KB]
[PDF 703 KB]
(651)
|
|
|
2093 |
QIU Jigang, LI Wenlong, YANG Jia |
| |
|
Path optimization algorithm for team navigation based on multiple point collaboration |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2093-2095
[Abstract]
(702)
[HTML 1 KB]
[PDF 608 KB]
(568)
|
|
|
2088 |
SONG Xiaoxiao, WANG Jun |
| |
|
Improved artificial bee colony algorithm based on P system for 0-1 knapsack problem |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2088-2092
[Abstract]
(703)
[HTML 1 KB]
[PDF 726 KB]
(607)
|
|
|
2077 |
YAO Hongliang, LI Daguang, LI Junzhao |
| |
|
Stock market volatility forecast based on calculation of characteristic hysteresis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2077-2082
[Abstract]
(547)
[HTML 1 KB]
[PDF 869 KB]
(595)
|
|
|
2056 |
XIE Pei, WU Xiaojun |
| |
|
Face recognition algorithm of collaborative representation based on Shearlet transform and uniform local binary pattern |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2056-2061
[Abstract]
(446)
[HTML 1 KB]
[PDF 1149 KB]
(695)
|
|
|
2051 |
FEI Bowen, LIU Wanjun, SHAO Liangshan, LIU Daqian, SUN Hu |
| |
|
Face recognition algorithm based on cluster-sparse of active appearance model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2051-2055
[Abstract]
(714)
[HTML 1 KB]
[PDF 864 KB]
(605)
|
|
|
2033 |
YANG Dayong, YANG Jianhua, LU Wei |
| |
|
Foreground detection algorithm based on dynamic threshold kernel density estimation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2033-2038
[Abstract]
(724)
[HTML 1 KB]
[PDF 971 KB]
(570)
|
|
|
1999 |
WANG Jinshui, XUE Xingsi, WENG Wei |
| |
|
Source code summarization technology based on syntactic analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1999-2003
[Abstract]
(604)
[HTML 1 KB]
[PDF 792 KB]
(690)
|
|
|
1975 |
XU Hao, CHEN Xue, HU Xiaofeng |
| |
|
Finding method of users' real-time demands for literature search systems |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1975-1978
[Abstract]
(514)
[HTML 1 KB]
[PDF 827 KB]
(478)
|
|
|
1969 |
XU Xiangping, LU Haiyan, CHENG Biyun |
| |
|
Improved artificial bee colony algorithm based on dynamic evaluation selection strategy |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1969-1974
[Abstract]
(530)
[HTML 1 KB]
[PDF 831 KB]
(522)
|
|
|
1945 |
ZHOU Xiang, LI Shaobo, YANG Guanci |
| |
|
Entity recognition of clothing commodity attributes |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1945-1949
[Abstract]
(1021)
[HTML 1 KB]
[PDF 769 KB]
(799)
|
|
|
1933 |
ZHANG Xin, HU Xintao, GUO Lei |
| |
|
Characterization of motor-related task brain states based on dynamic functional connectivity |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1933-1938
[Abstract]
(1370)
[HTML 1 KB]
[PDF 1042 KB]
(936)
|
|
|
1915 |
HAO Yanbin, GUO Xiao, YANG Naiding |
| |
|
Computing method of attribute granule structure of information system based on incremental computation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1915-1920
[Abstract]
(504)
[HTML 1 KB]
[PDF 924 KB]
(517)
|
|
|
1908 |
CHEN Wenxin, SHAO Liping, SHI Jun |
| |
|
Iterative adaptive reversible image watermarking algorithm combined with mean-adjustable integer transform |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1908-1914
[Abstract]
(612)
[HTML 1 KB]
[PDF 1400 KB]
(631)
|
|
|
1897 |
DU Ming, HAO Guosheng |
| |
|
DR-PRO: cloud-storage privilege revoking optimization mechanism based on dynamic re-encryption |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1897-1902
[Abstract]
(532)
[HTML 1 KB]
[PDF 880 KB]
(664)
|
|
|
1854 |
HE Tingting, PENG Yuanxi, LEI Yuanwu |
| |
|
Floating point divider design of high-performance double precision based on Goldschmidt's algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1854-1857
[Abstract]
(1085)
[HTML 1 KB]
[PDF 740 KB]
(799)
|
|
|
1849 |
LI Zhenju, LI Xuejun, XIE Jianwei, LI Yannan |
| |
|
Massive terrain data storage based on HBase |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1849-1853
[Abstract]
(688)
[HTML 1 KB]
[PDF 807 KB]
(734)
|
|
|
1824 |
CHEN Xiaolong, MA Lei, ZHANG Wenxu |
| |
|
Quantized distributed Kalman filtering based on dynamic weighting |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1824-1828
[Abstract]
(862)
[HTML 1 KB]
[PDF 766 KB]
(708)
|
|
|
1780 |
PANG Yongchun, SUN Ziwen, WANG Yao |
| |
|
Authentication algorithm of multi-touch based on mobile touch sensor |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1780-1784
[Abstract]
(795)
[HTML 1 KB]
[PDF 675 KB]
(579)
|
|
|
1749 |
SHEN Hui, YUAN Xiaotong, LIU Qingshan |
| |
|
Fast super-resolution reconstruction for single image based on predictive sparse coding |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1749-1752
[Abstract]
(790)
[HTML 1 KB]
[PDF 648 KB]
(606)
|
|
|
1734 |
ZHOU Zhenzhen, SUN Fengrong, SONG Shangling, WANG Lixin, LUAN Yuhuan, YAO Guihua |
| |
|
Spatial-temporal filtering for coronary angiography image sequence |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1734-1738
[Abstract]
(761)
[HTML 1 KB]
[PDF 784 KB]
(475)
|
|
|
1710 |
ZHANG Zheng, XIE Zhengguang, YANG Sanjia, JIANG Xinling |
| |
|
Expectation-maximization Bernoulli-asymmetric-Gaussian approximate message passing algorithm based on compressed sensing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1710-1715
[Abstract]
(722)
[HTML 1 KB]
[PDF 932 KB]
(623)
|
|
|
1705 |
SHEN Xueli, SHEN Jie |
| |
|
Optimization method of tracing distributed denial of service attacks based on autonomous system and dynamic probabilistic packet-marking |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1705-1709
[Abstract]
(686)
[HTML 1 KB]
[PDF 752 KB]
(640)
|
|
|
1678 |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen |
| |
|
Identity-based proxy re-signature scheme without bilinear pairing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1678-1682
[Abstract]
(659)
[HTML 1 KB]
[PDF 761 KB]
(488)
|
|
|
1673 |
WANG Guangsai, ZENG Guang, HAN Wenbao, LI Yongguang |
| |
|
Fast greatest common divisor algorithm based on
k-ary reduction |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1673-1677
[Abstract]
(589)
[HTML 1 KB]
[PDF 874 KB]
(472)
|
|
|
1617 |
WU Dinghui, KONG Fei, TIAN Na, JI Zhicheng |
| |
|
Teaching and peer-learning particle swarm optimization for multi-objective flexible job-shop scheduling problem |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1617-1622
[Abstract]
(688)
[HTML 1 KB]
[PDF 1018 KB]
(554)
|
|
|
1611 |
XIU Yu, WANG Jun, WANG Zhongqun, LIU Sanmin |
| |
|
Graph transduction via alternating minimization method based on multi-graph |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1611-1616
[Abstract]
(930)
[HTML 1 KB]
[PDF 929 KB]
(543)
|
|
|
1595 |
XU Haofeng, LING Qing |
| |
|
Decentralized online alternating direction method of multipliers |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1595-1599
[Abstract]
(929)
[HTML 1 KB]
[PDF 826 KB]
(686)
|
|
|
1531 |
HUANG Yanyan, PENG Hua |
| |
|
Joint blind estimation of multiple frequency offsets and multiple channels for distributed MIMO-OFDM systems |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1531-1536
[Abstract]
(661)
[HTML 1 KB]
[PDF 851 KB]
(577)
|
|
|
1499 |
JIN Shan, JIN Zhigang |
| |
|
Reasoning and forecasting of regional fire data based on adaptive fuzzy generalized regression neural network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1499-1504
[Abstract]
(733)
[HTML 1 KB]
[PDF 830 KB]
(672)
|
|
|
1479 |
PU Song, LYU Hongxia |
| |
|
Dynamic evaluation for train line planning in high speedrailway based on improved data envelopment analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1479-1482
[Abstract]
(639)
[HTML 1 KB]
[PDF 722 KB]
(694)
|
|
|
1474 |
ZHANG Wen, WANG Wenwei |
| |
|
Face recognition based on local binary pattern and deep learning |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1474-1478
[Abstract]
(1326)
[HTML 1 KB]
[PDF 765 KB]
(1619)
|
|
|
1471 |
ZHANG Zongnian, LIN Shengxin, MAO Huanzhang, HUANG Rentai |
| |
|
Cosparsity analysis subspace pursuit algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1471-1473
[Abstract]
(675)
[HTML 1 KB]
[PDF 595 KB]
(846)
|
|
|
1467 |
ZHOU Zhiping, MIAO Minmin |
| |
|
Dynamic time warping gesture authentication algorithm based on improved Mahalanobis distance |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1467-1470
[Abstract]
(847)
[HTML 1 KB]
[PDF 582 KB]
(923)
|
|
|
1462 |
JIANG Wei, LYU Xiaoqi, REN Xiaoying, REN Guoyin |
| |
|
3D segmentation method combining region growing and graph cut for coronary arteries computed tomography angiography images |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1462-1466
[Abstract]
(875)
[HTML 1 KB]
[PDF 814 KB]
(854)
|
|
|
1459 |
SONG Yuan, LIANG Xuechun, ZHANG Ran |
| |
|
Feature selection based on statistical random forest algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1459-1461
[Abstract]
(1498)
[HTML 1 KB]
[PDF 569 KB]
(1127)
|
|
|
1449 |
LIU Ting, PAN Guangzhen, YANG Jian, ZHANG Caihong |
| |
|
Improved Stoilov algorithm based on short distance priority and weighted mean |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1449-1453
[Abstract]
(700)
[HTML 1 KB]
[PDF 807 KB]
(696)
|
|
|
1444 |
ZHANG Jun, WANG Zhizhou, YANG Zhengling |
| |
|
Correction of single circular fisheye image |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1444-1448
[Abstract]
(1197)
[HTML 1 KB]
[PDF 782 KB]
(1048)
|
|
|
1406 |
ZHAN Huo, LIN Yaping, ZHANG Jiliang, TANG Bing |
| |
|
Reliability and randomness enhancing techniques for physical unclonable functions |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1406-1411
[Abstract]
(860)
[HTML 1 KB]
[PDF 927 KB]
(850)
|
|
|
1399 |
YUAN Simin, MA Chuangui, XIANG Shengqi |
| |
|
Identity-based group key exchange protocol for unbalanced network environment |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1399-1405
[Abstract]
(577)
[HTML 1 KB]
[PDF 1048 KB]
(722)
|
|
|
1385 |
LIU Dan, SHI Runhua, ZHONG Hong, ZHANG Shun, CUI Jie, XU Yan |
| |
|
Conditional privacy-preserving authentication scheme for vehicular Ad Hoc network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1385-1392
[Abstract]
(668)
[HTML 1 KB]
[PDF 1336 KB]
(775)
|
|
|
1361 |
YOU Ziyi, CHEN Shiguo, WANG Yi |
| |
|
Intelligent control based on
ε-support vector regression theory for regional traffic signal system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1361-1366
[Abstract]
(563)
[HTML 1 KB]
[PDF 901 KB]
(721)
|
|
|
1353 |
ZHOU Deyun, ZHANG Hao, ZHANG Kun, ZHANG Kai, PAN Qian |
| |
|
Range-parameterized square root cubature Kalman filter using hybrid coordinates for bearings-only target tracking |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1353-1357
[Abstract]
(692)
[HTML 1 KB]
[PDF 535 KB]
(655)
|
|
|
1333 |
WANG Shenwen, ZHANG Wensheng, QIN Jin, XIE Chengwang, GUO Zhaolu |
| |
|
Naïve differential evolution algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1333-1335
[Abstract]
(746)
[HTML 1 KB]
[PDF 434 KB]
(798)
|
|
|
1320 |
FEI Shaodong, YANG Yuzhen, LIU Peiyu, WANG Jian |
| |
|
Method of bursty events detection based on sentiment filter |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1320-1323
[Abstract]
(672)
[HTML 1 KB]
[PDF 624 KB]
(758)
|
|
|
1314 |
WANG Rongbo, LI Jie, HUANG Xiaoxi, ZHOU Changle, CHEN Zhiqun, WANG Xiaohua |
| |
|
Automatic Chinese sentences group method based on multiple discriminant analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1314-1319
[Abstract]
(583)
[HTML 1 KB]
[PDF 995 KB]
(802)
|
|
|
1310 |
HU Yang, DAI Dan, LIU Li, FENG Xupeng, LIU Lijun, HUANG Qingsong |
| |
|
Classification method of text sentiment based on emotion role model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1310-1313
[Abstract]
(675)
[HTML 1 KB]
[PDF 780 KB]
(878)
|
|
|
1302 |
YAN Hongwen, ZHOU Yamei, PAN Chu |
| |
|
Novel
K-medoids clustering algorithm based on breadth-first search |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1302-1305
[Abstract]
(734)
[HTML 1 KB]
[PDF 626 KB]
(756)
|
|
|
1284 |
YU Hongyan, CEN Kailun, YANG Tengxiao |
| |
|
Design and implementation of abnormal behavior detection system in cloud computing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1284-1289
[Abstract]
(710)
[HTML 1 KB]
[PDF 997 KB]
(946)
|
|
|
1273 |
LIU Yong, ZHANG Jinlong, ZHANG Yanbo, WANG Tao |
| |
|
Improved weighted centroid localization algorithm in narrow space |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1273-1275
[Abstract]
(684)
[HTML 1 KB]
[PDF 627 KB]
(751)
|
|
|
1242 |
ZENG Zhendong, CHEN Xiao, SUN bo, WU Shuxin |
| |
|
Sensor network queue management algorithm based on duty cycle control and delay guarantee |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1242-1245
[Abstract]
(507)
[HTML 1 KB]
[PDF 775 KB]
(623)
|
|
|
1196 |
ZHANG Youliang, ZHANG Hongjun, ZHANG Rui, YANG Bojiang, ZENG Zilin, GUO Lisheng |
| |
|
Ranking of military training performances based on data envelopment analysis of common weights |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1196-1199
[Abstract]
(914)
[HTML 1 KB]
[PDF 521 KB]
(728)
|
|
|
1174 |
SHEN Feng, LI Weidong |
| |
|
GPS signal tracking algorithm based on carrier frequency assist phase |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1174-1178
[Abstract]
(724)
[HTML 1 KB]
[PDF 707 KB]
(713)
|
|
|
1169 |
TU Ying, ZHANG Liping, WANG Chunhui, HOU Min, LIU Dongsheng |
| |
|
Clone genealogies extraction based on software evolution over multiple versions |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1169-1173
[Abstract]
(1686)
[HTML 1 KB]
[PDF 985 KB]
(775)
|
|
|
1154 |
YIN Wenke, WU Shanshan, DING Feng, XUN Zhide |
| |
|
Skyline based search results sorting method |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1154-1158
[Abstract]
(541)
[HTML 1 KB]
[PDF 871 KB]
(680)
|
|
|
1148 |
ZHENG Hui, LI Bing, CHEN Donglin, LIU Pingfeng |
| |
|
Personalized recommendation technique for mobile life services based on location cluster |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1148-1153
[Abstract]
(800)
[HTML 1 KB]
[PDF 842 KB]
(753)
|
|
|
1124 |
CHEN Xiaolong, WANG Xiaodong, LI Xin, YE Jianyu, YAO Yu |
| |
|
Echocardiography chamber segmentation based on integration of speeded up robust feature fitting and Chan-Vese model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1124-1128
[Abstract]
(593)
[HTML 1 KB]
[PDF 757 KB]
(678)
|
|
|
1120 |
GENG Dandan, WANG Tingting, CAO Lei, ZHANG Yu |
| |
|
Reconstruction of images at intermediate phases of lung 4D-CT data based on deformable registration |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1120-1123
[Abstract]
(608)
[HTML 1 KB]
[PDF 609 KB]
(742)
|
|
|
1093 |
ZHANG Sulan, ZHANG Jifu, HU Lihua, CHU Meng |
| |
|
Semantic annotation model for scenes based on formal concept analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1093-1096
[Abstract]
(865)
[HTML 1 KB]
[PDF 590 KB]
(804)
|
|
|
1075 |
HUANG Detian, ZHENG Lixin, LIU Peizhong, GU Peiting |
| |
|
Improved non-negativity and support constraint recursive inverse filtering algorithm for blind restoration based on interband prediction |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1075-1078
[Abstract]
(610)
[HTML 1 KB]
[PDF 792 KB]
(626)
|
|
|
1062 |
XIAO Huihui, WAN Changxuan, DUAN Yanming, ZHONG Qing |
| |
|
Flower pollination algorithm based on simulated annealing |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1062-1066
[Abstract]
(1061)
[HTML 1 KB]
[PDF 799 KB]
(24707)
|
|
|
1045 |
HUANG Huiqun |
| |
|
Partner selection based on grey relational analysis and particle swarm optimization algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1045-1048
[Abstract]
(885)
[HTML 1 KB]
[PDF 492 KB]
(689)
|
|
|
1040 |
LIN Guohan, ZHANG Jing, LIU Zhaohua |
| |
|
Particle swarm optimization with adaptive task allocation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1040-1044
[Abstract]
(2009)
[HTML 1 KB]
[PDF 695 KB]
(766)
|
|
|
1030 |
HAO Yanbin, GUO Xiao, YANG Naiding |
| |
|
Computing method of attribute information granule of information system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1030-1034
[Abstract]
(585)
[HTML 1 KB]
[PDF 761 KB]
(797)
|
|
|
1001 |
CHEN Yongheng, ZUO Wanli, LIN Yaojin |
| |
|
Application of labeled author topic model in scientific literature |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1001-1005
[Abstract]
(707)
[HTML 1 KB]
[PDF 712 KB]
(774)
|
|
|
985 |
WANG Hao, ZHANG Yuqing |
| |
|
Enhanced attack-resistible ant-based trust and reputation model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 985-990
[Abstract]
(782)
[HTML 1 KB]
[PDF 1189 KB]
(752)
|
|
|
981 |
XIE Shuzhen, TAN Xiaoqing |
| |
|
Efficient quantum information splitting scheme based on W states |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 981-984
[Abstract]
(699)
[HTML 1 KB]
[PDF 758 KB]
(704)
|
|
|
964 |
ZHANG Yue, ZHENG Dong, ZHANG Yinghui |
| |
|
Access control mechanism with dynamic authorization and file evaluation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 964-967
[Abstract]
(623)
[HTML 1 KB]
[PDF 619 KB]
(737)
|
|
|
950 |
XU Jinlong, ZHAO Rongcai, HAN Lin |
| |
|
Vector exploring path optimization algorithm of superword level parallelism with subsection constraints |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 950-955
[Abstract]
(917)
[HTML 1 KB]
[PDF 877 KB]
(707)
|
|
|
944 |
DU Xiongjie, WANG Min, TANG Xuehai, ZHANG Zhang |
| |
|
Scheduling mechanism based on service level objective in multi-tenant cluster |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 944-949
[Abstract]
(790)
[HTML 1 KB]
[PDF 949 KB]
(733)
|
|
|
934 |
WANG Aizhen, HOU Chengguo, REN Guofeng |
| |
|
Layered and cascaded stochastic resonance algorithm for direct sequence spread spectrum signal receiving |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 934-937
[Abstract]
(589)
[HTML 1 KB]
[PDF 738 KB]
(769)
|
|
|
921 |
ZHANG Kaiping, MAO Jianjing |
| |
|
Interference-aware routing for wireless sensor networks based on signal power random fading model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 921-924
[Abstract]
(669)
[HTML 1 KB]
[PDF 736 KB]
(966)
|
|
|
916 |
WU Xiaolin, SHAN Zhilong, CAO Shulin, CAO Chuqun |
| |
|
Monte Carlo boxed localization algorithm for mobile nodes based on received signal strength indication ranging |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (4): 916-920
[Abstract]
(707)
[HTML 1 KB]
[PDF 768 KB]
(885)
|
|
|
896 |
SHANG Qingjian, ZHANG Jinming, WANG Tingzhang |
| |
|
Weak signal detection in chaotic clutter based on effective
K-means and effective extreme learning machine |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 896-900
[Abstract]
(647)
[HTML 1 KB]
[PDF 747 KB]
(631)
|
|
|
891 |
ZHU Haiyang, CUI Bingmou, HU Zhiyao |
| |
|
Comprehensive coordination optimization of train break-up and make-up scheme based on hard time windows at railway technical station |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 891-895
[Abstract]
(692)
[HTML 1 KB]
[PDF 753 KB]
(483)
|
|
|
886 |
HU Jiajie, JIANG Letian |
| |
|
High performance simulation of Win32 environment in Android system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 886-890
[Abstract]
(798)
[HTML 1 KB]
[PDF 776 KB]
(507)
|
|
|
882 |
WANG Kechao, WANG Tiantian, REN Xiangmin, JIA Zongfu |
| |
|
Software fault localization approach by statistical analysis of failure context |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 882-885
[Abstract]
(824)
[HTML 1 KB]
[PDF 749 KB]
(434)
|
|
|
858 |
ZHANG Xiaolin, CUI Ningning, YANG Tao, LI Jie |
| |
|
Salient points extraction method of furnace flame image based on hierarchical adaptive algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 858-862
[Abstract]
(606)
[HTML 1 KB]
[PDF 710 KB]
(473)
|
|
|
830 |
ZHANG Xiangyu, TIAN Qingguo, GE Baozhen |
| |
|
Multi-constrained segmentation of 3D human point-cloud |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 830-834
[Abstract]
(747)
[HTML 1 KB]
[PDF 895 KB]
(495)
|
|
|
816 |
ZHANG Jing, SANG Qingbing |
| |
|
Quality assessment method of color stereoscopic images |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 816-820
[Abstract]
(865)
[HTML 1 KB]
[PDF 782 KB]
(552)
|
|
|
797 |
XUE Anrong, JIA Xiaoyan, GE Qinglong, YANG Xiaoqin |
| |
|
Context feature extraction method of terrorism behavior based on dependence maximization |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 797-801
[Abstract]
(624)
[HTML 1 KB]
[PDF 835 KB]
(506)
|
|
|
783 |
XIA Haiying, XU Luhui |
| |
|
Facial expression recognition based on feature fusion of active shape model differential texture and local directional pattern |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 783-786
[Abstract]
(720)
[HTML 1 KB]
[PDF 767 KB]
(581)
|
|
|
766 |
SANG Xiuli, XIAO Qingtai, WANG Hua, HAN Jiguang |
| |
|
Support vector machine combined model forecast based on ensemble empirical mode decomposition-principal component analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 766-769
[Abstract]
(705)
[HTML 1 KB]
[PDF 792 KB]
(726)
|
|
|
761 |
WANG Weidong, LIU Bing, GUAN Hongjie, ZHOU Yong, XIA Shixiong |
| |
|
Spectral embedded clustering algorithm based on kernel function |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 761-765
[Abstract]
(969)
[HTML 1 KB]
[PDF 846 KB]
(557)
|
|
|
717 |
XIANG Lingyun, WANG Xinhui |
| |
|
Text steganographic method with hierarchical security |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 717-721
[Abstract]
(605)
[HTML 1 KB]
[PDF 816 KB]
(552)
|
|
|
712 |
ZUO Liming, CHEN Renqun, GUO Hongli |
| |
|
Provable identity-based signcryption scheme |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 712-716
[Abstract]
(1077)
[HTML 1 KB]
[PDF 770 KB]
(549)
|
|
|
663 |
QI Xuemei, WANG Hongtao, CHEN Fulong, TANG Qimei, SUN Yunxiang |
| |
|
Novel quantum differential evolutionary algorithm for blocking flowshop scheduling |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 663-667
[Abstract]
(667)
[HTML 1 KB]
[PDF 746 KB]
(661)
|
|
|
610 |
REN Xiuli, WANG Chong |
| |
|
Multi-path routing protocol based on three-dimensional space and regional co-evolution in wireless sensor network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (3): 610-614
[Abstract]
(666)
[HTML 1 KB]
[PDF 739 KB]
(584)
|
|
|
590 |
YIN Jun, DONG Lida, CHI Tianyang |
| |
|
Mobile robot motion estimation based on classified feature points |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 590-594
[Abstract]
(792)
[HTML 1 KB]
[PDF 779 KB]
(448)
|
|
|
566 |
ZHANG Lei, YANG Chenghu, LU Meijin |
| |
|
Optimal strategy for production-distribution network of perishable products based on WCVaR |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 566-571
[Abstract]
(622)
[HTML 1 KB]
[PDF 1090 KB]
(478)
|
|
|
550 |
GUO Rongzuo, FAN Xiangkui, CUI Dongxia, LI Ming |
| |
|
Reliability modeling and analysis of embedded system hardware based on Copula function |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 550-554
[Abstract]
(732)
[HTML 1 KB]
[PDF 843 KB]
(387)
|
|
|
545 |
DONG Yuehua, DAI Yuqian |
| |
|
Automatic software test data generation based on hybrid particle swarm optimization |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 545-549
[Abstract]
(601)
[HTML 1 KB]
[PDF 776 KB]
(462)
|
|
|
531 |
LIANG Zengyan, LIU Benyong |
| |
|
Fast algorithm for color image haze removal using principle component analysis and atmospheric scattering mode |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 531-534
[Abstract]
(838)
[HTML 1 KB]
[PDF 621 KB]
(717)
|
|
|
515 |
ZHENG Bingbin, FAN Xinnan, LI Min, ZHANG Ji |
| |
|
Trajectory segment-based abnormal behavior detection method using LDA model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 515-518
[Abstract]
(868)
[HTML 1 KB]
[PDF 830 KB]
(569)
|
|
|
506 |
QIN Longlong, QIAN Yuan, ZHANG Xiaoyan, HOU Xue, ZHOU Qin |
| |
|
MAP super-resolution reconstruction based on adaptive constraint regularization HL-MRF prior model |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 506-509
[Abstract]
(1580)
[HTML 1 KB]
[PDF 716 KB]
(411)
|
|
|
502 |
ZHANG Yupu, YANG Qi, ZHANG Qi |
| |
|
Image multi-scale recognition method based on computer vision |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 502-505
[Abstract]
(720)
[HTML 1 KB]
[PDF 726 KB]
(744)
|
|
|
499 |
PU Guolin, QIU Yuhui |
| |
|
Image classification based on global dictionary learning method with sparse representation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 499-501
[Abstract]
(1101)
[HTML 1 KB]
[PDF 568 KB]
(18311)
|
|
|
495 |
ZHANG Yongku, LI Yunfeng, SUN Jinguang |
| |
|
Image retrieval based on multi-feature fusion |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 495-498
[Abstract]
(937)
[HTML 1 KB]
[PDF 608 KB]
(968)
|
|
|
476 |
KONG Fei, WU Dinghui, JI Zhicheng |
| |
|
Flexible job-shop scheduling optimization based on two-layer particle swarm optimization algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 476-480
[Abstract]
(637)
[HTML 1 KB]
[PDF 674 KB]
(532)
|
|
|
470 |
ZHANG Cheng, LIU Yadong, LI Yuan |
| |
|
Nonlinear feature extraction based on discriminant diffusion map analysis |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 470-475
[Abstract]
(682)
[HTML 1 KB]
[PDF 868 KB]
(463)
|
|
|
452 |
LIU Runtao, ZHAO Zhenguo, TIAN Guangyue |
| |
|
Space vector model algorithm for query of continuous and multidirectional regions |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 452-455
[Abstract]
(575)
[HTML 1 KB]
[PDF 614 KB]
(502)
|
|
|
424 |
DAI Wei, LIU Zhi, LIU Yihe |
| |
|
Function pointer attack detection with address integrity checking |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 424-429
[Abstract]
(682)
[HTML 1 KB]
[PDF 973 KB]
(510)
|
|
|
407 |
DU Guiying, HUANG Zhenjie |
| |
|
Efficient certificate-based verifiably encrypted signature scheme |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 407-411
[Abstract]
(662)
[HTML 1 KB]
[PDF 777 KB]
(548)
|
|
|
378 |
WANG Zhengying, YU Jiong, YING Changtian, LU Liang |
| |
|
Energy-efficient strategy of distributed file system based on data block clustering storage |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 378-382
[Abstract]
(663)
[HTML 1 KB]
[PDF 766 KB]
(480)
|
|
|
374 |
RUI Zhiliang, ZHU Yuquan, GENG Xia, CHEN Geng |
| |
|
microRNA identification method based on feature clustering and random subspace |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 374-377
[Abstract]
(654)
[HTML 1 KB]
[PDF 644 KB]
(416)
|
|
|
369 |
LIU Xiaohong, QU Zhijian, CAO Yanfeng, ZHANG Xianwei, FENG Gang |
| |
|
Multi-universe parallel quantum-inspired evolutionary algorithm based on adaptive mechanism |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 369-373
[Abstract]
(728)
[HTML 1 KB]
[PDF 738 KB]
(518)
|
|
|
364 |
LUO Yiping, DENG Fei, ZHOU Bifeng |
| |
|
Non-fragile synchronous guaranteed cost control for complex dynamic network with time-varying delay |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 364-368
[Abstract]
(797)
[HTML 1 KB]
[PDF 578 KB]
(450)
|
|
|
358 |
YAN Lin, LIU Tao, YAN Shuo, LI Feng, RUAN Ning |
| |
|
Data combination method based on structure's granulation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 358-363
[Abstract]
(582)
[HTML 1 KB]
[PDF 1014 KB]
(402)
|
|
|
351 |
LIU Deliang, LIU Kaihua, YU Jiexiao, ZHANG Liang, ZHAO Yang |
| |
|
DOA estimation for wideband chirp signal with a few snapshots |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 351-353
[Abstract]
(689)
[HTML 1 KB]
[PDF 538 KB]
(471)
|
|
|
317 |
WANG Jing, GAO Zehua, GAO Feng, PAN Xiang |
| |
|
Enhanced frequency-domain channel contention mechanism in wireless local area network |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 317-321
[Abstract]
(1036)
[HTML 1 KB]
[PDF 718 KB]
(28901)
|
|
|
313 |
PENG Yali, XU Hong, YIN Hong, ZHANG Zhiming |
| |
|
Routing protocol for bus vehicle network with cyclical movement |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 313-316
[Abstract]
(604)
[HTML 1 KB]
[PDF 806 KB]
(454)
|
|
|
309 |
ZHOU Haiyang, CHE Ming |
| |
|
Communication scheme design for embedded control node cluster |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (2): 309-312
[Abstract]
(534)
[HTML 1 KB]
[PDF 751 KB]
(428)
|
|
|
294 |
JIAO Fangyuan, LI Jia, LI Wei |
| |
|
Characteristic information extraction and dynamic warning algorithm of watershed disaster |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 294-298
[Abstract]
(626)
[HTML 1 KB]
[PDF 767 KB]
(531)
|
|
|
289 |
FU Hua, ZI Hai |
| |
|
Dynamic prediction model for gas emission quantity based on least square support vector machine and Kalman filter |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 289-293
[Abstract]
(554)
[HTML 1 KB]
[PDF 726 KB]
(620)
|
|
|
283 |
LI Pengju, LIU Hui, WANG Bin, WANG Long |
| |
|
Blowing state recognition of basic oxygen furnace based on feature of flame color texture complexity |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 283-288
[Abstract]
(563)
[HTML 1 KB]
[PDF 881 KB]
(519)
|
|
|
262 |
LU Yang, BAO Shudi, ZHOU Xiang, CHEN Jinheng |
| |
|
Real-time human identification algorithm based on dynamic electrocardiogram signals |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 262-264
[Abstract]
(746)
[HTML 1 KB]
[PDF 603 KB]
(575)
|
|
|
252 |
JI Lianen, ZOU Yinlong, XIN Bing |
| |
|
Data processing techniques on sensors of smart terminals for 3D navigation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 252-256
[Abstract]
(612)
[HTML 1 KB]
[PDF 1006 KB]
(602)
|
|
|
239 |
YUAN Xi, LI Qiang |
| |
|
Research and development of intelligent healthy community system based on mobile Internet |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 239-242
[Abstract]
(712)
[HTML 1 KB]
[PDF 762 KB]
(1213)
|
|
|
211 |
HOU He, LYU Xiaoqi, JIA Dongzheng, YU Hefeng |
| |
|
Curved planar reformation algorithm based on coronary artery outline extraction by multi-planar reformation |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 211-214
[Abstract]
(1305)
[HTML 1 KB]
[PDF 784 KB]
(632)
|
|
|
206 |
NIE Xiao, CHEN Leiting |
| |
|
Boundary handling algorithm for weakly compressible fluids |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 206-210
[Abstract]
(657)
[HTML 1 KB]
[PDF 794 KB]
(514)
|
|
|
198 |
JIANG Xingguo, LI Zhifeng, ZHANG Long |
| |
|
Adaptive improvement of video compressed sensing based on linear dynamic system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 198-201
[Abstract]
(605)
[HTML 1 KB]
[PDF 672 KB]
(599)
|
|
|
189 |
LIU Hong, LIU Rong, LI Shuling |
| |
|
Acceleration gesture recognition based on random projection |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 189-193
[Abstract]
(829)
[HTML 1 KB]
[PDF 719 KB]
(632)
|
|
|
183 |
ZHANG Jing, WU Husheng |
| |
|
Modified binary cuckoo search algorithm for multidimensional knapsack problem |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 183-188
[Abstract]
(777)
[HTML 1 KB]
[PDF 813 KB]
(666)
|
|
|
179 |
WU Zongyu, LUO Wencai |
| |
|
Construction method of radial basis function approximation model based on parameter optimization of space decomposition |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 179-182
[Abstract]
(580)
[HTML 1 KB]
[PDF 701 KB]
(603)
|
|
|
147 |
ZHANG Danpu, FU Zhongliang, WANG Lili, LI Xin |
| |
|
Multi-label classification algorithm based on floating threshold classifiers combination |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 147-151
[Abstract]
(825)
[HTML 1 KB]
[PDF 777 KB]
(593)
|
|
|
140 |
DU Yuanwei, SHI Fangyuan, YANG Na |
| |
|
Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 140-146
[Abstract]
(850)
[HTML 1 KB]
[PDF 1250 KB]
(795)
|
|
|
108 |
LI Qiusheng, WU Yadong, LIN Maosong, WANG Song, WANG Haiyang, FENG Xinmiao |
| |
|
Ranking-
k: effective subspace dominating query algorithm |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 108-114
[Abstract]
(670)
[HTML 1 KB]
[PDF 1078 KB]
(780)
|
|
|
68 |
FENG Liping, SONG Lipeng, WANG Hongbin, ZHAO Qingshan |
| |
|
Propagation modeling and analysis of peer-to-peer botnet |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 68-71
[Abstract]
(807)
[HTML 1 KB]
[PDF 543 KB]
(671)
|
|
|
27 |
XIONG Ying, MAO Xuesong, LIU Xing, WANG Yaling, JIN Gang |
| |
|
Transmission length design of IP network with wavelength-selectable reconfigurable optical add/drop multiplexer |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 27-30
[Abstract]
(639)
[HTML 1 KB]
[PDF 560 KB]
(625)
|
|
|
23 |
PAN Hao, CHEN Meng |
| |
|
Optimization of anti-collision algorithm for radio frequency identification reader system in Internet of things |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 23-26
[Abstract]
(911)
[HTML 1 KB]
[PDF 721 KB]
(642)
|
|
|
19 |
MU Yuchao, ZHANG Xiaohong |
| |
|
Adaptive tree grouping and blind separation anti-collision algorithm for radio frequency identification system |
| |
|
|
Journal of Computer Applications
2015 Vol.35 (1): 19-22
[Abstract]
(1438)
[HTML 1 KB]
[PDF 583 KB]
(566)
|
|
|
3545 |
ZHAO Yudan WANG Qian FAN Jiulun |
| |
|
Texture images retrieval based on Float-LBP |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3545-3548
[Abstract]
(251)
[HTML 1 KB]
[PDF 596 KB]
(777)
|
|
|
3540 |
XU Zhan CAO Zhe |
| |
|
Video background completion with complexly moving camera |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3540-3544
[Abstract]
(276)
[HTML 1 KB]
[PDF 1032 KB]
(692)
|
|
|
3491 |
TAO Yongcai HE Zongzhen SHI Lei WEI Lin CAO Yangjie |
| |
|
Personalized microblogging recommendation based on weighted dynamic degree of interest |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3491-3496
[Abstract]
(262)
[HTML 1 KB]
[PDF 895 KB]
(851)
|
|
|
3470 |
ZHANG Liping LI Song MA Lin TANG Yuanxin HAO Xiaohong |
| |
|
Methods of Voronoi diagram construction and near neighbor relations query |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3470-3474
[Abstract]
(265)
[HTML 1 KB]
[PDF 754 KB]
(739)
|
|
|
3446 |
QU Sheng SHI Wuxi XIU Chunbo |
| |
|
Criticality analysis method based on fuzzy Bayesian networks |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3446-3450
[Abstract]
(217)
[HTML 1 KB]
[PDF 825 KB]
(704)
|
|
|
3157 |
ZHAO Yuan LU Tianbo |
| |
|
Multi-dimensional trust management mechanism for peer-to-peer networks |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3157-3159
[Abstract]
(345)
[HTML 1 KB]
[PDF 566 KB]
(615)
|
|
|
3135 |
LIANG Junjie LIU Qiongni YU Dunhui |
| |
|
Personalization recommendation algorithm for Web resources based on ontology |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3135-3139
[Abstract]
(369)
[HTML 1 KB]
[PDF 752 KB]
(666)
|
|
|
3086 |
CHEN Bingliang ZHANG Yuhui JI Zhiyuan |
| |
|
Performance tests and analysis of distributed evolutionary algorithms |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3086-3090
[Abstract]
(338)
[HTML 1 KB]
[PDF 745 KB]
(643)
|
|
|
3078 |
WANG Mingkun YUAN Shaoguang ZHU Yongli WANG Dewen |
| |
|
Real-time clustering for massive data using Storm |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3078-3081
[Abstract]
(432)
[HTML 1 KB]
[PDF 611 KB]
(875)
|
|
|
3024 |
WAGN Shengzheng HUANG Yugui |
| |
|
Method of marine radar image simulation based on electronic chart display information system |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 3024-3028
[Abstract]
(360)
[HTML 1 KB]
[PDF 806 KB]
(411)
|
|
|
3020 |
WU Milong QIU Weibao LIU Baoqiang CHI Liyang MU Peitian LI Xiaolong ZHENG Hairong |
| |
|
High speed data transfer and imaging for intravascular ultrasound |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 3020-3023
[Abstract]
(339)
[HTML 1 KB]
[PDF 598 KB]
(414)
|
|
|
2971 |
YANG Zhuzhong ZHOU Jiliu LANG Fangnian |
| |
|
Improving ideal low-pass filter with noise detection algorithm |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2971-2975
[Abstract]
(581)
[HTML 1 KB]
[PDF 799 KB]
(542)
|
|
|
2913 |
LI Lin LIAN Jin WU Yue YE Mao |
| |
|
Survey on image holistic scene understanding based on probabilistic graphical model |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2913-2921
[Abstract]
(564)
[HTML 1 KB]
[PDF 1472 KB]
(731)
|
|
|
2895 |
ZHANG Cheng LI Na LI Yuan PANG Yujun |
| |
|
Application of kernel parameter discriminant method in kernel principal component analysis |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2895-2898
[Abstract]
(278)
[HTML 1 KB]
[PDF 549 KB]
(581)
|
|
|
2761 |
HAN Guodong KONG Feng SHEN Jianliang |
| |
|
Hierarchical networks-on-chip routing algorithm based on source region path selection |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2761-2765
[Abstract]
(417)
[HTML 1 KB]
[PDF 862 KB]
(507)
|
|
|
2630 |
SUN Yongyong HUANG Guangqiu |
| |
|
Matrix obfuscation based on data refinement |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2630-2634
[Abstract]
(316)
[HTML 1 KB]
[PDF 655 KB]
(444)
|
|
|
2585 |
YU Juan WANG Wenxian ZHONG Qinglun |
| |
|
Regional blood supply system optimization under stochastic demand |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2585-2589
[Abstract]
(295)
[HTML 1 KB]
[PDF 628 KB]
(497)
|
|
|
2571 |
LIN Mingming QIU Yunfei SHAO Liangshan |
| |
|
Consumption sentiment classification based on two-dimensional coordinate mapping method |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2571-2576
[Abstract]
(277)
[HTML 1 KB]
[PDF 1043 KB]
(551)
|
|
|
2543 |
WANG Xiaojuan LIU Sanyang TIAN Wenkai |
| |
|
Improved backtracking search optimization algorithm with new effective mutation scale factor and greedy crossover strategy |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2543-2546
[Abstract]
(467)
[HTML 1 KB]
[PDF 681 KB]
(699)
|
|
|
2434 |
WEI Bing GUO Yutang SONG Jie ZHANG Lei |
| |
|
New NAND device management solution with high storage density |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2434-2437
[Abstract]
(399)
[HTML 1 KB]
[PDF 619 KB]
(340)
|
|
|
2415 |
NIU Guochen ZHANG Weicheng LI Ziwei |
| |
|
Path planning algorithm based on regional-advance strategy for aircraft fuel tank inspection robot |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2415-2418
[Abstract]
(375)
[HTML 1 KB]
[PDF 528 KB]
(532)
|
|
|
2385 |
WANG Yong RAO Qinfei TANG Jing YUAN Chaoyan |
| |
|
Automatic coding algorithm based on color structure light |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2385-2389
[Abstract]
(375)
[HTML 1 KB]
[PDF 779 KB]
(528)
|
|
|
2202 |
WANG Chao BI Guihong ZHANG Shouming WEI Chuntao |
| |
|
Agent-based language competition model with social circle network |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2202-2208
[Abstract]
(335)
[HTML 1 KB]
[PDF 1102 KB]
(496)
|
|
|
2192 |
GAO Xiaolong ZHU Xinde ZHAO Jianmin CAO Cungen XU Huiying WU De |
| |
|
Building and consistency analysis of movie ontology |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2192-2196
[Abstract]
(347)
[HTML 1 KB]
[PDF 881 KB]
(561)
|
|
|
1978 |
JI Xiang GUO Zhigang WANG Kai |
| |
|
Design of multi-carrier transceivers based on time domain improved discrete Fourier transform |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1978-1982
[Abstract]
(289)
[HTML 1 KB]
[PDF 720 KB]
(561)
|
|
|
1848 |
ZHANG Xiaoqing YUE Qiang |
| |
|
Cloud resource game allocation based on cooperation |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1848-1851
[Abstract]
(346)
[HTML 1 KB]
[PDF 698 KB]
(643)
|
|
|
1843 |
HE Huaiwen FU Yu YANG Yihong XIAO Tao |
| |
|
Service performance analysis of cloud computing center based on M/M/n/n+r queuing model |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1843-1847
[Abstract]
(409)
[HTML 1 KB]
[PDF 634 KB]
(582)
|
|
|
1792 |
DU Yibo |
| |
|
Workflow weighting colored Petri-net modeling method |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1792-1797
[Abstract]
(281)
[HTML 1 KB]
[PDF 677 KB]
(349)
|
|
|
1746 |
GAO Peng GUO Lijun ZHU Yiwei ZHANG Rong |
| |
|
Multi-camera person identification based on hidden markov model |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1746-1752
[Abstract]
(373)
[HTML 1 KB]
[PDF 1042 KB]
(371)
|
|
|
1711 |
ZHANG Jing ZHANG Quan LIU Yi GUI Zhiguo |
| |
|
Symmetry optimization of polar coordinate back-projection reconstruction algorithm for fan beam CT |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1711-1714
[Abstract]
(473)
[HTML 1 KB]
[PDF 592 KB]
(332)
|
|
|
1622 |
XUE Xingsi |
| |
|
Large scale ontology aligning approach based on NSGA-Ⅱ |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1622-1625
[Abstract]
(330)
[HTML 1 KB]
[PDF 754 KB]
(352)
|
|
|
1604 |
OU Guojian WANG Weiqiang JIANG Qingping |
| |
|
Fast algorithm for sparse decomposition of real first-order polynomial phase signal based on group testing |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1604-1607
[Abstract]
(302)
[HTML 1 KB]
[PDF 705 KB]
(478)
|
|
|
1573 |
XUE Rui XU Xichao WEI Qiang |
| |
|
New signal system design for satellite navigation system |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1573-1577
[Abstract]
(489)
[HTML 1 KB]
[PDF 756 KB]
(521)
|
|
|
1563 |
ZHOU Mu ZHANG Qiao QIU Feng |
| |
|
Fingerprinting location method for WLAN using physical neighbor points information |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1563-1566
[Abstract]
(315)
[HTML 1 KB]
[PDF 587 KB]
(392)
|
|
|
1511 |
JI Jun XING Feifei DU Jun SHIning CUI Yaodong |
| |
|
Deterministic algorithm for optimal two-stage cutting layouts with same-shape block |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1511-1515
[Abstract]
(245)
[HTML 1 KB]
[PDF 654 KB]
(395)
|
|
|
1499 |
WANG Pei ZHANG Genyao LI Zhi WANG Jing |
| |
|
Wavelet threshold denoising algorithm based on new threshold function |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1499-1502
[Abstract]
(428)
[HTML 1 KB]
[PDF 578 KB]
(475)
|
|
|
1386 |
LU Yuanyao ZHOU Ni |
| |
|
Improved speech endpoint detection algorithm in strong noise environment |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1386-1390
[Abstract]
(573)
[HTML 1 KB]
[PDF 690 KB]
(601)
|
|
|
1243 |
XIAO Heng LV Shaohe |
| |
|
Efficient spectrum sensing mechanism with interference cancellation in cognitive radio network |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1243-1246
[Abstract]
(601)
[HTML 1 KB]
[PDF 582 KB]
(441)
|
|
|
1213 |
LI Hongbo JIANG Lin WANG Haitang |
| |
|
Simulation on low speed stable operation of full-order observer for induction motor |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1213-1216
[Abstract]
(775)
[HTML 1 KB]
[PDF 638 KB]
(462)
|
|
|
1209 |
HAO Dapeng FU Weiping WANG Wen |
| |
|
Mobile robot safety navigation based on time to contact |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1209-1212
[Abstract]
(487)
[HTML 1 KB]
[PDF 590 KB]
(449)
|
|
|
1201 |
BAO Jikai LUO Changyuan ZHOU Daoshui LI |
| |
|
Equipment system availability analysis and project optimization based on cannibalization |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1201-1204
[Abstract]
(567)
[HTML 1 KB]
[PDF 670 KB]
(646)
|
|
|
1182 |
YE Shuangqing YANG Xiaomei |
| |
|
Super resolution image reconstruction based on wavelet transform and non-local means |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1182-1186
[Abstract]
(668)
[HTML 1 KB]
[PDF 789 KB]
(490)
|
|
|
1118 |
WEI Shimin DAI Duhong |
| |
|
Multi-Agent cooperative E-commerce recommender system model |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1118-1121
[Abstract]
(530)
[HTML 1 KB]
[PDF 649 KB]
(844)
|
|
|
1114 |
ZHAO Ting XIAO Ruliang SUN Cong CHEN Hongtao LI Yuanxin LI Hongen |
| |
|
Personalized recommendation algorithm integrating roulette walk and combined time effect |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1114-1117
[Abstract]
(660)
[HTML 1 KB]
[PDF 790 KB]
(554)
|
|
|
1105 |
YUN Hongyan XU Liangjian GUO Zhenbo WEI Xiaoyan |
| |
|
Modeling of marine ecology ontology |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1105-1108
[Abstract]
(573)
[HTML 1 KB]
[PDF 609 KB]
(501)
|
|
|
1047 |
HUANG Dan |
| |
|
Attribute-based encryption scheme combined with trust management in wireless sensor network |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1047-1050
[Abstract]
(533)
[HTML 1 KB]
[PDF 686 KB]
(711)
|
|
|
1042 |
MO Lequn GUO Gengqi LI Feng |
| |
|
Security-analysis of a kind of generalized group-oriented threshold signcryption schemes |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1042-1046
[Abstract]
(383)
[HTML 1 KB]
[PDF 797 KB]
(520)
|
|
|
1019 |
GU Chunsheng JING Zhengjun LI Hongwei YU Zhimin |
| |
|
Security Analysis of Range Query with Single Assertion on Encrypted Data |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1019-1024
[Abstract]
(688)
[HTML 1 KB]
[PDF 962 KB]
(463)
|
|
|
969 |
LIU Yangyang XIE Zheng CHEN Zhi |
| |
|
Improved algorithm for vital arc of maximum dynamic flow |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 969-972
[Abstract]
(664)
[HTML 1 KB]
[PDF 622 KB]
(548)
|
|
|
963 |
LI Dujuan ZHOU Zifeng WU Cheng-mao |
| |
|
Multi-user chaotic communication and its bit error rate based on orthogonal chaos |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (4): 963-968
[Abstract]
(554)
[HTML 1 KB]
[PDF 1043 KB]
(588)
|
|
|
902 |
ZHANG Jinghua WANG Renhuang YUE Hongwei |
| |
|
Research on dynamic stability of badminton |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 902-906
[Abstract]
(514)
[HTML 1 KB]
[PDF 754 KB]
(415)
|
|
|
873 |
LIU Zunxiong HUANG Zhiqiang LIU Jiangwei CHEN Ying |
| |
|
Financial failure prediction using truncated Hinge loss support vector machine with smoothly clipped absolute deviation penalty |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 873-878
[Abstract]
(834)
[HTML 1 KB]
[PDF 878 KB]
(535)
|
|
|
865 |
HAN Guanghui ZENG Cheng |
| |
|
Improvement of Boyer-Moore string matching algorithm |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 865-868
[Abstract]
(551)
[HTML 1 KB]
[PDF 489 KB]
(599)
|
|
|
857 |
ZHANG Tianjiong WANG Zheng |
| |
|
Runtime error site analysis tool based on variable tracking |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 857-860
[Abstract]
(550)
[HTML 1 KB]
[PDF 574 KB]
(488)
|
|
|
833 |
ZHANG Yi LIU Yuran LUO Yuan |
| |
|
Vision-based gesture recognition method and its implementation on digital signal processor |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 833-836
[Abstract]
(546)
[HTML 1 KB]
[PDF 762 KB]
(581)
|
|
|
801 |
JIANG Wei LI Xiaolong YANG Yongqing ZHANG Heng |
| |
|
New image denoising method based on rational-order differential |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 801-805
[Abstract]
(652)
[HTML 1 KB]
[PDF 792 KB]
(396)
|
|
|
785 |
HU Qingxin CHEN Yun FANG Jing |
| |
|
Tone mapping algorithm based on multi-scale decomposition |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 785-789
[Abstract]
(816)
[HTML 1 KB]
[PDF 1008 KB]
(506)
|
|
|
658 |
LI Lina ZENG Qingxun GAN Xiaoye LIANG Desu |
| |
|
Under-determined blind source separation based on potential function and compressive sensing |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 658-662
[Abstract]
(637)
[HTML 1 KB]
[PDF 843 KB]
(700)
|
|
|
653 |
LI Yanjie HE Jingsong LI Ran |
| |
|
Intellectual property core design of communication terminal based on 1553B bus |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 653-657
[Abstract]
(561)
[HTML 1 KB]
[PDF 657 KB]
(397)
|
|
|
649 |
HOU Yunshan ZHANG Xincheng JIN Yong |
| |
|
Adaptive beamforming algorithm based on interference-noise covariance matrix reconstruction |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 649-652
[Abstract]
(600)
[HTML 1 KB]
[PDF 715 KB]
(730)
|
|
|
644 |
SHEN Jian XIA Jingbo FU Kai SUN Yu |
| |
|
Active congestion control strategy based on historical probability in delay tolerant networks |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 644-648
[Abstract]
(648)
[HTML 1 KB]
[PDF 739 KB]
(432)
|
|
|
632 |
WU Dong |
| |
|
Active queue management algorithm of queue delay control |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (3): 632-634
[Abstract]
(769)
[HTML 1 KB]
[PDF 565 KB]
(462)
|
|
|
610 |
CHEN Ping TANG Xinmin XING Jian |
| |
|
Taxiway conflict control strategy based on objective perception events driven model |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 610-614
[Abstract]
(620)
[HTML 0 KB]
[PDF 714 KB]
(582)
|
|
|
601 |
ZHENG Yanbin WANG Ning DUAN Lingyu |
| |
|
Multi-Agent urban traffic coordination control research based on game learning |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 601-604
[Abstract]
(543)
[HTML 0 KB]
[PDF 626 KB]
(637)
|
|
|
576 |
ZHAO Liang CHEN Min LI Hongchen |
| |
|
Optimized data association algorithm based on visual simultaneous localization and mapping |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 576-579
[Abstract]
(547)
[HTML 0 KB]
[PDF 612 KB]
(654)
|
|
|
562 |
SHENG Shuai CAO Liping HUANG Zengxi WU Pengfei |
| |
|
Image super-resolution algorithm based on improved sparse coding |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 562-566
[Abstract]
(630)
[HTML 0 KB]
[PDF 904 KB]
(626)
|
|
|
546 |
YANG Huixian CAI Yongyong ZHAi Yunlong LI Qiuqiu FENG Junpeng |
| |
|
Single sample face recognition based on orthogonal gradient binary pattern |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 546-549
[Abstract]
(601)
[HTML 0 KB]
[PDF 590 KB]
(579)
|
|
|
538 |
ZHAO Yongli ZHONG Heng LI Dingyuan HU Tao |
| |
|
Simultaneous recursive identification algorithm of system order and parameters based on determinant ratio method |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 538-541
[Abstract]
(735)
[HTML 0 KB]
[PDF 501 KB]
(548)
|
|
|
519 |
SHI Xin ZHANG Tao LEI Luning |
| |
|
Dynamic evaluation of ecological security based on set pair analysis and Markov chain |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 519-522
[Abstract]
(588)
[HTML 0 KB]
[PDF 711 KB]
(587)
|
|
|
501 |
YANG Chao YAN Xuefeng ZHANG Jie ZHOU Yong |
| |
|
Weight-based cloud reasoning algorithm |
| |
|
|
Journal of Computer Applications
2014 Vol.34 (2): 501-505
[Abstract]
(678)
[HTML 0 KB]
[PDF 732 KB]
(687)
|
|
|
496 |
QI Hao WANG Fubao DENG Hong ZHAO Kun WANG Liang MA Yin DUAN Weijun |
| |
|
Quantum-inspired clonal algorithm based method for optimizing neural networks |
| |
|
|
Journal of Computer Applications &nb |