|
Other articles related with "na":
|
0 |
JIANG Zhangtao, LI Xin, ZHANG Shihao, ZHAO Xinyang |
|
|
Predictive model of Weibo public opinion heat analysis by integrating BERT and X-means algorithm |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(1)
[HTML 1 KB]
[PDF 1478 KB]
()
|
|
0 |
QIN Xiaolin, GU Xu, LI Dicheng, XU Haiwen |
|
|
Survey and prospect of large language models |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(123)
[HTML 1 KB]
[PDF 2099 KB]
(85)
|
|
0 |
|
|
|
Bayesian Membership Inference Attacks for GAN |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(8)
[HTML 1 KB]
[PDF 742 KB]
(5)
|
|
0 |
|
|
|
Capacitated Vehicle routing problem solving method based on improved MAML and graph variational autoencoder |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(5)
[HTML 1 KB]
[PDF 0 KB]
(3)
|
|
362 |
Ming JIANG, Linqin WANG, Hua LAI, Shengxiang GAO |
|
|
End-to-end Vietnamese text normalization method based on editing constraints |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 362-370
[Abstract]
(53)
[HTML 0 KB]
[PDF 1452 KB]
(28)
|
|
0 |
|
|
|
Active protection scheme for deep neural network model based on four-dimensional Chen chaotic system. |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Probabilistic generative graph attention network method for multidimensional time series root cause analysis |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(3)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
0 |
|
|
|
Interactive visualization method of multi-category urban spatiotemporal big data based on point aggregation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(5)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
0 |
|
|
|
Prediction of drug-target interactions based on sequence and multi-view networks |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(18)
[HTML 1 KB]
[PDF 0 KB]
(1)
|
|
0 |
CHEN Lu, WANG Huaiyao, LIU Jingyang, YAN Tao, CHEN Bin |
|
|
Robotic Grasp Detection with Feature Fusion of Spatial and Fourier Domains under Low-Light Environments |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 3392 KB]
(5)
|
|
0 |
|
|
|
New federated learning scheme balancing efficiency and security |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 0 KB]
()
|
|
0 |
|
|
|
Contrastive Learning Nested Named Entity Recognition Combined with Boundary Information |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 777 KB]
(6)
|
|
0 |
|
|
|
Design and practice of intelligent tutoring algorithm based on personalized emotional awareness |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 513 KB]
(7)
|
|
0 |
|
|
|
7T ultra-high field magnetic resonance parallel imaging algorithm based on residual complex convolution network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(36)
[HTML 1 KB]
[PDF 958 KB]
(5)
|
|
79 |
Jiayuan LI, Xiaodong WANG, Qixue HE |
|
|
Application and performance optimization of CNN enhanced Informer model in industrial time series prediction |
|
|
|
Journal of Computer Applications
0 Vol. (): 79-83
[Abstract]
(21)
[HTML 0 KB]
[PDF 760 KB]
(5)
|
|
72 |
Haigang JIANG, Min ZHU, Xiaoqiang JIANG |
|
|
Device fault diagnosis method based on knowledge graph and multi-task learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 72-78
[Abstract]
(16)
[HTML 0 KB]
[PDF 2501 KB]
(0)
|
|
66 |
Xiaozhi XU, Yanfang MAO, Xiaoxiang LYU |
|
|
Named entity recognition of electric power research results based on Transformer and keyword information aggregation |
|
|
|
Journal of Computer Applications
0 Vol. (): 66-71
[Abstract]
(18)
[HTML 0 KB]
[PDF 1795 KB]
(0)
|
|
61 |
Yang GAO, Han LI, Weihe ZHONG |
|
|
Chemical safety accident named entity recognition based on self-attention and SoftLexicon |
|
|
|
Journal of Computer Applications
0 Vol. (): 61-65
[Abstract]
(22)
[HTML 0 KB]
[PDF 1191 KB]
(0)
|
|
50 |
Deyang KONG, Yun ZHANG, Weiguang WANG, Zijie CHEN, Yongguo LIU |
|
|
Multilevel-component joint Chinese word embedding model and application of core drug identification |
|
|
|
Journal of Computer Applications
0 Vol. (): 50-54
[Abstract]
(24)
[HTML 0 KB]
[PDF 2668 KB]
(23)
|
|
375 |
Wenke JIANG, Xueli XIN, Yongxu MU, Xiaoshuang WANG |
|
|
Application of artificial intelligence in field of financial and accounting audit |
|
|
|
Journal of Computer Applications
0 Vol. (): 375-380
[Abstract]
(13)
[HTML 0 KB]
[PDF 572 KB]
(0)
|
|
370 |
Yuchun XU, Jianjun XU |
|
|
Automatic detection method of epileptic EEG based on residual network |
|
|
|
Journal of Computer Applications
0 Vol. (): 370-374
[Abstract]
(18)
[HTML 0 KB]
[PDF 1793 KB]
(0)
|
|
35 |
Wei ZHANG, Zhuyu CHU, Xueqi CHEN, Xuehui FU, Chenchen WANG, Chen LI, Haiyan WU |
|
|
Aspect-based sentiment analysis with syntactic prompt |
|
|
|
Journal of Computer Applications
0 Vol. (): 35-43
[Abstract]
(20)
[HTML 0 KB]
[PDF 2571 KB]
(3)
|
|
349 |
Yunhao ZHOU, Tianhong WANG, Dunjie YOU, Yiping XU, Junjie MAO |
|
|
Plunger lift intelligent control evaluation algorithm based on convolutional neural network |
|
|
|
Journal of Computer Applications
0 Vol. (): 349-356
[Abstract]
(17)
[HTML 0 KB]
[PDF 5947 KB]
(0)
|
|
316 |
Jingyu LI, Juxia DING |
|
|
Development and key system analysis of intelligent rail transit |
|
|
|
Journal of Computer Applications
0 Vol. (): 316-322
[Abstract]
(9)
[HTML 0 KB]
[PDF 1957 KB]
(0)
|
|
296 |
Ke ZHANG, Yuangang PENG, Yueming WANG, Jianxin TANG |
|
|
Test tube and liquid level recognition algorithm based on improved YOLOv8 |
|
|
|
Journal of Computer Applications
0 Vol. (): 296-301
[Abstract]
(20)
[HTML 0 KB]
[PDF 2535 KB]
(0)
|
|
280 |
Jiayu CAO, Guifang QIAO, Mengyuan CHEN, Xu ZOU, Di LIU |
|
|
Improvement strategy of YOLO algorithm for small target detection from high-altitude view |
|
|
|
Journal of Computer Applications
0 Vol. (): 280-285
[Abstract]
(17)
[HTML 0 KB]
[PDF 3952 KB]
(0)
|
|
257 |
Ji WANG, Yuanjia HUANG, Wei FANG, Wenwu XIE, Wenchang XIONG, Xingwang LI |
|
|
End-to-end license plate recognition method based on 2D space traversal LSTM network |
|
|
|
Journal of Computer Applications
0 Vol. (): 257-261
[Abstract]
(15)
[HTML 0 KB]
[PDF 2015 KB]
(1)
|
|
212 |
Fangrong ZHOU, Yifan WANG, Yi MA, Gang WEN, Guofang WANG, Yutang MA, Hao GENG |
|
|
Remote sensing image fusion enhancement model for power facilities based on deep convolutional network |
|
|
|
Journal of Computer Applications
0 Vol. (): 212-216
[Abstract]
(16)
[HTML 0 KB]
[PDF 2643 KB]
(0)
|
|
184 |
Yuwan LIU, Zhiyi GUO, Guanyu XING, Yanli LIU |
|
|
Variation-aware online dynamic illumination estimation method for indoor scenes |
|
|
|
Journal of Computer Applications
0 Vol. (): 184-191
[Abstract]
(13)
[HTML 0 KB]
[PDF 4045 KB]
(0)
|
|
18 |
Siyuan REN, Cheng PENG, Ke CHEN, Zhiyi HE |
|
|
Cross-lingual knowledge transfer method based on alignment of representational space structures |
|
|
|
Journal of Computer Applications
0 Vol. (): 18-23
[Abstract]
(18)
[HTML 0 KB]
[PDF 737 KB]
(3)
|
|
170 |
Na QIN, Yantao LIU |
|
|
DAP-NAD algorithm for emergency multicast communications |
|
|
|
Journal of Computer Applications
0 Vol. (): 170-175
[Abstract]
(17)
[HTML 0 KB]
[PDF 2496 KB]
(0)
|
|
159 |
Linlong ZENG, Miao CHENG, Shaobing ZHANG, Yu ZENG |
|
|
High-resolution real-time semantic segmentation algorithm for edge deployment |
|
|
|
Journal of Computer Applications
0 Vol. (): 159-163
[Abstract]
(14)
[HTML 0 KB]
[PDF 1520 KB]
(0)
|
|
143 |
Yunlong PENG, Han LI, Tian SANG, Hongming CHENG |
|
|
Pollutant transmission model in marine food web based on complex network |
|
|
|
Journal of Computer Applications
0 Vol. (): 143-147
[Abstract]
(15)
[HTML 0 KB]
[PDF 2327 KB]
(0)
|
|
101 |
Zhihui TAO, Pengliu TAN, Teng XU, Sijia YANG, Ruoxin TU |
|
|
Multi-notary consensus cross-chain method based on elliptic curve cryptography |
|
|
|
Journal of Computer Applications
0 Vol. (): 101-105
[Abstract]
(21)
[HTML 0 KB]
[PDF 2358 KB]
(0)
|
|
0 |
|
|
|
Data augmentation method for abnormal passenger behavior in elevators based on dynamic graph convolutional network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 678 KB]
(6)
|
|
0 |
ZHANG Qing, YANG Fan, FANG Yuhan |
|
|
Chinese Spelling Correction Algorithm Based on Multi-Modal Information Fusion |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(28)
[HTML 1 KB]
[PDF 668 KB]
(7)
|
|
0 |
|
|
|
YOLOv5s-MRD: an efficient fire and smoke detection algorithm for complex scenarios based on YOLOv5s |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(34)
[HTML 1 KB]
[PDF 922 KB]
(30)
|
|
0 |
|
|
|
Distribution adaptation and dynamic curriculum pseudo-labeling framework for semi-supervised fire detection |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 454 KB]
(5)
|
|
0 |
|
|
|
Time series anomaly detection based on frequency domain enhanced graph variational learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(27)
[HTML 1 KB]
[PDF 491 KB]
(16)
|
|
0 |
LI Zhuoran, LI Hua, WANG Tong, JIANG Chaozhe |
|
|
Lightweight human pose estimation based on fused feature state space model#br#
#br#
|
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 4402 KB]
(1)
|
|
0 |
|
|
|
Multi-Scale Feature Fusion Sentiment Classification Based on Bidirectional Cross-Attention |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(2)
[HTML 0 KB]
[PDF 0 KB]
()
|
|
0 |
|
|
|
Blockchain-based identity management system for internet of things |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 714 KB]
(7)
|
|
0 |
|
|
|
Equivariant graph neural network-based simulator for lagrangian particle flow |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1433 KB]
(3)
|
|
0 |
|
|
|
Improvement method of heuristic vehicle routing algorithm based on constrained spectral clustering |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 1032 KB]
(3)
|
|
0 |
|
|
|
Source code vulnerability detection method based on Transformer-GCN |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 946 KB]
(3)
|
|
0 |
|
|
|
Thoracic disease classification based on cross-scale attention network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 1323 KB]
(1)
|
|
0 |
|
|
|
Heterogeneous Environment Aware Streaming Graph Partitioning for Power-Law Graphs |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 1612 KB]
()
|
|
0 |
|
|
|
Neural architecture search for multi-tissue segmentation using convolutional and transformer-based networks in glioma segmentation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(26)
[HTML 1 KB]
[PDF 1537 KB]
(4)
|
|
0 |
|
|
|
Sleep apnea detection based on universal wristband |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1447 KB]
(2)
|
|
0 |
|
|
|
Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 2154 KB]
(4)
|
|
0 |
|
|
|
Dependency type and distance enhanced aspect based sentiment analysis model |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 1067 KB]
(2)
|
|
0 |
|
|
|
Semi-supervised object detection framework guided by self-paced learning#br# |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 873 KB]
(3)
|
|
0 |
|
|
|
Dual-population dual-stage evolutionary algorithm for complex constrained multi-objective optimization problems |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(61)
[HTML 1 KB]
[PDF 1324 KB]
(5)
|
|
0 |
|
|
|
Recognition and optimization of hallucination phenomenon in large language models |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(27)
[HTML 1 KB]
[PDF 921 KB]
(4)
|
|
0 |
|
|
|
Fine-grained result verifiable searchable encryption scheme with designated tester in cloud |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(36)
[HTML 1 KB]
[PDF 1386 KB]
(2)
|
|
0 |
|
|
|
Secure and efficient frequency estimation method based on shuffled differential privacy |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 1572 KB]
(3)
|
|
0 |
|
|
|
Large scale IoT binary component identification based on named entity recognition |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 710 KB]
()
|
|
0 |
|
|
|
Research review on explainable artificial intelligence in internet of things applications |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 1208 KB]
()
|
|
0 |
|
|
|
fedPF: Federated learning for personalization and fairness |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 1569 KB]
(1)
|
|
0 |
|
|
|
Object detection uncertainty measurement scheme based on guide to the expression of uncertainty in measurement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 837 KB]
(4)
|
|
0 |
|
|
|
Gradient-discriminative and feature norm-driven open-world object detection |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2)
[HTML 1 KB]
[PDF 1021 KB]
(1)
|
|
0 |
|
|
|
Batch process quality prediction model using improved time-domain convolutional network with multi-head self-attention |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(11)
[HTML 1 KB]
[PDF 1518 KB]
(1)
|
|
0 |
|
|
|
Review of interpretable deep knowledge tracing methods |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 870 KB]
(2)
|
|
0 |
|
|
|
Personalized learning recommendation in collaboration with knowledge graph and large language model |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 810 KB]
(5)
|
|
0 |
|
|
|
Nested named entity recognition combined with boundary generation by multi-objective learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(11)
[HTML 1 KB]
[PDF 737 KB]
(2)
|
|
0 |
|
|
|
Multi-object tracking algorithm for construction machinery in transmission line scenarios |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 1372 KB]
()
|
|
0 |
|
|
|
Cloud-based conditional broadcast proxy re-encryption scheme |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(6)
[HTML 1 KB]
[PDF 880 KB]
()
|
|
0 |
|
|
|
Helmet wearing detection algorithm for complex scenarios based on cross-layer multi-scale feature fusion |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(7)
[HTML 1 KB]
[PDF 1085 KB]
(4)
|
|
0 |
|
|
|
Chinese spelling correction model ReLM enhanced with deep semantic features |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 651 KB]
(3)
|
|
0 |
|
|
|
Optimization method for sequence labeling combined with entity boundary offset |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(7)
[HTML 1 KB]
[PDF 649 KB]
()
|
|
0 |
|
|
|
Metaphor detection technique for improving representation in linguistic rules |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 702 KB]
(2)
|
|
0 |
|
|
|
Non-redundant and statistically significant discriminative high utility pattern mining algorithm |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 1300 KB]
(6)
|
|
0 |
|
|
|
Layered solving method for virtual maintenance posture in narrow aircraft space |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(18)
[HTML 1 KB]
[PDF 1454 KB]
(1)
|
|
0 |
|
|
|
The SLAM Algorithm Based on Point-Line Features and Multi-IMU Fusion |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 2515 KB]
(3)
|
|
0 |
|
|
|
Knowledge graph representation learning model incorporating multi-step relational paths and entity description information |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(11)
[HTML 1 KB]
[PDF 940 KB]
(3)
|
|
3639 |
Ruiyan LIANG, Hui YANG |
|
|
Lightweight fall detection algorithm framework based on RPEpose and XJ-GCN |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3639-3646
[Abstract]
(105)
[HTML 0 KB]
[PDF 1283 KB]
(22)
|
|
3487 |
Shuaihua ZHANG, Shufen ZHANG, Mingchuan ZHOU, Chao XU, Xuebin CHEN |
|
|
Malicious traffic detection model based on semi-supervised federated learning |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3487-3494
[Abstract]
(64)
[HTML 0 KB]
[PDF 748 KB]
(20)
|
|
3403 |
Guoxiang CHEN, Ziqiang YU, Haoyu ZHAO |
|
|
Distributed
k-nearest neighbor query algorithm for moving objects in dynamic road network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3403-3410
[Abstract]
(56)
[HTML 0 KB]
[PDF 758 KB]
(22)
|
|
0 |
SHENG Kun, WANG Zhongqin |
|
|
Synaesthesia metaphor analysis based on large language models and data augmentation#br#
#br#
|
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(32)
[HTML 1 KB]
[PDF 603 KB]
(14)
|
|
0 |
|
|
|
Integrating internal and external data for out-of-distribution detection training & testing |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(8)
[HTML 1 KB]
[PDF 965 KB]
()
|
|
0 |
|
|
|
Named entity recognition for sensitive information based on data augmentation and residual networks |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 745 KB]
(1)
|
|
0 |
|
|
|
Few-shot object detection algorithm based on new class feature enhancement and metric mechanism |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 2939 KB]
()
|
|
0 |
|
|
|
Association rule extraction method based on triadic fuzzy linguistic formal context |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 1072 KB]
(3)
|
|
0 |
|
|
|
Nested entity recognition model for wind power equipment based on differential boundary enhancement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(13)
[HTML 1 KB]
[PDF 1128 KB]
(2)
|
|
0 |
|
|
|
Medical image segmentation network with content-guided multi-angle feature fusion |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 1900 KB]
()
|
|
3521 |
Jinxing TU, Zhixiong LI, Jianqiang HUANG |
|
|
Dynamic partition algorithm for diagonal sparse matrix vector multiplication based on GPU |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3521-3529
[Abstract]
(63)
[HTML 1 KB]
[PDF 1105 KB]
(27)
|
|
0 |
|
|
|
Cognitive load EEG recognition model integrating variational graph autoencoder and local-global graph network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(7)
[HTML 1 KB]
[PDF 1565 KB]
()
|
|
0 |
|
|
|
Aspect-based sentiment analysis method with code generation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 637 KB]
(6)
|
|
0 |
|
|
|
Point cloud classification and segmentation method based on adaptive dynamic graph convolution and parameter-free attention |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 1641 KB]
(2)
|
|
0 |
|
|
|
Segmentation network of coronary artery structure from CT angiography images based on multi-scale spatial features |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 2882 KB]
()
|
|
3307 |
Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG |
|
|
Multi-organization collaborative data sharing scheme with dual authorization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3307-3314
[Abstract]
(74)
[HTML 0 KB]
[PDF 2796 KB]
(17)
|
|
3288 |
Wanting JI, Wenyi LU, Yuhang MA, Linlin DING, Baoyan SONG, Haolin ZHANG |
|
|
Machine reading comprehension event detection based on relation-enhanced graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3288-3293
[Abstract]
(68)
[HTML 0 KB]
[PDF 996 KB]
(14)
|
|
3275 |
Yanbo LI, Qing HE, Shunyi LU |
|
|
Aspect sentiment triplet extraction integrating semantic and syntactic information |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3275-3280
[Abstract]
(64)
[HTML 0 KB]
[PDF 1353 KB]
(11)
|
|
3260 |
Nengqiang XIANG, Xiaofei ZHU, Zhaoze GAO |
|
|
Information diffusion prediction model of prototype-aware dual-channel graph convolutional neural network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3260-3266
[Abstract]
(71)
[HTML 0 KB]
[PDF 1549 KB]
(7)
|
|
3223 |
Xiaoyu HUA, Dongfen LI, You FU, Kejun BI, Shi YING, Ruijin WANG |
|
|
Industrial chain risk assessment and early warning model combining hierarchical graph neural network and long short-term memory |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3223-3231
[Abstract]
(82)
[HTML 0 KB]
[PDF 2113 KB]
(32)
|
|
3191 |
Cheng WANG, Yang WANG, Yingjiao RONG |
|
|
YOLOv7-MSBP target location algorithm for character recognition of power distribution cabinet |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3191-3199
[Abstract]
(96)
[HTML 0 KB]
[PDF 3829 KB]
(52)
|
|
3185 |
Xukang KAN, Gefei SHI, Xuerong YANG |
|
|
ORB-SLAM2 algorithm based on dynamic feature point filtering and optimization of keyframe selection |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3185-3190
[Abstract]
(88)
[HTML 0 KB]
[PDF 3326 KB]
(17)
|
|
3177 |
Pengbo WANG, Wuyang SHAN, Jun LI, Mao TIAN, Deng ZOU, Zhanfeng FAN |
|
|
Robust splicing forensic algorithm against high-intensity salt-and-pepper noise |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3177-3184
[Abstract]
(71)
[HTML 0 KB]
[PDF 2871 KB]
(12)
|
|
3167 |
Hua HUANG, Ziyi YANG, Xiaolong LI, Chuang LI |
|
|
Predictive business process monitoring method based on concept drift |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3167-3176
[Abstract]
(84)
[HTML 0 KB]
[PDF 2286 KB]
(15)
|
|
3151 |
Antai SUN, Ye LIU, Dongmei XU |
|
|
Dynamic surface asymptotic compensation algorithm for multi-agent systems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3151-3157
[Abstract]
(75)
[HTML 0 KB]
[PDF 2187 KB]
(25)
|
|
3105 |
Shengmin ZHENG, Xiaodong FU |
|
|
Incomplete ordinal preference prediction using mixture of Plackett-Luce models |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3105-3113
[Abstract]
(74)
[HTML 0 KB]
[PDF 995 KB]
(12)
|
|
3074 |
Feng CAO, Xiaoling YANG, Jianbing YI, Jun LI |
|
|
Contradiction separation super-deduction method and application |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3074-3080
[Abstract]
(82)
[HTML 0 KB]
[PDF 1422 KB]
(19)
|
|
3067 |
Yushan JIANG, Yangsen ZHANG |
|
|
Large language model-driven stance-aware fact-checking |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3067-3073
[Abstract]
(120)
[HTML 0 KB]
[PDF 1036 KB]
(31)
|
|
3039 |
Linhao LI, Xiaoqian ZHANG, Yao DONG, Xu WANG, Yongfeng DONG |
|
|
Knowledge tracing based on personalized learning and deep refinement |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3039-3046
[Abstract]
(97)
[HTML 0 KB]
[PDF 2200 KB]
(52)
|
|
3032 |
Han WANG, Yuan WAN, Dong WANG, Yiming DING |
|
|
Robust weight matrix combination selection method of broad learning system |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3032-3038
[Abstract]
(95)
[HTML 0 KB]
[PDF 3288 KB]
(36)
|
|
2983 |
Renke SUN, Zhiyu HUANGFU, Hu CHEN, Zhongnian LI, Xinzheng XU |
|
|
Survey of neural architecture search |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 2983-2994
[Abstract]
(221)
[HTML 0 KB]
[PDF 3686 KB]
(183)
|
|
0 |
ZHANG Xiaojun, HAO Yunpu, LI Lei, LI Chenyang, ZHOU Ziyu |
|
|
Data tamper-proof batch auditing scheme based on industrial cloud storage systems |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 658 KB]
()
|
|
0 |
HU Jie, ZHENG Qiyang, SUN Jun, ZHANG Yan |
|
|
Multi-label classification model based on multi-relational label graph and local dynamic reconstruction learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 485 KB]
(3)
|
|
0 |
JIANG Zhanjun, LI Yang, LIAN Jing, MIAO Xinfa |
|
|
Coordinate enhancement and multi-source sampling for brain tumor image segmentation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(16)
[HTML 1 KB]
[PDF 1515 KB]
()
|
|
0 |
|
|
|
Automatic speech segmentation algorithm based on syllable type recognition |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(12)
[HTML 1 KB]
[PDF 1377 KB]
()
|
|
0 |
|
|
|
Multimodal Fusion Recommendation based on Joint Self-supervised Learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 1299 KB]
(1)
|
|
0 |
|
|
|
Deep symbol regression method based on Transformer |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(30)
[HTML 1 KB]
[PDF 1048 KB]
(6)
|
|
0 |
|
|
|
Multimodal sentiment analysis model with cross-modal text-information enhancement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1053 KB]
(4)
|
|
0 |
|
|
|
Volumetric spline parameterization method via high-dimensional quasi-conformal mapping |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 2869 KB]
(2)
|
|
0 |
|
|
|
Network traffic classification model integrating variational autoencoder and AdaBoost-CNN |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(14)
[HTML 1 KB]
[PDF 1463 KB]
(2)
|
|
0 |
|
|
|
Hyper-relational knowledge graph completion methods with fusing noise filtering |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 1170 KB]
(5)
|
|
0 |
|
|
|
Multi-source data representation learning model based on tensorized graph convolutional network and contrastive learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 1686 KB]
(1)
|
|
0 |
|
|
|
Psychological Counseling Human-machine Dialogue Dataset Construction for Dialogue Generation and Mental Disorder Detection |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 2920 KB]
(8)
|
|
0 |
|
|
|
Chinese image captioning method based on multi-level visual and text-image dynamic interaction |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(29)
[HTML 1 KB]
[PDF 1997 KB]
(2)
|
|
2931 |
Zhigang XU, Chuang ZHANG |
|
|
Multi-level color restoration of mural image based on gated positional encoding |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2931-2937
[Abstract]
(111)
[HTML 0 KB]
[PDF 2838 KB]
(18)
|
|
2855 |
Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE |
|
|
Distributed power allocation algorithm based on graph convolutional network for D2D communication systems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2855-2862
[Abstract]
(72)
[HTML 0 KB]
[PDF 2647 KB]
(20)
|
|
2829 |
Guanglei YAO, Juxia XIONG, Guowu YANG |
|
|
Flower pollination algorithm based on neural network optimization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2829-2837
[Abstract]
(82)
[HTML 0 KB]
[PDF 1631 KB]
(25)
|
|
0 |
|
|
|
Low-dose CT image reconstruction using combined low-rank and total variation regularization |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 1260 KB]
(12)
|
|
0 |
|
|
|
Review of Checkpoint Technology for Multiple Computing Scenarios |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(38)
[HTML 1 KB]
[PDF 1482 KB]
(10)
|
|
0 |
|
|
|
Heterogeneous graph attention network for relation extraction based on feature combination |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(15)
[HTML 1 KB]
[PDF 10661 KB]
(7)
|
|
0 |
|
|
|
WISA2024+70 Deep Variational Text Clustering Model Based on Distribution Augmentation |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(2)
[HTML 0 KB]
[PDF 0 KB]
(1)
|
|
0 |
|
|
|
Certificateless ring signature scheme based on SM2 |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 644 KB]
(2)
|
|
0 |
|
|
|
Port operation scheduling algorithm based on improved NSGA-II algorithm under dual carbon goals |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 1482 KB]
(5)
|
|
0 |
|
|
|
Named entity recognition model based on global information fusion and multi-dimensional relation perception |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(46)
[HTML 1 KB]
[PDF 1568 KB]
(19)
|
|
0 |
|
|
|
A Document-Level Relation Extraction Model Based on Anaphora and Logical Reasoning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(59)
[HTML 1 KB]
[PDF 1103 KB]
(24)
|
|
0 |
|
|
|
Privacy Protection Method for Consortium Blockchain based on SM2 Linkable Ring Signature |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 640 KB]
(10)
|
|
0 |
|
|
|
Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(26)
[HTML 1 KB]
[PDF 785 KB]
(6)
|
|
0 |
|
|
|
Vehicular edge computing scheme with task offloading and resource optimization |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(11)
[HTML 1 KB]
[PDF 1435 KB]
(3)
|
|
0 |
HE Yi, XIAO Yinan, WEI Yunkai, LENG Supeng |
|
|
User Data Management and Control in Internet of Behaviors: A Review |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(9)
[HTML 1 KB]
[PDF 1200 KB]
(7)
|
|
0 |
LI Hui, JIA Bingzhi, WANG Chenxi, DONG Ziyu, LI Jilong, ZHONG Zhaoman, CHEN Yanyan |
|
|
Underwater image enhancement method based on SwinGAN generative adversarial network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(24)
[HTML 1 KB]
[PDF 2350 KB]
(8)
|
|
0 |
CHEN Xin, LIU Zhonghui, MIN Fan |
|
|
Concept set construction of reduced formal context and its recommendation application |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(29)
[HTML 1 KB]
[PDF 1533 KB]
(2)
|
|
0 |
|
|
|
Aspect-based sentiment analysis model integrating syntax and sentiment knowledge |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1068 KB]
(2)
|
|
0 |
|
|
|
Visual interactive information reconstruction method for machine understanding |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(18)
[HTML 1 KB]
[PDF 1171 KB]
(1)
|
|
2588 |
Zhonghua LI, Yunqi BAI, Xuejin WANG, Leilei HUANG, Chujun LIN, Shiyu LIAO |
|
|
Low illumination face detection based on image enhancement |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2588-2594
[Abstract]
(25)
[HTML 0 KB]
[PDF 2413 KB]
(17)
|
|
2551 |
Yuhan LIU, Genlin JI, Hongping ZHANG |
|
|
Video pedestrian anomaly detection method based on skeleton graph and mixed attention |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2551-2557
[Abstract]
(164)
[HTML 0 KB]
[PDF 2081 KB]
(30)
|
|
2514 |
Fang LEI, Yongcai NIU |
|
|
Channel estimation method for low earth orbit satellite MIMO-OTFS system based on improved generalized orthogonal matching pursuit |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2514-2520
[Abstract]
(168)
[HTML 0 KB]
[PDF 2232 KB]
(27)
|
|
2506 |
Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO |
|
|
Application of improved hunter-prey optimization algorithm in WSN coverage |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2506-2513
[Abstract]
(26)
[HTML 0 KB]
[PDF 6422 KB]
(18)
|
|
2476 |
Quanmei ZHANG, Runping HUANG, Fei TENG, Haibo ZHANG, Nan ZHOU |
|
|
Automatic international classification of disease coding method incorporating heterogeneous information |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2476-2482
[Abstract]
(177)
[HTML 0 KB]
[PDF 2137 KB]
(18)
|
|
2466 |
Qiangkui LENG, Xuezi SUN, Xiangfu MENG |
|
|
Oversampling method for imbalanced data based on sample potential and noise evolution |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2466-2475
[Abstract]
(183)
[HTML 0 KB]
[PDF 2780 KB]
(34)
|
|
2455 |
Haoyu ZHAO, Ziqiang YU, Xiaomeng CHEN, Guoxiang CHEN, Hui ZHU, Bohan LI |
|
|
Top-
K optimal route query problem with keyword search support |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2455-2465
[Abstract]
(28)
[HTML 0 KB]
[PDF 2879 KB]
(29)
|
|
2400 |
Pengqi GAO, Heming HUANG, Yonghong FAN |
|
|
Fusion of coordinate and multi-head attention mechanisms for interactive speech emotion recognition |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2400-2406
[Abstract]
(208)
[HTML 0 KB]
[PDF 2819 KB]
(30)
|
|
2393 |
Yuqing WANG, Guangli ZHU, Wenjie DUAN, Shuyu LI, Ruotong ZHOU |
|
|
Sentiment classification model of psychological counseling text based on attention over attention mechanism |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2393-2399
[Abstract]
(178)
[HTML 0 KB]
[PDF 1474 KB]
(33)
|
|
2387 |
Kaipeng XUE, Tao XU, Chunjie LIAO |
|
|
Multimodal sentiment analysis network with self-supervision and multi-layer cross attention |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2387-2392
[Abstract]
(28)
[HTML 0 KB]
[PDF 1572 KB]
(21)
|
|
2381 |
Chun SUN, Chunlong HU, Shucheng HUANG |
|
|
Consistency preserving age estimation method by ensemble ranking |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2381-2386
[Abstract]
(22)
[HTML 0 KB]
[PDF 2290 KB]
(10)
|
|
2372 |
Shuai FU, Xiaoying GUO, Ruyi BAI, Tao YAN, Bin CHEN |
|
|
Age estimation method combining improved CloFormer model and ordinal regression |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2372-2380
[Abstract]
(21)
[HTML 0 KB]
[PDF 3667 KB]
(12)
|
|
2365 |
Chunxue ZHANG, Liqing QIU, Cheng’ai SUN, Caixia JING |
|
|
Purchase behavior prediction model based on two-stage dynamic interest recognition |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2365-2371
[Abstract]
(20)
[HTML 0 KB]
[PDF 1474 KB]
(17)
|
|
2319 |
Zheyuan SHEN, Keke YANG, Jing LI |
|
|
Personalized federated learning method based on dual stream neural network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2319-2325
[Abstract]
(336)
[HTML 0 KB]
[PDF 2185 KB]
(231)
|
|
0 |
GE Chao, YE Shuiqing, WANG Hong, YAO Zheng |
|
|
Stability analysis of nonlinear time-delay system based on memory saturated controller |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(8)
[HTML 1 KB]
[PDF 594 KB]
()
|
|
392 |
Kun FU, Shicong YING, Tingting ZHENG, Jiajie QU, Jingyuan CUI, Jianwei LI |
|
|
Graph data augmentation method for few-shot node classification |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 392-402
[Abstract]
(43)
[HTML 1 KB]
[PDF 2174 KB]
(115)
|
|
0 |
WANG Caiqi, CUI Xining, XIONG Yi, WU Shiqian |
|
|
Adaptive extended RRT
* path planning algorithm based on node-to-obstacle distance |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(30)
[HTML 1 KB]
[PDF 2892 KB]
(205)
|
|
490 |
Zhiqiang REN, Xuebin CHEN |
|
|
FedAud: adaptive defense mechanism based on historical model updates |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 490-496
[Abstract]
(38)
[HTML 1 KB]
[PDF 2229 KB]
(17)
|
|
0 |
ZENG Biqing, ZHONG Guangbin, WEN James Zhiqing |
|
|
Few-shot Named Entity Recognition Based on Decomposed Fuzzy Span |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(20)
[HTML 1 KB]
[PDF 1826 KB]
()
|
|
0 |
|
|
|
Consultation recommendation method based on knowledge graph and dialogue structure |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(5)
[HTML 1 KB]
[PDF 1761 KB]
(2)
|
|
0 |
|
|
|
Improved ring theory-based evolutionary algorithm with new repair optimization operator for solving the multi-dimensional knapsack problem |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(17)
[HTML 1 KB]
[PDF 1434 KB]
(4)
|
|
0 |
|
|
|
Channel estimation of reconfigurable intelligence surface assisted communication system based on deep learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(19)
[HTML 1 KB]
[PDF 1334 KB]
(8)
|
|
0 |
|
|
|
Estimation and classification of brain functional networks based on temporal correlation information fusion |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(22)
[HTML 1 KB]
[PDF 1407 KB]
(3)
|
|
0 |
|
|
|
Multimodal sarcasm detection model integrating contrastive learning with sentiment |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(10)
[HTML 1 KB]
[PDF 1714 KB]
()
|
|
40 |
Xueqiang LYU, Tao WANG, Xindong YOU, Ge XU |
|
|
HTLR: named entity recognition framework with hierarchical fusion of multi-knowledge |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 40-47
[Abstract]
(72)
[HTML 1 KB]
[PDF 1466 KB]
(28)
|
|
3435 |
Wenbo LIU, Lianfei YU, Dongmei XIE, Chuang CAI, Zhijian QU, Chongguang REN |
|
|
Long-term prediction model of time series based on multi-scale feature fusion |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3435-3441
[Abstract]
(69)
[HTML 1 KB]
[PDF 1095 KB]
(39)
|
|
0 |
SHE Benjie, SU Shuzhi, ZHU Yanmin, HUA Jian, Wang Chao |
|
|
Lightweight pose estimation network based on non-globally dependent integral regression |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(21)
[HTML 1 KB]
[PDF 839 KB]
(54)
|
|
345 |
Yalun WANG, Yangsen ZHANG, Siwen ZHU |
|
|
Headline generation model with position embedding for knowledge reasoning |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 345-353
[Abstract]
(140)
[HTML 1 KB]
[PDF 1511 KB]
(340)
|
|
2011 |
Yuan TANG, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN |
|
|
Relation extraction model based on multi-scale hybrid attention convolutional neural networks |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2011-2017
[Abstract]
(179)
[HTML 0 KB]
[PDF 1983 KB]
(143)
|
|
526 |
Dixin WANG, Jiahao WANG, Min LI, Hao CHEN, Guangyao HU, Yu GONG |
|
|
Abnormal attack detection for underwater acoustic communication network |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 526-533
[Abstract]
(50)
[HTML 1 KB]
[PDF 2570 KB]
(31)
|
|
0 |
XIAO Hailin, KONG Xiangting, WANG Yu, ZHOU Di, DAI Xiaoming |
|
|
Image watermarking algorithm based on improved singular value decomposition and Haar wavelet transform |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(96)
[HTML 1 KB]
[PDF 1470 KB]
(25)
|
|
0 |
YUAN Baohua, CHEN Jialu, WANG Huan |
|
|
Medical image segmentation network integrating multi-scale semantics and double-branch parallel |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(74)
[HTML 1 KB]
[PDF 1144 KB]
(384)
|
|
3808 |
Qiye ZHANG, Xinrui ZENG |
|
|
Efficient active-set method for support vector data description problem with Gaussian kernel |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3808-3814
[Abstract]
(91)
[HTML 1 KB]
[PDF 4044 KB]
(12)
|
|
3776 |
Zucheng WU, Xiaojun WU, Tianyang XU |
|
|
Image-text retrieval model based on intra-modal fine-grained feature relationship extraction |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3776-3783
[Abstract]
(106)
[HTML 1 KB]
[PDF 3093 KB]
(55)
|
|
0 |
|
|
|
An End-to-End Vietnamese Text Normalization Approach Based on Edit Constraints |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(14)
[HTML 0 KB]
[PDF 0 KB]
(1)
|
|
610 |
Shijia WEN, Shijun JING |
|
|
Dynamic visual SLAM algorithm incorporating object detection and feature point association |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 610-615
[Abstract]
(64)
[HTML 1 KB]
[PDF 5476 KB]
(41)
|
|
655 |
Jiayang GUI, Shunji WANG, Zhengkang ZHOU, Jiashan TANG |
|
|
Tunnel foreign object detection algorithm based on improved YOLOv8n |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 655-661
[Abstract]
(91)
[HTML 1 KB]
[PDF 3102 KB]
(144)
|
|
428 |
Hanlin ZHANG, Junlu WANG, Baoyan SONG |
|
|
Time series event classification method fused with derived features |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 428-435
[Abstract]
(74)
[HTML 1 KB]
[PDF 2121 KB]
(321)
|
|
371 |
Zirong HONG, Guangqing BAO |
|
|
Review of radar automatic target recognition based on ensemble learning |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 371-382
[Abstract]
(85)
[HTML 1 KB]
[PDF 1391 KB]
(639)
|
|
0 |
ZHAI Sheping, YANG Qing, HUANG Yan, YANG Rui |
|
|
Knowledge graph completion with hierarchical attention fusing directed relationships and relational paths |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(66)
[HTML 1 KB]
[PDF 528 KB]
(290)
|
|
3371 |
Linqin WANG, Te ZHANG, Zhihong XU, Yongfeng DONG, Guowei YANG |
|
|
Fusing entity semantic and structural information for knowledge graph reasoning |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3371-3378
[Abstract]
(156)
[HTML 1 KB]
[PDF 705 KB]
(68)
|
|
670 |
Yan LI, Guanhua YE, Yawen LI, Meiyu LIANG |
|
|
Enterprise ESG indicator prediction model based on richness coordination technology |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 670-676
[Abstract]
(81)
[HTML 1 KB]
[PDF 1400 KB]
(439)
|
|
556 |
Wujiu FU, Lin ZHOU, Jianjie DENG, Yong YOU |
|
|
Recurrence formula for initial value problems of fractional-order autonomous dynamics system and its application |
|
|
|
Journal of Computer Applications
2025 Vol.45 (2): 556-562
[Abstract]
(49)
[HTML 1 KB]
[PDF 5494 KB]
(47)
|
|
261 |
Lu WANG, Dong LIU, Weiguang LIU |
|
|
Interpretability study on deformable convolutional network and its application in butterfly species recognition models |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 261-274
[Abstract]
(66)
[HTML 1 KB]
[PDF 8020 KB]
(33)
|
|
0 |
WANG Xingwang, ZHANG Qingyang, JIANG Shouyong, DONG Yongquan |
|
|
Dynamic UAV path planning based on improved whale optimization algorithm |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(104)
[HTML 1 KB]
[PDF 1795 KB]
(342)
|
|
1539 |
Min SUN, Qian CHENG, Xining DING |
|
|
CBAM-CGRU-SVM based malware detection method for Android |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1539-1545
[Abstract]
(134)
[HTML 0 KB]
[PDF 2825 KB]
(272)
|
|
0 |
|
|
|
Clustering federated learning algorithms for heterogeneous data |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(55)
[HTML 1 KB]
[PDF 2296 KB]
(480)
|
|
106 |
Xiaosheng YU, Zhixin WANG |
|
|
Sequential recommendation model based on multi-level graph contrastive learning |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 106-114
[Abstract]
(109)
[HTML 1 KB]
[PDF 2785 KB]
(67)
|
|
337 |
Zijun MIAO, Fei LUO, Weichao DING, Wenbo DONG |
|
|
Traffic signal control algorithm based on overall state prediction and fair experience replay |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 337-344
[Abstract]
(106)
[HTML 1 KB]
[PDF 3199 KB]
(101)
|
|
196 |
Jianli DING, Yufeng HE, Jing WANG |
|
|
Causal intervention-based root cause analysis method for microservice system faults |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 196-203
[Abstract]
(98)
[HTML 1 KB]
[PDF 2268 KB]
(216)
|
|
59 |
Xinran XU, Shaobing ZHANG, Miao CHENG, Yang ZHANG, Shang ZENG |
|
|
Bearings fault diagnosis method based on multi-pathed hierarchical mixture-of-experts model |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 59-68
[Abstract]
(109)
[HTML 1 KB]
[PDF 3277 KB]
(450)
|
|
338 |
Qinghao CHEN, Tianyu LIU, Zhangqi WANG |
|
|
Dynamic digital twin system of overhead transmission line ice shedding |
|
|
|
Journal of Computer Applications
0 Vol. (): 338-342
[Abstract]
(53)
[HTML 1 KB]
[PDF 2316 KB]
(165)
|
|
118 |
Chenfei WANG, Liyang XU, Huiqin LI, Jianxun MA |
|
|
Network security situation awareness mechanism based on behavioral portrait construction |
|
|
|
Journal of Computer Applications
0 Vol. (): 118-122
[Abstract]
(124)
[HTML 1 KB]
[PDF 2941 KB]
(172)
|
|
154 |
Yanfei WANG, Peng ZHANG, Xiangguang DAI, Huijun LI |
|
|
Fixed-time time-varying algorithm applied to robot navigation problem |
|
|
|
Journal of Computer Applications
0 Vol. (): 154-158
[Abstract]
(70)
[HTML 1 KB]
[PDF 2919 KB]
(48)
|
|
186 |
Quan TANG, Peng WANG, Gang XIN |
|
|
Optimization algorithm entropy based on quantum dynamics |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 186-195
[Abstract]
(84)
[HTML 1 KB]
[PDF 1806 KB]
(25)
|
|
69 |
Shengxiang GAO, Zhe HOU, Zhengtao YU, Hua LAI |
|
|
Chinese-Vietnamese neural machine translation model incorporating entity translation |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 69-74
[Abstract]
(101)
[HTML 1 KB]
[PDF 1039 KB]
(47)
|
|
3949 |
Yanran SHEN, Xin WEN, Jinhao ZHANG, Shuai ZHANG, Rui CAO, Baolu GAO |
|
|
fMRI brain age prediction model with lightweight multi-scale convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3949-3957
[Abstract]
(128)
[HTML 1 KB]
[PDF 2350 KB]
(52)
|
|
3823 |
Jinhui CAI, Zhongxu YIN, Guoxiao ZONG, Junru LI |
|
|
Integrated method of inference and taint analysis for nested branch breakthrough |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3823-3830
[Abstract]
(121)
[HTML 1 KB]
[PDF 1292 KB]
(147)
|
|
1386 |
Ye TIAN, Jinjin CHEN, Xingyi ZHANG |
|
|
Hybrid optimizer combining evolutionary computation and gradient descent for constrained multi-objective optimization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1386-1392
[Abstract]
(168)
[HTML 1 KB]
[PDF 1501 KB]
(324)
|
|
1393 |
Fengfeng WEI, Weineng CHEN |
|
|
Distributed data-driven evolutionary computation for multi-constrained optimization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1393-1400
[Abstract]
(181)
[HTML 1 KB]
[PDF 1005 KB]
(628)
|
|
1372 |
Xiaofang LIU, Jun ZHANG |
|
|
Probability-driven dynamic multiobjective evolutionary optimization for multi-agent cooperative scheduling |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1372-1377
[Abstract]
(155)
[HTML 1 KB]
[PDF 1353 KB]
(205)
|
|
1378 |
Xuanfeng LI, Shengcai LIU, Ke TANG |
|
|
Novel genetic algorithm for solving chance-constrained multiple-choice Knapsack problems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1378-1385
[Abstract]
(181)
[HTML 1 KB]
[PDF 1793 KB]
(161)
|
|
1325 |
Jiawei ZHAO, Xuefeng CHEN, Liang FENG, Yaqing HOU, Zexuan ZHU, Yew‑Soon Ong |
|
|
Review of evolutionary multitasking from the perspective of optimization scenarios |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1325-1337
[Abstract]
(442)
[HTML 1 KB]
[PDF 1383 KB]
(1151)
|
|
1338 |
Yue WU, Hangqi DING, Hao HE, Shunjie BI, Jun JIANG, Maoguo GONG, Qiguang MIAO, Wenping MA |
|
|
Research review of multitasking optimization algorithms and applications |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1338-1347
[Abstract]
(418)
[HTML 1 KB]
[PDF 1486 KB]
(588)
|
|
1355 |
Wanting ZHANG, Wenli DU, Wei DU |
|
|
Multi-timescale cooperative evolutionary algorithm for large-scale crude oil scheduling |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1355-1363
[Abstract]
(223)
[HTML 1 KB]
[PDF 2180 KB]
(265)
|
|
1348 |
Maojiang TIAN, Mingke CHEN, Wei DU, Wenli DU |
|
|
Two-stage differential grouping method for large-scale overlapping problems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1348-1354
[Abstract]
(284)
[HTML 1 KB]
[PDF 738 KB]
(450)
|
|
1187 |
Jianqiang LI, Zhou HE |
|
|
Hybrid NSGA-Ⅱ for vehicle routing problem with multi-trip pickup and delivery |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1187-1194
[Abstract]
(164)
[HTML 0 KB]
[PDF 1477 KB]
(527)
|
|
1058 |
Xianfeng YANG, Yilei TANG, Ziqiang LI |
|
|
Aspect-level sentiment analysis model based on alternating‑attention mechanism and graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1058-1064
[Abstract]
(153)
[HTML 0 KB]
[PDF 943 KB]
(157)
|
|
1049 |
Longtao GAO, Nana LI |
|
|
Aspect sentiment triplet extraction based on aspect-aware attention enhancement |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1049-1057
[Abstract]
(172)
[HTML 1 KB]
[PDF 2126 KB]
(95)
|
|
1027 |
Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG |
|
|
Network abnormal traffic detection based on port attention and convolutional block attention module |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1027-1034
[Abstract]
(155)
[HTML 1 KB]
[PDF 1692 KB]
(285)
|
|
1018 |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU |
|
|
Network security risk assessment method for CTCS based on
α-cut triangular fuzzy number and attack tree |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1018-1026
[Abstract]
(173)
[HTML 1 KB]
[PDF 2359 KB]
(331)
|
|
3915 |
Xin ZHAO, Xinjie LI, Jian XU, Buyun LIU, Xiang BI |
|
|
Parallel medical image registration model based on convolutional neural network and Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3915-3921
[Abstract]
(216)
[HTML 1 KB]
[PDF 2554 KB]
(127)
|
|
3335 |
Xinrong HU, Jingxue CHEN, Zijian HUANG, Bangchao WANG, Xun YAO, Junping LIU, Qiang ZHU, Jie YANG |
|
|
Graph convolution network-based masked data augmentation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3335-3344
[Abstract]
(198)
[HTML 1 KB]
[PDF 788 KB]
(258)
|
|
3831 |
Rui GAO, Xuebin CHEN, Zucuan ZHANG |
|
|
Dynamic social network privacy publishing method for partial graph updating |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3831-3838
[Abstract]
(146)
[HTML 1 KB]
[PDF 3239 KB]
(247)
|
|
204 |
Ying HUANG, Changsheng LI, Hui PENG, Su LIU |
|
|
Dual-branch network guided by local entropy for dynamic scene high dynamic range imaging |
|
|
|
Journal of Computer Applications
2025 Vol.45 (1): 204-213
[Abstract]
(92)
[HTML 1 KB]
[PDF 7127 KB]
(36)
|
|
3021 |
Rui ZHANG, Junming PAN, Xiaolu BAI, Jing HU, Rongguo ZHANG, Pengyun ZHANG |
|
|
Agent model for hyperparameter self-optimization of deep classification model |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3021-3031
[Abstract]
(168)
[HTML 1 KB]
[PDF 2779 KB]
(460)
|
|
3354 |
Siqi YANG, Tianjian LUO, Xuanhui YAN, Guangju YANG |
|
|
Transfer kernel learning method based on spatial features for motor imagery EEG |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3354-3363
[Abstract]
(148)
[HTML 1 KB]
[PDF 1026 KB]
(428)
|
|
3345 |
Jie WU, Xuezhong QIAN, Wei SONG |
|
|
Personalized federated learning based on similarity clustering and regularization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3345-3353
[Abstract]
(199)
[HTML 1 KB]
[PDF 1016 KB]
(75)
|
|
2674 |
Jinjin LI, Guoming SANG, Yijia ZHANG |
|
|
Multi-domain fake news detection model enhanced by APK-CNN and Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2674-2682
[Abstract]
(267)
[HTML 1 KB]
[PDF 1378 KB]
(539)
|
|
2791 |
Xudong LI, Yukang FENG, Junsheng CHEN |
|
|
Multi-key page-level encryption system for SQLite |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2791-2801
[Abstract]
(157)
[HTML 1 KB]
[PDF 3204 KB]
(132)
|
|
2683 |
Qi SHUAI, Hairui WANG, Guifu ZHU |
|
|
Chinese story ending generation model based on bidirectional contrastive training |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2683-2688
[Abstract]
(160)
[HTML 1 KB]
[PDF 909 KB]
(172)
|
|
2903 |
Yun LI, Fuyou WANG, Peiguang JING, Su WANG, Ao XIAO |
|
|
Uncertainty-based frame associated short video event detection method |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2903-2910
[Abstract]
(156)
[HTML 1 KB]
[PDF 2161 KB]
(140)
|
|
2947 |
Xin YANG, Xueni CHEN, Chunjiang WU, Shijie ZHOU |
|
|
Short-term traffic flow prediction of urban highway based on variant residual model and Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2947-2951
[Abstract]
(150)
[HTML 1 KB]
[PDF 1254 KB]
(178)
|
|
3723 |
Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN |
|
|
Cross-chain identity management scheme based on identity-based proxy re-encryption |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3723-3730
[Abstract]
(166)
[HTML 1 KB]
[PDF 2492 KB]
(84)
|
|
3709 |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN |
|
|
Linkable ring signature scheme based on SM9 algorithm |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3709-3716
[Abstract]
(161)
[HTML 1 KB]
[PDF 1254 KB]
(90)
|
|
3766 |
Jingxin LIU, Wenjing HUANG, Liangsheng XU, Chong HUANG, Jiansheng WU |
|
|
Unsupervised feature selection model with dictionary learning and sample correlation preservation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3766-3775
[Abstract]
(147)
[HTML 1 KB]
[PDF 7520 KB]
(65)
|
|
3717 |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN |
|
|
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3717-3722
[Abstract]
(123)
[HTML 1 KB]
[PDF 1330 KB]
(104)
|
|
3941 |
Jianli DING, Hui HUANG, Weidong CAO |
|
|
Dynamic monitoring method of flight chain operation status |
|
|
|
Journal of Computer Applications
2024 Vol.44 (12): 3941-3948
[Abstract]
(96)
[HTML 1 KB]
[PDF 2366 KB]
(34)
|
|
1995 |
Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG |
|
|
Enhanced deep subspace clustering method with unified framework |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 1995-2003
[Abstract]
(296)
[HTML 1 KB]
[PDF 3432 KB]
(325)
|
|
3530 |
Jie HUANG, Ruizi WU, Junli LI |
|
|
Efficient adaptive robustness optimization algorithm for complex networks |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3530-3539
[Abstract]
(118)
[HTML 1 KB]
[PDF 1046 KB]
(51)
|
|
3503 |
Qingyuan PENG, Xiaofeng WANG, Junxia WANG, Yingying HUA, Ao TANG, Fei HE |
|
|
Review of phase transition in satisfiability problems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3503-3512
[Abstract]
(95)
[HTML 1 KB]
[PDF 739 KB]
(84)
|
|
2777 |
Zhizheng ZHANG, Xiaojian ZHANG, Junqing WANG, Guanghui FENG |
|
|
Federated spatial data publication method with differential privacy and secure aggregation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2777-2784
[Abstract]
(184)
[HTML 1 KB]
[PDF 2235 KB]
(88)
|
|
628 |
Rui ZHANG, Siqi SONG, Jing HU, Yongmei ZHANG, Yanfeng CHAI |
|
|
Performance evaluation of industry-university-research based on statistics and adaptive ParNet |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 628-637
[Abstract]
(113)
[HTML 0 KB]
[PDF 3247 KB]
(99)
|
|
604 |
Huzhen GAO, Changping DU, Yao ZHENG |
|
|
Gimbal system control algorithm of unmanned aerial vehicle based on extended state observer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 604-610
[Abstract]
(165)
[HTML 0 KB]
[PDF 3518 KB]
(249)
|
|
588 |
Zhiliang SHI, Shiqi LIAO, Zibo GAN, Shaobo ZHU |
|
|
Automatic preoperative planning algorithm for three-dimensional wedge osteotomy of radius |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 588-594
[Abstract]
(119)
[HTML 0 KB]
[PDF 2804 KB]
(91)
|
|
469 |
Zhiwen JING, Yujia ZHANG, Boting SUN, Hao GUO |
|
|
Two-stage recommendation algorithm of Siamese graph convolutional neural network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 469-476
[Abstract]
(166)
[HTML 0 KB]
[PDF 2896 KB]
(357)
|
|
452 |
Siyi ZHOU, Tianrui LI |
|
|
Visual analysis of multivariate spatio-temporal data for origin-destination flow |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 452-459
[Abstract]
(121)
[HTML 0 KB]
[PDF 3328 KB]
(467)
|
|
432 |
Fuqin DENG, Huifeng GUAN, Chaoen TAN, Lanhui FU, Hongmin WANG, Tinlun LAM, Jianmin ZHANG |
|
|
Multi-robot reinforcement learning path planning method based on request-response communication mechanism and local attention mechanism |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 432-438
[Abstract]
(186)
[HTML 0 KB]
[PDF 1916 KB]
(756)
|
|
385 |
Xinran LUO, Tianrui LI, Zhen JIA |
|
|
Chinese medical named entity recognition based on self-attention mechanism and lexicon enhancement |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 385-392
[Abstract]
(208)
[HTML 0 KB]
[PDF 2158 KB]
(247)
|
|
2818 |
Shanglong LI, Jianhua LIU, Heming JIA |
|
|
Reptile search algorithm based on multi-hunting coordination strategy |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2818-2828
[Abstract]
(148)
[HTML 1 KB]
[PDF 1883 KB]
(141)
|
|
2747 |
Lilin FAN, Fukang CAO, Wanting WANG, Kai YANG, Zhaoyu SONG |
|
|
Intermittent demand forecasting method based on adaptive matching of demand patterns |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2747-2755
[Abstract]
(232)
[HTML 1 KB]
[PDF 1955 KB]
(280)
|
|
2785 |
Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU |
|
|
Differential property evaluation method based on GPU for large-state cryptographic S-boxes |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2785-2790
[Abstract]
(153)
[HTML 1 KB]
[PDF 1245 KB]
(41)
|
|
2911 |
Xiyuan WANG, Zhancheng ZHANG, Shaokang XU, Baocheng ZHANG, Xiaoqing LUO, Fuyuan HU |
|
|
Unsupervised cross-domain transfer network for 3D/2D registration in surgical navigation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2911-2918
[Abstract]
(216)
[HTML 1 KB]
[PDF 2025 KB]
(406)
|
|
2970 |
Jing QIN, Zhiguang QIN, Fali LI, Yueheng PENG |
|
|
Diagnosis of major depressive disorder based on probabilistic sparse self-attention neural network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2970-2974
[Abstract]
(215)
[HTML 1 KB]
[PDF 1067 KB]
(529)
|
|
1128 |
Yu DING, Hanlin ZHANG, Rong LUO, Hua MENG |
|
|
Fuzzy clustering algorithm based on belief subcluster cutting |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1128-1138
[Abstract]
(112)
[HTML 1 KB]
[PDF 4644 KB]
(255)
|
|
1294 |
Lijun XU, Hui LI, Zuyang LIU, Kansong CHEN, Weixuan MA |
|
|
3D-GA-Unet: MRI image segmentation algorithm for glioma based on 3D-Ghost CNN |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1294-1302
[Abstract]
(156)
[HTML 1 KB]
[PDF 3121 KB]
(283)
|
|
1816 |
Shibin LI, Jun GONG, Shengjun TANG |
|
|
Semi-supervised heterophilic graph representation learning model based on Graph Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1816-1823
[Abstract]
(141)
[HTML 1 KB]
[PDF 2420 KB]
(167)
|
|
3581 |
Ziyi LI, Tingting QU, Qianpeng CHONG, Jindong XU |
|
|
Remote sensing image segmentation network based on fuzzy multiscale features |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3581-3586
[Abstract]
(189)
[HTML 1 KB]
[PDF 1521 KB]
(243)
|
|
3315 |
Li ZENG, Jingru YANG, Gang HUANG, Xiang JING, Chaoran LUO |
|
|
Survey on hypergraph application methods: issues, advances, and challenges |
|
|
|
Journal of Computer Applications
2024 Vol.44 (11): 3315-3326
[Abstract]
(582)
[HTML 1 KB]
[PDF 795 KB]
(345)
|
|
2848 |
Min HUA, Jia’nan WEI, Wei ZHAO, Shuo MENG |
|
|
Interference analysis and performance research of LoRa signals |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2848-2854
[Abstract]
(153)
[HTML 1 KB]
[PDF 1962 KB]
(297)
|
|
2726 |
Yu DU, Yan ZHU |
|
|
Constructing pre-trained dynamic graph neural network to predict disappearance of academic cooperation behavior |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2726-2731
[Abstract]
(163)
[HTML 1 KB]
[PDF 1708 KB]
(48)
|
|
3090 |
Xingyao YANG, Hongtao SHEN, Zulian ZHANG, Jiong YU, Jiaying CHEN, Dongxiao WANG |
|
|
Sequential recommendation based on hierarchical filter and temporal convolution enhanced self-attention network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (10): 3090-3096
[Abstract]
(152)
[HTML 1 KB]
[PDF 1877 KB]
(433)
|
|
1114 |
Tianhua CHEN, Jiaxuan ZHU, Jie YIN |
|
|
Bird recognition algorithm based on attention mechanism |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1114-1120
[Abstract]
(264)
[HTML 1 KB]
[PDF 2874 KB]
(308)
|
|
2437 |
Huanliang SUN, Siyi WANG, Junling LIU, Jingke XU |
|
|
Help-seeking information extraction model for flood event in social media data |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2437-2445
[Abstract]
(257)
[HTML 1 KB]
[PDF 2708 KB]
(282)
|
|
2952 |
Guixiang XUE, Hui WANG, Weifeng ZHOU, Yu LIU, Yan LI |
|
|
Port traffic flow prediction based on knowledge graph and spatio-temporal diffusion graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2952-2957
[Abstract]
(205)
[HTML 1 KB]
[PDF 1614 KB]
(105)
|
|
2493 |
Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG |
|
|
Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU |
|
|
|
Journal of Computer Applications
2024 Vol.44 (8): 2493-2499
[Abstract]
(359)
[HTML 1 KB]
[PDF 1194 KB]
(504)
|
|
0 |
|
|
|
An oversampling method for imbalanced data based on sample potential and noise evolution |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(47)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
0 |
|
|
|
Video Pedestrian Anomaly Detection Method Based on Skeleton Graph and Mixed Attention |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(56)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Fusion of Coordinate and Multi-Head Attention Mechanisms for Interactive Speech Emotion Recognition |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(78)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
0 |
|
|
|
Automatic ICD coding method incorporating heterogeneous information |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(67)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Sentiment classification of psychological counseling based on attention over attention mechanism |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(43)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
0 |
|
|
|
Consistency preserving age estimation method by ensemble ranking |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(163)
[HTML 1 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Relation extraction based on multi-scale mixed attention convolutional neural networks |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(70)
[HTML 0 KB]
[PDF 0 KB]
(2)
|
|
0 |
|
|
|
Low illumination face detection based on image enhancement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(207)
[HTML 1 KB]
[PDF 2413 KB]
(30)
|
|
0 |
|
|
|
Improved age assessment method combining Cloformer with ordinal regression |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(245)
[HTML 1 KB]
[PDF 3667 KB]
(23)
|
|
0 |
|
|
|
Purchase behavior prediction model based on two-stage dynamic interest recognition |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(200)
[HTML 1 KB]
[PDF 1474 KB]
(20)
|
|
0 |
|
|
|
Personalized federated learning method based on dual stream neural network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(212)
[HTML 1 KB]
[PDF 2185 KB]
(16)
|
|
0 |
|
|
|
Application of improved hunter-prey optimization algorithm in WSN coverage |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(182)
[HTML 1 KB]
[PDF 6422 KB]
(12)
|
|
0 |
|
|
|
Multimodal sentiment analysis network with self-supervision and multi-layer cross attention |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(234)
[HTML 1 KB]
[PDF 1572 KB]
(42)
|
|
0 |
|
|
|
Multi-level Color Restoration of Mural Image based on Gated Positional Encoding |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(28)
[HTML 0 KB]
[PDF 0 KB]
(1)
|
|
0 |
|
|
|
Graph convolutional network-based distributed power allocation algorithm for D2D communication systems |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(51)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Top-K optimal route query problem with keyword search support |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(196)
[HTML 1 KB]
[PDF 2879 KB]
(11)
|
|
0 |
|
|
|
Bagging-DyFAS: A model ensemble algorithm with dynamic fine-tuning |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(48)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Application of Improved VGG16 in Rice Blast Image Recognition |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(40)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
0 |
|
|
|
Research on X-ray Image Enhancement of Complex workpieces Based on Gradient Field and Local Deviation |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(41)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
945 |
Kui ZHAO, Huiqi QIU, Xu LI, Zhifei XU |
|
|
Real-time pulmonary nodule detection algorithm combining attention and multipath fusion |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 945-952
[Abstract]
(274)
[HTML 1 KB]
[PDF 2387 KB]
(419)
|
|
1248 |
Xiangjie SUN, Qiang WEI, Yisen WANG, Jiang DU |
|
|
Survey of code similarity detection technology |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1248-1258
[Abstract]
(356)
[HTML 1 KB]
[PDF 1868 KB]
(861)
|
|
1209 |
Rui TANG, Shibo YUE, Ruizhi ZHANG, Chuan LIU, Chuanlin PANG |
|
|
Energy efficiency optimization mechanism for UAV-assisted and non-orthogonal multiple access-enabled data collection system |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1209-1218
[Abstract]
(150)
[HTML 1 KB]
[PDF 2575 KB]
(243)
|
|
683 |
Yuanlong WANG, Wenbo HU, Hu ZHANG |
|
|
Knowledge-guided visual relationship detection model |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 683-689
[Abstract]
(250)
[HTML 1 KB]
[PDF 1592 KB]
(308)
|
|
0 |
|
|
|
Aspect sentiment triplet extraction based on aspect-aware attention enhancement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(113)
[HTML 1 KB]
[PDF 533 KB]
(118)
|
|
0 |
|
|
|
Aspect-level sentiment analysis model based on alternating attention mechanism and graph convolutional network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(163)
[HTML 1 KB]
[PDF 422 KB]
(151)
|
|
671 |
Wei SHE, Yang LI, Lihong ZHONG, Defeng KONG, Zhao TIAN |
|
|
Hyperparameter optimization for neural network based on improved real coding genetic algorithm |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 671-676
[Abstract]
(422)
[HTML 1 KB]
[PDF 1532 KB]
(535)
|
|
2704 |
Xingyao YANG, Yu CHEN, Jiong YU, Zulian ZHANG, Jiaying CHEN, Dongxiao WANG |
|
|
Recommendation model combining self-features and contrastive learning |
|
|
|
Journal of Computer Applications
2024 Vol.44 (9): 2704-2710
[Abstract]
(220)
[HTML 1 KB]
[PDF 1737 KB]
(270)
|
|
1862 |
Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI |
|
|
Multi-object cache side-channel attack detection model based on machine learning |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1862-1871
[Abstract]
(241)
[HTML 1 KB]
[PDF 3387 KB]
(103)
|
|
2285 |
Huaxia LI, Xiaorong HUANG, Anlin SHEN, Peng JIANG, Yiqiang PENG, Liqi SUI |
|
|
Trajectory tracking of caster-type omnidirectional mobile platform based on MPC and PID |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2285-2293
[Abstract]
(134)
[HTML 1 KB]
[PDF 4693 KB]
(166)
|
|
2080 |
Zhi ZHANG, Xin LI, Naifu YE, Kaixi HU |
|
|
DKP: defending against model stealing attacks based on dark knowledge protection |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2080-2086
[Abstract]
(171)
[HTML 1 KB]
[PDF 1427 KB]
(57)
|
|
2018 |
Dianhui MAO, Xuebo LI, Junling LIU, Denghui ZHANG, Wenjing YAN |
|
|
Chinese entity and relation extraction model based on parallel heterogeneous graph and sequential attention mechanism |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2018-2025
[Abstract]
(271)
[HTML 1 KB]
[PDF 2387 KB]
(396)
|
|
2065 |
Huanhuan LI, Tianqiang HUANG, Xuemei DING, Haifeng LUO, Liqing HUANG |
|
|
Public traffic demand prediction based on multi-scale spatial-temporal graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2065-2072
[Abstract]
(282)
[HTML 1 KB]
[PDF 1969 KB]
(320)
|
|
1987 |
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG |
|
|
Deep network compression method based on low-rank decomposition and vector quantization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 1987-1994
[Abstract]
(303)
[HTML 1 KB]
[PDF 1506 KB]
(398)
|
|
2034 |
Qianhui LU, Yu ZHANG, Mengling WANG, Tingwei WU, Yuzhong SHAN |
|
|
Classification model of nuclear power equipment quality text based on improved recurrent pooling network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2034-2040
[Abstract]
(167)
[HTML 1 KB]
[PDF 1893 KB]
(62)
|
|
2160 |
Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG |
|
|
Binary code identification based on user system call sequences |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2160-2167
[Abstract]
(151)
[HTML 1 KB]
[PDF 2494 KB]
(41)
|
|
2208 |
Xun SUN, Ruifeng FENG, Yanru CHEN |
|
|
Monocular 3D object detection method integrating depth and instance segmentation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2208-2215
[Abstract]
(231)
[HTML 1 KB]
[PDF 4804 KB]
(171)
|
|
2183 |
Wenliang WEI, Yangping WANG, Biao YUE, Anzheng WANG, Zhe ZHANG |
|
|
Deep learning model for infrared and visible image fusion based on illumination weight allocation and attention |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2183-2191
[Abstract]
(179)
[HTML 1 KB]
[PDF 3503 KB]
(228)
|
|
2279 |
Junhao ZHENG, Hongfeng TAO |
|
|
High-order internal model based robust iterative learning control with varying trajectory |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2279-2284
[Abstract]
(139)
[HTML 1 KB]
[PDF 2195 KB]
(30)
|
|
2041 |
Hao CHAO, Shuqi FENG, Yongli LIU |
|
|
Convolutional recurrent neural network optimized by multiple context vectors in EEG-based emotion recognition |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2041-2046
[Abstract]
(181)
[HTML 1 KB]
[PDF 1601 KB]
(104)
|
|
2151 |
Shuo SUN, Wei ZHANG, Wendi FENG, Yuwei ZHANG |
|
|
Automatic foreign function interface generation method based on source code analysis |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2151-2159
[Abstract]
(179)
[HTML 1 KB]
[PDF 3540 KB]
(66)
|
|
2116 |
Shiyang LI, Shaojie NI, Ding DENG, Lei CHEN, Honglei LIN |
|
|
Reliability enhancement algorithm for physical unclonable function based on non-orthogonal discrete transform |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2116-2122
[Abstract]
(160)
[HTML 1 KB]
[PDF 2608 KB]
(68)
|
|
2192 |
Song XU, Wenbo ZHANG, Yifan WANG |
|
|
Lightweight video salient object detection network based on spatiotemporal information |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2192-2199
[Abstract]
(157)
[HTML 1 KB]
[PDF 2111 KB]
(194)
|
|
2073 |
Junchi GE, Weihua ZHAO |
|
|
Distance weighted discriminant analysis based on robust principal component analysis for matrix data |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2073-2079
[Abstract]
(153)
[HTML 1 KB]
[PDF 3828 KB]
(194)
|
|
2168 |
Runze TIAN, Yulong ZHOU, Hong ZHU, Gang XUE |
|
|
Local information based path selection algorithm for service migration |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2168-2174
[Abstract]
(173)
[HTML 1 KB]
[PDF 1021 KB]
(104)
|
|
2233 |
Yangyi GAO, Tao LEI, Xiaogang DU, Suiyong LI, Yingbo WANG, Chongdan MIN |
|
|
Crowd counting and locating method based on pixel distance map and four-dimensional dynamic convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2233-2242
[Abstract]
(175)
[HTML 1 KB]
[PDF 4123 KB]
(158)
|
|
2310 |
Yiqun ZHAO, Zhiyu ZHANG, Xue DONG |
|
|
Anisotropic travel time computation method based on dense residual connection physical information neural networks |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2310-2318
[Abstract]
(170)
[HTML 1 KB]
[PDF 7009 KB]
(237)
|
|
0 |
|
|
|
Automatic Preoperative Planning Algorithm for Three-Dimensional Wedge Osteotomy of Radius |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(41)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
1423 |
Jia SU, Hong YU |
|
|
Missing value imputation algorithm using dual discriminator based on conditional generative adversarial imputation network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1423-1427
[Abstract]
(148)
[HTML 1 KB]
[PDF 872 KB]
(238)
|
|
1832 |
Zixuan YUAN, Xiaoqing WENG, Ningzhen GE |
|
|
Early classification model of multivariate time series based on orthogonal locality preserving projection and cost optimization |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1832-1841
[Abstract]
(132)
[HTML 1 KB]
[PDF 1806 KB]
(54)
|
|
1699 |
Yao LIU, Yumeng LI, Miaomiao SONG |
|
|
Cognitive graph based on business process |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1699-1705
[Abstract]
(172)
[HTML 1 KB]
[PDF 988 KB]
(126)
|
|
47 |
Jia WANG-ZHU, Zhou YU, Jun YU, Jianping FAN |
|
|
Video dynamic scene graph generation model based on multi-scale spatial-temporal Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 47-57
[Abstract]
(390)
[HTML 1 KB]
[PDF 2900 KB]
(561)
|
|
3217 |
Bennian YU, Yongzhao ZHAN, Qirong MAO, Wenlong DONG, Honglin LIU |
|
|
Double complex convolution and attention aggregating recurrent network for speech enhancement |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3217-3224
[Abstract]
(209)
[HTML 0 KB]
[PDF 1993 KB]
(366)
|
|
3142 |
Binwei SONG, Yao WANG |
|
|
Low-cost pay-per-use licensing scheme for FPGA intellectual property protection |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3142-3148
[Abstract]
(197)
[HTML 0 KB]
[PDF 1413 KB]
(95)
|
|
3121 |
Lei MA, Chuan LUO, Tianrui LI, Hongmei CHEN |
|
|
Fuzzy-rough set based unsupervised dynamic feature selection algorithm |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3121-3128
[Abstract]
(209)
[HTML 0 KB]
[PDF 511 KB]
(205)
|
|
1927 |
Xiaohui CHENG, Yuntian HUANG, Ruifang ZHANG |
|
|
Lightweight infrared road scene detection model based on multiscale and weighted coordinate attention |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1927-1934
[Abstract]
(152)
[HTML 1 KB]
[PDF 3120 KB]
(313)
|
|
1842 |
Mei WANG, Xuesong SU, Jia LIU, Ruonan YIN, Shan HUANG |
|
|
Time series classification method based on multi-scale cross-attention fusion in time-frequency domain |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1842-1847
[Abstract]
(421)
[HTML 1 KB]
[PDF 2511 KB]
(543)
|
|
1781 |
Xun YAO, Zhongzheng QIN, Jie YANG |
|
|
Generative label adversarial text classification model |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1781-1785
[Abstract]
(343)
[HTML 1 KB]
[PDF 1142 KB]
(393)
|
|
79 |
Junhao LUO, Yan ZHU |
|
|
Multi-dynamic aware network for unaligned multimodal language sequence sentiment analysis |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 79-85
[Abstract]
(230)
[HTML 1 KB]
[PDF 1299 KB]
(354)
|
|
1636 |
Juxiang ZHOU, Jinsheng LIU, Jianhou GAN, Di WU, Zijie LI |
|
|
Classroom speech emotion recognition method based on multi-scale temporal-aware network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1636-1643
[Abstract]
(251)
[HTML 1 KB]
[PDF 4548 KB]
(409)
|
|
2216 |
Zhe KONG, Han LI, Shaowei GAN, Mingru KONG, Bingtao HE, Ziyu GUO, Ducheng JIN, Zhaowen QIU |
|
|
Structure segmentation model for 3D kidney images based on asymmetric multi-decoder and attention module |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2216-2224
[Abstract]
(175)
[HTML 1 KB]
[PDF 2905 KB]
(185)
|
|
1760 |
Xiting LYU, Jinghua ZHAO, Haiying RONG, Jiale ZHAO |
|
|
Information diffusion prediction model based on Transformer and relational graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1760-1766
[Abstract]
(246)
[HTML 1 KB]
[PDF 2150 KB]
(212)
|
|
1965 |
Xiaolu WANG, Wangfei QIAN |
|
|
Gait recognition method based on two-branch convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1965-1971
[Abstract]
(170)
[HTML 1 KB]
[PDF 1361 KB]
(172)
|
|
1796 |
Junfeng SHEN, Xingchen ZHOU, Can TANG |
|
|
Dual-channel sentiment analysis model based on improved prompt learning method |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1796-1806
[Abstract]
(178)
[HTML 1 KB]
[PDF 3205 KB]
(120)
|
|
788 |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU |
|
|
Analysis of consistency between sensitive behavior and privacy policy of Android applications |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 788-796
[Abstract]
(312)
[HTML 1 KB]
[PDF 1850 KB]
(202)
|
|
1972 |
Yue LIU, Fang LIU, Aoyun WU, Qiuyue CHAI, Tianxiao WANG |
|
|
3D object detection network based on self-attention mechanism and graph convolution |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1972-1977
[Abstract]
(206)
[HTML 1 KB]
[PDF 3215 KB]
(404)
|
|
2055 |
Tian MA, Runtao XI, Jiahao LYU, Yijie ZENG, Jiayi YANG, Jiehui ZHANG |
|
|
Mobile robot 3D space path planning method based on deep reinforcement learning |
|
|
|
Journal of Computer Applications
2024 Vol.44 (7): 2055-2064
[Abstract]
(370)
[HTML 1 KB]
[PDF 5732 KB]
(934)
|
|
1706 |
Youren YU, Yangsen ZHANG, Yuru JIANG, Gaijuan HUANG |
|
|
Chinese named entity recognition model incorporating multi-granularity linguistic knowledge and hierarchical information |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1706-1712
[Abstract]
(221)
[HTML 1 KB]
[PDF 1485 KB]
(183)
|
|
1751 |
Jianjing LI, Guanfeng LI, Feizhou QIN, Weijun LI |
|
|
Multi-relation approximate reasoning model based on uncertain knowledge graph embedding |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1751-1759
[Abstract]
(253)
[HTML 1 KB]
[PDF 1027 KB]
(197)
|
|
1911 |
Mengyuan HUANG, Kan CHANG, Mingyang LING, Xinjie WEI, Tuanfa QIN |
|
|
Progressive enhancement algorithm for low-light images based on layer guidance |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1911-1919
[Abstract]
(167)
[HTML 1 KB]
[PDF 6161 KB]
(163)
|
|
1786 |
Tianci KE, Jianhua LIU, Shuihua SUN, Zhixiong ZHENG, Zijie CAI |
|
|
Aspect-level sentiment analysis model combining strong association dependency and concise syntax |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1786-1795
[Abstract]
(183)
[HTML 1 KB]
[PDF 2399 KB]
(160)
|
|
619 |
Yuanyuan MA, Leilei XIE, Nan DONG, Na LIU |
|
|
Opinion propagation model considering user initiative and mobility |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 619-627
[Abstract]
(189)
[HTML 1 KB]
[PDF 3396 KB]
(368)
|
|
556 |
Weipeng JING, Qingxin XIAO, Hui LUO |
|
|
Channel compensation algorithm for speaker recognition based on probabilistic spherical discriminant analysis |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 556-562
[Abstract]
(247)
[HTML 1 KB]
[PDF 1543 KB]
(131)
|
|
331 |
Mengmei YAN, Dongping YANG |
|
|
Review of mean field theory for deep neural network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 331-343
[Abstract]
(464)
[HTML 1 KB]
[PDF 1848 KB]
(918)
|
|
490 |
Yu ZHANG, Yan CHANG, Shibin ZHANG |
|
|
Adversarial example detection algorithm based on quantum local intrinsic dimensionality |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 490-495
[Abstract]
(170)
[HTML 1 KB]
[PDF 1918 KB]
(168)
|
|
0 |
|
|
|
Visual analysis of multivariate spatio-temporal data for orgin-destination streams |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(113)
[HTML 1 KB]
[PDF 0 KB]
(10)
|
|
0 |
|
|
|
Two-stage siamese graph convolutional neural network recommendation algorithm |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(68)
[HTML 1 KB]
[PDF 0 KB]
(8)
|
|
0 |
|
|
|
Performance evaluation of industry-university-research based on statistics and adaptive ParNet |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(40)
[HTML 1 KB]
[PDF 0 KB]
(6)
|
|
360 |
Xing WANG, Guijuan LIU, Zhihao CHEN |
|
|
Fake review detection algorithm combining Gaussian mixture model and text graph convolutional network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 360-368
[Abstract]
(266)
[HTML 1 KB]
[PDF 4451 KB]
(164)
|
|
418 |
Hua LAI, Tong SUN, Wenjun WANG, Zhengtao YU, Shengxiang GAO, Ling DONG |
|
|
Text punctuation restoration for Vietnamese speech recognition with multimodal features |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 418-423
[Abstract]
(221)
[HTML 1 KB]
[PDF 3010 KB]
(215)
|
|
377 |
Ziqi HUANG, Jianpeng HU |
|
|
Entity category enhanced nested named entity recognition in automotive domain |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 377-384
[Abstract]
(268)
[HTML 1 KB]
[PDF 1347 KB]
(260)
|
|
1905 |
Feiyu ZHAI, Handa MA |
|
|
Hybrid classical-quantum classification model based on DenseNet |
|
|
|
Journal of Computer Applications
2024 Vol.44 (6): 1905-1910
[Abstract]
(177)
[HTML 1 KB]
[PDF 2793 KB]
(408)
|
|
1471 |
Wenshuo GAO, Xiaoyun CHEN |
|
|
Point cloud classification network based on node structure |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1471-1478
[Abstract]
(184)
[HTML 1 KB]
[PDF 2562 KB]
(303)
|
|
1099 |
Zongyu LI, Siwei QIANG, Xiaobo GUO, Zhenfeng ZHU |
|
|
Re-weighted adversarial variational autoencoder and its application in industrial causal effect estimation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1099-1106
[Abstract]
(350)
[HTML 1 KB]
[PDF 2192 KB]
(178)
|
|
1493 |
Junna ZHANG, Xinxin WANG, Tianze LI, Xiaoyan ZHAO, Peiyan YUAN |
|
|
Task offloading method based on dynamic service cache assistance |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1493-1500
[Abstract]
(188)
[HTML 1 KB]
[PDF 2414 KB]
(249)
|
|
3697 |
Yu LING, Zhilong SHAN |
|
|
Knowledge concept recommendation system based on interest enhancement |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3697-3702
[Abstract]
(307)
[HTML 1 KB]
[PDF 1346 KB]
(441)
|
|
3551 |
Fangxing GENG, Zhuo LI, Xin CHEN |
|
|
Incentive mechanism design for hierarchical federated learning based on multi-leader Stackelberg game |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3551-3558
[Abstract]
(357)
[HTML 1 KB]
[PDF 2438 KB]
(742)
|
|
3510 |
Chunyong YIN, Yangchun ZHANG |
|
|
Unsupervised log anomaly detection model based on CNN and Bi-LSTM |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3510-3516
[Abstract]
(335)
[HTML 1 KB]
[PDF 1759 KB]
(932)
|
|
3616 |
Bolu LI, Li WU, Xiaoying WANG, Jianqiang HUANG, Tengfei CAO |
|
|
Multi-site wind speed prediction based on graph dynamic attention network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3616-3624
[Abstract]
(234)
[HTML 1 KB]
[PDF 4716 KB]
(313)
|
|
3816 |
Longbao WANG, Yinqi LUAN, Liang XU, Xin ZENG, Shuai ZHANG, Shufang XU |
|
|
Route planning method of UAV swarm based on dynamic cluster particle swarm optimization |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3816-3823
[Abstract]
(259)
[HTML 1 KB]
[PDF 2693 KB]
(326)
|
|
3464 |
Yonggui WANG, Qiwen SHI |
|
|
Social recommendation by enhanced GNN with heterogeneous relationship |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3464-3471
[Abstract]
(196)
[HTML 1 KB]
[PDF 1897 KB]
(282)
|
|
3896 |
Qihong SONG, Jianxun LIU, Haize HU, Xiangping ZHANG |
|
|
Code search model based on collaborative fusion network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3896-3902
[Abstract]
(208)
[HTML 1 KB]
[PDF 1457 KB]
(151)
|
|
3149 |
Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG |
|
|
Medical image privacy protection based on thumbnail encryption and distributed storage |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3149-3155
[Abstract]
(234)
[HTML 1 KB]
[PDF 4138 KB]
(305)
|
|
3457 |
Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN |
|
|
Nonuniform time slicing method based on prediction of community variance |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3457-3463
[Abstract]
(185)
[HTML 1 KB]
[PDF 1001 KB]
(97)
|
|
3368 |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG |
|
|
Efficient certificateless ring signature scheme based on elliptic curve |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3368-3374
[Abstract]
(244)
[HTML 1 KB]
[PDF 740 KB]
(249)
|
|
3504 |
Hongliang TIAN, Ping GE, Mingjie XIAN |
|
|
Distribution network operation exception management mechanism based on blockchain |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3504-3509
[Abstract]
(194)
[HTML 1 KB]
[PDF 2084 KB]
(88)
|
|
3607 |
Yutang JIN, Yisong WANG, Lihui WANG, Pengli ZHAO |
|
|
Speech enhancement algorithm based on multi-scale ladder-type time-frequency Conformer GAN |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3607-3615
[Abstract]
(194)
[HTML 1 KB]
[PDF 4515 KB]
(343)
|
|
3599 |
Xin ZHAO, Qianqian ZHU, Cong ZHAO, Jialing WU |
|
|
Segmentation of breast nodules in ultrasound images based on multi-scale and cross-spatial fusion |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3599-3606
[Abstract]
(167)
[HTML 1 KB]
[PDF 3808 KB]
(476)
|
|
3038 |
Yimin SHAO, Fan ZHAO, Yi WANG, Baoquan WANG |
|
|
Survey of visualization research based on blockchain technology and application |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3038-3046
[Abstract]
(310)
[HTML 1 KB]
[PDF 8589 KB]
(473)
|
|
3351 |
Kun YOU, Qinhui WANG, Xin LI |
|
|
General multi-unit false-name-proof auction mechanism for cloud computing |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3351-3357
[Abstract]
(183)
[HTML 1 KB]
[PDF 1731 KB]
(79)
|
|
3358 |
Guishuang XU, Xinchun YIN |
|
|
Certificateless conditional privacy-preserving authentication scheme for VANET |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3358-3367
[Abstract]
(190)
[HTML 1 KB]
[PDF 867 KB]
(153)
|
|
855 |
Yi ZHENG, Cunyi LIAO, Tianqian ZHANG, Ji WANG, Shouyin LIU |
|
|
Image denoising-based cell-level RSRP estimation method for urban areas |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 855-862
[Abstract]
(200)
[HTML 1 KB]
[PDF 4442 KB]
(218)
|
|
1511 |
Zhiyuan XI, Chao TANG, Anyang TONG, Wenjian WANG |
|
|
Driver behavior recognition based on dual-path spatiotemporal network |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1511-1519
[Abstract]
(214)
[HTML 1 KB]
[PDF 3642 KB]
(208)
|
|
1107 |
Jie WANG, Hua MENG |
|
|
Image classification algorithm based on overall topological structure of point cloud |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1107-1113
[Abstract]
(183)
[HTML 1 KB]
[PDF 2456 KB]
(475)
|
|
1236 |
Huahua WANG, Xu ZHANG, Feng LI |
|
|
Secondary signal detection algorithm for high-speed mobile environments |
|
|
|
Journal of Computer Applications
2024 Vol.44 (4): 1236-1241
[Abstract]
(148)
[HTML 1 KB]
[PDF 2710 KB]
(82)
|
|
0 |
|
|
|
Network abnormal traffic detection based on port attention and convolutional block attention module |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(118)
[HTML 1 KB]
[PDF 558 KB]
(110)
|
|
1415 |
Kaiwen ZHAO, Peng WANG, Xiangrong TONG |
|
|
Two-stage search-based constrained evolutionary multitasking optimization algorithm |
|
|
|
Journal of Computer Applications
2024 Vol.44 (5): 1415-1422
[Abstract]
(187)
[HTML 1 KB]
[PDF 1756 KB]
(320)
|
|
916 |
Ruifeng HOU, Pengcheng ZHANG, Liyuan ZHANG, Zhiguo GUI, Yi LIU, Haowen ZHANG, Shubin WANG |
|
|
Iterative denoising network based on total variation regular term expansion |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 916-921
[Abstract]
(201)
[HTML 1 KB]
[PDF 2529 KB]
(207)
|
|
2100 |
Yuan WEI, Yan LIN, Shengnan GUO, Youfang LIN, Huaiyu WAN |
|
|
Prediction of taxi demands between urban regions by fusing origin-destination spatial-temporal correlation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2100-2106
[Abstract]
(230)
[HTML 0 KB]
[PDF 1507 KB]
(451)
|
|
2065 |
Shaoquan CHEN, Jianping CAI, Lan SUN |
|
|
Differential privacy generative adversarial network algorithm with dynamic gradient threshold clipping |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2065-2072
[Abstract]
(264)
[HTML 0 KB]
[PDF 1824 KB]
(615)
|
|
2026 |
Fangshu CHEN, Wei ZHANG, Xiaoming HU, Yufei ZHANG, Xiankai MENG, Linxiang SHI |
|
|
Dynamic aggregate nearest neighbor query algorithm in weighted road network space |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2026-2033
[Abstract]
(239)
[HTML 0 KB]
[PDF 2757 KB]
(302)
|
|
2017 |
Jinhui LAI, Zichen XU, Yicheng TU, Guolong TAN |
|
|
OmegaDB: concurrent computing framework of relational operators for heterogeneous architecture |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2017-2025
[Abstract]
(270)
[HTML 0 KB]
[PDF 2915 KB]
(358)
|
|
2001 |
Zifang XIA, Yaxin YU, Ziteng WANG, Jiaqi QIAO |
|
|
Explainable recommendation mechanism by fusion collaborative knowledge graph and counterfactual inference |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2001-2009
[Abstract]
(298)
[HTML 0 KB]
[PDF 1898 KB]
(661)
|
|
1994 |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG |
|
|
Dictionary partition vector space model for ciphertext ranked search in cloud environment |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 1994-2000
[Abstract]
(234)
[HTML 0 KB]
[PDF 1846 KB]
(178)
|
|
1987 |
Zhenyu LIU, Chaokun WANG, Gaoyang GUO |
|
|
Parallel algorithm of betweenness centrality for dynamic networks |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 1987-1993
[Abstract]
(456)
[HTML 1 KB]
[PDF 1663 KB]
(578)
|
|
819 |
Xiaoxin DU, Wei ZHOU, Hao WANG, Tianru HAO, Zhenfei WANG, Mei JIN, Jianfei ZHANG |
|
|
Survey of subgroup optimization strategies for intelligent algorithms |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 819-830
[Abstract]
(314)
[HTML 1 KB]
[PDF 2404 KB]
(1086)
|
|
411 |
Kaitian WANG, Qing YE, Chunlei CHENG |
|
|
Classification method for traditional Chinese medicine electronic medical records based on heterogeneous graph representation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 411-417
[Abstract]
(237)
[HTML 1 KB]
[PDF 1643 KB]
(252)
|
|
960 |
Zhaojun TANG, Meiyan XIA, Hua ZHANG, Ting XIE |
|
|
Fixed-time consensus of dynamic event-triggered multi-agent systems |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 960-965
[Abstract]
(249)
[HTML 1 KB]
[PDF 1279 KB]
(350)
|
|
876 |
Jingxian ZHOU, Xina LI |
|
|
UAV detection and recognition based on improved convolutional neural network and radio frequency fingerprint |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 876-882
[Abstract]
(349)
[HTML 1 KB]
[PDF 2693 KB]
(304)
|
|
938 |
Zhanjun JIANG, Baijing WU, Long MA, Jing LIAN |
|
|
Faster-RCNN water-floating garbage recognition based on multi-scale feature and polarized self-attention |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 938-944
[Abstract]
(317)
[HTML 1 KB]
[PDF 4460 KB]
(252)
|
|
1900 |
Shangjing LIN, Ji MA, Bei ZHUANG, Yueying LI, Ziyi LI, Tie LI, Jin TIAN |
|
|
Wireless traffic prediction based on federated learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1900-1909
[Abstract]
(464)
[HTML 1 KB]
[PDF 4071 KB]
(293)
|
|
145 |
Li’an CHEN, Yi GUO |
|
|
Text sentiment analysis model based on individual bias information |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 145-151
[Abstract]
(181)
[HTML 1 KB]
[PDF 766 KB]
(222)
|
|
3947 |
Haiyong ZHANG, Xianjin FANG, Enwan ZHANG, Baoyu LI, Chao PENG, Jianxiang MU |
|
|
Fingerprint positioning method based on measurement report signal clustering |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3947-3954
[Abstract]
(245)
[HTML 1 KB]
[PDF 2357 KB]
(88)
|
|
269 |
Yongjian MA, Xuhua SHI, Peiyao WANG |
|
|
Constrained multi-objective evolutionary algorithm based on two-stage search and dynamic resource allocation |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 269-277
[Abstract]
(307)
[HTML 1 KB]
[PDF 2145 KB]
(137)
|
|
182 |
Kuo TIAN, Yinghan WU, Feng HU |
|
|
Identification method of influence nodes in multilayer hypernetwork based on evidence theory |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 182-189
[Abstract]
(184)
[HTML 1 KB]
[PDF 2830 KB]
(65)
|
|
300 |
Jie LONG, Liang XIE, Haijiao XU |
|
|
Integrated deep reinforcement learning portfolio model |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 300-310
[Abstract]
(353)
[HTML 1 KB]
[PDF 3723 KB]
(223)
|
|
292 |
Hao CHEN, Zhenping XIA, Cheng CHENG, Xing LIN-LI, Bowen ZHANG |
|
|
Lightweight image super-resolution reconstruction network based on Transformer-CNN |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 292-299
[Abstract]
(616)
[HTML 1 KB]
[PDF 1855 KB]
(374)
|
|
123 |
Yunyun GAO, Lasheng ZHAO, Qiang ZHANG |
|
|
Acoustic word embedding model based on Bi-LSTM and convolutional-Transformer |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 123-128
[Abstract]
(273)
[HTML 1 KB]
[PDF 1311 KB]
(117)
|
|
318 |
Kai XU, Qikai GAO, Ming YIN, Jingjing TAN |
|
|
Trajectory similarity measurement algorithm based on three-dimensional space area division |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 318-323
[Abstract]
(200)
[HTML 1 KB]
[PDF 1595 KB]
(91)
|
|
311 |
Hanxiao SHI, Leichun WANG |
|
|
Short-term power load forecasting by graph convolutional network combining LSTM and self-attention mechanism |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 311-317
[Abstract]
(454)
[HTML 1 KB]
[PDF 2173 KB]
(343)
|
|
101 |
Chenghao FENG, Zhenping XIE, Bowen DING |
|
|
Selective generation method of test cases for Chinese text error correction software |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 101-112
[Abstract]
(313)
[HTML 1 KB]
[PDF 3173 KB]
(103)
|
|
199 |
Du CHEN, Yuanyuan LI, Yu CHEN |
|
|
Directed gene regulatory network inference algorithm based on t-test and stepwise network search |
|
|
|
Journal of Computer Applications
2024 Vol.44 (1): 199-205
[Abstract]
(231)
[HTML 1 KB]
[PDF 1783 KB]
(67)
|
|
3755 |
Wenquan LI, Yimin MAO, Xindong PENG |
|
|
Agglomerative hierarchical clustering algorithm based on hesitant fuzzy set |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3755-3763
[Abstract]
(285)
[HTML 1 KB]
[PDF 626 KB]
(104)
|
|
767 |
Shengjie MENG, Wanjun YU, Ying CHEN |
|
|
Feature selection algorithm for high-dimensional data with maximum correlation and maximum difference |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 767-771
[Abstract]
(199)
[HTML 1 KB]
[PDF 698 KB]
(152)
|
|
512 |
Jintao RAO, Zhe CUI |
|
|
Electronic voting scheme based on SM2 threshold blind signature |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 512-518
[Abstract]
(233)
[HTML 1 KB]
[PDF 1208 KB]
(384)
|
|
677 |
Shipan JIANG, Shuwei CHEN, Guoyan ZENG |
|
|
Strategy of invalid clause elimination in first-order logic theorem prover |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 677-682
[Abstract]
(217)
[HTML 1 KB]
[PDF 905 KB]
(154)
|
|
702 |
Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG |
|
|
Chinese named entity recognition combining prior knowledge and glyph features |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 702-708
[Abstract]
(278)
[HTML 1 KB]
[PDF 750 KB]
(379)
|
|
645 |
Xuan CAO, Tianjian LUO |
|
|
Dynamic multi-domain adversarial learning method for cross-subject motor imagery EEG signals |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 645-653
[Abstract]
(817)
[HTML 1 KB]
[PDF 3364 KB]
(235)
|
|
3790 |
Qian CHEN, Zheng CHAI, Zilong WANG, Jiawei CHEN |
|
|
Poisoning attack detection scheme based on generative adversarial network for federated learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3790-3798
[Abstract]
(737)
[HTML 1 KB]
[PDF 2367 KB]
(784)
|
|
972 |
Shuai REN, Yuanfa JI, Xiyan SUN, Zhaochuan WEI, Zian LIN |
|
|
Prediction of landslide displacement based on improved grey wolf optimizer and support vector regression |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 972-982
[Abstract]
(201)
[HTML 1 KB]
[PDF 3878 KB]
(129)
|
|
3443 |
Chuyuan WEI, Mengke WANG, Chuanhao HU, Guangqi ZHANG |
|
|
Deep review attention neural network model for enhancing explainability of recommendation system |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3443-3448
[Abstract]
(358)
[HTML 1 KB]
[PDF 1652 KB]
(479)
|
|
3086 |
Dan XU, Hongfang GONG, Rongrong LUO |
|
|
Aspect sentiment analysis with aspect item and context representation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3086-3092
[Abstract]
(259)
[HTML 1 KB]
[PDF 1011 KB]
(169)
|
|
403 |
Jiawei ZHANG, Guandong GAO, Ke XIAO, Shengzun SONG |
|
|
Violent crime hierarchy algorithm by joint modeling of improved hierarchical attention network and TextCNN |
|
|
|
Journal of Computer Applications
2024 Vol.44 (2): 403-410
[Abstract]
(251)
[HTML 1 KB]
[PDF 1110 KB]
(207)
|
|
696 |
Lei GUO, Zhen JIA, Tianrui LI |
|
|
Relational and interactive graph attention network for aspect-level sentiment analysis |
|
|
|
Journal of Computer Applications
2024 Vol.44 (3): 696-701
[Abstract]
(285)
[HTML 1 KB]
[PDF 1072 KB]
(339)
|
|
1578 |
Jianhui HE, Chunlong HU, Xin SHU |
|
|
Multi-task age estimation method based on multi-peak label distribution learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1578-1583
[Abstract]
(267)
[HTML 0 KB]
[PDF 1036 KB]
(60)
|
|
1409 |
Jiahong SUI, Yingchi MAO, Huimin YU, Zicheng WANG, Ping PING |
|
|
Global image captioning method based on graph attention network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1409-1415
[Abstract]
(350)
[HTML 0 KB]
[PDF 2508 KB]
(202)
|
|
1394 |
Rui XU, Shuang LIANG, Hang WAN, Yimin WEN, Shiming SHEN, Jian LI |
|
|
Extraction of PM
2.5 diffusion characteristics based on candlestick pattern matching |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1394-1400
[Abstract]
(254)
[HTML 0 KB]
[PDF 2423 KB]
(92)
|
|
1378 |
Yafei ZHANG, Jing WANG, Yaoshuai ZHAO, Zhihao WU, Youfang LIN |
|
|
Stock movement prediction with market dynamic hierarchical macro information |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1378-1384
[Abstract]
(330)
[HTML 0 KB]
[PDF 1401 KB]
(163)
|
|
1372 |
Guangyao ZHANG, Chunfeng SONG |
|
|
Pedestrian head tracking model based on full-body appearance features |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1372-1377
[Abstract]
(361)
[HTML 0 KB]
[PDF 2258 KB]
(230)
|
|
1330 |
Qinghai XU, Shifei DING, Tongfeng SUN, Jian ZHANG, Lili GUO |
|
|
Improved capsule network based on multipath feature |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1330-1335
[Abstract]
(403)
[HTML 0 KB]
[PDF 1560 KB]
(268)
|
|
1323 |
Haitao TANG, Hongjun WANG, Tianrui LI |
|
|
Discriminative multidimensional scaling for feature learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1323-1329
[Abstract]
(563)
[HTML 1 KB]
[PDF 1101 KB]
(460)
|
|
3711 |
Fei XIA, Shuaiqi CHEN, Min HUA, Bihong JIANG |
|
|
Chinese word segmentation method in electric power domain based on improved BERT |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3711-3718
[Abstract]
(417)
[HTML 1 KB]
[PDF 1953 KB]
(227)
|
|
3955 |
Zhenggang WANG, Zhong LIU, Jin JIN, Wei LIU |
|
|
Customs risk control method based on improved butterfly feedback neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3955-3964
[Abstract]
(241)
[HTML 1 KB]
[PDF 2964 KB]
(108)
|
|
3008 |
Rui MEN, Shujia FAN, Axida SHAN, Shaoyu DU, Xiumei FAN |
|
|
Survey on combination of computation offloading and blockchain in internet of things |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3008-3016
[Abstract]
(567)
[HTML 1 KB]
[PDF 882 KB]
(296)
|
|
3093 |
Yuhang LI, Yuli YANG, Yao MA, Dan YU, Yongle CHEN |
|
|
Text adversarial example generation method based on BERT model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3093-3098
[Abstract]
(420)
[HTML 1 KB]
[PDF 971 KB]
(258)
|
|
3848 |
Hairong XUE, Xiaolong HAN |
|
|
Integrated scheduling considering automated guided vehicle charging strategy based on improved NSGA-Ⅱ |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3848-3855
[Abstract]
(286)
[HTML 1 KB]
[PDF 3405 KB]
(116)
|
|
3647 |
Yu ZHANG, Ying CAI, Jianyang CUI, Meng ZHANG, Yanfang FAN |
|
|
Gradient descent with momentum algorithm based on differential privacy in convolutional neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3647-3653
[Abstract]
(738)
[HTML 1 KB]
[PDF 1985 KB]
(711)
|
|
3490 |
Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU |
|
|
SM4 resistant differential power analysis lightweight threshold implementation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3490-3496
[Abstract]
(343)
[HTML 1 KB]
[PDF 3082 KB]
(360)
|
|
3559 |
Chenghao YU, Runhe QIU |
|
|
Performance analysis of bit error rate on RIS assisted index modulation cooperative system |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3559-3567
[Abstract]
(274)
[HTML 1 KB]
[PDF 2563 KB]
(184)
|
|
3297 |
Junpeng ZHANG, Yujie SHI, Rui JANG, Jingjing DONG, Changjian QIU |
|
|
Review on advances in recognition and classification of cognitive impairment based on EEG signals |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3297-3308
[Abstract]
(465)
[HTML 1 KB]
[PDF 1199 KB]
(547)
|
|
3418 |
Shuying YANG, Haiming GUO, Xin LI |
|
|
EEG classification based on channel selection and multi-dimensional feature fusion |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3418-3427
[Abstract]
(414)
[HTML 1 KB]
[PDF 3363 KB]
(265)
|
|
3129 |
Yu YANG, Weiwei DUAN |
|
|
Spectral clustering based dynamic community discovery algorithm in social network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3129-3135
[Abstract]
(327)
[HTML 1 KB]
[PDF 2785 KB]
(580)
|
|
3449 |
Zhuangzhuang XUE, Peng LI, Weibei FAN, Hongjun ZHANG, Fanshuo MENG |
|
|
Multiple clustering algorithm based on dynamic weighted tensor distance |
|
|
|
Journal of Computer Applications
2023 Vol.43 (11): 3449-3456
[Abstract]
(226)
[HTML 1 KB]
[PDF 2437 KB]
(180)
|
|
3236 |
Suolan LIU, Zhenzhen TIAN, Hongyuan WANG, Long LIN, Yan WANG |
|
|
Human action recognition method based on multi-scale feature fusion of single mode |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3236-3243
[Abstract]
(248)
[HTML 1 KB]
[PDF 1425 KB]
(744)
|
|
0 |
|
|
|
Double complex convolutional and attention aggregating recurrent network for speech enhancement |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(129)
[HTML 1 KB]
[PDF 528 KB]
(84)
|
|
0 |
Lei Ma Chuan Luo LI Tian-rui Hongmei Chen |
|
|
Fuzzy-rough set based unsupervised dynamic feature selection algorithm |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(42)
[HTML 1 KB]
[PDF 535 KB]
(11)
|
|
1176 |
Yingqi LI, Weifeng JI, Jiang WENG, Xuan WU, Xiuyu SHEN, Yan SUN |
|
|
Virus propagation model and stability analysis of heterogeneous backup network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1176-1182
[Abstract]
(264)
[HTML 0 KB]
[PDF 2043 KB]
(66)
|
|
1160 |
Chunyong YIN, Rui QU |
|
|
Federated learning algorithm based on personalized differential privacy |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1160-1168
[Abstract]
(890)
[HTML 0 KB]
[PDF 1800 KB]
(597)
|
|
1056 |
Cheng FANG, Bei LI, Ping HAN, Qiong WU |
|
|
Fine-grained emotion classification of Chinese microblog based on syntactic dependency graph |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1056-1061
[Abstract]
(341)
[HTML 0 KB]
[PDF 1598 KB]
(198)
|
|
1021 |
Yongbing GAO, Juntian GAO, Rong MA, Lidong YANG |
|
|
User granularity-level personalized social text generation model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1021-1028
[Abstract]
(369)
[HTML 0 KB]
[PDF 2546 KB]
(168)
|
|
1005 |
Zhoubo XU, Puqing CHEN, Huadong LIU, Xin YANG |
|
|
Deep graph matching model based on self-attention network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1005-1012
[Abstract]
(544)
[HTML 0 KB]
[PDF 2118 KB]
(292)
|
|
3275 |
Zhiang ZHANG, Guangzhong LIAO |
|
|
Multi-scale feature enhanced retinal vessel segmentation algorithm based on U-Net |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3275-3281
[Abstract]
(339)
[HTML 1 KB]
[PDF 2624 KB]
(170)
|
|
3309 |
Min ZUO, Hong WANG, Wenjing YAN, Qingchuan ZHANG |
|
|
Gene splice site identification based on BERT and CNN |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3309-3314
[Abstract]
(342)
[HTML 1 KB]
[PDF 1829 KB]
(211)
|
|
3703 |
Jianle CAO, Nana LI |
|
|
Semantically enhanced sentiment classification model based on multi-level attention |
|
|
|
Journal of Computer Applications
2023 Vol.43 (12): 3703-3710
[Abstract]
(373)
[HTML 1 KB]
[PDF 1638 KB]
(202)
|
|
3230 |
Chuanbiao LI, Yuanwei BI |
|
|
Stereo matching algorithm based on cross-domain adaptation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3230-3235
[Abstract]
(257)
[HTML 1 KB]
[PDF 2684 KB]
(136)
|
|
3267 |
Wei LI, Sixin LIANG, Jianzhou ZHANG |
|
|
Long-tailed image defect detection based on gradient-guide weighted-deferred negative gradient decay loss |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3267-3274
[Abstract]
(266)
[HTML 1 KB]
[PDF 2403 KB]
(150)
|
|
2611 |
Meijia LIANG, Xinwu LIU, Xiaopeng HU |
|
|
Small target detection algorithm for train operating environment image based on improved YOLOv3 |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2611-2618
[Abstract]
(328)
[HTML 1 KB]
[PDF 5709 KB]
(180)
|
|
2819 |
Maozu GUO, Yazhe ZHANG, Lingling ZHAO |
|
|
Electric vehicle charging station siting method based on spatial semantics and individual activities |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2819-2827
[Abstract]
(248)
[HTML 1 KB]
[PDF 6390 KB]
(116)
|
|
3062 |
Mingyue WU, Dong ZHOU, Wenyu ZHAO, Wei QU |
|
|
Sentence embedding optimization based on manifold learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3062-3069
[Abstract]
(266)
[HTML 1 KB]
[PDF 1411 KB]
(145)
|
|
2784 |
Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI |
|
|
Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2784-2788
[Abstract]
(280)
[HTML 1 KB]
[PDF 1455 KB]
(123)
|
|
2812 |
Xuyan ZHAO, Yunhe CUI, Chaohui JIANG, Qing QIAN, Guowei SHEN, Chun GUO, Xianchao LI |
|
|
CHAIN: edge computing node placement algorithm based on overlapping domination |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2812-2818
[Abstract]
(240)
[HTML 1 KB]
[PDF 1484 KB]
(126)
|
|
2963 |
Kunting LU, Rongrong FEI, Xuande ZHANG |
|
|
Remote sensing image pansharpening by convolutional neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2963-2969
[Abstract]
(334)
[HTML 1 KB]
[PDF 3323 KB]
(163)
|
|
3178 |
Erchao LI, Shenghui ZHANG |
|
|
Dynamic multi-objective optimization algorithm based on adaptive prediction of new evaluation index |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3178-3187
[Abstract]
(304)
[HTML 1 KB]
[PDF 3391 KB]
(151)
|
|
2753 |
Xinyue ZHANG, Rong LIU, Chiyu WEI, Ke FANG |
|
|
Aspect-based sentiment analysis method with integrating prompt knowledge |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2753-2759
[Abstract]
(502)
[HTML 1 KB]
[PDF 1699 KB]
(250)
|
|
583 |
Yating SU, Cuixiang LIU |
|
|
Three-dimensional human reconstruction model based on high-resolution net and graph convolutional network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 583-588
[Abstract]
(268)
[HTML 0 KB]
[PDF 2124 KB]
(165)
|
|
575 |
Ruoying WANG, Fan LYU, Liuqing ZHAO, Fuyuan HU |
|
|
Floorplan generation algorithm integrating user requirements and boundary constraints |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 575-582
[Abstract]
(400)
[HTML 0 KB]
[PDF 2582 KB]
(200)
|
|
349 |
Ming XU, Linhao LI, Qiaoling QI, Liqin WANG |
|
|
Abductive reasoning model based on attention balance list |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 349-355
[Abstract]
(345)
[HTML 0 KB]
[PDF 1484 KB]
(135)
|
|
335 |
Chengyu LIN, Lei WANG, Cong XUE |
|
|
Weakly-supervised text classification with label semantic enhancement |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 335-342
[Abstract]
(511)
[HTML 0 KB]
[PDF 1987 KB]
(365)
|
|
2747 |
Haodong ZHENG, Hua MA, Yingchao XIE, Wensheng TANG |
|
|
Knowledge tracing model based on graph neural network blending with forgetting factors and memory gate |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2747-2752
[Abstract]
(509)
[HTML 1 KB]
[PDF 1266 KB]
(340)
|
|
2828 |
Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU |
|
|
Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2828-2835
[Abstract]
(391)
[HTML 1 KB]
[PDF 3025 KB]
(150)
|
|
2910 |
Qiuyu ZHANG, Yongwang WEN |
|
|
Triplet deep hashing method for speech retrieval |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2910-2918
[Abstract]
(250)
[HTML 1 KB]
[PDF 2003 KB]
(123)
|
|
2581 |
Doudou LI, Wanggen LI, Yichun XIA, Yang SHU, Kun GAO |
|
|
Skeleton-based action recognition based on feature interaction and adaptive fusion |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2581-2587
[Abstract]
(281)
[HTML 1 KB]
[PDF 2179 KB]
(347)
|
|
2382 |
Zexi JIN, Lei LI, Ji LIU |
|
|
Transfer learning model based on improved domain separation network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2382-2389
[Abstract]
(302)
[HTML 1 KB]
[PDF 1973 KB]
(630)
|
|
2426 |
Kezheng CHEN, Xiaoran GUO, Yong ZHONG, Zhenping LI |
|
|
Relation extraction method based on negative training and transfer learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2426-2430
[Abstract]
(288)
[HTML 1 KB]
[PDF 922 KB]
(294)
|
|
2406 |
Xiaoyan ZHANG, Zhengyu DUAN |
|
|
Cross-lingual zero-resource named entity recognition model based on sentence-level generative adversarial network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2406-2411
[Abstract]
(301)
[HTML 1 KB]
[PDF 963 KB]
(183)
|
|
2420 |
Haiwei FAN, Xinsiyu LU, Limiao ZHANG, Yisheng AN |
|
|
Citation recommendation algorithm fusing knowledge graph and graph attention network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2420-2425
[Abstract]
(451)
[HTML 1 KB]
[PDF 1853 KB]
(292)
|
|
2390 |
Bin LIU, Qian ZHANG, Yaqin WEI, Xueying CUI, Hongying ZHI |
|
|
Graph to equation tree model based on expression layer-by-layer aggregation and dynamic selection |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2390-2395
[Abstract]
(201)
[HTML 1 KB]
[PDF 2057 KB]
(83)
|
|
2412 |
Hongjun HENG, Dingcheng YANG |
|
|
Knowledge enhanced aspect word interactive graph neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2412-2419
[Abstract]
(291)
[HTML 1 KB]
[PDF 1210 KB]
(120)
|
|
2448 |
Shijie PENG, Hongmei CHEN, Lizhen WANG, Qing XIAO |
|
|
Hybrid point-of-interest recommendation model based on geographic preference ranking |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2448-2455
[Abstract]
(283)
[HTML 1 KB]
[PDF 1284 KB]
(150)
|
|
2602 |
Huan LIU, Lianghong WU, Lyu ZHANG, Liang CHEN, Bowen ZHOU, Hongqiang ZHANG |
|
|
Leukocyte detection method based on twice-fusion-feature CenterNet |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2602-2610
[Abstract]
(283)
[HTML 1 KB]
[PDF 4702 KB]
(128)
|
|
2537 |
Dongying ZHU, Yong ZHONG, Guanci YANG, Yang LI |
|
|
Research progress on motion segmentation of visual localization and mapping in dynamic environment |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2537-2545
[Abstract]
(313)
[HTML 1 KB]
[PDF 2687 KB]
(247)
|
|
67 |
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng |
|
|
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 67-73
[Abstract]
(297)
[HTML 0 KB]
[PDF 2162 KB]
(65)
|
|
61 |
ZOU Bin, ZHANG Cong |
|
|
Dense crowd detection algorithm based on Faster R-CNN |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 61-66
[Abstract]
(409)
[HTML 0 KB]
[PDF 3411 KB]
(191)
|
|
265 |
LIN Jianzhuang, YANG Wenzhong, TAN Sixiang, ZHOU Lexin, CHEN Danni |
|
|
Fusing filter enhancement and reverse attention network for polyp segmentation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 265-272
[Abstract]
(326)
[HTML 0 KB]
[PDF 2283 KB]
(157)
|
|
169 |
LIN Yangping, LIU Jia, CHEN Pei, ZHANG Mingshu, YANG Xiaoyuan |
|
|
Semi-generative video steganography scheme based on deep convolutional generative adversarial net |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 169-175
[Abstract]
(365)
[HTML 0 KB]
[PDF 3023 KB]
(151)
|
|
15 |
YAO Huayong, YE Dongyi, CHEN Zhaojiong |
|
|
Multi-round conversational reinforcement learning recommendation algorithm via multi-granularity feedback |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 15-21
[Abstract]
(443)
[HTML 0 KB]
[PDF 1249 KB]
(265)
|
|
147 |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin |
|
|
Analysis and improvement of certificateless signature scheme |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 147-153
[Abstract]
(513)
[HTML 1 KB]
[PDF 910 KB]
(231)
|
|
3225 |
Yuntao ZHAO, Wanqi XIE, Weigang LI, Jiaming HU |
|
|
Robot hand-eye calibration algorithm based on covariance matrix adaptation evolutionary strategy |
|
|
|
Journal of Computer Applications
2023 Vol.43 (10): 3225-3229
[Abstract]
(264)
[HTML 1 KB]
[PDF 1281 KB]
(135)
|
|
2798 |
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU |
|
|
Identity-based ring signature scheme on number theory research unit lattice |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2798-2805
[Abstract]
(324)
[HTML 1 KB]
[PDF 962 KB]
(211)
|
|
2619 |
Shengwei DUAN, Xinyu CHENG, Haozhou WANG, Fei WANG |
|
|
Dam surface disease detection algorithm based on improved YOLOv5 |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2619-2629
[Abstract]
(521)
[HTML 1 KB]
[PDF 7862 KB]
(346)
|
|
2855 |
Bin LI, Zhibin TANG |
|
|
Multiple level binary imperialist competitive algorithm for solving heterogeneous multiple knapsack problem |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2855-2867
[Abstract]
(269)
[HTML 1 KB]
[PDF 2507 KB]
(67)
|
|
1151 |
Jian CUI, Kailang MA, Yu SUN, Dou WANG, Junliang ZHOU |
|
|
Deep explainable method for encrypted traffic classification |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1151-1159
[Abstract]
(453)
[HTML 1 KB]
[PDF 3314 KB]
(205)
|
|
1318 |
Haiyu YANG, Wenpu GUO, Kai KANG |
|
|
Signal modulation recognition method based on convolutional long short-term deep neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1318-1322
[Abstract]
(295)
[HTML 1 KB]
[PDF 2318 KB]
(144)
|
|
0 |
|
|
|
Fine-Grained Emotion Classification of Chinese Microblogs Based on syntactic dependence graph |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(110)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
1826 |
Huibin ZHANG, Liping FENG, Yaojun HAO, Yining WANG |
|
|
Ancient mural dynasty identification based on attention mechanism and transfer learning |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1826-1832
[Abstract]
(349)
[HTML 1 KB]
[PDF 1804 KB]
(235)
|
|
3913 |
Jia XU, Jing LIU, Ge YU, Pin LYU, Panyuan YANG |
|
|
Review of peer grading technologies for online education |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3913-3923
[Abstract]
(346)
[HTML 0 KB]
[PDF 1682 KB]
(190)
|
|
3870 |
Yi WANG, Liu YANG, Tongkuai ZHANG |
|
|
Channel estimation based on compressive sensing in RIS-assisted millimeter wave system |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3870-3875
[Abstract]
(489)
[HTML 0 KB]
[PDF 1756 KB]
(278)
|
|
3785 |
Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA |
|
|
Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3785-3791
[Abstract]
(339)
[HTML 0 KB]
[PDF 1481 KB]
(111)
|
|
2370 |
Hui LU, Ruizhang HUANG, Jingjing XUE, Lina REN, Chuan LIN |
|
|
DDDC: deep dynamic document clustering model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2370-2375
[Abstract]
(312)
[HTML 1 KB]
[PDF 1962 KB]
(128)
|
|
2721 |
Xiaomin ZHOU, Fei TENG, Yi ZHANG |
|
|
Automatic international classification of diseases coding model based on meta-network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2721-2726
[Abstract]
(321)
[HTML 1 KB]
[PDF 1032 KB]
(126)
|
|
2352 |
Jingyi WANG, Chao LI, Heng SONG, Di LI, Junwu ZHU |
|
|
Spectrum combinatorial auction mechanism based on random walk algorithm |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2352-2357
[Abstract]
(238)
[HTML 1 KB]
[PDF 1187 KB]
(108)
|
|
2345 |
Saijuan XU, Zhenyu PEI, Jiawei LIN, Genggeng LIU |
|
|
Constrained multi-objective evolutionary algorithm based on multi-stage search |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2345-2351
[Abstract]
(346)
[HTML 1 KB]
[PDF 1529 KB]
(198)
|
|
2217 |
Bona XUAN, Jin LI, Yafei SONG, Zexuan MA |
|
|
Malicious code classification method based on improved MobileNetV2 |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2217-2225
[Abstract]
(301)
[HTML 1 KB]
[PDF 3547 KB]
(193)
|
|
1750 |
Hui WANG, Jianhong LI |
|
|
Few-shot recognition method of 3D models based on Transformer |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1750-1758
[Abstract]
(324)
[HTML 1 KB]
[PDF 3334 KB]
(238)
|
|
1655 |
Yongfeng DONG, Yacong WANG, Yao DONG, Yahan DENG |
|
|
Survey of online learning resource recommendation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1655-1663
[Abstract]
(758)
[HTML 1 KB]
[PDF 824 KB]
(551)
|
|
3603 |
Chenguang LI, Bo ZHANG, Qian ZHAO, Xiaoping CHEN, Xingfu WANG |
|
|
Empathy prediction from texts based on transfer learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3603-3609
[Abstract]
(290)
[HTML 0 KB]
[PDF 777 KB]
(115)
|
|
3513 |
Rui XIAO, Mingyi LIU, Zhiying TU, Zhongjie WANG |
|
|
Personal event detection method based on text mining in social media |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3513-3519
[Abstract]
(383)
[HTML 0 KB]
[PDF 2013 KB]
(96)
|
|
1796 |
Zhixiong ZHENG, Jianhua LIU, Shuihua SUN, Ge XU, Honghui LIN |
|
|
Aspect-based sentiment analysis model fused with multi-window local information |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1796-1802
[Abstract]
(322)
[HTML 1 KB]
[PDF 1323 KB]
(109)
|
|
2261 |
Lei LI, Guofu ZHANG, Zhaopin SU, Feng YUE |
|
|
Software testing resource allocation algorithm for dynamic changes in architecture |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2261-2270
[Abstract]
(238)
[HTML 1 KB]
[PDF 1050 KB]
(80)
|
|
2155 |
Jing ZHOU, Yiyu HU, Chengyu HU, Tianjiang WANG |
|
|
Weakly perceived object detection method based on point cloud completion and multi-resolution Transformer |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2155-2165
[Abstract]
(302)
[HTML 1 KB]
[PDF 3409 KB]
(163)
|
|
3018 |
Changhong LIU, Sheng ZENG, Bin ZHANG, Yong CHEN |
|
|
Cross-modal tensor fusion network based on semantic relation graph for image-text retrieval |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3018-3024
[Abstract]
(373)
[HTML 0 KB]
[PDF 2407 KB]
(187)
|
|
1109 |
Peng LI, Shilin WANG, Guangwu CHEN, Guanghui YAN |
|
|
Key node mining in complex network based on improved local structural entropy |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1109-1114
[Abstract]
(607)
[HTML 1 KB]
[PDF 1367 KB]
(280)
|
|
1855 |
Lianpeng QIU, Chengyun SONG |
|
|
Noise robust dynamic time warping algorithm |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1855-1860
[Abstract]
(292)
[HTML 1 KB]
[PDF 3337 KB]
(92)
|
|
2182 |
Jiaming HE, Jucheng YANG, Chao WU, Xiaoning YAN, Nenghua XU |
|
|
Person re-identification method based on multi-modal graph convolutional neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2182-2189
[Abstract]
(476)
[HTML 1 KB]
[PDF 1887 KB]
(303)
|
|
1719 |
Nannan SUN, Chunhui PIAO, Xinna MA |
|
|
Group buying recommendation method based on social relationship and time-series information |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1719-1729
[Abstract]
(312)
[HTML 1 KB]
[PDF 3041 KB]
(149)
|
|
1736 |
Wenju LI, Mengying LI, Liu CUI, Wanghui CHU, Yi ZHANG, Hui GAO |
|
|
Monocular depth estimation method based on pyramid split attention network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1736-1742
[Abstract]
(323)
[HTML 1 KB]
[PDF 2767 KB]
(156)
|
|
2295 |
Yiyu GUO, Luoyu ZHOU, Xinyu LIU, Yao LI |
|
|
Dangerous goods detection method in elevator scene based on improved attention mechanism |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2295-2302
[Abstract]
(286)
[HTML 1 KB]
[PDF 5447 KB]
(182)
|
|
1438 |
Jingsheng LEI, Kaijun LA, Shengying YANG, Yi WU |
|
|
Joint entity and relation extraction based on contextual semantic enhancement |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1438-1444
[Abstract]
(490)
[HTML 1 KB]
[PDF 1612 KB]
(292)
|
|
2358 |
Yuan LIU, Yongquan DONG, Rui JIA, Haolin YANG |
|
|
Hierarchical and phased attention network model for personalized course recommendation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2358-2363
[Abstract]
(293)
[HTML 1 KB]
[PDF 979 KB]
(213)
|
|
37 |
LIU Huan, DOU Quansheng |
|
|
Aspect-based sentiment analysis model embedding different neighborhood representations |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 37-44
[Abstract]
(395)
[HTML 1 KB]
[PDF 1680 KB]
(121)
|
|
0 |
|
|
|
Explainable Recommendation Mechanism based on collaborative knowledge graph and counterfactuals |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(175)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
0 |
|
|
|
OmegaDB, A Relational Operator Concurrent Computing Framework for Heterogeneous Architectures |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(195)
[HTML 0 KB]
[PDF 0 KB]
(16)
|
|
2010 |
Menglin HUANG, Lei DUAN, Yuanhao ZHANG, Peiyan WANG, Renhao LI |
|
|
Prompt learning based unsupervised relation extraction model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2010-2016
[Abstract]
(654)
[HTML 1 KB]
[PDF 1353 KB]
(279)
|
|
0 |
|
|
|
Dictionary Partition Vector Space Model for Encrypted Ranked Search in the Cloud |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(90)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
1979 |
Yi ZHANG, Zhenmei WANG |
|
|
circRNA-disease association prediction by two-stage fusion on graph auto-encoder |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1979-1986
[Abstract]
(366)
[HTML 1 KB]
[PDF 1805 KB]
(112)
|
|
0 |
|
|
|
Differential privacy generative adversarial network algorithm for dynamic gradient threshold clipping |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(529)
[HTML 0 KB]
[PDF 0 KB]
(18)
|
|
0 |
|
|
|
Parallel Calculation Method of Betweenness Centrality for Dynamic Networks |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(94)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
0 |
|
|
|
Wireless Traffic Prediction Based on Federated Learning |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(151)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
2311 |
Yuanyuan QIN, Hong ZHANG |
|
|
Pulmonary nodule detection algorithm based on attention feature pyramid networks |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2311-2318
[Abstract]
(333)
[HTML 1 KB]
[PDF 2687 KB]
(173)
|
|
2226 |
Erchao LI, Yanli CHENG |
|
|
Dynamic multi-objective optimization algorithm based on weight vector clustering |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2226-2236
[Abstract]
(232)
[HTML 1 KB]
[PDF 3030 KB]
(85)
|
|
2288 |
Anyang LIU, Huaici ZHAO, Wenlong CAI, Zechao XU, Ruideng XIE |
|
|
Adaptive image deblurring generative adversarial network algorithm based on active discrimination mechanism |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2288-2294
[Abstract]
(251)
[HTML 1 KB]
[PDF 2675 KB]
(156)
|
|
2125 |
Yi ZHANG, Gangsheng CAI, Zhenmei WANG |
|
|
Long non-coding RNA-disease association prediction model based on semantic and global dual attention mechanism |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2125-2132
[Abstract]
(343)
[HTML 1 KB]
[PDF 781 KB]
(171)
|
|
1705 |
Zhongping ZHANG, Xin GUO, Yuting ZHANG, Ruibo ZHANG |
|
|
Outlier detection algorithm based on hologram stationary distribution factor |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1705-1712
[Abstract]
(221)
[HTML 1 KB]
[PDF 3993 KB]
(131)
|
|
2116 |
Yuxin TUO, Tao XUE |
|
|
Joint triple extraction model combining pointer network and relational embedding |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2116-2124
[Abstract]
(438)
[HTML 1 KB]
[PDF 1576 KB]
(136)
|
|
2868 |
Bo WANG, Hao WANG, Xiaoxin DU, Xiaodong ZHENG, Wei ZHOU |
|
|
Hybrid dragonfly algorithm based on subpopulation and differential evolution |
|
|
|
Journal of Computer Applications
2023 Vol.43 (9): 2868-2876
[Abstract]
(262)
[HTML 1 KB]
[PDF 2338 KB]
(156)
|
|
1768 |
Yao LIU, Xin TONG, Yifeng CHEN |
|
|
Algorithm path self-assembling model for business requirements |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1768-1778
[Abstract]
(251)
[HTML 1 KB]
[PDF 1992 KB]
(69)
|
|
2237 |
Meiying CHENG, Qian QIAN, Weiqing XIONG |
|
|
Symbiotic organisms search algorithm for information transfer multi-task optimization |
|
|
|
Journal of Computer Applications
2023 Vol.43 (7): 2237-2247
[Abstract]
(226)
[HTML 1 KB]
[PDF 3862 KB]
(77)
|
|
1687 |
Jing QIN, Xueqian MA, Fujie GAO, Changqing JI, Zumin WANG |
|
|
Survey of Parkinson’s disease auxiliary diagnosis methods based on gait analysis |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1687-1695
[Abstract]
(514)
[HTML 1 KB]
[PDF 2009 KB]
(318)
|
|
2462 |
Dongdong LIN, Manman LI, Shaozhen CHEN |
|
|
Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers |
|
|
|
Journal of Computer Applications
2023 Vol.43 (8): 2462-2470
[Abstract]
(269)
[HTML 1 KB]
[PDF 2057 KB]
(168)
|
|
2943 |
Chuan ZHAO, Luyao LI, Haoxiong YANG, Min ZUO |
|
|
Optimization model of inventory system under stochastic disturbance based on active disturbance rejection control |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2943-2951
[Abstract]
(276)
[HTML 0 KB]
[PDF 3630 KB]
(60)
|
|
2909 |
Hanqing LIU, Xiaodong KANG, Fuqing ZHANG, Xiuyuan ZHAO, Jingyi YANG, Xiaotian WANG, Mengfan LI |
|
|
Image detection algorithm of cerebral arterial stenosis by improved Libra region-convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2909-2916
[Abstract]
(338)
[HTML 0 KB]
[PDF 5263 KB]
(186)
|
|
2693 |
Guanyou XU, Weisen FENG |
|
|
Python named entity recognition model based on transformer |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2693-2700
[Abstract]
(516)
[HTML 0 KB]
[PDF 1723 KB]
(212)
|
|
2686 |
Xudong HOU, Fei TENG, Yi ZHANG |
|
|
Medical named entity recognition model based on deep auto-encoding |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2686-2692
[Abstract]
(261)
[HTML 0 KB]
[PDF 979 KB]
(114)
|
|
706 |
Yu WANG, Yubo YUAN, Yi GUO, Jiajie ZHANG |
|
|
Sentiment boosting model for emotion recognition in conversation text |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 706-712
[Abstract]
(694)
[HTML 1 KB]
[PDF 1123 KB]
(371)
|
|
1606 |
Yang LIU, Zhiyang LU, Jun WANG, Jun SHI |
|
|
Gibbs artifact removal algorithm for magnetic resonance imaging based on self-attention connection UNet |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1606-1611
[Abstract]
(457)
[HTML 1 KB]
[PDF 1363 KB]
(194)
|
|
930 |
Haifeng LI, Fan ZHANG, Minnan PIAO, Huaichao WANG, Nansha LI, Zhongcheng GUI |
|
|
Automatic detection of targets under airport pavement based on channel and spatial attention |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 930-935
[Abstract]
(349)
[HTML 1 KB]
[PDF 1874 KB]
(152)
|
|
949 |
Tian CHEN, Jianyong LU, Jun LIU, Huaguo LIANG, Yingchun LU |
|
|
Reconfigurable test scheme for 3D stacked integrated circuits based on 3D linear feedback shift register |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 949-955
[Abstract]
(276)
[HTML 1 KB]
[PDF 2075 KB]
(105)
|
|
736 |
Tao PENG, Yalong KANG, Feng YU, Zili ZHANG, Junping LIU, Xinrong HU, Ruhan HE, Li LI |
|
|
Pedestrian trajectory prediction based on multi-head soft attention graph convolutional network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 736-743
[Abstract]
(434)
[HTML 1 KB]
[PDF 5673 KB]
(209)
|
|
943 |
You YANG, Ruhui ZHANG, Pengcheng XU, Kang KANG, Hao ZHAI |
|
|
Improved U-Net for seal segmentation of Republican archives |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 943-948
[Abstract]
(350)
[HTML 1 KB]
[PDF 1722 KB]
(119)
|
|
1220 |
Tianzouzi XIAO, Xiaobo ZHOU, Xin LUO, Qipeng TANG |
|
|
Robust RGB-D SLAM system incorporating instance segmentation and clustering in dynamic environment |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1220-1225
[Abstract]
(300)
[HTML 1 KB]
[PDF 2537 KB]
(158)
|
|
1255 |
Qingyu JIA, Liang CHANG, Xianyi YANG, Baohua QIANG, Shihao ZHANG, Wu XIE, Minghao YANG |
|
|
Real-time reconstruction method of visual information for manipulator operation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1255-1260
[Abstract]
(361)
[HTML 1 KB]
[PDF 2136 KB]
(225)
|
|
1297 |
Lu CHEN, Daoxi CHEN, Yiming LU, Weizhong LU |
|
|
Handwritten mathematical expression recognition model based on attention mechanism and encoder-decoder |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1297-1302
[Abstract]
(528)
[HTML 1 KB]
[PDF 1695 KB]
(253)
|
|
1115 |
Caiqian BAO, Jianmin XU, Guofang ZHANG |
|
|
Extended belief network recommendation model based on user dynamic interaction behavior |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1115-1121
[Abstract]
(262)
[HTML 1 KB]
[PDF 1378 KB]
(72)
|
|
1261 |
Xiaoyu FAN, Suzhen LIN, Yanbo WANG, Feng LIU, Dawei LI |
|
|
Reconstruction algorithm for highly undersampled magnetic resonance images based on residual graph convolutional neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1261-1268
[Abstract]
(398)
[HTML 1 KB]
[PDF 2569 KB]
(152)
|
|
0 |
|
|
|
Stacking algorithm based on dynamic clustering and its application |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(114)
[HTML 1 KB]
[PDF 888 KB]
(64)
|
|
1676 |
Zhihui GAO, Meng HAN, Shujuan LIU, Ang LI, Dongliang MU |
|
|
Survey of high utility itemset mining methods based on intelligent optimization algorithm |
|
|
|
Journal of Computer Applications
2023 Vol.43 (6): 1676-1686
[Abstract]
(424)
[HTML 1 KB]
[PDF 1951 KB]
(249)
|
|
1461 |
Senqi YANG, Xuliang DUAN, Zhan XIAO, Songsong LANG, Zhiyong LI |
|
|
Text classification of agricultural news based on ERNIE+DPCNN+BiGRU |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1461-1466
[Abstract]
(500)
[HTML 1 KB]
[PDF 1813 KB]
(335)
|
|
0 |
|
|
|
Global image caption method based on graph attention network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(210)
[HTML 1 KB]
[PDF 590 KB]
(91)
|
|
2440 |
Jian ZHANG, Peiyuan CHENG, Siyu SHAO |
|
|
Rotary machine fault diagnosis based on improved residual convolutional auto-encoding network and class adaptation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2440-2449
[Abstract]
(297)
[HTML 0 KB]
[PDF 1320 KB]
(76)
|
|
2401 |
Nanjiang CHENG, Zhenxia YU, Lin CHEN, Hezhe QIAO |
|
|
Multi-source and multi-label pedestrian attribute recognition based on domain adaptation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2401-2406
[Abstract]
(366)
[HTML 0 KB]
[PDF 658 KB]
(168)
|
|
2394 |
Xianjie ZHANG, Zhiming ZHANG |
|
|
Handwritten English text recognition based on convolutional neural network and Transformer |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2394-2400
[Abstract]
(642)
[HTML 0 KB]
[PDF 703 KB]
(349)
|
|
2386 |
Xiaoyu CHEN, Wei WANG |
|
|
Semantic extraction of domain-dependent mathematical text |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2386-2393
[Abstract]
(257)
[HTML 0 KB]
[PDF 791 KB]
(56)
|
|
356 |
Qingtang LIU, Xinqian MA, Jie ZHOU, Linjing WU, Pengxiao ZHOU |
|
|
Understanding of math word problems integrating commonsense knowledge base and grammatical features |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 356-364
[Abstract]
(383)
[HTML 1 KB]
[PDF 1525 KB]
(113)
|
|
51 |
SHEN Zhijun, MU Lina, GAO Jing, SHI Yuanhang, LIU Zhiqiang |
|
|
Review of fine-grained image categorization |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 51-60
[Abstract]
(1178)
[HTML 1 KB]
[PDF 2674 KB]
(688)
|
|
1534 |
Jihui LIU, Chengwan HE |
|
|
Online detection of SQL injection attacks based on ECA rules and dynamic taint analysis |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1534-1542
[Abstract]
(423)
[HTML 1 KB]
[PDF 2389 KB]
(251)
|
|
1401 |
Bin WANG, Tian XIANG, Yidong LYU, Xiaofan WANG |
|
|
Adaptive multi-scale feature channel grouping optimization algorithm based on NSGA‑Ⅱ |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1401-1408
[Abstract]
(287)
[HTML 1 KB]
[PDF 3248 KB]
(154)
|
|
1511 |
Kejun JIN, Hongtao YU, Yiteng WU, Shaomei LI, Jianpeng ZHANG, Honghao ZHENG |
|
|
Improved defense method for graph convolutional network based on singular value decomposition |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1511-1517
[Abstract]
(330)
[HTML 1 KB]
[PDF 760 KB]
(156)
|
|
1584 |
Liyao FU, Mengxiao YIN, Feng YANG |
|
|
Transformer based U-shaped medical image segmentation network: a survey |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1584-1595
[Abstract]
(1654)
[HTML 1 KB]
[PDF 1887 KB]
(1176)
|
|
2239 |
Yuanliang XUE, Guodong JIN, Lining TAN, Jiankun XU |
|
|
Pixel classification-based multiscale UAV aerial object rotational tracking algorithm |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2239-2247
[Abstract]
(357)
[HTML 0 KB]
[PDF 4732 KB]
(69)
|
|
2118 |
Ning DONG, Xiaorong CHENG, Mingquan ZHANG |
|
|
Intrusion detection system with dynamic weight loss function based on internet of things platform |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2118-2124
[Abstract]
(340)
[HTML 0 KB]
[PDF 1166 KB]
(111)
|
|
2112 |
Chunming TANG, Yuqing CHEN, Zidi ZHANG |
|
|
Improved consensus algorithm based on binomial swap forest and HotStuff |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2112-2117
[Abstract]
(408)
[HTML 0 KB]
[PDF 2344 KB]
(114)
|
|
2104 |
Jie ZHANG, Shanshan XU, Lingyun YUAN |
|
|
Internet of things access control model based on blockchain and edge computing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2104-2111
[Abstract]
(487)
[HTML 0 KB]
[PDF 3421 KB]
(170)
|
|
2094 |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN |
|
|
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2094-2103
[Abstract]
(423)
[HTML 0 KB]
[PDF 1632 KB]
(151)
|
|
1993 |
Juan WANG, Xuliang YUAN, Minghu WU, Liquan GUO, Zishan LIU |
|
|
Real-time semantic segmentation method based on squeezing and refining network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1993-2000
[Abstract]
(377)
[HTML 0 KB]
[PDF 2950 KB]
(139)
|
|
869 |
Qing YE, Xin SHI, Mengwei SUN, Jian ZHU |
|
|
Greedy synchronization topology algorithm based on formal concept analysis for traffic surveillance based sensor network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 869-875
[Abstract]
(280)
[HTML 1 KB]
[PDF 1587 KB]
(80)
|
|
909 |
Qiuyu ZHANG, Yukun WANG |
|
|
Speech classification model based on improved Inception network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 909-915
[Abstract]
(407)
[HTML 1 KB]
[PDF 1970 KB]
(121)
|
|
329 |
Xingbin LIAO, Xiaolin QIN, Siqi ZHANG, Yangge QIAN |
|
|
Review of interactive machine translation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 329-334
[Abstract]
(835)
[HTML 1 KB]
[PDF 1870 KB]
(540)
|
|
365 |
Jie HU, Xiaoxi CHEN, Yan ZHANG |
|
|
Answer selection model based on pooling and feature combination enhanced BERT |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 365-373
[Abstract]
(402)
[HTML 1 KB]
[PDF 1248 KB]
(178)
|
|
0 |
|
|
|
CCDM2022+250 Extraction of PM2.5Diffusion Characteristics Based on Candlestick Pattern Matching |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(111)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
Research on user granularity-level personalized social text generation technology |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(92)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
0 |
|
|
|
Virus propagation model and stability analysis of heterogeneous backup network |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(56)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
A deep graph matching model via self-attention network |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(71)
[HTML 0 KB]
[PDF 0 KB]
(3)
|
|
0 |
|
|
|
Federated Learning with Personalized Differential Privacy |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(216)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
0 |
|
|
|
Stock Movement Prediction with Dynamic and Hierarchical Macro Information of Market(CCDM2022+ 94) |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(94)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
0 |
|
|
|
Discriminative multidimensional scaling for feature learning(CCDM2022+219) |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(76)
[HTML 0 KB]
[PDF 0 KB]
(4)
|
|
0 |
|
|
|
CCDM 2022+65: An improved capsule network based on multipath feature |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(83)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
1922 |
Yang LI, Long XU, Yanqiang LI, Shaopeng LI |
|
|
Smart contract-based access control architecture and verification for internet of things |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1922-1931
[Abstract]
(424)
[HTML 0 KB]
[PDF 3580 KB]
(190)
|
|
1898 |
Meng YU, Wentao HE, Xuchuan ZHOU, Mengtian CUI, Keqi WU, Wenjie ZHOU |
|
|
Review of recommendation system |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1898-1913
[Abstract]
(2109)
[HTML 0 KB]
[PDF 3152 KB]
(1747)
|
|
1876 |
Guangkai LIAO, Zheng ZHANG, Zhiguo SONG |
|
|
Convolutional network-based vehicle re-identification combining wavelet features and attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1876-1883
[Abstract]
(376)
[HTML 0 KB]
[PDF 2250 KB]
(108)
|
|
1869 |
Lei YANG, Hongdong ZHAO, Kuaikuai YU |
|
|
End-to-end speech emotion recognition based on multi-head attention |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1869-1875
[Abstract]
(402)
[HTML 0 KB]
[PDF 2133 KB]
(171)
|
|
1862 |
Yumin HAN, Xiaoyan HAO |
|
|
Material entity recognition based on subword embedding and relative attention |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1862-1868
[Abstract]
(291)
[HTML 0 KB]
[PDF 1612 KB]
(99)
|
|
1844 |
Weikang ZHANG, Sheng LIU, Qian HUANG, Yuxin GUO |
|
|
Equilibrium optimizer considering distance factor and elite evolutionary strategy |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1844-1851
[Abstract]
(291)
[HTML 0 KB]
[PDF 1083 KB]
(82)
|
|
1504 |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG |
|
|
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (5): 1504-1510
[Abstract]
(303)
[HTML 1 KB]
[PDF 503 KB]
(109)
|
|
111 |
MA Yongqiang, CHEN Xiaomeng, YU Ziqiang |
|
|
Range query algorithm for large scale moving objects in distributed environment |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 111-121
[Abstract]
(290)
[HTML 1 KB]
[PDF 3320 KB]
(68)
|
|
250 |
WANG Youxin, CHEN Bin |
|
|
Print defect detection method based on deep comparison network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 250-258
[Abstract]
(599)
[HTML 1 KB]
[PDF 2660 KB]
(454)
|
|
903 |
Kai LUO, Liang CHEN, Wei LIANG, Yongqiang CHEN |
|
|
Sparse representation-based reconstruction algorithm for filtered back-projection ultrasound tomography |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 903-908
[Abstract]
(311)
[HTML 1 KB]
[PDF 1939 KB]
(105)
|
|
507 |
Qing JIA, Laihua WANG, Weisheng WANG |
|
|
Anomaly detection in video via independently recurrent neural network and variational autoencoder network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 507-513
[Abstract]
(379)
[HTML 1 KB]
[PDF 2994 KB]
(133)
|
|
374 |
Yang WANG, Hongliang FU, Huawei TAO, Jing YANG, Yue XIE, Li ZHAO |
|
|
Cross-corpus speech emotion recognition based on decision boundary optimized domain adaptation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 374-379
[Abstract]
(387)
[HTML 1 KB]
[PDF 3084 KB]
(212)
|
|
1616 |
Youzhi LI, Zhihua HU, Chun CHEN, Peibei YANG, Yajing DONG |
|
|
Prediction model of transaction pricing in internet freight transport platform based on combination of dual long short-term memory networks |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1616-1623
[Abstract]
(328)
[HTML 1 KB]
[PDF 2220 KB]
(113)
|
|
1563 |
Ye ZHANG, Rong LIU, Ming LIU, Ming CHEN |
|
|
Image super-resolution reconstruction network based on multi-channel attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1563-1569
[Abstract]
(324)
[HTML 1 KB]
[PDF 3016 KB]
(128)
|
|
1531 |
Xinyu GE, Shiping CHEN, Zhong LIU |
|
|
Real root isolation algorithm for exponential function polynomials |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1531-1537
[Abstract]
(237)
[HTML 1 KB]
[PDF 503 KB]
(51)
|
|
1431 |
Zhen QU, Kunting LI, Zhixi FENG |
|
|
Remote sensing image scene classification based on effective channel attention |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1431-1439
[Abstract]
(399)
[HTML 1 KB]
[PDF 2678 KB]
(154)
|
|
1391 |
Daili CHEN, Guoliang XU |
|
|
Cross-domain person re-identification method based on attention mechanism with learning intra-domain variance |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1391-1397
[Abstract]
(394)
[HTML 1 KB]
[PDF 2210 KB]
(293)
|
|
1367 |
Han MENG, Liang MA, Yong LIU |
|
|
Human learning optimization algorithm based on learning psychology |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1367-1374
[Abstract]
(363)
[HTML 1 KB]
[PDF 1244 KB]
(267)
|
|
1355 |
Lin SUN, Jing ZHAO, Jiucheng XU, Xinya WANG |
|
|
Feature selection algorithm based on neighborhood rough set and monarch butterfly optimization |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1355-1366
[Abstract]
(364)
[HTML 1 KB]
[PDF 1375 KB]
(102)
|
|
1347 |
Xueqin CHEN, Tao TAO, Zhongwang ZHANG, Yilei WANG |
|
|
Long short-term session-based recommendation algorithm combining paired coding scheme and two-dimensional conventional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1347-1354
[Abstract]
(363)
[HTML 1 KB]
[PDF 1011 KB]
(114)
|
|
1339 |
Li’e WANG, Xiaocong LI, Hongyi LIU |
|
|
News recommendation method with knowledge graph and differential privacy |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1339-1346
[Abstract]
(453)
[HTML 1 KB]
[PDF 1421 KB]
(183)
|
|
1330 |
Liqing QIU, Fushuai QU |
|
|
Emotional map of emergency based on sentiment analysis and influence evaluation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1330-1338
[Abstract]
(362)
[HTML 1 KB]
[PDF 3347 KB]
(376)
|
|
1317 |
Xianfeng YANG, Jiahe ZHAO, Ziqiang LI |
|
|
Text classification model combining word annotations |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1317-1323
[Abstract]
(384)
[HTML 1 KB]
[PDF 1662 KB]
(309)
|
|
312 |
LIAO Fakang, ZHOU Yali, ZHANG Qizhi |
|
|
Walking control and stability analysis of flexible biped robot with variable length legs |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 312-320
[Abstract]
(341)
[HTML 1 KB]
[PDF 4678 KB]
(105)
|
|
306 |
ZHENG Wanbo, CHEN Huimin, WU Yanqing, XIA Yunni |
|
|
Simulation of information sharing strategy based on emergency rescue |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 306-311
[Abstract]
(329)
[HTML 1 KB]
[PDF 1217 KB]
(72)
|
|
728 |
Yingmao YAO, Xiaoyan JIANG |
|
|
Video-based person re-identification method based on graph convolution network and self-attention graph pooling |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 728-735
[Abstract]
(449)
[HTML 1 KB]
[PDF 2665 KB]
(228)
|
|
608 |
Wenju LI, Gan ZHANG, Liu CUI, Wanghui CHU |
|
|
Lightweight traffic sign recognition model based on coordinate attention |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 608-614
[Abstract]
(502)
[HTML 1 KB]
[PDF 2351 KB]
(265)
|
|
45 |
LIU Hui, MA Xiang, ZHANG Linyu, HE Rujin |
|
|
Aspect-based sentiment analysis model integrating match-LSTM network and grammatical distance |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 45-50
[Abstract]
(356)
[HTML 1 KB]
[PDF 1828 KB]
(253)
|
|
154 |
NONG Qiang, ZHANG Bangbang, OUYANG Yuhao |
|
|
Lattice-based hierarchical certificateless proxy signature scheme |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 154-159
[Abstract]
(300)
[HTML 1 KB]
[PDF 749 KB]
(151)
|
|
3527 |
Jiaju ZHANG, Huiping LIN |
|
|
Product and service quality analysis based on customer service dialogues |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3527-3533
[Abstract]
(407)
[HTML 1 KB]
[PDF 2371 KB]
(74)
|
|
467 |
Jie LIANG, Xiaoyan HAO, Yongle CHEN |
|
|
Poisoning attack toward visual classification model |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 467-473
[Abstract]
(570)
[HTML 1 KB]
[PDF 3264 KB]
(256)
|
|
529 |
Ping WANG, Nan CHEN, Lei LU |
|
|
Fall detection algorithm based on scene prior and attention guidance |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 529-535
[Abstract]
(427)
[HTML 1 KB]
[PDF 1544 KB]
(124)
|
|
413 |
Chunyong YIN, Ying LI |
|
|
Fast sanitization algorithm based on BCU-Tree and dictionary for high-utility mining |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 413-422
[Abstract]
(351)
[HTML 1 KB]
[PDF 2958 KB]
(116)
|
|
209 |
SUN Yuan, SHEN Wenjian, NI Pengbo, MAO Min, XIE Yaqi, XU Chaonong |
|
|
Sink location algorithm of power domain nonorthogonal multiple access for real-time industrial internet of things |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 209-214
[Abstract]
(320)
[HTML 1 KB]
[PDF 2234 KB]
(100)
|
|
1125 |
Teng TENG, Haiwei PAN, Kejia ZHANG, Xuelian MU, Ximing ZHANG, Weipeng CHEN |
|
|
Attention mechanism based Stack-CNN model to support Chinese medical questions and answers |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1125-1130
[Abstract]
(522)
[HTML 1 KB]
[PDF 726 KB]
(277)
|
|
1050 |
Shoulong JIAO, Youxiang DUAN, Qifeng SUN, Zihao ZHUANG, Chenhao SUN |
|
|
Knowledge representation learning method incorporating entity description information and neighbor node features |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1050-1056
[Abstract]
(416)
[HTML 0 KB]
[PDF 671 KB]
(194)
|
|
1011 |
Yingjie WANG, Jiuqi ZHU, Zumin WANG, Fengbo BAI, Jian GONG |
|
|
Review of applications of natural language processing in text sentiment analysis |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1011-1020
[Abstract]
(2723)
[HTML 0 KB]
[PDF 783 KB]
(1628)
|
|
3679 |
Zhijin LI, Hua LAI, Yonghua WEN, Shengxiang GAO |
|
|
Neural machine translation integrating bidirectional-dependency self-attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3679-3685
[Abstract]
(334)
[HTML 1 KB]
[PDF 961 KB]
(149)
|
|
521 |
Ranyan NI, Yi ZHANG |
|
|
Action recognition method based on video spatio-temporal features |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 521-528
[Abstract]
(411)
[HTML 1 KB]
[PDF 2494 KB]
(121)
|
|
972 |
Jinyue LIU, Huiyu LI, Xiaohui JIA, Jiarui LI |
|
|
Dynamic gait recognition method based on human model constraints |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 972-977
[Abstract]
(399)
[HTML 1 KB]
[PDF 3439 KB]
(167)
|
|
615 |
Chao GE, Yaxin ZHANG, Yue LIU, Hong WANG |
|
|
Non-fragile dissipative control scheme for event-triggered networked systems |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 615-621
[Abstract]
(332)
[HTML 1 KB]
[PDF 2029 KB]
(66)
|
|
848 |
Weikang CHEN, Qiqing ZHAI, Youguo WANG |
|
|
Multivariate communication system based on discrete bidirectional associative memory neural network |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 848-852
[Abstract]
(262)
[HTML 1 KB]
[PDF 2244 KB]
(69)
|
|
552 |
Guihui CHEN, Jinyu LIN, Yuehua LI, Zhongbing LI, Yuli WEI, Kai LU |
|
|
Multi-stage low-illuminance image enhancement network based on attention mechanism |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 552-559
[Abstract]
(375)
[HTML 1 KB]
[PDF 4056 KB]
(176)
|
|
2593 |
Jiehang DENG, Wenquan GUO, Hanjie CHEN, Guosheng GU, Jingjian LIU, Yukun DU, Chao LIU, Xiaodong KANG, Jian ZHAO |
|
|
Few-shot diatom detection combining multi-scale multi-head self-attention and online hard example mining |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2593-2600
[Abstract]
(442)
[HTML 1 KB]
[PDF 1490 KB]
(132)
|
|
3831 |
Jingwei LEI, Peng YI, Xiang CHEN, Liang WANG, Ming MAO |
|
|
PDF document detection model based on system calls and data provenance |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3831-3840
[Abstract]
(377)
[HTML 1 KB]
[PDF 3249 KB]
(120)
|
|
3033 |
Yuhao ZHANG, Mengwen YUAN, Yujing LU, Rui YAN, Huajin TANG |
|
|
Neural network conversion method for dynamic event stream |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3033-3039
[Abstract]
(483)
[HTML 1 KB]
[PDF 2014 KB]
(234)
|
|
3011 |
Lanlan ZENG, Yisong WANG, Panfeng CHEN |
|
|
Named entity recognition based on BERT and joint learning for judgment documents |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3011-3017
[Abstract]
(517)
[HTML 1 KB]
[PDF 1601 KB]
(257)
|
|
3111 |
Hongqiao MA, Wenzhong YANG, Peng KANG, Jiankang YANG, Yuanshan LIU, Yue ZHOU |
|
|
Survey of named data networking |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3111-3123
[Abstract]
(713)
[HTML 1 KB]
[PDF 2976 KB]
(375)
|
|
3275 |
Jingyi QU, Liu YANG, Xuyang CHEN, Qian WANG |
|
|
Flight delay prediction model based on Conv-LSTM with spatiotemporal sequence |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3275-3282
[Abstract]
(490)
[HTML 1 KB]
[PDF 3421 KB]
(180)
|
|
0 |
|
|
|
Cross-Modal Tensor Fusion Network based on Semantic Relation Graph for Image-Text Retrieval |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(235)
[HTML 1 KB]
[PDF 888 KB]
(92)
|
|
3091 |
Dong ZHU, Xinchun YIN, Jianting NING |
|
|
Certificateless signature scheme with strong privacy protection for internet of vehicles |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3091-3101
[Abstract]
(417)
[HTML 1 KB]
[PDF 1079 KB]
(230)
|
|
0 |
|
|
|
Empathy Prediction from Texts based on Transfer Learning |
|
|
|
Journal of Computer Applications
Vol. (): 0-0
[Abstract]
(79)
[HTML 0 KB]
[PDF 0 KB]
(5)
|
|
1814 |
Min WEN, Rongcun WANG, Shujuan JIANG |
|
|
Source code vulnerability detection based on relational graph convolution network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1814-1821
[Abstract]
(563)
[HTML 1 KB]
[PDF 1719 KB]
(312)
|
|
1796 |
Hao LI, Yanping CHEN, Ruixue TANG, Ruizhang HUANG, Yongbin QIN, Guorong WANG, Xi TAN |
|
|
Relation extraction method based on entity boundary combination |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1796-1801
[Abstract]
(322)
[HTML 1 KB]
[PDF 1005 KB]
(99)
|
|
1776 |
Yu XIA, Junwu ZHU, Yi JIANG, Xin GAO, Maosheng SUN |
|
|
Cross-regional order allocation strategy for ride-hailing under tight transport capacity |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1776-1781
[Abstract]
(481)
[HTML 1 KB]
[PDF 1163 KB]
(69)
|
|
1116 |
Haifeng ZHANG, Cheng ZENG, Lie PAN, Rusong HAO, Chaodong WEN, Peng HE |
|
|
News topic text classification method based on BERT and feature projection network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1116-1124
[Abstract]
(713)
[HTML 1 KB]
[PDF 1536 KB]
(366)
|
|
1253 |
Guifang QIAO, Shouming HOU, Yanyan LIU |
|
|
Facial expression recognition algorithm based on combination of improved convolutional neural network and support vector machine |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1253-1259
[Abstract]
(518)
[HTML 1 KB]
[PDF 1504 KB]
(254)
|
|
1044 |
Changqing JI, Zhiyong GAO, Jing QIN, Zumin WANG |
|
|
Review of image classification algorithms based on convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1044-1049
[Abstract]
(2549)
[HTML 1 KB]
[PDF 605 KB]
(1602)
|
|
1029 |
Jing QIN, Fali SUN, Fang HUI, Zumin WANG, Bing GAO, Changqing JI |
|
|
Review of key technology and application of wearable electroencephalogram device |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1029-1035
[Abstract]
(856)
[HTML 1 KB]
[PDF 725 KB]
(669)
|
|
962 |
Xianbojun FAN, Lijia CHEN, Shen LI, Chenlu WANG, Min WANG, Zan WANG, Mingguo LIU |
|
|
Robust joint modeling and optimization method for visual manipulators |
|
|
|
Journal of Computer Applications
2023 Vol.43 (3): 962-971
[Abstract]
(329)
[HTML 1 KB]
[PDF 6333 KB]
(214)
|
|
980 |
Xin LING, Minzheng LI |
|
|
Hybrid beamforming method with high spectral efficiency for unmanned aerial vehicle patrol system |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 980-984
[Abstract]
(246)
[HTML 0 KB]
[PDF 596 KB]
(65)
|
|
968 |
Gong GAO, Hongyu YANG, Hong LIU |
|
|
Quality judgment of 3D face point cloud based on feature fusion |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 968-973
[Abstract]
(287)
[HTML 0 KB]
[PDF 861 KB]
(80)
|
|
960 |
Cong HU, Gang HUA |
|
|
Weakly supervised action localization method based on attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 960-967
[Abstract]
(292)
[HTML 0 KB]
[PDF 573 KB]
(77)
|
|
953 |
Dejian WEI, Wenming WANG, Quanyu WANG, Haopan REN, Yanyan GAO, Zhi WANG |
|
|
Improved 3D hand pose estimation network based on anchor |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 953-959
[Abstract]
(325)
[HTML 0 KB]
[PDF 659 KB]
(107)
|
|
930 |
Leping LIN, Hongmin ZHOU, Ning OUYANG |
|
|
Compressed sensing image reconstruction method fusing spatial location and structure information |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 930-937
[Abstract]
(253)
[HTML 0 KB]
[PDF 2281 KB]
(79)
|
|
911 |
Jingwen WU, Xinchun YIN, Jianting NING |
|
|
Revocable aggregate signature authentication scheme for vehicular ad hoc networks |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 911-920
[Abstract]
(342)
[HTML 0 KB]
[PDF 684 KB]
(106)
|
|
904 |
An YANG, Qun JIANG, Gang SUN, Jie YIN, Ying LIU |
|
|
Power data analysis based on financial technical indicators |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 904-910
[Abstract]
(359)
[HTML 0 KB]
[PDF 785 KB]
(105)
|
|
874 |
Fangxin NIE, Yujia WANG, Xin JIA |
|
|
Teaching and learning information interactive particle swarm optimization algorithm |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 874-882
[Abstract]
(353)
[HTML 0 KB]
[PDF 1395 KB]
(95)
|
|
867 |
Zengzhen DU, Dongxin TANG, Dan XIE |
|
|
Method of generating rhetorical questions based on deep neural network in intelligent consultation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 867-873
[Abstract]
(338)
[HTML 0 KB]
[PDF 758 KB]
(171)
|
|
860 |
Qiujie SUN, Jinggui LIANG, Si LI |
|
|
Chinese grammatical error correction model based on bidirectional and auto-regressive transformers noiser |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 860-866
[Abstract]
(589)
[HTML 0 KB]
[PDF 625 KB]
(286)
|
|
833 |
Wenqiu ZHU, Guang ZOU, Zhigao ZENG |
|
|
Object tracking algorithm with hierarchical features and hybrid attention |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 833-843
[Abstract]
(397)
[HTML 0 KB]
[PDF 9505 KB]
(203)
|
|
804 |
Bin LIU, Gangqing LI, Chengquan AN, Shuigen WANG, Jiansheng WANG |
|
|
Infrared monocular ranging algorithm based on multiscale feature fusion |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 804-809
[Abstract]
(472)
[HTML 0 KB]
[PDF 1946 KB]
(178)
|
|
713 |
Shuting XUAN, Jinglei LIU |
|
|
Clustering based on discrete hashing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 713-723
[Abstract]
(318)
[HTML 0 KB]
[PDF 1072 KB]
(145)
|
|
708 |
Renjie XU, Baodi LIU, Kai ZHANG, Weifeng LIU |
|
|
Model agnostic meta learning algorithm based on Bayesian weight function |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 708-712
[Abstract]
(435)
[HTML 0 KB]
[PDF 466 KB]
(152)
|
|
3371 |
Bin ZHANG, Li WANG, Yanjie YANG |
|
|
Process tracking multi‑task rumor verification model combined with stance |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3371-3378
[Abstract]
(275)
[HTML 1 KB]
[PDF 1420 KB]
(101)
|
|
3003 |
Binhong XIE, Shuning LI, Yingjun ZHANG |
|
|
Fine-grained entity typing method based on hierarchy awareness |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3003-3010
[Abstract]
(469)
[HTML 1 KB]
[PDF 1252 KB]
(265)
|
|
343 |
Xiaomeng SHAO, Meng ZHANG |
|
|
Temporal convolutional knowledge tracing model with attention mechanism |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 343-348
[Abstract]
(1116)
[HTML 1 KB]
[PDF 2110 KB]
(522)
|
|
2511 |
Yu SHEN, Hecheng LI, Lijuan CHEN |
|
|
Evolutionary algorithm based on approximation technique for solving bilevel programming problems |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2511-2518
[Abstract]
(357)
[HTML 1 KB]
[PDF 701 KB]
(99)
|
|
2617 |
Kuineng CHEN, Xiaofang YUAN |
|
|
Multi-objective hybrid evolutionary algorithm for solving open-shop scheduling problem with controllable processing time |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2617-2627
[Abstract]
(325)
[HTML 1 KB]
[PDF 1515 KB]
(141)
|
|
1979 |
Yuanlong WANG, Xiaomin LIU, Hu ZHANG |
|
|
Machine reading comprehension model based on event representation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1979-1984
[Abstract]
(469)
[HTML 1 KB]
[PDF 916 KB]
(329)
|
|
2281 |
Houming FAN, Shuang MU, Lijun YUE |
|
|
Collaborative optimization of automated guided vehicle scheduling and path planning considering conflict and congestion |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2281-2291
[Abstract]
(464)
[HTML 1 KB]
[PDF 4118 KB]
(135)
|
|
2177 |
Rongli GAI, Shouchuan GAO, Mingxia LI |
|
|
Non-uniform rational B spline curve fitting of particle swarm optimization algorithm solving optimal control points |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2177-2183
[Abstract]
(466)
[HTML 1 KB]
[PDF 3931 KB]
(144)
|
|
2022 |
Liang ZHU, Hua XU, Jinhai CHENG, Shen ZHU |
|
|
Analysis and improvement of AdaBoost’s sample weight and combination coefficient |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2022-2029
[Abstract]
(452)
[HTML 1 KB]
[PDF 1311 KB]
(64)
|
|
1554 |
Li LI, Kexin SHI, Zhenkang REN |
|
|
Cross-project defect prediction method based on feature selection and TrAdaBoost |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1554-1562
[Abstract]
(442)
[HTML 1 KB]
[PDF 2257 KB]
(109)
|
|
2248 |
Wenjun FAN, Shuguang ZHAO, Lizheng GUO |
|
|
Ship detection algorithm based on improved RetinaNet |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2248-2255
[Abstract]
(680)
[HTML 1 KB]
[PDF 4946 KB]
(269)
|
|
2146 |
Hongqiu LUO, Shengbo HU |
|
|
Data naming mechanism of low earth orbit satellite mega-constellation for internet of things |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2146-2154
[Abstract]
(450)
[HTML 1 KB]
[PDF 3015 KB]
(79)
|
|
1516 |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU |
|
|
Cloud computing task scheduling based on orthogonal adaptive whale optimization |
|
|
|
Journal of Computer Applications
2022 Vol.42 (5): 1516-1523
[Abstract]
(339)
[HTML 1 KB]
[PDF 1821 KB]
(86)
|
|
3692 |
Yuqi DU, Jin ZHENG, Yang WANG, Cheng HUANG, Ping LI |
|
|
Text segmentation model based on graph convolutional network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3692-3699
[Abstract]
(492)
[HTML 1 KB]
[PDF 2746 KB]
(227)
|
|
3506 |
Jialiang HAN, Yudong HAN, Xuanzhe LIU, Yaoshuai ZHAO, Di FENG |
|
|
Personalized recommendation service system based on cloud-client-convergence |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3506-3512
[Abstract]
(418)
[HTML 1 KB]
[PDF 1160 KB]
(99)
|
|
630 |
Jianqiang LIU, Yepin QU, Yuhai LYU |
|
|
Design of very short antipollution error correcting code based on global distance optimization |
|
|
|
Journal of Computer Applications
2023 Vol.43 (2): 630-635
[Abstract]
(298)
[HTML 1 KB]
[PDF 1784 KB]
(51)
|
|
3520 |
Jiaqi ZHANG, Yanchun SUN, Gang HUANG |
|
|
Recommendation service for API use cases based on open source community analysis |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3520-3526
[Abstract]
(389)
[HTML 1 KB]
[PDF 1339 KB]
(130)
|
|
0 |
|
|
|
Three-dimensional human reconstruction model based on HRNet and GCN |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(180)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
3564 |
Xingquan CAI, Dingwei FENG, Tong WANG, Chen SUN, Haiyan SUN |
|
|
Violence detection in video based on temporal attention mechanism and EfficientNet |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3564-3572
[Abstract]
(472)
[HTML 1 KB]
[PDF 2885 KB]
(135)
|
|
2578 |
Chengxia XU, Qing YAN, Teng LI, Kaichao MIAO |
|
|
De-raining algorithm based on joint attention mechanism for single image |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2578-2585
[Abstract]
(382)
[HTML 1 KB]
[PDF 1959 KB]
(119)
|
|
1662 |
Jingling YUAN, Huihua MAO, Nana WANG, Yao XIANG |
|
|
Dynamic service deployment strategy in resource constrained mobile edge computing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1662-1667
[Abstract]
(486)
[HTML 1 KB]
[PDF 1940 KB]
(194)
|
|
1748 |
Jiachen GUO, Yushen YANG, Yan WANG, Shilong MAO, Lijun SUN |
|
|
Refined short-term traffic flow prediction model and migration deployment scheme |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1748-1755
[Abstract]
(411)
[HTML 1 KB]
[PDF 3372 KB]
(59)
|
|
1756 |
Qingqing NIE, Dingsheng WAN, Yuelong ZHU, Zhijia LI, Cheng YAO |
|
|
Hydrological model based on temporal convolutional network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1756-1761
[Abstract]
(330)
[HTML 1 KB]
[PDF 2132 KB]
(346)
|
|
1702 |
Shan SU, Yang ZHANG, Dongwen ZHANG |
|
|
Coupling related code smell detection method based on deep learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1702-1707
[Abstract]
(399)
[HTML 1 KB]
[PDF 1071 KB]
(136)
|
|
1762 |
Yingqi ZHANG, Dawei PENG, Sen LI, Ying SUN, Qiang NIU |
|
|
Lip language recognition algorithm based on single-tag radio frequency identification |
|
|
|
Journal of Computer Applications
2022 Vol.42 (6): 1762-1769
[Abstract]
(362)
[HTML 1 KB]
[PDF 4019 KB]
(107)
|
|
592 |
Wei LI, Yaochi FAN, Qiaoyong JIANG, Lei WANG, Qingzheng XU |
|
|
Variable convolutional autoencoder method based on teaching-learning-based optimization for medical image classification |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 592-598
[Abstract]
(356)
[HTML 0 KB]
[PDF 634 KB]
(120)
|
|
457 |
Su GAO, Junzhong BAO, Xin WANG, Lidong WANG |
|
|
Interpretable ordered clustering method and its application analysis |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 457-462
[Abstract]
(349)
[HTML 0 KB]
[PDF 3370 KB]
(116)
|
|
426 |
Yuxi LIU, Yuqi LIU, Zonglin ZHANG, Zhihua WEI, Ran MIAO |
|
|
News recommendation model with deep feature fusion injecting attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 426-432
[Abstract]
(651)
[HTML 1 KB]
[PDF 755 KB]
(276)
|
|
357 |
Kun FU, Jinhui GAO, Xiaomeng ZHAO, Jianing LI |
|
|
Topology optimization based graph convolutional network combining with global structural information |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 357-364
[Abstract]
(570)
[HTML 0 KB]
[PDF 1079 KB]
(327)
|
|
343 |
Yan LI, Jie GUO, Bin FAN |
|
|
Feature construction and preliminary analysis of uncertainty for meta-learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 343-348
[Abstract]
(527)
[HTML 0 KB]
[PDF 483 KB]
(195)
|
|
0 |
|
|
|
Anomaly detection method of distribution automation system based on double chain structure |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(114)
[HTML 1 KB]
[PDF 1570 KB]
(36)
|
|
2361 |
Fei LUO, Mengwei BAI |
|
|
Decision optimization of traffic scenario problem based on reinforcement learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2361-2368
[Abstract]
(601)
[HTML 1 KB]
[PDF 735 KB]
(198)
|
|
2378 |
Xinyu ZHANG, Sheng DING, Zhipei YANG |
|
|
Traffic sign detection algorithm based on improved attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2378-2385
[Abstract]
(549)
[HTML 1 KB]
[PDF 1664 KB]
(282)
|
|
3354 |
Zhuoran LI, Zhonglin YE, Haixing ZHAO, Jingjing LIN |
|
|
Graph convolutional network method based on hybrid feature modeling |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3354-3363
[Abstract]
(587)
[HTML 1 KB]
[PDF 3410 KB]
(156)
|
|
3700 |
Jiana MENG, Pin LYU, Yuhai YU, Shichang SUN, Hongfei LIN |
|
|
Aspect-level cross-domain sentiment analysis based on capsule network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3700-3707
[Abstract]
(477)
[HTML 1 KB]
[PDF 1921 KB]
(144)
|
|
3493 |
Peng LI, Zhuofeng ZHAO, Han LI |
|
|
Event‑driven dynamic collection method for microservice invocation link data |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3493-3499
[Abstract]
(338)
[HTML 1 KB]
[PDF 2643 KB]
(119)
|
|
2423 |
Liying ZHANG, Chunjiang PANG, Xinying WANG, Guoliang LI |
|
|
Multi-scale object detection algorithm based on improved YOLOv3 |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2423-2431
[Abstract]
(554)
[HTML 1 KB]
[PDF 1714 KB]
(221)
|
|
2571 |
Huazhong JIN, Xiuyang ZHANG, Zhiwei YE, Wenqi ZHANG, Xiaoyu XIA |
|
|
Image denoising model based on approximate U-shaped network structure |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2571-2577
[Abstract]
(438)
[HTML 1 KB]
[PDF 952 KB]
(147)
|
|
2052 |
Bo LIU, Linbo QING, Zhengyong WANG, Mei LIU, Xue JIANG |
|
|
Group activity recognition based on partitioned attention mechanism and interactive position relationship |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2052-2057
[Abstract]
(318)
[HTML 1 KB]
[PDF 2504 KB]
(110)
|
|
2471 |
Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG |
|
|
Data management method for building internet of things based on Hashgraph |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2471-2480
[Abstract]
(366)
[HTML 1 KB]
[PDF 1264 KB]
(109)
|
|
2353 |
Zhenhu LYU, Xinzheng XU, Fangyan ZHANG |
|
|
Lightweight attention mechanism module based on squeeze and excitation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2353-2360
[Abstract]
(622)
[HTML 1 KB]
[PDF 1124 KB]
(235)
|
|
3379 |
Xiayang SHI, Fengyuan ZHANG, Jiaqi YUAN, Min HUANG |
|
|
Detection of unsupervised offensive speech based on multilingual BERT |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3379-3385
[Abstract]
(518)
[HTML 1 KB]
[PDF 1536 KB]
(226)
|
|
3465 |
Chao LIN, Debiao HE, Xinyi HUANG |
|
|
Blockchain‑based electronic medical record secure sharing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3465-3472
[Abstract]
(582)
[HTML 1 KB]
[PDF 1451 KB]
(197)
|
|
280 |
Lu ZHANG, Jiapeng LIU, Dongmei TIAN |
|
|
Application of Stacking-Bagging-Vote multi-source information fusion model for financial early warning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 280-286
[Abstract]
(407)
[HTML 0 KB]
[PDF 948 KB]
(132)
|
|
265 |
Huiqing XU, Bin CHEN, Jingfei WANG, Zhiyi CHEN, Jian QIN |
|
|
Elongated pavement distress detection method based on convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 265-272
[Abstract]
(400)
[HTML 0 KB]
[PDF 2146 KB]
(181)
|
|
245 |
Hengxin LI, Kan CHANG, Yufei TAN, Mingyang LING, Tuanfa QIN |
|
|
Color image demosaicking network based on inter-channel correlation and enhanced information distillation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 245-251
[Abstract]
(327)
[HTML 0 KB]
[PDF 1841 KB]
(84)
|
|
191 |
Yu ZHANG, Chenglin LIU |
|
|
Average consensus tracking of multi-agent system with time-varying reference inputs |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 191-197
[Abstract]
(310)
[HTML 0 KB]
[PDF 812 KB]
(49)
|
|
3170 |
Jingyun CHENG, Buhong WANG, Peng LUO |
|
|
Static code defect detection method based on deep semantic fusion |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3170-3176
[Abstract]
(426)
[HTML 1 KB]
[PDF 2119 KB]
(157)
|
|
2865 |
Wentao ZHANG, Yuanyu WANG, Saize LI |
|
|
Depth estimation model of single haze image based on conditional generative adversarial network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2865-2875
[Abstract]
(296)
[HTML 1 KB]
[PDF 7354 KB]
(587)
|
|
3074 |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG |
|
|
Blockchain-based data frame security verification mechanism in software defined network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3074-3083
[Abstract]
(310)
[HTML 1 KB]
[PDF 2979 KB]
(82)
|
|
3259 |
Yinping GAO, Daofang CHANG, Chun‑Hsien CHEN |
|
|
Optimization of automated stacking crane operation based on NSGA Ⅱ with dynamic rules in mixed stacking mode |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3259-3267
[Abstract]
(291)
[HTML 1 KB]
[PDF 2428 KB]
(65)
|
|
3300 |
Yu DU, Meng YAN, Xin WU |
|
|
Non-intrusive load identification algorithm based on convolutional neural network with upsampling pyramid structure |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3300-3306
[Abstract]
(286)
[HTML 1 KB]
[PDF 3366 KB]
(67)
|
|
2996 |
Jianqing LYU, Xianbing WANG, Gang CHEN, Hua ZHANG, Minggang WANG |
|
|
Chinese Text-to-SQL model for industrial production |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 2996-3002
[Abstract]
(655)
[HTML 1 KB]
[PDF 1886 KB]
(265)
|
|
2858 |
Zanxia QIANG, Xianfu BAO |
|
|
Residual attention deraining network based on convolutional long short-term memory |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2858-2864
[Abstract]
(370)
[HTML 1 KB]
[PDF 3598 KB]
(155)
|
|
3084 |
Rongkang XI, Manchun CAI, Tianliang LU, Yanlin LI |
|
|
Tor website traffic analysis model based on self-attention mechanism and spatiotemporal features |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3084-3090
[Abstract]
(501)
[HTML 1 KB]
[PDF 2633 KB]
(188)
|
|
2936 |
Kaiwang ZHANG, Fei HUI, Guoxiang ZHANG, Qi SHI, Zhizhong LIU |
|
|
Car-following model of intelligent connected vehicles based on time-delayed velocity difference and velocity limit |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2936-2942
[Abstract]
(285)
[HTML 1 KB]
[PDF 2663 KB]
(87)
|
|
3200 |
Dawei LI, Zhiyong ZENG |
|
|
Cross-modal person re-identification model based on dynamic dual-attention mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3200-3208
[Abstract]
(430)
[HTML 1 KB]
[PDF 1713 KB]
(144)
|
|
3124 |
Anyi WANG, Heng ZHANG |
|
|
Multi-input multi-output intelligent receiver model based on multi-label classification algorithm |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3124-3129
[Abstract]
(262)
[HTML 1 KB]
[PDF 2392 KB]
(89)
|
|
3069 |
Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO |
|
|
Design and analysis of dynamic S-box based on anti-degradation chaotic system |
|
|
|
Journal of Computer Applications
2022 Vol.42 (10): 3069-3073
[Abstract]
(393)
[HTML 1 KB]
[PDF 3094 KB]
(168)
|
|
2674 |
Hongjun HENG, Tianbao XU |
|
|
Attention sentiment analysis model based on multi-scale convolution and gating mechanism |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2674-2679
[Abstract]
(563)
[HTML 1 KB]
[PDF 682 KB]
(244)
|
|
2009 |
Cheng HUANG, Qianrui ZHAO |
|
|
Sensitive information detection method based on attention mechanism-based ELMo |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2009-2014
[Abstract]
(861)
[HTML 1 KB]
[PDF 973 KB]
(428)
|
|
3763 |
Yangyang SUN, Junping YAO, Xiaojun LI, Shouxiang FAN, Ziwei WANG |
|
|
Materialized view asynchronous incremental maintenance task generation under hybrid transaction/analytical processing for single record |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3763-3768
[Abstract]
(373)
[HTML 1 KB]
[PDF 660 KB]
(70)
|
|
3715 |
Kangzhe MA, Jiatian PI, Zhoubing XIONG, Jia LYU |
|
|
6D pose estimation incorporating attentional features for occluded objects |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3715-3722
[Abstract]
(480)
[HTML 1 KB]
[PDF 2051 KB]
(223)
|
|
3900 |
You YANG, Lizhi CHEN, Xiaolong FANG, Longyue PAN |
|
|
Image caption generation model with adaptive commonsense gate |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3900-3905
[Abstract]
(323)
[HTML 1 KB]
[PDF 2101 KB]
(108)
|
|
3708 |
Dan HE, Xiping HE, Yue LI, Rui YUAN, Yuanyuan NIU |
|
|
Face anti-spoofing method based on regional blocking and lightweight network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (12): 3708-3714
[Abstract]
(387)
[HTML 1 KB]
[PDF 1601 KB]
(99)
|
|
98 |
CHEN Haiyan, JIA Mingming, ZHAO Wenli, WANG Chanfei |
|
|
Target detection of Ochotona curzoniae based on embedded Jetson TX2 |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 98-103
[Abstract]
(378)
[HTML 1 KB]
[PDF 2996 KB]
(117)
|
|
8 |
YUAN Lining, LIU Zhao |
|
|
Graph representation learning by autoencoder with one-shot aggregation |
|
|
|
Journal of Computer Applications
2023 Vol.43 (1): 8-14
[Abstract]
(483)
[HTML 1 KB]
[PDF 2556 KB]
(195)
|
|
3322 |
Yongjian QIAO, Xiaolin LIU, Liang BAI |
|
|
K‑nearest neighbor imputation subspace clustering algorithm for high‑dimensional data with feature missing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3322-3329
[Abstract]
(575)
[HTML 1 KB]
[PDF 1207 KB]
(379)
|
|
3386 |
Longchao GONG, Junjun GUO, Zhengtao YU |
|
|
Neural machine translation method based on source language syntax enhanced decoding |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3386-3394
[Abstract]
(373)
[HTML 1 KB]
[PDF 1267 KB]
(171)
|
|
3404 |
Xin LI, Tao JIA |
|
|
Deep fusion model for predicting differential gene expression by histone modification data |
|
|
|
Journal of Computer Applications
2022 Vol.42 (11): 3404-3412
[Abstract]
(313)
[HTML 1 KB]
[PDF 1734 KB]
(170)
|
|
2072 |
Wanjun LIU, Jiaming WANG, Haicheng QU, Libing DONG, Xinyu CAO |
|
|
Music genre classification algorithm based on attention spectral-spatial feature |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2072-2077
[Abstract]
(498)
[HTML 1 KB]
[PDF 2397 KB]
(227)
|
|
3692 |
Zhisheng SHAO, Guofu ZHANG, Zhaopin SU, Lei LI |
|
|
Dynamic testing resource allocation algorithm based on software architecture and generalized differential evolution |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3692-3701
[Abstract]
(372)
[HTML 0 KB]
[PDF 717 KB]
(118)
|
|
3637 |
Bowen YAO, Biqing ZENG, Jian CAI, Meirong DING |
|
|
Chinese character relation extraction model based on pre-training and multi-level information |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3637-3644
[Abstract]
(498)
[HTML 0 KB]
[PDF 822 KB]
(248)
|
|
3632 |
Jihou WANG, Peiguang LIN, Jiaqian ZHOU, Qingtao LI, Yan ZHANG, Muwei JIAN |
|
|
Stock index forecasting method based on corporate financial statement data |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3632-3636
[Abstract]
(414)
[HTML 0 KB]
[PDF 580 KB]
(150)
|
|
3626 |
Xueying PENG, Yongquan JIANG, Yan YANG |
|
|
Transfer learning based on graph convolutional network in bearing service fault diagnosis |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3626-3631
[Abstract]
(440)
[HTML 0 KB]
[PDF 561 KB]
(490)
|
|
3614 |
Tengqi JI, Jun MENG, Siyuan ZHAO, Hehuan HU |
|
|
Prediction model of lncRNA-encoded short peptides based on representation learning and deep forest |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3614-3619
[Abstract]
(309)
[HTML 0 KB]
[PDF 891 KB]
(149)
|
|
3608 |
Hongliang CAO, Ying ZHANG, Bin WU, Fanyu LI, Xubo NA |
|
|
Prediction method of liver transplantation complications based on transfer component analysis and support vector machine |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3608-3613
[Abstract]
(307)
[HTML 0 KB]
[PDF 699 KB]
(94)
|
|
3602 |
Wanqing XU, Baodong WANG, Yimei HUANG, Jinping LI |
|
|
Smoking behavior detection algorithm based on human skeleton key points |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3602-3607
[Abstract]
(611)
[HTML 0 KB]
[PDF 1345 KB]
(358)
|
|
3551 |
Yate FENG, Yimin WEN |
|
|
Vietnamese scene text detection based on modified Mask R-CNN |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3551-3557
[Abstract]
(331)
[HTML 0 KB]
[PDF 1209 KB]
(115)
|
|
3485 |
Zenghui ZHANG, Gaoxia JIANG, Wenjian WANG |
|
|
Label noise filtering method based on dynamic probability sampling |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3485-3491
[Abstract]
(301)
[HTML 0 KB]
[PDF 1379 KB]
(200)
|
|
3480 |
Zilong LI, Yong ZHOU, Rong BAO, Hongdong WANG |
|
|
Deep distance metric learning method based on optimized triplet loss |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3480-3484
[Abstract]
(388)
[HTML 0 KB]
[PDF 581 KB]
(168)
|
|
3468 |
Haoyun LEI, Zenwen REN, Yanlong WANG, Shuang XUE, Haoran LI |
|
|
Multiple kernel clustering algorithm based on capped simplex projection graph tensor learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3468-3474
[Abstract]
(534)
[HTML 1 KB]
[PDF 6316 KB]
(148)
|
|
3455 |
Han DU, Xianzhong LONG, Yun LI |
|
|
Graph learning regularized discriminative non-negative matrix factorization based face recognition |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3455-3461
[Abstract]
(452)
[HTML 0 KB]
[PDF 790 KB]
(146)
|
|
3432 |
Huibo LI, Yunxiao ZHAO, Liang BAI |
|
|
Dynamic graph representation learning method based on deep neural network and gated recurrent unit |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3432-3437
[Abstract]
(385)
[HTML 0 KB]
[PDF 869 KB]
(245)
|
|
3419 |
Erchao LI, Yuyan MAO |
|
|
Constrained multi-objective evolutionary algorithm based on space shrinking technique |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3419-3425
[Abstract]
(383)
[HTML 0 KB]
[PDF 979 KB]
(190)
|
|
1308 |
Kunpeng LI, Pengcheng ZHANG, Hong SHANGGUAN, Yanling WANG, Jie YANG, Zhiguo GUI |
|
|
Time-frequency domain CT reconstruction algorithm based on convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1308-1316
[Abstract]
(435)
[HTML 1 KB]
[PDF 3307 KB]
(171)
|
|
3426 |
Zhaoxia DAI, Yudong CAO, Guangming ZHU, Peiyi SHEN, Xu XU, Lin MEI, Liang ZHANG |
|
|
Specific knowledge learning based on knowledge distillation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3426-3431
[Abstract]
(425)
[HTML 1 KB]
[PDF 648 KB]
(201)
|
|
3337 |
Hao FU, Hegen XU, Zhiming ZHANG, Shaohua QI |
|
|
Visual simultaneous localization and mapping based on semantic and optical flow constraints in dynamic scenes |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3337-3344
[Abstract]
(447)
[HTML 1 KB]
[PDF 2125 KB]
(318)
|
|
3288 |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN |
|
|
Searchable encryption scheme based on splittable inverted index |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3288-3294
[Abstract]
(456)
[HTML 1 KB]
[PDF 639 KB]
(169)
|
|
3156 |
Zhichao LI, Tohti TURDI, Hamdulla ASKAR |
|
|
Answer selection model based on dynamic attention and multi-perspective matching |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3156-3163
[Abstract]
(348)
[HTML 1 KB]
[PDF 599 KB]
(129)
|
|
3139 |
Xujian ZHAO, Chongwei WANG |
|
|
Storyline extraction method from Weibo news based on graph convolutional network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3139-3144
[Abstract]
(499)
[HTML 1 KB]
[PDF 860 KB]
(365)
|
|
825 |
Guangzhu XU, Wenjie LIN, Sha CHEN, Wan KUANG, Bangjun LEI, Jun ZHOU |
|
|
Fundus vessel segmentation method based on U-Net and pulse coupled neural network with adaptive threshold |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 825-832
[Abstract]
(414)
[HTML 1 KB]
[PDF 1357 KB]
(189)
|
|
676 |
Qinghua LIU, Shizhong LIAO |
|
|
Online kernel regression based on random sketching method |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 676-682
[Abstract]
(322)
[HTML 1 KB]
[PDF 628 KB]
(106)
|
|
724 |
Runze LI, Xuejiao SUN |
|
|
Data stream preference query based on extraction sequence according to temporal condition |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 724-730
[Abstract]
(306)
[HTML 1 KB]
[PDF 635 KB]
(65)
|
|
797 |
Xiaojie LI, Chaoran CUI, Guangle SONG, Yaxi SU, Tianze WU, Chunyun ZHANG |
|
|
Stock trend prediction method based on temporal hypergraph convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 797-803
[Abstract]
(1544)
[HTML 1 KB]
[PDF 742 KB]
(845)
|
|
757 |
Lu ZHANG, Chun FANG, Ming ZHU |
|
|
Indoor fall detection algorithm based on Res2Net-YOLACT and fusion feature |
|
|
|
Journal of Computer Applications
2022 Vol.42 (3): 757-763
[Abstract]
(602)
[HTML 1 KB]
[PDF 1061 KB]
(196)
|
|
404 |
Renzhi PAN, Fulan QIAN, Shu ZHAO, Yanping ZHANG |
|
|
Recommendation model for user attribute preference modeling based on convolutional neural network interaction |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 404-411
[Abstract]
(573)
[HTML 1 KB]
[PDF 633 KB]
(258)
|
|
412 |
Zhonghui LIU, Ziyou WANG, Fan MIN |
|
|
Genetic algorithm for approximate concept generation and its recommendation application |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 412-418
[Abstract]
(425)
[HTML 1 KB]
[PDF 477 KB]
(84)
|
|
449 |
Meng KANG, Zuqiang MENG |
|
|
Efficient attribute reduction algorithm based on local conditional discernibility |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 449-456
[Abstract]
(290)
[HTML 1 KB]
[PDF 635 KB]
(61)
|
|
419 |
Jie MENG, Li WANG, Yanjie YANG, Biao LIAN |
|
|
Multi-modal deep fusion for false information detection |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 419-425
[Abstract]
(753)
[HTML 1 KB]
[PDF 1079 KB]
(400)
|
|
0 |
|
|
|
The Construction and Preliminary Analyses of Uncertainty Measures for Meta-Learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(119)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
140 |
Ziqi JING, Zhaonian ZOU |
|
|
Design and implementation of multi-version concurrency control on embedded database SQLite |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 140-147
[Abstract]
(557)
[HTML 1 KB]
[PDF 785 KB]
(203)
|
|
2823 |
Yuyu MENG, Jing GUO |
|
|
Link prediction algorithm based on information entropy improved PCA model |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2823-2829
[Abstract]
(295)
[HTML 1 KB]
[PDF 971 KB]
(88)
|
|
1275 |
Haifeng LI, Bifan ZHAO, Jinyi HOU, Huaichao WANG, Zhongcheng GUI |
|
|
Automatic detection algorithm for underground target based on adaptive double threshold |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1275-1283
[Abstract]
(352)
[HTML 1 KB]
[PDF 1999 KB]
(136)
|
|
2960 |
Yuefeng LIU, Xiaoyan ZHANG, Wei GUO, Haodong BIAN, Yingjie HE |
|
|
Remaining useful life prediction method of aero-engine based on optimized hybrid model |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2960-2968
[Abstract]
(334)
[HTML 1 KB]
[PDF 2754 KB]
(217)
|
|
3070 |
LAI Zicheng, ZHANG Yuping, MA Yan |
|
|
Prediction of organic reaction based on gated graph convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3070-3074
[Abstract]
(317)
[HTML 1 KB]
[PDF 1291 KB]
(417)
|
|
3017 |
XIAO Qi, YIN Zengshan, GAO Shuang |
|
|
Extremely dim target search algorithm based on detection and tracking mutual iteration |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3017-3024
[Abstract]
(364)
[HTML 1 KB]
[PDF 1788 KB]
(432)
|
|
2979 |
PEI Yiyao, GUO Huiming, ZHANG Danpu, CHEN Wenbo |
|
|
Robust 3D object detection method based on localization uncertainty |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2979-2984
[Abstract]
(420)
[HTML 1 KB]
[PDF 1259 KB]
(326)
|
|
2959 |
TU Hongyan, ZHANG Ting, XIA Pengfei, DU Yi |
|
|
Reconstruction method for uncertain spatial information based on improved variational auto-encoder |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2959-2963
[Abstract]
(314)
[HTML 1 KB]
[PDF 1274 KB]
(296)
|
|
2820 |
YUAN Jingling, DING Yuanyuan, PAN Donghang, LI Lin |
|
|
Chinese implicit sentiment classification model based on sequence and contextual features |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2820-2828
[Abstract]
(417)
[HTML 1 KB]
[PDF 839 KB]
(458)
|
|
2058 |
Zhenyu WANG, Lei ZHANG, Wenbin GAO, Weiming QUAN |
|
|
Human activity recognition based on progressive neural architecture search |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2058-2064
[Abstract]
(394)
[HTML 1 KB]
[PDF 1638 KB]
(109)
|
|
1036 |
Zumin WANG, Zhihao ZHANG, Jing QIN, Changqing JI |
|
|
Review of mechanical fault diagnosis technology based on convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1036-1043
[Abstract]
(776)
[HTML 1 KB]
[PDF 532 KB]
(561)
|
|
2780 |
Wenting BI, Haitao LIN, Liqun ZHANG |
|
|
Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2780-2787
[Abstract]
(345)
[HTML 1 KB]
[PDF 2390 KB]
(289)
|
|
2001 |
Yayao ZUO, Haoyu CHEN, Zhiran CHEN, Jiawei HONG, Kun CHEN |
|
|
Named entity recognition method combining multiple semantic features |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2001-2008
[Abstract]
(586)
[HTML 1 KB]
[PDF 2326 KB]
(276)
|
|
1194 |
Haojie CHEN, Jiangting FAN, Yong LIU |
|
|
Solving dynamic traveling salesman problem by deep reinforcement learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1194-1200
[Abstract]
(735)
[HTML 1 KB]
[PDF 795 KB]
(471)
|
|
2139 |
Linxiu SHA, Fan NIE, Qian GAO, Hao MENG |
|
|
Alternately optimizing algorithm based on Brownian movement and gradient information |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2139-2145
[Abstract]
(361)
[HTML 1 KB]
[PDF 2126 KB]
(141)
|
|
2333 |
Fengting ZHANG, Juhua YANG, Jinhui REN, Kun JIN |
|
|
Container throughput prediction based on optimal variational mode decomposition and kernel extreme learning machine |
|
|
|
Journal of Computer Applications
2022 Vol.42 (8): 2333-2342
[Abstract]
(384)
[HTML 1 KB]
[PDF 1097 KB]
(148)
|
|
1985 |
Heng CHEN, Siyi WANG, Zhengguang LI, Guanyu LI, Xin LIU |
|
|
Capsule network knowledge graph embedding model based on relational memory |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 1985-1992
[Abstract]
(444)
[HTML 1 KB]
[PDF 1243 KB]
(237)
|
|
1191 |
Jian GAO, Zhi LI, Bin FAN, Chuanxian JIANG |
|
|
Efficient robust zero-watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moment |
|
|
|
Journal of Computer Applications
2023 Vol.43 (4): 1191-1197
[Abstract]
(331)
[HTML 1 KB]
[PDF 2206 KB]
(171)
|
|
1099 |
Haoran LUO, Qing YANG |
|
|
Sentiment analysis based on sentiment lexicon and stacked residual Bi-LSTM network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1099-1107
[Abstract]
(412)
[HTML 1 KB]
[PDF 887 KB]
(417)
|
|
2800 |
Yuhang WANG, Yongxia ZHOU, Liangwu WU |
|
|
Pooling algorithm based on Gaussian function |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2800-2806
[Abstract]
(358)
[HTML 1 KB]
[PDF 1518 KB]
(125)
|
|
2680 |
Jie HU, Yan HU, Mengchi LIU, Yan ZHANG |
|
|
Chinese named entity recognition based on knowledge base entity enhanced BERT model |
|
|
|
Journal of Computer Applications
2022 Vol.42 (9): 2680-2685
[Abstract]
(605)
[HTML 1 KB]
[PDF 1391 KB]
(517)
|
|
2274 |
Haiqi WANG, Zhihai WANG, Liuke LI, Haoran KONG, Qiong WANG, Jianbo XU |
|
|
Spatial-temporal prediction model of urban short-term traffic flow based on grid division |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2274-2280
[Abstract]
(558)
[HTML 1 KB]
[PDF 2906 KB]
(451)
|
|
2201 |
Zhifeng ZHONG, Yifan XIA, Dongping ZHOU, Yangtian YAN |
|
|
Lightweight object detection algorithm based on improved YOLOv4 |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2201-2209
[Abstract]
(827)
[HTML 1 KB]
[PDF 5719 KB]
(510)
|
|
999 |
Ni ZHANG, Meng HAN, Le WANG, Xiaojuan LI, Haodong CHENG |
|
|
Survey of high utility pattern mining methods based on positive and negative utility division |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 999-1010
[Abstract]
(408)
[HTML 1 KB]
[PDF 1254 KB]
(379)
|
|
985 |
Bing XIA, Jianmin PANG, Xin ZHOU, Zheng SHAN |
|
|
Research progress on binary code similarity search |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 985-998
[Abstract]
(880)
[HTML 1 KB]
[PDF 841 KB]
(1291)
|
|
1137 |
Le WANG, Meng HAN, Xiaojuan LI, Ni ZHANG, Haodong CHENG |
|
|
Ensemble classification algorithm based on dynamic weighting function |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1137-1147
[Abstract]
(473)
[HTML 1 KB]
[PDF 838 KB]
(106)
|
|
94 |
Zhihui SHAN, Meng HAN, Qiang HAN |
|
|
Survey of high utility pattern mining on dynamic data |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 94-108
[Abstract]
(361)
[HTML 1 KB]
[PDF 1668 KB]
(402)
|
|
123 |
Xiaojuan LI, Meng HAN, Le WANG, Ni ZHENG, Haodong CHENG |
|
|
Dynamic weighted ensemble classification algorithm based on accuracy climbing |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 123-131
[Abstract]
(299)
[HTML 1 KB]
[PDF 992 KB]
(83)
|
|
0 |
|
|
|
Review of applications of natural language processing in sentiment analysis |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(483)
[HTML 1 KB]
[PDF 501 KB]
(778)
|
|
9 |
Jijie ZHANG, Yan YANG, Yong LIU |
|
|
Adaptive deep graph convolution using initial residual and decoupling operations |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 9-15
[Abstract]
(542)
[HTML 1 KB]
[PDF 648 KB]
(285)
|
|
162 |
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG |
|
|
Nonlinear scrambling diffusion synchronization image encryption based on dynamic network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 162-170
[Abstract]
(399)
[HTML 1 KB]
[PDF 3822 KB]
(79)
|
|
1260 |
Zhihua LIU, Wenjie CHEN, Aibin CHEN |
|
|
Homologous spectrogram feature fusion with self-attention mechanism for bird sound classification |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1260-1268
[Abstract]
(468)
[HTML 1 KB]
[PDF 1376 KB]
(189)
|
|
1207 |
Yongfeng DONG, Yuehua SUN, Lichao GAO, Peng HAN, Haipeng JI |
|
|
Fault diagnosis method based on improved one-dimensional convolutional and bidirectional long short-term memory neural networks |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1207-1215
[Abstract]
(627)
[HTML 1 KB]
[PDF 2185 KB]
(430)
|
|
2192 |
Xiangyue TAN, Xiao HU, Jiaxin YANG, Junjiang XIANG |
|
|
Camouflaged object detection based on progressive feature enhancement aggregation |
|
|
|
Journal of Computer Applications
2022 Vol.42 (7): 2192-2200
[Abstract]
(490)
[HTML 1 KB]
[PDF 2588 KB]
(129)
|
|
0 |
|
|
|
Multi-source and multi-label pedestrian attribute recognition based on domain adaptation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(235)
[HTML 0 KB]
[PDF 0 KB]
(13)
|
|
3097 |
Gangzhu QIAO, Rui WANG, Chaoli SUN |
|
|
Improved high-dimensional many-objective evolutionary algorithm based on decomposition |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3097-3103
[Abstract]
(665)
[HTML 1 KB]
[PDF 525 KB]
(472)
|
|
3385 |
Yi DING, Cong WANG |
|
|
Ship stowage optimization centered on automated terminal |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3385-3393
[Abstract]
(352)
[HTML 1 KB]
[PDF 694 KB]
(161)
|
|
3302 |
Ying LEI, Wanbo ZHENG, Wei WEI, Yunni XIA, Xiaobo LI, Chengwu LIU, Hong XIE |
|
|
Task offloading method based on probabilistic performance awareness and evolutionary game strategy in “cloud + edge” hybrid environment |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3302-3308
[Abstract]
(338)
[HTML 1 KB]
[PDF 1179 KB]
(121)
|
|
2741 |
WANG Hebing, ZHANG Chunmei |
|
|
Facial landmark detection based on ResNeXt with asymmetric convolution and squeeze excitation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2741-2747
[Abstract]
(405)
[HTML 1 KB]
[PDF 2305 KB]
(358)
|
|
2552 |
NIU Ruihua, YANG Jun, XING Lanxin, WU Renbiao |
|
|
Micro-expression recognition algorithm based on convolutional block attention module and dual path networks |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2552-2559
[Abstract]
(578)
[HTML 1 KB]
[PDF 1663 KB]
(818)
|
|
1108 |
Lie PAN, Cheng ZENG, Haifeng ZHANG, Chaodong WEN, Rusong HAO, Peng HE |
|
|
Text sentiment analysis method combining generalized autoregressive pre-training language model and recurrent convolutional neural network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1108-1115
[Abstract]
(470)
[HTML 1 KB]
[PDF 728 KB]
(262)
|
|
0 |
|
|
|
Smoking Behavior Detection Algorithm Based on Human Skeleton Keypoints |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(184)
[HTML 0 KB]
[PDF 0 KB]
(10)
|
|
3362 |
Meng LI, Pinle QIN, Jianchao ZENG, Junbo LI |
|
|
Super-resolution and multi-view fusion based on magnetic resonance image inter-layer interpolation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3362-3367
[Abstract]
(364)
[HTML 1 KB]
[PDF 650 KB]
(218)
|
|
3151 |
Yang ZHANG, Xiaoning WANG |
|
|
Text feature selection method based on Word2Vec word embedding and genetic algorithm for biomarker selection in high-dimensional omics |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3151-3155
[Abstract]
(409)
[HTML 1 KB]
[PDF 673 KB]
(122)
|
|
3251 |
Li LI, Hongfei YANG, Xiuze DONG |
|
|
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3251-3256
[Abstract]
(273)
[HTML 1 KB]
[PDF 490 KB]
(181)
|
|
3219 |
Jianfang CAO, Minmin YAN, Yiming JIA, Xiaodong TIAN |
|
|
Application of Inception-v3 model integrated with transfer learning in dynasty identification of ancient murals |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3219-3227
[Abstract]
(484)
[HTML 1 KB]
[PDF 1665 KB]
(153)
|
|
3178 |
Junhua YAN, Ping HOU, Yin ZHANG, Xiangyang LYU, Yue MA, Gaofei WANG |
|
|
Multiply distortion type judgement method based on multi-scale and multi-classifier convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3178-3184
[Abstract]
(396)
[HTML 1 KB]
[PDF 1034 KB]
(119)
|
|
0 |
|
|
|
CCML2021 240:Prediction method of liver transplantation complications based on transfer component analysis and support vector machines |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(106)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
3499 |
Xiancong CHEN, Weike PAN, Zhong MING |
|
|
Staged variational autoencoder for heterogeneous one-class collaborative filtering |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3499-3507
[Abstract]
(376)
[HTML 1 KB]
[PDF 785 KB]
(230)
|
|
3409 |
Keyang CHENG, Chunyun MENG, Wenshan WANG, Wenxi SHI, Yongzhao ZHAN |
|
|
Research advances in disentangled representation learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3409-3418
[Abstract]
(1233)
[HTML 1 KB]
[PDF 877 KB]
(572)
|
|
3475 |
Xuanyi LI, Yun ZHOU |
|
|
BNSL-FIM: Bayesian network structure learning algorithm based on frequent item mining |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3475-3479
[Abstract]
(472)
[HTML 1 KB]
[PDF 542 KB]
(122)
|
|
2187 |
LIU Fangming, ZHANG Hong |
|
|
Cross-modal retrieval algorithm based on multi-level semantic discriminative guided hashing |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2187-2192
[Abstract]
(383)
[HTML 1 KB]
[PDF 1091 KB]
(552)
|
|
87 |
Xiaopeng WANG, Yuanyuan SUN, Hongfei LIN |
|
|
Encoding-decoding relationship extraction model based on criminal Electra |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 87-93
[Abstract]
(343)
[HTML 1 KB]
[PDF 723 KB]
(147)
|
|
574 |
Xueming LI, Guohao WU, Shangbo ZHOU, Xiaoran LIN, Hongbin XIE |
|
|
Image instance segmentation model based on fractional-order network and reinforcement learning |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 574-583
[Abstract]
(488)
[HTML 1 KB]
[PDF 2853 KB]
(258)
|
|
2092 |
PEI Chunyang, FAN Kuangang, MA Zheng |
|
|
Medical image fusion based on edge-preserving decomposition and improved sparse representation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2092-2099
[Abstract]
(346)
[HTML 1 KB]
[PDF 4280 KB]
(557)
|
|
1983 |
YANG Longhai, WANG Xueyuan, JIANG Hesong |
|
|
Blockchain digital signature scheme with improved SM2 signature method |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1983-1988
[Abstract]
(523)
[HTML 1 KB]
[PDF 1080 KB]
(549)
|
|
1857 |
ZHANG Yuanjun, ZHANG Xihuang |
|
|
Dynamic network representation learning model based on graph convolutional network and long short-term memory network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1857-1864
[Abstract]
(430)
[HTML 1 KB]
[PDF 1298 KB]
(567)
|
|
1225 |
Hanguang LAI, Qing LI, Yong JIANG |
|
|
Transmission control protocol congestion control switching scheme based on scenario change |
|
|
|
Journal of Computer Applications
2022 Vol.42 (4): 1225-1234
[Abstract]
(439)
[HTML 1 KB]
[PDF 1097 KB]
(243)
|
|
3213 |
Lin SUN, Yubo YUAN |
|
|
Drowsiness recognition algorithm based on human eye state |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3213-3218
[Abstract]
(594)
[HTML 1 KB]
[PDF 1688 KB]
(417)
|
|
3089 |
ZHUO Yuxin, HAN Suya, ZHANG Yufeng, LI Zhiyao, DONG Yifeng |
|
|
Automatic segmentation method of microwave ablation region based on Nakagami parameters images of ultrasonic harmonic envelope |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3089-3096
[Abstract]
(335)
[HTML 1 KB]
[PDF 4320 KB]
(347)
|
|
2937 |
GAO Shiwei, ZHANG Changzhu, WANG Zhuping |
|
|
Lightweight real-time semantic segmentation algorithm based on separable pyramid |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2937-2944
[Abstract]
(410)
[HTML 1 KB]
[PDF 2525 KB]
(309)
|
|
310 |
Hongfei JIA, Xi LIU, Yu WANG, Hongbing XIAO, Suxia XING |
|
|
Application of 3DPCANet in image classification of functional magnetic resonance imaging for Alzheimer’s disease |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 310-315
[Abstract]
(380)
[HTML 1 KB]
[PDF 568 KB]
(116)
|
|
71 |
Qiming RUAN, Yi GUO, Nan ZHENG, Yexiang WANG |
|
|
Customs declaration good classification algorithm based on hierarchical multi-task BERT |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 71-77
[Abstract]
(598)
[HTML 1 KB]
[PDF 697 KB]
(240)
|
|
3010 |
ZHANG Kaiyue, ZHANG Hong |
|
|
Shipping monitoring image recognition model based on attention mechanism network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3010-3016
[Abstract]
(291)
[HTML 1 KB]
[PDF 1343 KB]
(384)
|
|
2813 |
ZHU Simiao, Wei Shiwei, WEI Siheng, YU Dunhui |
|
|
Video recommendation algorithm based on danmaku sentiment analysis and topic model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2813-2819
[Abstract]
(524)
[HTML 1 KB]
[PDF 852 KB]
(492)
|
|
3049 |
ZHENG Hongxing, ZHU Xutao, LI Zhenfei |
|
|
Optimization algorithm of ship dispatching in container terminals with two-way channel |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3049-3055
[Abstract]
(386)
[HTML 1 KB]
[PDF 636 KB]
(321)
|
|
2799 |
DONG Yongfeng, LIU Chao, WANG Liqin, LI Yingshuang |
|
|
Relationship reasoning method combining multi-hop relationship path information |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2799-2805
[Abstract]
(391)
[HTML 1 KB]
[PDF 763 KB]
(469)
|
|
2785 |
WANG Yahui, QIAN Yuhua, LIU Guoqing |
|
|
Ordinal decision tree algorithm based on fuzzy advantage complementary mutual information |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2785-2792
[Abstract]
(463)
[HTML 1 KB]
[PDF 1344 KB]
(568)
|
|
2842 |
YANG Lu, HE Mingxiang |
|
|
Chinese text sentiment analysis model based on gated mechanism and convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2842-2848
[Abstract]
(433)
[HTML 1 KB]
[PDF 717 KB]
(629)
|
|
2829 |
YANG Shuxin, ZHANG Nan |
|
|
Text sentiment analysis based on sentiment lexicon and context language model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2829-2834
[Abstract]
(366)
[HTML 1 KB]
[PDF 696 KB]
(294)
|
|
2893 |
SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei |
|
|
Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2893-2899
[Abstract]
(703)
[HTML 1 KB]
[PDF 4865 KB]
(499)
|
|
2952 |
HUANG Juting, GAO Hongli, DAI Zhikun |
|
|
Semantic segmentation method of power line on mobile terminals based on encoder-decoder structure |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2952-2958
[Abstract]
(328)
[HTML 1 KB]
[PDF 1631 KB]
(409)
|
|
2964 |
ZHANG Yanjiao, QIAO Zhiwei |
|
|
High-precision sparse reconstruction of CT images based on multiply residual UNet |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2964-2969
[Abstract]
(476)
[HTML 1 KB]
[PDF 1075 KB]
(627)
|
|
2324 |
ZENG Xiangyin, ZHENG Bochuan, LIU Dan |
|
|
Detection of left and right railway tracks based on deep convolutional neural network and clustering |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2324-2329
[Abstract]
(410)
[HTML 1 KB]
[PDF 1502 KB]
(532)
|
|
0 |
|
|
|
Storyline extraction method from Weibo news based on graph convolutional network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(138)
[HTML 0 KB]
[PDF 0 KB]
(7)
|
|
2623 |
XU Liyun, YAN Tao, QIAN Yuhua |
|
|
Audio encryption algorithm in fractional domain based on cascaded chaotic system |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2623-2630
[Abstract]
(394)
[HTML 1 KB]
[PDF 2308 KB]
(365)
|
|
1652 |
JIA Chengxun, LAI Hua, YU Zhengtao, WEN Yonghua, YU Zhiqiang |
|
|
Chinese-Vietnamese pseudo-parallel corpus generation based on monolingual language model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1652-1658
[Abstract]
(404)
[HTML 1 KB]
[PDF 1333 KB]
(379)
|
|
1581 |
YIN Fei, LONG Lingli, KONG Zheng, SHAO Han, LI Xin, QIAN Zhuzhong |
|
|
Deployment method of dockers in cluster for dynamic workload |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1581-1588
[Abstract]
(338)
[HTML 1 KB]
[PDF 981 KB]
(426)
|
|
1589 |
ZHANG Mingming, LU Qingning, LI Wenzhong, SONG Hu |
|
|
Deep neural network compression algorithm based on combined dynamic pruning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1589-1596
[Abstract]
(407)
[HTML 1 KB]
[PDF 1131 KB]
(392)
|
|
1557 |
LIU Shize, ZHU Yida, CHEN Runze, LUO Haiyong, ZHAO Fang, SUN Yi, WANG Baohui |
|
|
Traffic mode recognition algorithm based on residual temporal attention neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1557-1565
[Abstract]
(335)
[HTML 1 KB]
[PDF 1075 KB]
(708)
|
|
109 |
Yongbo CHEN, Qiaoqin LI, Yongguo LIU |
|
|
Dynamic relevance based feature selection algorithm |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 109-114
[Abstract]
(390)
[HTML 1 KB]
[PDF 445 KB]
(390)
|
|
0 |
|
|
|
A Searchable Encryption Scheme Based on Splitting Inverted Index |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(174)
[HTML 0 KB]
[PDF 0 KB]
(6)
|
|
3113 |
Wenxia LI, Linzhong LIU, Cunjie DAI, Yu LI |
|
|
Artificial bee colony algorithm based on multi-population combination strategy |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3113-3119
[Abstract]
(477)
[HTML 0 KB]
[PDF 757 KB]
(310)
|
|
631 |
Yaoming MA, Yu ZHANG |
|
|
Insulator detection algorithm based on improved Faster-RCNN |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 631-637
[Abstract]
(519)
[HTML 1 KB]
[PDF 1867 KB]
(251)
|
|
584 |
Junbo LI, Pinle QIN, Jianchao ZENG, Meng LI |
|
|
CT three-dimensional reconstruction algorithm based on super-resolution network |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 584-591
[Abstract]
(581)
[HTML 1 KB]
[PDF 1088 KB]
(524)
|
|
64 |
Yu PENG, Xiaoyu LI, Shijie HU, Xiaolei LIU, Weizhong QIAN |
|
|
Three-stage question answering model based on BERT |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 64-70
[Abstract]
(697)
[HTML 1 KB]
[PDF 918 KB]
(506)
|
|
57 |
Xueqiang LYU, Chen PENG, Le ZHANG, Zhi’an DONG, Xindong YOU |
|
|
Text multi-label classification method incorporating BERT and label semantic attention |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 57-63
[Abstract]
(1531)
[HTML 1 KB]
[PDF 577 KB]
(1354)
|
|
1514 |
NI Shuiping, LI Huifang |
|
|
Battery state-of-charge prediction method based on one-dimensional convolutional neural network combined with long short-term memory network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1514-1521
[Abstract]
(516)
[HTML 1 KB]
[PDF 2218 KB]
(554)
|
|
1361 |
MA Jianhong, CAO Wenbin, LIU Yuangang, XIA Shuang |
|
|
Patent clustering method based on functional effect |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1361-1366
[Abstract]
(351)
[HTML 1 KB]
[PDF 916 KB]
(571)
|
|
557 |
Wei LI, Qunqun WU, Yiwen ZHANG |
|
|
Developer recommendation method based on E-CARGO model |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 557-564
[Abstract]
(489)
[HTML 1 KB]
[PDF 649 KB]
(190)
|
|
3257 |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU |
|
|
Digital rights management scheme based on secret sharing in blockchain environment |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3257-3265
[Abstract]
(421)
[HTML 1 KB]
[PDF 580 KB]
(133)
|
|
258 |
Yinxin BAO, Yang CAO, Quan SHI |
|
|
Improved spatio-temporal residual convolutional neural network for urban road network short-term traffic flow prediction |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 258-264
[Abstract]
(549)
[HTML 1 KB]
[PDF 1139 KB]
(150)
|
|
2945 |
ZHENG Sicheng, KONG Linghua, YOU Tongfei, YI Dingrong |
|
|
Semantic SLAM algorithm based on deep learning in dynamic environment |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2945-2951
[Abstract]
(517)
[HTML 1 KB]
[PDF 1572 KB]
(1257)
|
|
2517 |
LIU Yaxuan, ZHONG Yong |
|
|
Joint extraction method of entities and relations based on subject attention |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2517-2522
[Abstract]
(410)
[HTML 1 KB]
[PDF 977 KB]
(550)
|
|
2489 |
XIE Defeng, JI Jianmin |
|
|
Syntax-enhanced semantic parsing with syntax-aware representation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2489-2495
[Abstract]
(448)
[HTML 1 KB]
[PDF 1042 KB]
(425)
|
|
2631 |
AN Xin, YANG Haijiao, LI Jianhua, REN Fuji |
|
|
Dynamic mapping method for heterogeneous multi-core system under thermal safety constraint |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2631-2638
[Abstract]
(347)
[HTML 1 KB]
[PDF 1107 KB]
(322)
|
|
2773 |
MOU Changning, WANG Haipeng, ZHOU Piyu, HOU Xinhang |
|
|
De novo peptide sequencing by tandem mass spectrometry based on graph convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2773-2779
[Abstract]
(501)
[HTML 1 KB]
[PDF 11373 KB]
(381)
|
|
2705 |
JI Zhangjian, REN Xingwang |
|
|
Object tracking algorithm of fully-convolutional Siamese networks with rotation and scale estimation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2705-2711
[Abstract]
(378)
[HTML 1 KB]
[PDF 2425 KB]
(314)
|
|
2720 |
XU Jianglang, LI Linyan, WAN Xinjun, HU Fuyuan |
|
|
Indoor scene recognition method combined with object detection |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2720-2725
[Abstract]
(515)
[HTML 1 KB]
[PDF 1357 KB]
(440)
|
|
2761 |
LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling |
|
|
Real-time fall detection method based on threshold and extremely randomized tree |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2761-2766
[Abstract]
(361)
[HTML 1 KB]
[PDF 1152 KB]
(386)
|
|
2496 |
ZHAO Hong, KONG Dongyi |
|
|
Chinese description of image content based on fusion of image feature attention and adaptive attention |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2496-2503
[Abstract]
(420)
[HTML 1 KB]
[PDF 1520 KB]
(519)
|
|
2609 |
ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang |
|
|
Detection method of domains generated by dictionary-based domain generation algorithm |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2609-2614
[Abstract]
(503)
[HTML 1 KB]
[PDF 893 KB]
(467)
|
|
2504 |
LI Kangkang, ZHANG Jing |
|
|
Multi-layer encoding and decoding model for image captioning based on attention mechanism |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2504-2509
[Abstract]
(569)
[HTML 1 KB]
[PDF 1112 KB]
(504)
|
|
542 |
Feifan SHI, Xuhua SHI |
|
|
Adaptive reference vector based constrained multi-objective evolutionary algorithm |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 542-549
[Abstract]
(404)
[HTML 1 KB]
[PDF 1068 KB]
(251)
|
|
433 |
Yi ZHANG, Shuangsheng WANG, Bin HE, Peiming YE, Keqiang LI |
|
|
Named entity recognition method of elementary mathematical text based on BERT |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 433-439
[Abstract]
(643)
[HTML 1 KB]
[PDF 689 KB]
(457)
|
|
565 |
Wang TAN, Yi LI |
|
|
Synthesis of loop bound functions for loop programs |
|
|
|
Journal of Computer Applications
2022 Vol.42 (2): 565-573
[Abstract]
(351)
[HTML 1 KB]
[PDF 596 KB]
(94)
|
|
2539 |
BIAN Lingzhi, WANG Zhijie |
|
|
Credit scoring model based on enhanced multi-dimensional and multi-grained cascade forest |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2539-2544
[Abstract]
(354)
[HTML 1 KB]
[PDF 1204 KB]
(323)
|
|
2767 |
ZHANG Xiaofei, YANG Yang, HUANG Jiajin, ZHONG Ning |
|
|
Degree centrality based method for cognitive feature selection |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2767-2772
[Abstract]
(287)
[HTML 1 KB]
[PDF 2920 KB]
(584)
|
|
2578 |
CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian |
|
|
Differential privacy high-dimensional data publishing method via clustering analysis |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2578-2585
[Abstract]
(404)
[HTML 1 KB]
[PDF 1281 KB]
(416)
|
|
2523 |
ZHANG Cheng, WAN Yuan, QIANG Haopeng |
|
|
Deep unsupervised discrete cross-modal hashing based on knowledge distillation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2523-2531
[Abstract]
(467)
[HTML 1 KB]
[PDF 1705 KB]
(568)
|
|
2726 |
SONG Zhongshan, LIANG Jiarui, ZHENG Lu, LIU Zhenyu, TIE Jun |
|
|
Remote sensing scene classification based on bidirectional gated scale feature fusion |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2726-2735
[Abstract]
(414)
[HTML 1 KB]
[PDF 3143 KB]
(383)
|
|
2754 |
GONG Ying, HE Yanting, CAO Cejun |
|
|
Co-evolutionary simulation regarding emergency logistics in major public health risk governance |
|
|
|
Journal of Computer Applications
2021 Vol.41 (9): 2754-2760
[Abstract]
(421)
[HTML 1 KB]
[PDF 1077 KB]
(298)
|
|
1820 |
HUANG Li, LU Long |
|
|
Segmentation of ischemic stroke lesion based on long-distance dependency encoding and deep residual U-Net |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1820-1827
[Abstract]
(545)
[HTML 1 KB]
[PDF 1812 KB]
(603)
|
|
3171 |
Mingwei GAO, Nan SANG, Maolin YANG |
|
|
IPTV video-on-demand recommendation model based on capsule network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3171-3177
[Abstract]
(398)
[HTML 1 KB]
[PDF 555 KB]
(76)
|
|
316 |
Jie WU, Shitian ZHANG, Haibin XIE, Guang YANG |
|
|
Semi-supervised knee abnormality classification based on multi-imaging center MRI data |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 316-324
[Abstract]
(380)
[HTML 1 KB]
[PDF 780 KB]
(86)
|
|
0 |
|
|
|
Color image demosaicking network based on inter-channel correlation and enhanced information distillation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(225)
[HTML 0 KB]
[PDF 0 KB]
(8)
|
|
3402 |
Jiaqi ZHANG, Yueqin ZHANG, Jian CHEN |
|
|
Pulse condition recognition method based on optimized reinforcement learning path feature classification |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3402-3408
[Abstract]
(481)
[HTML 1 KB]
[PDF 606 KB]
(641)
|
|
50 |
Yongfeng DONG, Xiangqian QU, Linhao LI, Yao DONG |
|
|
Academic journal contribution recommendation algorithm based on author preferences |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 50-56
[Abstract]
(504)
[HTML 1 KB]
[PDF 605 KB]
(295)
|
|
148 |
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG |
|
|
Survey of anonymity and tracking technology in Monero |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 148-156
[Abstract]
(1570)
[HTML 1 KB]
[PDF 723 KB]
(706)
|
|
3332 |
Yusheng HU, Bingwei HE, Qingkang DENG |
|
|
Moving object detection and static map reconstruction with hybrid vision system |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3332-3336
[Abstract]
(393)
[HTML 1 KB]
[PDF 1596 KB]
(253)
|
|
3702 |
Chuang GAO, Mian TANG, Liang ZHAO |
|
|
B-cell epitope prediction model with overlapping subgraph mining based on L-Metric |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3702-3706
[Abstract]
(315)
[HTML 1 KB]
[PDF 499 KB]
(77)
|
|
3120 |
Jicheng CHEN, Hongchang CHEN |
|
|
Community detection method based on tensor modeling and evolutionary
K-means clustering |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3120-3126
[Abstract]
(492)
[HTML 1 KB]
[PDF 759 KB]
(217)
|
|
3666 |
Haiyong WANG, Kaixin ZHANG, Weizheng GUAN |
|
|
Single image super-resolution reconstruction method based on dense Inception |
|
|
|
Journal of Computer Applications
2021 Vol.41 (12): 3666-3671
[Abstract]
(381)
[HTML 1 KB]
[PDF 740 KB]
(87)
|
|
287 |
Donglin MA, Sizhou MA, Weijie WANG |
|
|
Multi-site temperature prediction model based on graph convolutional network and gated recurrent unit |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 287-293
[Abstract]
(538)
[HTML 1 KB]
[PDF 753 KB]
(220)
|
|
44 |
Jianming LI, Bin CHEN, Zhiwei JIANG, Jian QIN |
|
|
Constrained differentiable neural architecture search in optimized search space |
|
|
|
Journal of Computer Applications
2022 Vol.42 (1): 44-49
[Abstract]
(405)
[HTML 1 KB]
[PDF 603 KB]
(114)
|
|
3319 |
Yongpeng SHI, Junjie ZHANG, Yujie XIA, Ya GAO, Shangwei ZHANG |
|
|
Computation offloading and resource allocation strategy in NOMA-based 5G ultra-dense network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3319-3324
[Abstract]
(351)
[HTML 1 KB]
[PDF 639 KB]
(140)
|
|
2346 |
DANG Weichao, LI Tao, BAI Shangwang, GAO Gaimei, LIU Chunxia |
|
|
Real-time remaining life prediction method of Web software system based on self-attention-long short-term memory network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2346-2351
[Abstract]
(372)
[HTML 1 KB]
[PDF 1238 KB]
(464)
|
|
3309 |
Gang CHEN, Xiangru MENG, Qiaoyan KANG, Yong YANG |
|
|
Virtual software defined network mapping algorithm based on topology segmentation and clustering analysis |
|
|
|
Journal of Computer Applications
2021 Vol.41 (11): 3309-3318
[Abstract]
(432)
[HTML 1 KB]
[PDF 2050 KB]
(109)
|
|
3075 |
LU Rongxiu, CHEN Mingming, YANG Hui, ZHU Jianyong |
|
|
Element component content dynamic monitoring system based on time sequence characteristics of solution images |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3075-3081
[Abstract]
(482)
[HTML 1 KB]
[PDF 687 KB]
(294)
|
|
556 |
XU Shaowei, QIN Pinle, ZENG Jianchao, ZHAO Zhikai, GAO Yuan |
|
|
Automatic segmentation algorithm of two-stage mediastinal lymph nodes using attention mechanism |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 556-562
[Abstract]
(431)
[HTML 1 KB]
[PDF 2390 KB]
(529)
|
|
461 |
WANG Zekun, HE Yichao, LI Huanzhe, ZHANG Fazhan |
|
|
Binary particle swarm optimization algorithm based on novel S-shape transfer function for knapsack problem with a single continuous variable |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 461-469
[Abstract]
(318)
[HTML 1 KB]
[PDF 1113 KB]
(590)
|
|
3082 |
HUANG Xiaoxiang, HU Yongmei, WU Dan, REN Lijie |
|
|
Early identification and prediction of abnormal carotid arteries based on variational autoencoder |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 3082-3088
[Abstract]
(420)
[HTML 1 KB]
[PDF 662 KB]
(354)
|
|
1348 |
LIN Yixing, TANG Hua |
|
|
Hybrid recommendation model based on heterogeneous information network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1348-1355
[Abstract]
(471)
[HTML 1 KB]
[PDF 1265 KB]
(626)
|
|
0 |
|
|
|
Measurement model of cardiovascular frailty based on Gaussian mixture model |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(161)
[HTML 1 KB]
[PDF 0 KB]
(15)
|
|
2242 |
ZHANG Guohui, LU Xixi, HU Yifan, SUN Jinghe |
|
|
Machine breakdown rescheduling of flexible job shop based on improved imperialist competitive algorithm |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2242-2248
[Abstract]
(404)
[HTML 1 KB]
[PDF 1072 KB]
(444)
|
|
2258 |
HUANG Chengcheng, DONG Xiaoxiao, LI Zhao |
|
|
Deep pipeline 5×5 convolution method based on two-dimensional Winograd algorithm |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2258-2264
[Abstract]
(523)
[HTML 1 KB]
[PDF 1087 KB]
(419)
|
|
2466 |
LUO Mingyu, LUO Xiaomeng, ZHU Wenmin, ZHANG Lei, FAN Xiumin |
|
|
Modeling technology for maintenance posture of virtual human in narrow space of ship |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2466-2472
[Abstract]
(427)
[HTML 1 KB]
[PDF 1390 KB]
(448)
|
|
2330 |
QIN Binbin, PENG Liangkang, LU Xiangming, QIAN Jiangbo |
|
|
Research progress on driver distracted driving detection |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2330-2337
[Abstract]
(782)
[HTML 1 KB]
[PDF 2153 KB]
(579)
|
|
2312 |
SHI Xuesong, LI Xianhua, SUN Qing, SONG Tao |
|
|
Noise image segmentation by adaptive wavelet transform based on artificial bee swarm and fuzzy C-means |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2312-2317
[Abstract]
(345)
[HTML 1 KB]
[PDF 3644 KB]
(364)
|
|
2373 |
DING Yin, SANG Nan, LI Xiaoyu, WU Feizhou |
|
|
Prediction method of capacity data in telecom industry based on recurrent neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2373-2378
[Abstract]
(599)
[HTML 1 KB]
[PDF 1094 KB]
(459)
|
|
2835 |
GUO Kexin, ZHANG Yuxiang |
|
|
Visual-textual sentiment analysis method based on multi-level spatial attention |
|
|
|
Journal of Computer Applications
2021 Vol.41 (10): 2835-2841
[Abstract]
(522)
[HTML 1 KB]
[PDF 6772 KB]
(646)
|
|
2273 |
CAO Yuhong, XU Hai, LIU Sun'ao, WANG Zixiao, LI Hongliang |
|
|
Review of deep learning-based medical image segmentation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2273-2287
[Abstract]
(2028)
[HTML 1 KB]
[PDF 2539 KB]
(1666)
|
|
2358 |
HUANG Jishuang, ZHANG Hua, LI Yonglong, ZHAO Hao, WANG Haoran, FENG Chuncheng |
|
|
Hydraulic tunnel defect recognition method based on dynamic feature distillation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2358-2365
[Abstract]
(351)
[HTML 1 KB]
[PDF 1838 KB]
(451)
|
|
2205 |
ZHOU Xianbing, FAN Xiaochao, REN Ge, YANG Yong |
|
|
Automated English essay scoring method based on multi-level semantic features |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2205-2211
[Abstract]
(636)
[HTML 1 KB]
[PDF 935 KB]
(520)
|
|
2288 |
ZHU Cheng, ZHAO Xiaoqi, ZHAO Liping, JIAO Yuhong, ZHU Yafei, CHENG Jianying, ZHOU Wei, TAN Ying |
|
|
Classification of functional magnetic resonance imaging data based on semi-supervised feature selection by spectral clustering |
|
|
|
Journal of Computer Applications
2021 Vol.41 (8): 2288-2293
[Abstract]
(419)
[HTML 1 KB]
[PDF 1318 KB]
(505)
|
|
1915 |
LI Yangzhi, YUAN Jiazheng, LIU Hongzhe |
|
|
Human skeleton-based action recognition algorithm based on spatiotemporal attention graph convolutional network model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1915-1921
[Abstract]
(1050)
[HTML 1 KB]
[PDF 1681 KB]
(1097)
|
|
1902 |
YANG Su, OUYANG Zhi, DU Nisuo |
|
|
Unsupervised parallel hash image retrieval based on correlation distance |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1902-1907
[Abstract]
(364)
[HTML 1 KB]
[PDF 967 KB]
(636)
|
|
1939 |
WU Zeju, JIAO Cuijuan, CHEN Liang |
|
|
Tire defect detection method based on improved Faster R-CNN |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1939-1946
[Abstract]
(637)
[HTML 1 KB]
[PDF 1816 KB]
(591)
|
|
1865 |
LIU Huan, LI Xiaoge, HU Likun, HU Feixiong, WANG Penghua |
|
|
Knowledge graph driven recommendation model of graph neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1865-1870
[Abstract]
(776)
[HTML 1 KB]
[PDF 991 KB]
(825)
|
|
2026 |
ZHOU Shuo, QIU Runhe, TANG Minjun |
|
|
Power allocation algorithm for CR-NOMA system based on tabu search and Q-learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2026-2032
[Abstract]
(408)
[HTML 1 KB]
[PDF 1128 KB]
(337)
|
|
1956 |
LI Yafang, LIANG Ye, FENG Weiwei, ZU Baokai, KANG Yujian |
|
|
Deep network embedding method based on community optimization |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1956-1963
[Abstract]
(486)
[HTML 1 KB]
[PDF 1616 KB]
(512)
|
|
1812 |
JIA Heming, LANG Chunbo, JIANG Zichao |
|
|
Plant leaf disease recognition method based on lightweight convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1812-1819
[Abstract]
(785)
[HTML 1 KB]
[PDF 1486 KB]
(568)
|
|
2062 |
LIU Shuangyuan, ZHENG Wangli, LIN Yunhan |
|
|
Adaptive binary simplification method for 3D feature descriptor |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2062-2069
[Abstract]
(302)
[HTML 1 KB]
[PDF 1286 KB]
(407)
|
|
1268 |
LAI Xuemei, TANG Hong, CHEN Hongyu, LI Shanshan |
|
|
Multimodal sentiment analysis based on feature fusion of attention mechanism-bidirectional gated recurrent unit |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1268-1274
[Abstract]
(1115)
[HTML 1 KB]
[PDF 960 KB]
(1585)
|
|
1165 |
TAN Zhaoyi, CHEN Baifan |
|
|
Enhanced vehicle 3D surround view based on coordinate inverse mapping |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1165-1171
[Abstract]
(393)
[HTML 1 KB]
[PDF 4343 KB]
(729)
|
|
164 |
CHEN Li, WANG Hongyuan, ZHANG Yunpeng, CAO Liang, YIN Yuchang |
|
|
Video-based person re-identification method by jointing evenly sampling-random erasing and global temporal feature pooling |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 164-169
[Abstract]
(410)
[HTML 1 KB]
[PDF 1012 KB]
(456)
|
|
121 |
LI Mingwei, JIANG Qingyuan, XIE Yinpeng, HE Jindong, WU Dan |
|
|
Hash learning based malicious SQL detection |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 121-126
[Abstract]
(367)
[HTML 1 KB]
[PDF 816 KB]
(622)
|
|
36 |
WANG Lijuan, CHEN Shaomin, YIN Ming, XU Yueying, HAO Zhifeng, CAI Ruichu, WEN Wen |
|
|
Improved block diagonal subspace clustering algorithm based on neighbor graph |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 36-42
[Abstract]
(382)
[HTML 1 KB]
[PDF 1491 KB]
(693)
|
|
1378 |
GU Zhengchuan, GUO Yuanbo, FANG Chen |
|
|
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1378-1385
[Abstract]
(398)
[HTML 1 KB]
[PDF 1130 KB]
(640)
|
|
721 |
JIANG Li, HUANG Shijian, YAN Wenjuan |
|
|
Human action recognition method based on low-rank action information and multi-scale convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 721-726
[Abstract]
(423)
[HTML 1 KB]
[PDF 1376 KB]
(995)
|
|
706 |
HOU Yunlong, ZHU Lei, CHEN Qin, LYU Suidong |
|
|
Salient object detection based on difference of Gaussian feature network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 706-713
[Abstract]
(456)
[HTML 1 KB]
[PDF 1463 KB]
(905)
|
|
677 |
PENG Li, ZHANG Haiqing, LI Daiwei, TANG Dan, YU Xi, HE Lei |
|
|
Imputation algorithm for hybrid information system of incomplete data analysis approach based on rough set theory |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 677-685
[Abstract]
(492)
[HTML 1 KB]
[PDF 1135 KB]
(728)
|
|
727 |
JIANG Kun, LIU Zheng, ZHU Lei, LI Xiaoxing |
|
|
Fixed word-aligned partition compression algorithm of inverted list based on directed acyclic graph |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 727-732
[Abstract]
(542)
[HTML 1 KB]
[PDF 905 KB]
(506)
|
|
881 |
WANG Binrong, TAN Dailun, ZHENG Bochuan |
|
|
Solving auto part spraying sequence by transforming to traveling salesman problem and genetic algorithm |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 881-886
[Abstract]
(345)
[HTML 1 KB]
[PDF 970 KB]
(520)
|
|
911 |
HE Jiean, WU Xiaohong, HE Xiaohai, HU Jianrong, QIN Linbo |
|
|
Imperfect wheat kernel recognition combined with image enhancement and conventional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 911-916
[Abstract]
(454)
[HTML 1 KB]
[PDF 1123 KB]
(794)
|
|
939 |
ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang |
|
|
Data trading scheme based on blockchain and trusted computing |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 939-944
[Abstract]
(902)
[HTML 1 KB]
[PDF 1137 KB]
(1412)
|
|
2076 |
TAN Daoqiang, ZENG Cheng, QIAO Jinxia, ZHANG Jun |
|
|
Shadow detection method based on hybrid attention model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2076-2081
[Abstract]
(410)
[HTML 1 KB]
[PDF 1583 KB]
(310)
|
|
1908 |
WU Guangli, LI Leiting, GUO Zhenzhou, WANG Chengxiang |
|
|
Video summarization generation model based on improved bi-directional long short-term memory network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1908-1914
[Abstract]
(633)
[HTML 1 KB]
[PDF 1515 KB]
(690)
|
|
1055 |
CUI Bowen, JIN Tao, WANG Jianmin |
|
|
Overview of information extraction of free-text electronic medical records |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1055-1063
[Abstract]
(778)
[HTML 1 KB]
[PDF 1090 KB]
(1400)
|
|
280 |
SUN Zhongjie, WAN Tao, CHEN Dong, WANG Hao, ZHAO Yanli, QIN Zengchang |
|
|
Application of deep learning in histopathological image classification of aortic medial degeneration |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 280-285
[Abstract]
(628)
[HTML 1 KB]
[PDF 1150 KB]
(695)
|
|
1100 |
WANG Ning, SONG Huihui, ZHANG Kaihua |
|
|
Accurate object tracking algorithm based on distance weighting overlap prediction and ellipse fitting optimization |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1100-1105
[Abstract]
(421)
[HTML 1 KB]
[PDF 2560 KB]
(411)
|
|
2039 |
LI Hui, WU Chuansheng, LIU Jun, LIU Wen |
|
|
Image smoothing method based on gradient surface area and sparsity constraints |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2039-2047
[Abstract]
(441)
[HTML 1 KB]
[PDF 6854 KB]
(259)
|
|
1701 |
YAO Jie, CHENG Chunling, HAN Jing, LIU Zheng |
|
|
Anomaly detection method based on multi-task temporal convolutional network in cloud workflow |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1701-1708
[Abstract]
(464)
[HTML 1 KB]
[PDF 1677 KB]
(793)
|
|
1128 |
LI Yan, CHEN Qiaoping |
|
|
Internet rumor propagation model considering non-supportive comments |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1128-1135
[Abstract]
(315)
[HTML 1 KB]
[PDF 1088 KB]
(671)
|
|
1227 |
LI Xueqing, WANG Shi, WANG Zhujun, ZHU Junwu |
|
|
Summarization of natural language generation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1227-1235
[Abstract]
(2770)
[HTML 1 KB]
[PDF 1165 KB]
(3877)
|
|
1527 |
XU Meng, WANG Yakun |
|
|
Remaining useful life prediction of DA40 aircraft carbon brake pads based on bidirectional long short-term memory network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1527-1532
[Abstract]
(466)
[HTML 1 KB]
[PDF 1636 KB]
(1031)
|
|
1432 |
GUO Maozu, YANG Qiannan, ZHAO Lingling |
|
|
Image generation based on conditional-Wassertein generative adversarial network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1432-1437
[Abstract]
(441)
[HTML 1 KB]
[PDF 2259 KB]
(562)
|
|
1419 |
LIU Ziyan, MA Shanshan, BAI He |
|
|
Orthogonal matching pursuit hybrid precoding algorithm based on improved intelligent water drop |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1419-1424
[Abstract]
(279)
[HTML 1 KB]
[PDF 956 KB]
(491)
|
|
1299 |
ZHANG Wenye, SHANG Fangxin, GUO Hao |
|
|
Mixed precision neural network quantization method based on Octave convolution |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1299-1304
[Abstract]
(367)
[HTML 1 KB]
[PDF 2485 KB]
(388)
|
|
1247 |
WANG Zhujun, WANG Shi, LI Xueqing, ZHU Junwu |
|
|
Review of event causality extraction based on deep learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1247-1255
[Abstract]
(3052)
[HTML 1 KB]
[PDF 1460 KB]
(3917)
|
|
694 |
LONG Guangyu, CHEN Yiqiang, XING Yunbing |
|
|
Text correction and completion method in continuous sign language recognition |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 694-698
[Abstract]
(473)
[HTML 1 KB]
[PDF 877 KB]
(1161)
|
|
774 |
REN Yiming, WANG Rangding, YAN Diqun, LIN Yuzhen |
|
|
Speech steganalysis method based on deep residual network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 774-779
[Abstract]
(470)
[HTML 1 KB]
[PDF 1026 KB]
(804)
|
|
833 |
SUN Qichang, MAI Yongfeng, CHEN Xiaojun |
|
|
Fast calibration algorithm in surgical navigation system based on augmented reality |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 833-838
[Abstract]
(512)
[HTML 1 KB]
[PDF 1272 KB]
(946)
|
|
904 |
LUO Hui, JIA Chen, LU Chunyu, LI Jian |
|
|
Rail tread block defects detection method based on improved Faster R-CNN |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 904-910
[Abstract]
(477)
[HTML 1 KB]
[PDF 1562 KB]
(813)
|
|
1631 |
ZHANG Sun, YIN Chunyong |
|
|
Sequential multimodal sentiment analysis model based on multi-task learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1631-1639
[Abstract]
(955)
[HTML 1 KB]
[PDF 1150 KB]
(1377)
|
|
1640 |
ZHAO Xiaohu, LI Xiao |
|
|
Image captioning algorithm based on multi-feature extraction |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1640-1646
[Abstract]
(492)
[HTML 1 KB]
[PDF 1144 KB]
(706)
|
|
1659 |
DAI Yanran, DAI Guoqing, YUAN Yubo |
|
|
Multi-face foreground extraction method based on skin color learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1659-1666
[Abstract]
(298)
[HTML 1 KB]
[PDF 1935 KB]
(524)
|
|
330 |
NAN Ning, YANG Chengyi, WU Zhihao |
|
|
Multi-graph neural network-based session perception recommendation model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 330-336
[Abstract]
(643)
[HTML 1 KB]
[PDF 1052 KB]
(615)
|
|
537 |
DU Peide, YAN Hua |
|
|
Crowd counting network based on multi-scale spatial attention feature fusion |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 537-543
[Abstract]
(486)
[HTML 1 KB]
[PDF 1581 KB]
(1435)
|
|
479 |
FU Anbing, WEI Wenhong, ZHANG Yuhui, GUO Wenjing |
|
|
Real-valued Cartesian genetic programming algorithm based on quasi-oppositional mutation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 479-485
[Abstract]
(533)
[HTML 1 KB]
[PDF 1178 KB]
(486)
|
|
307 |
MENG Xiangrui, YANG Wenzhong, WANG Ting |
|
|
Survey of sentiment analysis based on image and text fusion |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 307-317
[Abstract]
(909)
[HTML 1 KB]
[PDF 1277 KB]
(1800)
|
|
590 |
KONG Lingxu, WU Haifeng, ZENG Yu, LU Xiaoling |
|
|
Diagnosis of mild cognitive impairment using deep learning and brain functional connectivities with different frequency dimensions |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 590-597
[Abstract]
(403)
[HTML 1 KB]
[PDF 1848 KB]
(439)
|
|
598 |
CHANG Zheng, LUO Ping, YANG Bo, ZHANG Xiaoxiao |
|
|
Respiratory sound recognition of chronic obstructive pulmonary disease patients based on HHT-MFCC and short-term energy |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 598-603
[Abstract]
(473)
[HTML 1 KB]
[PDF 1298 KB]
(732)
|
|
812 |
WANG Xiaofeng, JIANG Penglong, ZHOU Hui, ZHAO Xiongbo |
|
|
Design of FPGA accelerator with high parallelism for convolution neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 812-819
[Abstract]
(678)
[HTML 1 KB]
[PDF 1115 KB]
(899)
|
|
845 |
WANG Yongjin, ZUO Yu, WU Lian, CUI Zhongwei, ZHAO Chenjie |
|
|
Image super-resolution reconstruction based on attention mechanism |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 845-850
[Abstract]
(579)
[HTML 1 KB]
[PDF 2394 KB]
(512)
|
|
441 |
HUANG Siyuan, ZHANG Minqing, KE Yan, BI Xinliang |
|
|
Image steganalysis method based on saliency detection |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 441-448
[Abstract]
(548)
[HTML 1 KB]
[PDF 1782 KB]
(882)
|
|
1005 |
QIN Li, HAO Zhigang, LI Guoliang |
|
|
Construction and correlation analysis of national food safety standard graph |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1005-1011
[Abstract]
(450)
[HTML 1 KB]
[PDF 2022 KB]
(738)
|
|
350 |
WANG Xiaoxia, QIAN Xuezhong, SONG Wei |
|
|
Relation extraction model via attention-based graph convolutional network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 350-356
[Abstract]
(484)
[HTML 1 KB]
[PDF 995 KB]
(1806)
|
|
1891 |
WU Guoliang, XU Jining |
|
|
Chinese emergency event extraction method based on named entity recognition task feedback enhancement |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1891-1896
[Abstract]
(479)
[HTML 1 KB]
[PDF 1083 KB]
(578)
|
|
1723 |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan |
|
|
Optimized CKKS scheme based on learning with errors problem |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1723-1728
[Abstract]
(1087)
[HTML 1 KB]
[PDF 760 KB]
(1037)
|
|
1667 |
ZHANG Hui, ZHANG Nana, HUANG Jun |
|
|
Multi-angle head pose estimation method based on optimized LeNet-5 network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1667-1672
[Abstract]
(391)
[HTML 1 KB]
[PDF 1102 KB]
(679)
|
|
1438 |
LIANG Min, WANG Haorong, ZHANG Yao, LI Jie |
|
|
Image super-resolution reconstruction method based on accelerated residual network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1438-1444
[Abstract]
(468)
[HTML 1 KB]
[PDF 2387 KB]
(433)
|
|
1492 |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng |
|
|
Self-generated deep neural network based 4D trajectory prediction |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1492-1499
[Abstract]
(443)
[HTML 1 KB]
[PDF 1396 KB]
(582)
|
|
1933 |
GAO Qinquan, HUANG Bingcheng, LIU Wenzhe, TONG Tong |
|
|
Bamboo strip surface defect detection method based on improved CenterNet |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 1933-1938
[Abstract]
(975)
[HTML 1 KB]
[PDF 1734 KB]
(617)
|
|
2108 |
YANG Zhen, MA Jianxiao, WANG Baojie |
|
|
Signal timing optimization model of dual-ring phase under condition of setting waiting area |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2108-2112
[Abstract]
(337)
[HTML 1 KB]
[PDF 909 KB]
(355)
|
|
2003 |
ZHAO Qiuyun, WEI Le, SHU Hongping |
|
|
Construction method of cloud manufacturing virtual workshop for manufacturing tasks |
|
|
|
Journal of Computer Applications
2021 Vol.41 (7): 2003-2011
[Abstract]
(353)
[HTML 1 KB]
[PDF 1325 KB]
(335)
|
|
1256 |
SUN Heli, SUN Yuzhu, ZHANG Xiaoyun |
|
|
Event description generation based on generative adversarial network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1256-1261
[Abstract]
(427)
[HTML 1 KB]
[PDF 971 KB]
(811)
|
|
1236 |
LIU Ruiheng, YE Xia, YUE Zengying |
|
|
Review of pre-trained models for natural language processing tasks |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1236-1246
[Abstract]
(1004)
[HTML 1 KB]
[PDF 1296 KB]
(3196)
|
|
611 |
LIU Zhuan, HAN Ruichen, ZHANG Yansong, CHEN Yueguo, ZHANG Yu |
|
|
Database star-join optimization for multicore CPU and GPU platforms |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 611-617
[Abstract]
(677)
[HTML 1 KB]
[PDF 1026 KB]
(957)
|
|
1761 |
YAN Junhua, HOU Ping, ZHANG Yin, LYU Xiangyang, MA Yue, WANG Gaofei |
|
|
Image single distortion type judgment method based on two-channel convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1761-1766
[Abstract]
(351)
[HTML 1 KB]
[PDF 1095 KB]
(433)
|
|
623 |
TANG Chen, HUANG Guorui, JIN Peiquan |
|
|
NVM-LH: non-volatile memory-friendly linear hash index |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 623-629
[Abstract]
(455)
[HTML 1 KB]
[PDF 1035 KB]
(666)
|
|
1767 |
JING Beibei, GUO Jia, WANG Liqing, CHEN Jing, DING Hongwei |
|
|
Image double blind denoising algorithm combining with denoising convolutional neural network and conditional generative adversarial net |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1767-1774
[Abstract]
(343)
[HTML 1 KB]
[PDF 1447 KB]
(562)
|
|
1741 |
ZHANG Chen, TIAN Tian, YANG Xiuting, GONG Dunwei |
|
|
Communication coverage reduction method of parallel programs based on dominant relation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1741-1747
[Abstract]
(342)
[HTML 1 KB]
[PDF 944 KB]
(387)
|
|
1805 |
WANG Xianwu, ZHANG Ting, JI Xin, DU Yi |
|
|
3D shale digital core reconstruction method based on deep convolutional generative adversarial network with gradient penalty |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1805-1811
[Abstract]
(536)
[HTML 1 KB]
[PDF 2129 KB]
(563)
|
|
1748 |
CHENG Meiying, QIAN Qian, NI Zhiwei, ZHU Xuhui |
|
|
Self-organized migrating algorithm for multi-task optimization with information filtering |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1748-1755
[Abstract]
(480)
[HTML 1 KB]
[PDF 1172 KB]
(351)
|
|
1484 |
LUAN Jianing, ZHANG Wei, SUN Wei, ZHANG Ao, HAN Dong |
|
|
High-accuracy localization algorithm based on fusion of two-dimensional code vision and laser lidar |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1484-1491
[Abstract]
(979)
[HTML 1 KB]
[PDF 2182 KB]
(1084)
|
|
1314 |
WANG Xin, ZHU Haohua, LIU Guangcan |
|
|
Convolution robust principal component analysis |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1314-1318
[Abstract]
(563)
[HTML 1 KB]
[PDF 2704 KB]
(595)
|
|
1522 |
XU Guobao, CHEN Yuanxiao, WANG Ji |
|
|
Drug-target association prediction algorithm based on graph convolutional network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1522-1526
[Abstract]
(463)
[HTML 1 KB]
[PDF 892 KB]
(487)
|
|
1290 |
JIA Heming, JIANG Zichao, LI Yao, SUN Kangjian |
|
|
Simultaneous feature selection optimization based on improved spotted hyena optimizer algorithm |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1290-1298
[Abstract]
(470)
[HTML 1 KB]
[PDF 1335 KB]
(703)
|
|
133 |
ZHOU Chaoran, ZHAO Jianping, MA Tai, ZHOU Xin |
|
|
Web page blacklist discrimination method based on attention mechanism and ensemble learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 133-138
[Abstract]
(406)
[HTML 1 KB]
[PDF 1076 KB]
(520)
|
|
1785 |
LI Congdong, HUANG Hao, ZHANG Fanshun |
|
|
Knowledge sharing behavior incentive mechanism for lead users based on evolutionary game |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1785-1791
[Abstract]
(373)
[HTML 1 KB]
[PDF 1217 KB]
(383)
|
|
1756 |
WANG Yu, LIU Yanli, CHEN Shaowu |
|
|
Maximum common induced subgraph algorithm based on vertex conflict learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (6): 1756-1760
[Abstract]
(499)
[HTML 1 KB]
[PDF 962 KB]
(610)
|
|
1386 |
GUO Shuai, SU Yang |
|
|
Encrypted traffic classification method based on data stream |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1386-1391
[Abstract]
(619)
[HTML 1 KB]
[PDF 948 KB]
(1301)
|
|
738 |
GUO Jia, HAN Litao, SUN Xianlong, ZHOU Lijuan |
|
|
Comparative density peaks clustering algorithm with automatic determination of clustering center |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 738-744
[Abstract]
(610)
[HTML 1 KB]
[PDF 2809 KB]
(630)
|
|
1445 |
YANG Mengmeng, ZHANG Aihua |
|
|
Fractal image compression based on gray-level co-occurrence matrix and simultaneous orthogonal matching pursuit |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1445-1449
[Abstract]
(397)
[HTML 1 KB]
[PDF 968 KB]
(478)
|
|
1262 |
LI Wenhui, ZENG Shangyou, WANG Jinjin |
|
|
Image description generation algorithm based on improved attention mechanism |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1262-1267
[Abstract]
(587)
[HTML 1 KB]
[PDF 1413 KB]
(1096)
|
|
1221 |
OU Lili, SHAO Fengjing, SUN Rencheng, SUI Yi |
|
|
Cerebral infarction image recognition based on semi-supervised method |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1221-1226
[Abstract]
(487)
[HTML 1 KB]
[PDF 1167 KB]
(672)
|
|
150 |
LIU Nanbo, XIAO Fen, ZHANG Wenlei, LI Wangxin, WENG Zun |
|
|
Group scanpath generation based on fixation regions of interest clustering and transferring |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 150-156
[Abstract]
(445)
[HTML 1 KB]
[PDF 2048 KB]
(469)
|
|
139 |
LUO Jun, CHEN Lifei |
|
|
Sentiment classification of incomplete data based on bidirectional encoder representations from transformers |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 139-144
[Abstract]
(456)
[HTML 1 KB]
[PDF 921 KB]
(994)
|
|
112 |
LI Congcong, LIU Jinglei |
|
|
Generating CP-nets with bounded tree width based on Dandelion code |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 112-120
[Abstract]
(311)
[HTML 1 KB]
[PDF 1221 KB]
(1045)
|
|
43 |
XU Zhoubo, LI Zhen, LIU Huadong, LI Ping |
|
|
Subgraph isomorphism matching algorithm based on neighbor information aggregation |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 43-47
[Abstract]
(519)
[HTML 1 KB]
[PDF 755 KB]
(473)
|
|
199 |
GAO Shile, WANG Ying, LI Hailin, WAN Xiaoji |
|
|
Prediction method on financial time series data based on matrix profile |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 199-207
[Abstract]
(574)
[HTML 1 KB]
[PDF 1433 KB]
(1037)
|
|
636 |
ZHANG Xiaowei, JIANG Dawei, CHEN Ke, CHEN Gang |
|
|
AAC-Hunter: efficient algorithm for discovering aggregation algebraic constraints in relational databases |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 636-642
[Abstract]
(389)
[HTML 1 KB]
[PDF 1077 KB]
(693)
|
|
657 |
SHEN Chen, TAI Lingxiang, PENG Yuwei |
|
|
Dynamic workload matching method for automatic parameter tuning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 657-661
[Abstract]
(425)
[HTML 1 KB]
[PDF 867 KB]
(606)
|
|
1042 |
HUO Shoujun, HAO Yan, SHI Huiyu, DONG Yanqing, CAO Rui |
|
|
Pattern recognition of motor imagery EEG based on deep convolutional network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1042-1048
[Abstract]
(505)
[HTML 1 KB]
[PDF 2049 KB]
(670)
|
|
976 |
CHE Bingqian, ZHOU Dong |
|
|
Tag recommendation method combining network structure information and text content |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 976-983
[Abstract]
(437)
[HTML 1 KB]
[PDF 1060 KB]
(784)
|
|
1406 |
ZHENG Liping, WANG Jianqiang, ZHANG Yuzhao, DONG Zuofan |
|
|
Vehicle number optimization approach of autonomous vehicle fleet driven by multi-spatio-temporal distribution task |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1406-1411
[Abstract]
(342)
[HTML 1 KB]
[PDF 1248 KB]
(818)
|
|
643 |
LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia |
|
|
Personalized privacy protection for spatio-temporal data |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 643-650
[Abstract]
(527)
[HTML 1 KB]
[PDF 1280 KB]
(941)
|
|
662 |
REN Yuanyuan, WANG Chuanjian |
|
|
Remote sensing time-series images classification algorithm with abnormal data |
|
|
|
Journal of Computer Applications
2021 Vol.41 (3): 662-668
[Abstract]
(459)
[HTML 1 KB]
[PDF 1226 KB]
(988)
|
|
3490 |
WANG Yajie, ZHANG Yunbo, WU Yanyan, DING Aodong, QI Bingzhi |
|
|
General chess piece positioning method under uneven illumination |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3490-3498
[Abstract]
(385)
[HTML 1 KB]
[PDF 3060 KB]
(323)
|
|
3485 |
ZHANG Xiaochuan, DAI Xuyao, LIU Lu, FENG Tianshuo |
|
|
Chinese short text classification model with multi-head self-attention mechanism |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3485-3489
[Abstract]
(706)
[HTML 1 KB]
[PDF 806 KB]
(867)
|
|
3413 |
LIU Jingshu, WANG Li, LIU Jinglei |
|
|
Fast spectral clustering algorithm without eigen-decomposition |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3413-3422
[Abstract]
(469)
[HTML 1 KB]
[PDF 1407 KB]
(618)
|
|
3451 |
CHEN Li, DING Shifei, YU Wenjia |
|
|
Lightweight convolutional neural network based on cross-channel fusion and cross-module connection |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3451-3457
[Abstract]
(553)
[HTML 1 KB]
[PDF 1104 KB]
(699)
|
|
571 |
WANG Peng, LI Yanwen, YANG Di, YANG Huamin |
|
|
Macroscopic fundamental diagram traffic signal control model based on hierarchical control |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 571-576
[Abstract]
(491)
[HTML 1 KB]
[PDF 1351 KB]
(766)
|
|
318 |
QIU Ningjia, WANG Xiaoxia, WANG Peng, WANG Yanchun |
|
|
Analysis of double-channel Chinese sentiment model integrating grammar rules |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 318-323
[Abstract]
(484)
[HTML 1 KB]
[PDF 1093 KB]
(1179)
|
|
544 |
FU Qianhui, LI Qingkui, FU Jingnan, WANG Yu |
|
|
Dense crowd counting model based on spatial dimensional recurrent perception network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 544-549
[Abstract]
(413)
[HTML 1 KB]
[PDF 1486 KB]
(918)
|
|
1392 |
WANG Yijie, FAN Jiafei, WANG Chenyu |
|
|
Two-stage task offloading strategy based on game theory in cloud-edge environment |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1392-1398
[Abstract]
(436)
[HTML 1 KB]
[PDF 910 KB]
(676)
|
|
1113 |
LI Jing, LUO Jinfei, LI Bingchao |
|
|
Reliability analysis models for replication-based storage systems with proactive fault tolerance |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1113-1121
[Abstract]
(326)
[HTML 1 KB]
[PDF 1396 KB]
(510)
|
|
1305 |
GAN Lan, SHEN Hongfei, WANG Yao, ZHANG Yuejin |
|
|
Data augmentation method based on improved deep convolutional generative adversarial networks |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1305-1313
[Abstract]
(1178)
[HTML 1 KB]
[PDF 1499 KB]
(1681)
|
|
1533 |
FU Zhuoxin, SUN Hao, CHEN Jianwen, GUO Yue, CHEN Jin |
|
|
Construction of fracture reduction robot system based on cyber-physical systems |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1533-1538
[Abstract]
(373)
[HTML 1 KB]
[PDF 1497 KB]
(688)
|
|
1332 |
CHEN Zhengtao, HUANG Can, YANG Bo, ZHAO Li, LIAO Yong |
|
|
Yak face recognition algorithm of parallel convolutional neural network based on transfer learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (5): 1332-1336
[Abstract]
(473)
[HTML 1 KB]
[PDF 842 KB]
(882)
|
|
1071 |
YAN Aijun, WEI Zhiyuan |
|
|
Weight allocation and case base maintenance method of case-based reasoning classifier |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1071-1077
[Abstract]
(338)
[HTML 1 KB]
[PDF 871 KB]
(873)
|
|
1148 |
LI Shanshan, ZHAO Li, ZHANG Hongli |
|
|
Image grey level encryption based on cat map |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1148-1152
[Abstract]
(414)
[HTML 1 KB]
[PDF 1056 KB]
(503)
|
|
1172 |
WU Lei, YANG Xiaomin |
|
|
Improved remote sensing image fusion algorithm based on channel attention feedback network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1172-1178
[Abstract]
(383)
[HTML 1 KB]
[PDF 5163 KB]
(500)
|
|
1078 |
YANG Fengrui, HUO Na, ZHANG Xuhong, WEI Wei |
|
|
Topic-expanded emotional conversation generation based on attention mechanism |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1078-1083
[Abstract]
(667)
[HTML 1 KB]
[PDF 937 KB]
(1137)
|
|
1184 |
XU Feixue, LIU Qinming, OUYANG Hailing, YE Chunming |
|
|
Optimization of maintenance strategy model for multi-component system based on performance-based contract |
|
|
|
Journal of Computer Applications
2021 Vol.41 (4): 1184-1191
[Abstract]
(412)
[HTML 1 KB]
[PDF 1141 KB]
(581)
|
|
145 |
WU Xiaoping, ZHANG Qiang, ZHAO Fang, JIAO Lin |
|
|
Entity relation extraction method for guidelines of cardiovascular disease based on bidirectional encoder representation from transformers |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 145-149
[Abstract]
(859)
[HTML 1 KB]
[PDF 823 KB]
(1074)
|
|
3701 |
HE Xiangyu, LI Jing, YANG Shuqiang, XIA Yujie |
|
|
Extended target tracking algorithm based on ET-PHD filter and variational Bayesian approximation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3701-3706
[Abstract]
(417)
[HTML 1 KB]
[PDF 1020 KB]
(424)
|
|
577 |
FAN Xiaomao, XIONG Honglin, ZHAO Gansen |
|
|
Cleaning scheduling model with constraints and its solution |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 577-582
[Abstract]
(564)
[HTML 1 KB]
[PDF 876 KB]
(488)
|
|
324 |
SUN Heli, XU Tong, HE Liang, JIA Xiaolin |
|
|
Personalized social event recommendation method integrating user historical behaviors and social relationships |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 324-329
[Abstract]
(441)
[HTML 1 KB]
[PDF 919 KB]
(742)
|
|
422 |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang |
|
|
Efficient dynamic data audit scheme for resource-constrained users |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 422-432
[Abstract]
(417)
[HTML 1 KB]
[PDF 1658 KB]
(558)
|
|
433 |
HANG Mengxin, CHEN Wei, ZHANG Renjie |
|
|
Abnormal flow detection based on improved one-dimensional convolutional neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 433-440
[Abstract]
(750)
[HTML 1 KB]
[PDF 1011 KB]
(817)
|
|
357 |
XU Li, LI Jianhua |
|
|
Biomedical named entity recognition with graph network based on syntactic dependency parsing |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 357-362
[Abstract]
(484)
[HTML 1 KB]
[PDF 845 KB]
(1049)
|
|
127 |
TAN Jinyuan, DIAO Yufeng, QI Ruihua, LIN Hongfei |
|
|
Automatic summary generation of Chinese news text based on BERT-PGN model |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 127-132
[Abstract]
(1521)
[HTML 1 KB]
[PDF 857 KB]
(2859)
|
|
191 |
LIANG Zhen, FANG Tiyu, LI Jinping |
|
|
Precise visual navigation method for agricultural robot based on virtual navigation line |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 191-198
[Abstract]
(458)
[HTML 1 KB]
[PDF 1980 KB]
(553)
|
|
265 |
MA Tingting, JI Tianjiao, YANG Guanyu, CHEN Yang, XU Wenbo, LIU Hongtu |
|
|
Incidence trend prediction of hand-foot-mouth disease based on long short-term memory neural network |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 265-269
[Abstract]
(410)
[HTML 1 KB]
[PDF 892 KB]
(779)
|
|
185 |
LIU Sijia, TONG Xiangrong |
|
|
Urban transportation path planning based on reinforcement learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 185-190
[Abstract]
(1024)
[HTML 1 KB]
[PDF 1042 KB]
(765)
|
|
3563 |
LI Ming, HU Jiangping, CAO Xiaoli, PENG Peng |
|
|
Heterogeneous directional sensor node scheduling algorithm for differentiated coverage |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3563-3570
[Abstract]
(353)
[HTML 1 KB]
[PDF 986 KB]
(400)
|
|
550 |
LI Weiqiang, LEI Hang, ZHANG Jingyu, WANG Xupeng |
|
|
3D hand pose estimation based on label distribution learning |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 550-555
[Abstract]
(437)
[HTML 1 KB]
[PDF 1109 KB]
(607)
|
|
3534 |
ZHU Lin, NING Qian, LEI Yinjie, CHEN Bingcai |
|
|
Remaining useful life prediction for turbofan engines by genetic algorithm-based selective ensembling and temporal convolutional network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3534-3540
[Abstract]
(503)
[HTML 1 KB]
[PDF 970 KB]
(1129)
|
|
3558 |
SHI Wenxu, BAO Jiahui, YAO Yu |
|
|
Remote sensing image target detection and identification based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3558-3562
[Abstract]
(820)
[HTML 1 KB]
[PDF 1188 KB]
(1357)
|
|
87 |
CHEN Zhen, ZHONG Yiwen, LIN Juan |
|
|
Hybrid greedy genetic algorithm for solving 0-1 knapsack problem |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 87-94
[Abstract]
(643)
[HTML 1 KB]
[PDF 974 KB]
(778)
|
|
2455 |
ZHU Lin, YU Haitao, LEI Xinyu, LIU Jing, WANG Ruofan |
|
|
Brain network feature identification algorithm for Alzheimer's patients based on MRI image |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2455-2459
[Abstract]
(553)
[HTML 1 KB]
[PDF 915 KB]
(377)
|
|
2171 |
WU Haiyan, LIU Ying |
|
|
Stylistic multiple features mining based on attention network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2171-2181
[Abstract]
(509)
[HTML 1 KB]
[PDF 1584 KB]
(797)
|
|
2531 |
YANG Yunlong, SUN Jianqiang, SONG Guochao |
|
|
Text sentiment analysis based on gated recurrent unit and capsule features |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2531-2535
[Abstract]
(380)
[HTML 1 KB]
[PDF 781 KB]
(632)
|
|
2586 |
GOU Zi'an, ZHANG Xiao, WU Dongnan, WANG Yanqiu |
|
|
Log analysis and workload characteristic extraction in distributed storage system |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2586-2593
[Abstract]
(500)
[HTML 1 KB]
[PDF 1136 KB]
(777)
|
|
2441 |
XIA Lunteng, ZHANG Li |
|
|
Networked cane system for blind people based on K-nearest neighbor and dynamic time warping algorithms |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2441-2448
[Abstract]
(533)
[HTML 1 KB]
[PDF 1566 KB]
(579)
|
|
3081 |
AN Xin, KANG An, XIA Jinwei, LI Jianhua, CHEN Tian, REN Fuji |
|
|
Heterogeneous sensing multi-core scheduling method based on machine learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3081-3087
[Abstract]
(427)
[HTML 1 KB]
[PDF 1048 KB]
(848)
|
|
2743 |
YUAN Quan, WANG Yan, LI Yuxian |
|
|
Fast algorithm for distance regularized level set evolution model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2743-2747
[Abstract]
(346)
[HTML 1 KB]
[PDF 1693 KB]
(441)
|
|
2639 |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei |
|
|
Auditable signature scheme for blockchain based on secure multi-party |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2639-2645
[Abstract]
(420)
[HTML 1 KB]
[PDF 983 KB]
(783)
|
|
2951 |
HAO Qinxia |
|
|
Course recommendation system based on R2 index and multi-objective differential evolution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2951-2959
[Abstract]
(401)
[HTML 1 KB]
[PDF 1063 KB]
(426)
|
|
2305 |
XU Qiuyan, MA Liang, LIU Yong |
|
|
Yin-Yang-pair optimization algorithm based on chaos search and intricate operator |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2305-2312
[Abstract]
(468)
[HTML 1 KB]
[PDF 1180 KB]
(502)
|
|
2465 |
ZHENG Yanbin, HAN Mengyun, FAN Wenxin |
|
|
Handwritten Chinese character recognition based on two dimensional principal component analysis and convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2465-2471
[Abstract]
(491)
[HTML 1 KB]
[PDF 1282 KB]
(594)
|
|
2313 |
LUO Xiangyu, LI Jianan, LUO Xiaoxia, WANG Jia |
|
|
Improved community evolution relationship analysis method for dynamic graphs |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2313-2318
[Abstract]
(366)
[HTML 1 KB]
[PDF 3929 KB]
(432)
|
|
2536 |
YIN Chunyong, ZHANG Sun |
|
|
End-to-end adversarial variational Bayes method for short text sentiment classification |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2536-2542
[Abstract]
(416)
[HTML 1 KB]
[PDF 1653 KB]
(693)
|
|
2479 |
WEI Wenyu, YANG Wenzhong, MA Guoxiang, HUANG Mei |
|
|
Survey of person re-identification technology based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2479-2492
[Abstract]
(764)
[HTML 1 KB]
[PDF 1851 KB]
(1583)
|
|
2410 |
YAN Huajian, ZHANG Guofu, SU Zhaopin, LIU Yang |
|
|
Modeling and solving of high-dimensional multi-objective adaptive allocation for emergency relief supplies |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2410-2419
[Abstract]
(406)
[HTML 1 KB]
[PDF 1120 KB]
(590)
|
|
2236 |
ZHOU Yun, CHEN Shurong |
|
|
Behavior recognition method based on two-stream non-local residual network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2236-2240
[Abstract]
(550)
[HTML 1 KB]
[PDF 1122 KB]
(587)
|
|
3166 |
CAO Yudong, CAI Xibiao |
|
|
No-reference image quality assessment algorithm with enhanced adversarial learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3166-3171
[Abstract]
(573)
[HTML 1 KB]
[PDF 1035 KB]
(689)
|
|
2706 |
WANG Mingfen |
|
|
Handover access scheme in software-defined wireless local area network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2706-2711
[Abstract]
(475)
[HTML 1 KB]
[PDF 1522 KB]
(569)
|
|
2507 |
RONG Wei, JIANG Zheyuan, XIE Zhao, WU Kewei |
|
|
Clustering relational network for group activity recognition |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2507-2513
[Abstract]
(448)
[HTML 1 KB]
[PDF 1376 KB]
(530)
|
|
2493 |
QIU Yaoru, SUN Weijun, HUANG Yonghui, TANG Yuqi, ZHANG Haochuan, WU Junpeng |
|
|
Person re-identification method based on GAN uniting with spatial-temporal pattern |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2493-2498
[Abstract]
(457)
[HTML 1 KB]
[PDF 966 KB]
(807)
|
|
2737 |
CHEN Lixia, BAN Ying, WANG Xuewen |
|
|
Background subtraction based on tensor nuclear norm and 3D total variation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2737-2742
[Abstract]
(526)
[HTML 1 KB]
[PDF 950 KB]
(577)
|
|
2241 |
LIN Zhixing, WANG Like |
|
|
Network situation prediction method based on deep feature and Seq2Seq model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2241-2247
[Abstract]
(360)
[HTML 1 KB]
[PDF 1073 KB]
(625)
|
|
3526 |
LIU Ziwei, DENG Chunhua, LIU Jing |
|
|
Object detection algorithm based on asymmetric hourglass network structure |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3526-3533
[Abstract]
(510)
[HTML 1 KB]
[PDF 1337 KB]
(882)
|
|
407 |
WEN Chaodong, ZENG Cheng, REN Junwei, ZHANG Yan |
|
|
Patent text classification based on ALBERT and bidirectional gated recurrent unit |
|
|
|
Journal of Computer Applications
2021 Vol.41 (2): 407-412
[Abstract]
(721)
[HTML 1 KB]
[PDF 979 KB]
(888)
|
|
3658 |
PI Jiatian, YANG Jiezhi, YANG Linxi, PENG Mingjie, DENG Xiong, ZHAO Lijun, TANG Wanmei, WU Zhiyou |
|
|
Lightweight face liveness detection method based on multi-modal feature fusion |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3658-3665
[Abstract]
(625)
[HTML 1 KB]
[PDF 1582 KB]
(736)
|
|
3624 |
FAN Fan, GAO Yuan, QIN Pinle, WANG Lifang |
|
|
Abdominal MRI image multi-scale super-resolution reconstruction based on parallel channel-spatial attention mechanism |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3624-3630
[Abstract]
(371)
[HTML 1 KB]
[PDF 1111 KB]
(518)
|
|
22 |
LI Erchao, LI Kangwei |
|
|
Decomposition based many-objective evolutionary algorithm based on minimum distance and aggregation strategy |
|
|
|
Journal of Computer Applications
2021 Vol.41 (1): 22-28
[Abstract]
(438)
[HTML 1 KB]
[PDF 953 KB]
(534)
|
|
3520 |
WANG Yiting, ZHANG Ke, LI Jie, HAO Zongbo, DUAN Chang, ZHU Ce |
|
|
Recognition and localization method of super-large-scale variance objects in the same scene |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3520-3525
[Abstract]
(417)
[HTML 1 KB]
[PDF 1355 KB]
(552)
|
|
3666 |
CHEN Fang, LIU Xiaorui, YANG Mingye |
|
|
Face recognition security system based on liveness detection and authentication |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3666-3672
[Abstract]
(538)
[HTML 1 KB]
[PDF 1545 KB]
(573)
|
|
3550 |
XU Changqing, CHEN Zhenjie, HOU Renfu |
|
|
Deep learning classification method of Landsat 8 OLI images based on inaccurate prior knowledge |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3550-3557
[Abstract]
(578)
[HTML 1 KB]
[PDF 2305 KB]
(451)
|
|
3586 |
HUANG Xiuli, HUANG Jin, YU Pengfei, MIAO Weiwei, YANG Ruxia, LI Yijing, YU Peng |
|
|
Security-risk-oriented distributed resource allocation method in power wireless private network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (12): 3586-3593
[Abstract]
(384)
[HTML 1 KB]
[PDF 2051 KB]
(423)
|
|
3119 |
ZHAO Ji, CHENG Cheng |
|
|
Dynamic cooperative random drift particle swarm optimization algorithm assisted by evolution information |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3119-3126
[Abstract]
(431)
[HTML 1 KB]
[PDF 941 KB]
(603)
|
|
2164 |
XIONG Yong, ZHANG Jia, YU Jiajun, ZHANG Benren, LIANG Xuanzhuo, ZHU Qige |
|
|
Intelligent layout optimization algorithm for 3D pipelines of ships |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2164-2170
[Abstract]
(877)
[HTML 1 KB]
[PDF 1094 KB]
(738)
|
|
2795 |
HE Haochen, ZHANG Danhong |
|
|
Recommendation method based on multidimensional social relationship embedded deep graph neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2795-2803
[Abstract]
(544)
[HTML 1 KB]
[PDF 1544 KB]
(1356)
|
|
3261 |
QIN Nan, MA Liang, HUANG Rui |
|
|
Software safety requirement analysis and verification method based on system theoretic process analysis |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3261-3266
[Abstract]
(402)
[HTML 1 KB]
[PDF 2126 KB]
(507)
|
|
3113 |
XU Xiaoping, XU Li, WANG Feng, LIU Long |
|
|
Learning monkey algorithm based on Lagrange interpolation to solve discounted {0-1} knapsack problem |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3113-3118
[Abstract]
(373)
[HTML 1 KB]
[PDF 613 KB]
(522)
|
|
3346 |
ZHANG Junjie, SUN Guangmin, ZHENG Kun |
|
|
Review of gaze tracking and its application in intelligent education |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3346-3356
[Abstract]
(474)
[HTML 1 KB]
[PDF 1506 KB]
(726)
|
|
3101 |
SUN Heli, SUN Yuzhu, ZHANG Xiaoyun |
|
|
Social event participation prediction based on event description |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3101-3106
[Abstract]
(496)
[HTML 1 KB]
[PDF 676 KB]
(732)
|
|
3146 |
GONG Kaiqiang, ZHANG Chunmei, ZENG Guanghua |
|
|
Convolution neural network model compression method based on pruning and tensor decomposition |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3146-3151
[Abstract]
(736)
[HTML 1 KB]
[PDF 1488 KB]
(720)
|
|
3192 |
LIU Gaojun, FANG Xiao, DUAN Jianyong |
|
|
Query extension based on deep semantic information |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3192-3197
[Abstract]
(394)
[HTML 1 KB]
[PDF 591 KB]
(508)
|
|
3385 |
HUANG Weijian, LI Danyang, HUANG Yuan |
|
|
Spatio-temporal hybrid prediction model for air quality |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3385-3392
[Abstract]
(399)
[HTML 1 KB]
[PDF 902 KB]
(690)
|
|
2967 |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang |
|
|
Integral attack on PICO algorithm based on division property |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2967-2972
[Abstract]
(529)
[HTML 1 KB]
[PDF 810 KB]
(700)
|
|
2571 |
GAO Zhiyong, HUANG Jinzhen, DU Chenggang |
|
|
Pulmonary nodule detection based on feature pyramid networks |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2571-2576
[Abstract]
(540)
[HTML 1 KB]
[PDF 988 KB]
(674)
|
|
3280 |
LI Cuijin, QU Zhong |
|
|
Review of image edge detection algorithms based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3280-3288
[Abstract]
(2657)
[HTML 1 KB]
[PDF 922 KB]
(4044)
|
|
3107 |
ZHENG Zongsheng, HU Chenyu, JIANG Xiaoyi |
|
|
Deep transfer adaptation network based on improved maximum mean discrepancy algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3107-3112
[Abstract]
(523)
[HTML 1 KB]
[PDF 2506 KB]
(913)
|
|
3178 |
LI Qian, YANG Wenzhu, CHEN Xiangyang, YUAN Tongtong, WANG Yuxia |
|
|
Human action recognition model based on tightly coupled spatiotemporal two-stream convolution neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3178-3183
[Abstract]
(372)
[HTML 1 KB]
[PDF 2537 KB]
(464)
|
|
1879 |
HU Tiantian, DAN Yabo, HU Jie, LI Xiang, LI Shaobo |
|
|
News named entity recognition and sentiment classification based on attention-based bi-directional long short-term memory neural network and conditional random field |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1879-1883
[Abstract]
(1058)
[HTML 1 KB]
[PDF 864 KB]
(1034)
|
|
2543 |
SUN Min, LI Yang, ZHUANG Zhengfei, YU Dawei |
|
|
Sentiment analysis based on parallel hybrid network and attention mechanism |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2543-2548
[Abstract]
(419)
[HTML 1 KB]
[PDF 938 KB]
(713)
|
|
2719 |
LIU Li, HU Haibo, YANG Tao |
|
|
Visual analysis system for exploring spatio-temporal exhibition data |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2719-2727
[Abstract]
(517)
[HTML 1 KB]
[PDF 4426 KB]
(277)
|
|
2117 |
MA Jinlin, WEI Meng, MA Ziping |
|
|
Pulmonary nodule segmentation method based on deep transfer learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2117-2125
[Abstract]
(619)
[HTML 1 KB]
[PDF 1631 KB]
(600)
|
|
1926 |
HU Xuemin, TONG Xiuchi, GUO Lin, ZHANG Ruohan, KONG Li |
|
|
End-to-end autonomous driving model based on deep visual attention neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1926-1931
[Abstract]
(448)
[HTML 1 KB]
[PDF 1287 KB]
(780)
|
|
2016 |
LI Zhanghong, LIANG Xiaolei, TIAN Mengdan, ZHOU Wenfeng |
|
|
Solution space dynamic compression strategy for permutation and combination problems |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2016-2020
[Abstract]
(335)
[HTML 1 KB]
[PDF 862 KB]
(404)
|
|
1950 |
NIE Xichan, ZHANG Yang, YU Dunhui, ZHANG Xingsheng |
|
|
Spatial crowdsourcing task allocation algorithm for global optimization |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1950-1958
[Abstract]
(529)
[HTML 1 KB]
[PDF 1314 KB]
(728)
|
|
2009 |
HUANG Zhongzhan, XU Shiming |
|
|
Automatic generation algorithm of orthogonal grid based on recurrent neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2009-2015
[Abstract]
(428)
[HTML 1 KB]
[PDF 1651 KB]
(381)
|
|
1884 |
WANG Minrui, GAO Shu, YUAN Ziyong, YUAN Lei |
|
|
Sequence generation model with dynamic routing for multi-label text classification |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1884-1890
[Abstract]
(507)
[HTML 1 KB]
[PDF 978 KB]
(735)
|
|
3249 |
JIN Xin, WAN Taochun, LYU Chengmei, WANG Chengtian, CHEN Fulong, ZHAO Chuanxin |
|
|
Privacy preservation algorithm of original data in mobile crowd sensing |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3249-3254
[Abstract]
(431)
[HTML 1 KB]
[PDF 631 KB]
(560)
|
|
2804 |
LIU Ran, LIU Yu, GU Jinguang |
|
|
Improved AdaNet based on adaptive learning rate optimization |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2804-2810
[Abstract]
(377)
[HTML 1 KB]
[PDF 1134 KB]
(669)
|
|
3203 |
CHENG Qiwei, CHEN Qimai, HE Chaobo, LIU Hai |
|
|
Overlapping community detection method based on improved symmetric binary nonnegative matrix factorization |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3203-3210
[Abstract]
(399)
[HTML 1 KB]
[PDF 750 KB]
(431)
|
|
3048 |
YAO Lu, SONG Huihui, ZHANG Kaihua |
|
|
Mixed-order channel attention network for single image super-resolution reconstruction |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3048-3053
[Abstract]
(324)
[HTML 1 KB]
[PDF 3787 KB]
(550)
|
|
3133 |
WANG Haipeng, JIANG Ailian, LI Pengxiang |
|
|
Newton-soft threshold iteration algorithm for robust principal component analysis |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3133-3138
[Abstract]
(409)
[HTML 1 KB]
[PDF 3222 KB]
(618)
|
|
1856 |
WU Chongshu, LIN Lin, XUE Yunjing, SHI Peng |
|
|
Hierarchical segmentation of pathological images based on self-supervised learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1856-1862
[Abstract]
(926)
[HTML 1 KB]
[PDF 2378 KB]
(833)
|
|
1842 |
WU Yiyuan, LIAN Peikun, GUO Jiangang, LAI Yuanwen, KANG Yaling |
|
|
Optimization method of incremental split selection based on video queue length management |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1842-1849
[Abstract]
(367)
[HTML 1 KB]
[PDF 1558 KB]
(619)
|
|
1824 |
FU Lei, REN Dejun, WU Huayun, GAO Ming, QIU Lyu, HU Yunqi |
|
|
Real-time segmentation algorithm for bubble defects of plastic bottle based on improved Fast-SCNN |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1824-1829
[Abstract]
(514)
[HTML 1 KB]
[PDF 756 KB]
(525)
|
|
1806 |
QIANG Baohua, ZHAI Yijie, CHEN Jinlong, XIE Wu, ZHENG Hong, WANG Xuewen, ZHANG Shihao |
|
|
Lightweight human skeleton key point detection model based on improved convolutional pose machines and SqueezeNet |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1806-1811
[Abstract]
(681)
[HTML 1 KB]
[PDF 1242 KB]
(526)
|
|
1799 |
ZHANG Jiagang, LI Daping, YANG Xiaodong, ZOU Maoyang, WU Xi, HU Jinrong |
|
|
Deformable medical image registration algorithm based on deep convolution feature optical flow |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1799-1805
[Abstract]
(555)
[HTML 1 KB]
[PDF 1420 KB]
(570)
|
|
1774 |
ZHANG Jie, CHANG Tianqing, DAI Wenjun, GUO Libin, ZHANG Lei |
|
|
Object tracking algorithm based on correlation filtering and color probability model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1774-1782
[Abstract]
(362)
[HTML 1 KB]
[PDF 3751 KB]
(398)
|
|
1769 |
SUN Jianjun, XU Yan |
|
|
Estimation of underdetermined mixing matrix based on improved weighted fuzzy C-means clustering |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1769-1773
[Abstract]
(337)
[HTML 1 KB]
[PDF 1377 KB]
(444)
|
|
1763 |
ZHANG Haoran, WANG Xueyuan, LI Xiaoxia |
|
|
Low SNR denoising algorithm based on adaptive voice activity detection and minimum mean-square error log-spectral amplitude estimation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1763-1768
[Abstract]
(447)
[HTML 1 KB]
[PDF 2132 KB]
(507)
|
|
1698 |
AN Xin, XIA Jinwei, YANG Haijiao, OUYANG Yiming, REN Fuji |
|
|
Discrete controller synthesis based resource management method of heterogeneous multi-core processor system |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1698-1706
[Abstract]
(383)
[HTML 1 KB]
[PDF 905 KB]
(356)
|
|
1685 |
ZHANG Daowei, DUAN Haixin |
|
|
Website fingerprinting technique based on image texture |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1685-1691
[Abstract]
(595)
[HTML 1 KB]
[PDF 1070 KB]
(532)
|
|
1627 |
NIU Chunyan, XIA Kewen, ZHANG Jiangnan, HE Ziping |
|
|
Extreme learning machine algorithm based on cloud quantum flower pollination |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1627-1632
[Abstract]
(444)
[HTML 1 KB]
[PDF 919 KB]
(433)
|
|
1607 |
WANG Benjie, NONG Liping, ZHANG Wenhui, LIN Jiming, WANG Junyi |
|
|
3D point cloud classification and segmentation network based on Spider convolution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1607-1612
[Abstract]
(683)
[HTML 1 KB]
[PDF 689 KB]
(951)
|
|
1601 |
XUE Lu, SONG Wei |
|
|
Relation extraction method based on dynamic label |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1601-1606
[Abstract]
(365)
[HTML 1 KB]
[PDF 708 KB]
(386)
|
|
1587 |
CAO Jianfang, ZHAO Aidi, ZHANG Zibang |
|
|
Application of convolutional neural network with threshold optimization in image annotation |
|
|
|
Journal of Computer Applications
0 Vol. (): 1587-1592
[Abstract]
(471)
[HTML 1 KB]
[PDF 695 KB]
(647)
|
|
1580 |
YANG Guofeng, YANG Yong |
|
|
Question classification of common crop disease question answering system based on BERT |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1580-1586
[Abstract]
(745)
[HTML 1 KB]
[PDF 719 KB]
(874)
|
|
1553 |
HU Min, BAI Xue, XU Wei, WU Bingjian |
|
|
Review of anomaly detection algorithms for multidimensional time series |
|
|
|
Journal of Computer Applications
2020 Vol.40 (6): 1553-1564
[Abstract]
(1541)
[HTML 1 KB]
[PDF 930 KB]
(3322)
|
|
3236 |
YUAN Chi |
|
|
Identity-based dynamic clustering authentication algorithm for wireless sensor networks |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3236-3241
[Abstract]
(347)
[HTML 1 KB]
[PDF 572 KB]
(443)
|
|
3332 |
FENG Tao, CHEN Bin, ZHANG Yuefei |
|
|
Chromosome image segmentation framework based on improved Mask R-CNN |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3332-3339
[Abstract]
(739)
[HTML 1 KB]
[PDF 2168 KB]
(870)
|
|
3242 |
LI Kunming, WANG Chaoqian, NI Weiwei, BAO Xiaohan |
|
|
High-precision histogram publishing method based on differential privacy |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3242-3248
[Abstract]
(477)
[HTML 1 KB]
[PDF 626 KB]
(547)
|
|
3088 |
ZHANG Xiaobo, YANG Yan, LI Tianrui, LU Fan, PENG Lilan |
|
|
Early diagnosis and prediction of Parkinson's disease based on clustering medical text data |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3088-3094
[Abstract]
(478)
[HTML 1 KB]
[PDF 1270 KB]
(961)
|
|
2838 |
WANG Kun, ZHENG Yi, FANG Shuya, LIU Shouyin |
|
|
Long text aspect-level sentiment analysis based on text filtering and improved BERT |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2838-2844
[Abstract]
(1105)
[HTML 1 KB]
[PDF 1014 KB]
(1035)
|
|
3229 |
YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen |
|
|
Detection method of physical-layer impersonation attack based on deep Q-network in edge computing |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3229-3235
[Abstract]
(483)
[HTML 1 KB]
[PDF 845 KB]
(642)
|
|
3060 |
DU Nianmao, XU Jiachen, XIAO Zhiyong |
|
|
Undersampled brain magnetic resonance image reconstruction method based on convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3060-3065
[Abstract]
(423)
[HTML 1 KB]
[PDF 3713 KB]
(892)
|
|
3340 |
WEI Xiaona, XING Jiaqi, WANG Zhenyu, WANG Yingshan, SHI Jie, ZHAO Di, WANG Hongzhi |
|
|
Magnetic resonance image segmentation of articular synovium based on improved U-Net |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3340-3345
[Abstract]
(411)
[HTML 1 KB]
[PDF 901 KB]
(659)
|
|
3000 |
YUAN Zhixin, ZHOU Yanling |
|
|
Unambiguous tracking method of AltBOC (15, 10) signal based on combined correlation function |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3000-3005
[Abstract]
(376)
[HTML 1 KB]
[PDF 1183 KB]
(417)
|
|
3306 |
ZHOU Jian, HUANG Zhangjin |
|
|
3D face reconstruction and dense face alignment method based on improved 3D morphable model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (11): 3306-3313
[Abstract]
(466)
[HTML 1 KB]
[PDF 2638 KB]
(659)
|
|
3054 |
ZONG Chunmei, ZHANG Yueqin, CAO Jianfang, ZHAO Qingshan |
|
|
Compressed sensing magnetic resonance imaging based on deep priors and non-local similarity |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3054-3059
[Abstract]
(440)
[HTML 1 KB]
[PDF 1058 KB]
(459)
|
|
2822 |
SHI Guoqiang, ZHAO Xia |
|
|
Object tracking algorithm based on jointly-optimized strong-coupled Siamese region proposal network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2822-2830
[Abstract]
(418)
[HTML 1 KB]
[PDF 2660 KB]
(518)
|
|
2904 |
QI Yongjun, GU Junhua, ZHANG Yajuan, WANG Feng, TIAN Zepei |
|
|
Deep mixed convolution model for pulmonary nodule detection |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2904-2909
[Abstract]
(483)
[HTML 1 KB]
[PDF 1572 KB]
(763)
|
|
2392 |
GAO Haijun, ZENG Xiangyin, PAN Dazhi, ZHENG Bochuan |
|
|
Rectal tumor segmentation method based on improved U-Net model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2392-2397
[Abstract]
(731)
[HTML 1 KB]
[PDF 1307 KB]
(1123)
|
|
2817 |
ZHU Qianqian, LIU Yuan, LI Fu |
|
|
Bio-inspired matrix reduction and quantization method for deep neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2817-2821
[Abstract]
(371)
[HTML 1 KB]
[PDF 1067 KB]
(648)
|
|
2137 |
CHEN Xiukai, LU Zhihua, ZHOU Yu |
|
|
Speech separation algorithm based on convolutional encoder decoder and gated recurrent unit |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2137-2141
[Abstract]
(400)
[HTML 1 KB]
[PDF 830 KB]
(650)
|
|
1996 |
WANG Lei |
|
|
Network intrusion detection method based on improved rough set attribute reduction and
K-means clustering |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1996-2002
[Abstract]
(416)
[HTML 1 KB]
[PDF 1071 KB]
(536)
|
|
1873 |
ZHAO Xiaohu, ZHAO Chenglong |
|
|
Knowledge base question answering system based on multi-feature semantic matching |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1873-1878
[Abstract]
(547)
[HTML 1 KB]
[PDF 880 KB]
(831)
|
|
2142 |
CAO Cejun, LIU Ju |
|
|
Overview of modeling method of emergency organization decision in disaster operations management |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2142-2149
[Abstract]
(446)
[HTML 1 KB]
[PDF 1082 KB]
(710)
|
|
2973 |
CHEN Yi, ZHANG Meijing, XU Fajian |
|
|
Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2973-2979
[Abstract]
(476)
[HTML 1 KB]
[PDF 1225 KB]
(541)
|
|
2845 |
WANG Jian, TANG Shan, HUANG Yuxin, YU Zhengtao |
|
|
Chinese-Vietnamese bilingual multi-document news opinion sentence recognition based on sentence association graph |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2845-2849
[Abstract]
(409)
[HTML 1 KB]
[PDF 815 KB]
(483)
|
|
1483 |
TAN Wenan, WANG Hui |
|
|
Scheme and platform of trusted fund-raising and donation based on smart contract |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1483-1487
[Abstract]
(679)
[HTML 1 KB]
[PDF 1060 KB]
(1126)
|
|
1529 |
ZHU Xingdong, TIAN Shaobing, HUANG Kui, FAN Jiali, WANG Zheng, CHENG Huacheng |
|
|
Target detection of carrier-based aircraft based on deep convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1529-1533
[Abstract]
(460)
[HTML 1 KB]
[PDF 823 KB]
(454)
|
|
1488 |
CAO Yu, WANG Cheng, WANG Xin, GAO Yueer |
|
|
Urban road short-term traffic flow prediction based on spatio-temporal node selection and deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1488-1493
[Abstract]
(570)
[HTML 1 KB]
[PDF 712 KB]
(657)
|
|
1470 |
HUANG Jie, CHAOXIA Chenyu, DONG Xiangyu, GAO Yun, ZHU Jun, YANG Bo, ZHANG Fei, SHANG Weiwei |
|
|
Faster R-CNN based color-guided flame detection |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1470-1475
[Abstract]
(668)
[HTML 1 KB]
[PDF 947 KB]
(697)
|
|
1465 |
CHENG Guangtao, GONG Jiachang, LI Jian |
|
|
Smoke recognition method based on dense convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1465-1469
[Abstract]
(444)
[HTML 1 KB]
[PDF 847 KB]
(404)
|
|
1460 |
XIAO He, LIU Zhiqin, WANG Qingfeng, HUANG Jun, ZHOU Ying, LIU Qiyu, XU Weiyun |
|
|
Mass and calcification classification method in mammogram based on multi-view transfer learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1460-1464
[Abstract]
(442)
[HTML 1 KB]
[PDF 1943 KB]
(368)
|
|
1453 |
ZENG Zhaoxin, LIU Jun |
|
|
Microscopic image segmentation method of C.elegans based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1453-1459
[Abstract]
(506)
[HTML 1 KB]
[PDF 2638 KB]
(579)
|
|
1421 |
YU Guangji, LUO Weitai, WU Xiaoyun |
|
|
Illumination calculation for large-scale scene based on improved voxel cone tracking |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1421-1424
[Abstract]
(510)
[HTML 1 KB]
[PDF 724 KB]
(425)
|
|
1415 |
ZHANG Yifei, LI Xinfu, TIAN Xuedong |
|
|
Stereo matching algorithm based on image segmentation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1415-1420
[Abstract]
(533)
[HTML 1 KB]
[PDF 1843 KB]
(437)
|
|
1409 |
WANG Jiangkun, HE Kunjin, CAO Hongfei, WANG Jinqiang, ZHANG Yan |
|
|
Interactive water flow heating simulation based on smoothed particle hydrodynamics method |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1409-1414
[Abstract]
(420)
[HTML 1 KB]
[PDF 2338 KB]
(520)
|
|
1403 |
ZHOU Xiang, TANG Liyu, LIN Ding |
|
|
Virtual-real registration method of natural features based on binary robust invariant scalable keypoints and speeded up robust features |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1403-1408
[Abstract]
(408)
[HTML 1 KB]
[PDF 1572 KB]
(421)
|
|
1392 |
WANG Yueping, XU Tao |
|
|
User association mechanism based on evolutionary game |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1392-1396
[Abstract]
(384)
[HTML 1 KB]
[PDF 546 KB]
(331)
|
|
1369 |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun |
|
|
Design and implementation of Lite register model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1369-1373
[Abstract]
(370)
[HTML 1 KB]
[PDF 2258 KB]
(391)
|
|
1354 |
LI Tianzheng, WANG Chuntao |
|
|
Lossy compression algorithm for encrypted binary images using Markov random field |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1354-1363
[Abstract]
(372)
[HTML 1 KB]
[PDF 1082 KB]
(350)
|
|
1348 |
WU Liren, LIU Zhenghao, ZHANG Hao, CEN Yueliang, ZHOU Wei |
|
|
PS-MIFGSM: focus image adversarial attack algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1348-1353
[Abstract]
(763)
[HTML 1 KB]
[PDF 1400 KB]
(738)
|
|
1340 |
WU Zhijun, WANG Hang |
|
|
System wide information management emergency response mechanism based on subscribe/publish service |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1340-1347
[Abstract]
(370)
[HTML 1 KB]
[PDF 1095 KB]
(472)
|
|
1315 |
XU Dai, YUE Zhang, YANG Wenxia, REN Xiao |
|
|
Tampered image recognition based on improved three-stream Faster R-CNN |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1315-1321
[Abstract]
(569)
[HTML 1 KB]
[PDF 1699 KB]
(547)
|
|
1309 |
CAO Xiaowei, QU Zhijian, XU Lingling, LIU Xiaohong |
|
|
3D model recognition based on capsule network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1309-1314
[Abstract]
(559)
[HTML 1 KB]
[PDF 2645 KB]
(509)
|
|
1301 |
WANG Yiding, HAO Chenyu, LI Yaoli, CAI Shaoqing, YUAN Yuan |
|
|
Microscopic image identification for small-sample Chinese medicinal materials powder based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1301-1308
[Abstract]
(644)
[HTML 1 KB]
[PDF 1619 KB]
(771)
|
|
1291 |
YANG Yan, LIU Shengjian, ZHOU Yongquan |
|
|
Greedy binary lion swarm optimization algorithm for solving multidimensional knapsack problem |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1291-1294
[Abstract]
(804)
[HTML 1 KB]
[PDF 537 KB]
(564)
|
|
1278 |
YANG Yunting, WANG Peng |
|
|
Multi-scale quantum free particle optimization algorithm for solving travelling salesman problem |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1278-1283
[Abstract]
(430)
[HTML 1 KB]
[PDF 478 KB]
(572)
|
|
1272 |
YI Dongyi, DENG Genqiang, DONG Chaoxiong, ZHU Miaomiao, LYU Zhouping, ZHU Suisong |
|
|
Medical insurance fraud detection algorithm based on graph convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1272-1277
[Abstract]
(1191)
[HTML 1 KB]
[PDF 2297 KB]
(1096)
|
|
1260 |
CHEN Chengjun, MAO Yingchi, WANG Yichao |
|
|
CNN model compression based on activation-entropy based layer-wise iterative pruning strategy |
|
|
|
Journal of Computer Applications
2020 Vol.40 (5): 1260-1265
[Abstract]
(379)
[HTML 1 KB]
[PDF 718 KB]
(473)
|
|
2811 |
LEI Xiaokang, YIN Zhigang, ZHAO Ruilian |
|
|
FPGA-based convolutional neural network fixed-point acceleration |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2811-2816
[Abstract]
(659)
[HTML 1 KB]
[PDF 1063 KB]
(913)
|
|
2299 |
WANG Shouhua, WU Lirong, JI Yuanfa, SUN Xiyan |
|
|
Fast ambiguity resolution method based on lattice theory |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2299-2304
[Abstract]
(454)
[HTML 1 KB]
[PDF 1080 KB]
(397)
|
|
2182 |
ZHANG Xinyi, FENG Shimin, DING Enjie |
|
|
Entity recognition and relation extraction model for coal mine |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2182-2188
[Abstract]
(519)
[HTML 1 KB]
[PDF 1096 KB]
(691)
|
|
1901 |
TIAN Baojun, LIU Shuang, FANG Jiandong |
|
|
Hybrid recommendation algorithm by fusion of topic information and convolution neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1901-1907
[Abstract]
(497)
[HTML 1 KB]
[PDF 1419 KB]
(633)
|
|
2189 |
HE Hansen, SUN Guozi |
|
|
Fake news content detection model based on feature aggregation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2189-2193
[Abstract]
(734)
[HTML 1 KB]
[PDF 845 KB]
(950)
|
|
2219 |
LI Shengwu, ZHANG Xuande |
|
|
Multi-domain convolutional neural network based on self-attention mechanism for visual tracking |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2219-2224
[Abstract]
(671)
[HTML 1 KB]
[PDF 1092 KB]
(491)
|
|
2202 |
CHEN Jiawei, HAN Fang, WANG Zhijie |
|
|
Aspect-based sentiment analysis with self-attention gated graph convolutional network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2202-2206
[Abstract]
(589)
[HTML 1 KB]
[PDF 803 KB]
(654)
|
|
2214 |
XIONG Changzhen, LI Yan |
|
|
Dynamic weighted siamese network tracking algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2214-2218
[Abstract]
(446)
[HTML 1 KB]
[PDF 1142 KB]
(701)
|
|
2358 |
SHEN Marui, LI Jincheng, ZHANG Ya, ZOU Jian |
|
|
Magnetic resonance image reconstruction algorithm via non-convex total variation regularization |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2358-2364
[Abstract]
(576)
[HTML 1 KB]
[PDF 10893 KB]
(231)
|
|
2460 |
XIE Yunxia, HUANG Haiyu, HU Jianbin |
|
|
Staging and lesion detection of diabetic retinopathy based on deep convolution neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2460-2464
[Abstract]
(604)
[HTML 1 KB]
[PDF 2044 KB]
(554)
|
|
2525 |
YIN Chunyong, HE Miao |
|
|
Text classification based on improved capsule network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2525-2530
[Abstract]
(1146)
[HTML 1 KB]
[PDF 952 KB]
(1236)
|
|
1977 |
CONG Jing, WEI Yongzhuang, LIU Zhenghong |
|
|
Stepwise correlation power analysis of SM4 cryptographic algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1977-1982
[Abstract]
(541)
[HTML 1 KB]
[PDF 1949 KB]
(574)
|
|
2155 |
GAO Yilu, HU Zhihua |
|
|
Path planning for automated guided vehicles based on tempo-spatial network at automated container terminal |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2155-2163
[Abstract]
(486)
[HTML 1 KB]
[PDF 1282 KB]
(708)
|
|
2110 |
SHI Lukui, MA Hongqi, ZHANG Chaozong, FAN Shiyan |
|
|
Detection method of pulmonary nodules based on improved residual structure |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2110-2116
[Abstract]
(471)
[HTML 1 KB]
[PDF 2429 KB]
(513)
|
|
0 |
|
|
|
Video impulse noise removal method based on global and non-local low rank decomposition |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(173)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
0 |
|
|
|
Image caption model based on attention feature adaptive recalibration |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(230)
[HTML 1 KB]
[PDF 0 KB]
(17)
|
|
0 |
|
|
|
Lightweight face recognition algorithm based on MobieNetV2 |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(587)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
0 |
|
|
|
Opinion extraction and clustering of students’ teaching evaluation text based on sentiment analysis |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(298)
[HTML 1 KB]
[PDF 0 KB]
(28)
|
|
0 |
|
|
|
Feature extraction method of gesture image based on cascaded convolutional neural network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(232)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
0 |
|
|
|
Solving best spanning tree based on extension analytic hierarchy process |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(137)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
2910 |
ZHANG Zelin, XU Jun |
|
|
Automatic segmentation of breast epithelial and stromal regions based on conditional generative adversarial network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2910-2916
[Abstract]
(339)
[HTML 1 KB]
[PDF 7615 KB]
(391)
|
|
0 |
LIAO Yun,DUAN Qing,LIU Junhui,ZHOU Hao |
|
|
Water line detection algorithm based on deep learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(803)
[HTML 1 KB]
[PDF 0 KB]
(32)
|
|
0 |
ZHANG Huali,KANG Xiaodong,LI Bo,WANG Yage,LIU Hanqing,BAI Fang |
|
|
Medical name entity recognition based on Bi-LSTM-CRF and attention mechanism |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(783)
[HTML 1 KB]
[PDF 0 KB]
(47)
|
|
0 |
DAI Jin,WU Feng |
|
|
Speech teaching App based on speech recognition |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(201)
[HTML 1 KB]
[PDF 0 KB]
(30)
|
|
0 |
FENG Wei,XIE Dongxiu |
|
|
Low rank matrix approximation with weighted nuclear norm and its application |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(170)
[HTML 1 KB]
[PDF 0 KB]
(26)
|
|
0 |
XU Yiliu,HE Peng,REN Dong,WANG Hui,DONG Ting,SHAO Pan |
|
|
Timeber transport vehicle detection based on improved faster RCNN |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(353)
[HTML 1 KB]
[PDF 0 KB]
(17)
|
|
0 |
FANG Chenchen,SHI Fanhuai |
|
|
Image recognition of tomato diseases based on improved deep residual network |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(277)
[HTML 1 KB]
[PDF 0 KB]
(30)
|
|
0 |
|
|
|
Adaptive video analysis in edge computing |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(164)
[HTML 1 KB]
[PDF 0 KB]
(24)
|
|
0 |
|
|
|
Prediction of mango yield based on self-attention CNN and bidirectional GRU |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(381)
[HTML 1 KB]
[PDF 0 KB]
(23)
|
|
0 |
|
|
|
Design of lightweight convolutional neural network based on MobileNet and YOLOv3 |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(664)
[HTML 1 KB]
[PDF 0 KB]
(34)
|
|
0 |
|
|
|
Simulation of computer room temperature and air conditioning energy saving based on computational fluid dynamics model |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(267)
[HTML 1 KB]
[PDF 0 KB]
(25)
|
|
0 |
|
|
|
Joint maritime search and rescue plan evaluation based on analytic hierachy process,additive ratio assessment and multi-choice goal programming |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(229)
[HTML 1 KB]
[PDF 0 KB]
(28)
|
|
0 |
|
|
|
Research and implementation of OBJ model imported into industrial simulation system dynamically |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(231)
[HTML 1 KB]
[PDF 0 KB]
(32)
|
|
0 |
|
|
|
Fault-tolerant resource provisioning for data-intensive applications in cloud environment |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(206)
[HTML 1 KB]
[PDF 0 KB]
(29)
|
|
1919 |
HU Xuemin, CHENG Yu, CHEN Guowen, ZHANG Ruohan, TONG Xiuchi |
|
|
Motion planning for autonomous driving with directional navigation based on deep spatio-temporal Q-network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 1919-1925
[Abstract]
(500)
[HTML 1 KB]
[PDF 2633 KB]
(664)
|
|
2881 |
CHEN Lichao, ZHANG Lei, CAO Jianfang, ZHANG Rui |
|
|
Vehicle classification based on HOG-C CapsNet in traffic surveillance scenarios |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2881-2889
[Abstract]
(355)
[HTML 1 KB]
[PDF 3651 KB]
(415)
|
|
3041 |
OUYANG Ning, WEI Yu, LIN Leping |
|
|
Image super-resolution reconstruction method combining perceptual edge constraint and multi-scale fusion network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 3041-3047
[Abstract]
(380)
[HTML 1 KB]
[PDF 4821 KB]
(338)
|
|
2345 |
LIN Jing, HUANG Yuqing, LI Leimin |
|
|
Image super-resolution reconstruction based on spherical moment matching and feature discrimination |
|
|
|
Journal of Computer Applications
2020 Vol.40 (8): 2345-2350
[Abstract]
(435)
[HTML 1 KB]
[PDF 1395 KB]
(469)
|
|
2104 |
CHEN Hao, QIN Zhiguang, DING Yi |
|
|
Multi-modal brain tumor segmentation method under same feature space |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2104-2109
[Abstract]
(484)
[HTML 1 KB]
[PDF 874 KB]
(583)
|
|
2917 |
CHENG Kai, WANG Yan, LIU Jianfei |
|
|
Semi-supervised learning method for automatic nuclei segmentation using generative adversarial network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2917-2922
[Abstract]
(554)
[HTML 1 KB]
[PDF 3833 KB]
(574)
|
|
1045 |
CHEN Lichao, ZHENG Jiamin, CAO Jianfang, PAN Lihu, ZHANG Rui |
|
|
Intelligent traffic sign recognition method based on capsule network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1045-1049
[Abstract]
(587)
[HTML 1 KB]
[PDF 864 KB]
(681)
|
|
2899 |
GAO Ming, REN Dejun, HU Yunqi, FU Lei, QIU Lyu |
|
|
Ampoule packaging quality inspection algorithm based on machine vision and lightweight neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (10): 2899-2903
[Abstract]
(502)
[HTML 1 KB]
[PDF 1784 KB]
(466)
|
|
2555 |
SONG Yifan, ZHANG Peng, ZONG Libo, MA Bo, LIU Libo |
|
|
Improved redundant point filtering-based 3D object detection method |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2555-2560
[Abstract]
(490)
[HTML 1 KB]
[PDF 1674 KB]
(523)
|
|
2069 |
HU Xueying, GUO Hairu, ZHU Rong |
|
|
Image super-resolution reconstruction based on hybrid deep convolutional network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (7): 2069-2076
[Abstract]
(491)
[HTML 1 KB]
[PDF 1446 KB]
(949)
|
|
2754 |
ZHAO Chuan, MIAO Liye, YANG Haoxiong, HE Mingke |
|
|
Interactive dynamic optimization of dual-channel supply chain inventory under stochastic demand |
|
|
|
Journal of Computer Applications
2020 Vol.40 (9): 2754-2761
[Abstract]
(391)
[HTML 1 KB]
[PDF 1530 KB]
(763)
|
|
335 |
Cui LI, Qingkui CHEN |
|
|
Dynamic monitoring model based on DPDK parallel communication |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 335-341
[Abstract]
(446)
[HTML 0 KB]
[PDF 846 KB]
(349)
|
|
162 |
WANG Bo, CAI Honghao, SU Yang |
|
|
Classification of malicious code variants based on VGGNet |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 162-167
[Abstract]
(578)
[HTML 1 KB]
[PDF 897 KB]
(474)
|
|
23 |
HUANG Youwen, YOU Yadong, ZHAO Peng |
|
|
Image caption generation model with convolutional attention mechanism |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 23-27
[Abstract]
(494)
[HTML 1 KB]
[PDF 810 KB]
(615)
|
|
3639 |
LIANG Bai'ou |
|
|
Flowchart automatic generation algorithm base on Sugiyama |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3639-3643
[Abstract]
(892)
[HTML 1 KB]
[PDF 749 KB]
(412)
|
|
3456 |
LIU Yalong, LI Jie, WANG Ying, WU Saifei, ZOU Pei |
|
|
Segmentation model of neonatal punctate white matter lesion based on refined deep residual U-Net |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3456-3461
[Abstract]
(559)
[HTML 1 KB]
[PDF 1112 KB]
(398)
|
|
947 |
ZHAO Wei, ZHANG Wenyin, WANG Jiuru, WANG Haifeng, WU Chuankun |
|
|
Smart contract vulnerability detection scheme based on symbol execution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 947-953
[Abstract]
(1413)
[HTML 1 KB]
[PDF 775 KB]
(1502)
|
|
1030 |
ZHANG Kailin, YAN Qing, XIA Yi, ZHANG Jun, DING Yun |
|
|
Semi-supervised hyperspectral image classification based on focal loss |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1030-1037
[Abstract]
(681)
[HTML 1 KB]
[PDF 3567 KB]
(549)
|
|
1127 |
GUAN Hao, QIN Xiaolin, RAO Yongsheng, CAO Sheng |
|
|
Domain model of Web-based dynamic geometry software and its applications |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1127-1132
[Abstract]
(583)
[HTML 1 KB]
[PDF 1285 KB]
(600)
|
|
1237 |
SUN Peng, XIAO Jing, ZHAO Haimeng, LIU Fan, YAN Lei, ZHAO Hongying |
|
|
Design and implementation of SIFT algorithm for UAV remote sensing image based on DSP platform |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1237-1242
[Abstract]
(1076)
[HTML 1 KB]
[PDF 1347 KB]
(921)
|
|
571 |
Jiangfeng XU, Yulong TAN |
|
|
Optimization of multidimensional index query mechanism based on HBase |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 571-577
[Abstract]
(557)
[HTML 0 KB]
[PDF 1005 KB]
(362)
|
|
942 |
ZHAO Yulong, NIU Baoning, LI Peng, FAN Xing |
|
|
Blockchain enhanced lightweight node model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 942-946
[Abstract]
(841)
[HTML 1 KB]
[PDF 632 KB]
(840)
|
|
990 |
LIU Shangwang, LIU Chengwei, ZHANG Aili |
|
|
Real-time facial expression and gender recognition based on depthwise separable convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 990-995
[Abstract]
(1004)
[HTML 1 KB]
[PDF 1052 KB]
(844)
|
|
1091 |
XUE Feng, SHI Xuhua, SHI Feifan |
|
|
Surrogate-based differential evolution constrained optimization |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1091-1096
[Abstract]
(520)
[HTML 1 KB]
[PDF 641 KB]
(671)
|
|
1104 |
XU Zhiqiang, JIANG Tiegang, YANG Libo |
|
|
Stochastic support selection based generalized orthogonal matching pursuit algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1104-1108
[Abstract]
(362)
[HTML 1 KB]
[PDF 797 KB]
(386)
|
|
698 |
ZHU Zhe, XU Shaohua |
|
|
Denoising autoencoder deep convolution process neural network and its application in time-varying signal classification |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 698-703
[Abstract]
(611)
[HTML 1 KB]
[PDF 709 KB]
(511)
|
|
3233 |
TAN Yang, TANG Dequan, CAO Shoufu |
|
|
Many-objective particle swarm optimization algorithm based on hyper-spherical fuzzy dominance |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3233-3241
[Abstract]
(432)
[HTML 1 KB]
[PDF 1319 KB]
(385)
|
|
1109 |
SHEN Liang, WANG Xin, CHEN Shuhui |
|
|
Structural signature extraction method for mobile application recognition |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1109-1114
[Abstract]
(653)
[HTML 1 KB]
[PDF 1236 KB]
(498)
|
|
735 |
FENG Liping, HAN Qi, ZHOU Zhigang, BAI Zengliang |
|
|
Bad information diffusion modeling and optimal control strategy influenced by social networks |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 735-739
[Abstract]
(610)
[HTML 1 KB]
[PDF 585 KB]
(347)
|
|
996 |
XIAO Shihua, SANG Nan, WANG Xupeng |
|
|
3D point cloud head pose estimation based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 996-1001
[Abstract]
(1060)
[HTML 1 KB]
[PDF 794 KB]
(730)
|
|
1223 |
MAO Minli, LIANG Chengji, HU Xiaoyuan |
|
|
Optimization of quay crane assignment based on ship efficiency |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1223-1230
[Abstract]
(597)
[HTML 1 KB]
[PDF 1246 KB]
(871)
|
|
465 |
Dong MA, Hongmei CHEN, Lizhen WANG, Qing XIAO |
|
|
Dominant feature mining of spatial sub-prevalent co-location patterns |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 465-472
[Abstract]
(471)
[HTML 0 KB]
[PDF 1839 KB]
(342)
|
|
547 |
Fuxin LIU, Jingwei LI, Yihong WANG, Lin LI |
|
|
Design and implementation of cloud native massive data storage system based on Kubernetes |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 547-552
[Abstract]
(818)
[HTML 0 KB]
[PDF 560 KB]
(649)
|
|
1177 |
SONG Yun, ZHANG Yuanke, LU Hongbing, XING Yuxiang, MA Jianhua |
|
|
Regional-content-aware nuclear norm for low-does CT image denosing |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1177-1183
[Abstract]
(482)
[HTML 1 KB]
[PDF 5420 KB]
(351)
|
|
1196 |
WANG Yan, HE Hongke |
|
|
Improved fuzzy
c-means MRI segmentation based on neighborhood information |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1196-1201
[Abstract]
(497)
[HTML 1 KB]
[PDF 1675 KB]
(452)
|
|
1151 |
SHI Zhiliang, CAI Wangyue, WANG Guoqiang, XIONG Linjie |
|
|
Intrinsic shape signature algorithm based on adaptive neighborhood |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1151-1156
[Abstract]
(636)
[HTML 1 KB]
[PDF 5956 KB]
(422)
|
|
1171 |
GENG Yuanqian, WU Chuansheng, LIU Wen |
|
|
Mixed non-convex and non-smooth regularization constraint based blind image restoration |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1171-1176
[Abstract]
(529)
[HTML 1 KB]
[PDF 2187 KB]
(410)
|
|
1164 |
WANG Ruiyao, YUE Xueting, ZHOU Zhiqing, GENG Zexun |
|
|
Adaptive enhancement algorithm of low illumination image based on maximum difference image decision |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1164-1170
[Abstract]
(508)
[HTML 1 KB]
[PDF 1501 KB]
(540)
|
|
454 |
Jing QIN, Qingbo ZHANG, Bin WANG |
|
|
Recommendation method with focus on long tail items |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 454-458
[Abstract]
(972)
[HTML 0 KB]
[PDF 799 KB]
(578)
|
|
819 |
LIN Chuanjian, DENG Wei, TONG Tong, GAO Qinquan |
|
|
Blurred video frame interpolation method based on deep voxel flow |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 819-824
[Abstract]
(513)
[HTML 1 KB]
[PDF 1085 KB]
(528)
|
|
1069 |
WANG Liuyang, YU Yangxin, CHEN Bolun, ZHANG Hui |
|
|
Discrimination information method based on consensus and classification for improving document clustering |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1069-1073
[Abstract]
(594)
[HTML 1 KB]
[PDF 886 KB]
(522)
|
|
954 |
LI Jing, JING Xu, YANG Huijun |
|
|
Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 954-960
[Abstract]
(405)
[HTML 1 KB]
[PDF 743 KB]
(576)
|
|
441 |
Jingfeng GUO, Hui DONG, Tingwei ZHANG, Xiao CHEN |
|
|
Representation learning for topic-attention network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 441-447
[Abstract]
(337)
[HTML 0 KB]
[PDF 955 KB]
(323)
|
|
392 |
Zhiyang ZENG, Yan CHEN, Ke WANG |
|
|
Design and implementation of parallel genetic algorithm for cutting stock of circular parts |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 392-397
[Abstract]
(364)
[HTML 0 KB]
[PDF 658 KB]
(323)
|
|
621 |
XIE Binhong, ZHONG Rixin, PAN Lihu, ZHANG Yingjun |
|
|
Accelerated compression method for convolutional neural network combining with pruning and stream merging |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 621-625
[Abstract]
(565)
[HTML 1 KB]
[PDF 740 KB]
(934)
|
|
825 |
FENG Lang, ZHANG Ling, ZHANG Xiaolong |
|
|
Image inpainting based on dilated convolution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 825-831
[Abstract]
(522)
[HTML 1 KB]
[PDF 1069 KB]
(548)
|
|
426 |
Ming DU, Anping YANG, Junfeng ZHOU, Ziyang CHEN, Yun YANG |
|
|
Optimized algorithm for
k-step reachability queries on directed acyclic graphs |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 426-433
[Abstract]
(502)
[HTML 0 KB]
[PDF 654 KB]
(437)
|
|
416 |
Wenli WU, Guohua LIU, Junbao ZHANG |
|
|
Complexity analysis of functional query answering on big data |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 416-419
[Abstract]
(448)
[HTML 0 KB]
[PDF 436 KB]
(315)
|
|
503 |
Yusheng CHENG, Fan SONG, Yibin WANG, Kun QIAN |
|
|
Multi-label feature selection algorithm based on conditional mutual information of expert feature |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 503-509
[Abstract]
(522)
[HTML 0 KB]
[PDF 818 KB]
(365)
|
|
524 |
Chen CHEN, Shaowu ZHANG, Liang YANG, Dongyu ZHANG, Hongfei LIN |
|
|
Analysis of international influence of news media for major social security emergencies |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 524-529
[Abstract]
(616)
[HTML 0 KB]
[PDF 1388 KB]
(350)
|
|
491 |
Meishu ZHANG, Yabin XU |
|
|
Personalized privacy protection method for data with multiple numerical sensitive attributes |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 491-496
[Abstract]
(474)
[HTML 0 KB]
[PDF 588 KB]
(457)
|
|
535 |
Yue WANG, Mengxuan WANG, Sheng ZHANG, Wen DU |
|
|
Alarm text named entity recognition based on BERT |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 535-540
[Abstract]
(966)
[HTML 0 KB]
[PDF 642 KB]
(1012)
|
|
473 |
Yang LI, Wei ZHANG, Chen PENG |
|
|
Target-dependent method for authorship attribution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 473-478
[Abstract]
(498)
[HTML 0 KB]
[PDF 650 KB]
(484)
|
|
530 |
Kai DENG, Jiajin HUNAG, Jin QIN |
|
|
Item-based unified recommendation model |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 530-534
[Abstract]
(508)
[HTML 0 KB]
[PDF 565 KB]
(416)
|
|
1002 |
REN Haipei, LI Teng |
|
|
FaceYoLo algorithm for face detection on mobile platform |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1002-1008
[Abstract]
(1016)
[HTML 1 KB]
[PDF 1482 KB]
(686)
|
|
1133 |
QIU Yunfei, LIU Xing |
|
|
Local feature point matching algorithm with anti-affine property |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1133-1137
[Abstract]
(430)
[HTML 1 KB]
[PDF 635 KB]
(399)
|
|
925 |
ZHANG Zhancheng, ZHANG Dalong, LUO Xiaoqing |
|
|
Pulmonary nodule detection method with semantic feature score |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 925-930
[Abstract]
(542)
[HTML 1 KB]
[PDF 632 KB]
(402)
|
|
677 |
LI Quan, XU Xinhua, LIU Xinghong, CHEN Qi |
|
|
Next location recommendation based on spatiotemporal-aware GRU and attention |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 677-682
[Abstract]
(790)
[HTML 1 KB]
[PDF 669 KB]
(582)
|
|
704 |
GONG Rui, DING Sheng, ZHANG Chaohua, SU Hao |
|
|
Lightweight and multi-pose face recognition method based on deep learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 704-709
[Abstract]
(961)
[HTML 1 KB]
[PDF 852 KB]
(656)
|
|
717 |
LI Dongbo, HUANG Lyuwen |
|
|
Reweighted sparse principal component analysis algorithm and its application in face recognition |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 717-722
[Abstract]
(596)
[HTML 1 KB]
[PDF 868 KB]
(373)
|
|
854 |
LIU Ge, ZHENG Yelong, ZHAO Meirong |
|
|
Vehicle information detection based on improved RetinaNet |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 854-858
[Abstract]
(750)
[HTML 1 KB]
[PDF 745 KB]
(429)
|
|
897 |
CAI Yun, LIU Pengqing, XIONG Hegen |
|
|
Berth joint scheduling based on quantum genetic hybrid algorithm |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 897-901
[Abstract]
(403)
[HTML 1 KB]
[PDF 623 KB]
(258)
|
|
595 |
Xi CHEN, Guang MEI, Jinjin ZHANG, Weisheng XU |
|
|
Student grade prediction method based on knowledge graph and collaborative filtering |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 595-601
[Abstract]
(1021)
[HTML 0 KB]
[PDF 714 KB]
(764)
|
|
626 |
ZENG Yuanpeng, WANG Kaijun, LIN Song |
|
|
Interference entropy feature selection method for two-class distinguishing ability |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 626-630
[Abstract]
(474)
[HTML 1 KB]
[PDF 977 KB]
(473)
|
|
740 |
JIANG Zetao, XU Juanjuan |
|
|
Heterogenous cross-domain identity authentication scheme based on signcryption in cloud environment |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 740-746
[Abstract]
(498)
[HTML 1 KB]
[PDF 693 KB]
(506)
|
|
3673 |
GUO Yihui, HUANG Chenghui, ZHONG Xueling, LU Jiyuan |
|
|
Direction-perception feature recognition on mesh model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3673-3677
[Abstract]
(450)
[HTML 1 KB]
[PDF 840 KB]
(313)
|
|
3644 |
XU Dezhi, SUN Jifeng, LUO Shasha |
|
|
Vehicle-based image super-resolution reconstruction based on weight quantification and information compression |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3644-3649
[Abstract]
(361)
[HTML 1 KB]
[PDF 992 KB]
(307)
|
|
304 |
WANG Zhizhong, LI Hongyi, HAN Chuang |
|
|
QRS complex detection algorithm of electrocardiograph based on Shannon energy and adaptive threshold |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 304-310
[Abstract]
(560)
[HTML 1 KB]
[PDF 1024 KB]
(305)
|
|
3548 |
WANG Jianren, MA Xin, DUAN Ganglong, XUE Hongquan |
|
|
Handwritten numeral recognition under edge intelligence background |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3548-3555
[Abstract]
(543)
[HTML 1 KB]
[PDF 1271 KB]
(362)
|
|
3541 |
LUO Guoting, LIU Zhiqin, ZHOU Ying, WANG Qingfeng, CHENG Jiezhi, LIU Qiyu |
|
|
Pneumothorax detection and localization in X-ray images based on dense convolutional network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3541-3547
[Abstract]
(336)
[HTML 1 KB]
[PDF 1217 KB]
(369)
|
|
3703 |
WANG Xin, GAO Yuan, WANG Bin, SUN Jie, XIANG Jie |
|
|
Application of multimodal network fusion in classification of mild cognitive impairment |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3703-3708
[Abstract]
(668)
[HTML 1 KB]
[PDF 997 KB]
(483)
|
|
3685 |
JI Yi, SHI Xin, ZHAO Xiangmo |
|
|
Car-following model for intelligent connected vehicles based on multiple headway information fusion |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3685-3690
[Abstract]
(633)
[HTML 1 KB]
[PDF 907 KB]
(373)
|
|
3697 |
WANG Zhongjie, ZHANG Hong |
|
|
Shipping monitoring event recognition based on three-dimensional convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3697-3702
[Abstract]
(411)
[HTML 1 KB]
[PDF 982 KB]
(372)
|
|
3528 |
GAO Yuan, WU Fan, QIN Pinle, WANG Lifang |
|
|
Medical image fusion algorithm based on generative adversarial residual network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3528-3534
[Abstract]
(676)
[HTML 1 KB]
[PDF 1184 KB]
(467)
|
|
56 |
CHEN Meiyun, WANG Bisheng, CAO Guo, LIANG Yongbo |
|
|
Crowd counting method based on pixel-level attention mechanism |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 56-61
[Abstract]
(687)
[HTML 1 KB]
[PDF 1007 KB]
(582)
|
|
181 |
SUN Tianqi, HU Jianpeng, HUANG Juan, FAN Ying |
|
|
Bandwidth resource prediction and management of Web applications hosted on cloud |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 181-187
[Abstract]
(377)
[HTML 1 KB]
[PDF 1217 KB]
(577)
|
|
3268 |
LIU Weibo, ZENG Qingning, BU Yuting, ZHENG Zhanheng |
|
|
Speech recognition method based on dual micro-array and convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3268-3273
[Abstract]
(529)
[HTML 1 KB]
[PDF 938 KB]
(366)
|
|
3604 |
FENG Wenbo, HONG Zheng, WU Lifa, FU Menglin |
|
|
Review of network protocol recognition techniques |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3604-3614
[Abstract]
(795)
[HTML 1 KB]
[PDF 1987 KB]
(643)
|
|
3482 |
GUO Mingxiang, SONG Quanjun, XU Zhannan, DONG Jun, XIE Chengjun |
|
|
Human behavior recognition algorithm based on three-dimensional residual dense network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3482-3489
[Abstract]
(459)
[HTML 1 KB]
[PDF 1300 KB]
(247)
|
|
3535 |
QIN Pinle, LI Pengbo, ZHANG Ruiping, ZENG Jianchao, LIU Shijie, XU Shaowei |
|
|
Automatic recognition algorithm of cervical lymph nodes using adaptive receptive field mechanism |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3535-3540
[Abstract]
(477)
[HTML 1 KB]
[PDF 965 KB]
(404)
|
|
3490 |
WANG Xin, ZHANG Xin, NING Chen |
|
|
Infrared human target recognition method based on multi-feature dimensionality reduction and transfer learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3490-3495
[Abstract]
(357)
[HTML 1 KB]
[PDF 1009 KB]
(354)
|
|
375 |
Jie WANG, Rangding WANG, Diqun YAN, Yuzhen LIN |
|
|
Detection method for echo hiding based on convolutional neural network framework |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 375-380
[Abstract]
(440)
[HTML 0 KB]
[PDF 713 KB]
(499)
|
|
363 |
Yening ZHOU, Taoshen LI, Min ZENG, Nan XIAO |
|
|
Minimizing transmit power sum of full-duplex relay system with simultaneous wireless information and power transmission |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 363-368
[Abstract]
(594)
[HTML 0 KB]
[PDF 718 KB]
(331)
|
|
566 |
Xu TENG, Hui ZHANG, Chunming YANG, Xujian ZHAO, Bo LI |
|
|
Digital camouflage generation method based on cycle-consistent adversarial network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 566-570
[Abstract]
(668)
[HTML 0 KB]
[PDF 5080 KB]
(525)
|
|
561 |
Junhua GU, Feng WANG, Yongjun QI, Zheran SUN, Zepei TIAN, Yajuan ZHANG |
|
|
Retrieval method of pulmonary nodule images based on multi-scale convolution feature fusion |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 561-565
[Abstract]
(547)
[HTML 0 KB]
[PDF 644 KB]
(379)
|
|
2923 |
GAN Lan, GUO Zihan, WANG Yao |
|
|
Gastric tumor cell image recognition method based on radial transformation and improved AlexNet |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2923-2929
[Abstract]
(336)
[HTML 1 KB]
[PDF 1200 KB]
(323)
|
|
2883 |
WEI Xin, WU Shuhong, WANG Yaoli |
|
|
Forest fire smoke detection model based on deep convolution long short-term memory network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2883-2887
[Abstract]
(526)
[HTML 1 KB]
[PDF 774 KB]
(449)
|
|
2865 |
FU Jiupeng, ZENG Guohui, HUANG Bo, FANG Zhijun |
|
|
Narrow channel path planning based on bidirectional rapidly-exploring random tree |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2865-2869
[Abstract]
(523)
[HTML 1 KB]
[PDF 813 KB]
(308)
|
|
2847 |
XI Zhihong, HAN Shuangquan, WANG Hongxu |
|
|
Simultaneous localization and semantic mapping of indoor dynamic scene based on semantic segmentation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2847-2851
[Abstract]
(430)
[HTML 1 KB]
[PDF 735 KB]
(391)
|
|
116 |
CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia |
|
|
Design and implementation of intrusion detection model for software defined network architecture |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 116-122
[Abstract]
(451)
[HTML 1 KB]
[PDF 1026 KB]
(594)
|
|
71 |
DENG Qi, LEI Yinjie, TIAN Feng |
|
|
Optimized convolutional neural network method for classification of pneumonia images |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 71-76
[Abstract]
(705)
[HTML 1 KB]
[PDF 889 KB]
(854)
|
|
90 |
HUANG Yongxin, TANG Xuefei |
|
|
Discovery of functional dependencies in university data based on affinity propagation clustering and TANE algorithms |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 90-95
[Abstract]
(576)
[HTML 1 KB]
[PDF 1057 KB]
(540)
|
|
1 |
YANG Jian, LI Zhenpeng, SU Peng |
|
|
Review of speech segmentation and endpoint detection |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 1-7
[Abstract]
(821)
[HTML 1 KB]
[PDF 1105 KB]
(1083)
|
|
36 |
ZHAO Guanghua, LAI Jianhui, CHEN Yanyan, SUN Haodong, ZHANG Ye |
|
|
Residents' travel origin and destination identification method based on naive Bayes classification |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 36-42
[Abstract]
(492)
[HTML 1 KB]
[PDF 1036 KB]
(483)
|
|
16 |
ZHAO Hong, WANG Le, WANG Weijie |
|
|
Text sentiment analysis based on serial hybrid model of bi-directional long short-term memory and convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 16-22
[Abstract]
(754)
[HTML 1 KB]
[PDF 1101 KB]
(755)
|
|
3615 |
FENG Wenbo, HONG Zheng, WU Lifa, LI Yihao, LIN Peihong |
|
|
Application protocol recognition method based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3615-3621
[Abstract]
(446)
[HTML 1 KB]
[PDF 1254 KB]
(503)
|
|
258 |
ZHANG Wu, CHEN Hongmei |
|
|
Hyperspectral band selection algorithm based on kernelized fuzzy rough set |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 258-263
[Abstract]
(404)
[HTML 1 KB]
[PDF 959 KB]
(271)
|
|
783 |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke |
|
|
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 783-787
[Abstract]
(525)
[HTML 1 KB]
[PDF 785 KB]
(418)
|
|
651 |
ZHAO Ya'ou, ZHANG Jiachong, LI Yibin, FU Xianrui, SHENG Wei |
|
|
Sentiment analysis using embedding from language model and multi-scale convolutional neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 651-657
[Abstract]
(546)
[HTML 1 KB]
[PDF 866 KB]
(618)
|
|
1157 |
WEI Wenle, JIN Guodong, TAN Lining, LU Libin, CHEN Danqi |
|
|
Real-time SLAM algorithm with keyframes determined by inertial measurement unit |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 1157-1163
[Abstract]
(610)
[HTML 1 KB]
[PDF 3649 KB]
(410)
|
|
978 |
WU Yuxin, CAI Ting, ZHANG Dabin |
|
|
Automatic smart contract classification model based on hierarchical attention mechanism and bidirectional long short-term memory neural network |
|
|
|
Journal of Computer Applications
2020 Vol.40 (4): 978-984
[Abstract]
(687)
[HTML 1 KB]
[PDF 1079 KB]
(1020)
|
|
358 |
Junying HAN, Zhenyu ZHANG, Deshi KONG |
|
|
Distributed multi-task allocation method for user area in mobile crowd sensing |
|
|
|
Journal of Computer Applications
2020 Vol.40 (2): 358-362
[Abstract]
(482)
[HTML 0 KB]
[PDF 575 KB]
(579)
|
|
43 |
WANG Jianhua, PAN Yujie, SUN Rui |
|
|
Flexible job-shop green scheduling algorithm considering machine tool depreciation |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 43-49
[Abstract]
(407)
[HTML 1 KB]
[PDF 997 KB]
(388)
|
|
233 |
LIU Ying, WANG Fengwei, LIU Weihua, AI Da, LI Yun, YANG Fanchao |
|
|
High dynamic range imaging algorithm based on luminance partition fuzzy fusion |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 233-238
[Abstract]
(503)
[HTML 1 KB]
[PDF 1027 KB]
(365)
|
|
3633 |
LIU Chengbin, ZHENG Wei, FAN Xin, YANG Fengyu |
|
|
Hybrid defect prediction model based on network representation learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3633-3638
[Abstract]
(383)
[HTML 1 KB]
[PDF 946 KB]
(316)
|
|
207 |
YUAN Zhixin, ZHOU Yanling |
|
|
Unambiguous tracking method based on combined correlation function for CosBOC (10, 5) signal |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 207-211
[Abstract]
(396)
[HTML 1 KB]
[PDF 749 KB]
(292)
|
|
202 |
ZHOU Zhen, YUAN Zhengdao |
|
|
Efficient communication receiver design for Internet of things environment |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 202-206
[Abstract]
(462)
[HTML 1 KB]
[PDF 819 KB]
(331)
|
|
212 |
WANG Shuyan, ZHENG Jiani, SUN Jiaze |
|
|
Test case generation method for Web applications based on page object |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 212-217
[Abstract]
(534)
[HTML 1 KB]
[PDF 870 KB]
(435)
|
|
148 |
ZHANG En, HOU Yingying, LI Gongli, LI Huimin, LI Yu |
|
|
Adaptive hierarchical searchable encryption scheme based on learning with errors |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 148-156
[Abstract]
(507)
[HTML 1 KB]
[PDF 1430 KB]
(463)
|
|
891 |
ZHOU Leilei, LIANG Chengji, HU Xiaoyuan |
|
|
Delivery truck strategy under uncertain interference constraints |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 891-896
[Abstract]
(628)
[HTML 1 KB]
[PDF 1027 KB]
(470)
|
|
658 |
YU Dunhui, YUAN Xu, ZHANG Wanshan, WANG Chenxu |
|
|
Spatiotemporal crowdsourcing online task allocation algorithm based ondynamic threshold |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 658-664
[Abstract]
(356)
[HTML 1 KB]
[PDF 974 KB]
(798)
|
|
103 |
WU Zhenhua, ZHANG Chao, SUN He, YAN Xuexiong |
|
|
Survey on application of binary reverse analysis in detecting software supply chain pollution |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 103-115
[Abstract]
(755)
[HTML 1 KB]
[PDF 2085 KB]
(743)
|
|
865 |
WANG Yunfei, WANG Yuanyu |
|
|
MP-CGAN: night single image dehazing algorithm based on Msmall-Patch training |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 865-871
[Abstract]
(583)
[HTML 1 KB]
[PDF 2098 KB]
(492)
|
|
710 |
XU Ruobo, LU Tao, WANG Yu, ZHANG Yanduo |
|
|
Face hallucination algorithm via combined learning |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 710-716
[Abstract]
(507)
[HTML 1 KB]
[PDF 1595 KB]
(490)
|
|
2893 |
ZHANG Fangyan, WANG Xin, XU Xinzheng |
|
|
Partial occlusion face recognition based on structured occlusion coding and extreme learning machine |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2893-2898
[Abstract]
(416)
[HTML 1 KB]
[PDF 865 KB]
(344)
|
|
3140 |
ZHENG Wenbin, LI Jinjin, YU Peiqiu, LIN Yidong |
|
|
Matrix-based algorithm for updating approximations in variable precision multi-granulation rough sets |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3140-3145
[Abstract]
(539)
[HTML 1 KB]
[PDF 801 KB]
(191)
|
|
3146 |
ZHANG Yu, YU Dongjun |
|
|
Protein-ATP binding site prediction based on 1D-convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3146-3150
[Abstract]
(434)
[HTML 1 KB]
[PDF 775 KB]
(363)
|
|
3210 |
ZHU Fan, WANG Hongyuan, ZHANG Ji |
|
|
Fine-grained pedestrian detection algorithm based on improved Mask R-CNN |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3210-3215
[Abstract]
(565)
[HTML 1 KB]
[PDF 935 KB]
(464)
|
|
3216 |
LIU Baocheng, PIAO Yan, TANG Yue |
|
|
Person re-identification in video sequence based on spatial-temporal regularization |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3216-3220
[Abstract]
(449)
[HTML 1 KB]
[PDF 808 KB]
(380)
|
|
788 |
JIN Yong, LUO Ming, DONG Mingyang |
|
|
User grouping and power allocation strategy based on NOMA system |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 788-792
[Abstract]
(803)
[HTML 1 KB]
[PDF 574 KB]
(489)
|
|
631 |
CHEN Meijie, XIE Zhenping, CHEN Xiaoqi, XU Peng |
|
|
Novel bidirectional aggregation degree feature extraction method forpatent new word discovery |
|
|
|
Journal of Computer Applications
2020 Vol.40 (3): 631-637
[Abstract]
(465)
[HTML 1 KB]
[PDF 772 KB]
(499)
|
|
227 |
MA Weiping, LI Wenxin, SUN Jinchuan, CAO Pengxia |
|
|
Binocular vision target positioning method based on coarse-fine stereo matching |
|
|
|
Journal of Computer Applications
2020 Vol.40 (1): 227-232
[Abstract]
(451)
[HTML 1 KB]
[PDF 996 KB]
(401)
|
|
3440 |
DENG Yang, XIE Ning, YANG Yang |
|
|
Siamese detection network based real-time video tracking algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3440-3444
[Abstract]
(570)
[HTML 1 KB]
[PDF 787 KB]
(470)
|
|
3450 |
XU Shanshan, YAN Chao, GAO Linming |
|
|
Lake extraction algorithm based on three-dimensional convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3450-3455
[Abstract]
(575)
[HTML 1 KB]
[PDF 920 KB]
(434)
|
|
3445 |
LU Jingang, ZHANG Li |
|
|
Crowd counting model based on multi-scale multi-column convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3445-3449
[Abstract]
(573)
[HTML 1 KB]
[PDF 773 KB]
(431)
|
|
3420 |
YANG Donghai, LIN Minmin, ZHANG Wenjie, YANG Jingmin |
|
|
Image classification learning via unsupervised mixed-order stacked sparse autoencoder |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3420-3425
[Abstract]
(654)
[HTML 1 KB]
[PDF 1005 KB]
(447)
|
|
3415 |
CHEN Kejia, YANG Zeyu, LIU Zheng, LU Hao |
|
|
Graph convolutional network model using neighborhood selection strategy |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3415-3419
[Abstract]
(779)
[HTML 1 KB]
[PDF 759 KB]
(830)
|
|
3575 |
ZHOU Jian, JIN Yu, HE Heng, LI Peng |
|
|
Dynamic cloud data audit model based on nest Merkle Hash tree block chain |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3575-3583
[Abstract]
(684)
[HTML 1 KB]
[PDF 1372 KB]
(375)
|
|
3298 |
WANG Peng, WU Kang, YAN Fang, WANG Kenian, ZHANG Xiaochen |
|
|
Security verification method of safety critical software based on system theoretic process analysis |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3298-3303
[Abstract]
(524)
[HTML 1 KB]
[PDF 969 KB]
(281)
|
|
3665 |
ZHANG Wenbin, ZHU Min, ZHANG Ning, DONG Le |
|
|
Plant image segmentation method under bias light based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (12): 3665-3672
[Abstract]
(511)
[HTML 1 KB]
[PDF 1365 KB]
(466)
|
|
3328 |
SUN Min, YE Qiaonan, CHEN Zhongxiong |
|
|
Task scheduling of variance-directional variation genetic algorithm in cloud environment |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3328-3332
[Abstract]
(444)
[HTML 1 KB]
[PDF 814 KB]
(253)
|
|
3257 |
LIU Xiaoming, SHEN Mingyu, HOU Zhengfeng |
|
|
Firefly fuzzy clustering algorithm based on Levy flight |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3257-3262
[Abstract]
(545)
[HTML 1 KB]
[PDF 858 KB]
(408)
|
|
3349 |
JI Xiaofei, QIN Linlin, WANG Yangyang |
|
|
Human interaction recognition based on RGB and skeleton data fusion model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3349-3354
[Abstract]
(535)
[HTML 1 KB]
[PDF 993 KB]
(413)
|
|
3293 |
SUN Shilei, WANG Chao, ZHAO Yuandi |
|
|
Parameter independent clustering of air traffic trajectory based on silhouette coefficient |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3293-3297
[Abstract]
(471)
[HTML 1 KB]
[PDF 818 KB]
(209)
|
|
3274 |
WANG Ping, GAO Chen, ZHU Li, ZHAO Jun, ZHANG Jing, KONG Weiming |
|
|
Segmentation algorithm of ischemic stroke lesion based on 3D deep residual network and cascade U-Net |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3274-3279
[Abstract]
(685)
[HTML 1 KB]
[PDF 959 KB]
(460)
|
|
3250 |
CHEN Linfeng, QI Xuemei, CHEN Junwen, HUANG Cheng, CHEN Fulong |
|
|
Quantum-inspired migrating birds co-optimization algorithm for lot-streaming flow shop scheduling problem |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3250-3256
[Abstract]
(615)
[HTML 1 KB]
[PDF 949 KB]
(321)
|
|
3343 |
MIAO Sheng, DONG Liang, DONG Jian'e, ZHONG Lihui |
|
|
Multi-objective automatic identification and localization system in mobile cellular networks |
|
|
|
Journal of Computer Applications
2019 Vol.39 (11): 3343-3348
[Abstract]
(540)
[HTML 1 KB]
[PDF 905 KB]
(330)
|
|
2870 |
BAI Liyun, HU Xuemin, SONG Sheng, TONG Xiuchi, ZHANG Ruohan |
|
|
Motion planning model based on deep cascaded neural network for autonomous driving |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2870-2875
[Abstract]
(553)
[HTML 1 KB]
[PDF 992 KB]
(401)
|
|
2930 |
QIU Jinyi, LUO Jun, LI Xiu, JIA Wei, NI Fuchuan, FENG Hui |
|
|
Multi-scale grape image recognition method based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2930-2936
[Abstract]
(550)
[HTML 1 KB]
[PDF 1038 KB]
(445)
|
|
3046 |
LI Hong, WANG Ruiyao, GENG Zexun, HU Haifeng |
|
|
Low-illumination image enhancement algorithm based on multi-scale gradient domain guided filtering |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3046-3052
[Abstract]
(421)
[HTML 1 KB]
[PDF 1112 KB]
(409)
|
|
3018 |
QIN Biao, GUO Fan, TU Fengtao |
|
|
Correctness verification of static taint analysis results for Android application |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3018-3027
[Abstract]
(506)
[HTML 1 KB]
[PDF 1509 KB]
(303)
|
|
3002 |
DONG Haiyan, YU Feng, CHENG Ke, HUANG Shucheng |
|
|
Credibility analysis method of online user behavior based on non-interference theory |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3002-3006
[Abstract]
(391)
[HTML 1 KB]
[PDF 863 KB]
(309)
|
|
2937 |
WANG Kang, DONG Yuanfei |
|
|
Angular interval embedding based end-to-end voiceprint recognition model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2937-2941
[Abstract]
(413)
[HTML 1 KB]
[PDF 827 KB]
(338)
|
|
2381 |
WANG Shouhua, LI Yunke, SUN Xiyan, JI Yuanfa |
|
|
Dual-antenna attitude determination algorithm based on low-cost receiver |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2381-2385
[Abstract]
(498)
[HTML 1 KB]
[PDF 723 KB]
(338)
|
|
2276 |
CHEN Shanxue, CHU Chengquan |
|
|
Hyperspectral unmixing based on sparse and orthogonal constrained non-negative matrix factorization |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2276-2280
[Abstract]
(683)
[HTML 1 KB]
[PDF 773 KB]
(358)
|
|
2252 |
LIU Guoqing, WANG Jieting, HU Zhiguo, QIAN Yuhua |
|
|
Best action identification of tree structure based on ternary multi-arm bandit |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2252-2260
[Abstract]
(405)
[HTML 1 KB]
[PDF 1397 KB]
(296)
|
|
2223 |
DENG Xuan, LIAO Kaiyang, ZHENG Yuanlin, YUAN Hui, LEI Hao, CHEN Bing |
|
|
Person re-identification based on deep multi-view feature distance learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2223-2229
[Abstract]
(746)
[HTML 1 KB]
[PDF 1190 KB]
(364)
|
|
2134 |
CHEN Li, CHEN Xiaoyun |
|
|
Detection method of hard exudates in fundus images by combining local entropy and robust principal components analysis |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2134-2140
[Abstract]
(357)
[HTML 1 KB]
[PDF 1062 KB]
(281)
|
|
2121 |
ZHU Kai, FU Zhongliang, CHEN Xiaoqing |
|
|
Left ventricular segmentation method of ultrasound image based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2121-2124
[Abstract]
(594)
[HTML 1 KB]
[PDF 690 KB]
(374)
|
|
2103 |
LI Wenjun, CHEN Bin, LI Jianming, QIAN Jide |
|
|
Surface scratch recognition method based on deep neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2103-2108
[Abstract]
(615)
[HTML 1 KB]
[PDF 997 KB]
(438)
|
|
2087 |
WAGN Keqiang, ZHANG Yushuai, WANG Baoqun |
|
|
Multi-exposure image fusion algorithm based on Retinex theory |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2087-2092
[Abstract]
(628)
[HTML 1 KB]
[PDF 994 KB]
(383)
|
|
1948 |
WU Hao, WANG Xincan, LI Xinyun, LIU Zhifen, CHEN Junjie, GUO Hao |
|
|
Brain function network feature selection and classification based on multi-level template |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1948-1953
[Abstract]
(389)
[HTML 1 KB]
[PDF 1024 KB]
(335)
|
|
1931 |
MENG Shilin, ZHAO Yunlong, GUAN Donghai, ZHAI Xiangping |
|
|
Sentiment analysis method combining sentiment and semantic information |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1931-1935
[Abstract]
(625)
[HTML 1 KB]
[PDF 825 KB]
(423)
|
|
1899 |
HU Liang, XIAO Renbin, LI Hao |
|
|
Bee colony double inhibition labor division algorithm and its application in traffic signal timing |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1899-1904
[Abstract]
(493)
[HTML 1 KB]
[PDF 1080 KB]
(337)
|
|
3065 |
GE Wanying, ZHANG Tianqi |
|
|
Monaural speech enhancement algorithm based on mask estimation and optimization |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3065-3070
[Abstract]
(438)
[HTML 1 KB]
[PDF 892 KB]
(325)
|
|
2795 |
LI Xinbin, ZHANG Shoutao, YAN Lei, HAN Song |
|
|
Multiple autonomous underwater vehicle task allocation policy based on robust Restless Bandit model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2795-2801
[Abstract]
(417)
[HTML 1 KB]
[PDF 1025 KB]
(452)
|
|
2905 |
XU Yue, FENG Mengru, PI Jiatian, CHEN Yong |
|
|
Remote sensing image segmentation method based on deep learning model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2905-2914
[Abstract]
(922)
[HTML 1 KB]
[PDF 1531 KB]
(644)
|
|
2802 |
GAO Qinquan, ZHAO Yan, LI Gen, TONG Tong |
|
|
Compression method of super-resolution convolutional neural network based on knowledge distillation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2802-2808
[Abstract]
(786)
[HTML 1 KB]
[PDF 1103 KB]
(829)
|
|
2636 |
MA Minyao, XU Yi, LIU Zhuo |
|
|
Privacy preserving Hamming distance computing problem of DNA sequences |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2636-2640
[Abstract]
(623)
[HTML 1 KB]
[PDF 816 KB]
(385)
|
|
2669 |
SHAO Hao, WANG Lunwen, DENG Jian |
|
|
Important node identification method for dynamic networks based on H operation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2669-2674
[Abstract]
(790)
[HTML 1 KB]
[PDF 850 KB]
(446)
|
|
1863 |
CHEN Tian, ZUO Yongsheng, AN Xin, REN Fuji |
|
|
Test data compatible compression method based on tri-state signal |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1863-1868
[Abstract]
(461)
[HTML 1 KB]
[PDF 942 KB]
(299)
|
|
1824 |
WANG Xilong, WANG Jicheng, LUO Cheng, TIAN Xiuxia |
|
|
Evolutionary game model under synergistic effect of time scale and selection preference |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1824-1828
[Abstract]
(485)
[HTML 1 KB]
[PDF 800 KB]
(317)
|
|
1780 |
DING Ning, GUAN Xinrong, YANG Weiwei |
|
|
Quantitative analysis of physical secret key in OFDM channel based on universal software radio peripheral |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1780-1785
[Abstract]
(463)
[HTML 1 KB]
[PDF 990 KB]
(264)
|
|
1753 |
AN Xin, ZHANG Ying, KANG An, CHEN Tian, LI Jianhua |
|
|
Machine learning based online mapping approach for heterogeneous multi-core processor system |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1753-1759
[Abstract]
(436)
[HTML 1 KB]
[PDF 1164 KB]
(334)
|
|
1747 |
KONG Jing, GUO Yuanbo, LIU Chunhui, WANG Yifeng |
|
|
Gait feature identification method based on motion sensor in smartphone |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1747-1752
[Abstract]
(597)
[HTML 1 KB]
[PDF 1043 KB]
(381)
|
|
1735 |
XU Bingfeng, ZHONG Zhicheng, HE Gaofeng |
|
|
Risk analysis of cyber-physical system based on dynamic fault trees |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1735-1741
[Abstract]
(452)
[HTML 1 KB]
[PDF 1050 KB]
(355)
|
|
1713 |
ZENG Jianping, CHEN Qile, WU Chengrong, FANG Xi |
|
|
Analysis method of passwords under Chinese context |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1713-1718
[Abstract]
(497)
[HTML 1 KB]
[PDF 1028 KB]
(230)
|
|
1690 |
LIU Yuzhen, JIANG Zhengquan, ZHAO Na |
|
|
Three dimensional palmprint recognition based on neighbor ternary pattern and collaborative representation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1690-1695
[Abstract]
(389)
[HTML 1 KB]
[PDF 887 KB]
(347)
|
|
1685 |
SANG Gaoli, YAN Chao, ZHU Rong |
|
|
Expression-insensitive three-dimensional face recognition algorithm based on multi-region fusion |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1685-1689
[Abstract]
(460)
[HTML 1 KB]
[PDF 841 KB]
(196)
|
|
1675 |
ZHENG Yi, QI Donglian, WANG Zhenyu |
|
|
YOLO network character recognition method with variable candidate box density for international phonetic alphabet |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1675-1679
[Abstract]
(425)
[HTML 1 KB]
[PDF 730 KB]
(346)
|
|
1669 |
SHENG Heng, HUANG Ming, YANG Jingjing |
|
|
Laboratory personnel statistics and management system based on Faster R-CNN and IoU optimization |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1669-1674
[Abstract]
(455)
[HTML 1 KB]
[PDF 912 KB]
(370)
|
|
1657 |
ZHANG Dezheng, WENG Liguo, XIA Min, CAO Hui |
|
|
Video frame prediction based on deep convolutional long short-term memory neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1657-1662
[Abstract]
(509)
[HTML 1 KB]
[PDF 1005 KB]
(373)
|
|
1652 |
YANG Kang, SONG Huihui, ZHANG Kaihua |
|
|
Real-time visual tracking based on dual attention siamese network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1652-1656
[Abstract]
(614)
[HTML 1 KB]
[PDF 800 KB]
(496)
|
|
1646 |
WEN Chang, LIU Yu, GU Jinguang |
|
|
Evolution relationship extraction of emergency based on attention-based bidirectional long short-term memory network model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1646-1651
[Abstract]
(441)
[HTML 1 KB]
[PDF 973 KB]
(448)
|
|
1639 |
CHEN Zhihao, YU Xiang, LIU Zichen, QIU Dawei, GU Bengang |
|
|
Chinese medical question answer matching method based on attention mechanism and character embedding |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1639-1645
[Abstract]
(490)
[HTML 1 KB]
[PDF 1101 KB]
(440)
|
|
1632 |
WANG Wentao, WU Lintao, HUANG Ye, ZHU Rongbo |
|
|
Link prediction model based on densely connected convolutional network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (6): 1632-1638
[Abstract]
(524)
[HTML 1 KB]
[PDF 1061 KB]
(424)
|
|
2992 |
CHEN Menghui, LIU Junlin, XU Jianfeng, LI Xiangjun |
|
|
Imperialist competitive algorithm based on multiple search strategy for solving traveling salesman problem |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2992-2996
[Abstract]
(367)
[HTML 1 KB]
[PDF 802 KB]
(312)
|
|
3053 |
YANG Chunde, CHENG Yanfei |
|
|
Fast image mosaic algorithm based on adaptive elimination of stitching seam and panorama alignment |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3053-3059
[Abstract]
(660)
[HTML 1 KB]
[PDF 1150 KB]
(466)
|
|
2568 |
LI Minze, LI Xiaoxia, WANG Xueyuan, SUN Wei |
|
|
Real-time facial expression recognition based on convolutional neural network with multi-scale kernel feature |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2568-2574
[Abstract]
(848)
[HTML 1 KB]
[PDF 1097 KB]
(571)
|
|
2784 |
LI Bo, ZHANG Xiao, YAN Jingyi, LI Kewei, LI Heng, LING Yulong, ZHANG Yong |
|
|
Application of
KNN algorithm based on value difference metric and clustering optimization in bank customer behavior prediction |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2784-2788
[Abstract]
(535)
[HTML 1 KB]
[PDF 806 KB]
(545)
|
|
2652 |
WANG Dan, LI Anyi, YANG Yanjuan |
|
|
Low complexity narrowband physical downlink control channel blind detection algorithm based on correlation detection |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2652-2657
[Abstract]
(677)
[HTML 1 KB]
[PDF 1016 KB]
(357)
|
|
2738 |
CHEN Longbiao, CHEN Yuzhang, WANG Xiaochen, ZOU Peng, HU Xuemin |
|
|
Underwater image super-resolution reconstruction method based on deep learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2738-2743
[Abstract]
(675)
[HTML 1 KB]
[PDF 893 KB]
(558)
|
|
2955 |
LI Jianxun, MA Meiling, GUO Jianhua, YAN Jun |
|
|
False trend time series detection based on randomness analysis |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2955-2959
[Abstract]
(355)
[HTML 1 KB]
[PDF 805 KB]
(336)
|
|
2841 |
WANG Liya, LIU Changhui, CAI Dunbo, LU Tao |
|
|
Chinese text sentiment analysis based on CNN-BiGRU network with attention mechanism |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2841-2846
[Abstract]
(1907)
[HTML 1 KB]
[PDF 909 KB]
(548)
|
|
2580 |
ZHAO Ruixiang, HOU Honghua, ZHANG Pengcheng, LIU Yi, TIAN Zhu, GUI Zhiguo |
|
|
Welding ball edge bubble segmentation for ball grid array based on full convolutional network and
K-means clustering |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2580-2585
[Abstract]
(460)
[HTML 1 KB]
[PDF 1006 KB]
(442)
|
|
2712 |
LIAO Bin, TAN Daoqiang, WU Wen |
|
|
Single image shadow removal based on attenuated generative adversarial networks |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2712-2718
[Abstract]
(463)
[HTML 1 KB]
[PDF 1327 KB]
(338)
|
|
3034 |
CAI Xingquan, SUN Chen, GE Yakun |
|
|
Mesh parameterization method based on limiting distortion |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 3034-3039
[Abstract]
(312)
[HTML 1 KB]
[PDF 991 KB]
(284)
|
|
2915 |
QIN Pinle, LI Pengbo, ZENG Jianchao, ZHU Hui, XU Shaowei |
|
|
Automatic recognition algorithm for cervical lymph nodes using cascaded fully convolutional neural networks |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2915-2922
[Abstract]
(358)
[HTML 1 KB]
[PDF 1267 KB]
(374)
|
|
2695 |
CAO Yunyang, WANG Tao |
|
|
Semi-supervised image segmentation based on prior Laplacian coordinates |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2695-2700
[Abstract]
(402)
[HTML 1 KB]
[PDF 1037 KB]
(397)
|
|
2541 |
LIU Ying, LIANG Nannan, LI Daxiang, YANG Fanchao |
|
|
Hyperspectral image unmixing algorithm based on spectral distance clustering |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2541-2546
[Abstract]
(849)
[HTML 1 KB]
[PDF 997 KB]
(413)
|
|
2689 |
YAO Luji, ZHANG Li |
|
|
Design and implementation of Chinese architecture history teaching system based on mixed reality technology |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2689-2694
[Abstract]
(406)
[HTML 1 KB]
[PDF 1150 KB]
(510)
|
|
2505 |
SONG Xiaona, RUI Ting, WANG Xinqing |
|
|
Semantic segmentation method of road environment combined semantic boundary information |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2505-2510
[Abstract]
(569)
[HTML 1 KB]
[PDF 1018 KB]
(763)
|
|
2726 |
ZHANG Zheng, HE Shan, HE Jingqi |
|
|
Video colorization method based on hybrid neural network model of long short term memory and convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2726-2730
[Abstract]
(583)
[HTML 1 KB]
[PDF 985 KB]
(392)
|
|
2765 |
LI Zhuo, LI Yinzhen, LI Wenxia |
|
|
Multi-objective optimization model and solution algorithm for emergency material transportation path |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2765-2771
[Abstract]
(1133)
[HTML 1 KB]
[PDF 983 KB]
(518)
|
|
2658 |
LI Fangwei, ZHOU Jiawei, ZHANG Haibo |
|
|
Secure optimized transmission scheme of artificial noise assisted time inversion in D2D cross-cell communication |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2658-2663
[Abstract]
(523)
[HTML 1 KB]
[PDF 857 KB]
(357)
|
|
2604 |
YANG Hongyu, WANG Fengyan |
|
|
Network intrusion detection model based on improved convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2604-2610
[Abstract]
(666)
[HTML 1 KB]
[PDF 1032 KB]
(508)
|
|
2552 |
JIA Ruiming, QIU Zhenzhi, CUI Jiali, WANG Yiding |
|
|
Deep multi-scale encoder-decoder convolutional network for blind deblurring |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2552-2557
[Abstract]
(766)
[HTML 1 KB]
[PDF 1078 KB]
(544)
|
|
1512 |
ZHANG Yansheng, LI Xiwang, LI Dan, YANG Hua |
|
|
Abnormal flow monitoring of industrial control network based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1512-1517
[Abstract]
(874)
[HTML 1 KB]
[PDF 956 KB]
(612)
|
|
1495 |
SHU Lingzhou, WU Jia, WANG Chen |
|
|
Urban traffic signal control based on deep reinforcement learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1495-1499
[Abstract]
(1277)
[HTML 1 KB]
[PDF 850 KB]
(850)
|
|
1485 |
LI Xian, WANG Yan, LUO Yong, ZHOU Jiliu |
|
|
Segmentation of nasopharyngeal neoplasms based on random forest feature selection algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1485-1489
[Abstract]
(434)
[HTML 1 KB]
[PDF 796 KB]
(439)
|
|
1440 |
LIU Yuefeng, YANG Hanxi, CAI Shuang, ZHANG Chenrong |
|
|
Single image super-resolution reconstruction method based on improved convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1440-1447
[Abstract]
(585)
[HTML 1 KB]
[PDF 1411 KB]
(388)
|
|
1421 |
YANG Yanan, XIA Bin, ZHAO Lei, YUAN Wenhao |
|
|
Ultra-wideband channel environment classification algorithm based on CNN |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1421-1424
[Abstract]
(412)
[HTML 1 KB]
[PDF 561 KB]
(336)
|
|
1405 |
ZHOU Fei, XIA Pengcheng |
|
|
Signal strength difference fingerprint localization algorithm based on principal component analysis and chi-square distance |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1405-1410
[Abstract]
(429)
[HTML 1 KB]
[PDF 958 KB]
(331)
|
|
1394 |
ZHANG Shuxuan, KANG Haiyan, YAN Han |
|
|
Privacy preserving for social network relational data based on Skyline computing |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1394-1399
[Abstract]
(504)
[HTML 1 KB]
[PDF 902 KB]
(360)
|
|
1389 |
ZHANG Hanfang, ZHOU Anmin, JIA Peng, LIU Luping, LIU Liang |
|
|
Directed fuzzing method for binary programs |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1389-1393
[Abstract]
(710)
[HTML 1 KB]
[PDF 899 KB]
(538)
|
|
1378 |
HAN Si, ZHENG Baokun, CAO Qimin |
|
|
Logical key hierarchy plus based key management program for wireless sensor network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1378-1384
[Abstract]
(481)
[HTML 1 KB]
[PDF 1118 KB]
(309)
|
|
1357 |
ZHANG Xingsheng, YU Dunhui, ZHANG Wanshan, WANG Chenxu |
|
|
Time utility balanced online task assignment algorithm under spatial crowdsourcing environment |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1357-1363
[Abstract]
(1489)
[HTML 1 KB]
[PDF 1051 KB]
(488)
|
|
1330 |
FAN Jili, HE Pu, LI Xiaohua, NIE Tiezheng, YU Ge |
|
|
Blockchain based decentralized item sharing and transaction service system |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1330-1335
[Abstract]
(944)
[HTML 1 KB]
[PDF 933 KB]
(490)
|
|
1312 |
WANG Kun, ZENG Guohui, LU Dunke, HUANG Bo, LI Xiaobin |
|
|
Path planning of mobile robot based on improved asymptotically-optimal bidirectional rapidly-exploring random tree algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1312-1317
[Abstract]
(642)
[HTML 1 KB]
[PDF 910 KB]
(450)
|
|
1299 |
TANG Chen, LI Yonghua, RAO Mengni, HU Gangjun |
|
|
Semantic judgement method of polysemous keywords in dynamic requirement traceability |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1299-1304
[Abstract]
(551)
[HTML 1 KB]
[PDF 892 KB]
(412)
|
|
1288 |
YAN Hong, CHEN Xingshu, WANG Wenxian, WANG Haizhou, YIN Mingyong |
|
|
Recognition model for French named entities based on deep neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1288-1292
[Abstract]
(516)
[HTML 1 KB]
[PDF 796 KB]
(638)
|
|
1261 |
SHAO Changcheng, CHEN Pinghua |
|
|
Point-of-interest recommendation integrating social networks and image contents |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1261-1268
[Abstract]
(716)
[HTML 1 KB]
[PDF 1145 KB]
(585)
|
|
1247 |
XU Yi, XIAO Peng |
|
|
Dynamic updating method of approximations in multigranulation rough sets based on tolerance relation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (5): 1247-1251
[Abstract]
(542)
[HTML 1 KB]
[PDF 717 KB]
(600)
|
|
2997 |
HUANG Bin, BAO Liyong, DING Hongwei |
|
|
Construction and characteristic analysis of Chebyshev mapping system based on homogenized distribution |
|
|
|
Journal of Computer Applications
2019 Vol.39 (10): 2997-3001
[Abstract]
(308)
[HTML 1 KB]
[PDF 719 KB]
(232)
|
|
2302 |
REN Yuzhu, ZHANG Youwei, AI Chengwei |
|
|
Survey on taint analysis technology |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2302-2309
[Abstract]
(2519)
[HTML 1 KB]
[PDF 1432 KB]
(1084)
|
|
2683 |
HE Huaiqing, ZHENG Liyuan, LIU Haohan, ZHANG Yumin |
|
|
Visual analysis method for pilot eye movement data based on user-defined interest area |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2683-2688
[Abstract]
(408)
[HTML 1 KB]
[PDF 922 KB]
(405)
|
|
2629 |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng |
|
|
Threshold signature scheme suitable for blockchain electronic voting scenes |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2629-2635
[Abstract]
(584)
[HTML 1 KB]
[PDF 1051 KB]
(545)
|
|
2744 |
WAN Yongjing, WANG Bowei, LOU Dingfeng |
|
|
Insect sound feature recognition method based on three-dimensional convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2744-2748
[Abstract]
(665)
[HTML 1 KB]
[PDF 794 KB]
(440)
|
|
2333 |
LANG Dapeng, DING Wei, JIANG Haocheng, CHEN Zhiyuang |
|
|
Malicious code classification algorithm based on multi-feature fusion |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2333-2338
[Abstract]
(472)
[HTML 1 KB]
[PDF 902 KB]
(418)
|
|
2535 |
JING Nianzhao, YANG Wei |
|
|
Fine edge detection model based on RCF |
|
|
|
Journal of Computer Applications
2019 Vol.39 (9): 2535-2540
[Abstract]
(1521)
[HTML 1 KB]
[PDF 970 KB]
(658)
|
|
2181 |
CAI Guoyong, HE Xinhao, CHU Yangyang |
|
|
Visual sentiment analysis by combining global and local regions of image |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2181-2185
[Abstract]
(675)
[HTML 1 KB]
[PDF 901 KB]
(829)
|
|
2210 |
DING Lianjing, LIU Guangshuai, LI Xurui, CHEN Xiaowen |
|
|
Face recognition combining weighted information entropy with enhanced local binary pattern |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2210-2216
[Abstract]
(513)
[HTML 1 KB]
[PDF 1131 KB]
(412)
|
|
2402 |
LIU Hu, ZHOU Ye, YUAN Jiabin |
|
|
Fine-grained vehicle recognition under multiple angles based on multi-scale bilinear convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2402-2407
[Abstract]
(922)
[HTML 1 KB]
[PDF 936 KB]
(558)
|
|
2431 |
LI Yefei, XU Chao, XU Daoqiang, ZOU Yunfeng, ZHANG Xiaoda, QIAN Zhuzhong |
|
|
Online task scheduling algorithm for big data analytics based on cumulative running work |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2431-2437
[Abstract]
(459)
[HTML 1 KB]
[PDF 1056 KB]
(325)
|
|
2081 |
WANG Ping, PANG Wenhao |
|
|
Two-stream CNN for action recognition based on video segmentation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2081-2086
[Abstract]
(583)
[HTML 1 KB]
[PDF 1002 KB]
(522)
|
|
1918 |
CHEN Jiafeng, TENG Chong |
|
|
Joint entity and relation extraction model based on reinforcement learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1918-1924
[Abstract]
(749)
[HTML 1 KB]
[PDF 1115 KB]
(510)
|
|
2297 |
GONG Yanlu, LYU Jia |
|
|
Co-training algorithm with combination of active learning and density peak clustering |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2297-2301
[Abstract]
(566)
[HTML 1 KB]
[PDF 770 KB]
(329)
|
|
2475 |
YANG Huihua, ZHANG Tianyu, LI Lingqiao, PAN Xipeng |
|
|
Target recognition algorithm for urban management cases by mobile devices based on MobileNet |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2475-2479
[Abstract]
(588)
[HTML 1 KB]
[PDF 819 KB]
(381)
|
|
2484 |
DING Yingzi, DING Xiangqian, GUO Baoqi |
|
|
Application of improved GoogLeNet based on weak supervision in DR detection |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2484-2488
[Abstract]
(533)
[HTML 1 KB]
[PDF 750 KB]
(344)
|
|
2065 |
YUAN Yue, LI Yi |
|
|
Polynomial ranking function detection method based on Dixon resultant and successive difference substitution |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2065-2073
[Abstract]
(366)
[HTML 1 KB]
[PDF 1216 KB]
(283)
|
|
2391 |
OUYANG Ning, LIANG Ting, LIN Leping |
|
|
Self-attention network based image super-resolution |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2391-2395
[Abstract]
(762)
[HTML 1 KB]
[PDF 798 KB]
(448)
|
|
2125 |
WANG Lishun, ZHONG Yong, LI Zhendong, HE Yilong |
|
|
On-line fabric defect recognition algorithm based on deep learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2125-2128
[Abstract]
(912)
[HTML 1 KB]
[PDF 681 KB]
(481)
|
|
2456 |
LYU Ruimin, YANG Fan, LU Jing, CHEN Wei |
|
|
Gamification design and effect analysis of color education |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2456-2461
[Abstract]
(516)
[HTML 1 KB]
[PDF 875 KB]
(306)
|
|
2414 |
ZHANG Yubo, ZHANG Yadong, ZHANG Bin |
|
|
Desktop dust detection algorithm based on gray gradient co-occurrence matrix |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2414-2419
[Abstract]
(682)
[HTML 1 KB]
[PDF 1004 KB]
(295)
|
|
1888 |
KIM Chungsong, LI Dong |
|
|
Deep learning neural network model for consumer preference prediction |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1888-1893
[Abstract]
(859)
[HTML 1 KB]
[PDF 1094 KB]
(579)
|
|
2109 |
DENG Zhonghao, CHEN Xiaodong |
|
|
Pulmonary nodule detection algorithm based on deep convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2109-2115
[Abstract]
(764)
[HTML 1 KB]
[PDF 1207 KB]
(498)
|
|
2450 |
MENG Zhao, TIAN Shengwei, YU Long, WANG Ruijin |
|
|
Regional bullying recognition based on joint hierarchical attentional network and independent recurrent neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2450-2455
[Abstract]
(564)
[HTML 1 KB]
[PDF 983 KB]
(345)
|
|
1973 |
MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun |
|
|
Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1973-1978
[Abstract]
(489)
[HTML 1 KB]
[PDF 900 KB]
(344)
|
|
1229 |
LIU Shuai, LIU Changliang, ZHEN Chenggang |
|
|
Multivariate time series fault warning for wind turbine gearbox |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1229-1233
[Abstract]
(542)
[HTML 1 KB]
[PDF 820 KB]
(436)
|
|
1201 |
ZHOU Yujin, WANG Xiaodong, ZHANG Lige, ZHU Kai, YAO Yu |
|
|
Feature point localization of left ventricular ultrasound image based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1201-1207
[Abstract]
(564)
[HTML 1 KB]
[PDF 1169 KB]
(408)
|
|
1196 |
QIU Jiajun, WU Yue, HUI Bei, LIU Yanbo |
|
|
Fractional differential algorithm based on wavelet transform applied on texture enhancement of liver tumor in CT image |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1196-1200
[Abstract]
(464)
[HTML 1 KB]
[PDF 920 KB]
(372)
|
|
1183 |
PAN Peike, WANG Yan, LUO Yong, ZHOU Jiliu |
|
|
Automatic segmentation of nasopharyngeal neoplasm in MR image based on U-net model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1183-1188
[Abstract]
(493)
[HTML 1 KB]
[PDF 970 KB]
(404)
|
|
1162 |
CHENG Yu, DENG Dexiang, YAN Jia, FAN Ci'en |
|
|
Weakly illuminated image enhancement algorithm based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1162-1169
[Abstract]
(2068)
[HTML 1 KB]
[PDF 1448 KB]
(992)
|
|
1138 |
XU Xingchen, CHENG Jian, TANG Jingyu, ZHANG Jian |
|
|
Phase error analysis and amplitude improvement algorithm for asymmetric paired carry multiple access signal |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1138-1144
[Abstract]
(407)
[HTML 1 KB]
[PDF 935 KB]
(284)
|
|
1133 |
ZHOU Wei, XIANG Danlei, GUO Mengyu |
|
|
Low complexity reactive tabu search detection algorithm in MIMO-GFDM systems |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1133-1137
[Abstract]
(481)
[HTML 1 KB]
[PDF 721 KB]
(290)
|
|
1122 |
HUANG Sheng, FU Yuanpeng, ZHANG Qianyun |
|
|
Rate smooth switching algorithm based on DASH standard |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1122-1126
[Abstract]
(408)
[HTML 1 KB]
[PDF 887 KB]
(360)
|
|
1117 |
WU Jie, LYU Yongle |
|
|
Optimal combination prediction based on polynomial coefficient autoregressive model for radar performance parameter |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1117-1121
[Abstract]
(376)
[HTML 1 KB]
[PDF 795 KB]
(346)
|
|
1100 |
REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun |
|
|
Low-density 3D model information hiding algorithm based on multple fusion states |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1100-1105
[Abstract]
(608)
[HTML 1 KB]
[PDF 929 KB]
(296)
|
|
1095 |
ZHOU Yang, WU Qiwu, JIANG Lingzhi |
|
|
Group key management scheme based on distributed path computing element in multi-domain optical network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1095-1099
[Abstract]
(481)
[HTML 1 KB]
[PDF 786 KB]
(272)
|
|
1089 |
CHEN Wanzhi, XU Dongsheng, ZHANG Jing, TANG Yu |
|
|
Intrusion detection method for industrial control system with optimized support vector machine and
K-means++ |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1089-1094
[Abstract]
(411)
[HTML 1 KB]
[PDF 829 KB]
(353)
|
|
1066 |
ZOU Chengming, LIU Panwen, TANG Xing |
|
|
Real-time defence against dynamic host configuration protocol flood attack in software defined network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1066-1072
[Abstract]
(386)
[HTML 1 KB]
[PDF 1082 KB]
(336)
|
|
1059 |
PANG Xiaoqiong, YAN Xiaolong, CHEN Wenjun, YU Benguo, NIE Mengfei |
|
|
Dynamic multi-keyword ranked search over encrypted data supporting semantic extension |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1059-1065
[Abstract]
(725)
[HTML 1 KB]
[PDF 1001 KB]
(381)
|
|
1032 |
MAO Yimin, LIU Yinping, LIANG Tian, MAO Dinghui |
|
|
Functional module mining in uncertain protein-protein interaction network based on fuzzy spectral clustering |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 1032-1040
[Abstract]
(443)
[HTML 1 KB]
[PDF 1499 KB]
(341)
|
|
994 |
DENG Tianmin, FANG Fang, YUE Yunxia, YANG Qizhi |
|
|
GNSS/INS global high-precision positioning method based on Elman neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 994-1000
[Abstract]
(595)
[HTML 1 KB]
[PDF 1000 KB]
(309)
|
|
989 |
HU Zhangfang, ZENG Linquan, LUO Yuan, LUO Xin, ZHAO Liming |
|
|
Adaptive Monte-Carlo localization algorithm integrated with two-dimensional code information |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 989-993
[Abstract]
(781)
[HTML 1 KB]
[PDF 790 KB]
(431)
|
|
977 |
QI Ziliang, QU Hanbing, ZHAO Chuanhu, DONG Liang, LI Bozhao, WANG changsheng |
|
|
Person re-identification based on Siamese network and bidirectional max margin ranking loss |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 977-983
[Abstract]
(724)
[HTML 1 KB]
[PDF 1221 KB]
(412)
|
|
972 |
YU Chongchong, CAO Shuai, PAN Bo, ZHANG Qingchuan, XU Shixuan |
|
|
Retrieval matching question and answer method based on improved CLSM with attention mechanism |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 972-976
[Abstract]
(456)
[HTML 1 KB]
[PDF 752 KB]
(360)
|
|
963 |
DING Chao, ZHAO Hai, SI Shuaizong, ZHU Jian |
|
|
Evolution model of normal aging human brain functional network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 963-971
[Abstract]
(526)
[HTML 1 KB]
[PDF 1354 KB]
(425)
|
|
940 |
XU Tao, WANG Xiaoming |
|
|
Generalization error bound guided discriminative dictionary learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (4): 940-948
[Abstract]
(665)
[HTML 1 KB]
[PDF 1327 KB]
(455)
|
|
2480 |
HU Zhangfang, ZHANG Li, HUANG Lijia, LUO Yuan |
|
|
Motor imagery electroencephalogram signal recognition method based on convolutional neural network in time-frequency domain |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2480-2483
[Abstract]
(911)
[HTML 1 KB]
[PDF 643 KB]
(439)
|
|
2098 |
LUO Yuan, YUN Mingjing, WANG Yi, ZHAO Liming |
|
|
Human fatigue detection based on eye information characteristics |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2098-2102
[Abstract]
(424)
[HTML 1 KB]
[PDF 799 KB]
(397)
|
|
2192 |
CHEN Jie, SHAO Zhiqing, ZHANG Huanhuan, FEI Jiahui |
|
|
Short text sentiment analysis based on parallel hybrid neural network model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2192-2197
[Abstract]
(834)
[HTML 1 KB]
[PDF 884 KB]
(513)
|
|
1936 |
CHEN Zhenghao, FENG Ao, HE Jia |
|
|
Text sentiment classification based on 1D convolutional hybrid neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1936-1941
[Abstract]
(491)
[HTML 1 KB]
[PDF 1060 KB]
(410)
|
|
1985 |
MA Fangfang, LIU Shubo, XIONG Xingxing, NIU Xiaoguang |
|
|
Privacy protection based on local differential privacy for numerical sensitive data of wearable devices |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1985-1990
[Abstract]
(739)
[HTML 1 KB]
[PDF 956 KB]
(371)
|
|
1997 |
WANG Zhong, HAN Yiliang |
|
|
Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1997-2000
[Abstract]
(422)
[HTML 1 KB]
[PDF 743 KB]
(359)
|
|
2242 |
JIANG Sihao, SONG Huihui, ZHANG Kaihua, TANG Runfa |
|
|
Video object segmentation method based on dual pyramid network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (8): 2242-2246
[Abstract]
(611)
[HTML 1 KB]
[PDF 787 KB]
(287)
|
|
1894 |
WEI Xing, LE Yue, HAN Jianghong, LU Yang |
|
|
Vehicle behavior dynamic recognition network based on long short-term memory |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1894-1898
[Abstract]
(628)
[HTML 1 KB]
[PDF 858 KB]
(492)
|
|
1991 |
SU Zhenyu, SONG Guixiang, LIU Yanming, ZHAO Yuan |
|
|
Threat modeling and application of server management control system |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1991-1996
[Abstract]
(250)
[HTML 1 KB]
[PDF 1026 KB]
(335)
|
|
2030 |
LI Shibao, WANG Yixin, ZHAO Dayin, YE Wei, GUO Lin, LIU Jianhang |
|
|
Partial interference alignment scheme with limited antenna resource in heterogeneous network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 2030-2034
[Abstract]
(403)
[HTML 1 KB]
[PDF 838 KB]
(291)
|
|
924 |
TAO Tao, ZHOU Xi, MA Bo, ZHAO Fan |
|
|
Abnormal time series data detection of gas station by Seq2Seq model based on bidirectional long short-term memory |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 924-929
[Abstract]
(1984)
[HTML 1 KB]
[PDF 936 KB]
(671)
|
|
918 |
FAN Li, ZHENG Hong, HUANG Jianhua, LI Zhongcheng, JIANG Yahui |
|
|
Cooperative evolution method for blockchain mining pool based on adaptive zero-determinant strategy |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 918-923
[Abstract]
(456)
[HTML 1 KB]
[PDF 834 KB]
(466)
|
|
907 |
HUANG Fengyu, WU Yefu, CHEN Jingren, WU Bing |
|
|
Traffic behavior spectrum analysis method based on regional road live data |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 907-912
[Abstract]
(650)
[HTML 1 KB]
[PDF 906 KB]
(426)
|
|
824 |
REN Xiaokui, LI Feng, CHENG Lin |
|
|
Improved centroid localization algorithm based on dynamic loss factor and weight |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 824-828
[Abstract]
(540)
[HTML 1 KB]
[PDF 810 KB]
(316)
|
|
796 |
JIN Tao, DONG Xiucheng, LI Yining, REN Lei, FAN Peipei |
|
|
Optimization of fractional PID controller parameters based on improved PSO algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 796-801
[Abstract]
(709)
[HTML 1 KB]
[PDF 931 KB]
(537)
|
|
734 |
MAO Yingchi, CAO Hai, PING Ping, LI Xiaofang |
|
|
Feature selection based on maximum conditional and joint mutual information |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 734-741
[Abstract]
(1097)
[HTML 1 KB]
[PDF 1284 KB]
(522)
|
|
695 |
LI Qiuzhen, LUAN Chaoyang, WANG Shuangxi |
|
|
Quality evaluation of face image based on convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 695-699
[Abstract]
(1024)
[HTML 1 KB]
[PDF 821 KB]
(711)
|
|
688 |
HAN Jianghong, YUAN Jiaxuan, WEI Xing, LU Yang |
|
|
Pedestrian visual positioning algorithm for underground roadway based on deep learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 688-694
[Abstract]
(705)
[HTML 1 KB]
[PDF 1079 KB]
(654)
|
|
663 |
SHEN Ying, HUANG Zhangcan, TAN Qing, LIU Ning |
|
|
Krill herd algorithm based on dynamic pressure control operator |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 663-667
[Abstract]
(505)
[HTML 1 KB]
[PDF 786 KB]
(348)
|
|
656 |
YANG Yang, PAN Dazhi, LIU Yi, TAN Dailun |
|
|
New simplified model of discounted {0-1} knapsack problem and solution by genetic algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 656-662
[Abstract]
(642)
[HTML 1 KB]
[PDF 1164 KB]
(453)
|
|
644 |
QIU Ningjia, CONG Lin, ZHOU Sicheng, WANG Peng, LI Yanfang |
|
|
SVD-CNN barrage text classification algorithm combined with improved active learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (3): 644-650
[Abstract]
(914)
[HTML 1 KB]
[PDF 1109 KB]
(456)
|
|
618 |
MO Zan, GAI Yanrong, FAN Guanlong |
|
|
Credit card fraud classification based on GAN-AdaBoost-DT imbalanced classification algorithm |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 618-622
[Abstract]
(1666)
[HTML 1 KB]
[PDF 771 KB]
(755)
|
|
589 |
GUO Rongzuo, FENG Chaosheng, QIN Zhiguang |
|
|
Modeling and analysis of fault tolerant service composition for intelligent logistics systems of Internet of Things |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 589-597
[Abstract]
(516)
[HTML 1 KB]
[PDF 1487 KB]
(401)
|
|
556 |
LIAO Bin, WU Wen |
|
|
Video shadow removal method using region matching guided by illumination transfer |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 556-563
[Abstract]
(390)
[HTML 1 KB]
[PDF 1465 KB]
(290)
|
|
551 |
TAO Yongpeng, JING Yu, XU Cong |
|
|
Image denoising algorithm based on grouped dictionaries and variational model |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 551-555
[Abstract]
(481)
[HTML 1 KB]
[PDF 838 KB]
(405)
|
|
540 |
WU Zongjun, WU Wei, YANG Xiaomin, LIU Kai, Gwanggil Jeon, YUAN Hao |
|
|
Improved panchromatic sharpening algorithm based on sparse representation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 540-545
[Abstract]
(505)
[HTML 1 KB]
[PDF 1149 KB]
(394)
|
|
523 |
WANG Bo, LIU Deliang |
|
|
Two-dimensional parameter estimation of near-field sources based on iterative adaptive approach |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 523-527
[Abstract]
(392)
[HTML 1 KB]
[PDF 810 KB]
(350)
|
|
513 |
ZHENG Zhuoran, ZHENG Xiangwei, TIAN Jie |
|
|
Energy-saving method for wireless body area network based on synchronous prediction with penalty error matrix |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 513-517
[Abstract]
(439)
[HTML 1 KB]
[PDF 785 KB]
(321)
|
|
494 |
LI Lei, XUE Yang, LYU Nianling, FENG Min |
|
|
Online task and resource scheduling designing for container cloud queue based on Lyapunov optimization method |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 494-500
[Abstract]
(993)
[HTML 1 KB]
[PDF 1156 KB]
(591)
|
|
488 |
MA Lan, WANG Jingjie, CHEN Huan |
|
|
Business data security of system wide information management based on content mining |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 488-493
[Abstract]
(489)
[HTML 1 KB]
[PDF 1015 KB]
(361)
|
|
483 |
LI Qi, YAN Bin, CHEN Na, YANG Hongmei |
|
|
3D medical image reversible watermarking algorithm based on unidirectional prediction error expansion |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 483-487
[Abstract]
(544)
[HTML 1 KB]
[PDF 830 KB]
(366)
|
|
453 |
GUO Xuancheng, LIN Hui, YE Xiucai, XU Chuanfeng |
|
|
Controller deployment and switch dynamic migration strategy in software defined WAN |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 453-457
[Abstract]
(515)
[HTML 1 KB]
[PDF 801 KB]
(355)
|
|
409 |
HAN Zhonghua, BI Kaiyuan, SI Wen, LYU Zhe |
|
|
Clustering by fast search and find of density peaks based on spectrum analysis |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 409-413
[Abstract]
(454)
[HTML 1 KB]
[PDF 869 KB]
(328)
|
|
392 |
QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong |
|
|
Image retrieval algorithm for pulmonary nodules based on multi-scale dense network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 392-397
[Abstract]
(443)
[HTML 1 KB]
[PDF 1084 KB]
(430)
|
|
388 |
XIE Zhihua, JIANG Peng, YU Xinhe, ZHANG Shuai |
|
|
Hyperspectral face recognition system based on VGGNet and multi-band recurrent network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 388-391
[Abstract]
(786)
[HTML 1 KB]
[PDF 635 KB]
(510)
|
|
382 |
WANG Xin, LI Ke, XU Mingjun, NING Chen |
|
|
Improved remote sensing image classification algorithm based on deep learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 382-387
[Abstract]
(742)
[HTML 1 KB]
[PDF 1083 KB]
(624)
|
|
348 |
YANG Shiqiang, LUO Xiaoyu, QIAO Dan, LIU Peilei, LI Dexin |
|
|
Continuous action segmentation and recognition based on sliding window and dynamic programming |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 348-353
[Abstract]
(1634)
[HTML 1 KB]
[PDF 911 KB]
(517)
|
|
311 |
ZHANG Kejun, LI Weinan, QIAN Rong, SHI Taimeng, JIAO Meng |
|
|
Automatic text summarization scheme based on deep learning |
|
|
|
Journal of Computer Applications
2019 Vol.39 (2): 311-315
[Abstract]
(813)
[HTML 1 KB]
[PDF 867 KB]
(946)
|
|
292 |
LU Qiuqin, JIN Chao |
|
|
Reliability simulation analysis of coal transportation road network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 292-297
[Abstract]
(508)
[HTML 1 KB]
[PDF 1046 KB]
(311)
|
|
275 |
XIANG Wen, ZHANG Ling, CHEN Yunhua, JI Qiumin |
|
|
Single image super resolution algorithm based on structural self-similarity and deformation block feature |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 275-280
[Abstract]
(395)
[HTML 1 KB]
[PDF 1016 KB]
(356)
|
|
267 |
LIAO Bin, LI Haowen |
|
|
Image depth estimation model based on atrous convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 267-274
[Abstract]
(490)
[HTML 1 KB]
[PDF 1380 KB]
(307)
|
|
262 |
WANG Yan, LYU Meng, MENG Xiangfu, LI Yuhao |
|
|
Image matching method with illumination robustness |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 262-266
[Abstract]
(523)
[HTML 1 KB]
[PDF 774 KB]
(324)
|
|
256 |
DING Jianli, MU Tao, WANG Huaichao |
|
|
Fast indoor positioning algorithm of airport terminal based on spectral regression kernel discriminant analysis |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 256-261
[Abstract]
(452)
[HTML 1 KB]
[PDF 899 KB]
(305)
|
|
239 |
GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui |
|
|
Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 239-244
[Abstract]
(675)
[HTML 1 KB]
[PDF 978 KB]
(289)
|
|
227 |
ZHAO Hong, CHANG Zhaobin, WANG Le |
|
|
Fast malicious domain name detection algorithm based on lexical features |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 227-231
[Abstract]
(572)
[HTML 1 KB]
[PDF 863 KB]
(364)
|
|
220 |
DUAN Zongtao, GONG Xuehui, TANG Lei, CHEN Zhe |
|
|
Spatio-temporal trajectory retrieval and group discovery in shared transportation |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 220-226
[Abstract]
(389)
[HTML 1 KB]
[PDF 1102 KB]
(341)
|
|
213 |
LIU Wei, ZHANG Mingxin, AN Dezhi |
|
|
User influence analysis algorithm for Weibo topics |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 213-219
[Abstract]
(786)
[HTML 1 KB]
[PDF 1163 KB]
(387)
|
|
199 |
CAO Jinmeng, NI Rongrong, YANG Biao |
|
|
Crowd counting using multi-scale multi-task convolutional neural network |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 199-204
[Abstract]
(1266)
[HTML 1 KB]
[PDF 1063 KB]
(489)
|
|
186 |
CHEN Guangxi, WANG Jiaxin, HUANG Yong, ZHAN Yijun, ZHAN Baoying |
|
|
Pedestrian detection method based on cascade networks |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 186-191
[Abstract]
(526)
[HTML 1 KB]
[PDF 967 KB]
(398)
|
|
160 |
ZHI Shuting, LI Xiaoge, WANG Jingbo, WANG Penghua |
|
|
Sentiment analysis of entity aspects based on multi-attention long short-term memory |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 160-167
[Abstract]
(568)
[HTML 1 KB]
[PDF 1273 KB]
(337)
|
|
136 |
CHEN Hongyu, DENG Dexiang, YAN Jia, FAN Ci'en |
|
|
Image retrieval algorithm based on saliency semantic region weighting |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 136-142
[Abstract]
(633)
[HTML 1 KB]
[PDF 1175 KB]
(391)
|
|
131 |
BU Tongtong, CAO Tianjie |
|
|
Risk assessment method of Android application based on permission |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 131-135
[Abstract]
(776)
[HTML 1 KB]
[PDF 874 KB]
(561)
|
|
105 |
XU Yao, LI Zhuoran, MENG Jinlong, ZHAO Lipo, WEN Jianxin, WANG Guiling |
|
|
Extraction method of marine lane boundary from exploiting trajectory big data |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 105-112
[Abstract]
(673)
[HTML 1 KB]
[PDF 1324 KB]
(470)
|
|
93 |
ZHANG Jiachen, CHEN Qingkui |
|
|
Road vehicle congestion analysis model based on YOLO |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 93-97
[Abstract]
(951)
[HTML 1 KB]
[PDF 775 KB]
(686)
|
|
78 |
FENG Guangsheng, ZHANG Xiaoxue, WANG Huiqiang, LI Bingyang, YUAN Quan, CHEN Shijun, CHEN Dawei |
|
|
Classification method and updating mechanism of hierarchical 3D indoor map |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 78-81
[Abstract]
(424)
[HTML 1 KB]
[PDF 713 KB]
(312)
|
|
61 |
ZHANG Yang, LIANG Yanan, ZHANG Dongwen, SUN Shixin |
|
|
Data race detection approach in concurrent programs |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 61-65
[Abstract]
(620)
[HTML 1 KB]
[PDF 857 KB]
(374)
|
|
33 |
ZHANG Roujia, ZHAN Qingxiang, ZHU Yuhang, TAN Guoping |
|
|
Multi-cell uplink joint power control algorithm for LTE system |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 33-38
[Abstract]
(535)
[HTML 1 KB]
[PDF 866 KB]
(245)
|
|
26 |
TAN Jing, DONG Chengfeng, WANG Huiqiang, WANG Hezhe, FENG Guangsheng, LYU Hongwu, YUAN Quan, CHEN Shijun |
|
|
ERC
2: DTN Epidemic Routing method with Congestion Control strategy |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 26-32
[Abstract]
(454)
[HTML 1 KB]
[PDF 1110 KB]
(325)
|
|
15 |
SONG Zihui, LI Zhuo, CHEN Xin |
|
|
Mobile crowdsensing task distribution mechanism based on compressed sensing |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 15-21
[Abstract]
(532)
[HTML 1 KB]
[PDF 1085 KB]
(404)
|
|
1 |
MAO Yingchi, HAO Shuai, PING Ping, QI Rongzhi |
|
|
Cloud resource scheduling method based on combinatorial double auction |
|
|
|
Journal of Computer Applications
2019 Vol.39 (1): 1-7
[Abstract]
(633)
[HTML 1 KB]
[PDF 1103 KB]
(545)
|
|
3643 |
CHEN Binjie, LU Zhihua, ZHOU Yu, YE Qingwei |
|
|
Indoor speech separation and sound source localization system based on dual-microphone |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3643-3648
[Abstract]
(815)
[HTML 1 KB]
[PDF 866 KB]
(530)
|
|
3638 |
YUAN Yongpeng, YOU Datao, QU Shenming, WU Xiangjun, WEI Mengfan, ZHU Mengbo, GENG Xudong, JIA Nairen |
|
|
Application of convolution neural network in heart beat recognition |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3638-3642
[Abstract]
(702)
[HTML 1 KB]
[PDF 987 KB]
(689)
|
|
3612 |
YU Dunhui, WANG Yi, ZHANG Wanshan |
|
|
Ability dynamic measurement algorithm for software crowdsourcing workers |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3612-3617
[Abstract]
(769)
[HTML 1 KB]
[PDF 968 KB]
(364)
|
|
3607 |
LI Jinman, WANG Jianming, JIN Guanghao |
|
|
Facial attractiveness evaluation method based on fusion of feature-level and decision-level |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3607-3611
[Abstract]
(571)
[HTML 1 KB]
[PDF 818 KB]
(406)
|
|
3591 |
YI Guoxian, XIONG Shuhua, HE Xiaohai, WU Xiaohong, ZHENG Xinbo |
|
|
People counting method combined with feature map learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3591-3595
[Abstract]
(377)
[HTML 1 KB]
[PDF 841 KB]
(372)
|
|
3584 |
GAO Jingzhi, LIU Yi, BAI Xu, ZHANG Quan, GUI Zhiguo |
|
|
Stationary wavelet domain deep residual convolutional neural network for low-dose computed tomography image estimation |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3584-3590
[Abstract]
(460)
[HTML 1 KB]
[PDF 1168 KB]
(400)
|
|
3557 |
LIU Boning, ZHAI Donghai |
|
|
Image completion method of generative adversarial networks based on two discrimination networks |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3557-3562
[Abstract]
(583)
[HTML 1 KB]
[PDF 1246 KB]
(628)
|
|
3518 |
TANG Junyong, TIAN Penghui, WANG Hui |
|
|
Network availability based on Markov chain and quality of service |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3518-3523
[Abstract]
(393)
[HTML 1 KB]
[PDF 1144 KB]
(376)
|
|
3490 |
YU Dekuang, YANG Yi, QIAN Jun |
|
|
Dynamic random distribution particle swarm optimization strategy for cloud computing resources |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3490-3495
[Abstract]
(429)
[HTML 1 KB]
[PDF 1078 KB]
(350)
|
|
3471 |
LI Qi, XIONG Jinbo, HUANG Lizhi, WANG Xuan, MAO Qiming, YAO Lanwu |
|
|
Attribute-based access control scheme in smart health |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3471-3475
[Abstract]
(579)
[HTML 1 KB]
[PDF 764 KB]
(418)
|
|
3462 |
LUO Yujie, ZHANG Jian, TANG Zhangguo, LI Huanzhou |
|
|
Research summary of secure routing protocol for low-power and lossy networks |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3462-3470
[Abstract]
(430)
[HTML 1 KB]
[PDF 1423 KB]
(379)
|
|
3455 |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia |
|
|
Efficient and provably secure short proxy signature scheme |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3455-3461
[Abstract]
(384)
[HTML 1 KB]
[PDF 1106 KB]
(391)
|
|
3450 |
SONG Tianyu, YANG Geng |
|
|
Design and implementation of middleware system for ciphertext database |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3450-3454
[Abstract]
(563)
[HTML 1 KB]
[PDF 997 KB]
(484)
|
|
3403 |
BU Lingzheng, WANG Hongdong, ZHU Meiqiang, DAI Wei |
|
|
Multi-source digit recognition algorithm based on improved convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (12): 3403-3408
[Abstract]
(368)
[HTML 1 KB]
[PDF 955 KB]
(683)
|
|
3348 |
LIU Yiming, ZHANG Pengcheng, LIU Yi, GUI Zhiguo |
|
|
Segmentation of cervical nuclei based on fully convolutional network and conditional random field |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3348-3354
[Abstract]
(1089)
[HTML 1 KB]
[PDF 1095 KB]
(915)
|
|
3342 |
GAO Junqiang, TANG Xiaqing, ZHANG Huan, GUO Libin |
|
|
Processing method of INS/GPS information delay based on factor graph algorithm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3342-3347
[Abstract]
(964)
[HTML 1 KB]
[PDF 963 KB]
(696)
|
|
3336 |
YAO Xiaoqiang, HOU Zhisen |
|
|
Financial time series prediction by long short term memory neural network with tree structure |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3336-3341
[Abstract]
(677)
[HTML 1 KB]
[PDF 941 KB]
(562)
|
|
3305 |
CHEN Wenbing, GUAN Zhengxiong, CHEN Yunjie |
|
|
Data augmentation method based on conditional generative adversarial net model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3305-3311
[Abstract]
(1942)
[HTML 1 KB]
[PDF 1131 KB]
(1248)
|
|
3287 |
WANG Shuai, YANG Xiaodong |
|
|
RFID tag number estimation algorithm based on sequential linear Bayes method |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3287-3292
[Abstract]
(561)
[HTML 1 KB]
[PDF 923 KB]
(540)
|
|
3282 |
LIU Yi, HU Zhe, JING Xiaorong |
|
|
Downlink beamforming design based user scheduling for MIMO-NOMA systems |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3282-3286
[Abstract]
(450)
[HTML 1 KB]
[PDF 774 KB]
(501)
|
|
3270 |
CHEN Fatang, XING Pingping, YANG Yanjuan |
|
|
Analysis and design of uplink resource scheduling in narrow band Internet of things |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3270-3274
[Abstract]
(524)
[HTML 1 KB]
[PDF 942 KB]
(551)
|
|
3258 |
ZHANG Chuanhao, GU Xuehui, MENG Caixia |
|
|
Anti-sniffering attack method based on software defined network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3258-3262
[Abstract]
(724)
[HTML 1 KB]
[PDF 986 KB]
(474)
|
|
3241 |
CAO Xiangying, SUN Weimin, ZHU Youxiang, QIAN Xin, LI Xiaoyu, YE Ning |
|
|
Plant image recoginiton based on family priority strategy |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3241-3245
[Abstract]
(752)
[HTML 1 KB]
[PDF 819 KB]
(676)
|
|
3236 |
HE Xueying, HAN Zhongyi, WEI Benzheng |
|
|
Pigmented skin lesion recognition and classification based on deep convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3236-3240
[Abstract]
(858)
[HTML 1 KB]
[PDF 810 KB]
(784)
|
|
3211 |
LAI Chuanbin, HAN Yuexing, GU Hui, WANG Bing |
|
|
Novel virtual boundary detection method based on deep learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3211-3215
[Abstract]
(753)
[HTML 1 KB]
[PDF 875 KB]
(510)
|
|
3199 |
WANG Peng, ZHANG Aofan, WANG Liqin, DONG Yongfeng |
|
|
Image automatic annotation based on transfer learning and multi-label smoothing strategy |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3199-3203
[Abstract]
(822)
[HTML 1 KB]
[PDF 960 KB]
(682)
|
|
3188 |
ZHANG Runlian, ZHANG Xin, ZHANG Chuyun, XI Yuang |
|
|
Path planning algorithm based on distance and slope in regular Grid digital elevation model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3188-3192
[Abstract]
(536)
[HTML 1 KB]
[PDF 985 KB]
(434)
|
|
3180 |
XIE Jiyang, YAN Dong, XIE Yao, MA Zhanyu |
|
|
Analysis of key factors in heat demand prediction based on NARX neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3180-3187
[Abstract]
(660)
[HTML 1 KB]
[PDF 1202 KB]
(537)
|
|
3150 |
ZHANG Fangjuan, YANG Yan, DU Shengdong |
|
|
Stipend prediction based on enhanced-discriminative canonical correlations analysis and classification ensemble |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3150-3155
[Abstract]
(410)
[HTML 1 KB]
[PDF 893 KB]
(432)
|
|
3127 |
LI Wanying, HUANG Ruizhang, DING Zhiyuan, CHEN Yanping, XU Liyang |
|
|
Multi-dimensional text clustering with user behavior characteristics |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3127-3131
[Abstract]
(966)
[HTML 1 KB]
[PDF 970 KB]
(523)
|
|
3084 |
FAN Zhen, GUO Yi, ZHANG Zhenhao, HAN Meiqi |
|
|
Sentiment analysis of movie reviews based on dictionary and weak tagging information |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3084-3088
[Abstract]
(793)
[HTML 1 KB]
[PDF 804 KB]
(777)
|
|
3081 |
QU Liping, WU Jiaxi |
|
|
Cross-domain personalized recommendation method based on scoring reliability |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3081-3083
[Abstract]
(579)
[HTML 1 KB]
[PDF 589 KB]
(451)
|
|
3075 |
LI Yang, DONG Hongbin |
|
|
Text sentiment analysis based on feature fusion of convolution neural network and bidirectional long short-term memory network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3075-3080
[Abstract]
(3068)
[HTML 1 KB]
[PDF 906 KB]
(1847)
|
|
3063 |
LIU Yuxin, WANG Li, ZHANG Hao |
|
|
Hierarchical attention-based neural network model for spam review detection |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3063-3068
[Abstract]
(538)
[HTML 1 KB]
[PDF 1130 KB]
(708)
|
|
3057 |
ZHAO Junhao, LI Yuhua, HUO Lin, LI Ruixuan, GU Xiwu |
|
|
Macroeconomic forecasting method fusing Weibo sentiment analysis and deep learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3057-3062
[Abstract]
(585)
[HTML 1 KB]
[PDF 994 KB]
(733)
|
|
3053 |
QU Zhaowei, WANG Yuan, WANG Xiaoru |
|
|
Transfer learning based hierarchical attention neural network for sentiment analysis |
|
|
|
Journal of Computer Applications
2018 Vol.38 (11): 3053-3056
[Abstract]
(1014)
[HTML 1 KB]
[PDF 759 KB]
(953)
|
|
0 |
|
|
|
Hierarchical 3D Indoor Map Classification Method and Updating Mechanism |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(320)
[HTML 0 KB]
[PDF 0 KB]
(27)
|
|
0 |
|
|
|
DPCS2018+69+ERC2: A DTN Epidemic Routing Method with Congestion Control Strategy |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(233)
[HTML 0 KB]
[PDF 0 KB]
(41)
|
|
3048 |
YANG Yaqian, TANG Shaoting |
|
|
Brain node recognition method based on extended low-rank multivariate general linear model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 3048-3052
[Abstract]
(476)
[HTML 1 KB]
[PDF 764 KB]
(339)
|
|
3025 |
HUANG Hainan, LI Xiaofeng, LIAN Peikun, RONG Jian |
|
|
Trigger probability model of transit signal priority strategies based on signal timing |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 3025-3029
[Abstract]
(591)
[HTML 1 KB]
[PDF 741 KB]
(371)
|
|
2990 |
JIA Shangkun, HE Fei |
|
|
Software regression verification based on witness automata |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2990-2995
[Abstract]
(497)
[HTML 1 KB]
[PDF 1103 KB]
(357)
|
|
2965 |
CHEN Yonghong, GUO Lili, ZHANG Shibing |
|
|
Energy efficiency analysis of relay assisted cellular network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2965-2970
[Abstract]
(862)
[HTML 1 KB]
[PDF 801 KB]
(377)
|
|
2960 |
LIU Yanjun, ZHAO Zhiqiang, LIU Yan, CUI Ying, WANG Dayong, RAN Peng, GUO Yijun |
|
|
Fast intra algorithm based on quality scalable high efficiency video coding |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2960-2964
[Abstract]
(481)
[HTML 1 KB]
[PDF 786 KB]
(335)
|
|
2950 |
ZHOU Wei, GUO Mengyu, XIANG Danlei |
|
|
Improved QRD-M detection algorithm for spatial modulation system |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2950-2954
[Abstract]
(559)
[HTML 1 KB]
[PDF 781 KB]
(403)
|
|
2945 |
WANG Meile, ZHANG Zhizhong, WANG Guangya |
|
|
Design and implementation of PDSCH de-resource mapping in LTE-A air interface analyzer |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2945-2949
[Abstract]
(562)
[HTML 1 KB]
[PDF 762 KB]
(345)
|
|
2940 |
WANG Songwei, CHEN Jianhua |
|
|
Multi-factor authentication key agreement scheme based on chaotic mapping |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2940-2944
[Abstract]
(567)
[HTML 1 KB]
[PDF 877 KB]
(397)
|
|
2929 |
JIANG Chen, HU Yupeng, SI Kai, KUANG Wenxin |
|
|
Malicious file detection method based on image texture and convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2929-2933
[Abstract]
(1116)
[HTML 1 KB]
[PDF 716 KB]
(566)
|
|
2923 |
WANG Yaojie, NIU Ke, YANG Xiaoyuan |
|
|
Information hiding scheme based on generative adversarial network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2923-2928
[Abstract]
(1189)
[HTML 1 KB]
[PDF 882 KB]
(870)
|
|
2903 |
FANG Yuan, LI Ming, WANG Ping, JIANG Xinghe, ZHANG Xinming |
|
|
Intrusion detection model based on hybrid convolutional neural network and recurrent neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2903-2907
[Abstract]
(1242)
[HTML 1 KB]
[PDF 918 KB]
(940)
|
|
2899 |
FENG Liping, HAN Xie, HAN Qi, ZHENG Fang |
|
|
Network virus propagation modeling considering social network user behaviors |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2899-2902
[Abstract]
(562)
[HTML 1 KB]
[PDF 761 KB]
(493)
|
|
2892 |
MIAO Junmin, FENG Chaosheng, LI Min, LIU Xia |
|
|
Public auditing scheme of data integrity for public cloud |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2892-2898
[Abstract]
(559)
[HTML 1 KB]
[PDF 1067 KB]
(451)
|
|
2886 |
FENG Yong, HAN Xiaolong, FU Chenping, WANG Rongbing, XU Hongyan |
|
|
Commodity recommendation method integrating user trust and brand recognition |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2886-2891
[Abstract]
(532)
[HTML 1 KB]
[PDF 848 KB]
(430)
|
|
2850 |
SHAO Lun, ZHOU Xinzhi, ZHAO Chengping, ZHANG Xu |
|
|
Improved
K-means clustering algorithm based on multi-dimensional grid space |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2850-2855
[Abstract]
(464)
[HTML 1 KB]
[PDF 828 KB]
(370)
|
|
2839 |
SUN Nian, ZHANG Yi, LIN Haibo, HUANG Chao |
|
|
Short utterance speaker recognition algorithm based on multi-featured i-vector |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2839-2843
[Abstract]
(591)
[HTML 1 KB]
[PDF 731 KB]
(379)
|
|
2794 |
WANG Jian, ZHANG Zhiyong, QIAO Kuoyuan |
|
|
Evidence combination rule with similarity collision reduced |
|
|
|
Journal of Computer Applications
2018 Vol.38 (10): 2794-2800
[Abstract]
(401)
[HTML 1 KB]
[PDF 1010 KB]
(373)
|
|
1912 |
SHI Wenxu, YANG Yang, BAO Shengli |
|
|
Greedy core acceleration dynamic programming algorithm for solving discounted {0-1} knapsack problem |
|
|
|
Journal of Computer Applications
2019 Vol.39 (7): 1912-1917
[Abstract]
(737)
[HTML 1 KB]
[PDF 860 KB]
(463)
|
|
2747 |
ZHANG Gang, GAO Junpeng |
|
|
Weak signal detection based on combination of power and exponential function model in tri-stable stochastic resonance |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2747-2752
[Abstract]
(585)
[HTML 1 KB]
[PDF 902 KB]
(405)
|
|
2730 |
ZHANG Cheng, GUO Qingxiu, FENG Liwei, LI Yuan |
|
|
Fault detection strategy based on local neighbor standardization and dynamic principal component analysis |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2730-2734
[Abstract]
(610)
[HTML 1 KB]
[PDF 785 KB]
(336)
|
|
2712 |
ZHANG Ming, WANG Jindong, WEI Bo |
|
|
Satellite scheduling method for intensive tasks based on improved fireworks algorithm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2712-2719
[Abstract]
(608)
[HTML 1 KB]
[PDF 1302 KB]
(390)
|
|
2678 |
LI Wei, LI Weixiang, ZHANG Fan, JIE Wei |
|
|
Rapid mismatching elimination algorithm based on motion smoothing constraints |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2678-2682
[Abstract]
(735)
[HTML 1 KB]
[PDF 1019 KB]
(405)
|
|
2673 |
GAO Jingang, LIU Zhiyong, ZHANG Shuang, HOU Daishuang, LIU Xiaofeng |
|
|
Application of binocular stereo vision technology in key dimension detection of CRH body |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2673-2677
[Abstract]
(782)
[HTML 1 KB]
[PDF 1010 KB]
(441)
|
|
2666 |
XU Xiaodan, LI Bingjie, LI Bosen, LYU Shun |
|
|
New 3D scene modeling language and environment based on BNF paradigm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2666-2672
[Abstract]
(744)
[HTML 1 KB]
[PDF 1259 KB]
(445)
|
|
2660 |
GAO Qinquan, HUANG Weiping, DU Min, WEI Mengyu, KE Dongzhong |
|
|
Design of augmented reality navigation simulation system for pelvic minimally invasive surgery based on stereoscopic vision |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2660-2665
[Abstract]
(582)
[HTML 1 KB]
[PDF 1132 KB]
(426)
|
|
2644 |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu |
|
|
Dynamic measurement of Android kernel based on ARM virtualization extension |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2644-2649
[Abstract]
(984)
[HTML 1 KB]
[PDF 996 KB]
(533)
|
|
2568 |
YANG Guofeng, DAI Jiacai, LIU Xiangjun, WU Xiaolong, TIAN Yanni |
|
|
Dynamic multi-subgroup collaborative barebones particle swarm optimization based on kernel fuzzy clustering |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2568-2574
[Abstract]
(426)
[HTML 1 KB]
[PDF 1251 KB]
(316)
|
|
2549 |
ZHU Zhu, FU Xiao, WANG Zhijian |
|
|
Stealth download hijacking vulnerability of Android application package |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2549-2553
[Abstract]
(606)
[HTML 1 KB]
[PDF 1030 KB]
(363)
|
|
2535 |
WU Muyang, LIU Zheng, WANG Yang, LI Yun, LI Tao |
|
|
Quality evaluation model of network operation and maintenance based on correlation analysis |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2535-2542
[Abstract]
(621)
[HTML 1 KB]
[PDF 1421 KB]
(432)
|
|
2500 |
SONG Jundian, DAI Bingrong, JIANG Liwen, ZHAO Yao, LI Chao, WANG Xiaoqiang |
|
|
Data governance collaborative method based on blockchain |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2500-2506
[Abstract]
(1496)
[HTML 1 KB]
[PDF 1276 KB]
(807)
|
|
2489 |
WAN Yuan, ZHANG Jinghui, WU Kefeng, MENG Xiaojing |
|
|
Image classification based on multi-layer non-negativity and locality Laplacian sparse coding |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2489-2494
[Abstract]
(694)
[HTML 1 KB]
[PDF 1164 KB]
(568)
|
|
2469 |
LAI Wenhui, QIAO Yupeng |
|
|
Spam messages recognizing method based on word embedding and convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2469-2476
[Abstract]
(1088)
[HTML 1 KB]
[PDF 1380 KB]
(883)
|
|
2464 |
ZHANG Chen, QIAN Tao, JI Donghong |
|
|
Joint model of microblog emotion recognition of emoticons and emotion cause detection based on neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (9): 2464-2468
[Abstract]
(760)
[HTML 1 KB]
[PDF 949 KB]
(696)
|
|
2411 |
LI Qiang, YU Fengqin |
|
|
Improved pitch contour creation and selection algorithm for melody extraction |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2411-2415
[Abstract]
(757)
[HTML 1 KB]
[PDF 803 KB]
(470)
|
|
2370 |
XU Dong, LI Yong, LIU Dongdong, LU Yakai |
|
|
Weight adjustable interference alignment algorithm with imperfect channel state information |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2370-2374
[Abstract]
(575)
[HTML 1 KB]
[PDF 938 KB]
(398)
|
|
2359 |
LU Mingchi, WANG Shouhua, LI Yunke, JI Yuanfa, SUN Xiyan, DENG Guihui |
|
|
Bluetooth location algorithm based on feature matching and distance weighting |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2359-2364
[Abstract]
(700)
[HTML 1 KB]
[PDF 966 KB]
(538)
|
|
2306 |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong |
|
|
Information hiding algorithm based on fractal graph |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2306-2310
[Abstract]
(497)
[HTML 1 KB]
[PDF 823 KB]
(525)
|
|
2280 |
JIANG Bingcheng, HE Qian, CHEN Yiting, LIU Peng |
|
|
Cloud database oriented attribute based encryption and query translation middleware |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2280-2286
[Abstract]
(715)
[HTML 1 KB]
[PDF 1123 KB]
(450)
|
|
2261 |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan |
|
|
Data transmission protocol based on short signature scheme for railway bridge monitoring |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2261-2266
[Abstract]
(514)
[HTML 1 KB]
[PDF 973 KB]
(363)
|
|
2218 |
WENG Liguo, LIU Wan'an, SHI Bicheng, XIA Min |
|
|
Cloud/Snow classification based on multi-dimensional multi-grained cascade forest in plateau region |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2218-2223
[Abstract]
(848)
[HTML 1 KB]
[PDF 1085 KB]
(544)
|
|
2211 |
HU Cong, QU Jinjin, XU Chuanpei, ZHU Aijun |
|
|
Garment image recognition based on adaptive pooling neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2211-2217
[Abstract]
(583)
[HTML 1 KB]
[PDF 1133 KB]
(473)
|
|
2205 |
LI Xinchun, CAO Zhiqiang, LIN Sen, ZHANG Chunhua |
|
|
Palmprint and palmvein image fusion recognition algorithm based on super-wavelet domain |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2205-2210
[Abstract]
(525)
[HTML 1 KB]
[PDF 890 KB]
(416)
|
|
2192 |
YE Yuanzheng, LI Xiaoxia, LI Minze |
|
|
Rapid stable detection of human faces in image sequence based on MS-KCF model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2192-2197
[Abstract]
(737)
[HTML 1 KB]
[PDF 1139 KB]
(663)
|
|
2185 |
ZHANG Cheng, GUO Qingxiu, LI Yuan |
|
|
Batch process monitoring based on
k nearest neighbors in discriminated kernel principle component space |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2185-2191
[Abstract]
(421)
[HTML 1 KB]
[PDF 977 KB]
(365)
|
|
2175 |
XIONG Changzhen, CHE Manqiang, WANG Runling |
|
|
Real-time visual tracking algorithm based on correlation filters and sparse convolutional features |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2175-2179
[Abstract]
(440)
[HTML 1 KB]
[PDF 1053 KB]
(397)
|
|
2170 |
YU Hui, FENG Xupeng, LIU Lijun, HUANG Qingsong |
|
|
Identification method of user's medical intention in chatting robot |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2170-2174
[Abstract]
(751)
[HTML 1 KB]
[PDF 781 KB]
(645)
|
|
2141 |
XIA Min, SONG Wenzhu, SHI Bicheng, LIU Jia |
|
|
Deep reinforcement learning method based on weighted densely connected convolutional network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (8): 2141-2147
[Abstract]
(613)
[HTML 1 KB]
[PDF 1090 KB]
(820)
|
|
0 |
|
|
|
Design of AR Navigation Simulation System for Pelvic Minimally Invasive Surgery Based on Stereoscopic Vision |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(415)
[HTML 0 KB]
[PDF 0 KB]
(35)
|
|
2136 |
WANG Yan, LUO Qian, DENG Hui |
|
|
Bearing fault diagnosis method based on Gibbs sampling |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2136-2140
[Abstract]
(520)
[HTML 1 KB]
[PDF 804 KB]
(395)
|
|
2130 |
FENG Liwei, ZHANG Cheng, LI Yuan, XIE Yanhong |
|
|
Fault detection for multistage process based on improved local neighborhood standardization and
kNN |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2130-2135
[Abstract]
(410)
[HTML 1 KB]
[PDF 905 KB]
(352)
|
|
2100 |
WU Renbiao, LI Jiayi, QU Jingyi |
|
|
Flight delay prediction model based on dual-channel convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2100-2106
[Abstract]
(792)
[HTML 1 KB]
[PDF 1206 KB]
(438)
|
|
2083 |
LI Yuanyuan, CAI Yiheng, GAO Xurong |
|
|
Retinal vessel segmentation algorithm based on hybrid phase feature |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2083-2088
[Abstract]
(559)
[HTML 1 KB]
[PDF 1042 KB]
(399)
|
|
2076 |
LIU Xiaohui, LU Lijun, FENG Qianjin, CHEN Wufan |
|
|
Proximal smoothing iterative algorithm for magnetic resonance image reconstruction based on Moreau-envelope |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2076-2082
[Abstract]
(599)
[HTML 1 KB]
[PDF 1157 KB]
(378)
|
|
2070 |
ZHANG Yonghong, XIA Guanghao, KAN Xi, HE Jing, GE Taotao, WANG Jiangeng |
|
|
Road extraction from multi-source high resolution remote sensing image based on fully convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2070-2075
[Abstract]
(922)
[HTML 1 KB]
[PDF 961 KB]
(549)
|
|
2050 |
DU Liuqing, XU Hezuo, YU Yongwei, ZHANG Jianheng |
|
|
Fast workpiece matching method for flexible clamping robot based on improved SURF algorithm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2050-2055
[Abstract]
(553)
[HTML 1 KB]
[PDF 980 KB]
(236)
|
|
2020 |
WANG Aizhen, HU Jiao, HAN Hangcheng |
|
|
Capture method of direct sequence spread spectrum signal based on cascade stochastic resonance |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2020-2023
[Abstract]
(487)
[HTML 1 KB]
[PDF 794 KB]
(369)
|
|
2015 |
SUO Longlong, ZHANG Gengxin, BIAN Dongming, XIE Zhidong, TIAN Xiang |
|
|
Performance analysis of Luby transform codes under Gaussian elimination decoding |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2015-2019
[Abstract]
(562)
[HTML 1 KB]
[PDF 744 KB]
(305)
|
|
2001 |
HUANG Sheng, HU Lingwei, FU Yuanpeng |
|
|
State machine based video rate adaptation algorithm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 2001-2004
[Abstract]
(619)
[HTML 1 KB]
[PDF 803 KB]
(383)
|
|
1989 |
FANG Wenhao, LU Yang, WEI Xing |
|
|
UWB high-precision localization in underground coal mine based on region determination |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1989-1994
[Abstract]
(677)
[HTML 1 KB]
[PDF 913 KB]
(404)
|
|
1981 |
WANG Ming, XU Liang, HE Xiaomin |
|
|
RSSI collaborative location algorithm of selecting preference accuracy for wireless sensor network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1981-1988
[Abstract]
(425)
[HTML 1 KB]
[PDF 1237 KB]
(393)
|
|
1967 |
YANG Jie, LI Songbin, DENG Haojiang |
|
|
Steganalysis based on Bayesian network for compressed speech |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1967-1973
[Abstract]
(498)
[HTML 1 KB]
[PDF 1111 KB]
(384)
|
|
1916 |
CHEN Jingren, WU Yefu, WU Bing |
|
|
Driver behavior spectrum analysis method based on vehicle driving data |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1916-1922
[Abstract]
(1457)
[HTML 1 KB]
[PDF 1311 KB]
(659)
|
|
1910 |
CHANG Bingguo, ZANG Hongying |
|
|
Time series classifier design based on piecewise dimensionality reduction and updated dynamic time warping |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1910-1915
[Abstract]
(577)
[HTML 1 KB]
[PDF 935 KB]
(378)
|
|
1853 |
ZOU Chengming, LUO Ying, XU Xiaolong |
|
|
Fine-grained image classification method based on multi-feature combination |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1853-1856
[Abstract]
(956)
[HTML 1 KB]
[PDF 862 KB]
(574)
|
|
1839 |
YANG Chunni, FENG Chaosheng |
|
|
Multi-intention recognition model with combination of syntactic feature and convolution neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1839-1845
[Abstract]
(1910)
[HTML 1 KB]
[PDF 1194 KB]
(985)
|
|
1831 |
ZHANG Runyan, MENG Fanrong, ZHOU Yong, LIU Bing |
|
|
Semantic relation extraction model via attention based neural Turing machine |
|
|
|
Journal of Computer Applications
2018 Vol.38 (7): 1831-1838
[Abstract]
(802)
[HTML 1 KB]
[PDF 1298 KB]
(773)
|
|
1820 |
FAN Jun, WANG Xin, XU Hui |
|
|
Prediction method of tectonic coal thickness based on particle swarm optimized hybrid kernel extreme learning machine |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1820-1825
[Abstract]
(457)
[HTML 1 KB]
[PDF 1149 KB]
(425)
|
|
1801 |
CAO Ang, ZHANG Shenjia, LIU Rui, ZOU Lian, FAN Ci'en |
|
|
Muscle fatigue state classification system based on surface electromyography signal |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1801-1808
[Abstract]
(768)
[HTML 1 KB]
[PDF 1309 KB]
(549)
|
|
1795 |
CHEN Tian, WANG Jiawei, AN Xin, REN Fuji |
|
|
Parallel test scheduling optimization method for three-dimensional chip with multi-core and multi-layer |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1795-1800
[Abstract]
(492)
[HTML 1 KB]
[PDF 1090 KB]
(391)
|
|
1777 |
CHEN Chen, ZHAO Jianwei, CAO Feilong |
|
|
Image super-resolution reconstruction based on four-channel convolutional sparse coding |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1777-1783
[Abstract]
(362)
[HTML 1 KB]
[PDF 1085 KB]
(376)
|
|
1771 |
XIE Benming, HAN Mingming, ZHANG Pan, ZHANG Wei |
|
|
Optimization algorithm of dynamic time warping for speech recognition of aircraft towing vehicle |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1771-1776
[Abstract]
(437)
[HTML 1 KB]
[PDF 1117 KB]
(413)
|
|
1765 |
XIE Yonghua, HAN Liping |
|
|
Local binary pattern based on dominant gradient encoding for pollen image recognition |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1765-1770
[Abstract]
(552)
[HTML 1 KB]
[PDF 1090 KB]
(448)
|
|
1760 |
WU Liang, HE Yi, MEI Xue, LIU Huan |
|
|
Online behavior recognition using space-time interest points and probabilistic latent-dynamic conditional random field model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1760-1764
[Abstract]
(340)
[HTML 1 KB]
[PDF 783 KB]
(436)
|
|
1755 |
ZUO Xiangmei, JIA Lijiao, HAN Pengcheng |
|
|
Hierarchical three-dimensional shape ring feature extraction method |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1755-1759
[Abstract]
(417)
[HTML 1 KB]
[PDF 1054 KB]
(399)
|
|
1726 |
YAN Xiaoyong, LI Qing |
|
|
Method for determining boundaries of binary protocol format keywords based on optimal path search |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1726-1731
[Abstract]
(420)
[HTML 1 KB]
[PDF 953 KB]
(426)
|
|
1709 |
SUN Wange, XIA Kewen, LAN Pu |
|
|
Regularized weighted incomplete robust principal component analysis method and its application in fitting trajectory of wireless sensor network nodes |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1709-1714
[Abstract]
(350)
[HTML 1 KB]
[PDF 961 KB]
(353)
|
|
1675 |
LIU Zhanghu, CHENG Chunling |
|
|
Variance reduced stochastic variational inference algorithm for topic modeling of large-scale data |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1675-1681
[Abstract]
(454)
[HTML 1 KB]
[PDF 1144 KB]
(388)
|
|
1653 |
ZHANG Youjie, ZHANG Qingping, WU wei, SHI Zhe |
|
|
Security analysis and evaluation of representational state transfer based on attack graph |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1653-1657
[Abstract]
(525)
[HTML 1 KB]
[PDF 800 KB]
(457)
|
|
1633 |
LI Cong, YANG Xiaoyuan, WANG Xu'an |
|
|
Effecient outsourced computing based on extended attribute-based functional encryption |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1633-1639
[Abstract]
(424)
[HTML 1 KB]
[PDF 1066 KB]
(279)
|
|
1628 |
GAO Baojian, WANG Shaodi, HU Yun, CAO Yanjun |
|
|
Physical layer parallel interpolation encryption algorithm based on orthogonal frequency division multiplexing |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1628-1632
[Abstract]
(481)
[HTML 1 KB]
[PDF 777 KB]
(392)
|
|
1620 |
ZHOU Zhicheng, LI Lixin, GUO Song, LI Zuohui |
|
|
Biometric and password two-factor cross domain authentication scheme based on blockchain technology |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1620-1627
[Abstract]
(615)
[HTML 1 KB]
[PDF 1299 KB]
(615)
|
|
1554 |
YANG Shuo, CHEN Lifang, SHI Yu, MAO Yiming |
|
|
Semantic segmentation of blue-green algae based on deep generative adversarial net |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1554-1561
[Abstract]
(712)
[HTML 1 KB]
[PDF 1306 KB]
(638)
|
|
1542 |
LI ping, DAI Yueming, WU Dinghui |
|
|
Application of dual-channel convolutional neural network in sentiment analysis |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1542-1546
[Abstract]
(942)
[HTML 1 KB]
[PDF 780 KB]
(790)
|
|
1527 |
XU Yan, XIONG Yingjun, YANG Jing |
|
|
Review of spike sequence learning methods for spiking neurons |
|
|
|
Journal of Computer Applications
2018 Vol.38 (6): 1527-1534
[Abstract]
(600)
[HTML 1 KB]
[PDF 1516 KB]
(636)
|
|
1488 |
TIAN Hao, ZHANG Gexiang, RONG Haina, Mario J. PÉREZ-JIMÉNEZ, Luis VALENCIA-CABRERA, CHEN Peng, HOU Rong, QI Dunwu |
|
|
Population model of giant panda ecosystem based on population dynamics P system |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1488-1493
[Abstract]
(517)
[HTML 1 KB]
[PDF 1014 KB]
(418)
|
|
1427 |
LEI Sijia, ZHAO Fengqun |
|
|
Foggy image enhancement based on adaptive Riesz fractional differential |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1427-1431
[Abstract]
(375)
[HTML 1 KB]
[PDF 794 KB]
(485)
|
|
1420 |
LIANG Zhonghao, PENG Dewei, JIN Yanxu, GUO Liang |
|
|
Single image dehazing algorithm based on traffic scene region enhancement |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1420-1426
[Abstract]
(538)
[HTML 1 KB]
[PDF 1224 KB]
(537)
|
|
1393 |
XU Jiaqing, WAN Wen, CAI Dongjing, TANG Fuqiao, HE Jie, ZHANG Lei |
|
|
Implementation of deterministic routing fault-tolerant strategies for
K-Ary
N-Bridge system |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1393-1398
[Abstract]
(378)
[HTML 1 KB]
[PDF 956 KB]
(514)
|
|
1346 |
YAN Hong, YANG Bo, YANG Hongyu |
|
|
Outlier detection in time series data based on heteroscedastic Gaussian processes |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1346-1352
[Abstract]
(623)
[HTML 1 KB]
[PDF 1092 KB]
(502)
|
|
1304 |
WANG Keli, YUAN Hongchun |
|
|
Aquatic animal image classification method based on transfer learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1304-1308
[Abstract]
(734)
[HTML 1 KB]
[PDF 949 KB]
(655)
|
|
1294 |
YANG Xiaoling, LI Zhiqing, LIU Yutong |
|
|
Automatic image annotation based on multi-label discriminative dictionary learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1294-1298
[Abstract]
(557)
[HTML 1 KB]
[PDF 930 KB]
(561)
|
|
1278 |
LI Yakun, PAN Qing, WANG Feng |
|
|
Joint Chinese word segmentation and punctuation prediction based on improved multilayer BLSTM network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1278-1282
[Abstract]
(577)
[HTML 1 KB]
[PDF 903 KB]
(608)
|
|
1272 |
LU Ling, YANG Wu, WANG Yuanlun, LEI Zijian, LI Ying |
|
|
Long text classification combined with attention mechanism |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1272-1277
[Abstract]
(2643)
[HTML 1 KB]
[PDF 946 KB]
(1220)
|
|
1261 |
XU Yinjie, SUN Chunhua, LIU Yezheng |
|
|
Joint sentiment/topic model integrating user characteristics |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1261-1266
[Abstract]
(413)
[HTML 1 KB]
[PDF 1024 KB]
(558)
|
|
1254 |
YUAN Yichuan, YANG Zhou, LUO Tingxing, QIN Jin |
|
|
Multi-population-based competitive differential evolution algorithm for dynamic optimization problem |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1254-1260
[Abstract]
(381)
[HTML 1 KB]
[PDF 1051 KB]
(464)
|
|
1230 |
JI Ting, ZHANG Hua |
|
|
Nonparametric approximation policy iteration reinforcement learning based on Dyna framework |
|
|
|
Journal of Computer Applications
2018 Vol.38 (5): 1230-1238
[Abstract]
(540)
[HTML 1 KB]
[PDF 1297 KB]
(591)
|
|
1207 |
PU Yuwen, HU Haibo, HE Lingjun |
|
|
Visual analytics on trajectory of pseudo base-stations based on SMS spam collected from mobilephone users |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1207-1212
[Abstract]
(479)
[HTML 1 KB]
[PDF 1083 KB]
(442)
|
|
1201 |
WANG Jian, WANG Zhihong, ZHANG Lejun |
|
|
Dynamic model of public opinion and simulation analysis of complex network evolution |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1201-1206
[Abstract]
(624)
[HTML 1 KB]
[PDF 868 KB]
(525)
|
|
1195 |
LIANG Lidong, JIA Wenyou |
|
|
Heuristic packing algorithm based on forbearing stratified strategy |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1195-1200
[Abstract]
(502)
[HTML 1 KB]
[PDF 899 KB]
(478)
|
|
1189 |
WEI Yaru, ZHU Jin |
|
|
Modeling of twin rail-mounted gantry scheduling and container slot selection in automated terminal |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1189-1194
[Abstract]
(547)
[HTML 1 KB]
[PDF 1037 KB]
(502)
|
|
1176 |
JIANG Maosong, WANG Dongxia, NIU Fanglin, CAO Yudong |
|
|
Speech enhancement method based on sparsity-regularized non-negative matrix factorization |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1176-1180
[Abstract]
(477)
[HTML 1 KB]
[PDF 800 KB]
(462)
|
|
1141 |
SUN Yitang, SONG Huihui, ZHANG Kaihua, YAN Fei |
|
|
Face super-resolution via very deep convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1141-1145
[Abstract]
(682)
[HTML 1 KB]
[PDF 890 KB]
(536)
|
|
1134 |
WANG Lifang, DONG Xia, QIN Pinle, GAO Yuan |
|
|
Multi-modal brain image fusion method based on adaptive joint dictionary learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1134-1140
[Abstract]
(638)
[HTML 1 KB]
[PDF 1149 KB]
(711)
|
|
1072 |
FU Chaojiang, WANG Tianqi, LIN Yuerong |
|
|
Parallel algorithm for explicit finite element analysis based on efficient parallel computational strategy |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1072-1077
[Abstract]
(383)
[HTML 1 KB]
[PDF 1072 KB]
(502)
|
|
1046 |
LIU Li, ZHAN Enqi, ZHENG Jianbin, WANG Yang |
|
|
Online signature verification based on curve segment similarity matching |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1046-1050
[Abstract]
(447)
[HTML 1 KB]
[PDF 930 KB]
(435)
|
|
1041 |
WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie |
|
|
Dynamic threshold signature scheme based on Chinese remainder theorem |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1041-1045
[Abstract]
(650)
[HTML 1 KB]
[PDF 761 KB]
(498)
|
|
1017 |
REN Shuai, ZHANG Tao, XU Zhenchao, WANG Zhen, HE Yuan, LIU Yunong |
|
|
Information hiding algorithm for 3D models based on feature point labeling and clustering |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 1017-1022
[Abstract]
(404)
[HTML 1 KB]
[PDF 994 KB]
(403)
|
|
949 |
LIU Yutong, LI Zhiqing, YANG Xiaoling |
|
|
Application of improved convolution neural network in remote sensing image classification |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 949-954
[Abstract]
(718)
[HTML 1 KB]
[PDF 980 KB]
(960)
|
|
935 |
AN Xuxiao, DENG Hongmin, SHI Xingyu |
|
|
Parking lot space detection method based on mini convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (4): 935-938
[Abstract]
(743)
[HTML 1 KB]
[PDF 638 KB]
(994)
|
|
905 |
XUE Yu, MEI Xue, ZHI Youran, XU Zhixing, SHI Xiang |
|
|
Sub-health state identification method of subway door based on time series data mining |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 905-910
[Abstract]
(567)
[HTML 1 KB]
[PDF 974 KB]
(502)
|
|
900 |
SUN Gongwu, XIE Jirong, WANG Junxuan |
|
|
Ship course identification model based on recursive least squares algorithm with dynamic forgetting factor |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 900-904
[Abstract]
(695)
[HTML 1 KB]
[PDF 768 KB]
(505)
|
|
891 |
WANG Fei, YU Fengqing |
|
|
Musical instrument identification based on multiscale time-frequency modulation and multilinear principal component analysis |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 891-894
[Abstract]
(424)
[HTML 1 KB]
[PDF 815 KB]
(426)
|
|
879 |
YIN Li, LIN Xinqi, CHEN Lifei |
|
|
Moving object removal forgery detection algorithm in video frame |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 879-883
[Abstract]
(468)
[HTML 1 KB]
[PDF 862 KB]
(476)
|
|
859 |
ZOU Jiabin, SUN Wei |
|
|
Multi-focus image fusion based on lifting stationary wavelet transform and joint structural group sparse representation |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 859-865
[Abstract]
(423)
[HTML 1 KB]
[PDF 1250 KB]
(485)
|
|
812 |
LI Zhen, NIU Jun, WANG Kui, XIN Yuanyuan |
|
|
Optimization of source code search based on multi-feature weight assignment |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 812-817
[Abstract]
(627)
[HTML 1 KB]
[PDF 968 KB]
(563)
|
|
786 |
LI Ruying, ZHANG Zhizhong, DENG Xiangtian |
|
|
Design and implementation of carrier aggregation in LTE-A air-interface analyzer |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 786-790
[Abstract]
(747)
[HTML 1 KB]
[PDF 765 KB]
(597)
|
|
780 |
ABDURAHMAN Kadir, MUTALLIP Sattar, MIREGULI Aili |
|
|
Asynchronous hexadecimal digital secure communication system based on shift keying of coupled hyperchaotic systems |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 780-785
[Abstract]
(493)
[HTML 1 KB]
[PDF 976 KB]
(384)
|
|
763 |
HAO Dehua, GUAN Weiguo, ZOU Linjie, JIAO Meng |
|
|
Fast virtual grid matching localization algorithm based on Pearson correlation coefficient |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 763-768
[Abstract]
(543)
[HTML 1 KB]
[PDF 962 KB]
(511)
|
|
741 |
TANG Yaxin, LI Yanlong, YANG Chao, WANG Bo |
|
|
Time and frequency synchronization for OFDM/OQAM in ground air channel |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 741-745
[Abstract]
(541)
[HTML 1 KB]
[PDF 779 KB]
(499)
|
|
734 |
HE He, LI Linlin, LU Yunfei |
|
|
Delay tolerant network clustering routing algorithm based on vehicular Ad Hoc network communication terminals and motion information |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 734-740
[Abstract]
(475)
[HTML 1 KB]
[PDF 1142 KB]
(502)
|
|
728 |
REN Zhi, TIAN Jieli, YOU Lei, LYU Yuhui |
|
|
Access protocol for terahertz wireless personal area networks based on high efficient handover of piconet coordinator |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 728-733
[Abstract]
(514)
[HTML 1 KB]
[PDF 956 KB]
(468)
|
|
722 |
TANG Jiaqi, WU Jingli |
|
|
Protein function prediction method based on PPI network and machine learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 722-727
[Abstract]
(773)
[HTML 1 KB]
[PDF 948 KB]
(673)
|
|
666 |
WANG Lin, ZHANG Hehe |
|
|
Application of Faster R-CNN model in vehicle detection |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 666-670
[Abstract]
(1766)
[HTML 1 KB]
[PDF 877 KB]
(1291)
|
|
661 |
SHI En, LI Qian, GU Daquan, ZHAO Zhangming |
|
|
Weather radar echo extrapolation method based on convolutional neural networks |
|
|
|
Journal of Computer Applications
2018 Vol.38 (3): 661-665
[Abstract]
(2462)
[HTML 1 KB]
[PDF 963 KB]
(1045)
|
|
610 |
WU Hailong, BAI Zhengyao, ZHANG Yu, HE Qian |
|
|
Design and realization of low frequency radio astronomical signal acquisition circuit based on modulated wideband converter |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 610-614
[Abstract]
(457)
[HTML 1 KB]
[PDF 738 KB]
(530)
|
|
602 |
HE Chun, LI Qi, WU Ranghao, LIU Bangxin |
|
|
Diagnosis of fault circuit by modularized BP neural network based on fault propagation |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 602-609
[Abstract]
(514)
[HTML 1 KB]
[PDF 1169 KB]
(496)
|
|
582 |
QIU Hanguang, ZHOU Yufeng |
|
|
Reception box locating-vehicle routing problems in urban distribution based on nested Logit model |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 582-588
[Abstract]
(374)
[HTML 1 KB]
[PDF 1100 KB]
(457)
|
|
568 |
LI Zhou, CUI Chen |
|
|
Observation matrix optimization algorithm in compressive sensing based on singular value decomposition |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 568-572
[Abstract]
(590)
[HTML 1 KB]
[PDF 756 KB]
(462)
|
|
563 |
ZHOU Feng, LIN Nan, CHEN Xiaoping |
|
|
Inverse kinematics equation solving method for six degrees of freedom manipulator based on six dimensional linear interpolation |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 563-567
[Abstract]
(477)
[HTML 1 KB]
[PDF 677 KB]
(441)
|
|
522 |
WANG Guisheng, REN Qinghua, XU Bingzheng, LIU Yang |
|
|
Design of transform domain communication system for long distance aeronautical communication |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 522-527
[Abstract]
(440)
[HTML 1 KB]
[PDF 869 KB]
(403)
|
|
497 |
SUN Limei, LI Yue, Ejike Ifeanyi Michael, CAO Keyan |
|
|
Simplified Slope One algorithm for online rating prediction |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 497-502
[Abstract]
(471)
[HTML 1 KB]
[PDF 939 KB]
(533)
|
|
483 |
LI Ye, CHEN Yiyan, ZHANG Shufen |
|
|
Design of mixed data clustering algorithm based on density peak |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 483-490
[Abstract]
(392)
[HTML 1 KB]
[PDF 1493 KB]
(407)
|
|
471 |
SONG Baoyan, JIA Chunjie, SHAN Xiaohuan, DING Linlin, DING Xingyan |
|
|
Dynamic Top-
K interesting subgraph query on large-scale labeled graph |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 471-477
[Abstract]
(421)
[HTML 1 KB]
[PDF 1088 KB]
(497)
|
|
448 |
SUN Jinyu, WANG Hongyuan, ZHANG Ji, ZHANG Wenwen |
|
|
Person re-identification method based on block sparse representation |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 448-453
[Abstract]
(527)
[HTML 1 KB]
[PDF 1006 KB]
(394)
|
|
443 |
TONG Nan, FU Qiang, ZHONG Caiming |
|
|
Improved teaching-learning-based optimization algorithm based on self-learning mechanism |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 443-447
[Abstract]
(565)
[HTML 1 KB]
[PDF 836 KB]
(484)
|
|
433 |
LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng |
|
|
Differential crow search algorithm based on Lévy flight for solving discount {0-1} knapsack problem |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 433-442
[Abstract]
(552)
[HTML 1 KB]
[PDF 1349 KB]
(468)
|
|
357 |
XU Bing, GUO Yuanbo, YE Ziwei, HU Yongjin |
|
|
Abnormal user detection in enterprise network based on graph analysis and support vector machine |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 357-362
[Abstract]
(599)
[HTML 1 KB]
[PDF 971 KB]
(488)
|
|
352 |
ZHONG Ya, GUO Yuanbo |
|
|
Design and implementation of log parsing system based on machine learning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 352-356
[Abstract]
(2053)
[HTML 1 KB]
[PDF 841 KB]
(1223)
|
|
348 |
LIU Rong, PAN Hongzhi, LIU Bo, ZU Ting, FANG Qun, HE Xin, WANG Yang |
|
|
Data updating method for cloud storage based on ciphertext-policy attribute-based encryption |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 348-351
[Abstract]
(564)
[HTML 1 KB]
[PDF 763 KB]
(519)
|
|
316 |
ZHOU Zhicheng, LI Lixin, LI Zuohui |
|
|
Efficient cross-domain authentication scheme based on blockchain technology |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 316-320
[Abstract]
(1303)
[HTML 1 KB]
[PDF 945 KB]
(1871)
|
|
305 |
CAI Mengjuan, CHEN Xingshu, JIN Xin, ZHAO Cheng, YIN Mingyong |
|
|
Paging-measurement method for virtual machine process code based on hardware virtualization |
|
|
|
Journal of Computer Applications
2018 Vol.38 (2): 305-309
[Abstract]
(465)
[HTML 1 KB]
[PDF 1037 KB]
(601)
|
|
300 |
JIA Fujin, JIANG Yuan |
|
|
Design of controller based on backstepping nonlinear pure feedback system |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 300-304
[Abstract]
(701)
[HTML 1 KB]
[PDF 666 KB]
(374)
|
|
290 |
NIU Guochen, YUAN Jie, GU Runping |
|
|
Design and implementation of positioning system for embedded aeronautical ground lights |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 290-294
[Abstract]
(473)
[HTML 1 KB]
[PDF 760 KB]
(445)
|
|
277 |
WANG Chao, ZHU Ming, WANG Min |
|
|
Evaluation of sector dynamic traffic capacity based on controller's cognitive load and improved ant colony algorithm |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 277-283
[Abstract]
(406)
[HTML 1 KB]
[PDF 1149 KB]
(385)
|
|
255 |
ZHU Junpeng, ZHAO Hongli, YANG Haitao |
|
|
Disparity map generation technology based on convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 255-259
[Abstract]
(562)
[HTML 1 KB]
[PDF 1010 KB]
(482)
|
|
228 |
ZHENG Jianhong, ZHANG Heng, LI Fei, LI Xiang, DENG Zhan |
|
|
Time-frequency combination de-noising algorithm based on orthogonal frequency division multiplexing/offset quadrature amplitude modulation in power line communication system |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 228-232
[Abstract]
(429)
[HTML 1 KB]
[PDF 790 KB]
(326)
|
|
222 |
KANG Zhaoling, XU Qinbao, WANG Changda |
|
|
Multi-granularity topology-based stepwise refinement provenance method for wireless sensor networks |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 222-227
[Abstract]
(424)
[HTML 1 KB]
[PDF 1030 KB]
(354)
|
|
217 |
JIN Yong, GONG Shengli |
|
|
Cluster-based resource allocation scheme in dense femtocell network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 217-221
[Abstract]
(444)
[HTML 1 KB]
[PDF 821 KB]
(407)
|
|
201 |
ZHOU Ying, FANG Yong, HUANG Cheng, LIU Liang |
|
|
Detection of SQL injection behaviors for PHP applications |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 201-206
[Abstract]
(790)
[HTML 1 KB]
[PDF 1074 KB]
(468)
|
|
146 |
ZHAO Erping, LIU Wei, DANG Hong'en |
|
|
Data compression and spatial indexing technology for massive 3D point cloud |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 146-151
[Abstract]
(472)
[HTML 1 KB]
[PDF 1209 KB]
(542)
|
|
137 |
LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng |
|
|
Chaotic crow search algorithm based on differential evolution strategy for solving discount {0-1} knapsack problem |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 137-145
[Abstract]
(526)
[HTML 1 KB]
[PDF 1387 KB]
(451)
|
|
126 |
LI Juan, YOU Xiaoming, LIU Sheng, CHEN Jia |
|
|
Dynamic chaotic ant colony system and its application in robot path planning |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 126-131
[Abstract]
(553)
[HTML 1 KB]
[PDF 968 KB]
(383)
|
|
91 |
YANG Fan, LI Jianping, LI Xin, CHEN Leiting |
|
|
Salient object detection algorithm based on multi-task deep convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 91-96
[Abstract]
(573)
[HTML 1 KB]
[PDF 1057 KB]
(730)
|
|
84 |
LUO Ming, HUANG Hailiang |
|
|
Information extraction method of financial events based on lexical-semantic pattern |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 84-90
[Abstract]
(504)
[HTML 1 KB]
[PDF 1071 KB]
(474)
|
|
79 |
LI Can, WANG Rangding, YAN Diqun |
|
|
Recaptured speech detection algorithm based on convolutional neural network |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 79-83
[Abstract]
(579)
[HTML 1 KB]
[PDF 838 KB]
(447)
|
|
73 |
WANG Hong, GE Lina, WANG Suqing, WANG Liying, ZHANG Yipeng, LIANG Juncheng |
|
|
Improvement of differential privacy protection algorithm based on OPTICS clustering |
|
|
|
Journal of Computer Applications
2018 Vol.38 (1): 73-78
[Abstract]
(725)
[HTML 1 KB]
[PDF 988 KB]
(504)
|
|
3592 |
WANG Shuyan, CHEN Pengyuan, SUN Jiaze |
|
|
Reduction method of test suites based on mutation analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3592-3596
[Abstract]
(525)
[HTML 1 KB]
[PDF 825 KB]
(635)
|
|
3574 |
CHANG Tianyou, WEI Qiang, GENG Yangyang |
|
|
Constructing method of PLC program model based on state transition |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3574-3580
[Abstract]
(541)
[HTML 1 KB]
[PDF 1124 KB]
(702)
|
|
3569 |
LIU Ying, ZHANG Tao, LI Kun, LI Nan |
|
|
Evaluation model of mobile application crowdsourcing testers |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3569-3573
[Abstract]
(514)
[HTML 1 KB]
[PDF 937 KB]
(720)
|
|
3563 |
YUAN Bo |
|
|
Application of MRF's spatial correlation model in NMF-based linear unmixing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3563-3568
[Abstract]
(476)
[HTML 1 KB]
[PDF 1038 KB]
(693)
|
|
3558 |
XIA Jun, LI Yinghua |
|
|
Delaunay triangulation subdivision algorithm of spherical convex graph and its convergence analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3558-3562
[Abstract]
(460)
[HTML 1 KB]
[PDF 738 KB]
(577)
|
|
3554 |
GAO Yuan, JIA Ziting, QIN Pinle, WANG Lifang |
|
|
Medical image fusion algorithm based on linking synaptic computation network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3554-3557
[Abstract]
(445)
[HTML 1 KB]
[PDF 871 KB]
(828)
|
|
3547 |
SUN Zengyou, DUAN Yushuai, LI Ya |
|
|
Image feature point matching algorithm based on center surround filter detection |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3547-3553
[Abstract]
(499)
[HTML 1 KB]
[PDF 1171 KB]
(777)
|
|
3523 |
HU Xuegang, QIU Xiulan |
|
|
Novel image segmentation algorithm based on Snake model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3523-3527
[Abstract]
(644)
[HTML 1 KB]
[PDF 894 KB]
(721)
|
|
3504 |
LIN Weiming, GAO Qinquan, DU Min |
|
|
Convolutional neural network based method for diagnosis of Alzheimer's disease |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3504-3508
[Abstract]
(994)
[HTML 1 KB]
[PDF 844 KB]
(967)
|
|
3498 |
LU Ling, YANG Wu, YANG Youjun, CHEN Menghan |
|
|
Chinese short text classification method by combining semantic expansion and convolutional neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3498-3503
[Abstract]
(576)
[HTML 1 KB]
[PDF 928 KB]
(955)
|
|
3482 |
QIU Baozhi, TANG Yamin |
|
|
Efficient clustering algorithm for fast recognition of density backbone |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3482-3486
[Abstract]
(512)
[HTML 1 KB]
[PDF 810 KB]
(689)
|
|
3458 |
WANG Zeyu, WU Yanxia, ZHANG Guoyin, BU Shuhui |
|
|
Three-dimensional spatial structured encoding deep network for RGB-D scene parsing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3458-3466
[Abstract]
(653)
[HTML 1 KB]
[PDF 11074 KB]
(1136)
|
|
3442 |
CHEN Gang, GUO Yudong, WEI Xiaofeng |
|
|
Dynamic defense method of Web server based on Linux namespace |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3442-3446
[Abstract]
(531)
[HTML 1 KB]
[PDF 811 KB]
(732)
|
|
3423 |
WANG Jingwei, YIN Xinchun |
|
|
Ciphertext policy attribute-based encryption scheme with weighted attribute revocation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3423-3429
[Abstract]
(547)
[HTML 1 KB]
[PDF 1079 KB]
(788)
|
|
3381 |
HU Qiang, LIN Yun |
|
|
Adaptive compressed sensing algorithm based on observation matrix optimization |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3381-3385
[Abstract]
(548)
[HTML 1 KB]
[PDF 780 KB]
(471)
|
|
3374 |
LI Xinchun, GAO Baisheng |
|
|
WSN routing algorithm based on optimal number of clusters and improved gravitational search |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3374-3380
[Abstract]
(438)
[HTML 1 KB]
[PDF 1066 KB]
(567)
|
|
3361 |
LIAO Han, MA Dongya, YIN Lixin |
|
|
Capacity optimization of secondary user system in MIMO cognitive networks based on non-orthogonal multiple access |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3361-3367
[Abstract]
(459)
[HTML 1 KB]
[PDF 1016 KB]
(487)
|
|
3356 |
FAN Zifu, HU Min, LI Yuening |
|
|
Dynamic pilot allocation based on graph coloring in massive MIMO systems |
|
|
|
Journal of Computer Applications
2017 Vol.37 (12): 3356-3360
[Abstract]
(531)
[HTML 1 KB]
[PDF 785 KB]
(587)
|
|
3339 |
GUO Hao, LIU Lei, CHEN Junjie |
|
|
Brain network analysis and classification for patients of Alzheimer's disease based on high-order minimum spanning tree |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3339-3344
[Abstract]
(525)
[HTML 1 KB]
[PDF 1091 KB]
(598)
|
|
3335 |
ZENG Ling, XIAO Ruliang |
|
|
Session identification algorithm based on dynamic time threshold of adjacent requests |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3335-3338
[Abstract]
(606)
[HTML 1 KB]
[PDF 674 KB]
(540)
|
|
3330 |
WU Qingsong, YANG Hongbing, FANG Jia |
|
|
Production scheduling and preventive maintenance integrated optimization based on catastrophe mechanism |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3330-3334
[Abstract]
(558)
[HTML 1 KB]
[PDF 769 KB]
(506)
|
|
3304 |
GU Zeyu, ZHANG Xingming, LIN Senjie |
|
|
Load-aware dynamic scheduling mechanism based on security strategies |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3304-3310
[Abstract]
(649)
[HTML 1 KB]
[PDF 1196 KB]
(556)
|
|
3294 |
JIANG Zhongqing, ZHOU Anmin, JIA Peng |
|
|
DEX unpacking technology in ART virtual machine |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3294-3298
[Abstract]
(761)
[HTML 1 KB]
[PDF 980 KB]
(704)
|
|
3288 |
ZHOU Min, ZHOU Anmin, LIU Liang, JIA Peng, TAN Cuijiang |
|
|
Mining denial of service vulnerability in Android applications automatically |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3288-3293
[Abstract]
(643)
[HTML 1 KB]
[PDF 1044 KB]
(535)
|
|
3270 |
PENG Hongxing, HU Yiwen, YANG Xueqing, LI Xingwang |
|
|
Upper bounds on sum rate of 3D distributed MIMO systems over
K fading cpmposite channels |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3270-3275
[Abstract]
(506)
[HTML 1 KB]
[PDF 861 KB]
(510)
|
|
3238 |
ZHU Jie, WU Shufang, XIE Bojun, MA Liyan |
|
|
Color based compact hierarchical image representation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3238-3243
[Abstract]
(444)
[HTML 1 KB]
[PDF 1047 KB]
(499)
|
|
3226 |
SUN Qiang, TAN Xiaoyang |
|
|
Super-resolution and frontalization in unconstrained face images |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3226-3230
[Abstract]
(690)
[HTML 1 KB]
[PDF 963 KB]
(528)
|
|
3212 |
ZHANG Yongliang, ZHOU Bing, ZHAN Xiaosi, QIU Xiaoguang, LU Tianpei |
|
|
Small-size fingerprint matching based on deep learning |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3212-3218
[Abstract]
(1125)
[HTML 1 KB]
[PDF 1270 KB]
(864)
|
|
3207 |
HUANG Hongwei, GE Xiaotian, CHEN Xuansong |
|
|
Density clustering method based on complex learning classification system |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3207-3211
[Abstract]
(571)
[HTML 1 KB]
[PDF 779 KB]
(538)
|
|
3182 |
DONG Linjia, QIANG Yan, ZHAO Juanjuan, YUAN jie, ZHAO Wenting |
|
|
Automatic detection of pulmonary nodules based on 3D shape index |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3182-3187
[Abstract]
(645)
[HTML 1 KB]
[PDF 935 KB]
(614)
|
|
3139 |
YU Huangyue, WANG Han, GUO Mengting |
|
|
Video keyframe extraction based on users' interests |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3139-3144
[Abstract]
(665)
[HTML 1 KB]
[PDF 1017 KB]
(555)
|
|
3134 |
LI Xuejun, ZHANG Kaihua, SONG Huihui |
|
|
Unsupervised video segmentation by fusing multiple spatio-temporal feature representations |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3134-3138
[Abstract]
(576)
[HTML 1 KB]
[PDF 1045 KB]
(559)
|
|
3128 |
LIN Lingpeng, HUANG Tianqiang, LIN Jing |
|
|
Object tracking based on foreground discrimination and circle search |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3128-3133
[Abstract]
(559)
[HTML 1 KB]
[PDF 1049 KB]
(562)
|
|
3124 |
GUO Xiao, TAN Wenan |
|
|
High-performance image super-resolution restruction based on cascade deep convolutional network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3124-3127
[Abstract]
(684)
[HTML 1 KB]
[PDF 783 KB]
(562)
|
|
3107 |
TAN Zheng, LIU JingLei, YU Hang |
|
|
Conditional preference mining based on MaxClique |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3107-3114
[Abstract]
(525)
[HTML 1 KB]
[PDF 1274 KB]
(631)
|
|
3101 |
ZHENG Yongguang, YUE Kun, YIN Zidu, ZHANG Xuejie |
|
|
Efficient approach for selecting key users in large-scale social networks |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3101-3106
[Abstract]
(707)
[HTML 1 KB]
[PDF 965 KB]
(607)
|
|
3057 |
DAI Lijie, ZHANG Changjiang, MA Leiming |
|
|
Dynamic forecasting model of short-term PM2.5 concentration based on machine learning |
|
|
|
Journal of Computer Applications
2017 Vol.37 (11): 3057-3063
[Abstract]
(792)
[HTML 1 KB]
[PDF 1092 KB]
(729)
|
|
0 |
|
|
|
Online signature verification based on curve segment similarity matching |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(363)
[HTML 0 KB]
[PDF 863 KB]
(159)
|
|
0 |
|
|
|
BIGDATA-34 Person re-identification method based on block sparse representation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(248)
[HTML 1 KB]
[PDF 734 KB]
(467)
|
|
3034 |
ZHU Linqi, ZHANG Chong, ZHOU Xueqing, WEI Yang, HUANG Yuyang, GAO Qiming |
|
|
Nuclear magnetic resonance logging reservoir permeability prediction method based on deep belief network and kernel extreme learning machine algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3034-3038
[Abstract]
(573)
[HTML 1 KB]
[PDF 791 KB]
(571)
|
|
3017 |
XIU Chao, CAO Lin, WANG Dongfeng, ZHANG Fan |
|
|
Automatic lane division method based on echo signal of microwave radar |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3017-3023
[Abstract]
(544)
[HTML 1 KB]
[PDF 990 KB]
(506)
|
|
3012 |
HAN Jiandong, DENG Yifan |
|
|
Multi-channel pedestrian detection algorithm based on textural and contour features |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 3012-3016
[Abstract]
(662)
[HTML 1 KB]
[PDF 950 KB]
(595)
|
|
2999 |
WANG Ting, WANG Qi, HUANG Yueqi, YIN Yichao, GAO Ju |
|
|
Automatic hyponymy extracting method based on symptom components |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2999-3005
[Abstract]
(579)
[HTML 1 KB]
[PDF 1095 KB]
(595)
|
|
2983 |
LIU Jiajun, YU Gang, HU Min |
|
|
Intelligent integration approach of big data for urban infrastructure management and maintenance |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2983-2990
[Abstract]
(775)
[HTML 1 KB]
[PDF 1394 KB]
(817)
|
|
2907 |
JIN Yanxia, MA Guangyuan, LEI Haiwei |
|
|
Hybrid control rate algorithm based on dynamic adaptive streaming over HTTP protocol |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2907-2911
[Abstract]
(497)
[HTML 1 KB]
[PDF 801 KB]
(494)
|
|
2899 |
SU Jianjun, MU Shiyou, YANG bo, SUN Xiaobin, ZHAO Haiwu, GU Xiao |
|
|
Distortion analysis of digital video transcoding |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2899-2902
[Abstract]
(427)
[HTML 1 KB]
[PDF 709 KB]
(467)
|
|
2888 |
LI Xiao, GE Baozhen, LUO Qijun, LI Yunpeng, TIAN Qingguo |
|
|
Acquisition of camera dynamic extrinsic parameters in free binocular stereo vision system |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2888-2894
[Abstract]
(544)
[HTML 1 KB]
[PDF 989 KB]
(648)
|
|
2871 |
LIU Jingrong, DU Huimin, DU Qinqin |
|
|
Improvement of sub-pixel morphological anti-aliasing algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2871-2874
[Abstract]
(522)
[HTML 1 KB]
[PDF 815 KB]
(485)
|
|
2866 |
YANG Cheng |
|
|
Click through rate prediction algorithm based on user's real-time feedback |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2866-2870
[Abstract]
(1016)
[HTML 1 KB]
[PDF 780 KB]
(698)
|
|
2841 |
LIU Tong, HUANG Xiutian, MA Jianshe, SU Ping |
|
|
Image labeling based on fully-connected conditional random field |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2841-2846
[Abstract]
(548)
[HTML 1 KB]
[PDF 939 KB]
(616)
|
|
2828 |
JIN Liang, YU Jiong, YANG Xingyao, LU Liang, WANG Yuefei, GUO Binglei, Liao Bin |
|
|
Video recommendation algorithm based on clustering and hierarchical model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2828-2833
[Abstract]
(640)
[HTML 1 KB]
[PDF 1025 KB]
(750)
|
|
2823 |
ZHU Zhanlei, LI Zheng, ZHAO Ruilian |
|
|
Many-objective optimization algorithm based on linear weighted minimal/maximal dominance |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2823-2827
[Abstract]
(616)
[HTML 1 KB]
[PDF 923 KB]
(553)
|
|
2819 |
CAO Xiaolu, XIN Yunhong |
|
|
Probabilistic distribution model based on Wasserstein distance for nonlinear dimensionality reduction |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2819-2822
[Abstract]
(713)
[HTML 1 KB]
[PDF 669 KB]
(694)
|
|
2787 |
ZHANG Ning, ZHONG Shan |
|
|
Mechanism of personal privacy protection based on blockchain |
|
|
|
Journal of Computer Applications
2017 Vol.37 (10): 2787-2793
[Abstract]
(1612)
[HTML 1 KB]
[PDF 1120 KB]
(1500)
|
|
0 |
|
|
|
Research on inverse kinematics equation of six DOF Manipulator Based on six dimensional linear interpolation |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(283)
[HTML 0 KB]
[PDF 448 KB]
(260)
|
|
0 |
|
|
|
Dynamic Top-K interesting subgraph query on large-scale labeled graph |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(205)
[HTML 1 KB]
[PDF 353 KB]
(115)
|
|
0 |
XUE Yu, MEI Xue, ZHI Youran, XU Zhixin, SHI Xiang |
|
|
Method for identifying sub-health status of train door based on time series data mining |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(234)
[HTML 1 KB]
[PDF 330 KB]
(290)
|
|
0 |
|
|
|
Efficient cross domain authentication scheme based on blockchain technology |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(326)
[HTML 1 KB]
[PDF 327 KB]
(633)
|
|
0 |
|
|
|
Design of hybrid data clustering algorithm based on density peak |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(221)
[HTML 1 KB]
[PDF 1145 KB]
(322)
|
|
2433 |
WANG Xiang, HU Xuegang |
|
|
Overview on feature selection in high-dimensional and small-sample-size classification |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2433-2438
[Abstract]
(1194)
[HTML 1 KB]
[PDF 1146 KB]
(1393)
|
|
2728 |
GUO Jian |
|
|
Target detection method based on beamforming output DC response of sub-covariance matrix |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2728-2734
[Abstract]
(444)
[HTML 1 KB]
[PDF 1027 KB]
(489)
|
|
2722 |
DING Jianli, HAN Yuchao, WANG Jialiang |
|
|
Estimation method for RFID tags based on rough and fine double estimation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2722-2727
[Abstract]
(619)
[HTML 1 KB]
[PDF 1041 KB]
(491)
|
|
2717 |
CHEN Dapeng, ZHANG Jiugen, LIANG Xing |
|
|
Optimal control of chilled water system in central air-conditioning based on artificial immune and particle swarm optimization algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2717-2721
[Abstract]
(573)
[HTML 1 KB]
[PDF 775 KB]
(503)
|
|
2705 |
XU Qingyong, JIANG Shunliang, XU Shaoping, GE Yun, TANG Yiling |
|
|
Tattoo image detection algorithm based on three-channel convolution neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2705-2711
[Abstract]
(671)
[HTML 1 KB]
[PDF 1176 KB]
(726)
|
|
2700 |
XIE Xiaoyu, LIU Zhejie |
|
|
Dynamic gesture recognition method based on EMG and ACC signal |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2700-2704
[Abstract]
(983)
[HTML 1 KB]
[PDF 823 KB]
(663)
|
|
2665 |
GUO Yudong, GUO Zhigang, CHEN Gang, WEI Han |
|
|
Recommendation method based on
k nearest neighbors using data dimensionality reduction and exact Euclidean locality-sensitive hashing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2665-2670
[Abstract]
(558)
[HTML 1 KB]
[PDF 1114 KB]
(519)
|
|
2659 |
GUO Houqian, WANG Weiwei, SHANG Ying, ZHAO Ruilian |
|
|
Weak mutation test case set generation based on dynamic set evolutionary algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2659-2664
[Abstract]
(560)
[HTML 1 KB]
[PDF 1113 KB]
(476)
|
|
2576 |
REN Shuai, ZHANG Tao, YANG Tao, SUO Li, MU Dejun |
|
|
Information hiding algorithm based on spherical segmentation of 3D model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2576-2580
[Abstract]
(570)
[HTML 1 KB]
[PDF 779 KB]
(511)
|
|
2507 |
LIU Dinghao, LYU Jing, SUO Longlong, HU Xiangyu |
|
|
Spoofing detection method of carrier tracking loop statistical property analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2507-2511
[Abstract]
(443)
[HTML 1 KB]
[PDF 774 KB]
(477)
|
|
2474 |
LIU Ziyan, TANG Hu, LIU Shimei |
|
|
Multi-cell channel estimation based on compressive sensing in MASSIVE MIMO system |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2474-2478
[Abstract]
(621)
[HTML 1 KB]
[PDF 919 KB]
(810)
|
|
2463 |
MAO Lingchu, ZHAO Haitao |
|
|
Distributed deployment algorithm for connected on-demand coverage in mobile sensor network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2463-2469
[Abstract]
(537)
[HTML 1 KB]
[PDF 1106 KB]
(476)
|
|
2454 |
FENG Kai |
|
|
Conditional strong matching preclusion for
k-ary
n-cubes |
|
|
|
Journal of Computer Applications
2017 Vol.37 (9): 2454-2456
[Abstract]
(602)
[HTML 1 KB]
[PDF 623 KB]
(498)
|
|
2427 |
HUANG Leiming, WANG Liming, CHEN Zhongqin |
|
|
Time synchronization of ship fault recording device based on Lagrange once interpolation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2427-2432
[Abstract]
(700)
[HTML 1 KB]
[PDF 947 KB]
(786)
|
|
2421 |
NAN Jingchang, CUI Hongyan |
|
|
Modeling of power amplifier based on dynamic X-parameter of new two-dimensional kernel function |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2421-2426
[Abstract]
(548)
[HTML 1 KB]
[PDF 864 KB]
(661)
|
|
2416 |
GUO Leiyong, LI Yu, LIN Shengyi, TAN Hongzhou |
|
|
Excitation piecewise expansion method for speech bandwidth expansion based on hidden Markov model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2416-2420
[Abstract]
(521)
[HTML 1 KB]
[PDF 810 KB]
(640)
|
|
2410 |
DAI Zhaokun, LIU Hui, WANG Wenzhe, WANG Yanan |
|
|
Dimension reduction method of brain network state observation matrix based on Spectral Embedding |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2410-2415
[Abstract]
(550)
[HTML 1 KB]
[PDF 1084 KB]
(670)
|
|
2395 |
XIAO Chunjing, XIA Kewen, QIAO Yongwei, ZHANG Yuxiang |
|
|
Tourism route recommendation based on dynamic clustering |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2395-2400
[Abstract]
(682)
[HTML 1 KB]
[PDF 916 KB]
(739)
|
|
2381 |
ZHENG Linjang, LIU Xu, YI Bing |
|
|
Dynamic weighted real-time map matching algorithm considering spatio-temporal property |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2381-2386
[Abstract]
(657)
[HTML 1 KB]
[PDF 891 KB]
(728)
|
|
2362 |
XU Xiaowei, DU Yi, ZHOU Yuanchun |
|
|
Resident behavior model analysis method based on multi-source travel data |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2362-2367
[Abstract]
(922)
[HTML 1 KB]
[PDF 965 KB]
(894)
|
|
2349 |
YU Siqin, YAN Qiuyan, YAN Xinming |
|
|
Clustering algorithm of time series with optimal u-shapelets |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2349-2356
[Abstract]
(769)
[HTML 1 KB]
[PDF 1191 KB]
(831)
|
|
2313 |
LI Tao, HE Xiaohai, TENG Qizhi, WU Xiaoqiang |
|
|
Adaptive bi-l
p-l
2-norm based blind super-resolution reconstruction for single blurred image |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2313-2318
[Abstract]
(564)
[HTML 1 KB]
[PDF 972 KB]
(665)
|
|
2287 |
LI Zhenlin, ZHANG Wei, BAI Ping, WANG Xu'an |
|
|
BGN type outsourcing the decryption of attribute-based encryption ciphertexts |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2287-2291
[Abstract]
(1004)
[HTML 1 KB]
[PDF 765 KB]
(1135)
|
|
2281 |
GAO Jie, WU Jiangxing, HU Yuxiang, LI Junfei |
|
|
Research of control plane' anti-attacking in software-defined network based on Byzantine fault-tolerance |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2281-2286
[Abstract]
(564)
[HTML 1 KB]
[PDF 941 KB]
(769)
|
|
2264 |
CHAI Yun, XIONG Tao |
|
|
Second-order information based formation control in multi-Agent system |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2264-2269
[Abstract]
(503)
[HTML 1 KB]
[PDF 835 KB]
(514)
|
|
2244 |
ZHANG Yong, YANG Hao |
|
|
Image classification method based on optimized bag-of-visual words model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2244-2247
[Abstract]
(700)
[HTML 1 KB]
[PDF 790 KB]
(629)
|
|
2189 |
ZHANG Ting, ZHANG Tianqi, XIONG Mei |
|
|
Blind estimation of combination code sequence for TDDM-BOC based on Sanger neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2189-2194
[Abstract]
(498)
[HTML 1 KB]
[PDF 845 KB]
(467)
|
|
2184 |
HONG Liugen, ZHENG Lin, YANG Chao |
|
|
Multi-target detection via sparse recovery of least absolute shrinkage and selection operator model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2184-2188
[Abstract]
(1183)
[HTML 1 KB]
[PDF 828 KB]
(574)
|
|
2145 |
ZHANG Gang, JIANG Wei, LIU Shixiao |
|
|
Hybrid dynamic clustering algorithm for long term evolution system in unlicensed bands |
|
|
|
Journal of Computer Applications
2017 Vol.37 (8): 2145-2149
[Abstract]
(562)
[HTML 1 KB]
[PDF 929 KB]
(507)
|
|
0 |
|
|
|
MRI Data Classification Method Based on High-Order Minimum Spanning Tree |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(278)
[HTML 0 KB]
[PDF 306 KB]
(75)
|
|
0 |
Qiang Sun |
|
|
Image super-resolution and face frontalization in unconstrained image |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(432)
[HTML 1 KB]
[PDF 396 KB]
(196)
|
|
0 |
|
|
|
A CT/MR brain image fusion method via improved coupled dictionary learning |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(241)
[HTML 0 KB]
[PDF 0 KB]
(30)
|
|
0 |
Xi-Yang ZHAI WANG Xiao-danWANG LEI Lei |
|
|
Improved multi-class AdaBoost algorithm based on SAMME |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(2665)
[HTML 0 KB]
[PDF 0 KB]
(163)
|
|
0 |
|
|
|
Speech Enhancement Method Based On OS-DL |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(188)
[HTML 0 KB]
[PDF 0 KB]
(24)
|
|
0 |
|
|
|
Based on entropy theory and AHP's protection effectiveness evaluation of underground command Engineering |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(230)
[HTML 0 KB]
[PDF 0 KB]
(28)
|
|
2124 |
WANG Zhongqiang, CHEN Jide, PENG Jian, HUANG Feihu, TONG Bo |
|
|
Airline predicting algorithm based on improved Markov chain |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2124-2128
[Abstract]
(668)
[HTML 1 KB]
[PDF 756 KB]
(515)
|
|
2067 |
ZHAN Yi, LI Meng |
|
|
Variable exponent variational model for image interpolation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2067-2070
[Abstract]
(504)
[HTML 1 KB]
[PDF 702 KB]
(412)
|
|
2044 |
CUI Di, GUO Xiaoyan, CHEN Wei |
|
|
Challenges and recent progress in big data visualization |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2044-2049
[Abstract]
(878)
[HTML 1 KB]
[PDF 1184 KB]
(982)
|
|
2034 |
WANG Jing, WANG Chunmei, ZHI Jia, YANG Jiasen, CHEN Tuo |
|
|
Multi-Agent-based real-time self-adaptive discrimination method |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2034-2038
[Abstract]
(733)
[HTML 1 KB]
[PDF 988 KB]
(479)
|
|
2019 |
YANG Tao, SHI Lin, SONG Mengdie, LI Shoubin, WANG Qing |
|
|
Design and implementation of process management system supporting multi-tool collaboration |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2019-2026
[Abstract]
(640)
[HTML 1 KB]
[PDF 1269 KB]
(548)
|
|
2014 |
DONG Junfei, ZHENG Bochuan, YANG Zejing |
|
|
Character recognition of license plate based on convolution neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2014-2018
[Abstract]
(1731)
[HTML 1 KB]
[PDF 792 KB]
(1553)
|
|
2008 |
YE Lihua, WANG Lei, ZHAO Liping |
|
|
Field scene recognition method for low-small-slow unmanned aerial vehicle landing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 2008-2013
[Abstract]
(648)
[HTML 1 KB]
[PDF 1005 KB]
(432)
|
|
1999 |
ZHAO Yiding, TIAN Senping |
|
|
Facial age estimation method based on hybrid model of classification and regression |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1999-2002
[Abstract]
(941)
[HTML 1 KB]
[PDF 813 KB]
(589)
|
|
1960 |
FENG Hui, JING Xiaoyuan, ZHU Xiaoke |
|
|
Multi-view feature projection and synthesis-analysis dictionary learning for image classification |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1960-1966
[Abstract]
(694)
[HTML 1 KB]
[PDF 1171 KB]
(450)
|
|
1943 |
TIAN Jiwei, WANG Buhong, SHANG Fute |
|
|
False data injection attacks based on robust principal component analysis in smart grid |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1943-1947
[Abstract]
(734)
[HTML 1 KB]
[PDF 969 KB]
(510)
|
|
1906 |
ZHAI Guangming, LI Guohe, WU Weijiang, HONG Yunfeng, ZHOU Xiaoming, WANG Jing |
|
|
Improved algorithm of artificial bee colony based on Spark |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1906-1910
[Abstract]
(593)
[HTML 1 KB]
[PDF 766 KB]
(570)
|
|
1877 |
LI Yangguang, BAO Jianrong, JIANG Bin, LIU Chao |
|
|
Frequency offset estimation algorithm of time domain synchronous orthogonal frequency division multiplexing based on correlations of cyclic pseudo-random noise |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1877-1882
[Abstract]
(528)
[HTML 1 KB]
[PDF 988 KB]
(446)
|
|
1849 |
XU Zhongming, TAN Li, YANG Chaoyu, TANG Xiaojiang |
|
|
Node coverage optimization algorithm in directional heterogeneous wireless sensor network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1849-1854
[Abstract]
(514)
[HTML 1 KB]
[PDF 851 KB]
(534)
|
|
1837 |
YANG Qiang, ZHANG Tianqi, ZHAO Liang |
|
|
Blind period estimation of PN sequence for multipath tamed spread spectrum signal |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1837-1842
[Abstract]
(569)
[HTML 1 KB]
[PDF 893 KB]
(497)
|
|
1825 |
CAI Yueping, ZHANG Wenpeng, LUO Sen |
|
|
Minimum access guaranteed bandwidth allocation mechanism in data center network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (7): 1825-1829
[Abstract]
(662)
[HTML 1 KB]
[PDF 833 KB]
(697)
|
|
0 |
|
|
|
A Second Revision based Analysis and Evaluation Method for Education and Test Data |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(205)
[HTML 0 KB]
[PDF 0 KB]
(18)
|
|
0 |
|
|
|
Multi-target Detection via Sparse Recovery of the Lasso Model |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(237)
[HTML 1 KB]
[PDF 0 KB]
(43)
|
|
1820 |
REN Dongmei, ZHANG Yuyang, DONG Xinling |
|
|
Application of improved principal component analysis-Bayes discriminant analysis method to petroleum drilling safety evaluation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1820-1824
[Abstract]
(505)
[HTML 1 KB]
[PDF 753 KB]
(677)
|
|
1793 |
DAI Hepu, LIU Gang, HE Yanyan |
|
|
Orthogonalization of regressors in functional magnetic resonance imaging based on general linear model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1793-1797
[Abstract]
(457)
[HTML 1 KB]
[PDF 904 KB]
(494)
|
|
1782 |
WANG Xinqing, MENG Fanjie, LYU Gaowang, REN Guoting |
|
|
Unstructured road detection based on improved region growing with PCA-SVM rule |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1782-1786
[Abstract]
(736)
[HTML 1 KB]
[PDF 861 KB]
(682)
|
|
1759 |
LI Zhuo, LIU Jieyu, LI Hui, ZHOU Xiaogang, LI Weipeng |
|
|
Feature detection and description algorithm based on ORB-LATCH |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1759-1762
[Abstract]
(704)
[HTML 1 KB]
[PDF 794 KB]
(721)
|
|
1741 |
WANG Yuanlong |
|
|
Sentence composition model for reading comprehension |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1741-1746
[Abstract]
(697)
[HTML 1 KB]
[PDF 965 KB]
(774)
|
|
1735 |
LIU Xinxing, JI Donghong, REN Yafeng |
|
|
Product property sentiment analysis based on neural network model |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1735-1740
[Abstract]
(737)
[HTML 1 KB]
[PDF 897 KB]
(940)
|
|
1728 |
SANG Cheng, CHENG Jian, SHI Yiming |
|
|
Knowledge integration and semantic annotation in closed-loop lifecycle management system |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1728-1734
[Abstract]
(521)
[HTML 1 KB]
[PDF 1131 KB]
(685)
|
|
1722 |
DONG Xia, WANG Lifang, QIN Pinle, GAO Yuan |
|
|
CT/MR brain image fusion method via improved coupled dictionary learning |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1722-1727
[Abstract]
(677)
[HTML 1 KB]
[PDF 1146 KB]
(752)
|
|
1716 |
LI Zhengming, YANG Nanyue, CEN Jian |
|
|
Dictionary learning algorithm based on Fisher discriminative criterion constraint of atoms |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1716-1721
[Abstract]
(649)
[HTML 1 KB]
[PDF 1114 KB]
(705)
|
|
1708 |
XU Chao, YAN Shengye |
|
|
Improved pedestrian detection method based on convolutional neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1708-1715
[Abstract]
(642)
[HTML 1 KB]
[PDF 1327 KB]
(1235)
|
|
1702 |
YU Rujie, YANG Zhen, XIONG Huilin |
|
|
Aircraft detection and recognition based on deep convolutional neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1702-1707
[Abstract]
(652)
[HTML 1 KB]
[PDF 1130 KB]
(935)
|
|
1692 |
ZHAI Xiyang, WANG Xiaodan, LEI Lei, WEI Xiaohui |
|
|
Improved multi-class AdaBoost algorithm based on stagewise additive modeling using a multi-class exponential loss function |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1692-1696
[Abstract]
(566)
[HTML 1 KB]
[PDF 877 KB]
(541)
|
|
1680 |
XI Xi, ZHANG Fengqin, LI Xiaoqing, GUAN Hua, CHEN Guirong, WANG Mengfei |
|
|
Linear kernel support vector machine based on dual random projection |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1680-1685
[Abstract]
(466)
[HTML 1 KB]
[PDF 809 KB]
(657)
|
|
1650 |
SU Zhida, ZHU Yuefei, LIU Long |
|
|
Android malware application detection using deep learning |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1650-1656
[Abstract]
(931)
[HTML 1 KB]
[PDF 1160 KB]
(1463)
|
|
1630 |
XIE Lixia, XU Weihua |
|
|
Improved weight distribution method of vulnerability basic scoring index |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1630-1635
[Abstract]
(463)
[HTML 1 KB]
[PDF 896 KB]
(690)
|
|
1605 |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui |
|
|
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1605-1608
[Abstract]
(621)
[HTML 1 KB]
[PDF 751 KB]
(512)
|
|
1574 |
LIU Bei, TAN Xinming, CAO Wenbin |
|
|
Dynamic resource allocation strategy in Spark Streaming |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1574-1579
[Abstract]
(847)
[HTML 1 KB]
[PDF 982 KB]
(639)
|
|
1550 |
ZHANG Mingyang, CHEN Jian, WEN Yingyou, ZHAO Hong, WANG Yugang |
|
|
Fingerprint matching indoor localization algorithm based on dynamic time warping distance for Wi-Fi network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1550-1554
[Abstract]
(717)
[HTML 1 KB]
[PDF 856 KB]
(695)
|
|
1539 |
WEI Mingdong, HE Xiaomin, XU Liang |
|
|
Dynamic clustering target tracking based on energy optimization in wireless sensor networks |
|
|
|
Journal of Computer Applications
2017 Vol.37 (6): 1539-1544
[Abstract]
(531)
[HTML 1 KB]
[PDF 945 KB]
(562)
|
|
0 |
Kai FENG |
|
|
Conditional strong matching preclusion for k-ary n-cubes |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(170)
[HTML 0 KB]
[PDF 278 KB]
(375)
|
|
1516 |
NAN Jingchang, ZHANG Yunxue, GAO Mingming |
|
|
Adaptive bee colony algorithm combined with BFGS algorithm for microwave circuit harmonic balance analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1516-1520
[Abstract]
(527)
[HTML 1 KB]
[PDF 796 KB]
(506)
|
|
1503 |
WEI Hao, XU Qing |
|
|
Redundant group based trajectory abstraction algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1503-1506
[Abstract]
(665)
[HTML 1 KB]
[PDF 638 KB]
(469)
|
|
1485 |
XIONG Ruiqi, MA Changxi |
|
|
Robust vehicle route optimization for multi-depot hazardous materials transportation |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1485-1490
[Abstract]
(699)
[HTML 1 KB]
[PDF 1056 KB]
(567)
|
|
1460 |
LEI Lin, LI Lepeng, YANG Min, DONG Fangmin, SUN Shuifa |
|
|
Non-stationary subtle motion magnification based on S transform |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1460-1465
[Abstract]
(652)
[HTML 1 KB]
[PDF 1009 KB]
(478)
|
|
1434 |
TAO Pan, FU Zhongliang, ZHU Kai, WANG Lili |
|
|
Echocardiogram view recognition using deep convolutional neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1434-1438
[Abstract]
(692)
[HTML 1 KB]
[PDF 1056 KB]
(664)
|
|
1430 |
YANG Xuefeng, CHENG Yaoyu, WANG Gao |
|
|
Super-resolution algorithm for remote sensing images based on compressive sensing in wavelet domain |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1430-1433
[Abstract]
(601)
[HTML 1 KB]
[PDF 856 KB]
(555)
|
|
1419 |
LIU Qiaoling, LI Jin, XIAO Renbin |
|
|
Trend prediction of public opinion propagation based on parameter inversion — an empirical study on Sina micro-blog |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1419-1423
[Abstract]
(861)
[HTML 1 KB]
[PDF 790 KB]
(627)
|
|
1413 |
GAN Yanling, JIN Cong |
|
|
Margin discriminant projection and its application in expression recognition |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1413-1418
[Abstract]
(502)
[HTML 1 KB]
[PDF 987 KB]
(515)
|
|
1407 |
SHI Qingwei, LIU Yushi, ZHANG Fengtian |
|
|
Biterm topic evolution model of microblog |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1407-1412
[Abstract]
(739)
[HTML 1 KB]
[PDF 939 KB]
(592)
|
|
1347 |
LU Jintian, YAO Lili, HE Xudong, MENG Bo |
|
|
Improvement of OpenID Connect protocol and its security analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1347-1352
[Abstract]
(977)
[HTML 1 KB]
[PDF 1006 KB]
(614)
|
|
1326 |
WEI Chunling, WANG Bufei |
|
|
Indoor activity-recognition based on received signal strength in WLAN |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1326-1330
[Abstract]
(713)
[HTML 1 KB]
[PDF 704 KB]
(599)
|
|
1321 |
HU Jing, ZHENG Wu |
|
|
Proportional fairness and maximum weighted sum-rate in D2D communications underlaying cellular networks |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1321-1325
[Abstract]
(756)
[HTML 1 KB]
[PDF 752 KB]
(698)
|
|
1292 |
WU Congcong, HE Yichao, CHEN Yiying, LIU Xuejing, CAI Xiufeng |
|
|
Mutated bat algorithm for solving discounted {0-1} knapsack problem |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1292-1299
[Abstract]
(557)
[HTML 1 KB]
[PDF 1156 KB]
(615)
|
|
1263 |
HAN Dezhi, CHEN Xuguang, LEI Yuxin, DAI Yongtao, ZHANG Xiao |
|
|
Real-time data analysis system based on Spark Streaming and its application |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1263-1269
[Abstract]
(1137)
[HTML 1 KB]
[PDF 1159 KB]
(902)
|
|
1246 |
TANG Guofei, ZHOU Haifang, TAN Qingping |
|
|
Design and implementation of space-borne parallel remote sensing image compression system based on multi-core DSP |
|
|
|
Journal of Computer Applications
2017 Vol.37 (5): 1246-1250
[Abstract]
(611)
[HTML 1 KB]
[PDF 774 KB]
(584)
|
|
1198 |
WANG Xuqiao, WANG Jinkun |
|
|
Integrated indoor positioning algorithm based on D-S evidence theory |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1198-1201
[Abstract]
(563)
[HTML 1 KB]
[PDF 762 KB]
(595)
|
|
1185 |
FANG Yiguang, LIU Wu, ZHANG Ji, ZHANG Lingchen, YUAN Meigui, QU Lei |
|
|
Learning based kernel image differential filter for face recognition |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1185-1188
[Abstract]
(503)
[HTML 1 KB]
[PDF 767 KB]
(554)
|
|
1179 |
LIANG Rui, ZHU Qingxin, LIAO Shujiao, NIU Xinzheng |
|
|
Deep natural language description method for video based on multi-feature fusion |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1179-1184
[Abstract]
(575)
[HTML 1 KB]
[PDF 999 KB]
(646)
|
|
1169 |
LIN Jinyong, DENG Dexiang, YAN Jia, LIN Xiaoying |
|
|
Self-adaptive group based sparse representation for image inpainting |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1169-1173
[Abstract]
(990)
[HTML 1 KB]
[PDF 827 KB]
(884)
|
|
1149 |
LEI Bingbing, YAN Hua |
|
|
Garbage collection algorithm for NAND flash memory based on logical region heat |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1149-1152
[Abstract]
(578)
[HTML 1 KB]
[PDF 808 KB]
(556)
|
|
1129 |
LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli |
|
|
Benchmarks construction and evaluation for resource leak in Android apps |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1129-1134
[Abstract]
(508)
[HTML 1 KB]
[PDF 1015 KB]
(578)
|
|
1122 |
WANG Long, ZHANG Zheng, WANG Li |
|
|
Improved extended Kalman filter for attitude estimation of quadrotor |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1122-1128
[Abstract]
(790)
[HTML 1 KB]
[PDF 1094 KB]
(637)
|
|
1083 |
ZHANG Yanan, SUN Shibao, ZHANG Jingshan, YIN Lihang, YAN Xiaolong |
|
|
Opinion formation model of social network based on node intimacy and influence |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1083-1087
[Abstract]
(632)
[HTML 1 KB]
[PDF 778 KB]
(760)
|
|
1065 |
DENG Yang, ZHANG Chenxi, LI Jiangfeng |
|
|
Video shot recommendation model based on emotion analysis using time-sync comments |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1065-1070
[Abstract]
(1045)
[HTML 1 KB]
[PDF 1074 KB]
(1083)
|
|
1044 |
ZHOU Shuangshuang, XU Jin'an, CHEN Yufeng, ZHANG Yujie |
|
|
New words detection method for microblog text based on integrating of rules and statistics |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1044-1050
[Abstract]
(506)
[HTML 1 KB]
[PDF 1117 KB]
(700)
|
|
1038 |
WANG Xuerong, WAN Nianhong |
|
|
Dynamic prediction model on export sales based on controllable relevance big data of cross-border e-commerce |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1038-1043
[Abstract]
(650)
[HTML 1 KB]
[PDF 1121 KB]
(687)
|
|
1014 |
ZHU Huijuan, JIANG Tonghai, ZHOU Xi, CHENG Li, ZHAO Fan, MA Bo |
|
|
Data cleaning method based on dynamic configurable rules |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1014-1020
[Abstract]
(878)
[HTML 1 KB]
[PDF 1069 KB]
(669)
|
|
1004 |
LIU Wei, WANG Yang, ZHENG Jianbin, ZHAN Enqi |
|
|
Chinese signature authentication based on accelerometer |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 1004-1007
[Abstract]
(590)
[HTML 1 KB]
[PDF 777 KB]
(517)
|
|
954 |
LI Yang, LI Qing, ZHANG Xia |
|
|
Automatic protocol format signature construction algorithm based on discrete series protocol message |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 954-959
[Abstract]
(616)
[HTML 1 KB]
[PDF 1104 KB]
(602)
|
|
941 |
ZENG Qin, LI Yongsheng |
|
|
Three dimensional strom tracking method based on distributed computing architecture |
|
|
|
Journal of Computer Applications
2017 Vol.37 (4): 941-944
[Abstract]
(671)
[HTML 1 KB]
[PDF 706 KB]
(584)
|
|
883 |
ZHOU Huizi, HU Xuemin, CHEN Long, TIAN Mei, XIONG Dou |
|
|
Dynamic path planning for autonomous driving with avoidance of obstacles |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 883-888
[Abstract]
(1138)
[HTML 1 KB]
[PDF 1001 KB]
(1099)
|
|
876 |
LI Xiaolin, HUANG Shuang, LU Tao, LI Lin |
|
|
Administrative division extracting algorithm for non-normalized Chinese addresses |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 876-882
[Abstract]
(996)
[HTML 1 KB]
[PDF 1226 KB]
(599)
|
|
849 |
CHEN Benzhi, FANG Zhihong, XIA Yong, ZHANG Ling, LAN Shouren, WANG Lisheng |
|
|
Automatic detection of blowholes defects in X-ray images of thick steel pipes |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 849-853
[Abstract]
(698)
[HTML 1 KB]
[PDF 866 KB]
(634)
|
|
844 |
XIAO Bing, WEI Xin, HU Wei, XIA Hongjian |
|
|
Tooth segmentation algorithm based on segmentation of feature line |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 844-848
[Abstract]
(811)
[HTML 1 KB]
[PDF 916 KB]
(714)
|
|
827 |
ZHANG Jieyu |
|
|
Binarization method with local threshold based on image blocks |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 827-831
[Abstract]
(950)
[HTML 1 KB]
[PDF 889 KB]
(694)
|
|
786 |
FANG Ning, ZHOU Yu, YE Qingwei, LI Yugang |
|
|
Modal parameter identification of vibration signal based on unsupervised learning convolutional neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 786-790
[Abstract]
(786)
[HTML 1 KB]
[PDF 905 KB]
(762)
|
|
760 |
LIN Kai, CHEN Guochu, ZHANG Xin |
|
|
Multiple interactive artificial bee colony algorithm and its convergence analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 760-765
[Abstract]
(976)
[HTML 1 KB]
[PDF 893 KB]
(523)
|
|
755 |
LI Zhen, ZHENG Xiangwei, ZHANG Hui |
|
|
Virtual network embedding algorithm based on multi-objective particle swarm optimization |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 755-759
[Abstract]
(593)
[HTML 1 KB]
[PDF 940 KB]
(593)
|
|
736 |
ZHANG Zhaoxia, LIU Jie, ZHAO Yan, HU Xiu, YANG Lingzhen |
|
|
Radar signal design based on nonlinear combination modulation of piecewise fitting |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 736-740
[Abstract]
(1310)
[HTML 1 KB]
[PDF 735 KB]
(466)
|
|
699 |
DING Pengli, LI Qingyong, ZHANG Zhen, LI Feng |
|
|
Diabetic retinal image classification method based on deep neural network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 699-704
[Abstract]
(641)
[HTML 1 KB]
[PDF 1070 KB]
(690)
|
|
695 |
GUAN Feifan, YU Mei, SONG Yang, SHAO Hua, JIANG Gangyi |
|
|
Objective quality assessment method of high dynamic range image |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 695-698
[Abstract]
(1055)
[HTML 1 KB]
[PDF 813 KB]
(780)
|
|
673 |
LIANG Shuang, ZHOU Lihua, YANG Peizhong |
|
|
Query performance and data migration for social network database with shard strategy based on clustering analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 673-679
[Abstract]
(641)
[HTML 1 KB]
[PDF 1109 KB]
(463)
|
|
654 |
LI Fumin, TONG Lingling, DU Cuilan, LI Yangxi, ZHANG Yangsen |
|
|
Weibo users credibility evaluation based on user relationships |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 654-659
[Abstract]
(618)
[HTML 1 KB]
[PDF 972 KB]
(488)
|
|
628 |
TANG Lizhe, FENG Dawei, LI Dongsheng, LI Rongchun, LIU Feng |
|
|
Analysis of large-scale distributed machine learning systems: a case study on LDA |
|
|
|
Journal of Computer Applications
2017 Vol.37 (3): 628-634
[Abstract]
(981)
[HTML 1 KB]
[PDF 1169 KB]
(664)
|
|
602 |
GUO Yuhan, ZHANG Meiqi, ZHOU Nan |
|
|
Genetic algorithm with preference matrix for solving long-term carpooling problem |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 602-607
[Abstract]
(541)
[HTML 1 KB]
[PDF 918 KB]
(627)
|
|
587 |
PENG Xingxiong, XIAO Ruliang |
|
|
Multi-fractal Web log simulation generation algorithm based on stable process |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 587-592
[Abstract]
(719)
[HTML 1 KB]
[PDF 939 KB]
(494)
|
|
569 |
HUANG Zhibiao, YAO Yu |
|
|
Ultrasound image segmentation based on pixel clustering |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 569-573
[Abstract]
(787)
[HTML 1 KB]
[PDF 898 KB]
(673)
|
|
553 |
ZOU Weigang, ZHOU Zhihui, WANG Yang |
|
|
Image inpainting algorithm based on non-subsampled contourlet transform |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 553-558
[Abstract]
(608)
[HTML 1 KB]
[PDF 1059 KB]
(610)
|
|
546 |
ZHOU Shangbo, WANG Liping, YIN Xuehui |
|
|
Applications of fractional partial differential equations in image processing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 546-552
[Abstract]
(803)
[HTML 1 KB]
[PDF 1147 KB]
(863)
|
|
530 |
WANG Xiaobin, HUANG Jinjie, LIU Wenju |
|
|
Traffic sign recognition based on optimized convolutional neural network architecture |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 530-534
[Abstract]
(601)
[HTML 1 KB]
[PDF 868 KB]
(983)
|
|
512 |
FENG Shu |
|
|
Unsupervised local feature learning for robust face recognition |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 512-516
[Abstract]
(719)
[HTML 1 KB]
[PDF 843 KB]
(648)
|
|
505 |
CHEN Qiuju, LI Ying |
|
|
Sound recognition based on optimized orthogonal matching pursuit and deep belief network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 505-511
[Abstract]
(658)
[HTML 1 KB]
[PDF 1251 KB]
(590)
|
|
488 |
DENG Jingsong, LUO Yonglong, YU Qingying, CHEN Fulong |
|
|
Privacy-preserving trajectory data publishing based on non-sensitive information analysis |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 488-493
[Abstract]
(640)
[HTML 1 KB]
[PDF 1003 KB]
(702)
|
|
463 |
XU Meiling, QIAO Ying, MO Yuchang, ZHONG Farong |
|
|
Performance analysis of cluster computing systems using binary decision diagram |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 463-467
[Abstract]
(624)
[HTML 1 KB]
[PDF 869 KB]
(495)
|
|
445 |
FENG Huifang, WANG Junxia |
|
|
Dynamic centrality analysis of vehicle Ad Hoc networks |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 445-449
[Abstract]
(620)
[HTML 1 KB]
[PDF 830 KB]
(520)
|
|
432 |
MA Yao, TIAN Ming, ZHAO Zhiwei, FAN Ruilong |
|
|
Content delivery model based on polymorphic routing in named data networking |
|
|
|
Journal of Computer Applications
0 Vol. (): 432-439
[Abstract]
(811)
[HTML 1 KB]
[PDF 1339 KB]
(656)
|
|
417 |
SUN Liang, CHEN Xiaochun, ZHENG Shujian, LIU Ying |
|
|
Research and application for terminal location management system based on firmware |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 417-421
[Abstract]
(670)
[HTML 1 KB]
[PDF 848 KB]
(621)
|
|
408 |
FU Xixu, GONG Xizhang |
|
|
Spreading activation method to encrypt data with images as references |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 408-411
[Abstract]
(719)
[HTML 1 KB]
[PDF 569 KB]
(472)
|
|
402 |
ZHANG Fan, ZHANG Cong, ZHAO Zemao, XU Mingdi |
|
|
Secure instant-messaging method for mobile intelligent terminal |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 402-407
[Abstract]
(609)
[HTML 1 KB]
[PDF 1072 KB]
(646)
|
|
378 |
RONG Xing, ZHAO Yong |
|
|
Trustworthiness attestation scheme for virtual machine based on certificateless ring signature |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 378-382
[Abstract]
(649)
[HTML 1 KB]
[PDF 784 KB]
(749)
|
|
367 |
LIU Yuanying, GUO Jingfeng, WEI Lidong, HU Xinzhuan |
|
|
Fast influence maximization algorithm in social network under budget control |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 367-372
[Abstract]
(633)
[HTML 1 KB]
[PDF 878 KB]
(588)
|
|
329 |
QIN Qibing, TAN Long |
|
|
Top-Rank-
k frequent patterns mining algorithm based on TCM prescription database |
|
|
|
Journal of Computer Applications
2017 Vol.37 (2): 329-334
[Abstract]
(816)
[HTML 1 KB]
[PDF 854 KB]
(582)
|
|
299 |
XING Zhiwei, TANG Yunxiao, LUO Qian |
|
|
Dynamic estimation about service time of flight support based on Bayesian network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 299-304
[Abstract]
(571)
[HTML 1 KB]
[PDF 1004 KB]
(588)
|
|
244 |
SONG Chao, XU Xin, GUI Rong, XIE Xinfang, XU Feng |
|
|
Polarimetric synthetic aperture radar feature analysis and classification based on multi-layer support vector machine classifier |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 244-250
[Abstract]
(585)
[HTML 1 KB]
[PDF 1250 KB]
(504)
|
|
233 |
HUANG Nian'e, HUANG He, WANG Rujing |
|
|
Agriculture-related product name extraction and category labeling based on ontology and conditional random field |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 233-238
[Abstract]
(792)
[HTML 1 KB]
[PDF 940 KB]
(674)
|
|
217 |
XU Guoyu, WANG Yingfeng, MA Xiaofei, WANG Kefeng, YAN Ruoyu |
|
|
Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 217-221
[Abstract]
(677)
[HTML 1 KB]
[PDF 708 KB]
(506)
|
|
188 |
WANG Qiang, ZHANG Peilin, WANG Huaiguang, YANG Wangcan, CHEN Yanlong |
|
|
Survey on construction of measurement matrices in compressive sensing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 188-196
[Abstract]
(789)
[HTML 1 KB]
[PDF 1425 KB]
(1153)
|
|
183 |
SONG Yang, HUANG Zhiqing, ZHANG Yanxin, LI Mengjia |
|
|
Dynamic sampling method for wireless sensor network based on compressive sensing |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 183-187
[Abstract]
(682)
[HTML 1 KB]
[PDF 948 KB]
(524)
|
|
120 |
TANG Zhanyong, LI Zhen, ZHANG Cong, GONG Xiaoqing, FANG Dingyi |
|
|
Software protection method based on monitoring attack threats |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 120-127
[Abstract]
(525)
[HTML 1 KB]
[PDF 1263 KB]
(529)
|
|
114 |
ZHANG Jianxun, GU Zhimin |
|
|
Real-time online evaluation method of helper thread prefetching quality |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 114-119
[Abstract]
(612)
[HTML 1 KB]
[PDF 1172 KB]
(392)
|
|
108 |
ZHANG Weixiang, QI Yuhua, LI Dezhi |
|
|
Test case prioritization based on discrete particle swarm optimization algorithm |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 108-113
[Abstract]
(538)
[HTML 1 KB]
[PDF 1100 KB]
(591)
|
|
90 |
SONG Guozhi, WANG Cheng, TU Yao, ZHANG Dakun |
|
|
Low power mapping based on improved genetic algorithm with Prim initial population selection for 3D network-on-chip |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 90-96
[Abstract]
(660)
[HTML 1 KB]
[PDF 1103 KB]
(509)
|
|
84 |
YANG Zhiwei, CHEN Haoliang, ZHANG Bo, WU Lijuan, WU Weigang |
|
|
Data forwarding mechanism in software-defined vehicular Ad Hoc network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 84-89
[Abstract]
(742)
[HTML 1 KB]
[PDF 1090 KB]
(696)
|
|
79 |
HUANG Dan, HUANG Yan, HUAN Tian |
|
|
Data forwarding strategy based on weak state in vehicular Ad Hoc network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 79-83
[Abstract]
(666)
[HTML 1 KB]
[PDF 964 KB]
(464)
|
|
73 |
DENG Jian, DONG Baihong, CAO Hui, WU Lijuan, ZHANG Bo, WU Weigang |
|
|
Named data networking based data dissemination mechanism for vehicular Ad Hoc network |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 73-78
[Abstract]
(618)
[HTML 1 KB]
[PDF 917 KB]
(609)
|
|
65 |
BAO Wei, MAO Yingchi, WANG Longbao, CHEN Xiaoli |
|
|
Moving target tracking scheme based on dynamic clustering |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 65-72
[Abstract]
(748)
[HTML 1 KB]
[PDF 1185 KB]
(523)
|
|
48 |
XU Guoyan, LUO Zhangxuan, SONG Jian, LYU Xin |
|
|
Provenance graph query method based on double layer index structure |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 48-53
[Abstract]
(728)
[HTML 1 KB]
[PDF 858 KB]
(533)
|
|
42 |
HU Yuanyuan, XIE Jiang, ZHANG Wu |
|
|
Solution of two dimensional incompressible Navier-Stokes equation by parallel spectral finite element method |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 42-47
[Abstract]
(719)
[HTML 1 KB]
[PDF 930 KB]
(739)
|
|
37 |
FU Chen, ZHONG Cheng, YE Bo |
|
|
Accelerating parallel searching similar multiple patterns from data streams by using MapReduce |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 37-41
[Abstract]
(615)
[HTML 1 KB]
[PDF 941 KB]
(558)
|
|
24 |
MING Li, LI Tong, QIN Jianglong, ZHENG Ming, JIANG Xudong, XIE Zhongwen |
|
|
SaaS-oriented modeling and analysis of load balancing strategy |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 24-30
[Abstract]
(635)
[HTML 1 KB]
[PDF 1177 KB]
(522)
|
|
6 |
YAUN Ying, WANG Cong, WANG Cuirong, SONG Xin, LYU Yanxia |
|
|
Virtual network embedding algorithm for dynamic virtual network requests |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 6-11
[Abstract]
(670)
[HTML 1 KB]
[PDF 989 KB]
(736)
|
|
1 |
GAO Xianming, WANG Baosheng, LI Tongbiao, XUE Huawei |
|
|
Design and implementation of resource management plane in virtual router platform |
|
|
|
Journal of Computer Applications
2017 Vol.37 (1): 1-5
[Abstract]
(697)
[HTML 1 KB]
[PDF 1037 KB]
(751)
|
|
0 |
|
|
|
Research on Dynamic Resource Allocation strategy in Spark Streaming |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(350)
[HTML 0 KB]
[PDF 0 KB]
(42)
|
|
0 |
|
|
|
Research on Linear Kernel Support Vector Machine Based on Dual Random Projection |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(211)
[HTML 0 KB]
[PDF 0 KB]
(43)
|
|
0 |
|
|
|
Echocardiogram View Recognition Using Deep Convolutional Neural Networks |
|
|
|
Journal of Computer Applications
0 Vol. (): 0-0
[Abstract]
(667)
[HTML 0 KB]
[PDF 1253 KB]
(465)
|
|
3515 |
YUAN Guangjie, LI Xiaodong, JIANG Zhaoyi, YUAN Peng, GUO Zhiwei |
|
|
Mobile terminal positioning method driven by road test data |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3515-3520
[Abstract]
(933)
[HTML 1 KB]
[PDF 979 KB]
(341)
|
|
3476 |
PENG Xingxiong, XIAO Ruliang |
|
|
Simulation generating algorithm of Web log based on user interest migration |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3476-3480
[Abstract]
(553)
[HTML 1 KB]
[PDF 864 KB]
(430)
|
|
3461 |
CHEN Zhuo, ZHANG Liping, WANG Chunhui |
|
|
Clone genealogy extraction method based on software code evolution information |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3461-3467
[Abstract]
(807)
[HTML 1 KB]
[PDF 1115 KB]
(419)
|
|
3448 |
YU Hai, LI Bin, WANG Peixia, JIA Di, WANG Yongji |
|
|
Source code comments quality assessment method based on aggregation of classification algorithms |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3448-3453
[Abstract]
(809)
[HTML 1 KB]
[PDF 1127 KB]
(618)
|
|
3442 |
RUAN Feng, ZHANG Hui, LI Xuanlun |
|
|
Rapid displacement compensation method for liquid impurity detection images |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3442-3447
[Abstract]
(657)
[HTML 1 KB]
[PDF 1067 KB]
(336)
|
|
3436 |
TANG Hao, HE Chu |
|
|
SAR image scene classification with fully convolutional network and modified conditional random field-recurrent neural network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3436-3441
[Abstract]
(890)
[HTML 1 KB]
[PDF 982 KB]
(670)
|
|
3429 |
QIAN Ying, LIAO Tingting |
|
|
Cone-beam CT functional imaging method by using area integral model |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3429-3435
[Abstract]
(518)
[HTML 1 KB]
[PDF 1043 KB]
(490)
|
|
3423 |
CHENG Xiaoya, WANG Chunhong |
|
|
Characterized dictionary-based low-rank representation for face recognition |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3423-3428
[Abstract]
(713)
[HTML 1 KB]
[PDF 876 KB]
(440)
|
|
3418 |
ZHANG Kuang, ZHU Yuanping |
|
|
Text segmentation based on superpixel fusion |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3418-3422
[Abstract]
(743)
[HTML 1 KB]
[PDF 825 KB]
(429)
|
|
3411 |
WANG Haoran, XIA Kewen, REN Miaomiao, LI Chuo |
|
|
Adaptive denoising method of hyperspectral remote sensing image based on PCA and dictionary learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3411-3417
[Abstract]
(838)
[HTML 1 KB]
[PDF 1265 KB]
(561)
|
|
3402 |
FANG Yiguang, LIU Wu, GAO Mengzhu, TAN Shoubiao, ZHANG Ji |
|
|
Improved accurate image registration algorithm based on FREAK descriptor |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3402-3405
[Abstract]
(697)
[HTML 1 KB]
[PDF 806 KB]
(448)
|
|
3398 |
LI Yan, WANG Yaoli |
|
|
Backtracking regularized stage-wised orthogonal matching pursuit algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3398-3401
[Abstract]
(840)
[HTML 1 KB]
[PDF 596 KB]
(513)
|
|
3389 |
YU Yafeng, LIU Guangshuai, MA Ziheng, GAO Pan |
|
|
Improved pairwise rotation invariant co-occurrence local binary pattern algorithm used for texture feature extraction |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3389-3393
[Abstract]
(650)
[HTML 1 KB]
[PDF 801 KB]
(473)
|
|
3378 |
LIU Weixiao |
|
|
Hybrid intelligent model for fashion sales forecasting based on discrete grey forecasting model and artificial neural network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3378-3384
[Abstract]
(1052)
[HTML 1 KB]
[PDF 1039 KB]
(583)
|
|
3333 |
HUANG Bin, LU Jinjin, WANG Jianhua, WU Xingming, CHEN Weihai |
|
|
Object recognition algorithm based on deep convolution neural networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3333-3340
[Abstract]
(933)
[HTML 1 KB]
[PDF 1436 KB]
(1384)
|
|
3311 |
LIU Mei, ZHANG Yongbin, RAN Chongshan, SUN Lianshan |
|
|
Mechanism of parked domain recognition based on authoritative domain name servers |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3311-3316
[Abstract]
(724)
[HTML 1 KB]
[PDF 897 KB]
(443)
|
|
3285 |
LIN Yang, JIANG Yu'e, LIN Jie |
|
|
Local similarity detection algorithm for time series based on distributed architecture |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3285-3291
[Abstract]
(667)
[HTML 1 KB]
[PDF 1125 KB]
(524)
|
|
3269 |
LIU Dafu, SU Yang, XIE Hong'an, YANG Kai |
|
|
Analysis of evolutionary game on client's evaluation strategy selection in e-commerce |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3269-3273
[Abstract]
(1058)
[HTML 1 KB]
[PDF 746 KB]
(482)
|
|
3262 |
HUANG Guangqiu, HE Tong, LU Qiuqin |
|
|
System dynamics relevancy analysis model based on stochastic function Petri-net |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3262-3268
[Abstract]
(649)
[HTML 1 KB]
[PDF 1046 KB]
(553)
|
|
3256 |
HUANG Chengbing, TANG Gang, WANG Bo |
|
|
Non-orthogonal network coding for complex field distributed detection based on super node MAC relay |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3256-3261
[Abstract]
(655)
[HTML 1 KB]
[PDF 991 KB]
(441)
|
|
3244 |
GUAN Zhiyan, FENG Xiufang |
|
|
Coverage algorithm based on differential evolution and mixed virtual force for directional sensor networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (12): 3244-3250
[Abstract]
(613)
[HTML 1 KB]
[PDF 1073 KB]
(910)
|
|
3222 |
ZHANG Yang, ZHAO Xiaoqun, WANG Digang |
|
|
Chinese speech segmentation into syllables based on energies in different times and frequencies |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3222-3228
[Abstract]
(660)
[HTML 1 KB]
[PDF 1015 KB]
(564)
|
|
3217 |
YANG Fan, CAI Chao |
|
|
Significant visual attention method guided by object-level features |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3217-3221
[Abstract]
(780)
[HTML 1 KB]
[PDF 1006 KB]
(521)
|
|
3188 |
BIAN Le, HUO Guanying, LI Qingwu |
|
|
Multi-threshold MRI image segmentation algorithm based on Curevelet transformation and multi-objective particle swarm optimization |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3188-3195
[Abstract]
(599)
[HTML 1 KB]
[PDF 1337 KB]
(498)
|
|
3161 |
YAN Mengdi, QIN Linlin, WU Gang |
|
|
File type detection algorithm based on principal component analysis and
K nearest neighbors |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3161-3164
[Abstract]
(625)
[HTML 1 KB]
[PDF 583 KB]
(567)
|
|
3146 |
FENG Yanhong, YU Hong, SUN Geng, ZHAO Yujin |
|
|
Domain-specific term recognition method based on word embedding and conditional random field |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3146-3151
[Abstract]
(701)
[HTML 1 KB]
[PDF 982 KB]
(754)
|
|
3136 |
YANG Jie, GAO Hong, LIU Tao, LIU Wei |
|
|
Integrated berth and quay-crane scheduling based on improved genetic algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3136-3140
[Abstract]
(617)
[HTML 1 KB]
[PDF 771 KB]
(571)
|
|
3131 |
YU Shunkun, YAN Hongxu |
|
|
Evaluation model based on dual-threshold constrained tolerance dominance relation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3131-3135
[Abstract]
(628)
[HTML 1 KB]
[PDF 831 KB]
(395)
|
|
3127 |
SHEN Li, LI Jie, ZHU Huayong |
|
|
Task coordination and workload balance method for multi-robot based on trading-tree |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3127-3130
[Abstract]
(562)
[HTML 1 KB]
[PDF 765 KB]
(566)
|
|
3098 |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong |
|
|
Partially blind signature scheme with ID-based server-aided verification |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3098-3102
[Abstract]
(574)
[HTML 1 KB]
[PDF 704 KB]
(498)
|
|
3093 |
TANG Yan, LYU Guonian, ZHANG Hong |
|
|
Advanced marking scheme algorithm based on multidimensional pseudo-random sequences |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3093-3097
[Abstract]
(587)
[HTML 1 KB]
[PDF 946 KB]
(569)
|
|
3050 |
MA Junfeng, WANG Yan |
|
|
Efficient file management system based on cloud instances in smartphone |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3050-3054
[Abstract]
(562)
[HTML 1 KB]
[PDF 1004 KB]
(623)
|
|
3033 |
XIE Bin, YANG Liqing, CHEN Qin |
|
|
Improved adaptive linear minimum mean square error channel estimation algorithm in discrete wavelet transform domain based on empirical mode decomposition-singular value decomposition difference spectrum |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 3033-3038
[Abstract]
(639)
[HTML 1 KB]
[PDF 948 KB]
(513)
|
|
2974 |
BAI Xiaohong, WEN Jing, ZHAO Xue, CHEN Jinguang |
|
|
target tracking algorithm based on the speeded up robust features and multi-instance learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (11): 2974-2978
[Abstract]
(644)
[HTML 1 KB]
[PDF 797 KB]
(456)
|
|
2933 |
YE Weidong, YANG Tao |
|
|
Single-channel vibration signal blind source separation by combining extreme-point symmetric mode decomposition with time-frequency analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2933-2939
[Abstract]
(472)
[HTML 0 KB]
[PDF 1014 KB]
(501)
|
|
2927 |
WANG Sixiu, XU Zhou, WANG Xiaojie, WANG Jianghua |
|
|
Whole parameters estimation for linear frequency modulation pulse based on partial correlationtle |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2927-2932
[Abstract]
(502)
[HTML 0 KB]
[PDF 877 KB]
(475)
|
|
2922 |
JIA Yulan, HUO Zhanqiang, HOU Zhanwei, WANG Zhiheng |
|
|
Automatic positioning and detection method for jewelry based on principal component analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2922-2926
[Abstract]
(471)
[HTML 0 KB]
[PDF 739 KB]
(498)
|
|
2916 |
HE Lin, ZHANG Quan, SHANGGUAN Hong, ZHANG Wen, ZHANG Pengcheng, LIU Yi, GUI Zhiguo |
|
|
Statistical iterative algorithm based on adaptive weighted total variation for low-dose CT |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2916-2921
[Abstract]
(501)
[HTML 0 KB]
[PDF 888 KB]
(489)
|
|
2900 |
FENG Aijing, XIAO Deqin |
|
|
Motion parameter extraction algorithm for pigs under natural conditions |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2900-2906
[Abstract]
(345)
[HTML 0 KB]
[PDF 1164 KB]
(485)
|
|
2895 |
GAN Lan, ZHANG Yonghuan |
|
|
Regularized robust coding for tumor cell image recognition based on dictionary learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2895-2899
[Abstract]
(466)
[HTML 0 KB]
[PDF 928 KB]
(495)
|
|
2885 |
SHANG Changjun, DING Rui |
|
|
Gesture feature extraction of depth image based on curvature and local binary pattern |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2885-2889
[Abstract]
(513)
[HTML 0 KB]
[PDF 956 KB]
(589)
|
|
2875 |
WANG Peiyao, CAO Jiangtao, JI Xiaofei |
|
|
Two-person interaction recognition based on improved spatio-temporal interest points |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2875-2879
[Abstract]
(431)
[HTML 0 KB]
[PDF 972 KB]
(491)
|
|
2849 |
WANG Hanguang, WANG Xuguang, WANG Haoyuan |
|
|
Multi-channel real-time video stitching based on circular region of interest |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2849-2853
[Abstract]
(647)
[HTML 0 KB]
[PDF 909 KB]
(449)
|
|
2842 |
WEN Peizhi, ZHU Likun, HUANG Jia |
|
|
Realistic real-time rendering method for translucent three-dimensional objects |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2842-2848
[Abstract]
(567)
[HTML 0 KB]
[PDF 1158 KB]
(549)
|
|
2811 |
TANG Yang, ZENG Fanping, WANG Jiankang, HUANG Xinyi |
|
|
Android GUI traversal method based on static analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2811-2815
[Abstract]
(534)
[HTML 0 KB]
[PDF 759 KB]
(549)
|
|
2794 |
LIU Chunli, LI Xiaoge, LIU Rui, FAN Xian, DU Liping |
|
|
Chinese word segment based on character representation learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2794-2798
[Abstract]
(621)
[HTML 1 KB]
[PDF 754 KB]
(686)
|
|
2767 |
LI Xueming, ZHANG Chaoyang, SHE Weijun |
|
|
Review helpfulness based on opinion support of user discussion |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2767-2771
[Abstract]
(445)
[HTML 1 KB]
[PDF 941 KB]
(772)
|
|
2758 |
ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong |
|
|
Improved certificate-based aggregate proxy signature scheme |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2758-2761
[Abstract]
(416)
[HTML 1 KB]
[PDF 708 KB]
(457)
|
|
2742 |
ABDURAHMAN Kadir, MIREGULI Aili, MUTALLIP Sattar |
|
|
Adaptive asynchronous and anti-noise secure communication scheme based on hyper-chaotic Lorenz system |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2742-2746
[Abstract]
(477)
[HTML 1 KB]
[PDF 670 KB]
(405)
|
|
2738 |
WANG Xiong, DENG Lunzhi |
|
|
Provably secure undeniable signature scheme based on identity |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2738-2741
[Abstract]
(497)
[HTML 1 KB]
[PDF 749 KB]
(507)
|
|
2704 |
LU Haoyang, CHEN Shiping |
|
|
Resource allocation framework based on cloud computing package cluster mapping |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2704-2709
[Abstract]
(996)
[HTML 1 KB]
[PDF 914 KB]
(492)
|
|
2647 |
WANG Jun, YANG Yang, CHENG Yong |
|
|
Data preprocessing based recovery model in wireless meteorological sensor network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (10): 2647-2652
[Abstract]
(725)
[HTML 1 KB]
[PDF 1082 KB]
(796)
|
|
2642 |
LUO Qi, HAN Hua, GONG Jiangtao, WANG Haijun |
|
|
Random matrix denoising method based on Monte Carlo simulation as amended |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2642-2646
[Abstract]
(553)
[HTML 1 KB]
[PDF 708 KB]
(298)
|
|
2620 |
LI Zhongxun, HUA Jinzhi, LIU Zhen, ZHENG Jianbin |
|
|
Comprehensive evaluation on merchants based on G1 method improved by composite power function |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2620-2625
[Abstract]
(601)
[HTML 1 KB]
[PDF 911 KB]
(369)
|
|
2609 |
QIN Chuxiong, ZHANG Lianhai |
|
|
Acoustic modeling approach of multi-stream feature incorporated convolutional neural network for low-resource speech recognition |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2609-2615
[Abstract]
(685)
[HTML 1 KB]
[PDF 1145 KB]
(444)
|
|
2605 |
WU Xi, XU Qing, BU Hongjuan, WANG Zheng |
|
|
Metropolis ray tracing based integrated filter |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2605-2608
[Abstract]
(399)
[HTML 1 KB]
[PDF 658 KB]
(261)
|
|
2601 |
LI Weiwei, MEI Xue, ZHOU Yu |
|
|
fMRI time series stepwise denoising based on wavelet transform |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2601-2604
[Abstract]
(450)
[HTML 1 KB]
[PDF 734 KB]
(292)
|
|
2597 |
ZHANG Gengning, WANG Jiabao, LI Yang, MIAO Zhuang, ZHANG Yafei, LI Hang |
|
|
Person re-identification based on feature fusion and kernel local Fisher discriminant analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2597-2600
[Abstract]
(694)
[HTML 1 KB]
[PDF 785 KB]
(332)
|
|
2590 |
MA Zhiqiang, LI Haisheng |
|
|
Fast and effective compression for 3D dynamic scene based on KD-tree division |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2590-2596
[Abstract]
(589)
[HTML 1 KB]
[PDF 1150 KB]
(277)
|
|
2540 |
TANG Deyou, ZHOU Zilin |
|
|
No-fit-polygon-based heuristic nesting algorithm for irregular shapes |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2540-2544
[Abstract]
(776)
[HTML 1 KB]
[PDF 778 KB]
(369)
|
|
2526 |
LI Yan, ZHANG Bowen, HAO Hongwei |
|
|
Query expansion with semantic vector representation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2526-2530
[Abstract]
(560)
[HTML 1 KB]
[PDF 905 KB]
(306)
|
|
2508 |
LI Yandong, HAO Zongbo, LEI Hang |
|
|
Survey of convolutional neural network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2508-2515
[Abstract]
(6525)
[HTML 1 KB]
[PDF 1569 KB]
(17784)
|
|
2486 |
ZHANG Lei, ZHU Yixin, XU Chun, YU Kai |
|
|
Software defect detection algorithm based on dictionary learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2486-2491
[Abstract]
(477)
[HTML 1 KB]
[PDF 881 KB]
(360)
|
|
2481 |
ZHAO Di, HUA Baojian, ZHU Hongjun |
|
|
Design and implementation of performance comparing frame for higher-order code elimination |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2481-2485
[Abstract]
(530)
[HTML 1 KB]
[PDF 713 KB]
(337)
|
|
2475 |
JIN Yan, PENG Xinguang |
|
|
Composite classification model learned on multiple isolated subdomains for imbalanced class |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2475-2480
[Abstract]
(577)
[HTML 1 KB]
[PDF 878 KB]
(235)
|
|
2452 |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang |
|
|
Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2452-2458
[Abstract]
(507)
[HTML 1 KB]
[PDF 1002 KB]
(316)
|
|
2447 |
XIE Hong'an, LI Dong, SU Yang, YANG Kai |
|
|
Trusted network management model based on clustering analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2447-2451
[Abstract]
(578)
[HTML 1 KB]
[PDF 936 KB]
(386)
|
|
2427 |
XIAO Mansheng, XIAO Zhe |
|
|
Improvement of penalty factor in suppressed fuzzy C-means clustering |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2427-2431
[Abstract]
(480)
[HTML 1 KB]
[PDF 795 KB]
(305)
|
|
2409 |
YUAN Bin, LI Wenwei |
|
|
Design and implementation of QoE measuring tool for personal cloud storage services |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2409-2415
[Abstract]
(517)
[HTML 1 KB]
[PDF 1117 KB]
(290)
|
|
2402 |
WANG Yuefei, YU Jiong, LU Liang |
|
|
Coordinator selection strategy based on RAMCloud |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2402-2408
[Abstract]
(361)
[HTML 1 KB]
[PDF 1102 KB]
(287)
|
|
2396 |
DENG Li, YAO Li, JIN Yu |
|
|
Dynamic resource configuration based on multi-objective optimization in cloud computing |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2396-2401
[Abstract]
(632)
[HTML 1 KB]
[PDF 1092 KB]
(471)
|
|
2390 |
HE Jie, XIAO Kun |
|
|
Performance analysis of OSTBC-MIMO systems over i.n.i.d. generalized-K fading channels |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2390-2395
[Abstract]
(609)
[HTML 1 KB]
[PDF 783 KB]
(424)
|
|
2386 |
WANG Shanshan, LENG Supeng |
|
|
Friend recommendation method for mobile social networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2386-2389
[Abstract]
(543)
[HTML 1 KB]
[PDF 771 KB]
(362)
|
|
2374 |
HAO Jing, DU Taihang, JIANG Chundong, SUN Shuguang, FU Chao |
|
|
Application of parameter-tuning stochastic resonance for detecting weak signal with ultrahigh frequency |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2374-2380
[Abstract]
(804)
[HTML 1 KB]
[PDF 1141 KB]
(450)
|
|
2362 |
WANG Changzheng, MAO Jianlin, FU Lixa, GUO Ning, QU Weixian |
|
|
Coverage optimization algorithm for three-dimensional directional heterogeneous sensor network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2362-2366
[Abstract]
(598)
[HTML 1 KB]
[PDF 913 KB]
(476)
|
|
2357 |
WANG Renqun, PENG Li |
|
|
Topology-aware congestion control algorithm in data center network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (9): 2357-2361
[Abstract]
(738)
[HTML 1 KB]
[PDF 819 KB]
(652)
|
|
2335 |
ZHANG Guangsheng, LIU Wei |
|
|
Coordinating emergency task allocation of logistics service supply chain under time-to-service |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2335-2339
[Abstract]
(402)
[HTML 0 KB]
[PDF 825 KB]
(406)
|
|
2327 |
ZHANG Jianfa, ZHANG Fengfeng, SUN Lining, KUANG Shaolong |
|
|
Camera calibration method of surgical navigation based on C-arm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2327-2331
[Abstract]
(750)
[HTML 0 KB]
[PDF 756 KB]
(589)
|
|
2306 |
HE Wei, QI Qi, ZHANG Guoyun, WU Jianhui |
|
|
Moving object detection method based on multi-information dynamic fusion |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2306-2310
[Abstract]
(429)
[HTML 0 KB]
[PDF 843 KB]
(370)
|
|
2292 |
HUANG Xiaodong, SUN Liang |
|
|
Retrieval method of images based on robust Cosine-Euclidean metric dimensionality reduction |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2292-2295
[Abstract]
(465)
[HTML 0 KB]
[PDF 766 KB]
(444)
|
|
2252 |
TENG Fei, ZHENG Chaomei, LI Wen |
|
|
Multidimensional topic model for oriented sentiment analysis based on long short-term memory |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2252-2256
[Abstract]
(812)
[HTML 0 KB]
[PDF 784 KB]
(811)
|
|
2219 |
ZENG Xiaofei, LU Jianzhu, WANG Jie |
|
|
Broadcast authentication using cooperative sensor nodes |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2219-2224
[Abstract]
(993)
[HTML 0 KB]
[PDF 966 KB]
(366)
|
|
2207 |
YANG Wanchun, ZHANG Chenxi, MU Bin |
|
|
Optimal QoS-aware service selection approach considering semantics and transactional properties |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2207-2212
[Abstract]
(1182)
[HTML 0 KB]
[PDF 875 KB]
(377)
|
|
2197 |
LI Wenjie, YANG Tao, MEI Yanying |
|
|
Two-dimensional direction-of-arrival estimation based on sparse representation of reduced covariance matrix |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2197-2201
[Abstract]
(467)
[HTML 0 KB]
[PDF 726 KB]
(372)
|
|
2192 |
WANG Youguo, DONG Hongcheng, LIU Jian |
|
|
Using noise to improve information transmission in optimal matching array stochastic resonance system |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2192-2196
[Abstract]
(438)
[HTML 0 KB]
[PDF 771 KB]
(337)
|
|
2170 |
LIU Xing, ZHANG Hao, XU Lingwei |
|
|
Beamforming based localization algorithm in 60GHz wireless local area networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2170-2174
[Abstract]
(438)
[HTML 0 KB]
[PDF 731 KB]
(417)
|
|
2163 |
DUAN Ruijie, YAO Fuqiang, LI Yonggui, GUO Pengcheng |
|
|
Dynamic spectrum allocation algorithm of HF radio access network based on intelligent frequency hopping |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2163-2169
[Abstract]
(436)
[HTML 0 KB]
[PDF 1127 KB]
(429)
|
|
2157 |
LIU Baojian, ZHANG Xiaoyi, LI Qing |
|
|
Evolutionary game theory based clustering algorithm for multi-target localization in wireless sensor network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2157-2162
[Abstract]
(436)
[HTML 0 KB]
[PDF 952 KB]
(479)
|
|
2144 |
GAO Panpan, WANG Ning, ZHOU Xuezhong, LIU Guangming, WANG Huixin |
|
|
Functional homogeneity analysis on topology module of human interaction network for disease classification |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2144-2149
[Abstract]
(604)
[HTML 0 KB]
[PDF 1006 KB]
(421)
|
|
2128 |
LIU Xi, ZHANG Xiaolu, ZHANG Xuejie |
|
|
Fair allocation of multi-dimensional resources based on intelligent optimization algorithm in heterogeneous cloud environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2128-2133
[Abstract]
(488)
[HTML 1 KB]
[PDF 1014 KB]
(487)
|
|
2121 |
WANG Yingjie, CAI Zhipeng, TONG Xiangrong, PAN Qingxian, GAO Yang, YIN Guisheng |
|
|
Online incentive mechanism based on reputation for mobile crowdsourcing system |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2121-2127
[Abstract]
(1237)
[HTML 1 KB]
[PDF 1144 KB]
(768)
|
|
2114 |
HAO Zhifeng, CHEN Wei, CAI Ruichu, HUANG Ruihui, WEN Wen, WANG Lijuan |
|
|
Performance optimization of wireless network based on canonical causal inference algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2114-2120
[Abstract]
(669)
[HTML 1 KB]
[PDF 1089 KB]
(681)
|
|
2092 |
XIN Guanlin, LIU Jinglei |
|
|
Mining Ceteris Paribus preference from preference database |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2092-2098
[Abstract]
(415)
[HTML 1 KB]
[PDF 1198 KB]
(516)
|
|
2087 |
HU Weijian, TENG Fei, LI Lingfang, WANG Huan |
|
|
Improved adaptive collaborative filtering algorithm to change of user interest |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2087-2091
[Abstract]
(490)
[HTML 1 KB]
[PDF 767 KB]
(425)
|
|
2076 |
WEN Wen, WU Biao, CAI Ruichu, HAO Zhifeng, WANG Lijuan |
|
|
Emotion classification for news readers based on multi-category semantic word clusters |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2076-2081
[Abstract]
(662)
[HTML 1 KB]
[PDF 966 KB]
(574)
|
|
2066 |
YANG Huihua, WANG Ke, LI Lingqiao, WEI Wen, HE Shengtao |
|
|
K-means clustering algorithm based on adaptive cuckoo search and its application |
|
|
|
Journal of Computer Applications
2016 Vol.36 (8): 2066-2070
[Abstract]
(676)
[HTML 1 KB]
[PDF 803 KB]
(721)
|
|
2056 |
ZHANG Wenying, HE Kunjin, ZHANG Rongli, LIU Yuxing |
|
|
3-D visualization and information management system design based on open scene graph |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 2056-2060
[Abstract]
(592)
[HTML 0 KB]
[PDF 830 KB]
(322)
|
|
2021 |
ZHANG Jiujie, ZHAI Ye, WANG Chunhui, ZHANG Liping, LIU Dongsheng |
|
|
Evolution pattern recognition and genealogy construction based on clone mapping of versions |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 2021-2030
[Abstract]
(489)
[HTML 1 KB]
[PDF 1721 KB]
(358)
|
|
1993 |
MA Youzhong, JIA Shijie, ZHANG Yongxin |
|
|
Chi-square distribution based similarity join query algorithm on high-dimensional data |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1993-1997
[Abstract]
(652)
[HTML 1 KB]
[PDF 829 KB]
(363)
|
|
1981 |
LI Bin, DI Lan, WANG Shaohua, YU Xiaotong |
|
|
Clustering algorithm with maximum distance between clusters based on improved kernel fuzzy C-means |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1981-1987
[Abstract]
(388)
[HTML 1 KB]
[PDF 886 KB]
(357)
|
|
1965 |
DU Kun, TAN Taizhe |
|
|
General method for gesture recognition in complex environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1965-1970
[Abstract]
(870)
[HTML 1 KB]
[PDF 948 KB]
(368)
|
|
1904 |
SONG Tao, WANG Xing |
|
|
Customer behavior prediction for card consumption based on two-step clustering and hidden Markov chain |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1904-1908
[Abstract]
(407)
[HTML 1 KB]
[PDF 786 KB]
(316)
|
|
1899 |
LU Xiaoyong, CHEN Musheng, WU Jhenglong, CHANG Peichan |
|
|
Web spam detection based on immune clonal feature selection and under-sampling ensemble |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1899-1903
[Abstract]
(592)
[HTML 1 KB]
[PDF 808 KB]
(297)
|
|
1870 |
WANG Xingfu, CHEN Jing, WANG Lin |
|
|
Mutation fruit fly optimization algorithm based on adaptive dynamic step size |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1870-1874
[Abstract]
(446)
[HTML 1 KB]
[PDF 768 KB]
(340)
|
|
1866 |
JIANG Tiejin, REN Yanli |
|
|
Secure outsourcing algorithm of bilinear pairings with single server |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1866-1869
[Abstract]
(430)
[HTML 1 KB]
[PDF 546 KB]
(359)
|
|
1861 |
SUN Yiru, LIANG Xiangqian, SHANG Yufang |
|
|
Identity based ring signature scheme in ideal lattice |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1861-1865
[Abstract]
(456)
[HTML 1 KB]
[PDF 889 KB]
(462)
|
|
1816 |
ZHANG Xinpeng, XU Chunxiang, ZHANG Xinyan, SAI Wei, HAN Xingyang, LIU Guoping |
|
|
Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1816-1821
[Abstract]
(538)
[HTML 1 KB]
[PDF 927 KB]
(404)
|
|
1811 |
GAO Chao, ZHENG Xiaomei, JIA Xiaoqi |
|
|
Diversified malware detection framework toward cloud platform |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1811-1815
[Abstract]
(453)
[HTML 1 KB]
[PDF 949 KB]
(372)
|
|
1789 |
FENG Huifang, LI Caihong |
|
|
Invulnerability analysis of vehicular Ad Hoc network based on complex network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (7): 1789-1792
[Abstract]
(505)
[HTML 1 KB]
[PDF 791 KB]
(350)
|
|
1724 |
HE Chuanyang, WANG Ping, ZHANG Xiaohua, SONG Danni |
|
|
Abnormal behavior detection of small and medium crowd based on intelligent video surveillance |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1724-1729
[Abstract]
(717)
[HTML 1 KB]
[PDF 905 KB]
(785)
|
|
1719 |
PAN Lei, ZHOU Huan, WANG Minghui |
|
|
Real-time detection method of abnormal event in crowds |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1719-1723
[Abstract]
(610)
[HTML 1 KB]
[PDF 735 KB]
(442)
|
|
1673 |
LI Na, ZHOU Pengbo, GENG Guohua, JIA Hui |
|
|
Quality evaluation method for color restoration image |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1673-1676
[Abstract]
(494)
[HTML 1 KB]
[PDF 645 KB]
(414)
|
|
1654 |
LI Xin, CUI Ziguan, SUN Linhui, ZHU Xiuchang |
|
|
Image super-resolution reconstruction based on local regression model |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1654-1658
[Abstract]
(596)
[HTML 1 KB]
[PDF 798 KB]
(346)
|
|
1650 |
LUO Bo, LI Tao, WANG Jie |
|
|
Tracking mechanism of service provenance based on graph |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1650-1653
[Abstract]
(445)
[HTML 1 KB]
[PDF 691 KB]
(315)
|
|
1639 |
CHEN Mingwei, SUN Lihua, XU Jianfeng |
|
|
Temporal similarity algorithm of coarse-granularity based dynamic time warping |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1639-1644
[Abstract]
(518)
[HTML 1 KB]
[PDF 974 KB]
(440)
|
|
1613 |
SU Ying, ZHANG Yong, HU Po, TU Xinhui |
|
|
Sentiment analysis research based on combination of naive Bayes and latent Dirichlet allocation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1613-1618
[Abstract]
(648)
[HTML 1 KB]
[PDF 947 KB]
(709)
|
|
1605 |
CHEN Xue, HU Xiaofeng, XU Hao |
|
|
Burst-event evolution process expression based on short-text |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1605-1612
[Abstract]
(509)
[HTML 1 KB]
[PDF 1215 KB]
(457)
|
|
1567 |
MAN Yujia, YIN Qing, ZHU Xiaodong |
|
|
Fine-grained data randomization technique based on field-sensitive pointer analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1567-1572
[Abstract]
(461)
[HTML 1 KB]
[PDF 842 KB]
(377)
|
|
1558 |
LIU Jianhua, MAO Kefei, HU Junwei |
|
|
Certificateless aggregate signcryption scheme based on bilinear pairings |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1558-1562
[Abstract]
(506)
[HTML 1 KB]
[PDF 763 KB]
(506)
|
|
1538 |
ZHANG Jing, LI Xiaopeng, WANG Hengjun, LI Junquan, YU Bin |
|
|
Real-time alert correlation approach based on attack planning graph |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1538-1543
[Abstract]
(482)
[HTML 1 KB]
[PDF 840 KB]
(360)
|
|
1510 |
WANG Feng, LI Lixin, CAO Jingyuan, PAN Cong |
|
|
Research on replication consistency of cache in publish/subscribe systems |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1510-1514
[Abstract]
(402)
[HTML 1 KB]
[PDF 804 KB]
(350)
|
|
1496 |
OU Zhengbao, GUO Chengjun |
|
|
Unambiguous capture model for binary offset carrier modulated signals based on correlation function |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1496-1501
[Abstract]
(671)
[HTML 1 KB]
[PDF 738 KB]
(426)
|
|
1486 |
LIU Xiankai |
|
|
Establishment of virtual chain network in ZigBee network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (6): 1486-1491
[Abstract]
(656)
[HTML 1 KB]
[PDF 850 KB]
(400)
|
|
1469 |
MENG Tangyu, PU Jiantao, FANG Jianjun, LIANG Lanzhen |
|
|
Synchronization estimation algorithm for attitude algorithm and external force acceleration |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1469-1474
[Abstract]
(543)
[HTML 1 KB]
[PDF 871 KB]
(1191)
|
|
1464 |
ZHANG Minlong, WANG Tao, WANG Xuping, CHANG Hongwei, WANG Fang |
|
|
Step dynamic auto-regression kernel principal component analysis and its application in fault diagnosis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1464-1468
[Abstract]
(434)
[HTML 1 KB]
[PDF 731 KB]
(436)
|
|
1430 |
WANG Jinyang, YAN Hua |
|
|
Wear-leveling algorithm for NAND flash memory based on separation of hot and cold logic pages |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1430-1433
[Abstract]
(416)
[HTML 1 KB]
[PDF 671 KB]
(544)
|
|
1410 |
ZHANG Yang, ZHAO Xiaoqun, WANG Digang |
|
|
Chinese speech segmentation method based on Gauss distribution of time spans of syllables |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1410-1414
[Abstract]
(721)
[HTML 1 KB]
[PDF 957 KB]
(430)
|
|
1394 |
MO Jianwen, ZENG Ermeng, ZHANG Tong, YUAN Hua |
|
|
Super-resolution reconstruction based on multi-dictionary learning and image patches mapping |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1394-1398
[Abstract]
(545)
[HTML 1 KB]
[PDF 960 KB]
(455)
|
|
1387 |
LI Hua, WANG Xuyang, YANG Huamin, HAN Cheng |
|
|
Illumination direction measurement based on halo analysis in high-dynamic range images |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1387-1393
[Abstract]
(400)
[HTML 1 KB]
[PDF 1084 KB]
(421)
|
|
1383 |
YANG Wenhao, LI Xiaoman |
|
|
Single Gaussian model for background using block-based gradient and linear prediction |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1383-1386
[Abstract]
(552)
[HTML 1 KB]
[PDF 642 KB]
(436)
|
|
1341 |
LIU Jiao, MA Di, MA Tengbo, ZHANG Wei |
|
|
Dynamic multi-species particle swarm optimization based on food chain mechanism |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1341-1346
[Abstract]
(538)
[HTML 1 KB]
[PDF 856 KB]
(518)
|
|
1319 |
GENG Huantong, LI Huijian, ZHAO Yaguang, CHEN Zhengpeng |
|
|
Improved NSGA-Ⅱ algorithm based on adaptive hybrid non-dominated individual sorting strategy |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1319-1324
[Abstract]
(511)
[HTML 1 KB]
[PDF 1017 KB]
(603)
|
|
1313 |
SUN Xinyu, WU Jiang, PU Qiang |
|
|
Relevance model estimation based on stable semantic clustering |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1313-1318
[Abstract]
(421)
[HTML 1 KB]
[PDF 1012 KB]
(426)
|
|
1290 |
ZHANG Junchi, HU Jie, LIU Mengchi |
|
|
Chinese natural language interface based on paraphrasing |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1290-1295
[Abstract]
(568)
[HTML 1 KB]
[PDF 1117 KB]
(504)
|
|
1284 |
XU Tao, MENG Ye |
|
|
Importance sorting method of organizational enities based on trace clustering |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1284-1289
[Abstract]
(522)
[HTML 1 KB]
[PDF 901 KB]
(483)
|
|
1257 |
HU Zhihua, YAN Shuo, XIONG Kuanjiang |
|
|
Dynamic S-box construction method and dynamic cryptography property analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1257-1261
[Abstract]
(520)
[HTML 1 KB]
[PDF 736 KB]
(528)
|
|
1246 |
LI Jie, YU Yan, WU Jiashun |
|
|
Vulnerability detection algorithm of DOM XSS based on dynamic taint analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1246-1249
[Abstract]
(835)
[HTML 1 KB]
[PDF 801 KB]
(673)
|
|
1236 |
LI Yun, CHEN Pangsen, SUN Shanlin |
|
|
Security analysis and implementation for wireless local area network access protocol via near field communication authentication |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1236-1245
[Abstract]
(517)
[HTML 1 KB]
[PDF 1362 KB]
(611)
|
|
1222 |
WANG Yuefei, YU Jiong, LU Liang |
|
|
Strategy for object index based on RAMCloud |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1222-1227
[Abstract]
(404)
[HTML 1 KB]
[PDF 876 KB]
(466)
|
|
1216 |
KE Zunwang, YU Jiong, LIAO Bin |
|
|
Adaptive multi-resource scheduling dominant resource fairness algorithm for Mesos in heterogeneous clusters |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1216-1221
[Abstract]
(492)
[HTML 1 KB]
[PDF 870 KB]
(561)
|
|
1212 |
HUANG Wei, LIN Jie, JIANG Yu'e |
|
|
Improved automatic classification algorithm of software bug report in cloud environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1212-1215
[Abstract]
(549)
[HTML 1 KB]
[PDF 705 KB]
(481)
|
|
1192 |
TIAN Zengshan, DAI Haipeng |
|
|
WiFi fingerprint database updating based on surface fitting |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1192-1195
[Abstract]
(420)
[HTML 1 KB]
[PDF 571 KB]
(564)
|
|
1183 |
LIU Yang, PENG Jian, LIU Tang, WANG Bin |
|
|
Routing algorithm based on layered mechanism in river underwater sensor networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (5): 1183-1187
[Abstract]
(514)
[HTML 1 KB]
[PDF 723 KB]
(542)
|
|
1173 |
WANG Yong, ZHAO Xianli, FU Chengqun, XIE Lijun |
|
|
Laser bathymetry waveform processing based on robust least square support vector machine |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1173-1178
[Abstract]
(493)
[HTML 1 KB]
[PDF 801 KB]
(535)
|
|
1167 |
WANG Lifu, SUN Yi |
|
|
Inpainting of seismic signal using consistent sparse representation method |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1167-1172
[Abstract]
(581)
[HTML 1 KB]
[PDF 860 KB]
(482)
|
|
1163 |
LIU Dongming, CHEN Lian, LI Xinyan |
|
|
Geometric structure analysis method based on scalable vector graphics |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1163-1166
[Abstract]
(525)
[HTML 1 KB]
[PDF 766 KB]
(543)
|
|
1096 |
NI Hao, RUAN Ruolin, LIU Fanghua, WANG Jianfeng |
|
|
Single image super-resolution via independently adjustable sparse coefficients |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1096-1099
[Abstract]
(587)
[HTML 1 KB]
[PDF 849 KB]
(446)
|
|
1092 |
JI Xiaohong, XIONG Shuhua, HE Xiaohai, CHEN Honggang |
|
|
Adaptive video super-resolution reconstruction algorithm based on multi-order derivative |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1092-1095
[Abstract]
(500)
[HTML 1 KB]
[PDF 717 KB]
(492)
|
|
1085 |
LI Peng, PENG Zongju, LI Chihang, CHEN Fen |
|
|
Fast intra hierarchical algorithm for high efficiency video coding based on texture property and spatial correlation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1085-1091
[Abstract]
(515)
[HTML 1 KB]
[PDF 1056 KB]
(466)
|
|
1054 |
QIU Gui, YAN Renwu |
|
|
Distributed collaborative filtering recommendation algorithm based on gray association analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1054-1059
[Abstract]
(666)
[HTML 1 KB]
[PDF 883 KB]
(460)
|
|
1045 |
GAO Yan, CHEN Baifan, CHAO Xuyao, MAO Fang |
|
|
Sentiment analysis of product reviews based on contrastive divergence- restricted Boltzmann machine deep learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1045-1049
[Abstract]
(769)
[HTML 1 KB]
[PDF 767 KB]
(813)
|
|
1033 |
ZHANG Wenda, XU Yuelei, NI Jiacheng, MA Shiping, SHI Hehuan |
|
|
Image target recognition method based on multi-scale block convolutional neural network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1033-1038
[Abstract]
(1038)
[HTML 1 KB]
[PDF 891 KB]
(1384)
|
|
1015 |
ZHANG Wenqiang, LU Jiaming, ZHANG Hongmei |
|
|
Fast multi-objective hybrid evolutionary algorithm for flow shop scheduling problem |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 1015-1021
[Abstract]
(493)
[HTML 1 KB]
[PDF 974 KB]
(639)
|
|
973 |
SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi |
|
|
Behavior oriented method of Android malware detection and its effectiveness |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 973-978
[Abstract]
(685)
[HTML 1 KB]
[PDF 856 KB]
(743)
|
|
966 |
JIN Jianguo, XIAO Ying, DI Zhigang |
|
|
Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 966-972
[Abstract]
(452)
[HTML 1 KB]
[PDF 1115 KB]
(531)
|
|
956 |
HUANG Wenzhen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang |
|
|
Identity-based broadcast encryption based on lattice |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 956-961
[Abstract]
(597)
[HTML 1 KB]
[PDF 883 KB]
(541)
|
|
941 |
ZHANG Yang, LIU Tingwen, SHA Hongzhou, SHI Jinqiao |
|
|
Malicious domain detection based on multiple-dimensional features |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 941-944
[Abstract]
(833)
[HTML 1 KB]
[PDF 688 KB]
(857)
|
|
899 |
LIAO Yunfeng, CHEN Yong, SUN Aiwei, SHAO Hongxiang |
|
|
Dynamic spectrum access based on budget and quality of service |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 899-904
[Abstract]
(526)
[HTML 1 KB]
[PDF 765 KB]
(475)
|
|
889 |
XIE Zehua, ZHOU Jinhe, TANG Zhijun |
|
|
Dynamic weight traffic queue scheduling algorithm for network energy efficiency optimization |
|
|
|
Journal of Computer Applications
2016 Vol.36 (4): 889-893
[Abstract]
(472)
[HTML 1 KB]
[PDF 655 KB]
(626)
|
|
849 |
CHEN Xi, YANG Tao, HE Hongsen |
|
|
Orientation angle estimation based on improved 2-D ESPRIT-like algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 849-853
[Abstract]
(700)
[HTML 1 KB]
[PDF 820 KB]
(352)
|
|
843 |
FAN Lubin, LIANG Chengji, SHE Wenjing |
|
|
Coupling model and its algorithm for coordinated scheduling of quay crane and truck under uncertain environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 843-848
[Abstract]
(682)
[HTML 1 KB]
[PDF 977 KB]
(370)
|
|
833 |
ZHOU Nan, TIAN Xuedong |
|
|
Analyzing and indexing method on LaTeX formulae |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 833-836
[Abstract]
(668)
[HTML 1 KB]
[PDF 704 KB]
(403)
|
|
811 |
JIANG Zibo, ZHAO Jingxiu, ZHANG Yuanke, MENG Jing |
|
|
Fast reconstruction algorithm for photoacoustic computed tomography in vivo |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 811-814
[Abstract]
(490)
[HTML 1 KB]
[PDF 602 KB]
(420)
|
|
800 |
ZHAO Xiaole, WU Yadong, TIAN Jinsha, ZHANG Hongying |
|
|
Single image super-resolution algorithm based on unified iterative least squares regulation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 800-805
[Abstract]
(480)
[HTML 1 KB]
[PDF 984 KB]
(431)
|
|
789 |
TIAN Jinsha, HAN Yongguo, WU Yadong, ZHAO Xiaole, ZHANG Hongying |
|
|
No-reference image quality assessment based on scale invariance |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 789-794
[Abstract]
(542)
[HTML 1 KB]
[PDF 1088 KB]
(410)
|
|
783 |
MA Yun, WANG Xiaodong, ZHANG Lianjun |
|
|
No-reference stereoscopic image quality assessment model based on natural scene statistics |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 783-788
[Abstract]
(1156)
[HTML 1 KB]
[PDF 897 KB]
(450)
|
|
774 |
LONG Chao, HAN Bo, ZHANG Yu |
|
|
Three-dimensional SLAM using Kinect and visual dictionary |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 774-778
[Abstract]
(543)
[HTML 1 KB]
[PDF 849 KB]
(445)
|
|
770 |
KONG Weiting, ZHAN Yongzhao |
|
|
Video semantic detection based on topographic independent component analysis and Gaussian mixture model |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 770-773
[Abstract]
(578)
[HTML 1 KB]
[PDF 772 KB]
(530)
|
|
740 |
LU Zhigang, SUN Yadan |
|
|
Multidimensional collaborative intelligence recommendation based on social media context |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 740-745
[Abstract]
(512)
[HTML 1 KB]
[PDF 1137 KB]
(420)
|
|
726 |
YAN Yang, ZHAO Jiapeng, LI Quangang, ZHANG Yang, LIU Tingwen, SHI Jinqiao |
|
|
Personal relation extraction based on text headline |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 726-730
[Abstract]
(803)
[HTML 1 KB]
[PDF 754 KB]
(733)
|
|
713 |
LI Jin, QIAN Xu |
|
|
Image recognition algorithm based on dual-view discriminant correlation analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 713-717
[Abstract]
(487)
[HTML 1 KB]
[PDF 850 KB]
(438)
|
|
708 |
WANG Peichong |
|
|
Improved dynamic self-adaptive teaching-learning-based optimization algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 708-712
[Abstract]
(613)
[HTML 1 KB]
[PDF 816 KB]
(508)
|
|
703 |
REN Hongge, LI Dongmei, LI Fujin |
|
|
Dynamic neural network structure design based on semi-supervised learning |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 703-707
[Abstract]
(580)
[HTML 1 KB]
[PDF 881 KB]
(498)
|
|
697 |
DENG Junfeng, ZHANG Xiaolong |
|
|
Deep learning algorithm optimization based on combination of auto-encoders |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 697-702
[Abstract]
(1086)
[HTML 1 KB]
[PDF 899 KB]
(1266)
|
|
687 |
AI Bing, DONG Minggang |
|
|
Improved particle swarm optimization algorithm based on Gaussian disturbance and natural selection |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 687-691
[Abstract]
(588)
[HTML 1 KB]
[PDF 781 KB]
(477)
|
|
670 |
LIU Chao, HU Chengyu, YAO Hong, LIANG Qingzhong, YAN Xuesong |
|
|
Non-relational data storage management mechanism for massive unstructured data |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 670-674
[Abstract]
(723)
[HTML 1 KB]
[PDF 819 KB]
(535)
|
|
665 |
HE Zhixue, LIAO Husheng |
|
|
Query processing method of XML streaming data using list |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 665-669
[Abstract]
(468)
[HTML 1 KB]
[PDF 845 KB]
(408)
|
|
647 |
WANG Yujie, JIANG Weiwei |
|
|
Audio steganalysis method based on fuzzy C-means clustering and one class support vector machine |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 647-652
[Abstract]
(657)
[HTML 1 KB]
[PDF 912 KB]
(522)
|
|
642 |
REN Shuai, SHI Fangxia, ZHANG Tao |
|
|
Information hiding scheme for 3D model based on profile analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 642-646
[Abstract]
(598)
[HTML 1 KB]
[PDF 658 KB]
(372)
|
|
633 |
SHENG Xiaodong, LI Qiang, LIU Zhaozhao |
|
|
Task scheduling method based on template genetic algorithm in cloud environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 633-636
[Abstract]
(716)
[HTML 1 KB]
[PDF 529 KB]
(436)
|
|
628 |
CAI Yong, LI Sheng |
|
|
Graphics processor unit parallel computing in Matlab and its application in topology optimization |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 628-632
[Abstract]
(914)
[HTML 1 KB]
[PDF 892 KB]
(661)
|
|
620 |
WANG Yang, WANG Bin, JIANG Tianli, LIU Huaixing, CHEN Ting |
|
|
Existence detection algorithm for non-cooperative burst signals in wideband |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 620-627
[Abstract]
(657)
[HTML 1 KB]
[PDF 1062 KB]
(403)
|
|
610 |
LIU Linlin, GUO Chengjun, TIAN Zhong |
|
|
Multipath error of deep coupling system based on integrity |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 610-615
[Abstract]
(567)
[HTML 1 KB]
[PDF 885 KB]
(358)
|
|
601 |
LI Yong, CHENG Zhirui |
|
|
Dynamic scheduling mechanism for wireless video transmission |
|
|
|
Journal of Computer Applications
2016 Vol.36 (3): 601-605
[Abstract]
(560)
[HTML 1 KB]
[PDF 926 KB]
(490)
|
|
568 |
XU Haining, CHEN Enqing, LIANG Chengwu |
|
|
Three-dimensional spatio-temporal feature extraction method for action recognition |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 568-573
[Abstract]
(670)
[HTML 1 KB]
[PDF 1005 KB]
(892)
|
|
556 |
HUANG Zhi, FU Xingwu, LIU Wanjun |
|
|
Non-local means denoising algorithm with hybrid similarity weight |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 556-562
[Abstract]
(541)
[HTML 1 KB]
[PDF 1247 KB]
(929)
|
|
551 |
ZHAO Jingkun, ZHOU Yingyue, LIN Maosong |
|
|
Image denoising algorithm based on sparse representation and nonlocal similarity |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 551-555
[Abstract]
(752)
[HTML 1 KB]
[PDF 1050 KB]
(963)
|
|
546 |
HE Chen, WANG Lei, WANG Chunmeng |
|
|
Mesh slicer: novel algorithm for 3D mesh compression |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 546-550
[Abstract]
(861)
[HTML 1 KB]
[PDF 818 KB]
(793)
|
|
531 |
LIU Bing, ZHANG Hong |
|
|
Image retrieval algorithm based on convolutional neural network and manifold ranking |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 531-534
[Abstract]
(1134)
[HTML 1 KB]
[PDF 802 KB]
(1277)
|
|
521 |
YANG Cunqiang, HAN Xiaojun, ZHANG Nan |
|
|
Super-resolution image reconstruction algorithm based on image patche iteration and sparse representation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 521-525
[Abstract]
(709)
[HTML 1 KB]
[PDF 830 KB]
(847)
|
|
516 |
HANG Bo, WANG Yi, KANG Changqing |
|
|
Computational complexity optimization for mobile audio bandwidth extension |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 516-520
[Abstract]
(603)
[HTML 1 KB]
[PDF 761 KB]
(831)
|
|
492 |
FANG Jianchao, MAO Xuesong |
|
|
Fourier spectrum analysis for non-uniform sampled signals |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 492-494
[Abstract]
(1464)
[HTML 1 KB]
[PDF 629 KB]
(1119)
|
|
483 |
XU Xiaoqiong, ZHOU Zhaorong, MA Xiaoxia, YANG Liu |
|
|
Cooperative behavior based on evolutionary game in delay tolerant networks |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 483-487
[Abstract]
(475)
[HTML 1 KB]
[PDF 883 KB]
(893)
|
|
478 |
TANG Haijian, BAO Yu, MIN Xuan, LUO Yuxuan, ZOU Yuchi |
|
|
Autonomous mobile strategy of carrier in wireless sensor network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 478-482
[Abstract]
(500)
[HTML 1 KB]
[PDF 806 KB]
(837)
|
|
465 |
MA Jianhong, ZHANG Mingyue, ZHAO Yanan |
|
|
Patent knowledge extraction method for innovation design |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 465-471
[Abstract]
(524)
[HTML 1 KB]
[PDF 1005 KB]
(907)
|
|
455 |
YU Dong, LIU Chunhua, TIAN Yue |
|
|
Personal title and career attributes extraction based on distant supervision and pattern matching |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 455-459
[Abstract]
(673)
[HTML 1 KB]
[PDF 1000 KB]
(928)
|
|
449 |
SUN Liping, GUO Yi, TANG Wenwu, XU Yongbin |
|
|
Enterprise abbreviation prediction based on constitution pattern and conditional random field |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 449-454
[Abstract]
(864)
[HTML 1 KB]
[PDF 990 KB]
(1050)
|
|
444 |
ZHANG Li, ZHANG Dongming, ZHENG Hong |
|
|
Vehicle logo recognition using convolutional neural network combined with multiple layer feature |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 444-448
[Abstract]
(626)
[HTML 1 KB]
[PDF 800 KB]
(1005)
|
|
428 |
CAI Guoyong, XIA Binbin |
|
|
Multimedia sentiment analysis based on convolutional neural network |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 428-431
[Abstract]
(844)
[HTML 1 KB]
[PDF 787 KB]
(1565)
|
|
419 |
LIANG Junjie, GAN Wenting, YU Dunhui |
|
|
Personalized recommendation algorithm based on location bitcode tree |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 419-423
[Abstract]
(472)
[HTML 1 KB]
[PDF 915 KB]
(868)
|
|
408 |
LIU Panpan, HONG Xudong, GUO Jianyi, YU Zhengtao, WEN Yonghua, CHEN Wei |
|
|
Recognition of Chinese news event correlation based on grey relational analysis |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 408-413
[Abstract]
(470)
[HTML 1 KB]
[PDF 895 KB]
(898)
|
|
402 |
CHI Yaping, WANG Yan, WANG Huili, LI Xin |
|
|
Cross-domain access control for e-government cloud based on classification |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 402-407
[Abstract]
(507)
[HTML 1 KB]
[PDF 875 KB]
(999)
|
|
382 |
XIONG Hao, REN Yanzhen, WANG Lina |
|
|
Universal steganalysis scheme of advanced audio coding |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 382-386
[Abstract]
(657)
[HTML 1 KB]
[PDF 893 KB]
(904)
|
|
377 |
TIAN Shoucai, SUN Xili, LU Yonggang |
|
|
Stochastic nonlinear dimensionality reduction based on nearest neighbors |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 377-381
[Abstract]
(637)
[HTML 1 KB]
[PDF 781 KB]
(950)
|
|
372 |
WU Jieqi, LI Xiaoyu, YUAN Xiaotong, LIU Qingshan |
|
|
Parallel sparse subspace clustering via coordinate descent minimization |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 372-376
[Abstract]
(738)
[HTML 1 KB]
[PDF 877 KB]
(979)
|
|
364 |
LI Yuanhao, LU Ping, WU Yifan, WEI Wei, SONG Guojie |
|
|
Mobile social network oriented user feature recognition of age and sex |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 364-371
[Abstract]
(581)
[HTML 1 KB]
[PDF 1248 KB]
(1067)
|
|
358 |
SONG Baoyan, JI Wanting, DING Linlin |
|
|
Similarity nodes query algorithm on large dynamic graph based on the snapshots |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 358-363
[Abstract]
(819)
[HTML 1 KB]
[PDF 951 KB]
(919)
|
|
353 |
ZHOU Guoliang, SA Churila, ZHU Yongli |
|
|
Star join algorithm based on multi-dimensional Bloom filter in Spark |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 353-357
[Abstract]
(976)
[HTML 1 KB]
[PDF 765 KB]
(901)
|
|
348 |
SA Churila, ZHOU Guoliang, SHI Lei, WANG Liuwang, SHI Xin, ZHU Yongli |
|
|
Parallel cube computing in Spark |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 348-352
[Abstract]
(518)
[HTML 1 KB]
[PDF 769 KB]
(972)
|
|
301 |
ZHAO Hong, GUO Lilu |
|
|
Space coordinate transformation algorithm for built-in accelerometer data of smartphone |
|
|
|
Journal of Computer Applications
2016 Vol.36 (2): 301-306
[Abstract]
(1857)
[HTML 1 KB]
[PDF 896 KB]
(1594)
|
|
287 |
DING Jiaru, DU Changping, ZHAO Yao, YIN Dengyu |
|
|
Path planning algorithm for unmanned aerial vehicles based on improved artificial potential field |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 287-290
[Abstract]
(975)
[HTML 1 KB]
[PDF 678 KB]
(900)
|
|
266 |
SUN Jiaze, GENG Guohua |
|
|
Global optimal matching method for 3D fragments based on swarm intelligence |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 266-270
[Abstract]
(436)
[HTML 1 KB]
[PDF 781 KB]
(354)
|
|
254 |
LIU Xinrui, REN Fengyu, LEI Guoping |
|
|
Research of domain ontology driven enterprise on-line analytical processing systems |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 254-259
[Abstract]
(462)
[HTML 1 KB]
[PDF 997 KB]
(368)
|
|
248 |
YANG Yipu, YANG Fan, PAN Guofeng, ZHANG Huimin |
|
|
River information extraction from high resolution remote sensing image based on homomorphic system filtering |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 248-253
[Abstract]
(386)
[HTML 1 KB]
[PDF 1143 KB]
(413)
|
|
227 |
WANG Chengxiao, HUANG Huixian, YANG Hui, XU Jianmin |
|
|
New improved 1-2-order fractional differential edge detection model based on Riemann-Liouville integral |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 227-232
[Abstract]
(496)
[HTML 1 KB]
[PDF 962 KB]
(466)
|
|
222 |
DUAN Fengfeng, WANG Yongbin, YANG Lifang, PAN Shujing |
|
|
Feature extraction for stereoscopic vision depth map based on principal component analysis and histogram of oriented depth gradient |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 222-226
[Abstract]
(478)
[HTML 1 KB]
[PDF 794 KB]
(734)
|
|
216 |
LI Chengwen, WANG Xiaoming |
|
|
Outsourced data encryption scheme with access privilege revocation |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 216-221
[Abstract]
(544)
[HTML 1 KB]
[PDF 958 KB]
(359)
|
|
212 |
TANG Shang, LI Yonggui, ZHU Yonggang |
|
|
Wireless communication security strategy based on differential flag byte |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 212-215
[Abstract]
(363)
[HTML 1 KB]
[PDF 757 KB]
(310)
|
|
194 |
WANG Kun, QIU Hui, YANG Haopu |
|
|
Network security situation evaluation method based on attack pattern recognition |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 194-198
[Abstract]
(571)
[HTML 1 KB]
[PDF 945 KB]
(594)
|
|
171 |
WANG Fuqiang, PENG Furong, DING Xiaohuan, LU Jianfeng |
|
|
Location-based asymmetric similarity for collaborative filtering recommendation algorithm |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 171-174
[Abstract]
(539)
[HTML 1 KB]
[PDF 702 KB]
(426)
|
|
154 |
HU Qinghui, WEI Shiwei, XIE Zhongqian, REN Yafeng |
|
|
Correlation between phrases in advertisement based on recursive autoencoder |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 154-157
[Abstract]
(635)
[HTML 1 KB]
[PDF 737 KB]
(406)
|
|
143 |
LI Kangshun, ZUO Lei, LI Wei |
|
|
Novel differential evolution algorithm based on simplex-orthogonal experimental design |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 143-149
[Abstract]
(412)
[HTML 1 KB]
[PDF 1013 KB]
(356)
|
|
128 |
GAO Qingji, LI Yongsheng, LUO Qijun |
|
|
Optimization of baggage tag reader layout based on improved particle swarm optimization |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 128-132
[Abstract]
(420)
[HTML 1 KB]
[PDF 699 KB]
(451)
|
|
101 |
LONG Zhaohua, GONG Tengfei |
|
|
Estimation algorithm of radio frequency identification tags based on non-empty slot number |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 101-106
[Abstract]
(467)
[HTML 1 KB]
[PDF 874 KB]
(355)
|
|
87 |
ZHAO Zhijin, CHEN Jinglai |
|
|
Wide-band spectrum sensing algorithm using sparsity estimation based on Gerschgorin theorem |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 87-90
[Abstract]
(584)
[HTML 1 KB]
[PDF 706 KB]
(443)
|
|
21 |
DING Xinzhe, ZHANG Zhaogong, LI Jianzhong, TAN Long, LIU Yong |
|
|
Relational algebraic operation algorithm on compressed data |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 21-26
[Abstract]
(668)
[HTML 1 KB]
[PDF 923 KB]
(415)
|
|
1 |
WENG Haixing, GONG Xueqing, ZHU Yanchao, HU Hualiang |
|
|
Implementation of distributed index in cluster environment |
|
|
|
Journal of Computer Applications
2016 Vol.36 (1): 1-7
[Abstract]
(948)
[HTML 1 KB]
[PDF 1303 KB]
(753)
|
|
3602 |
XIE Yu, HU Xintong, MENG Xiyun, LIU Yunjie |
|
|
Passenger counting system based on intelligent detection of polyvinylidene fluoride human gait |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3602-3606
[Abstract]
(494)
[HTML 1 KB]
[PDF 741 KB]
(312)
|
|
3597 |
WANG Fuqiang, LI Xiaoli, ZHANG Qiusheng, ZHANG Jinying |
|
|
Fast calculation method of multivariable control for reheat steam temperature based on Smith control and predictive functional control |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3597-3601
[Abstract]
(438)
[HTML 1 KB]
[PDF 700 KB]
(349)
|
|
3592 |
WANG Chong, AN Weiqiang, WANG Hongjuan |
|
|
Tunnel intersection modeling based on cylinder-axis aligned bounding box detection |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3592-3596
[Abstract]
(529)
[HTML 1 KB]
[PDF 677 KB]
(329)
|
|
3586 |
KONG Yu, WANG Shuying |
|
|
Information acquisition solution for automotive after-sales service based on Android platform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3586-3591
[Abstract]
(918)
[HTML 1 KB]
[PDF 991 KB]
(472)
|
|
3581 |
LAO Jiajun, YANG Jiang, ZHU Wuming |
|
|
Dynamic obstacle avoidance method of mobile online water quality monitoring platform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3581-3585
[Abstract]
(1057)
[HTML 1 KB]
[PDF 876 KB]
(391)
|
|
3550 |
YU Liyang, FAN Chunxiao, MING Yue |
|
|
Improved target tracking algorithm based on kernelized correlation filter |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3550-3554
[Abstract]
(1172)
[HTML 1 KB]
[PDF 798 KB]
(938)
|
|
3520 |
WANG Lei, WANG Bidou, LUO Gangyin, NIE Lanshun, ZHAN Dechen, TIAN Haoran |
|
|
Application of time-Petri net for process modeling of point-of-care testing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3520-3523
[Abstract]
(540)
[HTML 1 KB]
[PDF 699 KB]
(360)
|
|
3515 |
PAN Xiong, JIANG Wei, WEN Liang, ZHOU Keran, DONG Qi, WANG Junlong |
|
|
Energy consumption optimization of stochastic real-time tasks for dependable embedded system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3515-3519
[Abstract]
(577)
[HTML 1 KB]
[PDF 864 KB]
(443)
|
|
3502 |
GUO Qiang, SONG Wenjun, HU Zhaolong, HOU Lei, ZHANG Yilu, CHEN Fangjiao |
|
|
Non-equilibrium mass diffusion recommendation algorithm based on popularity |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3502-3505
[Abstract]
(496)
[HTML 1 KB]
[PDF 605 KB]
(361)
|
|
3487 |
MA Huifang, SHI Yakai, XIE Meng, ZHUANG Fuzhen |
|
|
User influence algorithm based on user content and relational structure |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3487-3490
[Abstract]
(493)
[HTML 1 KB]
[PDF 768 KB]
(270)
|
|
3481 |
LIU Li, WANG Yongheng, WEI Hang |
|
|
Fine-grained sentiment analysis oriented to product comment |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3481-3486
[Abstract]
(892)
[HTML 1 KB]
[PDF 1058 KB]
(847)
|
|
3450 |
ZOU Yu, XUE Xiaoping, ZHANG Fang, PAN Yong, PAN Teng |
|
|
Error detection algorithm of program loop control |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3450-3455
[Abstract]
(439)
[HTML 1 KB]
[PDF 945 KB]
(332)
|
|
3424 |
XUE Feng, WANG Ding, CAO Pinjun, LI Yong |
|
|
Cryptanalysis of two anonymous user authentication schemes for wireless sensor networks |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3424-3428
[Abstract]
(534)
[HTML 1 KB]
[PDF 931 KB]
(418)
|
|
3419 |
PAN Lei, LI Tingyuan |
|
|
Dynamic information security evaluation model in mobile Ad Hoc network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3419-3423
[Abstract]
(507)
[HTML 1 KB]
[PDF 726 KB]
(306)
|
|
3392 |
GUO Gang, YU Jiong, LU Liang, YING Changtian, YIN Lutong |
|
|
Data migration model based on RAMCloud hierarchical storage architecture |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3392-3397
[Abstract]
(518)
[HTML 1 KB]
[PDF 878 KB]
(366)
|
|
3368 |
WANG Donghui, HAN Jianmin, ZHUANG Jiaqi |
|
|
Efficient memory management algorithm based on segment tree and its space optimization |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3368-3373
[Abstract]
(818)
[HTML 1 KB]
[PDF 951 KB]
(502)
|
|
3357 |
ZHOU Yun, LU Xiaxia, YU Xuelian, WANG Xuegang |
|
|
Multiple input multiple output radar orthogonal waveform design of joint frequency-phase modulation based on chaos |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3357-3361
[Abstract]
(449)
[HTML 1 KB]
[PDF 655 KB]
(344)
|
|
3352 |
WANG Sixiu, GUO Wenqiang, TANG Jianguo, WANG Xiaojie |
|
|
Detection method of linear frequency modulated signal based on frequency domain phase variance weighting |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3352-3356
[Abstract]
(930)
[HTML 1 KB]
[PDF 906 KB]
(297)
|
|
3348 |
DING Yaojun |
|
|
Imbalanced network traffic classification method based on improved forest rotation algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (12): 3348-3351
[Abstract]
(650)
[HTML 1 KB]
[PDF 611 KB]
(465)
|
|
3316 |
FU Hui, WU Bin, HAN Dongxuan, HUANG Yangqiang |
|
|
Fast visual optimization defogging algorithm based on atmospheric physical model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3316-3320
[Abstract]
(558)
[HTML 0 KB]
[PDF 840 KB]
(561)
|
|
3308 |
ZHAO Wei, TIAN Zheng, YANG Lijuan, YAN Weidong, WEN Jinhuan |
|
|
Scale invariant feature transform mismatches removal based on canonical correlation analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3308-3311
[Abstract]
(507)
[HTML 0 KB]
[PDF 654 KB]
(640)
|
|
3280 |
FAN Lei, QI Guoqing |
|
|
High accuracy frequency estimation algorithm of sinusoidal signals based on fast Fourier transform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3280-3283
[Abstract]
(597)
[HTML 0 KB]
[PDF 574 KB]
(643)
|
|
3265 |
XIE Bin, CHEN Bo, LE Honghao |
|
|
Improved linear minimum mean square error channel estimation algorithm based on orthogonal frequency division multiplexing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3265-3269
[Abstract]
(459)
[HTML 0 KB]
[PDF 768 KB]
(442)
|
|
3261 |
CAO Kaitian, CHEN Xiaosi, ZHU Wenjun |
|
|
Compressive wideband spectrum blind detection based on high-order statistics |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3261-3264
[Abstract]
(557)
[HTML 0 KB]
[PDF 803 KB]
(517)
|
|
3252 |
QIU Wenhao, HUANG Kaoli, JIN Saisai, LIAN Guangyao |
|
|
Fault prediction model based on health analysis and harmony search-ant colony algorithm-support vector machine |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3252-3255
[Abstract]
(546)
[HTML 0 KB]
[PDF 730 KB]
(497)
|
|
3247 |
YIN Lutong, YU Jiong, LU Liang, YING Changtian, GUO Gang |
|
|
Video recommendation algorithm fusing comment analysis and latent factor model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3247-3251
[Abstract]
(491)
[HTML 0 KB]
[PDF 790 KB]
(652)
|
|
3227 |
WANG Shaohua, DI Lan, LIANG Jiuzhen |
|
|
Multi-dimensional fuzzy clustering image segmentation algorithm based on kernel metric and local information |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3227-3231
[Abstract]
(520)
[HTML 0 KB]
[PDF 1025 KB]
(499)
|
|
3222 |
CHEN Lifang, WANG Yun, ZHANG Feng |
|
|
Research and application of dynamic rule extraction algorithm based on rough set and decision tree |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3222-3226
[Abstract]
(511)
[HTML 0 KB]
[PDF 713 KB]
(519)
|
|
3208 |
LIN Yidong, ZHANG Yanlan, LIN Menglei |
|
|
Rough set based matrix method for dynamic change covering family |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3208-3212
[Abstract]
(452)
[HTML 0 KB]
[PDF 630 KB]
(488)
|
|
3187 |
LI Jinjing, CHEN Qingkui, LIU Baoping, LIU Bocheng |
|
|
Binary probability segmentation of video based on graphics processing unit |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3187-3193
[Abstract]
(474)
[HTML 0 KB]
[PDF 1079 KB]
(511)
|
|
3172 |
ZHANG Dongwen, LIU Chenguang, ZHANG Yang |
|
|
Fork/Join-oriented software refactoring and performance analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3172-3177
[Abstract]
(396)
[HTML 0 KB]
[PDF 853 KB]
(555)
|
|
3151 |
YUAN Lei, LIANG Dingwen, CAI Zhihua, WU Zhao, GU Qiong |
|
|
Short-term traffic flow prediction algorithm based on orthogonal differential evolution unscented Kalman filter |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3151-3156
[Abstract]
(486)
[HTML 0 KB]
[PDF 861 KB]
(431)
|
|
3139 |
LI Huiyong, CHEN Yixiang |
|
|
Improved heterogereous earliest finish time scheduling algorithm with multi-dimensional quality of service for data stream processing task in Internet of vehicles |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3139-3145
[Abstract]
(540)
[HTML 0 KB]
[PDF 1089 KB]
(634)
|
|
3112 |
HUA Qing, XU Guoyan, ZHANG Ye |
|
|
Improved Kalman algorithm for abnormal data detection based on multidimensional impact factors |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3112-3115
[Abstract]
(539)
[HTML 0 KB]
[PDF 705 KB]
(601)
|
|
3106 |
MAO Yingchi, JIE Qing, CHEN Hao |
|
|
Online abnormal event detection with spatio-temporal relationship in river networks |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3106-3111
[Abstract]
(524)
[HTML 0 KB]
[PDF 1073 KB]
(510)
|
|
3083 |
YIN Yi, WANG Yun |
|
|
Analysis method of inclusion relations between firewall rules |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3083-3086
[Abstract]
(518)
[HTML 0 KB]
[PDF 747 KB]
(593)
|
|
3063 |
ZHANG Qian, CHEN Chaogen, LIANG Hong |
|
|
Private cloud platform design based on virtualization technology |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3063-3069
[Abstract]
(675)
[HTML 0 KB]
[PDF 1140 KB]
(823)
|
|
3055 |
NAN Yang, CHEN Lin |
|
|
Performance evaluation method based on objective weight determination for data center network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3055-3058
[Abstract]
(527)
[HTML 1 KB]
[PDF 764 KB]
(743)
|
|
3026 |
MA Haifeng, YI Hebali, WANG Ye, YANG Jiahai, ZHANG Chao |
|
|
Cloud migration performance of tsinghua cloud monitoring platform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3026-3030
[Abstract]
(594)
[HTML 1 KB]
[PDF 919 KB]
(719)
|
|
3021 |
DANG Xiaochao, YANG Dongdong, HAO Zhanjun |
|
|
Three-dimensional coverage algorithm based on virtual force in sensor network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (11): 3021-3025
[Abstract]
(534)
[HTML 1 KB]
[PDF 727 KB]
(825)
|
|
3013 |
ZENG Wenhua |
|
|
3D geoinformation network sharing based on decomposition and combination method |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 3013-3016
[Abstract]
(419)
[HTML 1 KB]
[PDF 666 KB]
(498)
|
|
3008 |
XU Yuanchao, SUN Fengyun, YAN Junfeng, WAN Hu |
|
|
Directory-adaptive journaling mode selective mechanism for Android systems |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 3008-3012
[Abstract]
(487)
[HTML 1 KB]
[PDF 798 KB]
(474)
|
|
2980 |
LI Xinye, SUN Zhihua, CHEN Mingyu |
|
|
Fast algorithm for object tracking based on binary feature and structured output support vector machine |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2980-2984
[Abstract]
(478)
[HTML 1 KB]
[PDF 732 KB]
(483)
|
|
2963 |
WANG Bing, MAO Qian, SU Dongqi |
|
|
Image authentication agorithm based on two-dimensional histogram shifting |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2963-2968
[Abstract]
(455)
[HTML 1 KB]
[PDF 856 KB]
(475)
|
|
2905 |
LI Chaoxiong, HUANG Faliang, WEN Xiaoqian, LI Xuan, YUAN Chang'an |
|
|
Evolution analysis method of microblog topic-sentiment based on dynamic topic sentiment combining model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2905-2910
[Abstract]
(501)
[HTML 1 KB]
[PDF 921 KB]
(538)
|
|
2901 |
WANG Jingzhong, QIU Tongxiang |
|
|
Focused topic Web crawler based on improved TF-IDF alogorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2901-2904
[Abstract]
(537)
[HTML 1 KB]
[PDF 797 KB]
(565)
|
|
2896 |
DONG Qihai, WANG Yagang |
|
|
Partition-based binary file similarity comparison method |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2896-2900
[Abstract]
(408)
[HTML 1 KB]
[PDF 983 KB]
(511)
|
|
2883 |
YAO Wei, WANG Juan, ZHANG Shengli |
|
|
Intrusion detection model based on decision tree and Naive-Bayes classification |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2883-2885
[Abstract]
(470)
[HTML 1 KB]
[PDF 465 KB]
(641)
|
|
2867 |
WANG Qian, ZHENG Dong, REN Fang |
|
|
Code-based blind signature scheme |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2867-2871
[Abstract]
(364)
[HTML 1 KB]
[PDF 746 KB]
(358)
|
|
2858 |
SUN Li, SONG Xizhong |
|
|
Multi-slot allocation data transmission algorithm based on dynamic tree topology for wireless sensor network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2858-2862
[Abstract]
(417)
[HTML 1 KB]
[PDF 765 KB]
(1033)
|
|
2838 |
MO Yiwen, JI Donghong, HUANG Jiangping |
|
|
Slight-pause marks boundary identification based on conditional random field |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2838-2842
[Abstract]
(484)
[HTML 1 KB]
[PDF 786 KB]
(435)
|
|
2833 |
WANG Xiuqing, HOU Zengguang, PAN Shiying, TAN Min, WANG Yongji, ZENG Hui |
|
|
Corridor scene recognition for mobile robots based on multi-sonar-sensor information and NeuCube |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2833-2837
[Abstract]
(516)
[HTML 1 KB]
[PDF 769 KB]
(464)
|
|
2824 |
SHI Jiarong, ZHENG Xiuyun, YANG Wei |
|
|
Regularized approach for incomplete robust principal component analysis and its applications in background modeling |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2824-2827
[Abstract]
(654)
[HTML 1 KB]
[PDF 782 KB]
(483)
|
|
2813 |
LU Huiling, ZHOU Tao, WANG Huiqun, WANG Wenwen |
|
|
Prostate tumor CAD model based on neural network with feature-level fusion in magnetic resonance imaging |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2813-2818
[Abstract]
(417)
[HTML 1 KB]
[PDF 894 KB]
(7654)
|
|
2808 |
XU Wenxuan, ZHANG Li |
|
|
Human promoter recognition based on single nucleotide statistics and support vector machine ensemble |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2808-2812
[Abstract]
(484)
[HTML 1 KB]
[PDF 756 KB]
(422)
|
|
2798 |
HUANG Xiaojuan, ZHANG Li |
|
|
Modified multi-class support vector machine recursive feature elimination for cancer multi-classification |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2798-2802
[Abstract]
(712)
[HTML 1 KB]
[PDF 716 KB]
(865)
|
|
2781 |
ZHENG Fengfei, HUANG Wenpei, JIA Mingzheng |
|
|
Matrix factorization recommendation algorithm based on Spark |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2781-2783
[Abstract]
(721)
[HTML 1 KB]
[PDF 570 KB]
(586)
|
|
2771 |
HUANG Guoshun, WEN Han |
|
|
Conditional information entropy and attribute reduction based on boundary region |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2771-2776
[Abstract]
(398)
[HTML 1 KB]
[PDF 830 KB]
(480)
|
|
2761 |
TAN Hefeng, LIU Zhengyi |
|
|
Multi-label
K nearest neighbor algorithm by exploiting label correlation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2761-2765
[Abstract]
(571)
[HTML 1 KB]
[PDF 656 KB]
(664)
|
|
2752 |
WU Jinhua, ZUO Kaizhong, JIE Biao, DING Xintao |
|
|
New discriminative feature selection method |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2752-2756
[Abstract]
(474)
[HTML 1 KB]
[PDF 666 KB]
(469)
|
|
2747 |
LIN Jianghao, ZHOU Yongmei, YANG Aimin, CHEN Yuhong, CHEN Xiaofan |
|
|
Analysis of public emotion evolution based on probabilistic latent semantic analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2747-2751
[Abstract]
(406)
[HTML 1 KB]
[PDF 900 KB]
(575)
|
|
2721 |
SHI Shaoliang, WEN Yimin, MIAO Yuqing |
|
|
Simple multi-label ranking for Chinese microblog sentiment classification |
|
|
|
Journal of Computer Applications
2015 Vol.35 (10): 2721-2726
[Abstract]
(924)
[HTML 1 KB]
[PDF 1000 KB]
(714)
|
|
2710 |
LI Jingzhe, LI Taifu, GU Xiaohua, QIU Kui |
|
|
Anomaly detection and diagnosis of high sulfur natural gas purification process based on dynamic kernel independent component analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2710-2714
[Abstract]
(521)
[HTML 1 KB]
[PDF 739 KB]
(471)
|
|
2701 |
HAN Min, SUN Zhuoran |
|
|
Epileptic EEG signals classification based on wavelet transform and AdaBoost extreme learning machine |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2701-2705
[Abstract]
(486)
[HTML 1 KB]
[PDF 934 KB]
(511)
|
|
2673 |
ZHOU Jingxian, HU Zhihua |
|
|
Scheduling optimization for cross-over twin automated stacking cranes in automated container terminal |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2673-2677
[Abstract]
(587)
[HTML 1 KB]
[PDF 743 KB]
(369)
|
|
2652 |
LIU Yu, CAO Guo, ZHOU Licun, QU Baozhu |
|
|
Building-damage detection based on combination of multi-features |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2652-2655
[Abstract]
(516)
[HTML 1 KB]
[PDF 828 KB]
(327)
|
|
2640 |
CHEN Xianyi, ZHAO Liping, CHEN Zhizhong, LIN Tao |
|
|
2D intra string copy for screen content coding |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2640-2647
[Abstract]
(414)
[HTML 1 KB]
[PDF 1264 KB]
(320)
|
|
2624 |
ZHENG Bin, NIU Yuzhen, KE Lingling |
|
|
New multi-object image dataset construction and evaluation of visual saliency analysis algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2624-2628
[Abstract]
(516)
[HTML 1 KB]
[PDF 966 KB]
(324)
|
|
2619 |
CHEN Binbin, DENG Xinpu, YANG Jungang |
|
|
Orientation-invariant generalized Hough transform algorithm based on U-chord curvature |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2619-2623
[Abstract]
(466)
[HTML 1 KB]
[PDF 704 KB]
(315)
|
|
2616 |
YANG Huiling, LIU Hongyan, LI Yan, SUN Huiting |
|
|
Fast removal algorithm for trailing smear effect in CCD drift-scan star image |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2616-2618
[Abstract]
(598)
[HTML 1 KB]
[PDF 491 KB]
(475)
|
|
2611 |
GUO Hongshuai, SUN Dianzhu, LI Yanrui, LI Cong |
|
|
Dynamic spatial index of mesh surface for supporting STL data source |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2611-2615
[Abstract]
(484)
[HTML 1 KB]
[PDF 743 KB]
(366)
|
|
2606 |
XU Youcai, WAN Zhou |
|
|
Bearing fault diagnosis method based on conditional local mean decomposition and variable predictive model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2606-2610
[Abstract]
(445)
[HTML 1 KB]
[PDF 708 KB]
(393)
|
|
2590 |
LONG Wen, ZHAO Dongquan, XU Songjin |
|
|
Improved grey wolf optimization algorithm for constrained optimization problem |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2590-2595
[Abstract]
(2287)
[HTML 1 KB]
[PDF 842 KB]
(1138)
|
|
2584 |
TAN Yang, NING Ke, CHEN Lin |
|
|
Chromosomal translocation-based Dynamic evolutionary algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2584-2589
[Abstract]
(469)
[HTML 1 KB]
[PDF 863 KB]
(391)
|
|
2569 |
ZHENG Xiangyun, CHEN Zhigang, HUANG Rui, LI Bo |
|
|
Personalized book recommendation algorithm based on topic model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2569-2573
[Abstract]
(619)
[HTML 1 KB]
[PDF 762 KB]
(18412)
|
|
2560 |
CHEN Yongheng, ZUO Wanli, LIN Yaojing |
|
|
Sentiment-aspect analysis method based on seed words |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2560-2564
[Abstract]
(566)
[HTML 1 KB]
[PDF 884 KB]
(409)
|
|
2546 |
FU Rong |
|
|
Practical power analysis of smart card implementation of block cipher |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2546-2552
[Abstract]
(576)
[HTML 1 KB]
[PDF 1064 KB]
(11906)
|
|
2508 |
CHEN Peng, MENG Chen, WANG Cheng, CHEN Hua |
|
|
Simultaneous iterative hard thresholding for joint sparse recovery based on redundant dictionaries |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2508-2512
[Abstract]
(513)
[HTML 1 KB]
[PDF 756 KB]
(315)
|
|
2497 |
SHAO Tian, CHEN Guangsheng, JING Weipeng |
|
|
Cut-GAR: solution to determine cut-off point in cloud storage system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2497-2502
[Abstract]
(570)
[HTML 1 KB]
[PDF 864 KB]
(318)
|
|
2492 |
XIA Hao, LI Liuliu |
|
|
Internal model control based automatic tuning method for PID controller |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2492-2496
[Abstract]
(817)
[HTML 1 KB]
[PDF 699 KB]
(350)
|
|
2465 |
LI Yinuo, XIAO Ruliang, NI Youcong, SU Xiaomin, DU Xin, CAI Shengzhen |
|
|
Indoor positioning algorithm with dynamic environment attenuation based on particle filtering |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2465-2469
[Abstract]
(722)
[HTML 1 KB]
[PDF 796 KB]
(372)
|
|
2461 |
XIE Bin, LE Honghao, CHEN Bo |
|
|
Channel estimation algorithm for orthogonal frequency division multiplexing based on wavelet de-noising and discrete cosine transform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2461-2464
[Abstract]
(488)
[HTML 1 KB]
[PDF 757 KB]
(445)
|
|
2453 |
SHI Lixing, HU Fangyu |
|
|
Users' mobility analysis based on call detail record in two-dimensional space |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2453-2456
[Abstract]
(721)
[HTML 1 KB]
[PDF 752 KB]
(351)
|
|
2424 |
ZHANG Qingfeng, WANG Sheng, LIAO Dan |
|
|
Nash bargaining based resource allocation in peer-to-peer network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (9): 2424-2429
[Abstract]
(511)
[HTML 1 KB]
[PDF 994 KB]
(407)
|
|
2397 |
LI Feng, GAO Feng, KOU Peng |
|
|
Integrating piecewise linear representation and Gaussian process classification for stock turning points prediction |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2397-2403
[Abstract]
(923)
[HTML 1 KB]
[PDF 1083 KB]
(714)
|
|
2386 |
ZENG Xiangfei, GUO Fan, TU Fengtao |
|
|
Object-based dynamic taint analysis for J2EE program |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2386-2391
[Abstract]
(773)
[HTML 1 KB]
[PDF 937 KB]
(526)
|
|
2371 |
HUANG Shengbing, ZHENG Qilong, GUO Lianwei |
|
|
SIMD compiler optimization by selecting single or double word mode for clustered VLIW DSP |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2371-2374
[Abstract]
(671)
[HTML 1 KB]
[PDF 606 KB]
(387)
|
|
2350 |
PENG Xindong, YANG Yong |
|
|
Information measures for interval-valued fuzzy soft sets and their clustering algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2350-2354
[Abstract]
(730)
[HTML 1 KB]
[PDF 793 KB]
(431)
|
|
2345 |
WAN Jing, LIU Fang |
|
|
Membership of mixed dependency set in strong partial ordered temporal scheme |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2345-2349
[Abstract]
(503)
[HTML 1 KB]
[PDF 919 KB]
(366)
|
|
2341 |
MA Jinlong, ZENG Qingning, HU Dan, LONG Chao, XIE Xianming |
|
|
Speech enhancement algorithm based on microphone array under multiple noise environments |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2341-2344
[Abstract]
(481)
[HTML 1 KB]
[PDF 591 KB]
(476)
|
|
2336 |
JIN Liyan, CHEN Li, FAN Taiting, GAO Jing |
|
|
Speech denoising algorithm based on singular spectrum analysis and Wiener filtering |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2336-2340
[Abstract]
(674)
[HTML 1 KB]
[PDF 727 KB]
(608)
|
|
2316 |
CHEN Pengzhan, LI Jie, LUO Man |
|
|
Study of human motion tracking system based on wireless sensor network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2316-2320
[Abstract]
(443)
[HTML 1 KB]
[PDF 942 KB]
(382)
|
|
2301 |
WANG Xiaoyuan, ZHANG Hongying, WU Yadong, LIU Yan |
|
|
Low-illumination image enhancement based on physical model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2301-2304
[Abstract]
(683)
[HTML 1 KB]
[PDF 825 KB]
(713)
|
|
2285 |
ZHANG Heng, LIU Dayong, LIU Yanli, NIE Chenxi |
|
|
Improved binary robust invariant scalable keypoints algorithm fusing depth information |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2285-2290
[Abstract]
(603)
[HTML 1 KB]
[PDF 1012 KB]
(543)
|
|
2280 |
LYU Ruimin, CHEN Wei, MENG Lei, CHEN Lifang, WU Haotian, LI Jingyuan |
|
|
Fourier representation, rendering techniques and applications of periodic dynamic images |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2280-2284
[Abstract]
(480)
[HTML 1 KB]
[PDF 896 KB]
(368)
|
|
2274 |
LIN Zecheng, ZHU Jianqing, LIAO Shengcai, LI Stan Z. |
|
|
Uniform SILTP based background modeling and its implementation on Intel HD graphics |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2274-2279
[Abstract]
(680)
[HTML 1 KB]
[PDF 934 KB]
(405)
|
|
2266 |
ZHAO Xiaole, WU Yadong, ZHANG Hongying, ZHAO Jing |
|
|
Polynomial interpolation algorithm framework based on osculating polynomial approximation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2266-2273
[Abstract]
(557)
[HTML 1 KB]
[PDF 1379 KB]
(374)
|
|
2249 |
QIAN Shuqu, WU Huihong, XU Guofeng |
|
|
Constrained multiobjective optimization algorithm based on repairing strategy for solving dynamic environment/economic dispatch |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2249-2255
[Abstract]
(760)
[HTML 1 KB]
[PDF 967 KB]
(348)
|
|
2227 |
LI Ruiguo, ZHANG Hongli, WANG Ya |
|
|
New orthogonal basis neural network based on quantum particle swarm optimization algorithm for fractional order chaotic time series single-step prediction |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2227-2232
[Abstract]
(513)
[HTML 1 KB]
[PDF 975 KB]
(18291)
|
|
2174 |
LU Jingqiao, FU Xiufen |
|
|
Cascading failure model based on community theory in complex network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2174-2177
[Abstract]
(437)
[HTML 1 KB]
[PDF 616 KB]
(499)
|
|
2164 |
WEN Zhicheng, CAO Chunli, ZHOU Hao |
|
|
Network security situation assessment method based on Naive Bayes classifier |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2164-2168
[Abstract]
(563)
[HTML 1 KB]
[PDF 778 KB]
(546)
|
|
2137 |
GAO Wenyu, LI Hua |
|
|
Approximation algorithm of cluster vertex deletion |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2137-2139
[Abstract]
(382)
[HTML 1 KB]
[PDF 562 KB]
(452)
|
|
2129 |
ZHANG Guangyu, CHEN Hong, CAI Xiaoxia |
|
|
Blind source separation method for mixed digital modulation signals based on RobustICA |
|
|
|
Journal of Computer Applications
2015 Vol.35 (8): 2129-2132
[Abstract]
(602)
[HTML 1 KB]
[PDF 597 KB]
(393)
|
|
2105 |
YAN Dong, ZHANG Zhaoxia, ZHAO Yan, WANG Juanfen, YANG Lingzhen, SHI Junpeng |
|
|
Cognitive radar waveform design for extended target detection based on signal-to-clutter-and-noise ratio |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2105-2108
[Abstract]
(587)
[HTML 1 KB]
[PDF 703 KB]
(599)
|
|
2093 |
QIU Jigang, LI Wenlong, YANG Jia |
|
|
Path optimization algorithm for team navigation based on multiple point collaboration |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2093-2095
[Abstract]
(566)
[HTML 1 KB]
[PDF 608 KB]
(516)
|
|
2088 |
SONG Xiaoxiao, WANG Jun |
|
|
Improved artificial bee colony algorithm based on P system for 0-1 knapsack problem |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2088-2092
[Abstract]
(606)
[HTML 1 KB]
[PDF 726 KB]
(574)
|
|
2077 |
YAO Hongliang, LI Daguang, LI Junzhao |
|
|
Stock market volatility forecast based on calculation of characteristic hysteresis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2077-2082
[Abstract]
(447)
[HTML 1 KB]
[PDF 869 KB]
(546)
|
|
2056 |
XIE Pei, WU Xiaojun |
|
|
Face recognition algorithm of collaborative representation based on Shearlet transform and uniform local binary pattern |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2056-2061
[Abstract]
(358)
[HTML 1 KB]
[PDF 1149 KB]
(634)
|
|
2051 |
FEI Bowen, LIU Wanjun, SHAO Liangshan, LIU Daqian, SUN Hu |
|
|
Face recognition algorithm based on cluster-sparse of active appearance model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2051-2055
[Abstract]
(610)
[HTML 1 KB]
[PDF 864 KB]
(517)
|
|
2033 |
YANG Dayong, YANG Jianhua, LU Wei |
|
|
Foreground detection algorithm based on dynamic threshold kernel density estimation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 2033-2038
[Abstract]
(599)
[HTML 1 KB]
[PDF 971 KB]
(527)
|
|
1999 |
WANG Jinshui, XUE Xingsi, WENG Wei |
|
|
Source code summarization technology based on syntactic analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1999-2003
[Abstract]
(506)
[HTML 1 KB]
[PDF 792 KB]
(639)
|
|
1975 |
XU Hao, CHEN Xue, HU Xiaofeng |
|
|
Finding method of users' real-time demands for literature search systems |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1975-1978
[Abstract]
(384)
[HTML 1 KB]
[PDF 827 KB]
(433)
|
|
1969 |
XU Xiangping, LU Haiyan, CHENG Biyun |
|
|
Improved artificial bee colony algorithm based on dynamic evaluation selection strategy |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1969-1974
[Abstract]
(421)
[HTML 1 KB]
[PDF 831 KB]
(494)
|
|
1945 |
ZHOU Xiang, LI Shaobo, YANG Guanci |
|
|
Entity recognition of clothing commodity attributes |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1945-1949
[Abstract]
(879)
[HTML 1 KB]
[PDF 769 KB]
(749)
|
|
1933 |
ZHANG Xin, HU Xintao, GUO Lei |
|
|
Characterization of motor-related task brain states based on dynamic functional connectivity |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1933-1938
[Abstract]
(1092)
[HTML 1 KB]
[PDF 1042 KB]
(907)
|
|
1915 |
HAO Yanbin, GUO Xiao, YANG Naiding |
|
|
Computing method of attribute granule structure of information system based on incremental computation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1915-1920
[Abstract]
(397)
[HTML 1 KB]
[PDF 924 KB]
(469)
|
|
1908 |
CHEN Wenxin, SHAO Liping, SHI Jun |
|
|
Iterative adaptive reversible image watermarking algorithm combined with mean-adjustable integer transform |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1908-1914
[Abstract]
(507)
[HTML 1 KB]
[PDF 1400 KB]
(550)
|
|
1897 |
DU Ming, HAO Guosheng |
|
|
DR-PRO: cloud-storage privilege revoking optimization mechanism based on dynamic re-encryption |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1897-1902
[Abstract]
(447)
[HTML 1 KB]
[PDF 880 KB]
(544)
|
|
1854 |
HE Tingting, PENG Yuanxi, LEI Yuanwu |
|
|
Floating point divider design of high-performance double precision based on Goldschmidt's algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1854-1857
[Abstract]
(955)
[HTML 1 KB]
[PDF 740 KB]
(747)
|
|
1849 |
LI Zhenju, LI Xuejun, XIE Jianwei, LI Yannan |
|
|
Massive terrain data storage based on HBase |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1849-1853
[Abstract]
(567)
[HTML 1 KB]
[PDF 807 KB]
(712)
|
|
1824 |
CHEN Xiaolong, MA Lei, ZHANG Wenxu |
|
|
Quantized distributed Kalman filtering based on dynamic weighting |
|
|
|
Journal of Computer Applications
2015 Vol.35 (7): 1824-1828
[Abstract]
(755)
[HTML 1 KB]
[PDF 766 KB]
(642)
|
|
1780 |
PANG Yongchun, SUN Ziwen, WANG Yao |
|
|
Authentication algorithm of multi-touch based on mobile touch sensor |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1780-1784
[Abstract]
(660)
[HTML 1 KB]
[PDF 675 KB]
(529)
|
|
1749 |
SHEN Hui, YUAN Xiaotong, LIU Qingshan |
|
|
Fast super-resolution reconstruction for single image based on predictive sparse coding |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1749-1752
[Abstract]
(680)
[HTML 1 KB]
[PDF 648 KB]
(561)
|
|
1734 |
ZHOU Zhenzhen, SUN Fengrong, SONG Shangling, WANG Lixin, LUAN Yuhuan, YAO Guihua |
|
|
Spatial-temporal filtering for coronary angiography image sequence |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1734-1738
[Abstract]
(629)
[HTML 1 KB]
[PDF 784 KB]
(440)
|
|
1710 |
ZHANG Zheng, XIE Zhengguang, YANG Sanjia, JIANG Xinling |
|
|
Expectation-maximization Bernoulli-asymmetric-Gaussian approximate message passing algorithm based on compressed sensing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1710-1715
[Abstract]
(605)
[HTML 1 KB]
[PDF 932 KB]
(591)
|
|
1705 |
SHEN Xueli, SHEN Jie |
|
|
Optimization method of tracing distributed denial of service attacks based on autonomous system and dynamic probabilistic packet-marking |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1705-1709
[Abstract]
(528)
[HTML 1 KB]
[PDF 752 KB]
(575)
|
|
1678 |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen |
|
|
Identity-based proxy re-signature scheme without bilinear pairing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1678-1682
[Abstract]
(516)
[HTML 1 KB]
[PDF 761 KB]
(459)
|
|
1673 |
WANG Guangsai, ZENG Guang, HAN Wenbao, LI Yongguang |
|
|
Fast greatest common divisor algorithm based on
k-ary reduction |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1673-1677
[Abstract]
(484)
[HTML 1 KB]
[PDF 874 KB]
(438)
|
|
1617 |
WU Dinghui, KONG Fei, TIAN Na, JI Zhicheng |
|
|
Teaching and peer-learning particle swarm optimization for multi-objective flexible job-shop scheduling problem |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1617-1622
[Abstract]
(583)
[HTML 1 KB]
[PDF 1018 KB]
(533)
|
|
1611 |
XIU Yu, WANG Jun, WANG Zhongqun, LIU Sanmin |
|
|
Graph transduction via alternating minimization method based on multi-graph |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1611-1616
[Abstract]
(821)
[HTML 1 KB]
[PDF 929 KB]
(501)
|
|
1595 |
XU Haofeng, LING Qing |
|
|
Decentralized online alternating direction method of multipliers |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1595-1599
[Abstract]
(806)
[HTML 1 KB]
[PDF 826 KB]
(655)
|
|
1531 |
HUANG Yanyan, PENG Hua |
|
|
Joint blind estimation of multiple frequency offsets and multiple channels for distributed MIMO-OFDM systems |
|
|
|
Journal of Computer Applications
2015 Vol.35 (6): 1531-1536
[Abstract]
(525)
[HTML 1 KB]
[PDF 851 KB]
(540)
|
|
1499 |
JIN Shan, JIN Zhigang |
|
|
Reasoning and forecasting of regional fire data based on adaptive fuzzy generalized regression neural network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1499-1504
[Abstract]
(636)
[HTML 1 KB]
[PDF 830 KB]
(637)
|
|
1479 |
PU Song, LYU Hongxia |
|
|
Dynamic evaluation for train line planning in high speedrailway based on improved data envelopment analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1479-1482
[Abstract]
(542)
[HTML 1 KB]
[PDF 722 KB]
(637)
|
|
1474 |
ZHANG Wen, WANG Wenwei |
|
|
Face recognition based on local binary pattern and deep learning |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1474-1478
[Abstract]
(1198)
[HTML 1 KB]
[PDF 765 KB]
(1578)
|
|
1471 |
ZHANG Zongnian, LIN Shengxin, MAO Huanzhang, HUANG Rentai |
|
|
Cosparsity analysis subspace pursuit algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1471-1473
[Abstract]
(577)
[HTML 1 KB]
[PDF 595 KB]
(776)
|
|
1467 |
ZHOU Zhiping, MIAO Minmin |
|
|
Dynamic time warping gesture authentication algorithm based on improved Mahalanobis distance |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1467-1470
[Abstract]
(706)
[HTML 1 KB]
[PDF 582 KB]
(870)
|
|
1462 |
JIANG Wei, LYU Xiaoqi, REN Xiaoying, REN Guoyin |
|
|
3D segmentation method combining region growing and graph cut for coronary arteries computed tomography angiography images |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1462-1466
[Abstract]
(775)
[HTML 1 KB]
[PDF 814 KB]
(814)
|
|
1459 |
SONG Yuan, LIANG Xuechun, ZHANG Ran |
|
|
Feature selection based on statistical random forest algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1459-1461
[Abstract]
(1367)
[HTML 1 KB]
[PDF 569 KB]
(1061)
|
|
1449 |
LIU Ting, PAN Guangzhen, YANG Jian, ZHANG Caihong |
|
|
Improved Stoilov algorithm based on short distance priority and weighted mean |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1449-1453
[Abstract]
(607)
[HTML 1 KB]
[PDF 807 KB]
(631)
|
|
1444 |
ZHANG Jun, WANG Zhizhou, YANG Zhengling |
|
|
Correction of single circular fisheye image |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1444-1448
[Abstract]
(1085)
[HTML 1 KB]
[PDF 782 KB]
(960)
|
|
1406 |
ZHAN Huo, LIN Yaping, ZHANG Jiliang, TANG Bing |
|
|
Reliability and randomness enhancing techniques for physical unclonable functions |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1406-1411
[Abstract]
(749)
[HTML 1 KB]
[PDF 927 KB]
(792)
|
|
1399 |
YUAN Simin, MA Chuangui, XIANG Shengqi |
|
|
Identity-based group key exchange protocol for unbalanced network environment |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1399-1405
[Abstract]
(434)
[HTML 1 KB]
[PDF 1048 KB]
(635)
|
|
1385 |
LIU Dan, SHI Runhua, ZHONG Hong, ZHANG Shun, CUI Jie, XU Yan |
|
|
Conditional privacy-preserving authentication scheme for vehicular Ad Hoc network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1385-1392
[Abstract]
(550)
[HTML 1 KB]
[PDF 1336 KB]
(748)
|
|
1361 |
YOU Ziyi, CHEN Shiguo, WANG Yi |
|
|
Intelligent control based on
ε-support vector regression theory for regional traffic signal system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1361-1366
[Abstract]
(466)
[HTML 1 KB]
[PDF 901 KB]
(664)
|
|
1353 |
ZHOU Deyun, ZHANG Hao, ZHANG Kun, ZHANG Kai, PAN Qian |
|
|
Range-parameterized square root cubature Kalman filter using hybrid coordinates for bearings-only target tracking |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1353-1357
[Abstract]
(588)
[HTML 1 KB]
[PDF 535 KB]
(590)
|
|
1333 |
WANG Shenwen, ZHANG Wensheng, QIN Jin, XIE Chengwang, GUO Zhaolu |
|
|
Naïve differential evolution algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1333-1335
[Abstract]
(657)
[HTML 1 KB]
[PDF 434 KB]
(777)
|
|
1320 |
FEI Shaodong, YANG Yuzhen, LIU Peiyu, WANG Jian |
|
|
Method of bursty events detection based on sentiment filter |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1320-1323
[Abstract]
(537)
[HTML 1 KB]
[PDF 624 KB]
(701)
|
|
1314 |
WANG Rongbo, LI Jie, HUANG Xiaoxi, ZHOU Changle, CHEN Zhiqun, WANG Xiaohua |
|
|
Automatic Chinese sentences group method based on multiple discriminant analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1314-1319
[Abstract]
(483)
[HTML 1 KB]
[PDF 995 KB]
(758)
|
|
1310 |
HU Yang, DAI Dan, LIU Li, FENG Xupeng, LIU Lijun, HUANG Qingsong |
|
|
Classification method of text sentiment based on emotion role model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1310-1313
[Abstract]
(540)
[HTML 1 KB]
[PDF 780 KB]
(837)
|
|
1302 |
YAN Hongwen, ZHOU Yamei, PAN Chu |
|
|
Novel
K-medoids clustering algorithm based on breadth-first search |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1302-1305
[Abstract]
(610)
[HTML 1 KB]
[PDF 626 KB]
(708)
|
|
1284 |
YU Hongyan, CEN Kailun, YANG Tengxiao |
|
|
Design and implementation of abnormal behavior detection system in cloud computing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1284-1289
[Abstract]
(598)
[HTML 1 KB]
[PDF 997 KB]
(852)
|
|
1273 |
LIU Yong, ZHANG Jinlong, ZHANG Yanbo, WANG Tao |
|
|
Improved weighted centroid localization algorithm in narrow space |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1273-1275
[Abstract]
(580)
[HTML 1 KB]
[PDF 627 KB]
(691)
|
|
1242 |
ZENG Zhendong, CHEN Xiao, SUN bo, WU Shuxin |
|
|
Sensor network queue management algorithm based on duty cycle control and delay guarantee |
|
|
|
Journal of Computer Applications
2015 Vol.35 (5): 1242-1245
[Abstract]
(431)
[HTML 1 KB]
[PDF 775 KB]
(560)
|
|
1196 |
ZHANG Youliang, ZHANG Hongjun, ZHANG Rui, YANG Bojiang, ZENG Zilin, GUO Lisheng |
|
|
Ranking of military training performances based on data envelopment analysis of common weights |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1196-1199
[Abstract]
(785)
[HTML 1 KB]
[PDF 521 KB]
(659)
|
|
1174 |
SHEN Feng, LI Weidong |
|
|
GPS signal tracking algorithm based on carrier frequency assist phase |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1174-1178
[Abstract]
(623)
[HTML 1 KB]
[PDF 707 KB]
(660)
|
|
1169 |
TU Ying, ZHANG Liping, WANG Chunhui, HOU Min, LIU Dongsheng |
|
|
Clone genealogies extraction based on software evolution over multiple versions |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1169-1173
[Abstract]
(1178)
[HTML 1 KB]
[PDF 985 KB]
(706)
|
|
1154 |
YIN Wenke, WU Shanshan, DING Feng, XUN Zhide |
|
|
Skyline based search results sorting method |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1154-1158
[Abstract]
(477)
[HTML 1 KB]
[PDF 871 KB]
(634)
|
|
1148 |
ZHENG Hui, LI Bing, CHEN Donglin, LIU Pingfeng |
|
|
Personalized recommendation technique for mobile life services based on location cluster |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1148-1153
[Abstract]
(674)
[HTML 1 KB]
[PDF 842 KB]
(657)
|
|
1124 |
CHEN Xiaolong, WANG Xiaodong, LI Xin, YE Jianyu, YAO Yu |
|
|
Echocardiography chamber segmentation based on integration of speeded up robust feature fitting and Chan-Vese model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1124-1128
[Abstract]
(467)
[HTML 1 KB]
[PDF 757 KB]
(633)
|
|
1120 |
GENG Dandan, WANG Tingting, CAO Lei, ZHANG Yu |
|
|
Reconstruction of images at intermediate phases of lung 4D-CT data based on deformable registration |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1120-1123
[Abstract]
(503)
[HTML 1 KB]
[PDF 609 KB]
(674)
|
|
1093 |
ZHANG Sulan, ZHANG Jifu, HU Lihua, CHU Meng |
|
|
Semantic annotation model for scenes based on formal concept analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1093-1096
[Abstract]
(750)
[HTML 1 KB]
[PDF 590 KB]
(724)
|
|
1075 |
HUANG Detian, ZHENG Lixin, LIU Peizhong, GU Peiting |
|
|
Improved non-negativity and support constraint recursive inverse filtering algorithm for blind restoration based on interband prediction |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1075-1078
[Abstract]
(512)
[HTML 1 KB]
[PDF 792 KB]
(567)
|
|
1062 |
XIAO Huihui, WAN Changxuan, DUAN Yanming, ZHONG Qing |
|
|
Flower pollination algorithm based on simulated annealing |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1062-1066
[Abstract]
(931)
[HTML 1 KB]
[PDF 799 KB]
(24633)
|
|
1045 |
HUANG Huiqun |
|
|
Partner selection based on grey relational analysis and particle swarm optimization algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1045-1048
[Abstract]
(780)
[HTML 1 KB]
[PDF 492 KB]
(628)
|
|
1040 |
LIN Guohan, ZHANG Jing, LIU Zhaohua |
|
|
Particle swarm optimization with adaptive task allocation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1040-1044
[Abstract]
(1587)
[HTML 1 KB]
[PDF 695 KB]
(707)
|
|
1030 |
HAO Yanbin, GUO Xiao, YANG Naiding |
|
|
Computing method of attribute information granule of information system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1030-1034
[Abstract]
(467)
[HTML 1 KB]
[PDF 761 KB]
(685)
|
|
1001 |
CHEN Yongheng, ZUO Wanli, LIN Yaojin |
|
|
Application of labeled author topic model in scientific literature |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 1001-1005
[Abstract]
(587)
[HTML 1 KB]
[PDF 712 KB]
(713)
|
|
985 |
WANG Hao, ZHANG Yuqing |
|
|
Enhanced attack-resistible ant-based trust and reputation model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 985-990
[Abstract]
(645)
[HTML 1 KB]
[PDF 1189 KB]
(652)
|
|
981 |
XIE Shuzhen, TAN Xiaoqing |
|
|
Efficient quantum information splitting scheme based on W states |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 981-984
[Abstract]
(590)
[HTML 1 KB]
[PDF 758 KB]
(642)
|
|
964 |
ZHANG Yue, ZHENG Dong, ZHANG Yinghui |
|
|
Access control mechanism with dynamic authorization and file evaluation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 964-967
[Abstract]
(535)
[HTML 1 KB]
[PDF 619 KB]
(654)
|
|
950 |
XU Jinlong, ZHAO Rongcai, HAN Lin |
|
|
Vector exploring path optimization algorithm of superword level parallelism with subsection constraints |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 950-955
[Abstract]
(826)
[HTML 1 KB]
[PDF 877 KB]
(659)
|
|
944 |
DU Xiongjie, WANG Min, TANG Xuehai, ZHANG Zhang |
|
|
Scheduling mechanism based on service level objective in multi-tenant cluster |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 944-949
[Abstract]
(675)
[HTML 1 KB]
[PDF 949 KB]
(660)
|
|
934 |
WANG Aizhen, HOU Chengguo, REN Guofeng |
|
|
Layered and cascaded stochastic resonance algorithm for direct sequence spread spectrum signal receiving |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 934-937
[Abstract]
(489)
[HTML 1 KB]
[PDF 738 KB]
(697)
|
|
921 |
ZHANG Kaiping, MAO Jianjing |
|
|
Interference-aware routing for wireless sensor networks based on signal power random fading model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 921-924
[Abstract]
(554)
[HTML 1 KB]
[PDF 736 KB]
(873)
|
|
916 |
WU Xiaolin, SHAN Zhilong, CAO Shulin, CAO Chuqun |
|
|
Monte Carlo boxed localization algorithm for mobile nodes based on received signal strength indication ranging |
|
|
|
Journal of Computer Applications
2015 Vol.35 (4): 916-920
[Abstract]
(620)
[HTML 1 KB]
[PDF 768 KB]
(818)
|
|
896 |
SHANG Qingjian, ZHANG Jinming, WANG Tingzhang |
|
|
Weak signal detection in chaotic clutter based on effective
K-means and effective extreme learning machine |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 896-900
[Abstract]
(537)
[HTML 1 KB]
[PDF 747 KB]
(558)
|
|
891 |
ZHU Haiyang, CUI Bingmou, HU Zhiyao |
|
|
Comprehensive coordination optimization of train break-up and make-up scheme based on hard time windows at railway technical station |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 891-895
[Abstract]
(592)
[HTML 1 KB]
[PDF 753 KB]
(444)
|
|
886 |
HU Jiajie, JIANG Letian |
|
|
High performance simulation of Win32 environment in Android system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 886-890
[Abstract]
(635)
[HTML 1 KB]
[PDF 776 KB]
(490)
|
|
882 |
WANG Kechao, WANG Tiantian, REN Xiangmin, JIA Zongfu |
|
|
Software fault localization approach by statistical analysis of failure context |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 882-885
[Abstract]
(706)
[HTML 1 KB]
[PDF 749 KB]
(410)
|
|
858 |
ZHANG Xiaolin, CUI Ningning, YANG Tao, LI Jie |
|
|
Salient points extraction method of furnace flame image based on hierarchical adaptive algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 858-862
[Abstract]
(513)
[HTML 1 KB]
[PDF 710 KB]
(442)
|
|
830 |
ZHANG Xiangyu, TIAN Qingguo, GE Baozhen |
|
|
Multi-constrained segmentation of 3D human point-cloud |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 830-834
[Abstract]
(602)
[HTML 1 KB]
[PDF 895 KB]
(441)
|
|
816 |
ZHANG Jing, SANG Qingbing |
|
|
Quality assessment method of color stereoscopic images |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 816-820
[Abstract]
(724)
[HTML 1 KB]
[PDF 782 KB]
(501)
|
|
797 |
XUE Anrong, JIA Xiaoyan, GE Qinglong, YANG Xiaoqin |
|
|
Context feature extraction method of terrorism behavior based on dependence maximization |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 797-801
[Abstract]
(515)
[HTML 1 KB]
[PDF 835 KB]
(464)
|
|
783 |
XIA Haiying, XU Luhui |
|
|
Facial expression recognition based on feature fusion of active shape model differential texture and local directional pattern |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 783-786
[Abstract]
(587)
[HTML 1 KB]
[PDF 767 KB]
(549)
|
|
766 |
SANG Xiuli, XIAO Qingtai, WANG Hua, HAN Jiguang |
|
|
Support vector machine combined model forecast based on ensemble empirical mode decomposition-principal component analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 766-769
[Abstract]
(584)
[HTML 1 KB]
[PDF 792 KB]
(628)
|
|
761 |
WANG Weidong, LIU Bing, GUAN Hongjie, ZHOU Yong, XIA Shixiong |
|
|
Spectral embedded clustering algorithm based on kernel function |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 761-765
[Abstract]
(860)
[HTML 1 KB]
[PDF 846 KB]
(528)
|
|
717 |
XIANG Lingyun, WANG Xinhui |
|
|
Text steganographic method with hierarchical security |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 717-721
[Abstract]
(491)
[HTML 1 KB]
[PDF 816 KB]
(501)
|
|
712 |
ZUO Liming, CHEN Renqun, GUO Hongli |
|
|
Provable identity-based signcryption scheme |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 712-716
[Abstract]
(806)
[HTML 1 KB]
[PDF 770 KB]
(506)
|
|
663 |
QI Xuemei, WANG Hongtao, CHEN Fulong, TANG Qimei, SUN Yunxiang |
|
|
Novel quantum differential evolutionary algorithm for blocking flowshop scheduling |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 663-667
[Abstract]
(517)
[HTML 1 KB]
[PDF 746 KB]
(605)
|
|
610 |
REN Xiuli, WANG Chong |
|
|
Multi-path routing protocol based on three-dimensional space and regional co-evolution in wireless sensor network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (3): 610-614
[Abstract]
(549)
[HTML 1 KB]
[PDF 739 KB]
(539)
|
|
590 |
YIN Jun, DONG Lida, CHI Tianyang |
|
|
Mobile robot motion estimation based on classified feature points |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 590-594
[Abstract]
(661)
[HTML 1 KB]
[PDF 779 KB]
(407)
|
|
566 |
ZHANG Lei, YANG Chenghu, LU Meijin |
|
|
Optimal strategy for production-distribution network of perishable products based on WCVaR |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 566-571
[Abstract]
(524)
[HTML 1 KB]
[PDF 1090 KB]
(428)
|
|
550 |
GUO Rongzuo, FAN Xiangkui, CUI Dongxia, LI Ming |
|
|
Reliability modeling and analysis of embedded system hardware based on Copula function |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 550-554
[Abstract]
(600)
[HTML 1 KB]
[PDF 843 KB]
(374)
|
|
545 |
DONG Yuehua, DAI Yuqian |
|
|
Automatic software test data generation based on hybrid particle swarm optimization |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 545-549
[Abstract]
(487)
[HTML 1 KB]
[PDF 776 KB]
(432)
|
|
531 |
LIANG Zengyan, LIU Benyong |
|
|
Fast algorithm for color image haze removal using principle component analysis and atmospheric scattering mode |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 531-534
[Abstract]
(709)
[HTML 1 KB]
[PDF 621 KB]
(690)
|
|
515 |
ZHENG Bingbin, FAN Xinnan, LI Min, ZHANG Ji |
|
|
Trajectory segment-based abnormal behavior detection method using LDA model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 515-518
[Abstract]
(750)
[HTML 1 KB]
[PDF 830 KB]
(551)
|
|
506 |
QIN Longlong, QIAN Yuan, ZHANG Xiaoyan, HOU Xue, ZHOU Qin |
|
|
MAP super-resolution reconstruction based on adaptive constraint regularization HL-MRF prior model |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 506-509
[Abstract]
(1132)
[HTML 1 KB]
[PDF 716 KB]
(367)
|
|
502 |
ZHANG Yupu, YANG Qi, ZHANG Qi |
|
|
Image multi-scale recognition method based on computer vision |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 502-505
[Abstract]
(637)
[HTML 1 KB]
[PDF 726 KB]
(671)
|
|
499 |
PU Guolin, QIU Yuhui |
|
|
Image classification based on global dictionary learning method with sparse representation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 499-501
[Abstract]
(972)
[HTML 1 KB]
[PDF 568 KB]
(18283)
|
|
495 |
ZHANG Yongku, LI Yunfeng, SUN Jinguang |
|
|
Image retrieval based on multi-feature fusion |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 495-498
[Abstract]
(836)
[HTML 1 KB]
[PDF 608 KB]
(868)
|
|
476 |
KONG Fei, WU Dinghui, JI Zhicheng |
|
|
Flexible job-shop scheduling optimization based on two-layer particle swarm optimization algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 476-480
[Abstract]
(556)
[HTML 1 KB]
[PDF 674 KB]
(505)
|
|
470 |
ZHANG Cheng, LIU Yadong, LI Yuan |
|
|
Nonlinear feature extraction based on discriminant diffusion map analysis |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 470-475
[Abstract]
(568)
[HTML 1 KB]
[PDF 868 KB]
(417)
|
|
452 |
LIU Runtao, ZHAO Zhenguo, TIAN Guangyue |
|
|
Space vector model algorithm for query of continuous and multidirectional regions |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 452-455
[Abstract]
(474)
[HTML 1 KB]
[PDF 614 KB]
(429)
|
|
424 |
DAI Wei, LIU Zhi, LIU Yihe |
|
|
Function pointer attack detection with address integrity checking |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 424-429
[Abstract]
(552)
[HTML 1 KB]
[PDF 973 KB]
(472)
|
|
407 |
DU Guiying, HUANG Zhenjie |
|
|
Efficient certificate-based verifiably encrypted signature scheme |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 407-411
[Abstract]
(546)
[HTML 1 KB]
[PDF 777 KB]
(495)
|
|
378 |
WANG Zhengying, YU Jiong, YING Changtian, LU Liang |
|
|
Energy-efficient strategy of distributed file system based on data block clustering storage |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 378-382
[Abstract]
(524)
[HTML 1 KB]
[PDF 766 KB]
(431)
|
|
374 |
RUI Zhiliang, ZHU Yuquan, GENG Xia, CHEN Geng |
|
|
microRNA identification method based on feature clustering and random subspace |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 374-377
[Abstract]
(538)
[HTML 1 KB]
[PDF 644 KB]
(385)
|
|
369 |
LIU Xiaohong, QU Zhijian, CAO Yanfeng, ZHANG Xianwei, FENG Gang |
|
|
Multi-universe parallel quantum-inspired evolutionary algorithm based on adaptive mechanism |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 369-373
[Abstract]
(608)
[HTML 1 KB]
[PDF 738 KB]
(484)
|
|
364 |
LUO Yiping, DENG Fei, ZHOU Bifeng |
|
|
Non-fragile synchronous guaranteed cost control for complex dynamic network with time-varying delay |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 364-368
[Abstract]
(686)
[HTML 1 KB]
[PDF 578 KB]
(398)
|
|
358 |
YAN Lin, LIU Tao, YAN Shuo, LI Feng, RUAN Ning |
|
|
Data combination method based on structure's granulation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 358-363
[Abstract]
(472)
[HTML 1 KB]
[PDF 1014 KB]
(385)
|
|
351 |
LIU Deliang, LIU Kaihua, YU Jiexiao, ZHANG Liang, ZHAO Yang |
|
|
DOA estimation for wideband chirp signal with a few snapshots |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 351-353
[Abstract]
(581)
[HTML 1 KB]
[PDF 538 KB]
(436)
|
|
317 |
WANG Jing, GAO Zehua, GAO Feng, PAN Xiang |
|
|
Enhanced frequency-domain channel contention mechanism in wireless local area network |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 317-321
[Abstract]
(883)
[HTML 1 KB]
[PDF 718 KB]
(28876)
|
|
313 |
PENG Yali, XU Hong, YIN Hong, ZHANG Zhiming |
|
|
Routing protocol for bus vehicle network with cyclical movement |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 313-316
[Abstract]
(483)
[HTML 1 KB]
[PDF 806 KB]
(433)
|
|
309 |
ZHOU Haiyang, CHE Ming |
|
|
Communication scheme design for embedded control node cluster |
|
|
|
Journal of Computer Applications
2015 Vol.35 (2): 309-312
[Abstract]
(415)
[HTML 1 KB]
[PDF 751 KB]
(390)
|
|
294 |
JIAO Fangyuan, LI Jia, LI Wei |
|
|
Characteristic information extraction and dynamic warning algorithm of watershed disaster |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 294-298
[Abstract]
(532)
[HTML 1 KB]
[PDF 767 KB]
(504)
|
|
289 |
FU Hua, ZI Hai |
|
|
Dynamic prediction model for gas emission quantity based on least square support vector machine and Kalman filter |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 289-293
[Abstract]
(444)
[HTML 1 KB]
[PDF 726 KB]
(557)
|
|
283 |
LI Pengju, LIU Hui, WANG Bin, WANG Long |
|
|
Blowing state recognition of basic oxygen furnace based on feature of flame color texture complexity |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 283-288
[Abstract]
(484)
[HTML 1 KB]
[PDF 881 KB]
(477)
|
|
262 |
LU Yang, BAO Shudi, ZHOU Xiang, CHEN Jinheng |
|
|
Real-time human identification algorithm based on dynamic electrocardiogram signals |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 262-264
[Abstract]
(607)
[HTML 1 KB]
[PDF 603 KB]
(526)
|
|
252 |
JI Lianen, ZOU Yinlong, XIN Bing |
|
|
Data processing techniques on sensors of smart terminals for 3D navigation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 252-256
[Abstract]
(526)
[HTML 1 KB]
[PDF 1006 KB]
(567)
|
|
239 |
YUAN Xi, LI Qiang |
|
|
Research and development of intelligent healthy community system based on mobile Internet |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 239-242
[Abstract]
(585)
[HTML 1 KB]
[PDF 762 KB]
(1137)
|
|
211 |
HOU He, LYU Xiaoqi, JIA Dongzheng, YU Hefeng |
|
|
Curved planar reformation algorithm based on coronary artery outline extraction by multi-planar reformation |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 211-214
[Abstract]
(1189)
[HTML 1 KB]
[PDF 784 KB]
(580)
|
|
206 |
NIE Xiao, CHEN Leiting |
|
|
Boundary handling algorithm for weakly compressible fluids |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 206-210
[Abstract]
(557)
[HTML 1 KB]
[PDF 794 KB]
(487)
|
|
198 |
JIANG Xingguo, LI Zhifeng, ZHANG Long |
|
|
Adaptive improvement of video compressed sensing based on linear dynamic system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 198-201
[Abstract]
(477)
[HTML 1 KB]
[PDF 672 KB]
(546)
|
|
189 |
LIU Hong, LIU Rong, LI Shuling |
|
|
Acceleration gesture recognition based on random projection |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 189-193
[Abstract]
(707)
[HTML 1 KB]
[PDF 719 KB]
(571)
|
|
183 |
ZHANG Jing, WU Husheng |
|
|
Modified binary cuckoo search algorithm for multidimensional knapsack problem |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 183-188
[Abstract]
(659)
[HTML 1 KB]
[PDF 813 KB]
(605)
|
|
179 |
WU Zongyu, LUO Wencai |
|
|
Construction method of radial basis function approximation model based on parameter optimization of space decomposition |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 179-182
[Abstract]
(481)
[HTML 1 KB]
[PDF 701 KB]
(549)
|
|
147 |
ZHANG Danpu, FU Zhongliang, WANG Lili, LI Xin |
|
|
Multi-label classification algorithm based on floating threshold classifiers combination |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 147-151
[Abstract]
(703)
[HTML 1 KB]
[PDF 777 KB]
(553)
|
|
140 |
DU Yuanwei, SHI Fangyuan, YANG Na |
|
|
Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 140-146
[Abstract]
(729)
[HTML 1 KB]
[PDF 1250 KB]
(747)
|
|
108 |
LI Qiusheng, WU Yadong, LIN Maosong, WANG Song, WANG Haiyang, FENG Xinmiao |
|
|
Ranking-
k: effective subspace dominating query algorithm |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 108-114
[Abstract]
(573)
[HTML 1 KB]
[PDF 1078 KB]
(745)
|
|
68 |
FENG Liping, SONG Lipeng, WANG Hongbin, ZHAO Qingshan |
|
|
Propagation modeling and analysis of peer-to-peer botnet |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 68-71
[Abstract]
(678)
[HTML 1 KB]
[PDF 543 KB]
(608)
|
|
27 |
XIONG Ying, MAO Xuesong, LIU Xing, WANG Yaling, JIN Gang |
|
|
Transmission length design of IP network with wavelength-selectable reconfigurable optical add/drop multiplexer |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 27-30
[Abstract]
(553)
[HTML 1 KB]
[PDF 560 KB]
(596)
|
|
23 |
PAN Hao, CHEN Meng |
|
|
Optimization of anti-collision algorithm for radio frequency identification reader system in Internet of things |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 23-26
[Abstract]
(805)
[HTML 1 KB]
[PDF 721 KB]
(592)
|
|
19 |
MU Yuchao, ZHANG Xiaohong |
|
|
Adaptive tree grouping and blind separation anti-collision algorithm for radio frequency identification system |
|
|
|
Journal of Computer Applications
2015 Vol.35 (1): 19-22
[Abstract]
(989)
[HTML 1 KB]
[PDF 583 KB]
(523)
|
|
3545 |
ZHAO Yudan WANG Qian FAN Jiulun |
|
|
Texture images retrieval based on Float-LBP |
|
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3545-3548
[Abstract]
(178)
[HTML 1 KB]
[PDF 596 KB]
(730)
|
|
3540 |
XU Zhan CAO Zhe |
|
|
Video background completion with complexly moving camera |
|
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3540-3544
[Abstract]
(209)
[HTML 1 KB]
[PDF 1032 KB]
(663)
|
|
3491 |
TAO Yongcai HE Zongzhen SHI Lei WEI Lin CAO Yangjie |
|
|
Personalized microblogging recommendation based on weighted dynamic degree of interest |
|
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3491-3496
[Abstract]
(195)
[HTML 1 KB]
[PDF 895 KB]
(788)
|
|
3470 |
ZHANG Liping LI Song MA Lin TANG Yuanxin HAO Xiaohong |
|
|
Methods of Voronoi diagram construction and near neighbor relations query |
|
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3470-3474
[Abstract]
(202)
[HTML 1 KB]
[PDF 754 KB]
(706)
|
|
3446 |
QU Sheng SHI Wuxi XIU Chunbo |
|
|
Criticality analysis method based on fuzzy Bayesian networks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (12): 3446-3450
[Abstract]
(157)
[HTML 1 KB]
[PDF 825 KB]
(675)
|
|
3157 |
ZHAO Yuan LU Tianbo |
|
|
Multi-dimensional trust management mechanism for peer-to-peer networks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3157-3159
[Abstract]
(240)
[HTML 1 KB]
[PDF 566 KB]
(554)
|
|
3135 |
LIANG Junjie LIU Qiongni YU Dunhui |
|
|
Personalization recommendation algorithm for Web resources based on ontology |
|
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3135-3139
[Abstract]
(281)
[HTML 1 KB]
[PDF 752 KB]
(611)
|
|
3086 |
CHEN Bingliang ZHANG Yuhui JI Zhiyuan |
|
|
Performance tests and analysis of distributed evolutionary algorithms |
|
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3086-3090
[Abstract]
(236)
[HTML 1 KB]
[PDF 745 KB]
(574)
|
|
3078 |
WANG Mingkun YUAN Shaoguang ZHU Yongli WANG Dewen |
|
|
Real-time clustering for massive data using Storm |
|
|
|
Journal of Computer Applications
2014 Vol.34 (11): 3078-3081
[Abstract]
(314)
[HTML 1 KB]
[PDF 611 KB]
(820)
|
|
3024 |
WAGN Shengzheng HUANG Yugui |
|
|
Method of marine radar image simulation based on electronic chart display information system |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 3024-3028
[Abstract]
(222)
[HTML 1 KB]
[PDF 806 KB]
(390)
|
|
3020 |
WU Milong QIU Weibao LIU Baoqiang CHI Liyang MU Peitian LI Xiaolong ZHENG Hairong |
|
|
High speed data transfer and imaging for intravascular ultrasound |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 3020-3023
[Abstract]
(220)
[HTML 1 KB]
[PDF 598 KB]
(389)
|
|
2971 |
YANG Zhuzhong ZHOU Jiliu LANG Fangnian |
|
|
Improving ideal low-pass filter with noise detection algorithm |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2971-2975
[Abstract]
(459)
[HTML 1 KB]
[PDF 799 KB]
(506)
|
|
2913 |
LI Lin LIAN Jin WU Yue YE Mao |
|
|
Survey on image holistic scene understanding based on probabilistic graphical model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2913-2921
[Abstract]
(482)
[HTML 1 KB]
[PDF 1472 KB]
(665)
|
|
2895 |
ZHANG Cheng LI Na LI Yuan PANG Yujun |
|
|
Application of kernel parameter discriminant method in kernel principal component analysis |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2895-2898
[Abstract]
(193)
[HTML 1 KB]
[PDF 549 KB]
(523)
|
|
2761 |
HAN Guodong KONG Feng SHEN Jianliang |
|
|
Hierarchical networks-on-chip routing algorithm based on source region path selection |
|
|
|
Journal of Computer Applications
2014 Vol.34 (10): 2761-2765
[Abstract]
(266)
[HTML 1 KB]
[PDF 862 KB]
(451)
|
|
2630 |
SUN Yongyong HUANG Guangqiu |
|
|
Matrix obfuscation based on data refinement |
|
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2630-2634
[Abstract]
(235)
[HTML 1 KB]
[PDF 655 KB]
(396)
|
|
2585 |
YU Juan WANG Wenxian ZHONG Qinglun |
|
|
Regional blood supply system optimization under stochastic demand |
|
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2585-2589
[Abstract]
(185)
[HTML 1 KB]
[PDF 628 KB]
(413)
|
|
2571 |
LIN Mingming QIU Yunfei SHAO Liangshan |
|
|
Consumption sentiment classification based on two-dimensional coordinate mapping method |
|
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2571-2576
[Abstract]
(198)
[HTML 1 KB]
[PDF 1043 KB]
(496)
|
|
2543 |
WANG Xiaojuan LIU Sanyang TIAN Wenkai |
|
|
Improved backtracking search optimization algorithm with new effective mutation scale factor and greedy crossover strategy |
|
|
|
Journal of Computer Applications
2014 Vol.34 (9): 2543-2546
[Abstract]
(362)
[HTML 1 KB]
[PDF 681 KB]
(627)
|
|
2434 |
WEI Bing GUO Yutang SONG Jie ZHANG Lei |
|
|
New NAND device management solution with high storage density |
|
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2434-2437
[Abstract]
(255)
[HTML 1 KB]
[PDF 619 KB]
(314)
|
|
2415 |
NIU Guochen ZHANG Weicheng LI Ziwei |
|
|
Path planning algorithm based on regional-advance strategy for aircraft fuel tank inspection robot |
|
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2415-2418
[Abstract]
(268)
[HTML 1 KB]
[PDF 528 KB]
(476)
|
|
2385 |
WANG Yong RAO Qinfei TANG Jing YUAN Chaoyan |
|
|
Automatic coding algorithm based on color structure light |
|
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2385-2389
[Abstract]
(273)
[HTML 1 KB]
[PDF 779 KB]
(494)
|
|
2202 |
WANG Chao BI Guihong ZHANG Shouming WEI Chuntao |
|
|
Agent-based language competition model with social circle network |
|
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2202-2208
[Abstract]
(230)
[HTML 1 KB]
[PDF 1102 KB]
(468)
|
|
2192 |
GAO Xiaolong ZHU Xinde ZHAO Jianmin CAO Cungen XU Huiying WU De |
|
|
Building and consistency analysis of movie ontology |
|
|
|
Journal of Computer Applications
2014 Vol.34 (8): 2192-2196
[Abstract]
(258)
[HTML 1 KB]
[PDF 881 KB]
(537)
|
|
1978 |
JI Xiang GUO Zhigang WANG Kai |
|
|
Design of multi-carrier transceivers based on time domain improved discrete Fourier transform |
|
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1978-1982
[Abstract]
(176)
[HTML 1 KB]
[PDF 720 KB]
(512)
|
|
1848 |
ZHANG Xiaoqing YUE Qiang |
|
|
Cloud resource game allocation based on cooperation |
|
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1848-1851
[Abstract]
(229)
[HTML 1 KB]
[PDF 698 KB]
(596)
|
|
1843 |
HE Huaiwen FU Yu YANG Yihong XIAO Tao |
|
|
Service performance analysis of cloud computing center based on M/M/n/n+r queuing model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (7): 1843-1847
[Abstract]
(283)
[HTML 1 KB]
[PDF 634 KB]
(558)
|
|
1792 |
DU Yibo |
|
|
Workflow weighting colored Petri-net modeling method |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1792-1797
[Abstract]
(196)
[HTML 1 KB]
[PDF 677 KB]
(295)
|
|
1746 |
GAO Peng GUO Lijun ZHU Yiwei ZHANG Rong |
|
|
Multi-camera person identification based on hidden markov model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1746-1752
[Abstract]
(270)
[HTML 1 KB]
[PDF 1042 KB]
(335)
|
|
1711 |
ZHANG Jing ZHANG Quan LIU Yi GUI Zhiguo |
|
|
Symmetry optimization of polar coordinate back-projection reconstruction algorithm for fan beam CT |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1711-1714
[Abstract]
(366)
[HTML 1 KB]
[PDF 592 KB]
(310)
|
|
1622 |
XUE Xingsi |
|
|
Large scale ontology aligning approach based on NSGA-Ⅱ |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1622-1625
[Abstract]
(229)
[HTML 1 KB]
[PDF 754 KB]
(313)
|
|
1604 |
OU Guojian WANG Weiqiang JIANG Qingping |
|
|
Fast algorithm for sparse decomposition of real first-order polynomial phase signal based on group testing |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1604-1607
[Abstract]
(186)
[HTML 1 KB]
[PDF 705 KB]
(433)
|
|
1573 |
XUE Rui XU Xichao WEI Qiang |
|
|
New signal system design for satellite navigation system |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1573-1577
[Abstract]
(391)
[HTML 1 KB]
[PDF 756 KB]
(479)
|
|
1563 |
ZHOU Mu ZHANG Qiao QIU Feng |
|
|
Fingerprinting location method for WLAN using physical neighbor points information |
|
|
|
Journal of Computer Applications
2014 Vol.34 (6): 1563-1566
[Abstract]
(224)
[HTML 1 KB]
[PDF 587 KB]
(366)
|
|
1511 |
JI Jun XING Feifei DU Jun SHIning CUI Yaodong |
|
|
Deterministic algorithm for optimal two-stage cutting layouts with same-shape block |
|
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1511-1515
[Abstract]
(167)
[HTML 1 KB]
[PDF 654 KB]
(360)
|
|
1499 |
WANG Pei ZHANG Genyao LI Zhi WANG Jing |
|
|
Wavelet threshold denoising algorithm based on new threshold function |
|
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1499-1502
[Abstract]
(304)
[HTML 1 KB]
[PDF 578 KB]
(429)
|
|
1386 |
LU Yuanyao ZHOU Ni |
|
|
Improved speech endpoint detection algorithm in strong noise environment |
|
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1386-1390
[Abstract]
(474)
[HTML 1 KB]
[PDF 690 KB]
(551)
|
|
1243 |
XIAO Heng LV Shaohe |
|
|
Efficient spectrum sensing mechanism with interference cancellation in cognitive radio network |
|
|
|
Journal of Computer Applications
2014 Vol.34 (5): 1243-1246
[Abstract]
(487)
[HTML 1 KB]
[PDF 582 KB]
(399)
|
|
1213 |
LI Hongbo JIANG Lin WANG Haitang |
|
|
Simulation on low speed stable operation of full-order observer for induction motor |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1213-1216
[Abstract]
(667)
[HTML 1 KB]
[PDF 638 KB]
(434)
|
|
1209 |
HAO Dapeng FU Weiping WANG Wen |
|
|
Mobile robot safety navigation based on time to contact |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1209-1212
[Abstract]
(406)
[HTML 1 KB]
[PDF 590 KB]
(425)
|
|
1201 |
BAO Jikai LUO Changyuan ZHOU Daoshui LI |
|
|
Equipment system availability analysis and project optimization based on cannibalization |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1201-1204
[Abstract]
(473)
[HTML 1 KB]
[PDF 670 KB]
(595)
|
|
1182 |
YE Shuangqing YANG Xiaomei |
|
|
Super resolution image reconstruction based on wavelet transform and non-local means |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1182-1186
[Abstract]
(568)
[HTML 1 KB]
[PDF 789 KB]
(461)
|
|
1118 |
WEI Shimin DAI Duhong |
|
|
Multi-Agent cooperative E-commerce recommender system model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1118-1121
[Abstract]
(442)
[HTML 1 KB]
[PDF 649 KB]
(775)
|
|
1114 |
ZHAO Ting XIAO Ruliang SUN Cong CHEN Hongtao LI Yuanxin LI Hongen |
|
|
Personalized recommendation algorithm integrating roulette walk and combined time effect |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1114-1117
[Abstract]
(559)
[HTML 1 KB]
[PDF 790 KB]
(534)
|
|
1105 |
YUN Hongyan XU Liangjian GUO Zhenbo WEI Xiaoyan |
|
|
Modeling of marine ecology ontology |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1105-1108
[Abstract]
(499)
[HTML 1 KB]
[PDF 609 KB]
(474)
|
|
1047 |
HUANG Dan |
|
|
Attribute-based encryption scheme combined with trust management in wireless sensor network |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1047-1050
[Abstract]
(436)
[HTML 1 KB]
[PDF 686 KB]
(657)
|
|
1042 |
MO Lequn GUO Gengqi LI Feng |
|
|
Security-analysis of a kind of generalized group-oriented threshold signcryption schemes |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1042-1046
[Abstract]
(320)
[HTML 1 KB]
[PDF 797 KB]
(443)
|
|
1019 |
GU Chunsheng JING Zhengjun LI Hongwei YU Zhimin |
|
|
Security Analysis of Range Query with Single Assertion on Encrypted Data |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 1019-1024
[Abstract]
(572)
[HTML 1 KB]
[PDF 962 KB]
(452)
|
|
969 |
LIU Yangyang XIE Zheng CHEN Zhi |
|
|
Improved algorithm for vital arc of maximum dynamic flow |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 969-972
[Abstract]
(563)
[HTML 1 KB]
[PDF 622 KB]
(480)
|
|
963 |
LI Dujuan ZHOU Zifeng WU Cheng-mao |
|
|
Multi-user chaotic communication and its bit error rate based on orthogonal chaos |
|
|
|
Journal of Computer Applications
2014 Vol.34 (4): 963-968
[Abstract]
(471)
[HTML 1 KB]
[PDF 1043 KB]
(563)
|
|
902 |
ZHANG Jinghua WANG Renhuang YUE Hongwei |
|
|
Research on dynamic stability of badminton |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 902-906
[Abstract]
(430)
[HTML 1 KB]
[PDF 754 KB]
(381)
|
|
873 |
LIU Zunxiong HUANG Zhiqiang LIU Jiangwei CHEN Ying |
|
|
Financial failure prediction using truncated Hinge loss support vector machine with smoothly clipped absolute deviation penalty |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 873-878
[Abstract]
(700)
[HTML 1 KB]
[PDF 878 KB]
(504)
|
|
865 |
HAN Guanghui ZENG Cheng |
|
|
Improvement of Boyer-Moore string matching algorithm |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 865-868
[Abstract]
(458)
[HTML 1 KB]
[PDF 489 KB]
(570)
|
|
857 |
ZHANG Tianjiong WANG Zheng |
|
|
Runtime error site analysis tool based on variable tracking |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 857-860
[Abstract]
(467)
[HTML 1 KB]
[PDF 574 KB]
(466)
|
|
833 |
ZHANG Yi LIU Yuran LUO Yuan |
|
|
Vision-based gesture recognition method and its implementation on digital signal processor |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 833-836
[Abstract]
(428)
[HTML 1 KB]
[PDF 762 KB]
(551)
|
|
801 |
JIANG Wei LI Xiaolong YANG Yongqing ZHANG Heng |
|
|
New image denoising method based on rational-order differential |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 801-805
[Abstract]
(548)
[HTML 1 KB]
[PDF 792 KB]
(371)
|
|
785 |
HU Qingxin CHEN Yun FANG Jing |
|
|
Tone mapping algorithm based on multi-scale decomposition |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 785-789
[Abstract]
(701)
[HTML 1 KB]
[PDF 1008 KB]
(474)
|
|
658 |
LI Lina ZENG Qingxun GAN Xiaoye LIANG Desu |
|
|
Under-determined blind source separation based on potential function and compressive sensing |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 658-662
[Abstract]
(522)
[HTML 1 KB]
[PDF 843 KB]
(672)
|
|
653 |
LI Yanjie HE Jingsong LI Ran |
|
|
Intellectual property core design of communication terminal based on 1553B bus |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 653-657
[Abstract]
(464)
[HTML 1 KB]
[PDF 657 KB]
(371)
|
|
649 |
HOU Yunshan ZHANG Xincheng JIN Yong |
|
|
Adaptive beamforming algorithm based on interference-noise covariance matrix reconstruction |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 649-652
[Abstract]
(510)
[HTML 1 KB]
[PDF 715 KB]
(688)
|
|
644 |
SHEN Jian XIA Jingbo FU Kai SUN Yu |
|
|
Active congestion control strategy based on historical probability in delay tolerant networks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 644-648
[Abstract]
(516)
[HTML 1 KB]
[PDF 739 KB]
(403)
|
|
632 |
WU Dong |
|
|
Active queue management algorithm of queue delay control |
|
|
|
Journal of Computer Applications
2014 Vol.34 (3): 632-634
[Abstract]
(665)
[HTML 1 KB]
[PDF 565 KB]
(431)
|
|
610 |
CHEN Ping TANG Xinmin XING Jian |
|
|
Taxiway conflict control strategy based on objective perception events driven model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 610-614
[Abstract]
(555)
[HTML 0 KB]
[PDF 714 KB]
(536)
|
|
601 |
ZHENG Yanbin WANG Ning DUAN Lingyu |
|
|
Multi-Agent urban traffic coordination control research based on game learning |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 601-604
[Abstract]
(479)
[HTML 0 KB]
[PDF 626 KB]
(593)
|
|
576 |
ZHAO Liang CHEN Min LI Hongchen |
|
|
Optimized data association algorithm based on visual simultaneous localization and mapping |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 576-579
[Abstract]
(472)
[HTML 0 KB]
[PDF 612 KB]
(606)
|
|
562 |
SHENG Shuai CAO Liping HUANG Zengxi WU Pengfei |
|
|
Image super-resolution algorithm based on improved sparse coding |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 562-566
[Abstract]
(557)
[HTML 0 KB]
[PDF 904 KB]
(557)
|
|
546 |
YANG Huixian CAI Yongyong ZHAi Yunlong LI Qiuqiu FENG Junpeng |
|
|
Single sample face recognition based on orthogonal gradient binary pattern |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 546-549
[Abstract]
(536)
[HTML 0 KB]
[PDF 590 KB]
(546)
|
|
538 |
ZHAO Yongli ZHONG Heng LI Dingyuan HU Tao |
|
|
Simultaneous recursive identification algorithm of system order and parameters based on determinant ratio method |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 538-541
[Abstract]
(668)
[HTML 0 KB]
[PDF 501 KB]
(514)
|
|
519 |
SHI Xin ZHANG Tao LEI Luning |
|
|
Dynamic evaluation of ecological security based on set pair analysis and Markov chain |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 519-522
[Abstract]
(506)
[HTML 0 KB]
[PDF 711 KB]
(545)
|
|
501 |
YANG Chao YAN Xuefeng ZHANG Jie ZHOU Yong |
|
|
Weight-based cloud reasoning algorithm |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 501-505
[Abstract]
(604)
[HTML 0 KB]
[PDF 732 KB]
(614)
|
|
496 |
QI Hao WANG Fubao DENG Hong ZHAO Kun WANG Liang MA Yin DUAN Weijun |
|
|
Quantum-inspired clonal algorithm based method for optimizing neural networks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 496-500
[Abstract]
(496)
[HTML 0 KB]
[PDF 719 KB]
(506)
|
|
481 |
WU Jiang TANG Chang-jie LI Taiyong CUI Liang |
|
|
Sentiment analysis on Web financial text based on semantic rules |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 481-485
[Abstract]
(928)
[HTML 0 KB]
[PDF 922 KB]
(1616)
|
|
464 |
MING Yang ZHANG Lin HAN Juan ZHOU Jun |
|
|
Universal designated verifier signcryption scheme in standard model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 464-468
[Abstract]
(425)
[HTML 0 KB]
[PDF 702 KB]
(422)
|
|
456 |
YE Xiang XU Zhan HU Xiang LIU Dan |
|
|
Low-cost mutual authenticate and encrypt scheme for active RIFD system |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 456-460
[Abstract]
(483)
[HTML 0 KB]
[PDF 798 KB]
(531)
|
|
448 |
CAI Zemin WANG Yi LI Renfa |
|
|
Differential power analysis attack based on algebraic expression for power model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 448-451
[Abstract]
(512)
[HTML 0 KB]
[PDF 735 KB]
(505)
|
|
428 |
REN Zhiyu CHEN Xingyuan |
|
|
Reachability analysis for attribute based user-role assignment model |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 428-432
[Abstract]
(425)
[HTML 0 KB]
[PDF 755 KB]
(511)
|
|
421 |
WU YinghongWU HUANG Hao ZHOU Jingkang ZENG Qingkai |
|
|
Conflict analysis of distributed application access control policies refinement |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 421-427
[Abstract]
(563)
[HTML 0 KB]
[PDF 1019 KB]
(503)
|
|
401 |
ZHANG Jian WANG Jindong YU Dingkun |
|
|
Continuous-valued attributes reduction algorithm based on gray correlation |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 401-405
[Abstract]
(448)
[HTML 0 KB]
[PDF 725 KB]
(486)
|
|
382 |
ZHANG Yongjun XU Xinhai |
|
|
Fault-tolerance period optimization method for computational fluid dynamics-oriented application development frameworks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 382-386
[Abstract]
(494)
[HTML 0 KB]
[PDF 767 KB]
(571)
|
|
360 |
CAI Song ZHANG Jianming CHEN Jiming PAN Jingui |
|
|
Load balancing technology based on naive Bayes algorithm in cloud computing environment |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 360-364
[Abstract]
(605)
[HTML 0 KB]
[PDF 718 KB]
(739)
|
|
357 |
YUAN Aiping WAN Chanjun |
|
|
Virtual machine deployment strategy based on improved genetic algorithm in cloud computing environment |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 357-359
[Abstract]
(569)
[HTML 0 KB]
[PDF 604 KB]
(721)
|
|
351 |
YANG Jing WU Lei WU Dean WANG Xiaomin LIU Nianbo |
|
|
Artificial immune algorithm for dynamic task scheduling on cloud computing platform |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 351-356
[Abstract]
(537)
[HTML 0 KB]
[PDF 933 KB]
(614)
|
|
346 |
LIN Xiaoxu LIU Naijin QIAN Jinxi ZHAO Danfeng |
|
|
Analysis and suppression of influence on spotbeam selection of GMR-1 system under antenna oscillation |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 346-350
[Abstract]
(475)
[HTML 0 KB]
[PDF 758 KB]
(1296)
|
|
341 |
JIA Lei WANG Lingjiao GUO Hua XU Yawei LI Juan |
|
|
Enhanced distributed mobility management based on host identity protocol |
|
|
|
Journal of Computer Applications
2014 Vol.34 (2): 341-345
[Abstract]
(619)
[HTML 0 KB]
[PDF 724 KB]
(476)
|
|
302 |
JIANG Zhenghua |
|
|
Application of variance-based optimal combined weight process in evaluating Internet information resources |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 302-308
[Abstract]
(588)
[HTML 1 KB]
[PDF 1003 KB]
(597)
|
|
297 |
HOU Rongtao LU Yu WANG Qin YUAN Chengsheng WANG Jun |
|
|
Application of OPTICS to lightning nowcasting |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 297-301
[Abstract]
(529)
[HTML 1 KB]
[PDF 850 KB]
(426)
|
|
286 |
LI Baolian ZHANG Xiaolong |
|
|
Steel furnace online quality monitoring method based on real-time data processing |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 286-291
[Abstract]
(542)
[HTML 1 KB]
[PDF 868 KB]
(485)
|
|
265 |
QI Yaohui PAN Fuping GE Fengpei YAN Yonghong |
|
|
Discriminative maximum a posteriori for acoustic model adaptation |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 265-269
[Abstract]
(536)
[HTML 1 KB]
[PDF 706 KB]
(548)
|
|
244 |
HUANG Shunliang WANG Qi |
|
|
Method for customer segmentation based on three-way decisions theory |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 244-248
[Abstract]
(3527)
[HTML 1 KB]
[PDF 752 KB]
(526)
|
|
239 |
DONG Hongyu CHEN Xiaoyun |
|
|
Classification of multivariate time series based on singular value decomposition and discriminant locality preserving projection |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 239-243
[Abstract]
(703)
[HTML 1 KB]
[PDF 704 KB]
(660)
|
|
222 |
LONG Yu TONG Xiangrong |
|
|
Property of trust-based recommender systems |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 222-226
[Abstract]
(520)
[HTML 1 KB]
[PDF 852 KB]
(700)
|
|
218 |
CHEN Hongtao XIAO Ruliang NI Youcong DU Xin GONG Ping CAI Sheng-zhen |
|
|
Hybrid recommendation model for personalized trend prediction of fused recommendation potential |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 218-221
[Abstract]
(674)
[HTML 1 KB]
[PDF 641 KB]
(540)
|
|
213 |
ZHANG Xuan LIU Cong WANG Lixia ZHAO Qian YANG Shuai |
|
|
Trustworthy Web service recommendation based on collaborative filtering |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 213-217
[Abstract]
(714)
[HTML 1 KB]
[PDF 792 KB]
(724)
|
|
204 |
CAO Yongchun CAI Zhenqi SHAO Yabin |
|
|
Improved artificial bee colony clustering algorithm based on K-means |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 204-207
[Abstract]
(633)
[HTML 1 KB]
[PDF 814 KB]
(635)
|
|
179 |
WANG Xu ZHAO Shuguang |
|
|
Differential evolution algorithm for high dimensional optimization problem |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 179-181
[Abstract]
(575)
[HTML 1 KB]
[PDF 467 KB]
(440)
|
|
175 |
YUAN Xun |
|
|
Preliminary application of combination resultant theory |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 175-178
[Abstract]
(434)
[HTML 1 KB]
[PDF 469 KB]
(517)
|
|
145 |
FU Lijuan YAO Yu FU Zhongliang |
|
|
Filtering method for medical images based on median filtering and anisotropic diffusion |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 145-148
[Abstract]
(544)
[HTML 1 KB]
[PDF 698 KB]
(642)
|
|
113 |
WANBaoji ZHANG Tao |
|
|
Universal blind detection based on multiple classifiers fusion and image complexity |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 113-118
[Abstract]
(704)
[HTML 1 KB]
[PDF 888 KB]
(387)
|
|
108 |
ZHU Menging XU Lei |
|
|
Hybrid model of alert correlation based on attack graph and alert similarity |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 108-112
[Abstract]
(454)
[HTML 1 KB]
[PDF 765 KB]
(511)
|
|
99 |
LI Jia ZHENG Yiping LIU Chunlong |
|
|
Embed safety mechanism of a RFID anti-collision strategy |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 99-103
[Abstract]
(506)
[HTML 1 KB]
[PDF 761 KB]
(561)
|
|
90 |
WANG Binbin ZHANG Yanyan ZHANG Xuelin |
|
|
Mixed key management scheme based on domain for wireless sensor network |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 90-94
[Abstract]
(552)
[HTML 1 KB]
[PDF 768 KB]
(505)
|
|
78 |
CAO Jie YANG Yatao LI Zichen |
|
|
Lattice signature and its application based on small integer solution problem |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 78-81
[Abstract]
(525)
[HTML 1 KB]
[PDF 591 KB]
(463)
|
|
64 |
YANG Yufei DAI Qi JIA Zhen YI Hongfeng |
|
|
Weakly supervised method for attribute relation extraction |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 64-68
[Abstract]
(542)
[HTML 1 KB]
[PDF 776 KB]
(589)
|
|
46 |
JIN Peiquan XING Baoping JIN Yong YUE Lihua |
|
|
Survey on energy-aware green databases |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 46-53
[Abstract]
(563)
[HTML 1 KB]
[PDF 1418 KB]
(514)
|
|
31 |
SONG Yunhua BO Wenyang ZHOU Qi |
|
|
Prediction on hard disk failure of cloud computing framework by using SMART on COG-OS framework |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 31-35
[Abstract]
(615)
[HTML 1 KB]
[PDF 802 KB]
(635)
|
|
27 |
YU Xing HU Demin CHANG Huang |
|
|
Integrity check method for fine-grained cloud storage data |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 27-30
[Abstract]
(788)
[HTML 1 KB]
[PDF 612 KB]
(545)
|
|
13 |
ZHANG Aihua LI Chunlei GUI Guan |
|
|
Sparse channel estimation method based on compressed sensing for OFDM cooperation system |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 13-17
[Abstract]
(697)
[HTML 1 KB]
[PDF 702 KB]
(436)
|
|
1 |
REN Zhi SUO Jianwei LIU Yan LEI Hongjiang |
|
|
High-efficiency and low-delay address assignment algorithm for LR-WPAN mesh networks |
|
|
|
Journal of Computer Applications
2014 Vol.34 (1): 1-3
[Abstract]
(573)
[HTML 1 KB]
[PDF 552 KB]
(666)
|
|
3608 |
CHEN Liping KONG Xiangzeng ZHEN Zhi LIN Xinqi ZHAN Xiaoshan |
|
|
Application of geometric moving average martingale algorithm in anomaly analysis before earthquake based on sliding window |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3608-3610
[Abstract]
(613)
[HTML 0 KB]
[PDF 506 KB]
(535)
|
|
3591 |
JIN Weijian WANG Chunzhi |
|
|
Iteration MapReduce framework for evolution algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3591-3595
[Abstract]
(652)
[HTML 0 KB]
[PDF 806 KB]
(469)
|
|
3580 |
LI` Chunyan ZHANG Xuejie |
|
|
Performance evaluation on open source cloud platform for high performance computing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3580-3585
[Abstract]
(664)
[HTML 0 KB]
[PDF 940 KB]
(729)
|
|
3522 |
WU Ruifeng HE Lu FANG Dingyi |
|
|
Automatic evaluation scheme for imperceptibility of natural language watermarking |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3522-3526
[Abstract]
(658)
[HTML 0 KB]
[PDF 908 KB]
(873)
|
|
3519 |
LI Yanhong GAO Zhide FENG Wenwen |
|
|
Blind verifiably encrypted signature scheme based on certificateless |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3519-3521
[Abstract]
(586)
[HTML 0 KB]
[PDF 660 KB]
(465)
|
|
3514 |
HONG Xiaojing WANG Bin |
|
|
Leakage-resilient designated verifier signature scheme |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3514-3518
[Abstract]
(567)
[HTML 0 KB]
[PDF 764 KB]
(438)
|
|
3506 |
LI Chun ZHAO Jianbao SHEN Xiaoliu |
|
|
Network security situational awareness method of multi-period assessment |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3506-3510
[Abstract]
(607)
[HTML 0 KB]
[PDF 819 KB]
(503)
|
|
3494 |
HUANG Hui GUO Fan XU Shufang |
|
|
Polymorphic worms signature extraction based on improved ant colony algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3494-3498
[Abstract]
(666)
[HTML 0 KB]
[PDF 786 KB]
(446)
|
|
3473 |
LI Weibin ZHANG Yingxin GUO Xinming ZHANG Wei |
|
|
Bit-flipping prediction acquisition algorithm of weak GPS signal |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3473-3476
[Abstract]
(766)
[HTML 0 KB]
[PDF 652 KB]
(493)
|
|
3469 |
ZENG Yaoping YANG Yixin LU Guangyue |
|
|
Fast DOA estimation for coherent wideband sources based on symmetrical spectrum |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3469-3472
[Abstract]
(524)
[HTML 0 KB]
[PDF 756 KB]
(459)
|
|
3465 |
JI Xiang ZHUANG Ling SHAO Kai WANG Guangyu |
|
|
Design of multi-carrier transceivers based on modified discrete fourier transform filter bank |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3465-3468
[Abstract]
(728)
[HTML 0 KB]
[PDF 634 KB]
(534)
|
|
3453 |
WANG Ling SHI Weiren SHI Xin SONG Ningbo RAN Qike |
|
|
Data compression and optimization algorithm for wireless sensor network based on temporal correlation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3453-3456
[Abstract]
(643)
[HTML 0 KB]
[PDF 751 KB]
(486)
|
|
3444 |
LIANG Dingwen YUAN Lei CAI Zhihua GU Qiong |
|
|
Vehicle navigation algorithm based on unscented Kalman filter sensor information fusion |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3444-3448
[Abstract]
(544)
[HTML 0 KB]
[PDF 709 KB]
(525)
|
|
3432 |
GUO Dong WANG Wei ZENG Guoshun |
|
|
Distributed data storage method based on consistent tree distribution |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3432-3436
[Abstract]
(667)
[HTML 0 KB]
[PDF 828 KB]
(481)
|
|
3428 |
HUO Yuanhong LIU Yi JI Weixing |
|
|
Recovery method for high-level language control structures based on structural analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3428-3431
[Abstract]
(964)
[HTML 0 KB]
[PDF 578 KB]
(437)
|
|
3406 |
ZHENG Ruoqin DU Jinglin XIE Li |
|
|
Directional simple auction aggregation protocol for wireless sensor and actor network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3406-3409
[Abstract]
(519)
[HTML 0 KB]
[PDF 570 KB]
(395)
|
|
3380 |
LI Shuang LI Wenjing SHUN Huanlong LIN Zhongming |
|
|
Artificial fish swarm parallel algorithm based on multi-core cluster |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3380-3384
[Abstract]
(732)
[HTML 0 KB]
[PDF 769 KB]
(419)
|
|
3363 |
FANG Chao YANG Yiling HUANG Yu |
|
|
Case study of achieving context-awareness based on predicate detection |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3363-3367
[Abstract]
(586)
[HTML 0 KB]
[PDF 859 KB]
(430)
|
|
3350 |
DAI Jin LIU Bo BIAN Haoyu |
|
|
Design and implementation of E-mail security service system with cloud computing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3350-3353
[Abstract]
(881)
[HTML 0 KB]
[PDF 687 KB]
(654)
|
|
3345 |
FAN Min XU Shengcai |
|
|
Massive medical image retrieval system based on Hadoop |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3345-3349
[Abstract]
(711)
[HTML 0 KB]
[PDF 776 KB]
(614)
|
|
3326 |
QIAN Yurong YU Jiong WANG Weiyuan SHUN Hua LIAO Bin YANG Xingyao |
|
|
Energy saving and load balance strategy in cloud computing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (12): 3326-3330
[Abstract]
(735)
[HTML 0 KB]
[PDF 867 KB]
(752)
|
|
3309 |
SHAN Zhichao JU Jianbo QU Xiaohui WEN Wei |
|
|
Calculation of submarine distribution probability in call searching submarine for several typical cases |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3309-3312
[Abstract]
(616)
[HTML 0 KB]
[PDF 521 KB]
(470)
|
|
3300 |
XIE Guocheng JIANG Yun CHEN Na |
|
|
New medical image classification approach based on hypersphere multi-class support vector data description |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3300-3304
[Abstract]
(635)
[HTML 0 KB]
[PDF 800 KB]
(472)
|
|
3296 |
WANG Lei CHEN Jindong PAN Feng |
|
|
Applications of gravitational search algorithm in parameters estimation of penicillin fermentation process model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3296-3299
[Abstract]
(519)
[HTML 0 KB]
[PDF 737 KB]
(489)
|
|
3284 |
YANG Tongyao WANG Bin LI Chuan HE Bi XIONG Xin |
|
|
Real-time monitoring and warning system of tunnel strain based on improved principal component analysis method |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3284-3287
[Abstract]
(649)
[HTML 0 KB]
[PDF 823 KB]
(461)
|
|
3271 |
HE Chan LIU Wei |
|
|
Logistics service supply chain coordination based on forecast-commitment contract |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3271-3275
[Abstract]
(597)
[HTML 0 KB]
[PDF 810 KB]
(434)
|
|
3252 |
WANG Wei FU Xiaodong XIA Yongying TIAN Qiang LI Changzhi |
|
|
Score distribution method for Web service composition |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3252-3256
[Abstract]
(683)
[HTML 0 KB]
[PDF 858 KB]
(438)
|
|
3247 |
XU Jun |
|
|
About the secret sharing scheme applied in the Pi calculus |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3247-3251
[Abstract]
(636)
[HTML 0 KB]
[PDF 796 KB]
(389)
|
|
3239 |
CAI Jianzhang WEI Qiang ZHU Yuefei |
|
|
Identification of encrypted function in malicious software |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3239-3243
[Abstract]
(604)
[HTML 0 KB]
[PDF 773 KB]
(459)
|
|
3232 |
ZHANG Tao REN Shuai JU Yongfeng LING Rao YANG Zhaohui |
|
|
Secret information sharing algorithm based on CL multi-wavelet and combination bit plane for confidential communication |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3232-3234
[Abstract]
(682)
[HTML 0 KB]
[PDF 490 KB]
(477)
|
|
3224 |
HUANG Zhengxing SU Yang |
|
|
Network security situational assessment based on link performance analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3224-3227
[Abstract]
(566)
[HTML 0 KB]
[PDF 650 KB]
(423)
|
|
3204 |
LI Gaoxi CAO Jun ZHANG Fuyuan LI Hua |
|
|
Iterative filtering algorithm for color image based on visual sensitivity and improved directional distance |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3204-3208
[Abstract]
(681)
[HTML 0 KB]
[PDF 840 KB]
(379)
|
|
3187 |
ZHANG Yi HUANG Cong LUO Yuan |
|
|
Behavior recognition in rehabilitation training based on modified naive bayes classifier |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3187-3189
[Abstract]
(570)
[HTML 0 KB]
[PDF 638 KB]
(609)
|
|
3167 |
WANG Hailing WANG Jian YIN Guisheng FU Qiao ZHOU Bo |
|
|
Multi-feature fusion method for mesh simplification |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3167-3171
[Abstract]
(569)
[HTML 0 KB]
[PDF 780 KB]
(474)
|
|
3160 |
WANG Fang LI Meian DUAN Weijun |
|
|
Cloud computing task scheduling based on dynamically adaptive ant colony algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3160-3162
[Abstract]
(660)
[HTML 0 KB]
[PDF 621 KB]
(548)
|
|
3149 |
HOU Yongsheng ZHAO Rongcai GAO Wei GAO Wei |
|
|
Single instruction multiple data vectorization of non-normalized loops |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3149-3154
[Abstract]
(575)
[HTML 0 KB]
[PDF 948 KB]
(414)
|
|
3138 |
ZHU Guoteng SUN Wei |
|
|
Rapid speech keyword spotting method based on template matching |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3138-3140
[Abstract]
(698)
[HTML 0 KB]
[PDF 484 KB]
(570)
|
|
3134 |
WU Jiehua |
|
|
TAN Model For Ties Prediction In Social Networks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3134-3137
[Abstract]
(604)
[HTML 0 KB]
[PDF 711 KB]
(450)
|
|
3123 |
WU Jin ZHANG Guoliang TANG Wenjun SHUN Yijie |
|
|
Collision avoidance algorithm for multi-robot system based on improved artificial coordinating field |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3123-3128
[Abstract]
(537)
[HTML 0 KB]
[PDF 895 KB]
(435)
|
|
3107 |
ZHANG Yanliang CHEN Xin LI Yadong |
|
|
Modified method for wavelet neural network model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3107-3110
[Abstract]
(565)
[HTML 0 KB]
[PDF 757 KB]
(467)
|
|
3097 |
CHEN Dayao CHEN Xiuhong |
|
|
Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3097-3101
[Abstract]
(695)
[HTML 0 KB]
[PDF 733 KB]
(438)
|
|
3094 |
LI Taiyong WANG Huijun WU Jiang ZHANG Zhilin TANG Changjie |
|
|
Sparse Bayesian learning for credit risk evaluation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3094-3096
[Abstract]
(947)
[HTML 0 KB]
[PDF 609 KB]
(509)
|
|
3080 |
SHI Qingwei LI Yanni GUO Pengliang |
|
|
Dynamic finding of authors‘ research interests in scientific literature |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3080-3083
[Abstract]
(670)
[HTML 0 KB]
[PDF 534 KB]
(452)
|
|
3049 |
DONG Lin SHU Hong |
|
|
Incremental maintenance of discovered spatial association rules |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3049-3051
[Abstract]
(722)
[HTML 0 KB]
[PDF 687 KB]
(474)
|
|
3035 |
ZHAO Huaqiong TANG Xuewen |
|
|
Evaluation model of network service performance based on fuzzy analytic hierarchy process |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3035-3038
[Abstract]
(641)
[HTML 0 KB]
[PDF 635 KB]
(478)
|
|
3032 |
BIAN Hongyu WANG Junlin |
|
|
Wideband estimating signal parameters via rotational invariance technique algorithm based on spatial-temporal discrete Fourier transformation projection |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3032-3034
[Abstract]
(579)
[HTML 0 KB]
[PDF 610 KB]
(352)
|
|
3024 |
XU Xiulan LI Keqing HUANG Yuyue |
|
|
Efficient node deployment algorithm based on dynamic programming in wireless sensor networks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3024-3027
[Abstract]
(578)
[HTML 0 KB]
[PDF 785 KB]
(433)
|
|
3010 |
SONG Yan FU Qian |
|
|
Network proxy research and implementation for Internet of things applications based on constrained application protocol |
|
|
|
Journal of Computer Applications
2013 Vol.33 (11): 3010-3015
[Abstract]
(678)
[HTML 0 KB]
[PDF 964 KB]
(550)
|
|
3000 |
DENG Tao YAO Hong PAN Yunliang |
|
|
Adaptive dynamic surface control for a class of high-order stochastic nonlinear systems |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 3000-3004
[Abstract]
(518)
[HTML 0 KB]
[PDF 619 KB]
(510)
|
|
2981 |
ZHANG Yang WANG Chen |
|
|
Spatial data visualization based on cluster analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2981-2983
[Abstract]
(730)
[HTML 1 KB]
[PDF 695 KB]
(1080)
|
|
2996 |
LI Mansi SHANG Yongshuang ZHANG Yongyu |
|
|
Carrier aircrafts operational readiness based on condition-based maintenance |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2996-2999
[Abstract]
(639)
[HTML 0 KB]
[PDF 654 KB]
(548)
|
|
2984 |
LYU Rui SUN Linfu LIU Shuya |
|
|
Research on form dynamic configuration technology for industrial-chain coordination SaaS platform |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2984-2988
[Abstract]
(607)
[HTML 0 KB]
[PDF 767 KB]
(673)
|
|
2977 |
YANG Xiaoyan CUI Bingmei |
|
|
Molten iron transportation scheduling optimization and simulation of iron and steel enterprises |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2977-2980
[Abstract]
(707)
[HTML 0 KB]
[PDF 618 KB]
(623)
|
|
2960 |
LU Zhigang ZHU Wenjin |
|
|
Profit distribution for information production supply chain based on modified interval-valued fuzzy Shapley value |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2960-2963
[Abstract]
(590)
[HTML 0 KB]
[PDF 576 KB]
(559)
|
|
2954 |
LUO Biao YAN Weiwei WAN Liang |
|
|
Customer value classification model and application based on analytic network process and K-means clustering |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2954-2959
[Abstract]
(643)
[HTML 0 KB]
[PDF 926 KB]
(780)
|
|
2950 |
HE Wei XU Fuyuan |
|
|
Inventory model for promotional merchandise with time-dependent partial backlogging rate and inventory-level-dependent demand rate |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2950-2953
[Abstract]
(607)
[HTML 0 KB]
[PDF 564 KB]
(639)
|
|
2931 |
GENG Hai HE Xiaowei FAN Junli |
|
|
Image denoising algorithm with variable exponent regularization and L1 fidelity |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2931-2934
[Abstract]
(715)
[HTML 0 KB]
[PDF 678 KB]
(591)
|
|
2918 |
JIANG Aiwen LIU Changhong WANG Mingwen |
|
|
Video jitter detection algorithm based on forward-backward optical flow point matching motion entropy |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2918-2921
[Abstract]
(531)
[HTML 0 KB]
[PDF 671 KB]
(725)
|
|
2895 |
XIA Xiaoluan DENG Hongxia LI Haifang |
|
|
Application of PCNN with the improved traversal process in image processing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2895-2898
[Abstract]
(662)
[HTML 0 KB]
[PDF 742 KB]
(580)
|
|
2874 |
SHAO Nan ZHANG Ke |
|
|
Image recognition algorithm based on projection entropy |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2874-2877
[Abstract]
(822)
[HTML 0 KB]
[PDF 597 KB]
(570)
|
|
2868 |
QI Ke XIE Dongqing |
|
|
Universal steganalysis for RGB images based on color gradient matrix |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2868-2870
[Abstract]
(621)
[HTML 0 KB]
[PDF 588 KB]
(699)
|
|
2865 |
ZHANG Wenquan ZHANG Ye ZHOU Nanrun |
|
|
Nonlinear image encryption algorithm based on random fractional Mellin transform |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2865-2867
[Abstract]
(759)
[HTML 0 KB]
[PDF 643 KB]
(679)
|
|
2846 |
YE Xiaolong LAN Julong GUO Tong |
|
|
Network anomaly detection method based on principle component analysis and tabu search and decision tree classification |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2846-2850
[Abstract]
(614)
[HTML 0 KB]
[PDF 987 KB]
(860)
|
|
2838 |
ZHOU Yingjie JIAO Chengbo CHEN Huinan MA Li HU Guangmin |
|
|
Traffic behavior feature based DoSⅅoS attack detection and abnormal flow identification for backbone networks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2838-2841
[Abstract]
(879)
[HTML 0 KB]
[PDF 808 KB]
(801)
|
|
2832 |
LUO Wenjun XU Min |
|
|
Attribute-based encryption and re-encryption key management in cloud computing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2832-2834
[Abstract]
(646)
[HTML 0 KB]
[PDF 661 KB]
(740)
|
|
2807 |
XU Jianmin SUN Xiaolei WU Guifang |
|
|
Dynamic model combining with time facter for event tracking |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2807-2810
[Abstract]
(574)
[HTML 0 KB]
[PDF 775 KB]
(592)
|
|
2787 |
ZHANG Binlian XU Hongzhi |
|
|
On-line energy-aware scheduling algorithm in multiprocessor system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2787-2791
[Abstract]
(546)
[HTML 0 KB]
[PDF 823 KB]
(699)
|
|
2783 |
Liang DENG XU Chuanfu LIU Wei ZHANG Lilun |
|
|
Parallelization and optimization of alternating direction implicit CFD solver on GPU |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2783-2786
[Abstract]
(730)
[HTML 0 KB]
[PDF 594 KB]
(707)
|
|
2778 |
ZHU Dongfang SU Qunxing LIU Pengyuan |
|
|
Key technology of cloud simulation for distributed virtual maintenance training system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2778-2782
[Abstract]
(519)
[HTML 0 KB]
[PDF 1008 KB]
(659)
|
|
2772 |
WANG Jiajing ZENG Hui HE Tengjiao ZHANG Na |
|
|
Virtual machine placement and optimization for data center |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2772-2777
[Abstract]
(788)
[HTML 0 KB]
[PDF 944 KB]
(825)
|
|
2769 |
LI Yanmin YI Qingming SHI Min |
|
|
High-sensitive GPS signal acquisition method based on wavelet filtering |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2769-2771
[Abstract]
(755)
[HTML 0 KB]
[PDF 622 KB]
(697)
|
|
2765 |
ZHU Hongbo ZHANG Tianqi WANG Zhichao LI Junwei |
|
|
Algorithm for modulation recognition based on cumulants in Rayleigh channel |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2765-2768
[Abstract]
(612)
[HTML 0 KB]
[PDF 563 KB]
(857)
|
|
2739 |
ZHANG Kunfeng GUO Ying ZHANG Guoxiang ZHAO Yang |
|
|
Demodulation algorithm design of VHF data broadcast signal |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2739-2741
[Abstract]
(689)
[HTML 0 KB]
[PDF 535 KB]
(706)
|
|
2711 |
YANG Xiaoliang YE Ayong LING Yuanjing |
|
|
Indoor localization algorithm based on threshold classification and signal strength weighting |
|
|
|
Journal of Computer Applications
2013 Vol.33 (10): 2711-2714
[Abstract]
(678)
[HTML 0 KB]
[PDF 620 KB]
(935)
|
|
2683 |
ZHAO Wendian DENG Zhensheng |
|
|
Improved fuzzy level set method for automatic MR image segmentation based on edge competition |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2683-2685
[Abstract]
(765)
[HTML 1 KB]
[PDF 684 KB]
(394)
|
|
2679 |
YANG Zhi LUO Guo YUAN Fangfang |
|
|
Application of adaptive wavelet scalogram threshold in diaphragmatic electromyographic signal denoising |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2679-2682
[Abstract]
(623)
[HTML 1 KB]
[PDF 599 KB]
(516)
|
|
2675 |
WUQian JIA Jing CAO Ruifen PEI Xi WU Aidong WU Yichan FDS Team |
|
|
Application of three-dimensional medical image registration algorithm in image-guided radiotherapy |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2675-2678
[Abstract]
(776)
[HTML 1 KB]
[PDF 714 KB]
(519)
|
|
2667 |
CHEN Dayao CHEN Weiqi CHEN Xiuhong |
|
|
Face recognition based on complete orthogonal neighbourhood preserving discriminant embedding |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2667-2670
[Abstract]
(804)
[HTML 1 KB]
[PDF 742 KB]
(456)
|
|
2662 |
LIU Jinming WANG Kuanquan |
|
|
School of Computer Science and Technology, Harbin Institute of Technology, Harbin Heilongjiang 150001, China |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2662-2666
[Abstract]
(610)
[HTML 1 KB]
[PDF 872 KB]
(633)
|
|
2658 |
WEN Hui CHEN Yufei WANG Zhicheng ZHAO Xiaodong YUE Xiaodong |
|
|
Liver segmentation method based on hierarchical vascular tree |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2658-2661
[Abstract]
(712)
[HTML 1 KB]
[PDF 663 KB]
(442)
|
|
2653 |
WANG Bin ZHOU Xuemei SHENG Jingfang |
|
|
Health degree evaluation model of miners escaping from a mine fire |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2653-2657
[Abstract]
(651)
[HTML 1 KB]
[PDF 748 KB]
(429)
|
|
2610 |
LI Hongsheng XUE Yueju HUANG Xiaolin HUANG Ke HE Jinhui |
|
|
Improved object detection method of adaptive Gaussian mixture model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2610-2613
[Abstract]
(655)
[HTML 1 KB]
[PDF 659 KB]
(538)
|
|
2595 |
REN Zhong LIU Ying LIU Guodong HUANG Zhen |
|
|
Improved wavelet denoising with dual-threshold and dual-factor function |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2595-2598
[Abstract]
(717)
[HTML 1 KB]
[PDF 632 KB]
(483)
|
|
2588 |
CHEN Zhongqiu SHI Rui LIU Jingmiao |
|
|
Color image denoising based on Gaussian weighting and manifold for high fidelity |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2588-2591
[Abstract]
(625)
[HTML 1 KB]
[PDF 822 KB]
(493)
|
|
2580 |
ZHANG Jun LI Hui |
|
|
Mathematical model for reconstructing luminance distribution of the projector-screen system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2580-2583
[Abstract]
(674)
[HTML 1 KB]
[PDF 649 KB]
(831)
|
|
2577 |
ZHUANG Yanbin GUI Yuan XIAO Xianjian |
|
|
Compressed Video Sensing Method Based on Motion Estimation and Backtracking based Adaptive Orthogonal Matching Pursuit |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2577-2579
[Abstract]
(638)
[HTML 1 KB]
[PDF 649 KB]
(692)
|
|
2557 |
WANG Jianlong SUN Heming |
|
|
Study Knapsack Problem Based On Greedy Discrete Electromagnetism-like Mechanism Algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2557-2561
[Abstract]
(630)
[HTML 1 KB]
[PDF 678 KB]
(458)
|
|
2550 |
LI Guozhu |
|
|
Real-coded quantum evolutionary algorithm based on cloud model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2550-2552
[Abstract]
(638)
[HTML 1 KB]
[PDF 632 KB]
(598)
|
|
2540 |
QIU Yunfei LIN Mingming SHAO Liangshan |
|
|
Establishment and application of consumption sentiment ontology library based on three-dimensional coordinate |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2540-2545
[Abstract]
(614)
[HTML 1 KB]
[PDF 925 KB]
(720)
|
|
2529 |
YAN Lixia XIAO Mingbo |
|
|
Digital watermarking protocol based on El Gamal algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2529-2531
[Abstract]
(821)
[HTML 1 KB]
[PDF 623 KB]
(528)
|
|
2520 |
ZHANG Guimin LI Qingbao WANG Wei ZHU Yi |
|
|
Software tamper resistance based on function-level control-flow monitoring |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2520-2524
[Abstract]
(773)
[HTML 1 KB]
[PDF 798 KB]
(573)
|
|
2511 |
REN Zhiyu CHEN Xingyuan SHAN Dibin |
|
|
Cross-domain authorization management model based on two-tier role mapping |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2511-2515
[Abstract]
(601)
[HTML 1 KB]
[PDF 785 KB]
(434)
|
|
2493 |
LIU Xueqiong WU Gang DENG Houping |
|
|
Data deduplication in Web information integration |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2493-2496
[Abstract]
(624)
[HTML 1 KB]
[PDF 645 KB]
(426)
|
|
2470 |
TANG Jie HUANG Hongguang |
|
|
Three dimensional localization algorithm for wireless sensor networks based on projection and grid scan |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2470-2473
[Abstract]
(651)
[HTML 1 KB]
[PDF 561 KB]
(388)
|
|
2460 |
TONG Yinghua GENG Shengling |
|
|
Signal decomposition algorithm for reducing peak-to-average power ratio of OFDM |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2460-2462
[Abstract]
(625)
[HTML 1 KB]
[PDF 393 KB]
(532)
|
|
2455 |
LI Zhen ZHU Lei CHEN Xushan JIANG Haixia |
|
|
Joint call admission control algorithm based on reputation model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2455-2459
[Abstract]
(648)
[HTML 1 KB]
[PDF 721 KB]
(373)
|
|
2432 |
LAN Zhongzhou LE Lihua GAO Yun |
|
|
Numerical simulation of one-dimensional Burgers' equation based on lattice Boltzmann method |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2432-2435
[Abstract]
(716)
[HTML 1 KB]
[PDF 482 KB]
(535)
|
|
2428 |
WEI Haoyang ZENG Guosun DING Chunling |
|
|
Parallel computing and numerical analysis of laminar diffusion combustion on GPU |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2428-2431
[Abstract]
(636)
[HTML 1 KB]
[PDF 712 KB]
(455)
|
|
2423 |
YANG Lipeng CHE Yonggang |
|
|
HDF5 based parallel I/O technology for structure grid CFD applications |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2423-2427
[Abstract]
(702)
[HTML 1 KB]
[PDF 791 KB]
(573)
|
|
2404 |
FANG Juan GUO Mei DU Wenjuan LEI Ding |
|
|
Low-power oriented cache design for multi-core processor |
|
|
|
Journal of Computer Applications
2013 Vol.33 (09): 2404-2409
[Abstract]
(757)
[HTML 1 KB]
[PDF 880 KB]
(487)
|
|
2194 |
LI Zhean CHEN Jianping ZHANG Yajuan ZHAO Weihua |
|
|
Robust feature selection method in high-dimensional data mining |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2194-2197
[Abstract]
(1039)
[HTML 1 KB]
[PDF 811 KB]
(872)
|
|
2394 |
HAN Liang PU Xiujuan |
|
|
Extraction of fetal electrocardiogram signal utilizing blind source separation based on time-frequency distributions and wavelet packet denoising |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2394-2396
[Abstract]
(616)
[HTML 0 KB]
[PDF 629 KB]
(442)
|
|
2387 |
ZHANG Zongnian LI Jinhui HUANG Rentai YAN Jingwen |
|
|
Iterative Hard Thresholding Orthogonal Projection under Cosparsity Analysis Model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2387-2389
[Abstract]
(474)
[HTML 0 KB]
[PDF 624 KB]
(421)
|
|
2383 |
LINJingdong WANG Wei LIAO Xiaoyong |
|
|
Method for music soft-cutting and classification in rough-emotion area |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2383-2386
[Abstract]
(533)
[HTML 0 KB]
[PDF 625 KB]
(444)
|
|
2379 |
HAN Guanghui ZENG Cheng |
|
|
Research on function shift in Boyer-Moore algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2379-2382
[Abstract]
(589)
[HTML 0 KB]
[PDF 536 KB]
(366)
|
|
2375 |
Li-Xia LIU ZHANG Zhiqiang |
|
|
Similar string search algorithm based on Trie tree |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2375-2378
[Abstract]
(787)
[HTML 0 KB]
[PDF 651 KB]
(524)
|
|
2177 |
WANG Zhe GAO Sanhong ZHENG Huiying LI Lichun |
|
|
Parallel Delaunay algorithm design in lunar surface terrain reconstruction system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2177-2183
[Abstract]
(827)
[HTML 1 KB]
[PDF 1078 KB]
(686)
|
|
2289 |
MO Dongcheng LIU Guodong |
|
|
Improved RRT-Connect path planning algorithm for biped robot |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2289-2292
[Abstract]
(1254)
[HTML 0 KB]
[PDF 622 KB]
(603)
|
|
2253 |
PENG Shuo OUYANG Aijia YUE Guangxue HE Minghua ZHOU Xu |
|
|
Improved glowworm swarm optimization algorithm for high-dimensional functions |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2253-2256
[Abstract]
(846)
[HTML 1 KB]
[PDF 700 KB]
(660)
|
|
2359 |
XIONG Ping LU Hua |
|
|
Modified 3D facial reconstruction algorithm based on a single photo |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2359-2361
[Abstract]
(812)
[HTML 0 KB]
[PDF 663 KB]
(585)
|
|
2341 |
LU Jun GAO Le ZHANG Xin |
|
|
Color clustering method for high and low intensity stripes of color structured light system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2341-2345
[Abstract]
(600)
[HTML 0 KB]
[PDF 763 KB]
(396)
|
|
2337 |
TAN Zhiying CHEN Ying FENG Yong SONG Xiaobo |
|
|
Learning optimal kernel mapping based on function space with dynamic parameters |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2337-2340
[Abstract]
(732)
[HTML 0 KB]
[PDF 573 KB]
(455)
|
|
2293 |
LI Qian DU Youtian XUE Jiao |
|
|
Web video classification based on bidirectional propagation of heterogeneous attributes |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2293-2296
[Abstract]
(494)
[HTML 0 KB]
[PDF 707 KB]
(437)
|
|
2250 |
WANG Yi DU Weizhang |
|
|
Security analysis and improvement of certificateless signature scheme without bilinear pairing |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2250-2252
[Abstract]
(899)
[HTML 1 KB]
[PDF 467 KB]
(523)
|
|
2232 |
JING Li ZHANG Hongjun |
|
|
Quantitative estimation of parameters in quantization modulation watermarking method of wavelet domain based on PSNR |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2232-2235
[Abstract]
(554)
[HTML 0 KB]
[PDF 637 KB]
(457)
|
|
2112 |
DU Peng BAI Guangwei SHEN Hang CAO Lei |
|
|
Energy-aware P2P data sharing mechanism for heterogeneous mobile terminals |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2112-2116
[Abstract]
(942)
[HTML 1 KB]
[PDF 985 KB]
(651)
|
|
2100 |
Fen LIU GE Guodong ZHAO Yu LIU Bingyang |
|
|
Associating User Mining of Location Group in The Mobile Communication Network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (08): 2100-2103
[Abstract]
(875)
[HTML 1 KB]
[PDF 675 KB]
(638)
|
|
2059 |
CHEN Xiuliang LIANG Yingjie GUO Fuliang |
|
|
Fireworks simulation based on CUDA particle system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2059-2062
[Abstract]
(1236)
[HTML 1 KB]
[PDF 603 KB]
(579)
|
|
2055 |
WU Youde ZHU Liuxian LI Bailin |
|
|
Dynamic simulation based on dyna971 for computer numerical control boring and milling machine |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2055-2058
[Abstract]
(857)
[HTML 1 KB]
[PDF 736 KB]
(484)
|
|
2051 |
CHU Caijun HU Dasha JIANG Yuming |
|
|
Contention management model based on relativity-detection of conflicts |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2051-2054
[Abstract]
(823)
[HTML 1 KB]
[PDF 832 KB]
(597)
|
|
2046 |
DU Kunping KANG Fei SHU Hui SUN Jing |
|
|
Behavior analysis technology of software network communication based on session association |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2046-2050
[Abstract]
(632)
[HTML 1 KB]
[PDF 959 KB]
(494)
|
|
2009 |
ZHANG Ning LIU Wenping |
|
|
Plant leaf recognition method based on clonal selection algorithm and K nearest neighbor |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2009-2013
[Abstract]
(923)
[HTML 1 KB]
[PDF 782 KB]
(704)
|
|
2005 |
GUO Qiumei HUANG Yuqing |
|
|
Unstructured road detection based on two-dimensional entropy and contour features |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2005-2008
[Abstract]
(685)
[HTML 1 KB]
[PDF 640 KB]
(601)
|
|
2002 |
DANG Xiangying BAO Rong JIANG Daihong |
|
|
GPU parallel implementation of edge-detection algorithm based on multidirectional linear gradient adjusted predictor |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 2002-2004
[Abstract]
(938)
[HTML 1 KB]
[PDF 630 KB]
(578)
|
|
1984 |
LIU Heng ZHENG Quan QIN Long ZHAO Tianhao WANG Song |
|
|
Star pattern recognition algorithm of large field of view based on concentric circles segmentation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1984-1987
[Abstract]
(729)
[HTML 1 KB]
[PDF 706 KB]
(476)
|
|
1938 |
LI Shuling LIU Rong ZHANG Liuqin LIU Hong |
|
|
Speech emotion recognition algorithm based on modified SVM |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1938-1941
[Abstract]
(1264)
[HTML 1 KB]
[PDF 664 KB]
(741)
|
|
1935 |
CHU Wen LI Yinguo XU Yang MENG Xiangtao |
|
|
Speaker recognition method based on utterance level principal component analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1935-1937
[Abstract]
(784)
[HTML 1 KB]
[PDF 635 KB]
(599)
|
|
1930 |
LI Feng WANG Zhengqun XU Chunlin ZHOU Zhongxia XUE Wei |
|
|
Dimensionality reduction algorithm of local marginal Fisher analysis based on Mahalanobis distance |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1930-1934
[Abstract]
(809)
[HTML 1 KB]
[PDF 778 KB]
(534)
|
|
1926 |
GENG Huantong GAO Jun JIA Tingting WU Zhengxue |
|
|
Multi-objective particle swarm optimization method with balanced diversity and convergence |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1926-1929
[Abstract]
(949)
[HTML 1 KB]
[PDF 724 KB]
(556)
|
|
1917 |
SHAO Chao WAN Chunhong |
|
|
Manifold learning and visualization based on self-organizing map |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1917-1921
[Abstract]
(930)
[HTML 1 KB]
[PDF 1010 KB]
(597)
|
|
1912 |
GAO Qiankun WANG Yujun WANG Jingxiao |
|
|
New coordinate optimization method for non-smooth losses based on alternating direction method of multipliers |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1912-1916
[Abstract]
(856)
[HTML 1 KB]
[PDF 628 KB]
(521)
|
|
1908 |
LI Bo WANG Shi SHI Songxin HU Junyong |
|
|
Optimum packing of rectangles based on heuristic dynamic decomposition algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1908-1911
[Abstract]
(1118)
[HTML 1 KB]
[PDF 597 KB]
(556)
|
|
1898 |
ZHANG Liang XU ChengCheng TIAN Zheng LI Tao |
|
|
Hardware/software partitioning based on greedy algorithm and simulated annealing algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1898-1902
[Abstract]
(920)
[HTML 1 KB]
[PDF 769 KB]
(608)
|
|
1890 |
DU Xin LIU Dagang ZHANG Kaihuo SHEN Yuan ZHAO Kang NI Youcong |
|
|
Auto-clustering algorithm based on compute unified device architecture and gene expression programming |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1890-1893
[Abstract]
(963)
[HTML 1 KB]
[PDF 718 KB]
(582)
|
|
1870 |
LAI Zhongxi ZHANG Zhanjun TAO Dongya |
|
|
Algorithm for directly computing 7P elliptic curves and its application |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1870-1874
[Abstract]
(836)
[HTML 1 KB]
[PDF 637 KB]
(570)
|
|
1851 |
ZHANG Ji DU Xiaoni LI Xu LIN Jipo |
|
|
Security key pre-distribution scheme for wireless sensor networks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1851-1853
[Abstract]
(997)
[HTML 1 KB]
[PDF 604 KB]
(717)
|
|
1839 |
WANG Zhen-chaoZhenchao GAO Yang XUE Wenling YANG Jianpo |
|
|
Echo cancellation technique solutions based on parallel filter |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1839-1841
[Abstract]
(883)
[HTML 1 KB]
[PDF 469 KB]
(483)
|
|
1828 |
WANG Zhichao ZHANG Tianqi WAN Yilong ZHU Hongbo |
|
|
Direction of arrival estimation of orthogonal frequency division multiplexing signal based on wideband focused matrix and higher-order cumulant |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1828-1832
[Abstract]
(1006)
[HTML 1 KB]
[PDF 760 KB]
(666)
|
|
1813 |
ZHAO Xin ZHANG Xin |
|
|
Inter-cluster routing algorithm in wireless sensor network based on game theory |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1813-1815
[Abstract]
(1171)
[HTML 1 KB]
[PDF 623 KB]
(594)
|
|
1805 |
MA Yubin XIE Zheng CHEN Zhi |
|
|
Shortest dynamic time flow problem in continuous-time capacitated network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (07): 1805-1808
[Abstract]
(797)
[HTML 1 KB]
[PDF 689 KB]
(534)
|
|
1790 |
LAN Kun ZHANG Yue |
|
|
Application of Android in remote medical information system |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1790-1792
[Abstract]
(1433)
[HTML 1 KB]
[PDF 511 KB]
(1300)
|
|
1767 |
LIU Zunxiong HUANG Zhiqiang YAN Feng ZHANG Heng |
|
|
Financial failure prediction using support vector machine with Q-Gaussian kernel |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1767-1770
[Abstract]
(822)
[HTML 1 KB]
[PDF 601 KB]
(652)
|
|
1763 |
LUO Ya’nan FU Yongqing |
|
|
Path planning algorithm based on hierarchical road network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1763-1766
[Abstract]
(1030)
[HTML 1 KB]
[PDF 639 KB]
(757)
|
|
1739 |
FENG Yangqin CHEN Fei |
|
|
Fast volume measurement algorithm based on image edge detection |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1739-1741
[Abstract]
(804)
[HTML 1 KB]
[PDF 494 KB]
(664)
|
|
1737 |
XIANG Yan HE Jianfeng MA Lei YI Sanli XU Jiaping |
|
|
New method for multiple sclerosis white matter lesions segmentation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1737-1741
[Abstract]
(939)
[HTML 1 KB]
[PDF 509 KB]
(768)
|
|
1727 |
LI Chao LI Guangyao TAN Yunlan XU Xianglong |
|
|
Medical images fusion of nonsubsampled Contourlet transform and regional feature |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1727-1731
[Abstract]
(881)
[HTML 1 KB]
[PDF 787 KB]
(747)
|
|
1723 |
HUANG Kekun |
|
|
Regularized marginal Fisher analysis and sparse representation for face recognition |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1723-1726
[Abstract]
(1026)
[HTML 1 KB]
[PDF 632 KB]
(709)
|
|
1682 |
QIANG Zhenping LIU Hui SHANG Zhenhong CHEN Xu |
|
|
Improved foreground detection based on statistical model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1682-1694
[Abstract]
(657)
[HTML 1 KB]
[PDF 912 KB]
(766)
|
|
1670 |
TIAN Yuanrong TIAN Song XU Yuelei ZHA Yufei |
|
|
Image object detection based on local feature and sparse representation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1670-1673
[Abstract]
(735)
[HTML 1 KB]
[PDF 649 KB]
(828)
|
|
1665 |
CHEN Xueling ZHAO Chunhui LI Yaojun CHENG Yongmei |
|
|
Multi-feature suitability analysis of matching area based on D-S theory |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1665-1669
[Abstract]
(666)
[HTML 1 KB]
[PDF 798 KB]
(750)
|
|
1642 |
XU Kaiyong FANG Ming YANG Tianchi MENG Fanwei HUANG Huixin |
|
|
Value-at-risk quantitative method about password chip under differential power analysis attacks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1642-1645
[Abstract]
(913)
[HTML 1 KB]
[PDF 673 KB]
(884)
|
|
1612 |
CHEN Shanshan |
|
|
Trust model based on weight factor in P2P network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1612-1614
[Abstract]
(802)
[HTML 1 KB]
[PDF 461 KB]
(765)
|
|
1600 |
MAO Wentao ZHAO Zhongtang HE Huanhuan |
|
|
Model selection of extreme learning machine based on latent feature space |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1600-1603
[Abstract]
(863)
[HTML 1 KB]
[PDF 623 KB]
(770)
|
|
1574 |
YANG Ligong ZHU Jian TANG Shiping |
|
|
Survey of text sentiment analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1574-1607
[Abstract]
(1305)
[HTML 1 KB]
[PDF 987 KB]
(3987)
|
|
1571 |
PENG Fuming YAO Min BAI Shunke |
|
|
Convergence analysis of general evolutionary algorithms |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1571-1573
[Abstract]
(781)
[HTML 1 KB]
[PDF 436 KB]
(709)
|
|
1566 |
FENG Dengke RUAN Qi DU Limin |
|
|
Binary cuckoo search algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1566-1570
[Abstract]
(1343)
[HTML 1 KB]
[PDF 797 KB]
(951)
|
|
1563 |
GUO Xin SUN Lijie LI Guangming JIANG Kaizhong |
|
|
Discrete free search algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1563-1570
[Abstract]
(685)
[HTML 1 KB]
[PDF 572 KB]
(681)
|
|
1548 |
GAO Wenchao ZHOU Qiang QIAN Xu CAI Yici |
|
|
Chip layer assignment method for analytical placement of 3D ICs |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1548-1552
[Abstract]
(857)
[HTML 1 KB]
[PDF 736 KB]
(777)
|
|
1540 |
FU Jiyun JIA Weile CAO Zongyan WANG Long YE Huang CHI Xuebin |
|
|
First-principle nonlocal projector potential calculation on GPU cluster |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1540-1552
[Abstract]
(1207)
[HTML 1 KB]
[PDF 793 KB]
(754)
|
|
1527 |
ZHU Shibing JIN Jie SU Hansong CUI Ya'nan |
|
|
Femtocell downlink power control algorithm in long term evolution |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1527-1530
[Abstract]
(1232)
[HTML 1 KB]
[PDF 540 KB]
(859)
|
|
1505 |
DONG Ting |
|
|
Opportunistic routing strategy based on local information in mobile sensor networks |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1505-1518
[Abstract]
(833)
[HTML 1 KB]
[PDF 675 KB]
(924)
|
|
1508 |
JIANG Shan QIU Hongbing HAN Xu |
|
|
Sparsity adaptive matching pursuit algorithm based on adaptive threshold for OFDM sparse channel estimation |
|
|
|
Journal of Computer Applications
2013 Vol.33 (06): 1508-1514
[Abstract]
(982)
[HTML 1 KB]
[PDF 592 KB]
(772)
|
|
1334 |
ZHANG Yongjun LIU Jinling |
|
|
Spam short message classifier model based on word terms |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1334-1337
[Abstract]
(920)
[HTML 1 KB]
[PDF 575 KB]
(783)
|
|
1330 |
ZHANG Wei HUANG Wei XIA Limin |
|
|
Recommendation research based on general content probabilistic latent semantic analysis model |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1330-1333
[Abstract]
(686)
[HTML 1 KB]
[PDF 587 KB]
(620)
|
|
1446 |
XIANG Wei |
|
|
Automated debug for common information model defect using natural language processing algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1446-1449
[Abstract]
(836)
[HTML 1 KB]
[PDF 656 KB]
(643)
|
|
1473 |
HU Liaolin ZHANG Weichao HUA Dengxin WANG Li DI Huige |
|
|
Dynamic demodulation of fiber Bragg grating sensing based on LabVIEW |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1473-1475
[Abstract]
(931)
[HTML 1 KB]
[PDF 488 KB]
(771)
|
|
1463 |
XIANG Rong ZHOU Huijuan |
|
|
Automatic on-screen-display verification system based on Gabor features and BP neural network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1463-1466
[Abstract]
(946)
[HTML 1 KB]
[PDF 638 KB]
(14024)
|
|
1233 |
GU Fanglin ZHANG Hang LI Lunhui |
|
|
Adaptive variable step-size blind source separation algorithm based on nonlinear principal component analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1233-1236
[Abstract]
(817)
[HTML 1 KB]
[PDF 591 KB]
(747)
|
|
1230 |
GUO Jiantao WANG Lin |
|
|
Spectrogram analysis of frequency-hopping signals based on entropy measure |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1230-1236
[Abstract]
(982)
[HTML 1 KB]
[PDF 594 KB]
(927)
|
|
1217 |
DAI Li SHU Hui HUANG Hejie |
|
|
Network protocol reverse parsing technique based on dataflow analysis |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1217-1221
[Abstract]
(912)
[HTML 1 KB]
[PDF 825 KB]
(873)
|
|
1317 |
ZHANG Weiping REN Xuefei LI Guoqiang NIU Peifeng |
|
|
Improved gravitation search algorithm and its application to function optimization |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1317-1320
[Abstract]
(1026)
[HTML 1 KB]
[PDF 606 KB]
(830)
|
|
1298 |
YANG Xiaofang NI Jianjun |
|
|
Multi-robot formation based on biological inspired neural network |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1298-1304
[Abstract]
(686)
[HTML 1 KB]
[PDF 566 KB]
(707)
|
|
1386 |
LIU Kui LIANG Xiangqian LI Xiaolin |
|
|
Concurrent signature scheme constructed by identity-based ring signcryption |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1386-1390
[Abstract]
(851)
[HTML 1 KB]
[PDF 812 KB]
(648)
|
|
1382 |
TONG Ruiyang MENG Qingxian CHEN Ming |
|
|
Effective and secure identity-based hybrid signcryption scheme |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1382-1393
[Abstract]
(789)
[HTML 1 KB]
[PDF 815 KB]
(601)
|
|
1378 |
HE Junjie WANG Juan QI Chuanda |
|
|
Cryptanalysis and improvement of a certificateless signature scheme |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1378-1381
[Abstract]
(1180)
[HTML 1 KB]
[PDF 643 KB]
(754)
|
|
1374 |
XIAO Zhenjiu HU Chi CHEN Hong |
|
|
Research and implementation of four-prime RSA digital signature algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1374-1377
[Abstract]
(875)
[HTML 1 KB]
[PDF 629 KB]
(645)
|
|
1357 |
ZHANG Zongfei |
|
|
Feature selection for network intrusion detection based on quantum evolutionary algorithm |
|
|
|
Journal of Computer Applications
2013 Vol.33 (05): 1357-1361
[Abstract]
(800)
[HTML 1 KB]
[PDF 771 KB]
|