Other articles related with "na":
0 JIANG Zhangtao, LI Xin, ZHANG Shihao, ZHAO Xinyang
  Predictive model of Weibo public opinion heat analysis by integrating BERT and X-means algorithm
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (1) [HTML 1 KB] [PDF 1478 KB] ()
0 QIN Xiaolin, GU Xu, LI Dicheng, XU Haiwen
  Survey and prospect of large language models
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (123) [HTML 1 KB] [PDF 2099 KB] (85)
0
  Bayesian Membership Inference Attacks for GAN
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (8) [HTML 1 KB] [PDF 742 KB] (5)
0
  Capacitated Vehicle routing problem solving method based on improved MAML and graph variational autoencoder
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (5) [HTML 1 KB] [PDF 0 KB] (3)
362 Ming JIANG, Linqin WANG, Hua LAI, Shengxiang GAO
  End-to-end Vietnamese text normalization method based on editing constraints
    Journal of Computer Applications   2025 Vol.45 (2): 362-370 [Abstract] (53) [HTML 0 KB] [PDF 1452 KB] (28)
0
  Active protection scheme for deep neural network model based on four-dimensional Chen chaotic system.
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 0 KB] (4)
0
  Probabilistic generative graph attention network method for multidimensional time series root cause analysis
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (3) [HTML 1 KB] [PDF 0 KB] ()
0
  Interactive visualization method of multi-category urban spatiotemporal big data based on point aggregation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (5) [HTML 1 KB] [PDF 0 KB] ()
0
  Prediction of drug-target interactions based on sequence and multi-view networks
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (18) [HTML 1 KB] [PDF 0 KB] (1)
0 CHEN Lu, WANG Huaiyao, LIU Jingyang, YAN Tao, CHEN Bin
  Robotic Grasp Detection with Feature Fusion of Spatial and Fourier Domains under Low-Light Environments
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 3392 KB] (5)
0
  New federated learning scheme balancing efficiency and security
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (16) [HTML 1 KB] [PDF 0 KB] ()
0
  Contrastive Learning Nested Named Entity Recognition Combined with Boundary Information
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (20) [HTML 1 KB] [PDF 777 KB] (6)
0
  Design and practice of intelligent tutoring algorithm based on personalized emotional awareness
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (21) [HTML 1 KB] [PDF 513 KB] (7)
0
  7T ultra-high field magnetic resonance parallel imaging algorithm based on residual complex convolution network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (36) [HTML 1 KB] [PDF 958 KB] (5)
79 Jiayuan LI, Xiaodong WANG, Qixue HE
  Application and performance optimization of CNN enhanced Informer model in industrial time series prediction
    Journal of Computer Applications   0 Vol. (): 79-83 [Abstract] (21) [HTML 0 KB] [PDF 760 KB] (5)
72 Haigang JIANG, Min ZHU, Xiaoqiang JIANG
  Device fault diagnosis method based on knowledge graph and multi-task learning
    Journal of Computer Applications   0 Vol. (): 72-78 [Abstract] (16) [HTML 0 KB] [PDF 2501 KB] (0)
66 Xiaozhi XU, Yanfang MAO, Xiaoxiang LYU
  Named entity recognition of electric power research results based on Transformer and keyword information aggregation
    Journal of Computer Applications   0 Vol. (): 66-71 [Abstract] (18) [HTML 0 KB] [PDF 1795 KB] (0)
61 Yang GAO, Han LI, Weihe ZHONG
  Chemical safety accident named entity recognition based on self-attention and SoftLexicon
    Journal of Computer Applications   0 Vol. (): 61-65 [Abstract] (22) [HTML 0 KB] [PDF 1191 KB] (0)
50 Deyang KONG, Yun ZHANG, Weiguang WANG, Zijie CHEN, Yongguo LIU
  Multilevel-component joint Chinese word embedding model and application of core drug identification
    Journal of Computer Applications   0 Vol. (): 50-54 [Abstract] (24) [HTML 0 KB] [PDF 2668 KB] (23)
375 Wenke JIANG, Xueli XIN, Yongxu MU, Xiaoshuang WANG
  Application of artificial intelligence in field of financial and accounting audit
    Journal of Computer Applications   0 Vol. (): 375-380 [Abstract] (13) [HTML 0 KB] [PDF 572 KB] (0)
370 Yuchun XU, Jianjun XU
  Automatic detection method of epileptic EEG based on residual network
    Journal of Computer Applications   0 Vol. (): 370-374 [Abstract] (18) [HTML 0 KB] [PDF 1793 KB] (0)
35 Wei ZHANG, Zhuyu CHU, Xueqi CHEN, Xuehui FU, Chenchen WANG, Chen LI, Haiyan WU
  Aspect-based sentiment analysis with syntactic prompt
    Journal of Computer Applications   0 Vol. (): 35-43 [Abstract] (20) [HTML 0 KB] [PDF 2571 KB] (3)
349 Yunhao ZHOU, Tianhong WANG, Dunjie YOU, Yiping XU, Junjie MAO
  Plunger lift intelligent control evaluation algorithm based on convolutional neural network
    Journal of Computer Applications   0 Vol. (): 349-356 [Abstract] (17) [HTML 0 KB] [PDF 5947 KB] (0)
316 Jingyu LI, Juxia DING
  Development and key system analysis of intelligent rail transit
    Journal of Computer Applications   0 Vol. (): 316-322 [Abstract] (9) [HTML 0 KB] [PDF 1957 KB] (0)
296 Ke ZHANG, Yuangang PENG, Yueming WANG, Jianxin TANG
  Test tube and liquid level recognition algorithm based on improved YOLOv8
    Journal of Computer Applications   0 Vol. (): 296-301 [Abstract] (20) [HTML 0 KB] [PDF 2535 KB] (0)
280 Jiayu CAO, Guifang QIAO, Mengyuan CHEN, Xu ZOU, Di LIU
  Improvement strategy of YOLO algorithm for small target detection from high-altitude view
    Journal of Computer Applications   0 Vol. (): 280-285 [Abstract] (17) [HTML 0 KB] [PDF 3952 KB] (0)
257 Ji WANG, Yuanjia HUANG, Wei FANG, Wenwu XIE, Wenchang XIONG, Xingwang LI
  End-to-end license plate recognition method based on 2D space traversal LSTM network
    Journal of Computer Applications   0 Vol. (): 257-261 [Abstract] (15) [HTML 0 KB] [PDF 2015 KB] (1)
212 Fangrong ZHOU, Yifan WANG, Yi MA, Gang WEN, Guofang WANG, Yutang MA, Hao GENG
  Remote sensing image fusion enhancement model for power facilities based on deep convolutional network
    Journal of Computer Applications   0 Vol. (): 212-216 [Abstract] (16) [HTML 0 KB] [PDF 2643 KB] (0)
184 Yuwan LIU, Zhiyi GUO, Guanyu XING, Yanli LIU
  Variation-aware online dynamic illumination estimation method for indoor scenes
    Journal of Computer Applications   0 Vol. (): 184-191 [Abstract] (13) [HTML 0 KB] [PDF 4045 KB] (0)
18 Siyuan REN, Cheng PENG, Ke CHEN, Zhiyi HE
  Cross-lingual knowledge transfer method based on alignment of representational space structures
    Journal of Computer Applications   0 Vol. (): 18-23 [Abstract] (18) [HTML 0 KB] [PDF 737 KB] (3)
170 Na QIN, Yantao LIU
  DAP-NAD algorithm for emergency multicast communications
    Journal of Computer Applications   0 Vol. (): 170-175 [Abstract] (17) [HTML 0 KB] [PDF 2496 KB] (0)
159 Linlong ZENG, Miao CHENG, Shaobing ZHANG, Yu ZENG
  High-resolution real-time semantic segmentation algorithm for edge deployment
    Journal of Computer Applications   0 Vol. (): 159-163 [Abstract] (14) [HTML 0 KB] [PDF 1520 KB] (0)
143 Yunlong PENG, Han LI, Tian SANG, Hongming CHENG
  Pollutant transmission model in marine food web based on complex network
    Journal of Computer Applications   0 Vol. (): 143-147 [Abstract] (15) [HTML 0 KB] [PDF 2327 KB] (0)
101 Zhihui TAO, Pengliu TAN, Teng XU, Sijia YANG, Ruoxin TU
  Multi-notary consensus cross-chain method based on elliptic curve cryptography
    Journal of Computer Applications   0 Vol. (): 101-105 [Abstract] (21) [HTML 0 KB] [PDF 2358 KB] (0)
0
  Data augmentation method for abnormal passenger behavior in elevators based on dynamic graph convolutional network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 678 KB] (6)
0 ZHANG Qing, YANG Fan, FANG Yuhan
  Chinese Spelling Correction Algorithm Based on Multi-Modal Information Fusion
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (28) [HTML 1 KB] [PDF 668 KB] (7)
0
  YOLOv5s-MRD: an efficient fire and smoke detection algorithm for complex scenarios based on YOLOv5s
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (34) [HTML 1 KB] [PDF 922 KB] (30)
0
  Distribution adaptation and dynamic curriculum pseudo-labeling framework for semi-supervised fire detection
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (19) [HTML 1 KB] [PDF 454 KB] (5)
0
  Time series anomaly detection based on frequency domain enhanced graph variational learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (27) [HTML 1 KB] [PDF 491 KB] (16)
0 LI Zhuoran, LI Hua, WANG Tong, JIANG Chaozhe
  Lightweight human pose estimation based on fused feature state space model#br#
#br#
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 4402 KB] (1)
0
  Multi-Scale Feature Fusion Sentiment Classification Based on Bidirectional Cross-Attention
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (2) [HTML 0 KB] [PDF 0 KB] ()
0
  Blockchain-based identity management system for internet of things
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (16) [HTML 1 KB] [PDF 714 KB] (7)
0
  Equivariant graph neural network-based simulator for lagrangian particle flow
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 1433 KB] (3)
0
  Improvement method of heuristic vehicle routing algorithm based on constrained spectral clustering
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (9) [HTML 1 KB] [PDF 1032 KB] (3)
0
  Source code vulnerability detection method based on Transformer-GCN
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (20) [HTML 1 KB] [PDF 946 KB] (3)
0
  Thoracic disease classification based on cross-scale attention network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 1323 KB] (1)
0
  Heterogeneous Environment Aware Streaming Graph Partitioning for Power-Law Graphs
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (9) [HTML 1 KB] [PDF 1612 KB] ()
0
  Neural architecture search for multi-tissue segmentation using convolutional and transformer-based networks in glioma segmentation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (26) [HTML 1 KB] [PDF 1537 KB] (4)
0
  Sleep apnea detection based on universal wristband
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (19) [HTML 1 KB] [PDF 1447 KB] (2)
0
  Correlation power analysis of advanced encryption standard algorithm based on uniform manifold approximation and projection
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (21) [HTML 1 KB] [PDF 2154 KB] (4)
0
  Dependency type and distance enhanced aspect based sentiment analysis model
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 1067 KB] (2)
0
  Semi-supervised object detection framework guided by self-paced learning#br#
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 873 KB] (3)
0
  Dual-population dual-stage evolutionary algorithm for complex constrained multi-objective optimization problems
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (61) [HTML 1 KB] [PDF 1324 KB] (5)
0
  Recognition and optimization of hallucination phenomenon in large language models
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (27) [HTML 1 KB] [PDF 921 KB] (4)
0
  Fine-grained result verifiable searchable encryption scheme with designated tester in cloud
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (36) [HTML 1 KB] [PDF 1386 KB] (2)
0
  Secure and efficient frequency estimation method based on shuffled differential privacy
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 1572 KB] (3)
0
  Large scale IoT binary component identification based on named entity recognition
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 710 KB] ()
0
  Research review on explainable artificial intelligence in internet of things applications
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 1208 KB] ()
0
  fedPF: Federated learning for personalization and fairness
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 1569 KB] (1)
0
  Object detection uncertainty measurement scheme based on guide to the expression of uncertainty in measurement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 837 KB] (4)
0
  Gradient-discriminative and feature norm-driven open-world object detection
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (2) [HTML 1 KB] [PDF 1021 KB] (1)
0
  Batch process quality prediction model using improved time-domain convolutional network with multi-head self-attention
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (11) [HTML 1 KB] [PDF 1518 KB] (1)
0
  Review of interpretable deep knowledge tracing methods
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 870 KB] (2)
0
  Personalized learning recommendation in collaboration with knowledge graph and large language model
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (20) [HTML 1 KB] [PDF 810 KB] (5)
0
  Nested named entity recognition combined with boundary generation by multi-objective learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (11) [HTML 1 KB] [PDF 737 KB] (2)
0
  Multi-object tracking algorithm for construction machinery in transmission line scenarios
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 1372 KB] ()
0
  Cloud-based conditional broadcast proxy re-encryption scheme
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (6) [HTML 1 KB] [PDF 880 KB] ()
0
  Helmet wearing detection algorithm for complex scenarios based on cross-layer multi-scale feature fusion
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (7) [HTML 1 KB] [PDF 1085 KB] (4)
0
  Chinese spelling correction model ReLM enhanced with deep semantic features
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (9) [HTML 1 KB] [PDF 651 KB] (3)
0
  Optimization method for sequence labeling combined with entity boundary offset
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (7) [HTML 1 KB] [PDF 649 KB] ()
0
  Metaphor detection technique for improving representation in linguistic rules
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 702 KB] (2)
0
  Non-redundant and statistically significant discriminative high utility pattern mining algorithm
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (20) [HTML 1 KB] [PDF 1300 KB] (6)
0
  Layered solving method for virtual maintenance posture in narrow aircraft space
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (18) [HTML 1 KB] [PDF 1454 KB] (1)
0
  The SLAM Algorithm Based on Point-Line Features and Multi-IMU Fusion
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 2515 KB] (3)
0
  Knowledge graph representation learning model incorporating multi-step relational paths and entity description information
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (11) [HTML 1 KB] [PDF 940 KB] (3)
3639 Ruiyan LIANG, Hui YANG
  Lightweight fall detection algorithm framework based on RPEpose and XJ-GCN
    Journal of Computer Applications   2024 Vol.44 (11): 3639-3646 [Abstract] (105) [HTML 0 KB] [PDF 1283 KB] (22)
3487 Shuaihua ZHANG, Shufen ZHANG, Mingchuan ZHOU, Chao XU, Xuebin CHEN
  Malicious traffic detection model based on semi-supervised federated learning
    Journal of Computer Applications   2024 Vol.44 (11): 3487-3494 [Abstract] (64) [HTML 0 KB] [PDF 748 KB] (20)
3403 Guoxiang CHEN, Ziqiang YU, Haoyu ZHAO
  Distributed k-nearest neighbor query algorithm for moving objects in dynamic road network
    Journal of Computer Applications   2024 Vol.44 (11): 3403-3410 [Abstract] (56) [HTML 0 KB] [PDF 758 KB] (22)
0 SHENG Kun, WANG Zhongqin
  Synaesthesia metaphor analysis based on large language models and data augmentation#br#
#br#
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (32) [HTML 1 KB] [PDF 603 KB] (14)
0
  Integrating internal and external data for out-of-distribution detection training & testing
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (8) [HTML 1 KB] [PDF 965 KB] ()
0
  Named entity recognition for sensitive information based on data augmentation and residual networks
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 745 KB] (1)
0
  Few-shot object detection algorithm based on new class feature enhancement and metric mechanism
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 2939 KB] ()
0
  Association rule extraction method based on triadic fuzzy linguistic formal context
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 1072 KB] (3)
0
  Nested entity recognition model for wind power equipment based on differential boundary enhancement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (13) [HTML 1 KB] [PDF 1128 KB] (2)
0
  Medical image segmentation network with content-guided multi-angle feature fusion
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 1900 KB] ()
3521 Jinxing TU, Zhixiong LI, Jianqiang HUANG
  Dynamic partition algorithm for diagonal sparse matrix vector multiplication based on GPU
    Journal of Computer Applications   2024 Vol.44 (11): 3521-3529 [Abstract] (63) [HTML 1 KB] [PDF 1105 KB] (27)
0
  Cognitive load EEG recognition model integrating variational graph autoencoder and local-global graph network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (7) [HTML 1 KB] [PDF 1565 KB] ()
0
  Aspect-based sentiment analysis method with code generation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (16) [HTML 1 KB] [PDF 637 KB] (6)
0
  Point cloud classification and segmentation method based on adaptive dynamic graph convolution and parameter-free attention
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 1641 KB] (2)
0
  Segmentation network of coronary artery structure from CT angiography images based on multi-scale spatial features
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 2882 KB] ()
3307 Huan ZHANG, Jingyu WANG, Lixin LIU, Xiaoyu JIANG
  Multi-organization collaborative data sharing scheme with dual authorization
    Journal of Computer Applications   2024 Vol.44 (10): 3307-3314 [Abstract] (74) [HTML 0 KB] [PDF 2796 KB] (17)
3288 Wanting JI, Wenyi LU, Yuhang MA, Linlin DING, Baoyan SONG, Haolin ZHANG
  Machine reading comprehension event detection based on relation-enhanced graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (10): 3288-3293 [Abstract] (68) [HTML 0 KB] [PDF 996 KB] (14)
3275 Yanbo LI, Qing HE, Shunyi LU
  Aspect sentiment triplet extraction integrating semantic and syntactic information
    Journal of Computer Applications   2024 Vol.44 (10): 3275-3280 [Abstract] (64) [HTML 0 KB] [PDF 1353 KB] (11)
3260 Nengqiang XIANG, Xiaofei ZHU, Zhaoze GAO
  Information diffusion prediction model of prototype-aware dual-channel graph convolutional neural network
    Journal of Computer Applications   2024 Vol.44 (10): 3260-3266 [Abstract] (71) [HTML 0 KB] [PDF 1549 KB] (7)
3223 Xiaoyu HUA, Dongfen LI, You FU, Kejun BI, Shi YING, Ruijin WANG
  Industrial chain risk assessment and early warning model combining hierarchical graph neural network and long short-term memory
    Journal of Computer Applications   2024 Vol.44 (10): 3223-3231 [Abstract] (82) [HTML 0 KB] [PDF 2113 KB] (32)
3191 Cheng WANG, Yang WANG, Yingjiao RONG
  YOLOv7-MSBP target location algorithm for character recognition of power distribution cabinet
    Journal of Computer Applications   2024 Vol.44 (10): 3191-3199 [Abstract] (96) [HTML 0 KB] [PDF 3829 KB] (52)
3185 Xukang KAN, Gefei SHI, Xuerong YANG
  ORB-SLAM2 algorithm based on dynamic feature point filtering and optimization of keyframe selection
    Journal of Computer Applications   2024 Vol.44 (10): 3185-3190 [Abstract] (88) [HTML 0 KB] [PDF 3326 KB] (17)
3177 Pengbo WANG, Wuyang SHAN, Jun LI, Mao TIAN, Deng ZOU, Zhanfeng FAN
  Robust splicing forensic algorithm against high-intensity salt-and-pepper noise
    Journal of Computer Applications   2024 Vol.44 (10): 3177-3184 [Abstract] (71) [HTML 0 KB] [PDF 2871 KB] (12)
3167 Hua HUANG, Ziyi YANG, Xiaolong LI, Chuang LI
  Predictive business process monitoring method based on concept drift
    Journal of Computer Applications   2024 Vol.44 (10): 3167-3176 [Abstract] (84) [HTML 0 KB] [PDF 2286 KB] (15)
3151 Antai SUN, Ye LIU, Dongmei XU
  Dynamic surface asymptotic compensation algorithm for multi-agent systems
    Journal of Computer Applications   2024 Vol.44 (10): 3151-3157 [Abstract] (75) [HTML 0 KB] [PDF 2187 KB] (25)
3105 Shengmin ZHENG, Xiaodong FU
  Incomplete ordinal preference prediction using mixture of Plackett-Luce models
    Journal of Computer Applications   2024 Vol.44 (10): 3105-3113 [Abstract] (74) [HTML 0 KB] [PDF 995 KB] (12)
3074 Feng CAO, Xiaoling YANG, Jianbing YI, Jun LI
  Contradiction separation super-deduction method and application
    Journal of Computer Applications   2024 Vol.44 (10): 3074-3080 [Abstract] (82) [HTML 0 KB] [PDF 1422 KB] (19)
3067 Yushan JIANG, Yangsen ZHANG
  Large language model-driven stance-aware fact-checking
    Journal of Computer Applications   2024 Vol.44 (10): 3067-3073 [Abstract] (120) [HTML 0 KB] [PDF 1036 KB] (31)
3039 Linhao LI, Xiaoqian ZHANG, Yao DONG, Xu WANG, Yongfeng DONG
  Knowledge tracing based on personalized learning and deep refinement
    Journal of Computer Applications   2024 Vol.44 (10): 3039-3046 [Abstract] (97) [HTML 0 KB] [PDF 2200 KB] (52)
3032 Han WANG, Yuan WAN, Dong WANG, Yiming DING
  Robust weight matrix combination selection method of broad learning system
    Journal of Computer Applications   2024 Vol.44 (10): 3032-3038 [Abstract] (95) [HTML 0 KB] [PDF 3288 KB] (36)
2983 Renke SUN, Zhiyu HUANGFU, Hu CHEN, Zhongnian LI, Xinzheng XU
  Survey of neural architecture search
    Journal of Computer Applications   2024 Vol.44 (10): 2983-2994 [Abstract] (221) [HTML 0 KB] [PDF 3686 KB] (183)
0 ZHANG Xiaojun, HAO Yunpu, LI Lei, LI Chenyang, ZHOU Ziyu
  Data tamper-proof batch auditing scheme based on industrial cloud storage systems
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (16) [HTML 1 KB] [PDF 658 KB] ()
0 HU Jie, ZHENG Qiyang, SUN Jun, ZHANG Yan
  Multi-label classification model based on multi-relational label graph and local dynamic reconstruction learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 485 KB] (3)
0 JIANG Zhanjun, LI Yang, LIAN Jing, MIAO Xinfa
  Coordinate enhancement and multi-source sampling for brain tumor image segmentation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (16) [HTML 1 KB] [PDF 1515 KB] ()
0
  Automatic speech segmentation algorithm based on syllable type recognition
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (12) [HTML 1 KB] [PDF 1377 KB] ()
0
  Multimodal Fusion Recommendation based on Joint Self-supervised Learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 1299 KB] (1)
0
  Deep symbol regression method based on Transformer
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (30) [HTML 1 KB] [PDF 1048 KB] (6)
0
  Multimodal sentiment analysis model with cross-modal text-information enhancement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 1053 KB] (4)
0
  Volumetric spline parameterization method via high-dimensional quasi-conformal mapping
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 2869 KB] (2)
0
  Network traffic classification model integrating variational autoencoder and AdaBoost-CNN
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (14) [HTML 1 KB] [PDF 1463 KB] (2)
0
  Hyper-relational knowledge graph completion methods with fusing noise filtering
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 1170 KB] (5)
0
  Multi-source data representation learning model based on tensorized graph convolutional network and contrastive learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 1686 KB] (1)
0
  Psychological Counseling Human-machine Dialogue Dataset Construction for Dialogue Generation and Mental Disorder Detection
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (21) [HTML 1 KB] [PDF 2920 KB] (8)
0
  Chinese image captioning method based on multi-level visual and text-image dynamic interaction
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (29) [HTML 1 KB] [PDF 1997 KB] (2)
2931 Zhigang XU, Chuang ZHANG
  Multi-level color restoration of mural image based on gated positional encoding
    Journal of Computer Applications   2024 Vol.44 (9): 2931-2937 [Abstract] (111) [HTML 0 KB] [PDF 2838 KB] (18)
2855 Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE
  Distributed power allocation algorithm based on graph convolutional network for D2D communication systems
    Journal of Computer Applications   2024 Vol.44 (9): 2855-2862 [Abstract] (72) [HTML 0 KB] [PDF 2647 KB] (20)
2829 Guanglei YAO, Juxia XIONG, Guowu YANG
  Flower pollination algorithm based on neural network optimization
    Journal of Computer Applications   2024 Vol.44 (9): 2829-2837 [Abstract] (82) [HTML 0 KB] [PDF 1631 KB] (25)
0
  Low-dose CT image reconstruction using combined low-rank and total variation regularization
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (15) [HTML 1 KB] [PDF 1260 KB] (12)
0
  Review of Checkpoint Technology for Multiple Computing Scenarios
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (38) [HTML 1 KB] [PDF 1482 KB] (10)
0
  Heterogeneous graph attention network for relation extraction based on feature combination
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (15) [HTML 1 KB] [PDF 10661 KB] (7)
0
  WISA2024+70 Deep Variational Text Clustering Model Based on Distribution Augmentation
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (2) [HTML 0 KB] [PDF 0 KB] (1)
0
  Certificateless ring signature scheme based on SM2
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 644 KB] (2)
0
  Port operation scheduling algorithm based on improved NSGA-II algorithm under dual carbon goals
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 1482 KB] (5)
0
  Named entity recognition model based on global information fusion and multi-dimensional relation perception
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (46) [HTML 1 KB] [PDF 1568 KB] (19)
0
  A Document-Level Relation Extraction Model Based on Anaphora and Logical Reasoning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (59) [HTML 1 KB] [PDF 1103 KB] (24)
0
  Privacy Protection Method for Consortium Blockchain based on SM2 Linkable Ring Signature
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 640 KB] (10)
0
  Conditional privacy-preserving authentication scheme based on certificateless group signature for VANET
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (26) [HTML 1 KB] [PDF 785 KB] (6)
0
  Vehicular edge computing scheme with task offloading and resource optimization
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (11) [HTML 1 KB] [PDF 1435 KB] (3)
0 HE Yi, XIAO Yinan, WEI Yunkai, LENG Supeng
  User Data Management and Control in Internet of Behaviors: A Review
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (9) [HTML 1 KB] [PDF 1200 KB] (7)
0 LI Hui, JIA Bingzhi, WANG Chenxi, DONG Ziyu, LI Jilong, ZHONG Zhaoman, CHEN Yanyan
  Underwater image enhancement method based on SwinGAN generative adversarial network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (24) [HTML 1 KB] [PDF 2350 KB] (8)
0 CHEN Xin, LIU Zhonghui, MIN Fan
  Concept set construction of reduced formal context and its recommendation application
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (29) [HTML 1 KB] [PDF 1533 KB] (2)
0
  Aspect-based sentiment analysis model integrating syntax and sentiment knowledge
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (19) [HTML 1 KB] [PDF 1068 KB] (2)
0
  Visual interactive information reconstruction method for machine understanding
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (18) [HTML 1 KB] [PDF 1171 KB] (1)
2588 Zhonghua LI, Yunqi BAI, Xuejin WANG, Leilei HUANG, Chujun LIN, Shiyu LIAO
  Low illumination face detection based on image enhancement
    Journal of Computer Applications   2024 Vol.44 (8): 2588-2594 [Abstract] (25) [HTML 0 KB] [PDF 2413 KB] (17)
2551 Yuhan LIU, Genlin JI, Hongping ZHANG
  Video pedestrian anomaly detection method based on skeleton graph and mixed attention
    Journal of Computer Applications   2024 Vol.44 (8): 2551-2557 [Abstract] (164) [HTML 0 KB] [PDF 2081 KB] (30)
2514 Fang LEI, Yongcai NIU
  Channel estimation method for low earth orbit satellite MIMO-OTFS system based on improved generalized orthogonal matching pursuit
    Journal of Computer Applications   2024 Vol.44 (8): 2514-2520 [Abstract] (168) [HTML 0 KB] [PDF 2232 KB] (27)
2506 Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO
  Application of improved hunter-prey optimization algorithm in WSN coverage
    Journal of Computer Applications   2024 Vol.44 (8): 2506-2513 [Abstract] (26) [HTML 0 KB] [PDF 6422 KB] (18)
2476 Quanmei ZHANG, Runping HUANG, Fei TENG, Haibo ZHANG, Nan ZHOU
  Automatic international classification of disease coding method incorporating heterogeneous information
    Journal of Computer Applications   2024 Vol.44 (8): 2476-2482 [Abstract] (177) [HTML 0 KB] [PDF 2137 KB] (18)
2466 Qiangkui LENG, Xuezi SUN, Xiangfu MENG
  Oversampling method for imbalanced data based on sample potential and noise evolution
    Journal of Computer Applications   2024 Vol.44 (8): 2466-2475 [Abstract] (183) [HTML 0 KB] [PDF 2780 KB] (34)
2455 Haoyu ZHAO, Ziqiang YU, Xiaomeng CHEN, Guoxiang CHEN, Hui ZHU, Bohan LI
  Top- K optimal route query problem with keyword search support
    Journal of Computer Applications   2024 Vol.44 (8): 2455-2465 [Abstract] (28) [HTML 0 KB] [PDF 2879 KB] (29)
2400 Pengqi GAO, Heming HUANG, Yonghong FAN
  Fusion of coordinate and multi-head attention mechanisms for interactive speech emotion recognition
    Journal of Computer Applications   2024 Vol.44 (8): 2400-2406 [Abstract] (208) [HTML 0 KB] [PDF 2819 KB] (30)
2393 Yuqing WANG, Guangli ZHU, Wenjie DUAN, Shuyu LI, Ruotong ZHOU
  Sentiment classification model of psychological counseling text based on attention over attention mechanism
    Journal of Computer Applications   2024 Vol.44 (8): 2393-2399 [Abstract] (178) [HTML 0 KB] [PDF 1474 KB] (33)
2387 Kaipeng XUE, Tao XU, Chunjie LIAO
  Multimodal sentiment analysis network with self-supervision and multi-layer cross attention
    Journal of Computer Applications   2024 Vol.44 (8): 2387-2392 [Abstract] (28) [HTML 0 KB] [PDF 1572 KB] (21)
2381 Chun SUN, Chunlong HU, Shucheng HUANG
  Consistency preserving age estimation method by ensemble ranking
    Journal of Computer Applications   2024 Vol.44 (8): 2381-2386 [Abstract] (22) [HTML 0 KB] [PDF 2290 KB] (10)
2372 Shuai FU, Xiaoying GUO, Ruyi BAI, Tao YAN, Bin CHEN
  Age estimation method combining improved CloFormer model and ordinal regression
    Journal of Computer Applications   2024 Vol.44 (8): 2372-2380 [Abstract] (21) [HTML 0 KB] [PDF 3667 KB] (12)
2365 Chunxue ZHANG, Liqing QIU, Cheng’ai SUN, Caixia JING
  Purchase behavior prediction model based on two-stage dynamic interest recognition
    Journal of Computer Applications   2024 Vol.44 (8): 2365-2371 [Abstract] (20) [HTML 0 KB] [PDF 1474 KB] (17)
2319 Zheyuan SHEN, Keke YANG, Jing LI
  Personalized federated learning method based on dual stream neural network
    Journal of Computer Applications   2024 Vol.44 (8): 2319-2325 [Abstract] (336) [HTML 0 KB] [PDF 2185 KB] (231)
0 GE Chao, YE Shuiqing, WANG Hong, YAO Zheng
  Stability analysis of nonlinear time-delay system based on memory saturated controller
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (8) [HTML 1 KB] [PDF 594 KB] ()
392 Kun FU, Shicong YING, Tingting ZHENG, Jiajie QU, Jingyuan CUI, Jianwei LI
  Graph data augmentation method for few-shot node classification
    Journal of Computer Applications   2025 Vol.45 (2): 392-402 [Abstract] (43) [HTML 1 KB] [PDF 2174 KB] (115)
0 WANG Caiqi, CUI Xining, XIONG Yi, WU Shiqian
  Adaptive extended RRT * path planning algorithm based on node-to-obstacle distance
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (30) [HTML 1 KB] [PDF 2892 KB] (205)
490 Zhiqiang REN, Xuebin CHEN
  FedAud: adaptive defense mechanism based on historical model updates
    Journal of Computer Applications   2025 Vol.45 (2): 490-496 [Abstract] (38) [HTML 1 KB] [PDF 2229 KB] (17)
0 ZENG Biqing, ZHONG Guangbin, WEN James Zhiqing
  Few-shot Named Entity Recognition Based on Decomposed Fuzzy Span
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (20) [HTML 1 KB] [PDF 1826 KB] ()
0
  Consultation recommendation method based on knowledge graph and dialogue structure
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (5) [HTML 1 KB] [PDF 1761 KB] (2)
0
  Improved ring theory-based evolutionary algorithm with new repair optimization operator for solving the multi-dimensional knapsack problem
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (17) [HTML 1 KB] [PDF 1434 KB] (4)
0
  Channel estimation of reconfigurable intelligence surface assisted communication system based on deep learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (19) [HTML 1 KB] [PDF 1334 KB] (8)
0
  Estimation and classification of brain functional networks based on temporal correlation information fusion 
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (22) [HTML 1 KB] [PDF 1407 KB] (3)
0
  Multimodal sarcasm detection model integrating contrastive learning with sentiment
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (10) [HTML 1 KB] [PDF 1714 KB] ()
40 Xueqiang LYU, Tao WANG, Xindong YOU, Ge XU
  HTLR: named entity recognition framework with hierarchical fusion of multi-knowledge
    Journal of Computer Applications   2025 Vol.45 (1): 40-47 [Abstract] (72) [HTML 1 KB] [PDF 1466 KB] (28)
3435 Wenbo LIU, Lianfei YU, Dongmei XIE, Chuang CAI, Zhijian QU, Chongguang REN
  Long-term prediction model of time series based on multi-scale feature fusion
    Journal of Computer Applications   2024 Vol.44 (11): 3435-3441 [Abstract] (69) [HTML 1 KB] [PDF 1095 KB] (39)
0 SHE Benjie, SU Shuzhi, ZHU Yanmin, HUA Jian, Wang Chao
  Lightweight pose estimation network based on non-globally dependent integral regression
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (21) [HTML 1 KB] [PDF 839 KB] (54)
345 Yalun WANG, Yangsen ZHANG, Siwen ZHU
  Headline generation model with position embedding for knowledge reasoning
    Journal of Computer Applications   2025 Vol.45 (2): 345-353 [Abstract] (140) [HTML 1 KB] [PDF 1511 KB] (340)
2011 Yuan TANG, Yanping CHEN, Ying HU, Ruizhang HUANG, Yongbin QIN
  Relation extraction model based on multi-scale hybrid attention convolutional neural networks
    Journal of Computer Applications   2024 Vol.44 (7): 2011-2017 [Abstract] (179) [HTML 0 KB] [PDF 1983 KB] (143)
526 Dixin WANG, Jiahao WANG, Min LI, Hao CHEN, Guangyao HU, Yu GONG
  Abnormal attack detection for underwater acoustic communication network
    Journal of Computer Applications   2025 Vol.45 (2): 526-533 [Abstract] (50) [HTML 1 KB] [PDF 2570 KB] (31)
0 XIAO Hailin, KONG Xiangting, WANG Yu, ZHOU Di, DAI Xiaoming
  Image watermarking algorithm based on improved singular value decomposition and Haar wavelet transform
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (96) [HTML 1 KB] [PDF 1470 KB] (25)
0 YUAN Baohua, CHEN Jialu, WANG Huan
  Medical image segmentation network integrating multi-scale semantics and double-branch parallel
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (74) [HTML 1 KB] [PDF 1144 KB] (384)
3808 Qiye ZHANG, Xinrui ZENG
  Efficient active-set method for support vector data description problem with Gaussian kernel
    Journal of Computer Applications   2024 Vol.44 (12): 3808-3814 [Abstract] (91) [HTML 1 KB] [PDF 4044 KB] (12)
3776 Zucheng WU, Xiaojun WU, Tianyang XU
  Image-text retrieval model based on intra-modal fine-grained feature relationship extraction
    Journal of Computer Applications   2024 Vol.44 (12): 3776-3783 [Abstract] (106) [HTML 1 KB] [PDF 3093 KB] (55)
0
  An End-to-End Vietnamese Text Normalization Approach Based on Edit Constraints
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (14) [HTML 0 KB] [PDF 0 KB] (1)
610 Shijia WEN, Shijun JING
  Dynamic visual SLAM algorithm incorporating object detection and feature point association
    Journal of Computer Applications   2025 Vol.45 (2): 610-615 [Abstract] (64) [HTML 1 KB] [PDF 5476 KB] (41)
655 Jiayang GUI, Shunji WANG, Zhengkang ZHOU, Jiashan TANG
  Tunnel foreign object detection algorithm based on improved YOLOv8n
    Journal of Computer Applications   2025 Vol.45 (2): 655-661 [Abstract] (91) [HTML 1 KB] [PDF 3102 KB] (144)
428 Hanlin ZHANG, Junlu WANG, Baoyan SONG
  Time series event classification method fused with derived features
    Journal of Computer Applications   2025 Vol.45 (2): 428-435 [Abstract] (74) [HTML 1 KB] [PDF 2121 KB] (321)
371 Zirong HONG, Guangqing BAO
  Review of radar automatic target recognition based on ensemble learning
    Journal of Computer Applications   2025 Vol.45 (2): 371-382 [Abstract] (85) [HTML 1 KB] [PDF 1391 KB] (639)
0 ZHAI Sheping, YANG Qing, HUANG Yan, YANG Rui
  Knowledge graph completion with hierarchical attention fusing directed relationships and relational paths
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (66) [HTML 1 KB] [PDF 528 KB] (290)
3371 Linqin WANG, Te ZHANG, Zhihong XU, Yongfeng DONG, Guowei YANG
  Fusing entity semantic and structural information for knowledge graph reasoning
    Journal of Computer Applications   2024 Vol.44 (11): 3371-3378 [Abstract] (156) [HTML 1 KB] [PDF 705 KB] (68)
670 Yan LI, Guanhua YE, Yawen LI, Meiyu LIANG
  Enterprise ESG indicator prediction model based on richness coordination technology
    Journal of Computer Applications   2025 Vol.45 (2): 670-676 [Abstract] (81) [HTML 1 KB] [PDF 1400 KB] (439)
556 Wujiu FU, Lin ZHOU, Jianjie DENG, Yong YOU
  Recurrence formula for initial value problems of fractional-order autonomous dynamics system and its application
    Journal of Computer Applications   2025 Vol.45 (2): 556-562 [Abstract] (49) [HTML 1 KB] [PDF 5494 KB] (47)
261 Lu WANG, Dong LIU, Weiguang LIU
  Interpretability study on deformable convolutional network and its application in butterfly species recognition models
    Journal of Computer Applications   2025 Vol.45 (1): 261-274 [Abstract] (66) [HTML 1 KB] [PDF 8020 KB] (33)
0 WANG Xingwang, ZHANG Qingyang, JIANG Shouyong, DONG Yongquan
  Dynamic UAV path planning based on improved whale optimization algorithm
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (104) [HTML 1 KB] [PDF 1795 KB] (342)
1539 Min SUN, Qian CHENG, Xining DING
  CBAM-CGRU-SVM based malware detection method for Android
    Journal of Computer Applications   2024 Vol.44 (5): 1539-1545 [Abstract] (134) [HTML 0 KB] [PDF 2825 KB] (272)
0
  Clustering federated learning algorithms for heterogeneous data
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (55) [HTML 1 KB] [PDF 2296 KB] (480)
106 Xiaosheng YU, Zhixin WANG
  Sequential recommendation model based on multi-level graph contrastive learning
    Journal of Computer Applications   2025 Vol.45 (1): 106-114 [Abstract] (109) [HTML 1 KB] [PDF 2785 KB] (67)
337 Zijun MIAO, Fei LUO, Weichao DING, Wenbo DONG
  Traffic signal control algorithm based on overall state prediction and fair experience replay
    Journal of Computer Applications   2025 Vol.45 (1): 337-344 [Abstract] (106) [HTML 1 KB] [PDF 3199 KB] (101)
196 Jianli DING, Yufeng HE, Jing WANG
  Causal intervention-based root cause analysis method for microservice system faults
    Journal of Computer Applications   2025 Vol.45 (1): 196-203 [Abstract] (98) [HTML 1 KB] [PDF 2268 KB] (216)
59 Xinran XU, Shaobing ZHANG, Miao CHENG, Yang ZHANG, Shang ZENG
  Bearings fault diagnosis method based on multi-pathed hierarchical mixture-of-experts model
    Journal of Computer Applications   2025 Vol.45 (1): 59-68 [Abstract] (109) [HTML 1 KB] [PDF 3277 KB] (450)
338 Qinghao CHEN, Tianyu LIU, Zhangqi WANG
  Dynamic digital twin system of overhead transmission line ice shedding
    Journal of Computer Applications   0 Vol. (): 338-342 [Abstract] (53) [HTML 1 KB] [PDF 2316 KB] (165)
118 Chenfei WANG, Liyang XU, Huiqin LI, Jianxun MA
  Network security situation awareness mechanism based on behavioral portrait construction
    Journal of Computer Applications   0 Vol. (): 118-122 [Abstract] (124) [HTML 1 KB] [PDF 2941 KB] (172)
154 Yanfei WANG, Peng ZHANG, Xiangguang DAI, Huijun LI
  Fixed-time time-varying algorithm applied to robot navigation problem
    Journal of Computer Applications   0 Vol. (): 154-158 [Abstract] (70) [HTML 1 KB] [PDF 2919 KB] (48)
186 Quan TANG, Peng WANG, Gang XIN
  Optimization algorithm entropy based on quantum dynamics
    Journal of Computer Applications   2025 Vol.45 (1): 186-195 [Abstract] (84) [HTML 1 KB] [PDF 1806 KB] (25)
69 Shengxiang GAO, Zhe HOU, Zhengtao YU, Hua LAI
  Chinese-Vietnamese neural machine translation model incorporating entity translation
    Journal of Computer Applications   2025 Vol.45 (1): 69-74 [Abstract] (101) [HTML 1 KB] [PDF 1039 KB] (47)
3949 Yanran SHEN, Xin WEN, Jinhao ZHANG, Shuai ZHANG, Rui CAO, Baolu GAO
  fMRI brain age prediction model with lightweight multi-scale convolutional network
    Journal of Computer Applications   2024 Vol.44 (12): 3949-3957 [Abstract] (128) [HTML 1 KB] [PDF 2350 KB] (52)
3823 Jinhui CAI, Zhongxu YIN, Guoxiao ZONG, Junru LI
  Integrated method of inference and taint analysis for nested branch breakthrough
    Journal of Computer Applications   2024 Vol.44 (12): 3823-3830 [Abstract] (121) [HTML 1 KB] [PDF 1292 KB] (147)
1386 Ye TIAN, Jinjin CHEN, Xingyi ZHANG
  Hybrid optimizer combining evolutionary computation and gradient descent for constrained multi-objective optimization
    Journal of Computer Applications   2024 Vol.44 (5): 1386-1392 [Abstract] (168) [HTML 1 KB] [PDF 1501 KB] (324)
1393 Fengfeng WEI, Weineng CHEN
  Distributed data-driven evolutionary computation for multi-constrained optimization
    Journal of Computer Applications   2024 Vol.44 (5): 1393-1400 [Abstract] (181) [HTML 1 KB] [PDF 1005 KB] (628)
1372 Xiaofang LIU, Jun ZHANG
  Probability-driven dynamic multiobjective evolutionary optimization for multi-agent cooperative scheduling
    Journal of Computer Applications   2024 Vol.44 (5): 1372-1377 [Abstract] (155) [HTML 1 KB] [PDF 1353 KB] (205)
1378 Xuanfeng LI, Shengcai LIU, Ke TANG
  Novel genetic algorithm for solving chance-constrained multiple-choice Knapsack problems
    Journal of Computer Applications   2024 Vol.44 (5): 1378-1385 [Abstract] (181) [HTML 1 KB] [PDF 1793 KB] (161)
1325 Jiawei ZHAO, Xuefeng CHEN, Liang FENG, Yaqing HOU, Zexuan ZHU, Yew‑Soon Ong
  Review of evolutionary multitasking from the perspective of optimization scenarios
    Journal of Computer Applications   2024 Vol.44 (5): 1325-1337 [Abstract] (442) [HTML 1 KB] [PDF 1383 KB] (1151)
1338 Yue WU, Hangqi DING, Hao HE, Shunjie BI, Jun JIANG, Maoguo GONG, Qiguang MIAO, Wenping MA
  Research review of multitasking optimization algorithms and applications
    Journal of Computer Applications   2024 Vol.44 (5): 1338-1347 [Abstract] (418) [HTML 1 KB] [PDF 1486 KB] (588)
1355 Wanting ZHANG, Wenli DU, Wei DU
  Multi-timescale cooperative evolutionary algorithm for large-scale crude oil scheduling
    Journal of Computer Applications   2024 Vol.44 (5): 1355-1363 [Abstract] (223) [HTML 1 KB] [PDF 2180 KB] (265)
1348 Maojiang TIAN, Mingke CHEN, Wei DU, Wenli DU
  Two-stage differential grouping method for large-scale overlapping problems
    Journal of Computer Applications   2024 Vol.44 (5): 1348-1354 [Abstract] (284) [HTML 1 KB] [PDF 738 KB] (450)
1187 Jianqiang LI, Zhou HE
  Hybrid NSGA-Ⅱ for vehicle routing problem with multi-trip pickup and delivery
    Journal of Computer Applications   2024 Vol.44 (4): 1187-1194 [Abstract] (164) [HTML 0 KB] [PDF 1477 KB] (527)
1058 Xianfeng YANG, Yilei TANG, Ziqiang LI
  Aspect-level sentiment analysis model based on alternating‑attention mechanism and graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (4): 1058-1064 [Abstract] (153) [HTML 0 KB] [PDF 943 KB] (157)
1049 Longtao GAO, Nana LI
  Aspect sentiment triplet extraction based on aspect-aware attention enhancement
    Journal of Computer Applications   2024 Vol.44 (4): 1049-1057 [Abstract] (172) [HTML 1 KB] [PDF 2126 KB] (95)
1027 Bin XIAO, Yun GAN, Min WANG, Xingpeng ZHANG, Zhaoxing WANG
  Network abnormal traffic detection based on port attention and convolutional block attention module
    Journal of Computer Applications   2024 Vol.44 (4): 1027-1034 [Abstract] (155) [HTML 1 KB] [PDF 1692 KB] (285)
1018 Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU
  Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
    Journal of Computer Applications   2024 Vol.44 (4): 1018-1026 [Abstract] (173) [HTML 1 KB] [PDF 2359 KB] (331)
3915 Xin ZHAO, Xinjie LI, Jian XU, Buyun LIU, Xiang BI
  Parallel medical image registration model based on convolutional neural network and Transformer
    Journal of Computer Applications   2024 Vol.44 (12): 3915-3921 [Abstract] (216) [HTML 1 KB] [PDF 2554 KB] (127)
3335 Xinrong HU, Jingxue CHEN, Zijian HUANG, Bangchao WANG, Xun YAO, Junping LIU, Qiang ZHU, Jie YANG
  Graph convolution network-based masked data augmentation
    Journal of Computer Applications   2024 Vol.44 (11): 3335-3344 [Abstract] (198) [HTML 1 KB] [PDF 788 KB] (258)
3831 Rui GAO, Xuebin CHEN, Zucuan ZHANG
  Dynamic social network privacy publishing method for partial graph updating
    Journal of Computer Applications   2024 Vol.44 (12): 3831-3838 [Abstract] (146) [HTML 1 KB] [PDF 3239 KB] (247)
204 Ying HUANG, Changsheng LI, Hui PENG, Su LIU
  Dual-branch network guided by local entropy for dynamic scene high dynamic range imaging
    Journal of Computer Applications   2025 Vol.45 (1): 204-213 [Abstract] (92) [HTML 1 KB] [PDF 7127 KB] (36)
3021 Rui ZHANG, Junming PAN, Xiaolu BAI, Jing HU, Rongguo ZHANG, Pengyun ZHANG
  Agent model for hyperparameter self-optimization of deep classification model
    Journal of Computer Applications   2024 Vol.44 (10): 3021-3031 [Abstract] (168) [HTML 1 KB] [PDF 2779 KB] (460)
3354 Siqi YANG, Tianjian LUO, Xuanhui YAN, Guangju YANG
  Transfer kernel learning method based on spatial features for motor imagery EEG
    Journal of Computer Applications   2024 Vol.44 (11): 3354-3363 [Abstract] (148) [HTML 1 KB] [PDF 1026 KB] (428)
3345 Jie WU, Xuezhong QIAN, Wei SONG
  Personalized federated learning based on similarity clustering and regularization
    Journal of Computer Applications   2024 Vol.44 (11): 3345-3353 [Abstract] (199) [HTML 1 KB] [PDF 1016 KB] (75)
2674 Jinjin LI, Guoming SANG, Yijia ZHANG
  Multi-domain fake news detection model enhanced by APK-CNN and Transformer
    Journal of Computer Applications   2024 Vol.44 (9): 2674-2682 [Abstract] (267) [HTML 1 KB] [PDF 1378 KB] (539)
2791 Xudong LI, Yukang FENG, Junsheng CHEN
  Multi-key page-level encryption system for SQLite
    Journal of Computer Applications   2024 Vol.44 (9): 2791-2801 [Abstract] (157) [HTML 1 KB] [PDF 3204 KB] (132)
2683 Qi SHUAI, Hairui WANG, Guifu ZHU
  Chinese story ending generation model based on bidirectional contrastive training
    Journal of Computer Applications   2024 Vol.44 (9): 2683-2688 [Abstract] (160) [HTML 1 KB] [PDF 909 KB] (172)
2903 Yun LI, Fuyou WANG, Peiguang JING, Su WANG, Ao XIAO
  Uncertainty-based frame associated short video event detection method
    Journal of Computer Applications   2024 Vol.44 (9): 2903-2910 [Abstract] (156) [HTML 1 KB] [PDF 2161 KB] (140)
2947 Xin YANG, Xueni CHEN, Chunjiang WU, Shijie ZHOU
  Short-term traffic flow prediction of urban highway based on variant residual model and Transformer
    Journal of Computer Applications   2024 Vol.44 (9): 2947-2951 [Abstract] (150) [HTML 1 KB] [PDF 1254 KB] (178)
3723 Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN
  Cross-chain identity management scheme based on identity-based proxy re-encryption
    Journal of Computer Applications   2024 Vol.44 (12): 3723-3730 [Abstract] (166) [HTML 1 KB] [PDF 2492 KB] (84)
3709 Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN
  Linkable ring signature scheme based on SM9 algorithm
    Journal of Computer Applications   2024 Vol.44 (12): 3709-3716 [Abstract] (161) [HTML 1 KB] [PDF 1254 KB] (90)
3766 Jingxin LIU, Wenjing HUANG, Liangsheng XU, Chong HUANG, Jiansheng WU
  Unsupervised feature selection model with dictionary learning and sample correlation preservation
    Journal of Computer Applications   2024 Vol.44 (12): 3766-3775 [Abstract] (147) [HTML 1 KB] [PDF 7520 KB] (65)
3717 Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN
  Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
    Journal of Computer Applications   2024 Vol.44 (12): 3717-3722 [Abstract] (123) [HTML 1 KB] [PDF 1330 KB] (104)
3941 Jianli DING, Hui HUANG, Weidong CAO
  Dynamic monitoring method of flight chain operation status
    Journal of Computer Applications   2024 Vol.44 (12): 3941-3948 [Abstract] (96) [HTML 1 KB] [PDF 2366 KB] (34)
1995 Qing WANG, Jieyu ZHAO, Xulun YE, Nongxiao WANG
  Enhanced deep subspace clustering method with unified framework
    Journal of Computer Applications   2024 Vol.44 (7): 1995-2003 [Abstract] (296) [HTML 1 KB] [PDF 3432 KB] (325)
3530 Jie HUANG, Ruizi WU, Junli LI
  Efficient adaptive robustness optimization algorithm for complex networks
    Journal of Computer Applications   2024 Vol.44 (11): 3530-3539 [Abstract] (118) [HTML 1 KB] [PDF 1046 KB] (51)
3503 Qingyuan PENG, Xiaofeng WANG, Junxia WANG, Yingying HUA, Ao TANG, Fei HE
  Review of phase transition in satisfiability problems
    Journal of Computer Applications   2024 Vol.44 (11): 3503-3512 [Abstract] (95) [HTML 1 KB] [PDF 739 KB] (84)
2777 Zhizheng ZHANG, Xiaojian ZHANG, Junqing WANG, Guanghui FENG
  Federated spatial data publication method with differential privacy and secure aggregation
    Journal of Computer Applications   2024 Vol.44 (9): 2777-2784 [Abstract] (184) [HTML 1 KB] [PDF 2235 KB] (88)
628 Rui ZHANG, Siqi SONG, Jing HU, Yongmei ZHANG, Yanfeng CHAI
  Performance evaluation of industry-university-research based on statistics and adaptive ParNet
    Journal of Computer Applications   2024 Vol.44 (2): 628-637 [Abstract] (113) [HTML 0 KB] [PDF 3247 KB] (99)
604 Huzhen GAO, Changping DU, Yao ZHENG
  Gimbal system control algorithm of unmanned aerial vehicle based on extended state observer
    Journal of Computer Applications   2024 Vol.44 (2): 604-610 [Abstract] (165) [HTML 0 KB] [PDF 3518 KB] (249)
588 Zhiliang SHI, Shiqi LIAO, Zibo GAN, Shaobo ZHU
  Automatic preoperative planning algorithm for three-dimensional wedge osteotomy of radius
    Journal of Computer Applications   2024 Vol.44 (2): 588-594 [Abstract] (119) [HTML 0 KB] [PDF 2804 KB] (91)
469 Zhiwen JING, Yujia ZHANG, Boting SUN, Hao GUO
  Two-stage recommendation algorithm of Siamese graph convolutional neural network
    Journal of Computer Applications   2024 Vol.44 (2): 469-476 [Abstract] (166) [HTML 0 KB] [PDF 2896 KB] (357)
452 Siyi ZHOU, Tianrui LI
  Visual analysis of multivariate spatio-temporal data for origin-destination flow
    Journal of Computer Applications   2024 Vol.44 (2): 452-459 [Abstract] (121) [HTML 0 KB] [PDF 3328 KB] (467)
432 Fuqin DENG, Huifeng GUAN, Chaoen TAN, Lanhui FU, Hongmin WANG, Tinlun LAM, Jianmin ZHANG
  Multi-robot reinforcement learning path planning method based on request-response communication mechanism and local attention mechanism
    Journal of Computer Applications   2024 Vol.44 (2): 432-438 [Abstract] (186) [HTML 0 KB] [PDF 1916 KB] (756)
385 Xinran LUO, Tianrui LI, Zhen JIA
  Chinese medical named entity recognition based on self-attention mechanism and lexicon enhancement
    Journal of Computer Applications   2024 Vol.44 (2): 385-392 [Abstract] (208) [HTML 0 KB] [PDF 2158 KB] (247)
2818 Shanglong LI, Jianhua LIU, Heming JIA
  Reptile search algorithm based on multi-hunting coordination strategy
    Journal of Computer Applications   2024 Vol.44 (9): 2818-2828 [Abstract] (148) [HTML 1 KB] [PDF 1883 KB] (141)
2747 Lilin FAN, Fukang CAO, Wanting WANG, Kai YANG, Zhaoyu SONG
  Intermittent demand forecasting method based on adaptive matching of demand patterns
    Journal of Computer Applications   2024 Vol.44 (9): 2747-2755 [Abstract] (232) [HTML 1 KB] [PDF 1955 KB] (280)
2785 Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU
  Differential property evaluation method based on GPU for large-state cryptographic S-boxes
    Journal of Computer Applications   2024 Vol.44 (9): 2785-2790 [Abstract] (153) [HTML 1 KB] [PDF 1245 KB] (41)
2911 Xiyuan WANG, Zhancheng ZHANG, Shaokang XU, Baocheng ZHANG, Xiaoqing LUO, Fuyuan HU
  Unsupervised cross-domain transfer network for 3D/2D registration in surgical navigation
    Journal of Computer Applications   2024 Vol.44 (9): 2911-2918 [Abstract] (216) [HTML 1 KB] [PDF 2025 KB] (406)
2970 Jing QIN, Zhiguang QIN, Fali LI, Yueheng PENG
  Diagnosis of major depressive disorder based on probabilistic sparse self-attention neural network
    Journal of Computer Applications   2024 Vol.44 (9): 2970-2974 [Abstract] (215) [HTML 1 KB] [PDF 1067 KB] (529)
1128 Yu DING, Hanlin ZHANG, Rong LUO, Hua MENG
  Fuzzy clustering algorithm based on belief subcluster cutting
    Journal of Computer Applications   2024 Vol.44 (4): 1128-1138 [Abstract] (112) [HTML 1 KB] [PDF 4644 KB] (255)
1294 Lijun XU, Hui LI, Zuyang LIU, Kansong CHEN, Weixuan MA
  3D-GA-Unet: MRI image segmentation algorithm for glioma based on 3D-Ghost CNN
    Journal of Computer Applications   2024 Vol.44 (4): 1294-1302 [Abstract] (156) [HTML 1 KB] [PDF 3121 KB] (283)
1816 Shibin LI, Jun GONG, Shengjun TANG
  Semi-supervised heterophilic graph representation learning model based on Graph Transformer
    Journal of Computer Applications   2024 Vol.44 (6): 1816-1823 [Abstract] (141) [HTML 1 KB] [PDF 2420 KB] (167)
3581 Ziyi LI, Tingting QU, Qianpeng CHONG, Jindong XU
  Remote sensing image segmentation network based on fuzzy multiscale features
    Journal of Computer Applications   2024 Vol.44 (11): 3581-3586 [Abstract] (189) [HTML 1 KB] [PDF 1521 KB] (243)
3315 Li ZENG, Jingru YANG, Gang HUANG, Xiang JING, Chaoran LUO
  Survey on hypergraph application methods: issues, advances, and challenges
    Journal of Computer Applications   2024 Vol.44 (11): 3315-3326 [Abstract] (582) [HTML 1 KB] [PDF 795 KB] (345)
2848 Min HUA, Jia’nan WEI, Wei ZHAO, Shuo MENG
  Interference analysis and performance research of LoRa signals
    Journal of Computer Applications   2024 Vol.44 (9): 2848-2854 [Abstract] (153) [HTML 1 KB] [PDF 1962 KB] (297)
2726 Yu DU, Yan ZHU
  Constructing pre-trained dynamic graph neural network to predict disappearance of academic cooperation behavior
    Journal of Computer Applications   2024 Vol.44 (9): 2726-2731 [Abstract] (163) [HTML 1 KB] [PDF 1708 KB] (48)
3090 Xingyao YANG, Hongtao SHEN, Zulian ZHANG, Jiong YU, Jiaying CHEN, Dongxiao WANG
  Sequential recommendation based on hierarchical filter and temporal convolution enhanced self-attention network
    Journal of Computer Applications   2024 Vol.44 (10): 3090-3096 [Abstract] (152) [HTML 1 KB] [PDF 1877 KB] (433)
1114 Tianhua CHEN, Jiaxuan ZHU, Jie YIN
  Bird recognition algorithm based on attention mechanism
    Journal of Computer Applications   2024 Vol.44 (4): 1114-1120 [Abstract] (264) [HTML 1 KB] [PDF 2874 KB] (308)
2437 Huanliang SUN, Siyi WANG, Junling LIU, Jingke XU
  Help-seeking information extraction model for flood event in social media data
    Journal of Computer Applications   2024 Vol.44 (8): 2437-2445 [Abstract] (257) [HTML 1 KB] [PDF 2708 KB] (282)
2952 Guixiang XUE, Hui WANG, Weifeng ZHOU, Yu LIU, Yan LI
  Port traffic flow prediction based on knowledge graph and spatio-temporal diffusion graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (9): 2952-2957 [Abstract] (205) [HTML 1 KB] [PDF 1614 KB] (105)
2493 Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG
  Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU
    Journal of Computer Applications   2024 Vol.44 (8): 2493-2499 [Abstract] (359) [HTML 1 KB] [PDF 1194 KB] (504)
0
  An oversampling method for imbalanced data based on sample potential and noise evolution
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (47) [HTML 0 KB] [PDF 0 KB] (3)
0
  Video Pedestrian Anomaly Detection Method Based on Skeleton Graph and Mixed Attention
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (56) [HTML 0 KB] [PDF 0 KB] (4)
0
  Fusion of Coordinate and Multi-Head Attention Mechanisms for Interactive Speech Emotion Recognition
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (78) [HTML 0 KB] [PDF 0 KB] (2)
0
  Automatic ICD coding method incorporating heterogeneous information
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (67) [HTML 0 KB] [PDF 0 KB] (4)
0
  Sentiment classification of psychological counseling based on attention over attention mechanism
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (43) [HTML 0 KB] [PDF 0 KB] (2)
0
  Consistency preserving age estimation method by ensemble ranking
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (163) [HTML 1 KB] [PDF 0 KB] (4)
0
  Relation extraction based on multi-scale mixed attention convolutional neural networks
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (70) [HTML 0 KB] [PDF 0 KB] (2)
0
  Low illumination face detection based on image enhancement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (207) [HTML 1 KB] [PDF 2413 KB] (30)
0
  Improved age assessment method combining Cloformer with ordinal regression
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (245) [HTML 1 KB] [PDF 3667 KB] (23)
0
  Purchase behavior prediction model based on two-stage dynamic interest recognition
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (200) [HTML 1 KB] [PDF 1474 KB] (20)
0
  Personalized federated learning method based on dual stream neural network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (212) [HTML 1 KB] [PDF 2185 KB] (16)
0
  Application of improved hunter-prey optimization algorithm in WSN coverage
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (182) [HTML 1 KB] [PDF 6422 KB] (12)
0
  Multimodal sentiment analysis network with self-supervision and multi-layer cross attention
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (234) [HTML 1 KB] [PDF 1572 KB] (42)
0
  Multi-level Color Restoration of Mural Image based on Gated Positional Encoding
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (28) [HTML 0 KB] [PDF 0 KB] (1)
0
  Graph convolutional network-based distributed power allocation algorithm for D2D communication systems
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (51) [HTML 0 KB] [PDF 0 KB] (4)
0
  Top-K optimal route query problem with keyword search support
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (196) [HTML 1 KB] [PDF 2879 KB] (11)
0
  Bagging-DyFAS: A model ensemble algorithm with dynamic fine-tuning
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (48) [HTML 0 KB] [PDF 0 KB] (4)
0
  Application of Improved VGG16 in Rice Blast Image Recognition
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (40) [HTML 0 KB] [PDF 0 KB] (5)
0
  Research on X-ray Image Enhancement of Complex workpieces Based on Gradient Field and Local Deviation
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (41) [HTML 0 KB] [PDF 0 KB] (4)
945 Kui ZHAO, Huiqi QIU, Xu LI, Zhifei XU
  Real-time pulmonary nodule detection algorithm combining attention and multipath fusion
    Journal of Computer Applications   2024 Vol.44 (3): 945-952 [Abstract] (274) [HTML 1 KB] [PDF 2387 KB] (419)
1248 Xiangjie SUN, Qiang WEI, Yisen WANG, Jiang DU
  Survey of code similarity detection technology
    Journal of Computer Applications   2024 Vol.44 (4): 1248-1258 [Abstract] (356) [HTML 1 KB] [PDF 1868 KB] (861)
1209 Rui TANG, Shibo YUE, Ruizhi ZHANG, Chuan LIU, Chuanlin PANG
  Energy efficiency optimization mechanism for UAV-assisted and non-orthogonal multiple access-enabled data collection system
    Journal of Computer Applications   2024 Vol.44 (4): 1209-1218 [Abstract] (150) [HTML 1 KB] [PDF 2575 KB] (243)
683 Yuanlong WANG, Wenbo HU, Hu ZHANG
  Knowledge-guided visual relationship detection model
    Journal of Computer Applications   2024 Vol.44 (3): 683-689 [Abstract] (250) [HTML 1 KB] [PDF 1592 KB] (308)
0
  Aspect sentiment triplet extraction based on aspect-aware attention enhancement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (113) [HTML 1 KB] [PDF 533 KB] (118)
0
  Aspect-level sentiment analysis model based on alternating attention mechanism and graph convolutional network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (163) [HTML 1 KB] [PDF 422 KB] (151)
671 Wei SHE, Yang LI, Lihong ZHONG, Defeng KONG, Zhao TIAN
  Hyperparameter optimization for neural network based on improved real coding genetic algorithm
    Journal of Computer Applications   2024 Vol.44 (3): 671-676 [Abstract] (422) [HTML 1 KB] [PDF 1532 KB] (535)
2704 Xingyao YANG, Yu CHEN, Jiong YU, Zulian ZHANG, Jiaying CHEN, Dongxiao WANG
  Recommendation model combining self-features and contrastive learning
    Journal of Computer Applications   2024 Vol.44 (9): 2704-2710 [Abstract] (220) [HTML 1 KB] [PDF 1737 KB] (270)
1862 Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI
  Multi-object cache side-channel attack detection model based on machine learning
    Journal of Computer Applications   2024 Vol.44 (6): 1862-1871 [Abstract] (241) [HTML 1 KB] [PDF 3387 KB] (103)
2285 Huaxia LI, Xiaorong HUANG, Anlin SHEN, Peng JIANG, Yiqiang PENG, Liqi SUI
  Trajectory tracking of caster-type omnidirectional mobile platform based on MPC and PID
    Journal of Computer Applications   2024 Vol.44 (7): 2285-2293 [Abstract] (134) [HTML 1 KB] [PDF 4693 KB] (166)
2080 Zhi ZHANG, Xin LI, Naifu YE, Kaixi HU
  DKP: defending against model stealing attacks based on dark knowledge protection
    Journal of Computer Applications   2024 Vol.44 (7): 2080-2086 [Abstract] (171) [HTML 1 KB] [PDF 1427 KB] (57)
2018 Dianhui MAO, Xuebo LI, Junling LIU, Denghui ZHANG, Wenjing YAN
  Chinese entity and relation extraction model based on parallel heterogeneous graph and sequential attention mechanism
    Journal of Computer Applications   2024 Vol.44 (7): 2018-2025 [Abstract] (271) [HTML 1 KB] [PDF 2387 KB] (396)
2065 Huanhuan LI, Tianqiang HUANG, Xuemei DING, Haifeng LUO, Liqing HUANG
  Public traffic demand prediction based on multi-scale spatial-temporal graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (7): 2065-2072 [Abstract] (282) [HTML 1 KB] [PDF 1969 KB] (320)
1987 Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG
  Deep network compression method based on low-rank decomposition and vector quantization
    Journal of Computer Applications   2024 Vol.44 (7): 1987-1994 [Abstract] (303) [HTML 1 KB] [PDF 1506 KB] (398)
2034 Qianhui LU, Yu ZHANG, Mengling WANG, Tingwei WU, Yuzhong SHAN
  Classification model of nuclear power equipment quality text based on improved recurrent pooling network
    Journal of Computer Applications   2024 Vol.44 (7): 2034-2040 [Abstract] (167) [HTML 1 KB] [PDF 1893 KB] (62)
2160 Haixiang HUANG, Shuanghe PENG, Ziyu ZHONG
  Binary code identification based on user system call sequences
    Journal of Computer Applications   2024 Vol.44 (7): 2160-2167 [Abstract] (151) [HTML 1 KB] [PDF 2494 KB] (41)
2208 Xun SUN, Ruifeng FENG, Yanru CHEN
  Monocular 3D object detection method integrating depth and instance segmentation
    Journal of Computer Applications   2024 Vol.44 (7): 2208-2215 [Abstract] (231) [HTML 1 KB] [PDF 4804 KB] (171)
2183 Wenliang WEI, Yangping WANG, Biao YUE, Anzheng WANG, Zhe ZHANG
  Deep learning model for infrared and visible image fusion based on illumination weight allocation and attention
    Journal of Computer Applications   2024 Vol.44 (7): 2183-2191 [Abstract] (179) [HTML 1 KB] [PDF 3503 KB] (228)
2279 Junhao ZHENG, Hongfeng TAO
  High-order internal model based robust iterative learning control with varying trajectory
    Journal of Computer Applications   2024 Vol.44 (7): 2279-2284 [Abstract] (139) [HTML 1 KB] [PDF 2195 KB] (30)
2041 Hao CHAO, Shuqi FENG, Yongli LIU
  Convolutional recurrent neural network optimized by multiple context vectors in EEG-based emotion recognition
    Journal of Computer Applications   2024 Vol.44 (7): 2041-2046 [Abstract] (181) [HTML 1 KB] [PDF 1601 KB] (104)
2151 Shuo SUN, Wei ZHANG, Wendi FENG, Yuwei ZHANG
  Automatic foreign function interface generation method based on source code analysis
    Journal of Computer Applications   2024 Vol.44 (7): 2151-2159 [Abstract] (179) [HTML 1 KB] [PDF 3540 KB] (66)
2116 Shiyang LI, Shaojie NI, Ding DENG, Lei CHEN, Honglei LIN
  Reliability enhancement algorithm for physical unclonable function based on non-orthogonal discrete transform
    Journal of Computer Applications   2024 Vol.44 (7): 2116-2122 [Abstract] (160) [HTML 1 KB] [PDF 2608 KB] (68)
2192 Song XU, Wenbo ZHANG, Yifan WANG
  Lightweight video salient object detection network based on spatiotemporal information
    Journal of Computer Applications   2024 Vol.44 (7): 2192-2199 [Abstract] (157) [HTML 1 KB] [PDF 2111 KB] (194)
2073 Junchi GE, Weihua ZHAO
  Distance weighted discriminant analysis based on robust principal component analysis for matrix data
    Journal of Computer Applications   2024 Vol.44 (7): 2073-2079 [Abstract] (153) [HTML 1 KB] [PDF 3828 KB] (194)
2168 Runze TIAN, Yulong ZHOU, Hong ZHU, Gang XUE
  Local information based path selection algorithm for service migration
    Journal of Computer Applications   2024 Vol.44 (7): 2168-2174 [Abstract] (173) [HTML 1 KB] [PDF 1021 KB] (104)
2233 Yangyi GAO, Tao LEI, Xiaogang DU, Suiyong LI, Yingbo WANG, Chongdan MIN
  Crowd counting and locating method based on pixel distance map and four-dimensional dynamic convolutional network
    Journal of Computer Applications   2024 Vol.44 (7): 2233-2242 [Abstract] (175) [HTML 1 KB] [PDF 4123 KB] (158)
2310 Yiqun ZHAO, Zhiyu ZHANG, Xue DONG
  Anisotropic travel time computation method based on dense residual connection physical information neural networks
    Journal of Computer Applications   2024 Vol.44 (7): 2310-2318 [Abstract] (170) [HTML 1 KB] [PDF 7009 KB] (237)
0
  Automatic Preoperative Planning Algorithm for Three-Dimensional Wedge Osteotomy of Radius
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (41) [HTML 0 KB] [PDF 0 KB] (6)
1423 Jia SU, Hong YU
  Missing value imputation algorithm using dual discriminator based on conditional generative adversarial imputation network
    Journal of Computer Applications   2024 Vol.44 (5): 1423-1427 [Abstract] (148) [HTML 1 KB] [PDF 872 KB] (238)
1832 Zixuan YUAN, Xiaoqing WENG, Ningzhen GE
  Early classification model of multivariate time series based on orthogonal locality preserving projection and cost optimization
    Journal of Computer Applications   2024 Vol.44 (6): 1832-1841 [Abstract] (132) [HTML 1 KB] [PDF 1806 KB] (54)
1699 Yao LIU, Yumeng LI, Miaomiao SONG
  Cognitive graph based on business process
    Journal of Computer Applications   2024 Vol.44 (6): 1699-1705 [Abstract] (172) [HTML 1 KB] [PDF 988 KB] (126)
47 Jia WANG-ZHU, Zhou YU, Jun YU, Jianping FAN
  Video dynamic scene graph generation model based on multi-scale spatial-temporal Transformer
    Journal of Computer Applications   2024 Vol.44 (1): 47-57 [Abstract] (390) [HTML 1 KB] [PDF 2900 KB] (561)
3217 Bennian YU, Yongzhao ZHAN, Qirong MAO, Wenlong DONG, Honglin LIU
  Double complex convolution and attention aggregating recurrent network for speech enhancement
    Journal of Computer Applications   2023 Vol.43 (10): 3217-3224 [Abstract] (209) [HTML 0 KB] [PDF 1993 KB] (366)
3142 Binwei SONG, Yao WANG
  Low-cost pay-per-use licensing scheme for FPGA intellectual property protection
    Journal of Computer Applications   2023 Vol.43 (10): 3142-3148 [Abstract] (197) [HTML 0 KB] [PDF 1413 KB] (95)
3121 Lei MA, Chuan LUO, Tianrui LI, Hongmei CHEN
  Fuzzy-rough set based unsupervised dynamic feature selection algorithm
    Journal of Computer Applications   2023 Vol.43 (10): 3121-3128 [Abstract] (209) [HTML 0 KB] [PDF 511 KB] (205)
1927 Xiaohui CHENG, Yuntian HUANG, Ruifang ZHANG
  Lightweight infrared road scene detection model based on multiscale and weighted coordinate attention
    Journal of Computer Applications   2024 Vol.44 (6): 1927-1934 [Abstract] (152) [HTML 1 KB] [PDF 3120 KB] (313)
1842 Mei WANG, Xuesong SU, Jia LIU, Ruonan YIN, Shan HUANG
  Time series classification method based on multi-scale cross-attention fusion in time-frequency domain
    Journal of Computer Applications   2024 Vol.44 (6): 1842-1847 [Abstract] (421) [HTML 1 KB] [PDF 2511 KB] (543)
1781 Xun YAO, Zhongzheng QIN, Jie YANG
  Generative label adversarial text classification model
    Journal of Computer Applications   2024 Vol.44 (6): 1781-1785 [Abstract] (343) [HTML 1 KB] [PDF 1142 KB] (393)
79 Junhao LUO, Yan ZHU
  Multi-dynamic aware network for unaligned multimodal language sequence sentiment analysis
    Journal of Computer Applications   2024 Vol.44 (1): 79-85 [Abstract] (230) [HTML 1 KB] [PDF 1299 KB] (354)
1636 Juxiang ZHOU, Jinsheng LIU, Jianhou GAN, Di WU, Zijie LI
  Classroom speech emotion recognition method based on multi-scale temporal-aware network
    Journal of Computer Applications   2024 Vol.44 (5): 1636-1643 [Abstract] (251) [HTML 1 KB] [PDF 4548 KB] (409)
2216 Zhe KONG, Han LI, Shaowei GAN, Mingru KONG, Bingtao HE, Ziyu GUO, Ducheng JIN, Zhaowen QIU
  Structure segmentation model for 3D kidney images based on asymmetric multi-decoder and attention module
    Journal of Computer Applications   2024 Vol.44 (7): 2216-2224 [Abstract] (175) [HTML 1 KB] [PDF 2905 KB] (185)
1760 Xiting LYU, Jinghua ZHAO, Haiying RONG, Jiale ZHAO
  Information diffusion prediction model based on Transformer and relational graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (6): 1760-1766 [Abstract] (246) [HTML 1 KB] [PDF 2150 KB] (212)
1965 Xiaolu WANG, Wangfei QIAN
  Gait recognition method based on two-branch convolutional network
    Journal of Computer Applications   2024 Vol.44 (6): 1965-1971 [Abstract] (170) [HTML 1 KB] [PDF 1361 KB] (172)
1796 Junfeng SHEN, Xingchen ZHOU, Can TANG
  Dual-channel sentiment analysis model based on improved prompt learning method
    Journal of Computer Applications   2024 Vol.44 (6): 1796-1806 [Abstract] (178) [HTML 1 KB] [PDF 3205 KB] (120)
788 Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU
  Analysis of consistency between sensitive behavior and privacy policy of Android applications
    Journal of Computer Applications   2024 Vol.44 (3): 788-796 [Abstract] (312) [HTML 1 KB] [PDF 1850 KB] (202)
1972 Yue LIU, Fang LIU, Aoyun WU, Qiuyue CHAI, Tianxiao WANG
  3D object detection network based on self-attention mechanism and graph convolution
    Journal of Computer Applications   2024 Vol.44 (6): 1972-1977 [Abstract] (206) [HTML 1 KB] [PDF 3215 KB] (404)
2055 Tian MA, Runtao XI, Jiahao LYU, Yijie ZENG, Jiayi YANG, Jiehui ZHANG
  Mobile robot 3D space path planning method based on deep reinforcement learning
    Journal of Computer Applications   2024 Vol.44 (7): 2055-2064 [Abstract] (370) [HTML 1 KB] [PDF 5732 KB] (934)
1706 Youren YU, Yangsen ZHANG, Yuru JIANG, Gaijuan HUANG
  Chinese named entity recognition model incorporating multi-granularity linguistic knowledge and hierarchical information
    Journal of Computer Applications   2024 Vol.44 (6): 1706-1712 [Abstract] (221) [HTML 1 KB] [PDF 1485 KB] (183)
1751 Jianjing LI, Guanfeng LI, Feizhou QIN, Weijun LI
  Multi-relation approximate reasoning model based on uncertain knowledge graph embedding
    Journal of Computer Applications   2024 Vol.44 (6): 1751-1759 [Abstract] (253) [HTML 1 KB] [PDF 1027 KB] (197)
1911 Mengyuan HUANG, Kan CHANG, Mingyang LING, Xinjie WEI, Tuanfa QIN
  Progressive enhancement algorithm for low-light images based on layer guidance
    Journal of Computer Applications   2024 Vol.44 (6): 1911-1919 [Abstract] (167) [HTML 1 KB] [PDF 6161 KB] (163)
1786 Tianci KE, Jianhua LIU, Shuihua SUN, Zhixiong ZHENG, Zijie CAI
  Aspect-level sentiment analysis model combining strong association dependency and concise syntax
    Journal of Computer Applications   2024 Vol.44 (6): 1786-1795 [Abstract] (183) [HTML 1 KB] [PDF 2399 KB] (160)
619 Yuanyuan MA, Leilei XIE, Nan DONG, Na LIU
  Opinion propagation model considering user initiative and mobility
    Journal of Computer Applications   2024 Vol.44 (2): 619-627 [Abstract] (189) [HTML 1 KB] [PDF 3396 KB] (368)
556 Weipeng JING, Qingxin XIAO, Hui LUO
  Channel compensation algorithm for speaker recognition based on probabilistic spherical discriminant analysis
    Journal of Computer Applications   2024 Vol.44 (2): 556-562 [Abstract] (247) [HTML 1 KB] [PDF 1543 KB] (131)
331 Mengmei YAN, Dongping YANG
  Review of mean field theory for deep neural network
    Journal of Computer Applications   2024 Vol.44 (2): 331-343 [Abstract] (464) [HTML 1 KB] [PDF 1848 KB] (918)
490 Yu ZHANG, Yan CHANG, Shibin ZHANG
  Adversarial example detection algorithm based on quantum local intrinsic dimensionality
    Journal of Computer Applications   2024 Vol.44 (2): 490-495 [Abstract] (170) [HTML 1 KB] [PDF 1918 KB] (168)
0
  Visual analysis of multivariate spatio-temporal data for orgin-destination streams
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (113) [HTML 1 KB] [PDF 0 KB] (10)
0
  Two-stage siamese graph convolutional neural network recommendation algorithm
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (68) [HTML 1 KB] [PDF 0 KB] (8)
0
  Performance evaluation of industry-university-research based on statistics and adaptive ParNet
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (40) [HTML 1 KB] [PDF 0 KB] (6)
360 Xing WANG, Guijuan LIU, Zhihao CHEN
  Fake review detection algorithm combining Gaussian mixture model and text graph convolutional network
    Journal of Computer Applications   2024 Vol.44 (2): 360-368 [Abstract] (266) [HTML 1 KB] [PDF 4451 KB] (164)
418 Hua LAI, Tong SUN, Wenjun WANG, Zhengtao YU, Shengxiang GAO, Ling DONG
  Text punctuation restoration for Vietnamese speech recognition with multimodal features
    Journal of Computer Applications   2024 Vol.44 (2): 418-423 [Abstract] (221) [HTML 1 KB] [PDF 3010 KB] (215)
377 Ziqi HUANG, Jianpeng HU
  Entity category enhanced nested named entity recognition in automotive domain
    Journal of Computer Applications   2024 Vol.44 (2): 377-384 [Abstract] (268) [HTML 1 KB] [PDF 1347 KB] (260)
1905 Feiyu ZHAI, Handa MA
  Hybrid classical-quantum classification model based on DenseNet
    Journal of Computer Applications   2024 Vol.44 (6): 1905-1910 [Abstract] (177) [HTML 1 KB] [PDF 2793 KB] (408)
1471 Wenshuo GAO, Xiaoyun CHEN
  Point cloud classification network based on node structure
    Journal of Computer Applications   2024 Vol.44 (5): 1471-1478 [Abstract] (184) [HTML 1 KB] [PDF 2562 KB] (303)
1099 Zongyu LI, Siwei QIANG, Xiaobo GUO, Zhenfeng ZHU
  Re-weighted adversarial variational autoencoder and its application in industrial causal effect estimation
    Journal of Computer Applications   2024 Vol.44 (4): 1099-1106 [Abstract] (350) [HTML 1 KB] [PDF 2192 KB] (178)
1493 Junna ZHANG, Xinxin WANG, Tianze LI, Xiaoyan ZHAO, Peiyan YUAN
  Task offloading method based on dynamic service cache assistance
    Journal of Computer Applications   2024 Vol.44 (5): 1493-1500 [Abstract] (188) [HTML 1 KB] [PDF 2414 KB] (249)
3697 Yu LING, Zhilong SHAN
  Knowledge concept recommendation system based on interest enhancement
    Journal of Computer Applications   2023 Vol.43 (12): 3697-3702 [Abstract] (307) [HTML 1 KB] [PDF 1346 KB] (441)
3551 Fangxing GENG, Zhuo LI, Xin CHEN
  Incentive mechanism design for hierarchical federated learning based on multi-leader Stackelberg game
    Journal of Computer Applications   2023 Vol.43 (11): 3551-3558 [Abstract] (357) [HTML 1 KB] [PDF 2438 KB] (742)
3510 Chunyong YIN, Yangchun ZHANG
  Unsupervised log anomaly detection model based on CNN and Bi-LSTM
    Journal of Computer Applications   2023 Vol.43 (11): 3510-3516 [Abstract] (335) [HTML 1 KB] [PDF 1759 KB] (932)
3616 Bolu LI, Li WU, Xiaoying WANG, Jianqiang HUANG, Tengfei CAO
  Multi-site wind speed prediction based on graph dynamic attention network
    Journal of Computer Applications   2023 Vol.43 (11): 3616-3624 [Abstract] (234) [HTML 1 KB] [PDF 4716 KB] (313)
3816 Longbao WANG, Yinqi LUAN, Liang XU, Xin ZENG, Shuai ZHANG, Shufang XU
  Route planning method of UAV swarm based on dynamic cluster particle swarm optimization
    Journal of Computer Applications   2023 Vol.43 (12): 3816-3823 [Abstract] (259) [HTML 1 KB] [PDF 2693 KB] (326)
3464 Yonggui WANG, Qiwen SHI
  Social recommendation by enhanced GNN with heterogeneous relationship
    Journal of Computer Applications   2023 Vol.43 (11): 3464-3471 [Abstract] (196) [HTML 1 KB] [PDF 1897 KB] (282)
3896 Qihong SONG, Jianxun LIU, Haize HU, Xiangping ZHANG
  Code search model based on collaborative fusion network
    Journal of Computer Applications   2023 Vol.43 (12): 3896-3902 [Abstract] (208) [HTML 1 KB] [PDF 1457 KB] (151)
3149 Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG
  Medical image privacy protection based on thumbnail encryption and distributed storage
    Journal of Computer Applications   2023 Vol.43 (10): 3149-3155 [Abstract] (234) [HTML 1 KB] [PDF 4138 KB] (305)
3457 Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN
  Nonuniform time slicing method based on prediction of community variance
    Journal of Computer Applications   2023 Vol.43 (11): 3457-3463 [Abstract] (185) [HTML 1 KB] [PDF 1001 KB] (97)
3368 Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG
  Efficient certificateless ring signature scheme based on elliptic curve
    Journal of Computer Applications   2023 Vol.43 (11): 3368-3374 [Abstract] (244) [HTML 1 KB] [PDF 740 KB] (249)
3504 Hongliang TIAN, Ping GE, Mingjie XIAN
  Distribution network operation exception management mechanism based on blockchain
    Journal of Computer Applications   2023 Vol.43 (11): 3504-3509 [Abstract] (194) [HTML 1 KB] [PDF 2084 KB] (88)
3607 Yutang JIN, Yisong WANG, Lihui WANG, Pengli ZHAO
  Speech enhancement algorithm based on multi-scale ladder-type time-frequency Conformer GAN
    Journal of Computer Applications   2023 Vol.43 (11): 3607-3615 [Abstract] (194) [HTML 1 KB] [PDF 4515 KB] (343)
3599 Xin ZHAO, Qianqian ZHU, Cong ZHAO, Jialing WU
  Segmentation of breast nodules in ultrasound images based on multi-scale and cross-spatial fusion
    Journal of Computer Applications   2023 Vol.43 (11): 3599-3606 [Abstract] (167) [HTML 1 KB] [PDF 3808 KB] (476)
3038 Yimin SHAO, Fan ZHAO, Yi WANG, Baoquan WANG
  Survey of visualization research based on blockchain technology and application
    Journal of Computer Applications   2023 Vol.43 (10): 3038-3046 [Abstract] (310) [HTML 1 KB] [PDF 8589 KB] (473)
3351 Kun YOU, Qinhui WANG, Xin LI
  General multi-unit false-name-proof auction mechanism for cloud computing
    Journal of Computer Applications   2023 Vol.43 (11): 3351-3357 [Abstract] (183) [HTML 1 KB] [PDF 1731 KB] (79)
3358 Guishuang XU, Xinchun YIN
  Certificateless conditional privacy-preserving authentication scheme for VANET
    Journal of Computer Applications   2023 Vol.43 (11): 3358-3367 [Abstract] (190) [HTML 1 KB] [PDF 867 KB] (153)
855 Yi ZHENG, Cunyi LIAO, Tianqian ZHANG, Ji WANG, Shouyin LIU
  Image denoising-based cell-level RSRP estimation method for urban areas
    Journal of Computer Applications   2024 Vol.44 (3): 855-862 [Abstract] (200) [HTML 1 KB] [PDF 4442 KB] (218)
1511 Zhiyuan XI, Chao TANG, Anyang TONG, Wenjian WANG
  Driver behavior recognition based on dual-path spatiotemporal network
    Journal of Computer Applications   2024 Vol.44 (5): 1511-1519 [Abstract] (214) [HTML 1 KB] [PDF 3642 KB] (208)
1107 Jie WANG, Hua MENG
  Image classification algorithm based on overall topological structure of point cloud
    Journal of Computer Applications   2024 Vol.44 (4): 1107-1113 [Abstract] (183) [HTML 1 KB] [PDF 2456 KB] (475)
1236 Huahua WANG, Xu ZHANG, Feng LI
  Secondary signal detection algorithm for high-speed mobile environments
    Journal of Computer Applications   2024 Vol.44 (4): 1236-1241 [Abstract] (148) [HTML 1 KB] [PDF 2710 KB] (82)
0
  Network abnormal traffic detection based on port attention and convolutional block attention module
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (118) [HTML 1 KB] [PDF 558 KB] (110)
1415 Kaiwen ZHAO, Peng WANG, Xiangrong TONG
  Two-stage search-based constrained evolutionary multitasking optimization algorithm
    Journal of Computer Applications   2024 Vol.44 (5): 1415-1422 [Abstract] (187) [HTML 1 KB] [PDF 1756 KB] (320)
916 Ruifeng HOU, Pengcheng ZHANG, Liyuan ZHANG, Zhiguo GUI, Yi LIU, Haowen ZHANG, Shubin WANG
  Iterative denoising network based on total variation regular term expansion
    Journal of Computer Applications   2024 Vol.44 (3): 916-921 [Abstract] (201) [HTML 1 KB] [PDF 2529 KB] (207)
2100 Yuan WEI, Yan LIN, Shengnan GUO, Youfang LIN, Huaiyu WAN
  Prediction of taxi demands between urban regions by fusing origin-destination spatial-temporal correlation
    Journal of Computer Applications   2023 Vol.43 (7): 2100-2106 [Abstract] (230) [HTML 0 KB] [PDF 1507 KB] (451)
2065 Shaoquan CHEN, Jianping CAI, Lan SUN
  Differential privacy generative adversarial network algorithm with dynamic gradient threshold clipping
    Journal of Computer Applications   2023 Vol.43 (7): 2065-2072 [Abstract] (264) [HTML 0 KB] [PDF 1824 KB] (615)
2026 Fangshu CHEN, Wei ZHANG, Xiaoming HU, Yufei ZHANG, Xiankai MENG, Linxiang SHI
  Dynamic aggregate nearest neighbor query algorithm in weighted road network space
    Journal of Computer Applications   2023 Vol.43 (7): 2026-2033 [Abstract] (239) [HTML 0 KB] [PDF 2757 KB] (302)
2017 Jinhui LAI, Zichen XU, Yicheng TU, Guolong TAN
  OmegaDB: concurrent computing framework of relational operators for heterogeneous architecture
    Journal of Computer Applications   2023 Vol.43 (7): 2017-2025 [Abstract] (270) [HTML 0 KB] [PDF 2915 KB] (358)
2001 Zifang XIA, Yaxin YU, Ziteng WANG, Jiaqi QIAO
  Explainable recommendation mechanism by fusion collaborative knowledge graph and counterfactual inference
    Journal of Computer Applications   2023 Vol.43 (7): 2001-2009 [Abstract] (298) [HTML 0 KB] [PDF 1898 KB] (661)
1994 Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG
  Dictionary partition vector space model for ciphertext ranked search in cloud environment
    Journal of Computer Applications   2023 Vol.43 (7): 1994-2000 [Abstract] (234) [HTML 0 KB] [PDF 1846 KB] (178)
1987 Zhenyu LIU, Chaokun WANG, Gaoyang GUO
  Parallel algorithm of betweenness centrality for dynamic networks
    Journal of Computer Applications   2023 Vol.43 (7): 1987-1993 [Abstract] (456) [HTML 1 KB] [PDF 1663 KB] (578)
819 Xiaoxin DU, Wei ZHOU, Hao WANG, Tianru HAO, Zhenfei WANG, Mei JIN, Jianfei ZHANG
  Survey of subgroup optimization strategies for intelligent algorithms
    Journal of Computer Applications   2024 Vol.44 (3): 819-830 [Abstract] (314) [HTML 1 KB] [PDF 2404 KB] (1086)
411 Kaitian WANG, Qing YE, Chunlei CHENG
  Classification method for traditional Chinese medicine electronic medical records based on heterogeneous graph representation
    Journal of Computer Applications   2024 Vol.44 (2): 411-417 [Abstract] (237) [HTML 1 KB] [PDF 1643 KB] (252)
960 Zhaojun TANG, Meiyan XIA, Hua ZHANG, Ting XIE
  Fixed-time consensus of dynamic event-triggered multi-agent systems
    Journal of Computer Applications   2024 Vol.44 (3): 960-965 [Abstract] (249) [HTML 1 KB] [PDF 1279 KB] (350)
876 Jingxian ZHOU, Xina LI
  UAV detection and recognition based on improved convolutional neural network and radio frequency fingerprint
    Journal of Computer Applications   2024 Vol.44 (3): 876-882 [Abstract] (349) [HTML 1 KB] [PDF 2693 KB] (304)
938 Zhanjun JIANG, Baijing WU, Long MA, Jing LIAN
  Faster-RCNN water-floating garbage recognition based on multi-scale feature and polarized self-attention
    Journal of Computer Applications   2024 Vol.44 (3): 938-944 [Abstract] (317) [HTML 1 KB] [PDF 4460 KB] (252)
1900 Shangjing LIN, Ji MA, Bei ZHUANG, Yueying LI, Ziyi LI, Tie LI, Jin TIAN
  Wireless traffic prediction based on federated learning
    Journal of Computer Applications   2023 Vol.43 (6): 1900-1909 [Abstract] (464) [HTML 1 KB] [PDF 4071 KB] (293)
145 Li’an CHEN, Yi GUO
  Text sentiment analysis model based on individual bias information
    Journal of Computer Applications   2024 Vol.44 (1): 145-151 [Abstract] (181) [HTML 1 KB] [PDF 766 KB] (222)
3947 Haiyong ZHANG, Xianjin FANG, Enwan ZHANG, Baoyu LI, Chao PENG, Jianxiang MU
  Fingerprint positioning method based on measurement report signal clustering
    Journal of Computer Applications   2023 Vol.43 (12): 3947-3954 [Abstract] (245) [HTML 1 KB] [PDF 2357 KB] (88)
269 Yongjian MA, Xuhua SHI, Peiyao WANG
  Constrained multi-objective evolutionary algorithm based on two-stage search and dynamic resource allocation
    Journal of Computer Applications   2024 Vol.44 (1): 269-277 [Abstract] (307) [HTML 1 KB] [PDF 2145 KB] (137)
182 Kuo TIAN, Yinghan WU, Feng HU
  Identification method of influence nodes in multilayer hypernetwork based on evidence theory
    Journal of Computer Applications   2024 Vol.44 (1): 182-189 [Abstract] (184) [HTML 1 KB] [PDF 2830 KB] (65)
300 Jie LONG, Liang XIE, Haijiao XU
  Integrated deep reinforcement learning portfolio model
    Journal of Computer Applications   2024 Vol.44 (1): 300-310 [Abstract] (353) [HTML 1 KB] [PDF 3723 KB] (223)
292 Hao CHEN, Zhenping XIA, Cheng CHENG, Xing LIN-LI, Bowen ZHANG
  Lightweight image super-resolution reconstruction network based on Transformer-CNN
    Journal of Computer Applications   2024 Vol.44 (1): 292-299 [Abstract] (616) [HTML 1 KB] [PDF 1855 KB] (374)
123 Yunyun GAO, Lasheng ZHAO, Qiang ZHANG
  Acoustic word embedding model based on Bi-LSTM and convolutional-Transformer
    Journal of Computer Applications   2024 Vol.44 (1): 123-128 [Abstract] (273) [HTML 1 KB] [PDF 1311 KB] (117)
318 Kai XU, Qikai GAO, Ming YIN, Jingjing TAN
  Trajectory similarity measurement algorithm based on three-dimensional space area division
    Journal of Computer Applications   2024 Vol.44 (1): 318-323 [Abstract] (200) [HTML 1 KB] [PDF 1595 KB] (91)
311 Hanxiao SHI, Leichun WANG
  Short-term power load forecasting by graph convolutional network combining LSTM and self-attention mechanism
    Journal of Computer Applications   2024 Vol.44 (1): 311-317 [Abstract] (454) [HTML 1 KB] [PDF 2173 KB] (343)
101 Chenghao FENG, Zhenping XIE, Bowen DING
  Selective generation method of test cases for Chinese text error correction software
    Journal of Computer Applications   2024 Vol.44 (1): 101-112 [Abstract] (313) [HTML 1 KB] [PDF 3173 KB] (103)
199 Du CHEN, Yuanyuan LI, Yu CHEN
  Directed gene regulatory network inference algorithm based on t-test and stepwise network search
    Journal of Computer Applications   2024 Vol.44 (1): 199-205 [Abstract] (231) [HTML 1 KB] [PDF 1783 KB] (67)
3755 Wenquan LI, Yimin MAO, Xindong PENG
  Agglomerative hierarchical clustering algorithm based on hesitant fuzzy set
    Journal of Computer Applications   2023 Vol.43 (12): 3755-3763 [Abstract] (285) [HTML 1 KB] [PDF 626 KB] (104)
767 Shengjie MENG, Wanjun YU, Ying CHEN
  Feature selection algorithm for high-dimensional data with maximum correlation and maximum difference
    Journal of Computer Applications   2024 Vol.44 (3): 767-771 [Abstract] (199) [HTML 1 KB] [PDF 698 KB] (152)
512 Jintao RAO, Zhe CUI
  Electronic voting scheme based on SM2 threshold blind signature
    Journal of Computer Applications   2024 Vol.44 (2): 512-518 [Abstract] (233) [HTML 1 KB] [PDF 1208 KB] (384)
677 Shipan JIANG, Shuwei CHEN, Guoyan ZENG
  Strategy of invalid clause elimination in first-order logic theorem prover
    Journal of Computer Applications   2024 Vol.44 (3): 677-682 [Abstract] (217) [HTML 1 KB] [PDF 905 KB] (154)
702 Yongfeng DONG, Jiaming BAI, Liqin WANG, Xu WANG
  Chinese named entity recognition combining prior knowledge and glyph features
    Journal of Computer Applications   2024 Vol.44 (3): 702-708 [Abstract] (278) [HTML 1 KB] [PDF 750 KB] (379)
645 Xuan CAO, Tianjian LUO
  Dynamic multi-domain adversarial learning method for cross-subject motor imagery EEG signals
    Journal of Computer Applications   2024 Vol.44 (2): 645-653 [Abstract] (817) [HTML 1 KB] [PDF 3364 KB] (235)
3790 Qian CHEN, Zheng CHAI, Zilong WANG, Jiawei CHEN
  Poisoning attack detection scheme based on generative adversarial network for federated learning
    Journal of Computer Applications   2023 Vol.43 (12): 3790-3798 [Abstract] (737) [HTML 1 KB] [PDF 2367 KB] (784)
972 Shuai REN, Yuanfa JI, Xiyan SUN, Zhaochuan WEI, Zian LIN
  Prediction of landslide displacement based on improved grey wolf optimizer and support vector regression
    Journal of Computer Applications   2024 Vol.44 (3): 972-982 [Abstract] (201) [HTML 1 KB] [PDF 3878 KB] (129)
3443 Chuyuan WEI, Mengke WANG, Chuanhao HU, Guangqi ZHANG
  Deep review attention neural network model for enhancing explainability of recommendation system
    Journal of Computer Applications   2023 Vol.43 (11): 3443-3448 [Abstract] (358) [HTML 1 KB] [PDF 1652 KB] (479)
3086 Dan XU, Hongfang GONG, Rongrong LUO
  Aspect sentiment analysis with aspect item and context representation
    Journal of Computer Applications   2023 Vol.43 (10): 3086-3092 [Abstract] (259) [HTML 1 KB] [PDF 1011 KB] (169)
403 Jiawei ZHANG, Guandong GAO, Ke XIAO, Shengzun SONG
  Violent crime hierarchy algorithm by joint modeling of improved hierarchical attention network and TextCNN
    Journal of Computer Applications   2024 Vol.44 (2): 403-410 [Abstract] (251) [HTML 1 KB] [PDF 1110 KB] (207)
696 Lei GUO, Zhen JIA, Tianrui LI
  Relational and interactive graph attention network for aspect-level sentiment analysis
    Journal of Computer Applications   2024 Vol.44 (3): 696-701 [Abstract] (285) [HTML 1 KB] [PDF 1072 KB] (339)
1578 Jianhui HE, Chunlong HU, Xin SHU
  Multi-task age estimation method based on multi-peak label distribution learning
    Journal of Computer Applications   2023 Vol.43 (5): 1578-1583 [Abstract] (267) [HTML 0 KB] [PDF 1036 KB] (60)
1409 Jiahong SUI, Yingchi MAO, Huimin YU, Zicheng WANG, Ping PING
  Global image captioning method based on graph attention network
    Journal of Computer Applications   2023 Vol.43 (5): 1409-1415 [Abstract] (350) [HTML 0 KB] [PDF 2508 KB] (202)
1394 Rui XU, Shuang LIANG, Hang WAN, Yimin WEN, Shiming SHEN, Jian LI
  Extraction of PM 2.5 diffusion characteristics based on candlestick pattern matching
    Journal of Computer Applications   2023 Vol.43 (5): 1394-1400 [Abstract] (254) [HTML 0 KB] [PDF 2423 KB] (92)
1378 Yafei ZHANG, Jing WANG, Yaoshuai ZHAO, Zhihao WU, Youfang LIN
  Stock movement prediction with market dynamic hierarchical macro information
    Journal of Computer Applications   2023 Vol.43 (5): 1378-1384 [Abstract] (330) [HTML 0 KB] [PDF 1401 KB] (163)
1372 Guangyao ZHANG, Chunfeng SONG
  Pedestrian head tracking model based on full-body appearance features
    Journal of Computer Applications   2023 Vol.43 (5): 1372-1377 [Abstract] (361) [HTML 0 KB] [PDF 2258 KB] (230)
1330 Qinghai XU, Shifei DING, Tongfeng SUN, Jian ZHANG, Lili GUO
  Improved capsule network based on multipath feature
    Journal of Computer Applications   2023 Vol.43 (5): 1330-1335 [Abstract] (403) [HTML 0 KB] [PDF 1560 KB] (268)
1323 Haitao TANG, Hongjun WANG, Tianrui LI
  Discriminative multidimensional scaling for feature learning
    Journal of Computer Applications   2023 Vol.43 (5): 1323-1329 [Abstract] (563) [HTML 1 KB] [PDF 1101 KB] (460)
3711 Fei XIA, Shuaiqi CHEN, Min HUA, Bihong JIANG
  Chinese word segmentation method in electric power domain based on improved BERT
    Journal of Computer Applications   2023 Vol.43 (12): 3711-3718 [Abstract] (417) [HTML 1 KB] [PDF 1953 KB] (227)
3955 Zhenggang WANG, Zhong LIU, Jin JIN, Wei LIU
  Customs risk control method based on improved butterfly feedback neural network
    Journal of Computer Applications   2023 Vol.43 (12): 3955-3964 [Abstract] (241) [HTML 1 KB] [PDF 2964 KB] (108)
3008 Rui MEN, Shujia FAN, Axida SHAN, Shaoyu DU, Xiumei FAN
  Survey on combination of computation offloading and blockchain in internet of things
    Journal of Computer Applications   2023 Vol.43 (10): 3008-3016 [Abstract] (567) [HTML 1 KB] [PDF 882 KB] (296)
3093 Yuhang LI, Yuli YANG, Yao MA, Dan YU, Yongle CHEN
  Text adversarial example generation method based on BERT model
    Journal of Computer Applications   2023 Vol.43 (10): 3093-3098 [Abstract] (420) [HTML 1 KB] [PDF 971 KB] (258)
3848 Hairong XUE, Xiaolong HAN
  Integrated scheduling considering automated guided vehicle charging strategy based on improved NSGA-Ⅱ
    Journal of Computer Applications   2023 Vol.43 (12): 3848-3855 [Abstract] (286) [HTML 1 KB] [PDF 3405 KB] (116)
3647 Yu ZHANG, Ying CAI, Jianyang CUI, Meng ZHANG, Yanfang FAN
  Gradient descent with momentum algorithm based on differential privacy in convolutional neural network
    Journal of Computer Applications   2023 Vol.43 (12): 3647-3653 [Abstract] (738) [HTML 1 KB] [PDF 1985 KB] (711)
3490 Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU
  SM4 resistant differential power analysis lightweight threshold implementation
    Journal of Computer Applications   2023 Vol.43 (11): 3490-3496 [Abstract] (343) [HTML 1 KB] [PDF 3082 KB] (360)
3559 Chenghao YU, Runhe QIU
  Performance analysis of bit error rate on RIS assisted index modulation cooperative system
    Journal of Computer Applications   2023 Vol.43 (11): 3559-3567 [Abstract] (274) [HTML 1 KB] [PDF 2563 KB] (184)
3297 Junpeng ZHANG, Yujie SHI, Rui JANG, Jingjing DONG, Changjian QIU
  Review on advances in recognition and classification of cognitive impairment based on EEG signals
    Journal of Computer Applications   2023 Vol.43 (10): 3297-3308 [Abstract] (465) [HTML 1 KB] [PDF 1199 KB] (547)
3418 Shuying YANG, Haiming GUO, Xin LI
  EEG classification based on channel selection and multi-dimensional feature fusion
    Journal of Computer Applications   2023 Vol.43 (11): 3418-3427 [Abstract] (414) [HTML 1 KB] [PDF 3363 KB] (265)
3129 Yu YANG, Weiwei DUAN
  Spectral clustering based dynamic community discovery algorithm in social network
    Journal of Computer Applications   2023 Vol.43 (10): 3129-3135 [Abstract] (327) [HTML 1 KB] [PDF 2785 KB] (580)
3449 Zhuangzhuang XUE, Peng LI, Weibei FAN, Hongjun ZHANG, Fanshuo MENG
  Multiple clustering algorithm based on dynamic weighted tensor distance
    Journal of Computer Applications   2023 Vol.43 (11): 3449-3456 [Abstract] (226) [HTML 1 KB] [PDF 2437 KB] (180)
3236 Suolan LIU, Zhenzhen TIAN, Hongyuan WANG, Long LIN, Yan WANG
  Human action recognition method based on multi-scale feature fusion of single mode
    Journal of Computer Applications   2023 Vol.43 (10): 3236-3243 [Abstract] (248) [HTML 1 KB] [PDF 1425 KB] (744)
0
  Double complex convolutional and attention aggregating recurrent network for speech enhancement
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (129) [HTML 1 KB] [PDF 528 KB] (84)
0 Lei Ma Chuan Luo LI Tian-rui Hongmei Chen
  Fuzzy-rough set based unsupervised dynamic feature selection algorithm
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (42) [HTML 1 KB] [PDF 535 KB] (11)
1176 Yingqi LI, Weifeng JI, Jiang WENG, Xuan WU, Xiuyu SHEN, Yan SUN
  Virus propagation model and stability analysis of heterogeneous backup network
    Journal of Computer Applications   2023 Vol.43 (4): 1176-1182 [Abstract] (264) [HTML 0 KB] [PDF 2043 KB] (66)
1160 Chunyong YIN, Rui QU
  Federated learning algorithm based on personalized differential privacy
    Journal of Computer Applications   2023 Vol.43 (4): 1160-1168 [Abstract] (890) [HTML 0 KB] [PDF 1800 KB] (597)
1056 Cheng FANG, Bei LI, Ping HAN, Qiong WU
  Fine-grained emotion classification of Chinese microblog based on syntactic dependency graph
    Journal of Computer Applications   2023 Vol.43 (4): 1056-1061 [Abstract] (341) [HTML 0 KB] [PDF 1598 KB] (198)
1021 Yongbing GAO, Juntian GAO, Rong MA, Lidong YANG
  User granularity-level personalized social text generation model
    Journal of Computer Applications   2023 Vol.43 (4): 1021-1028 [Abstract] (369) [HTML 0 KB] [PDF 2546 KB] (168)
1005 Zhoubo XU, Puqing CHEN, Huadong LIU, Xin YANG
  Deep graph matching model based on self-attention network
    Journal of Computer Applications   2023 Vol.43 (4): 1005-1012 [Abstract] (544) [HTML 0 KB] [PDF 2118 KB] (292)
3275 Zhiang ZHANG, Guangzhong LIAO
  Multi-scale feature enhanced retinal vessel segmentation algorithm based on U-Net
    Journal of Computer Applications   2023 Vol.43 (10): 3275-3281 [Abstract] (339) [HTML 1 KB] [PDF 2624 KB] (170)
3309 Min ZUO, Hong WANG, Wenjing YAN, Qingchuan ZHANG
  Gene splice site identification based on BERT and CNN
    Journal of Computer Applications   2023 Vol.43 (10): 3309-3314 [Abstract] (342) [HTML 1 KB] [PDF 1829 KB] (211)
3703 Jianle CAO, Nana LI
  Semantically enhanced sentiment classification model based on multi-level attention
    Journal of Computer Applications   2023 Vol.43 (12): 3703-3710 [Abstract] (373) [HTML 1 KB] [PDF 1638 KB] (202)
3230 Chuanbiao LI, Yuanwei BI
  Stereo matching algorithm based on cross-domain adaptation
    Journal of Computer Applications   2023 Vol.43 (10): 3230-3235 [Abstract] (257) [HTML 1 KB] [PDF 2684 KB] (136)
3267 Wei LI, Sixin LIANG, Jianzhou ZHANG
  Long-tailed image defect detection based on gradient-guide weighted-deferred negative gradient decay loss
    Journal of Computer Applications   2023 Vol.43 (10): 3267-3274 [Abstract] (266) [HTML 1 KB] [PDF 2403 KB] (150)
2611 Meijia LIANG, Xinwu LIU, Xiaopeng HU
  Small target detection algorithm for train operating environment image based on improved YOLOv3
    Journal of Computer Applications   2023 Vol.43 (8): 2611-2618 [Abstract] (328) [HTML 1 KB] [PDF 5709 KB] (180)
2819 Maozu GUO, Yazhe ZHANG, Lingling ZHAO
  Electric vehicle charging station siting method based on spatial semantics and individual activities
    Journal of Computer Applications   2023 Vol.43 (9): 2819-2827 [Abstract] (248) [HTML 1 KB] [PDF 6390 KB] (116)
3062 Mingyue WU, Dong ZHOU, Wenyu ZHAO, Wei QU
  Sentence embedding optimization based on manifold learning
    Journal of Computer Applications   2023 Vol.43 (10): 3062-3069 [Abstract] (266) [HTML 1 KB] [PDF 1411 KB] (145)
2784 Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI
  Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP
    Journal of Computer Applications   2023 Vol.43 (9): 2784-2788 [Abstract] (280) [HTML 1 KB] [PDF 1455 KB] (123)
2812 Xuyan ZHAO, Yunhe CUI, Chaohui JIANG, Qing QIAN, Guowei SHEN, Chun GUO, Xianchao LI
  CHAIN: edge computing node placement algorithm based on overlapping domination
    Journal of Computer Applications   2023 Vol.43 (9): 2812-2818 [Abstract] (240) [HTML 1 KB] [PDF 1484 KB] (126)
2963 Kunting LU, Rongrong FEI, Xuande ZHANG
  Remote sensing image pansharpening by convolutional neural network
    Journal of Computer Applications   2023 Vol.43 (9): 2963-2969 [Abstract] (334) [HTML 1 KB] [PDF 3323 KB] (163)
3178 Erchao LI, Shenghui ZHANG
  Dynamic multi-objective optimization algorithm based on adaptive prediction of new evaluation index
    Journal of Computer Applications   2023 Vol.43 (10): 3178-3187 [Abstract] (304) [HTML 1 KB] [PDF 3391 KB] (151)
2753 Xinyue ZHANG, Rong LIU, Chiyu WEI, Ke FANG
  Aspect-based sentiment analysis method with integrating prompt knowledge
    Journal of Computer Applications   2023 Vol.43 (9): 2753-2759 [Abstract] (502) [HTML 1 KB] [PDF 1699 KB] (250)
583 Yating SU, Cuixiang LIU
  Three-dimensional human reconstruction model based on high-resolution net and graph convolutional network
    Journal of Computer Applications   2023 Vol.43 (2): 583-588 [Abstract] (268) [HTML 0 KB] [PDF 2124 KB] (165)
575 Ruoying WANG, Fan LYU, Liuqing ZHAO, Fuyuan HU
  Floorplan generation algorithm integrating user requirements and boundary constraints
    Journal of Computer Applications   2023 Vol.43 (2): 575-582 [Abstract] (400) [HTML 0 KB] [PDF 2582 KB] (200)
349 Ming XU, Linhao LI, Qiaoling QI, Liqin WANG
  Abductive reasoning model based on attention balance list
    Journal of Computer Applications   2023 Vol.43 (2): 349-355 [Abstract] (345) [HTML 0 KB] [PDF 1484 KB] (135)
335 Chengyu LIN, Lei WANG, Cong XUE
  Weakly-supervised text classification with label semantic enhancement
    Journal of Computer Applications   2023 Vol.43 (2): 335-342 [Abstract] (511) [HTML 0 KB] [PDF 1987 KB] (365)
2747 Haodong ZHENG, Hua MA, Yingchao XIE, Wensheng TANG
  Knowledge tracing model based on graph neural network blending with forgetting factors and memory gate
    Journal of Computer Applications   2023 Vol.43 (9): 2747-2752 [Abstract] (509) [HTML 1 KB] [PDF 1266 KB] (340)
2828 Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU
  Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms
    Journal of Computer Applications   2023 Vol.43 (9): 2828-2835 [Abstract] (391) [HTML 1 KB] [PDF 3025 KB] (150)
2910 Qiuyu ZHANG, Yongwang WEN
  Triplet deep hashing method for speech retrieval
    Journal of Computer Applications   2023 Vol.43 (9): 2910-2918 [Abstract] (250) [HTML 1 KB] [PDF 2003 KB] (123)
2581 Doudou LI, Wanggen LI, Yichun XIA, Yang SHU, Kun GAO
  Skeleton-based action recognition based on feature interaction and adaptive fusion
    Journal of Computer Applications   2023 Vol.43 (8): 2581-2587 [Abstract] (281) [HTML 1 KB] [PDF 2179 KB] (347)
2382 Zexi JIN, Lei LI, Ji LIU
  Transfer learning model based on improved domain separation network
    Journal of Computer Applications   2023 Vol.43 (8): 2382-2389 [Abstract] (302) [HTML 1 KB] [PDF 1973 KB] (630)
2426 Kezheng CHEN, Xiaoran GUO, Yong ZHONG, Zhenping LI
  Relation extraction method based on negative training and transfer learning
    Journal of Computer Applications   2023 Vol.43 (8): 2426-2430 [Abstract] (288) [HTML 1 KB] [PDF 922 KB] (294)
2406 Xiaoyan ZHANG, Zhengyu DUAN
  Cross-lingual zero-resource named entity recognition model based on sentence-level generative adversarial network
    Journal of Computer Applications   2023 Vol.43 (8): 2406-2411 [Abstract] (301) [HTML 1 KB] [PDF 963 KB] (183)
2420 Haiwei FAN, Xinsiyu LU, Limiao ZHANG, Yisheng AN
  Citation recommendation algorithm fusing knowledge graph and graph attention network
    Journal of Computer Applications   2023 Vol.43 (8): 2420-2425 [Abstract] (451) [HTML 1 KB] [PDF 1853 KB] (292)
2390 Bin LIU, Qian ZHANG, Yaqin WEI, Xueying CUI, Hongying ZHI
  Graph to equation tree model based on expression layer-by-layer aggregation and dynamic selection
    Journal of Computer Applications   2023 Vol.43 (8): 2390-2395 [Abstract] (201) [HTML 1 KB] [PDF 2057 KB] (83)
2412 Hongjun HENG, Dingcheng YANG
  Knowledge enhanced aspect word interactive graph neural network
    Journal of Computer Applications   2023 Vol.43 (8): 2412-2419 [Abstract] (291) [HTML 1 KB] [PDF 1210 KB] (120)
2448 Shijie PENG, Hongmei CHEN, Lizhen WANG, Qing XIAO
  Hybrid point-of-interest recommendation model based on geographic preference ranking
    Journal of Computer Applications   2023 Vol.43 (8): 2448-2455 [Abstract] (283) [HTML 1 KB] [PDF 1284 KB] (150)
2602 Huan LIU, Lianghong WU, Lyu ZHANG, Liang CHEN, Bowen ZHOU, Hongqiang ZHANG
  Leukocyte detection method based on twice-fusion-feature CenterNet
    Journal of Computer Applications   2023 Vol.43 (8): 2602-2610 [Abstract] (283) [HTML 1 KB] [PDF 4702 KB] (128)
2537 Dongying ZHU, Yong ZHONG, Guanci YANG, Yang LI
  Research progress on motion segmentation of visual localization and mapping in dynamic environment
    Journal of Computer Applications   2023 Vol.43 (8): 2537-2545 [Abstract] (313) [HTML 1 KB] [PDF 2687 KB] (247)
67 LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng
  License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
    Journal of Computer Applications   2023 Vol.43 (1): 67-73 [Abstract] (297) [HTML 0 KB] [PDF 2162 KB] (65)
61 ZOU Bin, ZHANG Cong
  Dense crowd detection algorithm based on Faster R-CNN
    Journal of Computer Applications   2023 Vol.43 (1): 61-66 [Abstract] (409) [HTML 0 KB] [PDF 3411 KB] (191)
265 LIN Jianzhuang, YANG Wenzhong, TAN Sixiang, ZHOU Lexin, CHEN Danni
  Fusing filter enhancement and reverse attention network for polyp segmentation
    Journal of Computer Applications   2023 Vol.43 (1): 265-272 [Abstract] (326) [HTML 0 KB] [PDF 2283 KB] (157)
169 LIN Yangping, LIU Jia, CHEN Pei, ZHANG Mingshu, YANG Xiaoyuan
  Semi-generative video steganography scheme based on deep convolutional generative adversarial net
    Journal of Computer Applications   2023 Vol.43 (1): 169-175 [Abstract] (365) [HTML 0 KB] [PDF 3023 KB] (151)
15 YAO Huayong, YE Dongyi, CHEN Zhaojiong
  Multi-round conversational reinforcement learning recommendation algorithm via multi-granularity feedback
    Journal of Computer Applications   2023 Vol.43 (1): 15-21 [Abstract] (443) [HTML 0 KB] [PDF 1249 KB] (265)
147 ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin
  Analysis and improvement of certificateless signature scheme
    Journal of Computer Applications   2023 Vol.43 (1): 147-153 [Abstract] (513) [HTML 1 KB] [PDF 910 KB] (231)
3225 Yuntao ZHAO, Wanqi XIE, Weigang LI, Jiaming HU
  Robot hand-eye calibration algorithm based on covariance matrix adaptation evolutionary strategy
    Journal of Computer Applications   2023 Vol.43 (10): 3225-3229 [Abstract] (264) [HTML 1 KB] [PDF 1281 KB] (135)
2798 Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU
  Identity-based ring signature scheme on number theory research unit lattice
    Journal of Computer Applications   2023 Vol.43 (9): 2798-2805 [Abstract] (324) [HTML 1 KB] [PDF 962 KB] (211)
2619 Shengwei DUAN, Xinyu CHENG, Haozhou WANG, Fei WANG
  Dam surface disease detection algorithm based on improved YOLOv5
    Journal of Computer Applications   2023 Vol.43 (8): 2619-2629 [Abstract] (521) [HTML 1 KB] [PDF 7862 KB] (346)
2855 Bin LI, Zhibin TANG
  Multiple level binary imperialist competitive algorithm for solving heterogeneous multiple knapsack problem
    Journal of Computer Applications   2023 Vol.43 (9): 2855-2867 [Abstract] (269) [HTML 1 KB] [PDF 2507 KB] (67)
1151 Jian CUI, Kailang MA, Yu SUN, Dou WANG, Junliang ZHOU
  Deep explainable method for encrypted traffic classification
    Journal of Computer Applications   2023 Vol.43 (4): 1151-1159 [Abstract] (453) [HTML 1 KB] [PDF 3314 KB] (205)
1318 Haiyu YANG, Wenpu GUO, Kai KANG
  Signal modulation recognition method based on convolutional long short-term deep neural network
    Journal of Computer Applications   2023 Vol.43 (4): 1318-1322 [Abstract] (295) [HTML 1 KB] [PDF 2318 KB] (144)
0
  Fine-Grained Emotion Classification of Chinese Microblogs Based on syntactic dependence graph
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (110) [HTML 0 KB] [PDF 0 KB] (6)
1826 Huibin ZHANG, Liping FENG, Yaojun HAO, Yining WANG
  Ancient mural dynasty identification based on attention mechanism and transfer learning
    Journal of Computer Applications   2023 Vol.43 (6): 1826-1832 [Abstract] (349) [HTML 1 KB] [PDF 1804 KB] (235)
3913 Jia XU, Jing LIU, Ge YU, Pin LYU, Panyuan YANG
  Review of peer grading technologies for online education
    Journal of Computer Applications   2022 Vol.42 (12): 3913-3923 [Abstract] (346) [HTML 0 KB] [PDF 1682 KB] (190)
3870 Yi WANG, Liu YANG, Tongkuai ZHANG
  Channel estimation based on compressive sensing in RIS-assisted millimeter wave system
    Journal of Computer Applications   2022 Vol.42 (12): 3870-3875 [Abstract] (489) [HTML 0 KB] [PDF 1756 KB] (278)
3785 Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA
  Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology
    Journal of Computer Applications   2022 Vol.42 (12): 3785-3791 [Abstract] (339) [HTML 0 KB] [PDF 1481 KB] (111)
2370 Hui LU, Ruizhang HUANG, Jingjing XUE, Lina REN, Chuan LIN
  DDDC: deep dynamic document clustering model
    Journal of Computer Applications   2023 Vol.43 (8): 2370-2375 [Abstract] (312) [HTML 1 KB] [PDF 1962 KB] (128)
2721 Xiaomin ZHOU, Fei TENG, Yi ZHANG
  Automatic international classification of diseases coding model based on meta-network
    Journal of Computer Applications   2023 Vol.43 (9): 2721-2726 [Abstract] (321) [HTML 1 KB] [PDF 1032 KB] (126)
2352 Jingyi WANG, Chao LI, Heng SONG, Di LI, Junwu ZHU
  Spectrum combinatorial auction mechanism based on random walk algorithm
    Journal of Computer Applications   2023 Vol.43 (8): 2352-2357 [Abstract] (238) [HTML 1 KB] [PDF 1187 KB] (108)
2345 Saijuan XU, Zhenyu PEI, Jiawei LIN, Genggeng LIU
  Constrained multi-objective evolutionary algorithm based on multi-stage search
    Journal of Computer Applications   2023 Vol.43 (8): 2345-2351 [Abstract] (346) [HTML 1 KB] [PDF 1529 KB] (198)
2217 Bona XUAN, Jin LI, Yafei SONG, Zexuan MA
  Malicious code classification method based on improved MobileNetV2
    Journal of Computer Applications   2023 Vol.43 (7): 2217-2225 [Abstract] (301) [HTML 1 KB] [PDF 3547 KB] (193)
1750 Hui WANG, Jianhong LI
  Few-shot recognition method of 3D models based on Transformer
    Journal of Computer Applications   2023 Vol.43 (6): 1750-1758 [Abstract] (324) [HTML 1 KB] [PDF 3334 KB] (238)
1655 Yongfeng DONG, Yacong WANG, Yao DONG, Yahan DENG
  Survey of online learning resource recommendation
    Journal of Computer Applications   2023 Vol.43 (6): 1655-1663 [Abstract] (758) [HTML 1 KB] [PDF 824 KB] (551)
3603 Chenguang LI, Bo ZHANG, Qian ZHAO, Xiaoping CHEN, Xingfu WANG
  Empathy prediction from texts based on transfer learning
    Journal of Computer Applications   2022 Vol.42 (11): 3603-3609 [Abstract] (290) [HTML 0 KB] [PDF 777 KB] (115)
3513 Rui XIAO, Mingyi LIU, Zhiying TU, Zhongjie WANG
  Personal event detection method based on text mining in social media
    Journal of Computer Applications   2022 Vol.42 (11): 3513-3519 [Abstract] (383) [HTML 0 KB] [PDF 2013 KB] (96)
1796 Zhixiong ZHENG, Jianhua LIU, Shuihua SUN, Ge XU, Honghui LIN
  Aspect-based sentiment analysis model fused with multi-window local information
    Journal of Computer Applications   2023 Vol.43 (6): 1796-1802 [Abstract] (322) [HTML 1 KB] [PDF 1323 KB] (109)
2261 Lei LI, Guofu ZHANG, Zhaopin SU, Feng YUE
  Software testing resource allocation algorithm for dynamic changes in architecture
    Journal of Computer Applications   2023 Vol.43 (7): 2261-2270 [Abstract] (238) [HTML 1 KB] [PDF 1050 KB] (80)
2155 Jing ZHOU, Yiyu HU, Chengyu HU, Tianjiang WANG
  Weakly perceived object detection method based on point cloud completion and multi-resolution Transformer
    Journal of Computer Applications   2023 Vol.43 (7): 2155-2165 [Abstract] (302) [HTML 1 KB] [PDF 3409 KB] (163)
3018 Changhong LIU, Sheng ZENG, Bin ZHANG, Yong CHEN
  Cross-modal tensor fusion network based on semantic relation graph for image-text retrieval
    Journal of Computer Applications   2022 Vol.42 (10): 3018-3024 [Abstract] (373) [HTML 0 KB] [PDF 2407 KB] (187)
1109 Peng LI, Shilin WANG, Guangwu CHEN, Guanghui YAN
  Key node mining in complex network based on improved local structural entropy
    Journal of Computer Applications   2023 Vol.43 (4): 1109-1114 [Abstract] (607) [HTML 1 KB] [PDF 1367 KB] (280)
1855 Lianpeng QIU, Chengyun SONG
  Noise robust dynamic time warping algorithm
    Journal of Computer Applications   2023 Vol.43 (6): 1855-1860 [Abstract] (292) [HTML 1 KB] [PDF 3337 KB] (92)
2182 Jiaming HE, Jucheng YANG, Chao WU, Xiaoning YAN, Nenghua XU
  Person re-identification method based on multi-modal graph convolutional neural network
    Journal of Computer Applications   2023 Vol.43 (7): 2182-2189 [Abstract] (476) [HTML 1 KB] [PDF 1887 KB] (303)
1719 Nannan SUN, Chunhui PIAO, Xinna MA
  Group buying recommendation method based on social relationship and time-series information
    Journal of Computer Applications   2023 Vol.43 (6): 1719-1729 [Abstract] (312) [HTML 1 KB] [PDF 3041 KB] (149)
1736 Wenju LI, Mengying LI, Liu CUI, Wanghui CHU, Yi ZHANG, Hui GAO
  Monocular depth estimation method based on pyramid split attention network
    Journal of Computer Applications   2023 Vol.43 (6): 1736-1742 [Abstract] (323) [HTML 1 KB] [PDF 2767 KB] (156)
2295 Yiyu GUO, Luoyu ZHOU, Xinyu LIU, Yao LI
  Dangerous goods detection method in elevator scene based on improved attention mechanism
    Journal of Computer Applications   2023 Vol.43 (7): 2295-2302 [Abstract] (286) [HTML 1 KB] [PDF 5447 KB] (182)
1438 Jingsheng LEI, Kaijun LA, Shengying YANG, Yi WU
  Joint entity and relation extraction based on contextual semantic enhancement
    Journal of Computer Applications   2023 Vol.43 (5): 1438-1444 [Abstract] (490) [HTML 1 KB] [PDF 1612 KB] (292)
2358 Yuan LIU, Yongquan DONG, Rui JIA, Haolin YANG
  Hierarchical and phased attention network model for personalized course recommendation
    Journal of Computer Applications   2023 Vol.43 (8): 2358-2363 [Abstract] (293) [HTML 1 KB] [PDF 979 KB] (213)
37 LIU Huan, DOU Quansheng
  Aspect-based sentiment analysis model embedding different neighborhood representations
    Journal of Computer Applications   2023 Vol.43 (1): 37-44 [Abstract] (395) [HTML 1 KB] [PDF 1680 KB] (121)
0
  Explainable Recommendation Mechanism based on collaborative knowledge graph and counterfactuals
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (175) [HTML 0 KB] [PDF 0 KB] (5)
0
  OmegaDB, A Relational Operator Concurrent Computing Framework for Heterogeneous Architectures
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (195) [HTML 0 KB] [PDF 0 KB] (16)
2010 Menglin HUANG, Lei DUAN, Yuanhao ZHANG, Peiyan WANG, Renhao LI
  Prompt learning based unsupervised relation extraction model
    Journal of Computer Applications   2023 Vol.43 (7): 2010-2016 [Abstract] (654) [HTML 1 KB] [PDF 1353 KB] (279)
0
  Dictionary Partition Vector Space Model for Encrypted Ranked Search in the Cloud
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (90) [HTML 0 KB] [PDF 0 KB] (7)
1979 Yi ZHANG, Zhenmei WANG
  circRNA-disease association prediction by two-stage fusion on graph auto-encoder
    Journal of Computer Applications   2023 Vol.43 (6): 1979-1986 [Abstract] (366) [HTML 1 KB] [PDF 1805 KB] (112)
0
  Differential privacy generative adversarial network algorithm for dynamic gradient threshold clipping
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (529) [HTML 0 KB] [PDF 0 KB] (18)
0
  Parallel Calculation Method of Betweenness Centrality for Dynamic Networks
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (94) [HTML 0 KB] [PDF 0 KB] (5)
0
  Wireless Traffic Prediction Based on Federated Learning
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (151) [HTML 0 KB] [PDF 0 KB] (7)
2311 Yuanyuan QIN, Hong ZHANG
  Pulmonary nodule detection algorithm based on attention feature pyramid networks
    Journal of Computer Applications   2023 Vol.43 (7): 2311-2318 [Abstract] (333) [HTML 1 KB] [PDF 2687 KB] (173)
2226 Erchao LI, Yanli CHENG
  Dynamic multi-objective optimization algorithm based on weight vector clustering
    Journal of Computer Applications   2023 Vol.43 (7): 2226-2236 [Abstract] (232) [HTML 1 KB] [PDF 3030 KB] (85)
2288 Anyang LIU, Huaici ZHAO, Wenlong CAI, Zechao XU, Ruideng XIE
  Adaptive image deblurring generative adversarial network algorithm based on active discrimination mechanism
    Journal of Computer Applications   2023 Vol.43 (7): 2288-2294 [Abstract] (251) [HTML 1 KB] [PDF 2675 KB] (156)
2125 Yi ZHANG, Gangsheng CAI, Zhenmei WANG
  Long non-coding RNA-disease association prediction model based on semantic and global dual attention mechanism
    Journal of Computer Applications   2023 Vol.43 (7): 2125-2132 [Abstract] (343) [HTML 1 KB] [PDF 781 KB] (171)
1705 Zhongping ZHANG, Xin GUO, Yuting ZHANG, Ruibo ZHANG
  Outlier detection algorithm based on hologram stationary distribution factor
    Journal of Computer Applications   2023 Vol.43 (6): 1705-1712 [Abstract] (221) [HTML 1 KB] [PDF 3993 KB] (131)
2116 Yuxin TUO, Tao XUE
  Joint triple extraction model combining pointer network and relational embedding
    Journal of Computer Applications   2023 Vol.43 (7): 2116-2124 [Abstract] (438) [HTML 1 KB] [PDF 1576 KB] (136)
2868 Bo WANG, Hao WANG, Xiaoxin DU, Xiaodong ZHENG, Wei ZHOU
  Hybrid dragonfly algorithm based on subpopulation and differential evolution
    Journal of Computer Applications   2023 Vol.43 (9): 2868-2876 [Abstract] (262) [HTML 1 KB] [PDF 2338 KB] (156)
1768 Yao LIU, Xin TONG, Yifeng CHEN
  Algorithm path self-assembling model for business requirements
    Journal of Computer Applications   2023 Vol.43 (6): 1768-1778 [Abstract] (251) [HTML 1 KB] [PDF 1992 KB] (69)
2237 Meiying CHENG, Qian QIAN, Weiqing XIONG
  Symbiotic organisms search algorithm for information transfer multi-task optimization
    Journal of Computer Applications   2023 Vol.43 (7): 2237-2247 [Abstract] (226) [HTML 1 KB] [PDF 3862 KB] (77)
1687 Jing QIN, Xueqian MA, Fujie GAO, Changqing JI, Zumin WANG
  Survey of Parkinson’s disease auxiliary diagnosis methods based on gait analysis
    Journal of Computer Applications   2023 Vol.43 (6): 1687-1695 [Abstract] (514) [HTML 1 KB] [PDF 2009 KB] (318)
2462 Dongdong LIN, Manman LI, Shaozhen CHEN
  Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers
    Journal of Computer Applications   2023 Vol.43 (8): 2462-2470 [Abstract] (269) [HTML 1 KB] [PDF 2057 KB] (168)
2943 Chuan ZHAO, Luyao LI, Haoxiong YANG, Min ZUO
  Optimization model of inventory system under stochastic disturbance based on active disturbance rejection control
    Journal of Computer Applications   2022 Vol.42 (9): 2943-2951 [Abstract] (276) [HTML 0 KB] [PDF 3630 KB] (60)
2909 Hanqing LIU, Xiaodong KANG, Fuqing ZHANG, Xiuyuan ZHAO, Jingyi YANG, Xiaotian WANG, Mengfan LI
  Image detection algorithm of cerebral arterial stenosis by improved Libra region-convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (9): 2909-2916 [Abstract] (338) [HTML 0 KB] [PDF 5263 KB] (186)
2693 Guanyou XU, Weisen FENG
  Python named entity recognition model based on transformer
    Journal of Computer Applications   2022 Vol.42 (9): 2693-2700 [Abstract] (516) [HTML 0 KB] [PDF 1723 KB] (212)
2686 Xudong HOU, Fei TENG, Yi ZHANG
  Medical named entity recognition model based on deep auto-encoding
    Journal of Computer Applications   2022 Vol.42 (9): 2686-2692 [Abstract] (261) [HTML 0 KB] [PDF 979 KB] (114)
706 Yu WANG, Yubo YUAN, Yi GUO, Jiajie ZHANG
  Sentiment boosting model for emotion recognition in conversation text
    Journal of Computer Applications   2023 Vol.43 (3): 706-712 [Abstract] (694) [HTML 1 KB] [PDF 1123 KB] (371)
1606 Yang LIU, Zhiyang LU, Jun WANG, Jun SHI
  Gibbs artifact removal algorithm for magnetic resonance imaging based on self-attention connection UNet
    Journal of Computer Applications   2023 Vol.43 (5): 1606-1611 [Abstract] (457) [HTML 1 KB] [PDF 1363 KB] (194)
930 Haifeng LI, Fan ZHANG, Minnan PIAO, Huaichao WANG, Nansha LI, Zhongcheng GUI
  Automatic detection of targets under airport pavement based on channel and spatial attention
    Journal of Computer Applications   2023 Vol.43 (3): 930-935 [Abstract] (349) [HTML 1 KB] [PDF 1874 KB] (152)
949 Tian CHEN, Jianyong LU, Jun LIU, Huaguo LIANG, Yingchun LU
  Reconfigurable test scheme for 3D stacked integrated circuits based on 3D linear feedback shift register
    Journal of Computer Applications   2023 Vol.43 (3): 949-955 [Abstract] (276) [HTML 1 KB] [PDF 2075 KB] (105)
736 Tao PENG, Yalong KANG, Feng YU, Zili ZHANG, Junping LIU, Xinrong HU, Ruhan HE, Li LI
  Pedestrian trajectory prediction based on multi-head soft attention graph convolutional network
    Journal of Computer Applications   2023 Vol.43 (3): 736-743 [Abstract] (434) [HTML 1 KB] [PDF 5673 KB] (209)
943 You YANG, Ruhui ZHANG, Pengcheng XU, Kang KANG, Hao ZHAI
  Improved U-Net for seal segmentation of Republican archives
    Journal of Computer Applications   2023 Vol.43 (3): 943-948 [Abstract] (350) [HTML 1 KB] [PDF 1722 KB] (119)
1220 Tianzouzi XIAO, Xiaobo ZHOU, Xin LUO, Qipeng TANG
  Robust RGB-D SLAM system incorporating instance segmentation and clustering in dynamic environment
    Journal of Computer Applications   2023 Vol.43 (4): 1220-1225 [Abstract] (300) [HTML 1 KB] [PDF 2537 KB] (158)
1255 Qingyu JIA, Liang CHANG, Xianyi YANG, Baohua QIANG, Shihao ZHANG, Wu XIE, Minghao YANG
  Real-time reconstruction method of visual information for manipulator operation
    Journal of Computer Applications   2023 Vol.43 (4): 1255-1260 [Abstract] (361) [HTML 1 KB] [PDF 2136 KB] (225)
1297 Lu CHEN, Daoxi CHEN, Yiming LU, Weizhong LU
  Handwritten mathematical expression recognition model based on attention mechanism and encoder-decoder
    Journal of Computer Applications   2023 Vol.43 (4): 1297-1302 [Abstract] (528) [HTML 1 KB] [PDF 1695 KB] (253)
1115 Caiqian BAO, Jianmin XU, Guofang ZHANG
  Extended belief network recommendation model based on user dynamic interaction behavior
    Journal of Computer Applications   2023 Vol.43 (4): 1115-1121 [Abstract] (262) [HTML 1 KB] [PDF 1378 KB] (72)
1261 Xiaoyu FAN, Suzhen LIN, Yanbo WANG, Feng LIU, Dawei LI
  Reconstruction algorithm for highly undersampled magnetic resonance images based on residual graph convolutional neural network
    Journal of Computer Applications   2023 Vol.43 (4): 1261-1268 [Abstract] (398) [HTML 1 KB] [PDF 2569 KB] (152)
0
  Stacking algorithm based on dynamic clustering and its application
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (114) [HTML 1 KB] [PDF 888 KB] (64)
1676 Zhihui GAO, Meng HAN, Shujuan LIU, Ang LI, Dongliang MU
  Survey of high utility itemset mining methods based on intelligent optimization algorithm
    Journal of Computer Applications   2023 Vol.43 (6): 1676-1686 [Abstract] (424) [HTML 1 KB] [PDF 1951 KB] (249)
1461 Senqi YANG, Xuliang DUAN, Zhan XIAO, Songsong LANG, Zhiyong LI
  Text classification of agricultural news based on ERNIE+DPCNN+BiGRU
    Journal of Computer Applications   2023 Vol.43 (5): 1461-1466 [Abstract] (500) [HTML 1 KB] [PDF 1813 KB] (335)
0
 

Global image caption method based on graph attention network

    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (210) [HTML 1 KB] [PDF 590 KB] (91)
2440 Jian ZHANG, Peiyuan CHENG, Siyu SHAO
  Rotary machine fault diagnosis based on improved residual convolutional auto-encoding network and class adaptation
    Journal of Computer Applications   2022 Vol.42 (8): 2440-2449 [Abstract] (297) [HTML 0 KB] [PDF 1320 KB] (76)
2401 Nanjiang CHENG, Zhenxia YU, Lin CHEN, Hezhe QIAO
  Multi-source and multi-label pedestrian attribute recognition based on domain adaptation
    Journal of Computer Applications   2022 Vol.42 (8): 2401-2406 [Abstract] (366) [HTML 0 KB] [PDF 658 KB] (168)
2394 Xianjie ZHANG, Zhiming ZHANG
  Handwritten English text recognition based on convolutional neural network and Transformer
    Journal of Computer Applications   2022 Vol.42 (8): 2394-2400 [Abstract] (642) [HTML 0 KB] [PDF 703 KB] (349)
2386 Xiaoyu CHEN, Wei WANG
  Semantic extraction of domain-dependent mathematical text
    Journal of Computer Applications   2022 Vol.42 (8): 2386-2393 [Abstract] (257) [HTML 0 KB] [PDF 791 KB] (56)
356 Qingtang LIU, Xinqian MA, Jie ZHOU, Linjing WU, Pengxiao ZHOU
  Understanding of math word problems integrating commonsense knowledge base and grammatical features
    Journal of Computer Applications   2023 Vol.43 (2): 356-364 [Abstract] (383) [HTML 1 KB] [PDF 1525 KB] (113)
51 SHEN Zhijun, MU Lina, GAO Jing, SHI Yuanhang, LIU Zhiqiang
  Review of fine-grained image categorization
    Journal of Computer Applications   2023 Vol.43 (1): 51-60 [Abstract] (1178) [HTML 1 KB] [PDF 2674 KB] (688)
1534 Jihui LIU, Chengwan HE
  Online detection of SQL injection attacks based on ECA rules and dynamic taint analysis
    Journal of Computer Applications   2023 Vol.43 (5): 1534-1542 [Abstract] (423) [HTML 1 KB] [PDF 2389 KB] (251)
1401 Bin WANG, Tian XIANG, Yidong LYU, Xiaofan WANG
  Adaptive multi-scale feature channel grouping optimization algorithm based on NSGA‑Ⅱ
    Journal of Computer Applications   2023 Vol.43 (5): 1401-1408 [Abstract] (287) [HTML 1 KB] [PDF 3248 KB] (154)
1511 Kejun JIN, Hongtao YU, Yiteng WU, Shaomei LI, Jianpeng ZHANG, Honghao ZHENG
  Improved defense method for graph convolutional network based on singular value decomposition
    Journal of Computer Applications   2023 Vol.43 (5): 1511-1517 [Abstract] (330) [HTML 1 KB] [PDF 760 KB] (156)
1584 Liyao FU, Mengxiao YIN, Feng YANG
  Transformer based U-shaped medical image segmentation network: a survey
    Journal of Computer Applications   2023 Vol.43 (5): 1584-1595 [Abstract] (1654) [HTML 1 KB] [PDF 1887 KB] (1176)
2239 Yuanliang XUE, Guodong JIN, Lining TAN, Jiankun XU
  Pixel classification-based multiscale UAV aerial object rotational tracking algorithm
    Journal of Computer Applications   2022 Vol.42 (7): 2239-2247 [Abstract] (357) [HTML 0 KB] [PDF 4732 KB] (69)
2118 Ning DONG, Xiaorong CHENG, Mingquan ZHANG
  Intrusion detection system with dynamic weight loss function based on internet of things platform
    Journal of Computer Applications   2022 Vol.42 (7): 2118-2124 [Abstract] (340) [HTML 0 KB] [PDF 1166 KB] (111)
2112 Chunming TANG, Yuqing CHEN, Zidi ZHANG
  Improved consensus algorithm based on binomial swap forest and HotStuff
    Journal of Computer Applications   2022 Vol.42 (7): 2112-2117 [Abstract] (408) [HTML 0 KB] [PDF 2344 KB] (114)
2104 Jie ZHANG, Shanshan XU, Lingyun YUAN
  Internet of things access control model based on blockchain and edge computing
    Journal of Computer Applications   2022 Vol.42 (7): 2104-2111 [Abstract] (487) [HTML 0 KB] [PDF 3421 KB] (170)
2094 Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN
  Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
    Journal of Computer Applications   2022 Vol.42 (7): 2094-2103 [Abstract] (423) [HTML 0 KB] [PDF 1632 KB] (151)
1993 Juan WANG, Xuliang YUAN, Minghu WU, Liquan GUO, Zishan LIU
  Real-time semantic segmentation method based on squeezing and refining network
    Journal of Computer Applications   2022 Vol.42 (7): 1993-2000 [Abstract] (377) [HTML 0 KB] [PDF 2950 KB] (139)
869 Qing YE, Xin SHI, Mengwei SUN, Jian ZHU
  Greedy synchronization topology algorithm based on formal concept analysis for traffic surveillance based sensor network
    Journal of Computer Applications   2023 Vol.43 (3): 869-875 [Abstract] (280) [HTML 1 KB] [PDF 1587 KB] (80)
909 Qiuyu ZHANG, Yukun WANG
  Speech classification model based on improved Inception network
    Journal of Computer Applications   2023 Vol.43 (3): 909-915 [Abstract] (407) [HTML 1 KB] [PDF 1970 KB] (121)
329 Xingbin LIAO, Xiaolin QIN, Siqi ZHANG, Yangge QIAN
  Review of interactive machine translation
    Journal of Computer Applications   2023 Vol.43 (2): 329-334 [Abstract] (835) [HTML 1 KB] [PDF 1870 KB] (540)
365 Jie HU, Xiaoxi CHEN, Yan ZHANG
  Answer selection model based on pooling and feature combination enhanced BERT
    Journal of Computer Applications   2023 Vol.43 (2): 365-373 [Abstract] (402) [HTML 1 KB] [PDF 1248 KB] (178)
0
  CCDM2022+250 Extraction of PM2.5Diffusion Characteristics Based on Candlestick Pattern Matching
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (111) [HTML 0 KB] [PDF 0 KB] (4)
0
  Research on user granularity-level personalized social text generation technology
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (92) [HTML 0 KB] [PDF 0 KB] (3)
0
  Virus propagation model and stability analysis of heterogeneous backup network
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (56) [HTML 0 KB] [PDF 0 KB] (4)
0
  A deep graph matching model via self-attention network
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (71) [HTML 0 KB] [PDF 0 KB] (3)
0
  Federated Learning with Personalized Differential Privacy
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (216) [HTML 0 KB] [PDF 0 KB] (5)
0
  Stock Movement Prediction with Dynamic and Hierarchical Macro Information of Market(CCDM2022+ 94)
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (94) [HTML 0 KB] [PDF 0 KB] (5)
0
  Discriminative multidimensional scaling for feature learning(CCDM2022+219)
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (76) [HTML 0 KB] [PDF 0 KB] (4)
0
  CCDM 2022+65: An improved capsule network based on multipath feature
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (83) [HTML 0 KB] [PDF 0 KB] (6)
1922 Yang LI, Long XU, Yanqiang LI, Shaopeng LI
  Smart contract-based access control architecture and verification for internet of things
    Journal of Computer Applications   2022 Vol.42 (6): 1922-1931 [Abstract] (424) [HTML 0 KB] [PDF 3580 KB] (190)
1898 Meng YU, Wentao HE, Xuchuan ZHOU, Mengtian CUI, Keqi WU, Wenjie ZHOU
  Review of recommendation system
    Journal of Computer Applications   2022 Vol.42 (6): 1898-1913 [Abstract] (2109) [HTML 0 KB] [PDF 3152 KB] (1747)
1876 Guangkai LIAO, Zheng ZHANG, Zhiguo SONG
  Convolutional network-based vehicle re-identification combining wavelet features and attention mechanism
    Journal of Computer Applications   2022 Vol.42 (6): 1876-1883 [Abstract] (376) [HTML 0 KB] [PDF 2250 KB] (108)
1869 Lei YANG, Hongdong ZHAO, Kuaikuai YU
  End-to-end speech emotion recognition based on multi-head attention
    Journal of Computer Applications   2022 Vol.42 (6): 1869-1875 [Abstract] (402) [HTML 0 KB] [PDF 2133 KB] (171)
1862 Yumin HAN, Xiaoyan HAO
  Material entity recognition based on subword embedding and relative attention
    Journal of Computer Applications   2022 Vol.42 (6): 1862-1868 [Abstract] (291) [HTML 0 KB] [PDF 1612 KB] (99)
1844 Weikang ZHANG, Sheng LIU, Qian HUANG, Yuxin GUO
  Equilibrium optimizer considering distance factor and elite evolutionary strategy
    Journal of Computer Applications   2022 Vol.42 (6): 1844-1851 [Abstract] (291) [HTML 0 KB] [PDF 1083 KB] (82)
1504 Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG
  Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model
    Journal of Computer Applications   2023 Vol.43 (5): 1504-1510 [Abstract] (303) [HTML 1 KB] [PDF 503 KB] (109)
111 MA Yongqiang, CHEN Xiaomeng, YU Ziqiang
  Range query algorithm for large scale moving objects in distributed environment
    Journal of Computer Applications   2023 Vol.43 (1): 111-121 [Abstract] (290) [HTML 1 KB] [PDF 3320 KB] (68)
250 WANG Youxin, CHEN Bin
  Print defect detection method based on deep comparison network
    Journal of Computer Applications   2023 Vol.43 (1): 250-258 [Abstract] (599) [HTML 1 KB] [PDF 2660 KB] (454)
903 Kai LUO, Liang CHEN, Wei LIANG, Yongqiang CHEN
  Sparse representation-based reconstruction algorithm for filtered back-projection ultrasound tomography
    Journal of Computer Applications   2023 Vol.43 (3): 903-908 [Abstract] (311) [HTML 1 KB] [PDF 1939 KB] (105)
507 Qing JIA, Laihua WANG, Weisheng WANG
  Anomaly detection in video via independently recurrent neural network and variational autoencoder network
    Journal of Computer Applications   2023 Vol.43 (2): 507-513 [Abstract] (379) [HTML 1 KB] [PDF 2994 KB] (133)
374 Yang WANG, Hongliang FU, Huawei TAO, Jing YANG, Yue XIE, Li ZHAO
  Cross-corpus speech emotion recognition based on decision boundary optimized domain adaptation
    Journal of Computer Applications   2023 Vol.43 (2): 374-379 [Abstract] (387) [HTML 1 KB] [PDF 3084 KB] (212)
1616 Youzhi LI, Zhihua HU, Chun CHEN, Peibei YANG, Yajing DONG
  Prediction model of transaction pricing in internet freight transport platform based on combination of dual long short-term memory networks
    Journal of Computer Applications   2022 Vol.42 (5): 1616-1623 [Abstract] (328) [HTML 1 KB] [PDF 2220 KB] (113)
1563 Ye ZHANG, Rong LIU, Ming LIU, Ming CHEN
  Image super-resolution reconstruction network based on multi-channel attention mechanism
    Journal of Computer Applications   2022 Vol.42 (5): 1563-1569 [Abstract] (324) [HTML 1 KB] [PDF 3016 KB] (128)
1531 Xinyu GE, Shiping CHEN, Zhong LIU
  Real root isolation algorithm for exponential function polynomials
    Journal of Computer Applications   2022 Vol.42 (5): 1531-1537 [Abstract] (237) [HTML 1 KB] [PDF 503 KB] (51)
1431 Zhen QU, Kunting LI, Zhixi FENG
  Remote sensing image scene classification based on effective channel attention
    Journal of Computer Applications   2022 Vol.42 (5): 1431-1439 [Abstract] (399) [HTML 1 KB] [PDF 2678 KB] (154)
1391 Daili CHEN, Guoliang XU
  Cross-domain person re-identification method based on attention mechanism with learning intra-domain variance
    Journal of Computer Applications   2022 Vol.42 (5): 1391-1397 [Abstract] (394) [HTML 1 KB] [PDF 2210 KB] (293)
1367 Han MENG, Liang MA, Yong LIU
  Human learning optimization algorithm based on learning psychology
    Journal of Computer Applications   2022 Vol.42 (5): 1367-1374 [Abstract] (363) [HTML 1 KB] [PDF 1244 KB] (267)
1355 Lin SUN, Jing ZHAO, Jiucheng XU, Xinya WANG
  Feature selection algorithm based on neighborhood rough set and monarch butterfly optimization
    Journal of Computer Applications   2022 Vol.42 (5): 1355-1366 [Abstract] (364) [HTML 1 KB] [PDF 1375 KB] (102)
1347 Xueqin CHEN, Tao TAO, Zhongwang ZHANG, Yilei WANG
  Long short-term session-based recommendation algorithm combining paired coding scheme and two-dimensional conventional neural network
    Journal of Computer Applications   2022 Vol.42 (5): 1347-1354 [Abstract] (363) [HTML 1 KB] [PDF 1011 KB] (114)
1339 Li’e WANG, Xiaocong LI, Hongyi LIU
  News recommendation method with knowledge graph and differential privacy
    Journal of Computer Applications   2022 Vol.42 (5): 1339-1346 [Abstract] (453) [HTML 1 KB] [PDF 1421 KB] (183)
1330 Liqing QIU, Fushuai QU
  Emotional map of emergency based on sentiment analysis and influence evaluation
    Journal of Computer Applications   2022 Vol.42 (5): 1330-1338 [Abstract] (362) [HTML 1 KB] [PDF 3347 KB] (376)
1317 Xianfeng YANG, Jiahe ZHAO, Ziqiang LI
  Text classification model combining word annotations
    Journal of Computer Applications   2022 Vol.42 (5): 1317-1323 [Abstract] (384) [HTML 1 KB] [PDF 1662 KB] (309)
312 LIAO Fakang, ZHOU Yali, ZHANG Qizhi
  Walking control and stability analysis of flexible biped robot with variable length legs
    Journal of Computer Applications   2023 Vol.43 (1): 312-320 [Abstract] (341) [HTML 1 KB] [PDF 4678 KB] (105)
306 ZHENG Wanbo, CHEN Huimin, WU Yanqing, XIA Yunni
  Simulation of information sharing strategy based on emergency rescue
    Journal of Computer Applications   2023 Vol.43 (1): 306-311 [Abstract] (329) [HTML 1 KB] [PDF 1217 KB] (72)
728 Yingmao YAO, Xiaoyan JIANG
  Video-based person re-identification method based on graph convolution network and self-attention graph pooling
    Journal of Computer Applications   2023 Vol.43 (3): 728-735 [Abstract] (449) [HTML 1 KB] [PDF 2665 KB] (228)
608 Wenju LI, Gan ZHANG, Liu CUI, Wanghui CHU
  Lightweight traffic sign recognition model based on coordinate attention
    Journal of Computer Applications   2023 Vol.43 (2): 608-614 [Abstract] (502) [HTML 1 KB] [PDF 2351 KB] (265)
45 LIU Hui, MA Xiang, ZHANG Linyu, HE Rujin
  Aspect-based sentiment analysis model integrating match-LSTM network and grammatical distance
    Journal of Computer Applications   2023 Vol.43 (1): 45-50 [Abstract] (356) [HTML 1 KB] [PDF 1828 KB] (253)
154 NONG Qiang, ZHANG Bangbang, OUYANG Yuhao
  Lattice-based hierarchical certificateless proxy signature scheme
    Journal of Computer Applications   2023 Vol.43 (1): 154-159 [Abstract] (300) [HTML 1 KB] [PDF 749 KB] (151)
3527 Jiaju ZHANG, Huiping LIN
  Product and service quality analysis based on customer service dialogues
    Journal of Computer Applications   2022 Vol.42 (11): 3527-3533 [Abstract] (407) [HTML 1 KB] [PDF 2371 KB] (74)
467 Jie LIANG, Xiaoyan HAO, Yongle CHEN
  Poisoning attack toward visual classification model
    Journal of Computer Applications   2023 Vol.43 (2): 467-473 [Abstract] (570) [HTML 1 KB] [PDF 3264 KB] (256)
529 Ping WANG, Nan CHEN, Lei LU
  Fall detection algorithm based on scene prior and attention guidance
    Journal of Computer Applications   2023 Vol.43 (2): 529-535 [Abstract] (427) [HTML 1 KB] [PDF 1544 KB] (124)
413 Chunyong YIN, Ying LI
  Fast sanitization algorithm based on BCU-Tree and dictionary for high-utility mining
    Journal of Computer Applications   2023 Vol.43 (2): 413-422 [Abstract] (351) [HTML 1 KB] [PDF 2958 KB] (116)
209 SUN Yuan, SHEN Wenjian, NI Pengbo, MAO Min, XIE Yaqi, XU Chaonong
  Sink location algorithm of power domain nonorthogonal multiple access for real-time industrial internet of things
    Journal of Computer Applications   2023 Vol.43 (1): 209-214 [Abstract] (320) [HTML 1 KB] [PDF 2234 KB] (100)
1125 Teng TENG, Haiwei PAN, Kejia ZHANG, Xuelian MU, Ximing ZHANG, Weipeng CHEN
  Attention mechanism based Stack-CNN model to support Chinese medical questions and answers
    Journal of Computer Applications   2022 Vol.42 (4): 1125-1130 [Abstract] (522) [HTML 1 KB] [PDF 726 KB] (277)
1050 Shoulong JIAO, Youxiang DUAN, Qifeng SUN, Zihao ZHUANG, Chenhao SUN
  Knowledge representation learning method incorporating entity description information and neighbor node features
    Journal of Computer Applications   2022 Vol.42 (4): 1050-1056 [Abstract] (416) [HTML 0 KB] [PDF 671 KB] (194)
1011 Yingjie WANG, Jiuqi ZHU, Zumin WANG, Fengbo BAI, Jian GONG
  Review of applications of natural language processing in text sentiment analysis
    Journal of Computer Applications   2022 Vol.42 (4): 1011-1020 [Abstract] (2723) [HTML 0 KB] [PDF 783 KB] (1628)
3679 Zhijin LI, Hua LAI, Yonghua WEN, Shengxiang GAO
  Neural machine translation integrating bidirectional-dependency self-attention mechanism
    Journal of Computer Applications   2022 Vol.42 (12): 3679-3685 [Abstract] (334) [HTML 1 KB] [PDF 961 KB] (149)
521 Ranyan NI, Yi ZHANG
  Action recognition method based on video spatio-temporal features
    Journal of Computer Applications   2023 Vol.43 (2): 521-528 [Abstract] (411) [HTML 1 KB] [PDF 2494 KB] (121)
972 Jinyue LIU, Huiyu LI, Xiaohui JIA, Jiarui LI
  Dynamic gait recognition method based on human model constraints
    Journal of Computer Applications   2023 Vol.43 (3): 972-977 [Abstract] (399) [HTML 1 KB] [PDF 3439 KB] (167)
615 Chao GE, Yaxin ZHANG, Yue LIU, Hong WANG
  Non-fragile dissipative control scheme for event-triggered networked systems
    Journal of Computer Applications   2023 Vol.43 (2): 615-621 [Abstract] (332) [HTML 1 KB] [PDF 2029 KB] (66)
848 Weikang CHEN, Qiqing ZHAI, Youguo WANG
  Multivariate communication system based on discrete bidirectional associative memory neural network
    Journal of Computer Applications   2023 Vol.43 (3): 848-852 [Abstract] (262) [HTML 1 KB] [PDF 2244 KB] (69)
552 Guihui CHEN, Jinyu LIN, Yuehua LI, Zhongbing LI, Yuli WEI, Kai LU
  Multi-stage low-illuminance image enhancement network based on attention mechanism
    Journal of Computer Applications   2023 Vol.43 (2): 552-559 [Abstract] (375) [HTML 1 KB] [PDF 4056 KB] (176)
2593 Jiehang DENG, Wenquan GUO, Hanjie CHEN, Guosheng GU, Jingjian LIU, Yukun DU, Chao LIU, Xiaodong KANG, Jian ZHAO
  Few-shot diatom detection combining multi-scale multi-head self-attention and online hard example mining
    Journal of Computer Applications   2022 Vol.42 (8): 2593-2600 [Abstract] (442) [HTML 1 KB] [PDF 1490 KB] (132)
3831 Jingwei LEI, Peng YI, Xiang CHEN, Liang WANG, Ming MAO
  PDF document detection model based on system calls and data provenance
    Journal of Computer Applications   2022 Vol.42 (12): 3831-3840 [Abstract] (377) [HTML 1 KB] [PDF 3249 KB] (120)
3033 Yuhao ZHANG, Mengwen YUAN, Yujing LU, Rui YAN, Huajin TANG
  Neural network conversion method for dynamic event stream
    Journal of Computer Applications   2022 Vol.42 (10): 3033-3039 [Abstract] (483) [HTML 1 KB] [PDF 2014 KB] (234)
3011 Lanlan ZENG, Yisong WANG, Panfeng CHEN
  Named entity recognition based on BERT and joint learning for judgment documents
    Journal of Computer Applications   2022 Vol.42 (10): 3011-3017 [Abstract] (517) [HTML 1 KB] [PDF 1601 KB] (257)
3111 Hongqiao MA, Wenzhong YANG, Peng KANG, Jiankang YANG, Yuanshan LIU, Yue ZHOU
  Survey of named data networking
    Journal of Computer Applications   2022 Vol.42 (10): 3111-3123 [Abstract] (713) [HTML 1 KB] [PDF 2976 KB] (375)
3275 Jingyi QU, Liu YANG, Xuyang CHEN, Qian WANG
  Flight delay prediction model based on Conv-LSTM with spatiotemporal sequence
    Journal of Computer Applications   2022 Vol.42 (10): 3275-3282 [Abstract] (490) [HTML 1 KB] [PDF 3421 KB] (180)
0
  Cross-Modal Tensor Fusion Network based on Semantic Relation Graph for Image-Text Retrieval
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (235) [HTML 1 KB] [PDF 888 KB] (92)
3091 Dong ZHU, Xinchun YIN, Jianting NING
  Certificateless signature scheme with strong privacy protection for internet of vehicles
    Journal of Computer Applications   2022 Vol.42 (10): 3091-3101 [Abstract] (417) [HTML 1 KB] [PDF 1079 KB] (230)
0
  Empathy Prediction from Texts based on Transfer Learning
    Journal of Computer Applications    Vol. (): 0-0 [Abstract] (79) [HTML 0 KB] [PDF 0 KB] (5)
1814 Min WEN, Rongcun WANG, Shujuan JIANG
  Source code vulnerability detection based on relational graph convolution network
    Journal of Computer Applications   2022 Vol.42 (6): 1814-1821 [Abstract] (563) [HTML 1 KB] [PDF 1719 KB] (312)
1796 Hao LI, Yanping CHEN, Ruixue TANG, Ruizhang HUANG, Yongbin QIN, Guorong WANG, Xi TAN
  Relation extraction method based on entity boundary combination
    Journal of Computer Applications   2022 Vol.42 (6): 1796-1801 [Abstract] (322) [HTML 1 KB] [PDF 1005 KB] (99)
1776 Yu XIA, Junwu ZHU, Yi JIANG, Xin GAO, Maosheng SUN
  Cross-regional order allocation strategy for ride-hailing under tight transport capacity
    Journal of Computer Applications   2022 Vol.42 (6): 1776-1781 [Abstract] (481) [HTML 1 KB] [PDF 1163 KB] (69)
1116 Haifeng ZHANG, Cheng ZENG, Lie PAN, Rusong HAO, Chaodong WEN, Peng HE
  News topic text classification method based on BERT and feature projection network
    Journal of Computer Applications   2022 Vol.42 (4): 1116-1124 [Abstract] (713) [HTML 1 KB] [PDF 1536 KB] (366)
1253 Guifang QIAO, Shouming HOU, Yanyan LIU
  Facial expression recognition algorithm based on combination of improved convolutional neural network and support vector machine
    Journal of Computer Applications   2022 Vol.42 (4): 1253-1259 [Abstract] (518) [HTML 1 KB] [PDF 1504 KB] (254)
1044 Changqing JI, Zhiyong GAO, Jing QIN, Zumin WANG
  Review of image classification algorithms based on convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (4): 1044-1049 [Abstract] (2549) [HTML 1 KB] [PDF 605 KB] (1602)
1029 Jing QIN, Fali SUN, Fang HUI, Zumin WANG, Bing GAO, Changqing JI
  Review of key technology and application of wearable electroencephalogram device
    Journal of Computer Applications   2022 Vol.42 (4): 1029-1035 [Abstract] (856) [HTML 1 KB] [PDF 725 KB] (669)
962 Xianbojun FAN, Lijia CHEN, Shen LI, Chenlu WANG, Min WANG, Zan WANG, Mingguo LIU
  Robust joint modeling and optimization method for visual manipulators
    Journal of Computer Applications   2023 Vol.43 (3): 962-971 [Abstract] (329) [HTML 1 KB] [PDF 6333 KB] (214)
980 Xin LING, Minzheng LI
  Hybrid beamforming method with high spectral efficiency for unmanned aerial vehicle patrol system
    Journal of Computer Applications   2022 Vol.42 (3): 980-984 [Abstract] (246) [HTML 0 KB] [PDF 596 KB] (65)
968 Gong GAO, Hongyu YANG, Hong LIU
  Quality judgment of 3D face point cloud based on feature fusion
    Journal of Computer Applications   2022 Vol.42 (3): 968-973 [Abstract] (287) [HTML 0 KB] [PDF 861 KB] (80)
960 Cong HU, Gang HUA
  Weakly supervised action localization method based on attention mechanism
    Journal of Computer Applications   2022 Vol.42 (3): 960-967 [Abstract] (292) [HTML 0 KB] [PDF 573 KB] (77)
953 Dejian WEI, Wenming WANG, Quanyu WANG, Haopan REN, Yanyan GAO, Zhi WANG
  Improved 3D hand pose estimation network based on anchor
    Journal of Computer Applications   2022 Vol.42 (3): 953-959 [Abstract] (325) [HTML 0 KB] [PDF 659 KB] (107)
930 Leping LIN, Hongmin ZHOU, Ning OUYANG
  Compressed sensing image reconstruction method fusing spatial location and structure information
    Journal of Computer Applications   2022 Vol.42 (3): 930-937 [Abstract] (253) [HTML 0 KB] [PDF 2281 KB] (79)
911 Jingwen WU, Xinchun YIN, Jianting NING
  Revocable aggregate signature authentication scheme for vehicular ad hoc networks
    Journal of Computer Applications   2022 Vol.42 (3): 911-920 [Abstract] (342) [HTML 0 KB] [PDF 684 KB] (106)
904 An YANG, Qun JIANG, Gang SUN, Jie YIN, Ying LIU
  Power data analysis based on financial technical indicators
    Journal of Computer Applications   2022 Vol.42 (3): 904-910 [Abstract] (359) [HTML 0 KB] [PDF 785 KB] (105)
874 Fangxin NIE, Yujia WANG, Xin JIA
  Teaching and learning information interactive particle swarm optimization algorithm
    Journal of Computer Applications   2022 Vol.42 (3): 874-882 [Abstract] (353) [HTML 0 KB] [PDF 1395 KB] (95)
867 Zengzhen DU, Dongxin TANG, Dan XIE
  Method of generating rhetorical questions based on deep neural network in intelligent consultation
    Journal of Computer Applications   2022 Vol.42 (3): 867-873 [Abstract] (338) [HTML 0 KB] [PDF 758 KB] (171)
860 Qiujie SUN, Jinggui LIANG, Si LI
  Chinese grammatical error correction model based on bidirectional and auto-regressive transformers noiser
    Journal of Computer Applications   2022 Vol.42 (3): 860-866 [Abstract] (589) [HTML 0 KB] [PDF 625 KB] (286)
833 Wenqiu ZHU, Guang ZOU, Zhigao ZENG
  Object tracking algorithm with hierarchical features and hybrid attention
    Journal of Computer Applications   2022 Vol.42 (3): 833-843 [Abstract] (397) [HTML 0 KB] [PDF 9505 KB] (203)
804 Bin LIU, Gangqing LI, Chengquan AN, Shuigen WANG, Jiansheng WANG
  Infrared monocular ranging algorithm based on multiscale feature fusion
    Journal of Computer Applications   2022 Vol.42 (3): 804-809 [Abstract] (472) [HTML 0 KB] [PDF 1946 KB] (178)
713 Shuting XUAN, Jinglei LIU
  Clustering based on discrete hashing
    Journal of Computer Applications   2022 Vol.42 (3): 713-723 [Abstract] (318) [HTML 0 KB] [PDF 1072 KB] (145)
708 Renjie XU, Baodi LIU, Kai ZHANG, Weifeng LIU
  Model agnostic meta learning algorithm based on Bayesian weight function
    Journal of Computer Applications   2022 Vol.42 (3): 708-712 [Abstract] (435) [HTML 0 KB] [PDF 466 KB] (152)
3371 Bin ZHANG, Li WANG, Yanjie YANG
  Process tracking multi‑task rumor verification model combined with stance
    Journal of Computer Applications   2022 Vol.42 (11): 3371-3378 [Abstract] (275) [HTML 1 KB] [PDF 1420 KB] (101)
3003 Binhong XIE, Shuning LI, Yingjun ZHANG
  Fine-grained entity typing method based on hierarchy awareness
    Journal of Computer Applications   2022 Vol.42 (10): 3003-3010 [Abstract] (469) [HTML 1 KB] [PDF 1252 KB] (265)
343 Xiaomeng SHAO, Meng ZHANG
  Temporal convolutional knowledge tracing model with attention mechanism
    Journal of Computer Applications   2023 Vol.43 (2): 343-348 [Abstract] (1116) [HTML 1 KB] [PDF 2110 KB] (522)
2511 Yu SHEN, Hecheng LI, Lijuan CHEN
  Evolutionary algorithm based on approximation technique for solving bilevel programming problems
    Journal of Computer Applications   2022 Vol.42 (8): 2511-2518 [Abstract] (357) [HTML 1 KB] [PDF 701 KB] (99)
2617 Kuineng CHEN, Xiaofang YUAN
  Multi-objective hybrid evolutionary algorithm for solving open-shop scheduling problem with controllable processing time
    Journal of Computer Applications   2022 Vol.42 (8): 2617-2627 [Abstract] (325) [HTML 1 KB] [PDF 1515 KB] (141)
1979 Yuanlong WANG, Xiaomin LIU, Hu ZHANG
  Machine reading comprehension model based on event representation
    Journal of Computer Applications   2022 Vol.42 (7): 1979-1984 [Abstract] (469) [HTML 1 KB] [PDF 916 KB] (329)
2281 Houming FAN, Shuang MU, Lijun YUE
  Collaborative optimization of automated guided vehicle scheduling and path planning considering conflict and congestion
    Journal of Computer Applications   2022 Vol.42 (7): 2281-2291 [Abstract] (464) [HTML 1 KB] [PDF 4118 KB] (135)
2177 Rongli GAI, Shouchuan GAO, Mingxia LI
  Non-uniform rational B spline curve fitting of particle swarm optimization algorithm solving optimal control points
    Journal of Computer Applications   2022 Vol.42 (7): 2177-2183 [Abstract] (466) [HTML 1 KB] [PDF 3931 KB] (144)
2022 Liang ZHU, Hua XU, Jinhai CHENG, Shen ZHU
  Analysis and improvement of AdaBoost’s sample weight and combination coefficient
    Journal of Computer Applications   2022 Vol.42 (7): 2022-2029 [Abstract] (452) [HTML 1 KB] [PDF 1311 KB] (64)
1554 Li LI, Kexin SHI, Zhenkang REN
  Cross-project defect prediction method based on feature selection and TrAdaBoost
    Journal of Computer Applications   2022 Vol.42 (5): 1554-1562 [Abstract] (442) [HTML 1 KB] [PDF 2257 KB] (109)
2248 Wenjun FAN, Shuguang ZHAO, Lizheng GUO
  Ship detection algorithm based on improved RetinaNet
    Journal of Computer Applications   2022 Vol.42 (7): 2248-2255 [Abstract] (680) [HTML 1 KB] [PDF 4946 KB] (269)
2146 Hongqiu LUO, Shengbo HU
  Data naming mechanism of low earth orbit satellite mega-constellation for internet of things
    Journal of Computer Applications   2022 Vol.42 (7): 2146-2154 [Abstract] (450) [HTML 1 KB] [PDF 3015 KB] (79)
1516 Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU
  Cloud computing task scheduling based on orthogonal adaptive whale optimization
    Journal of Computer Applications   2022 Vol.42 (5): 1516-1523 [Abstract] (339) [HTML 1 KB] [PDF 1821 KB] (86)
3692 Yuqi DU, Jin ZHENG, Yang WANG, Cheng HUANG, Ping LI
  Text segmentation model based on graph convolutional network
    Journal of Computer Applications   2022 Vol.42 (12): 3692-3699 [Abstract] (492) [HTML 1 KB] [PDF 2746 KB] (227)
3506 Jialiang HAN, Yudong HAN, Xuanzhe LIU, Yaoshuai ZHAO, Di FENG
  Personalized recommendation service system based on cloud-client-convergence
    Journal of Computer Applications   2022 Vol.42 (11): 3506-3512 [Abstract] (418) [HTML 1 KB] [PDF 1160 KB] (99)
630 Jianqiang LIU, Yepin QU, Yuhai LYU
  Design of very short antipollution error correcting code based on global distance optimization
    Journal of Computer Applications   2023 Vol.43 (2): 630-635 [Abstract] (298) [HTML 1 KB] [PDF 1784 KB] (51)
3520 Jiaqi ZHANG, Yanchun SUN, Gang HUANG
  Recommendation service for API use cases based on open source community analysis
    Journal of Computer Applications   2022 Vol.42 (11): 3520-3526 [Abstract] (389) [HTML 1 KB] [PDF 1339 KB] (130)
0
  Three-dimensional human reconstruction model based on HRNet and GCN
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (180) [HTML 0 KB] [PDF 0 KB] (7)
3564 Xingquan CAI, Dingwei FENG, Tong WANG, Chen SUN, Haiyan SUN
  Violence detection in video based on temporal attention mechanism and EfficientNet
    Journal of Computer Applications   2022 Vol.42 (11): 3564-3572 [Abstract] (472) [HTML 1 KB] [PDF 2885 KB] (135)
2578 Chengxia XU, Qing YAN, Teng LI, Kaichao MIAO
  De-raining algorithm based on joint attention mechanism for single image
    Journal of Computer Applications   2022 Vol.42 (8): 2578-2585 [Abstract] (382) [HTML 1 KB] [PDF 1959 KB] (119)
1662 Jingling YUAN, Huihua MAO, Nana WANG, Yao XIANG
  Dynamic service deployment strategy in resource constrained mobile edge computing
    Journal of Computer Applications   2022 Vol.42 (6): 1662-1667 [Abstract] (486) [HTML 1 KB] [PDF 1940 KB] (194)
1748 Jiachen GUO, Yushen YANG, Yan WANG, Shilong MAO, Lijun SUN
  Refined short-term traffic flow prediction model and migration deployment scheme
    Journal of Computer Applications   2022 Vol.42 (6): 1748-1755 [Abstract] (411) [HTML 1 KB] [PDF 3372 KB] (59)
1756 Qingqing NIE, Dingsheng WAN, Yuelong ZHU, Zhijia LI, Cheng YAO
  Hydrological model based on temporal convolutional network
    Journal of Computer Applications   2022 Vol.42 (6): 1756-1761 [Abstract] (330) [HTML 1 KB] [PDF 2132 KB] (346)
1702 Shan SU, Yang ZHANG, Dongwen ZHANG
  Coupling related code smell detection method based on deep learning
    Journal of Computer Applications   2022 Vol.42 (6): 1702-1707 [Abstract] (399) [HTML 1 KB] [PDF 1071 KB] (136)
1762 Yingqi ZHANG, Dawei PENG, Sen LI, Ying SUN, Qiang NIU
  Lip language recognition algorithm based on single-tag radio frequency identification
    Journal of Computer Applications   2022 Vol.42 (6): 1762-1769 [Abstract] (362) [HTML 1 KB] [PDF 4019 KB] (107)
592 Wei LI, Yaochi FAN, Qiaoyong JIANG, Lei WANG, Qingzheng XU
  Variable convolutional autoencoder method based on teaching-learning-based optimization for medical image classification
    Journal of Computer Applications   2022 Vol.42 (2): 592-598 [Abstract] (356) [HTML 0 KB] [PDF 634 KB] (120)
457 Su GAO, Junzhong BAO, Xin WANG, Lidong WANG
  Interpretable ordered clustering method and its application analysis
    Journal of Computer Applications   2022 Vol.42 (2): 457-462 [Abstract] (349) [HTML 0 KB] [PDF 3370 KB] (116)
426 Yuxi LIU, Yuqi LIU, Zonglin ZHANG, Zhihua WEI, Ran MIAO
  News recommendation model with deep feature fusion injecting attention mechanism
    Journal of Computer Applications   2022 Vol.42 (2): 426-432 [Abstract] (651) [HTML 1 KB] [PDF 755 KB] (276)
357 Kun FU, Jinhui GAO, Xiaomeng ZHAO, Jianing LI
  Topology optimization based graph convolutional network combining with global structural information
    Journal of Computer Applications   2022 Vol.42 (2): 357-364 [Abstract] (570) [HTML 0 KB] [PDF 1079 KB] (327)
343 Yan LI, Jie GUO, Bin FAN
  Feature construction and preliminary analysis of uncertainty for meta-learning
    Journal of Computer Applications   2022 Vol.42 (2): 343-348 [Abstract] (527) [HTML 0 KB] [PDF 483 KB] (195)
0
  Anomaly detection method of distribution automation system based on double chain structure
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (114) [HTML 1 KB] [PDF 1570 KB] (36)
2361 Fei LUO, Mengwei BAI
  Decision optimization of traffic scenario problem based on reinforcement learning
    Journal of Computer Applications   2022 Vol.42 (8): 2361-2368 [Abstract] (601) [HTML 1 KB] [PDF 735 KB] (198)
2378 Xinyu ZHANG, Sheng DING, Zhipei YANG
  Traffic sign detection algorithm based on improved attention mechanism
    Journal of Computer Applications   2022 Vol.42 (8): 2378-2385 [Abstract] (549) [HTML 1 KB] [PDF 1664 KB] (282)
3354 Zhuoran LI, Zhonglin YE, Haixing ZHAO, Jingjing LIN
  Graph convolutional network method based on hybrid feature modeling
    Journal of Computer Applications   2022 Vol.42 (11): 3354-3363 [Abstract] (587) [HTML 1 KB] [PDF 3410 KB] (156)
3700 Jiana MENG, Pin LYU, Yuhai YU, Shichang SUN, Hongfei LIN
  Aspect-level cross-domain sentiment analysis based on capsule network
    Journal of Computer Applications   2022 Vol.42 (12): 3700-3707 [Abstract] (477) [HTML 1 KB] [PDF 1921 KB] (144)
3493 Peng LI, Zhuofeng ZHAO, Han LI
  Event‑driven dynamic collection method for microservice invocation link data
    Journal of Computer Applications   2022 Vol.42 (11): 3493-3499 [Abstract] (338) [HTML 1 KB] [PDF 2643 KB] (119)
2423 Liying ZHANG, Chunjiang PANG, Xinying WANG, Guoliang LI
  Multi-scale object detection algorithm based on improved YOLOv3
    Journal of Computer Applications   2022 Vol.42 (8): 2423-2431 [Abstract] (554) [HTML 1 KB] [PDF 1714 KB] (221)
2571 Huazhong JIN, Xiuyang ZHANG, Zhiwei YE, Wenqi ZHANG, Xiaoyu XIA
  Image denoising model based on approximate U-shaped network structure
    Journal of Computer Applications   2022 Vol.42 (8): 2571-2577 [Abstract] (438) [HTML 1 KB] [PDF 952 KB] (147)
2052 Bo LIU, Linbo QING, Zhengyong WANG, Mei LIU, Xue JIANG
  Group activity recognition based on partitioned attention mechanism and interactive position relationship
    Journal of Computer Applications   2022 Vol.42 (7): 2052-2057 [Abstract] (318) [HTML 1 KB] [PDF 2504 KB] (110)
2471 Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG
  Data management method for building internet of things based on Hashgraph
    Journal of Computer Applications   2022 Vol.42 (8): 2471-2480 [Abstract] (366) [HTML 1 KB] [PDF 1264 KB] (109)
2353 Zhenhu LYU, Xinzheng XU, Fangyan ZHANG
  Lightweight attention mechanism module based on squeeze and excitation
    Journal of Computer Applications   2022 Vol.42 (8): 2353-2360 [Abstract] (622) [HTML 1 KB] [PDF 1124 KB] (235)
3379 Xiayang SHI, Fengyuan ZHANG, Jiaqi YUAN, Min HUANG
  Detection of unsupervised offensive speech based on multilingual BERT
    Journal of Computer Applications   2022 Vol.42 (11): 3379-3385 [Abstract] (518) [HTML 1 KB] [PDF 1536 KB] (226)
3465 Chao LIN, Debiao HE, Xinyi HUANG
  Blockchain‑based electronic medical record secure sharing
    Journal of Computer Applications   2022 Vol.42 (11): 3465-3472 [Abstract] (582) [HTML 1 KB] [PDF 1451 KB] (197)
280 Lu ZHANG, Jiapeng LIU, Dongmei TIAN
  Application of Stacking-Bagging-Vote multi-source information fusion model for financial early warning
    Journal of Computer Applications   2022 Vol.42 (1): 280-286 [Abstract] (407) [HTML 0 KB] [PDF 948 KB] (132)
265 Huiqing XU, Bin CHEN, Jingfei WANG, Zhiyi CHEN, Jian QIN
  Elongated pavement distress detection method based on convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (1): 265-272 [Abstract] (400) [HTML 0 KB] [PDF 2146 KB] (181)
245 Hengxin LI, Kan CHANG, Yufei TAN, Mingyang LING, Tuanfa QIN
  Color image demosaicking network based on inter-channel correlation and enhanced information distillation
    Journal of Computer Applications   2022 Vol.42 (1): 245-251 [Abstract] (327) [HTML 0 KB] [PDF 1841 KB] (84)
191 Yu ZHANG, Chenglin LIU
  Average consensus tracking of multi-agent system with time-varying reference inputs
    Journal of Computer Applications   2022 Vol.42 (1): 191-197 [Abstract] (310) [HTML 0 KB] [PDF 812 KB] (49)
3170 Jingyun CHENG, Buhong WANG, Peng LUO
  Static code defect detection method based on deep semantic fusion
    Journal of Computer Applications   2022 Vol.42 (10): 3170-3176 [Abstract] (426) [HTML 1 KB] [PDF 2119 KB] (157)
2865 Wentao ZHANG, Yuanyu WANG, Saize LI
  Depth estimation model of single haze image based on conditional generative adversarial network
    Journal of Computer Applications   2022 Vol.42 (9): 2865-2875 [Abstract] (296) [HTML 1 KB] [PDF 7354 KB] (587)
3074 Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG
  Blockchain-based data frame security verification mechanism in software defined network
    Journal of Computer Applications   2022 Vol.42 (10): 3074-3083 [Abstract] (310) [HTML 1 KB] [PDF 2979 KB] (82)
3259 Yinping GAO, Daofang CHANG, Chun‑Hsien CHEN
  Optimization of automated stacking crane operation based on NSGA Ⅱ with dynamic rules in mixed stacking mode
    Journal of Computer Applications   2022 Vol.42 (10): 3259-3267 [Abstract] (291) [HTML 1 KB] [PDF 2428 KB] (65)
3300 Yu DU, Meng YAN, Xin WU
  Non-intrusive load identification algorithm based on convolutional neural network with upsampling pyramid structure
    Journal of Computer Applications   2022 Vol.42 (10): 3300-3306 [Abstract] (286) [HTML 1 KB] [PDF 3366 KB] (67)
2996 Jianqing LYU, Xianbing WANG, Gang CHEN, Hua ZHANG, Minggang WANG
  Chinese Text-to-SQL model for industrial production
    Journal of Computer Applications   2022 Vol.42 (10): 2996-3002 [Abstract] (655) [HTML 1 KB] [PDF 1886 KB] (265)
2858 Zanxia QIANG, Xianfu BAO
  Residual attention deraining network based on convolutional long short-term memory
    Journal of Computer Applications   2022 Vol.42 (9): 2858-2864 [Abstract] (370) [HTML 1 KB] [PDF 3598 KB] (155)
3084 Rongkang XI, Manchun CAI, Tianliang LU, Yanlin LI
  Tor website traffic analysis model based on self-attention mechanism and spatiotemporal features
    Journal of Computer Applications   2022 Vol.42 (10): 3084-3090 [Abstract] (501) [HTML 1 KB] [PDF 2633 KB] (188)
2936 Kaiwang ZHANG, Fei HUI, Guoxiang ZHANG, Qi SHI, Zhizhong LIU
  Car-following model of intelligent connected vehicles based on time-delayed velocity difference and velocity limit
    Journal of Computer Applications   2022 Vol.42 (9): 2936-2942 [Abstract] (285) [HTML 1 KB] [PDF 2663 KB] (87)
3200 Dawei LI, Zhiyong ZENG
  Cross-modal person re-identification model based on dynamic dual-attention mechanism
    Journal of Computer Applications   2022 Vol.42 (10): 3200-3208 [Abstract] (430) [HTML 1 KB] [PDF 1713 KB] (144)
3124 Anyi WANG, Heng ZHANG
  Multi-input multi-output intelligent receiver model based on multi-label classification algorithm
    Journal of Computer Applications   2022 Vol.42 (10): 3124-3129 [Abstract] (262) [HTML 1 KB] [PDF 2392 KB] (89)
3069 Geng ZHAO, Senmin ZHANG, Yingjie MA, Shirui GAO
  Design and analysis of dynamic S-box based on anti-degradation chaotic system
    Journal of Computer Applications   2022 Vol.42 (10): 3069-3073 [Abstract] (393) [HTML 1 KB] [PDF 3094 KB] (168)
2674 Hongjun HENG, Tianbao XU
  Attention sentiment analysis model based on multi-scale convolution and gating mechanism
    Journal of Computer Applications   2022 Vol.42 (9): 2674-2679 [Abstract] (563) [HTML 1 KB] [PDF 682 KB] (244)
2009 Cheng HUANG, Qianrui ZHAO
  Sensitive information detection method based on attention mechanism-based ELMo
    Journal of Computer Applications   2022 Vol.42 (7): 2009-2014 [Abstract] (861) [HTML 1 KB] [PDF 973 KB] (428)
3763 Yangyang SUN, Junping YAO, Xiaojun LI, Shouxiang FAN, Ziwei WANG
  Materialized view asynchronous incremental maintenance task generation under hybrid transaction/analytical processing for single record
    Journal of Computer Applications   2022 Vol.42 (12): 3763-3768 [Abstract] (373) [HTML 1 KB] [PDF 660 KB] (70)
3715 Kangzhe MA, Jiatian PI, Zhoubing XIONG, Jia LYU
  6D pose estimation incorporating attentional features for occluded objects
    Journal of Computer Applications   2022 Vol.42 (12): 3715-3722 [Abstract] (480) [HTML 1 KB] [PDF 2051 KB] (223)
3900 You YANG, Lizhi CHEN, Xiaolong FANG, Longyue PAN
  Image caption generation model with adaptive commonsense gate
    Journal of Computer Applications   2022 Vol.42 (12): 3900-3905 [Abstract] (323) [HTML 1 KB] [PDF 2101 KB] (108)
3708 Dan HE, Xiping HE, Yue LI, Rui YUAN, Yuanyuan NIU
  Face anti-spoofing method based on regional blocking and lightweight network
    Journal of Computer Applications   2022 Vol.42 (12): 3708-3714 [Abstract] (387) [HTML 1 KB] [PDF 1601 KB] (99)
98 CHEN Haiyan, JIA Mingming, ZHAO Wenli, WANG Chanfei
  Target detection of Ochotona curzoniae based on embedded Jetson TX2
    Journal of Computer Applications   2023 Vol.43 (1): 98-103 [Abstract] (378) [HTML 1 KB] [PDF 2996 KB] (117)
8 YUAN Lining, LIU Zhao
  Graph representation learning by autoencoder with one-shot aggregation
    Journal of Computer Applications   2023 Vol.43 (1): 8-14 [Abstract] (483) [HTML 1 KB] [PDF 2556 KB] (195)
3322 Yongjian QIAO, Xiaolin LIU, Liang BAI
  K‑nearest neighbor imputation subspace clustering algorithm for high‑dimensional data with feature missing
    Journal of Computer Applications   2022 Vol.42 (11): 3322-3329 [Abstract] (575) [HTML 1 KB] [PDF 1207 KB] (379)
3386 Longchao GONG, Junjun GUO, Zhengtao YU
  Neural machine translation method based on source language syntax enhanced decoding
    Journal of Computer Applications   2022 Vol.42 (11): 3386-3394 [Abstract] (373) [HTML 1 KB] [PDF 1267 KB] (171)
3404 Xin LI, Tao JIA
  Deep fusion model for predicting differential gene expression by histone modification data
    Journal of Computer Applications   2022 Vol.42 (11): 3404-3412 [Abstract] (313) [HTML 1 KB] [PDF 1734 KB] (170)
2072 Wanjun LIU, Jiaming WANG, Haicheng QU, Libing DONG, Xinyu CAO
  Music genre classification algorithm based on attention spectral-spatial feature
    Journal of Computer Applications   2022 Vol.42 (7): 2072-2077 [Abstract] (498) [HTML 1 KB] [PDF 2397 KB] (227)
3692 Zhisheng SHAO, Guofu ZHANG, Zhaopin SU, Lei LI
  Dynamic testing resource allocation algorithm based on software architecture and generalized differential evolution
    Journal of Computer Applications   2021 Vol.41 (12): 3692-3701 [Abstract] (372) [HTML 0 KB] [PDF 717 KB] (118)
3637 Bowen YAO, Biqing ZENG, Jian CAI, Meirong DING
  Chinese character relation extraction model based on pre-training and multi-level information
    Journal of Computer Applications   2021 Vol.41 (12): 3637-3644 [Abstract] (498) [HTML 0 KB] [PDF 822 KB] (248)
3632 Jihou WANG, Peiguang LIN, Jiaqian ZHOU, Qingtao LI, Yan ZHANG, Muwei JIAN
  Stock index forecasting method based on corporate financial statement data
    Journal of Computer Applications   2021 Vol.41 (12): 3632-3636 [Abstract] (414) [HTML 0 KB] [PDF 580 KB] (150)
3626 Xueying PENG, Yongquan JIANG, Yan YANG
  Transfer learning based on graph convolutional network in bearing service fault diagnosis
    Journal of Computer Applications   2021 Vol.41 (12): 3626-3631 [Abstract] (440) [HTML 0 KB] [PDF 561 KB] (490)
3614 Tengqi JI, Jun MENG, Siyuan ZHAO, Hehuan HU
  Prediction model of lncRNA-encoded short peptides based on representation learning and deep forest
    Journal of Computer Applications   2021 Vol.41 (12): 3614-3619 [Abstract] (309) [HTML 0 KB] [PDF 891 KB] (149)
3608 Hongliang CAO, Ying ZHANG, Bin WU, Fanyu LI, Xubo NA
  Prediction method of liver transplantation complications based on transfer component analysis and support vector machine
    Journal of Computer Applications   2021 Vol.41 (12): 3608-3613 [Abstract] (307) [HTML 0 KB] [PDF 699 KB] (94)
3602 Wanqing XU, Baodong WANG, Yimei HUANG, Jinping LI
  Smoking behavior detection algorithm based on human skeleton key points
    Journal of Computer Applications   2021 Vol.41 (12): 3602-3607 [Abstract] (611) [HTML 0 KB] [PDF 1345 KB] (358)
3551 Yate FENG, Yimin WEN
  Vietnamese scene text detection based on modified Mask R-CNN
    Journal of Computer Applications   2021 Vol.41 (12): 3551-3557 [Abstract] (331) [HTML 0 KB] [PDF 1209 KB] (115)
3485 Zenghui ZHANG, Gaoxia JIANG, Wenjian WANG
  Label noise filtering method based on dynamic probability sampling
    Journal of Computer Applications   2021 Vol.41 (12): 3485-3491 [Abstract] (301) [HTML 0 KB] [PDF 1379 KB] (200)
3480 Zilong LI, Yong ZHOU, Rong BAO, Hongdong WANG
  Deep distance metric learning method based on optimized triplet loss
    Journal of Computer Applications   2021 Vol.41 (12): 3480-3484 [Abstract] (388) [HTML 0 KB] [PDF 581 KB] (168)
3468 Haoyun LEI, Zenwen REN, Yanlong WANG, Shuang XUE, Haoran LI
  Multiple kernel clustering algorithm based on capped simplex projection graph tensor learning
    Journal of Computer Applications   2021 Vol.41 (12): 3468-3474 [Abstract] (534) [HTML 1 KB] [PDF 6316 KB] (148)
3455 Han DU, Xianzhong LONG, Yun LI
  Graph learning regularized discriminative non-negative matrix factorization based face recognition
    Journal of Computer Applications   2021 Vol.41 (12): 3455-3461 [Abstract] (452) [HTML 0 KB] [PDF 790 KB] (146)
3432 Huibo LI, Yunxiao ZHAO, Liang BAI
  Dynamic graph representation learning method based on deep neural network and gated recurrent unit
    Journal of Computer Applications   2021 Vol.41 (12): 3432-3437 [Abstract] (385) [HTML 0 KB] [PDF 869 KB] (245)
3419 Erchao LI, Yuyan MAO
  Constrained multi-objective evolutionary algorithm based on space shrinking technique
    Journal of Computer Applications   2021 Vol.41 (12): 3419-3425 [Abstract] (383) [HTML 0 KB] [PDF 979 KB] (190)
1308 Kunpeng LI, Pengcheng ZHANG, Hong SHANGGUAN, Yanling WANG, Jie YANG, Zhiguo GUI
  Time-frequency domain CT reconstruction algorithm based on convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (4): 1308-1316 [Abstract] (435) [HTML 1 KB] [PDF 3307 KB] (171)
3426 Zhaoxia DAI, Yudong CAO, Guangming ZHU, Peiyi SHEN, Xu XU, Lin MEI, Liang ZHANG
  Specific knowledge learning based on knowledge distillation
    Journal of Computer Applications   2021 Vol.41 (12): 3426-3431 [Abstract] (425) [HTML 1 KB] [PDF 648 KB] (201)
3337 Hao FU, Hegen XU, Zhiming ZHANG, Shaohua QI
  Visual simultaneous localization and mapping based on semantic and optical flow constraints in dynamic scenes
    Journal of Computer Applications   2021 Vol.41 (11): 3337-3344 [Abstract] (447) [HTML 1 KB] [PDF 2125 KB] (318)
3288 Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN
  Searchable encryption scheme based on splittable inverted index
    Journal of Computer Applications   2021 Vol.41 (11): 3288-3294 [Abstract] (456) [HTML 1 KB] [PDF 639 KB] (169)
3156 Zhichao LI, Tohti TURDI, Hamdulla ASKAR
  Answer selection model based on dynamic attention and multi-perspective matching
    Journal of Computer Applications   2021 Vol.41 (11): 3156-3163 [Abstract] (348) [HTML 1 KB] [PDF 599 KB] (129)
3139 Xujian ZHAO, Chongwei WANG
  Storyline extraction method from Weibo news based on graph convolutional network
    Journal of Computer Applications   2021 Vol.41 (11): 3139-3144 [Abstract] (499) [HTML 1 KB] [PDF 860 KB] (365)
825 Guangzhu XU, Wenjie LIN, Sha CHEN, Wan KUANG, Bangjun LEI, Jun ZHOU
  Fundus vessel segmentation method based on U-Net and pulse coupled neural network with adaptive threshold
    Journal of Computer Applications   2022 Vol.42 (3): 825-832 [Abstract] (414) [HTML 1 KB] [PDF 1357 KB] (189)
676 Qinghua LIU, Shizhong LIAO
  Online kernel regression based on random sketching method
    Journal of Computer Applications   2022 Vol.42 (3): 676-682 [Abstract] (322) [HTML 1 KB] [PDF 628 KB] (106)
724 Runze LI, Xuejiao SUN
  Data stream preference query based on extraction sequence according to temporal condition
    Journal of Computer Applications   2022 Vol.42 (3): 724-730 [Abstract] (306) [HTML 1 KB] [PDF 635 KB] (65)
797 Xiaojie LI, Chaoran CUI, Guangle SONG, Yaxi SU, Tianze WU, Chunyun ZHANG
  Stock trend prediction method based on temporal hypergraph convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (3): 797-803 [Abstract] (1544) [HTML 1 KB] [PDF 742 KB] (845)
757 Lu ZHANG, Chun FANG, Ming ZHU
  Indoor fall detection algorithm based on Res2Net-YOLACT and fusion feature
    Journal of Computer Applications   2022 Vol.42 (3): 757-763 [Abstract] (602) [HTML 1 KB] [PDF 1061 KB] (196)
404 Renzhi PAN, Fulan QIAN, Shu ZHAO, Yanping ZHANG
  Recommendation model for user attribute preference modeling based on convolutional neural network interaction
    Journal of Computer Applications   2022 Vol.42 (2): 404-411 [Abstract] (573) [HTML 1 KB] [PDF 633 KB] (258)
412 Zhonghui LIU, Ziyou WANG, Fan MIN
  Genetic algorithm for approximate concept generation and its recommendation application
    Journal of Computer Applications   2022 Vol.42 (2): 412-418 [Abstract] (425) [HTML 1 KB] [PDF 477 KB] (84)
449 Meng KANG, Zuqiang MENG
  Efficient attribute reduction algorithm based on local conditional discernibility
    Journal of Computer Applications   2022 Vol.42 (2): 449-456 [Abstract] (290) [HTML 1 KB] [PDF 635 KB] (61)
419 Jie MENG, Li WANG, Yanjie YANG, Biao LIAN
  Multi-modal deep fusion for false information detection
    Journal of Computer Applications   2022 Vol.42 (2): 419-425 [Abstract] (753) [HTML 1 KB] [PDF 1079 KB] (400)
0
  The Construction and Preliminary Analyses of Uncertainty Measures for Meta-Learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (119) [HTML 0 KB] [PDF 0 KB] (7)
140 Ziqi JING, Zhaonian ZOU
  Design and implementation of multi-version concurrency control on embedded database SQLite
    Journal of Computer Applications   2022 Vol.42 (1): 140-147 [Abstract] (557) [HTML 1 KB] [PDF 785 KB] (203)
2823 Yuyu MENG, Jing GUO
  Link prediction algorithm based on information entropy improved PCA model
    Journal of Computer Applications   2022 Vol.42 (9): 2823-2829 [Abstract] (295) [HTML 1 KB] [PDF 971 KB] (88)
1275 Haifeng LI, Bifan ZHAO, Jinyi HOU, Huaichao WANG, Zhongcheng GUI
  Automatic detection algorithm for underground target based on adaptive double threshold
    Journal of Computer Applications   2022 Vol.42 (4): 1275-1283 [Abstract] (352) [HTML 1 KB] [PDF 1999 KB] (136)
2960 Yuefeng LIU, Xiaoyan ZHANG, Wei GUO, Haodong BIAN, Yingjie HE
  Remaining useful life prediction method of aero-engine based on optimized hybrid model
    Journal of Computer Applications   2022 Vol.42 (9): 2960-2968 [Abstract] (334) [HTML 1 KB] [PDF 2754 KB] (217)
3070 LAI Zicheng, ZHANG Yuping, MA Yan
  Prediction of organic reaction based on gated graph convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (10): 3070-3074 [Abstract] (317) [HTML 1 KB] [PDF 1291 KB] (417)
3017 XIAO Qi, YIN Zengshan, GAO Shuang
  Extremely dim target search algorithm based on detection and tracking mutual iteration
    Journal of Computer Applications   2021 Vol.41 (10): 3017-3024 [Abstract] (364) [HTML 1 KB] [PDF 1788 KB] (432)
2979 PEI Yiyao, GUO Huiming, ZHANG Danpu, CHEN Wenbo
  Robust 3D object detection method based on localization uncertainty
    Journal of Computer Applications   2021 Vol.41 (10): 2979-2984 [Abstract] (420) [HTML 1 KB] [PDF 1259 KB] (326)
2959 TU Hongyan, ZHANG Ting, XIA Pengfei, DU Yi
  Reconstruction method for uncertain spatial information based on improved variational auto-encoder
    Journal of Computer Applications   2021 Vol.41 (10): 2959-2963 [Abstract] (314) [HTML 1 KB] [PDF 1274 KB] (296)
2820 YUAN Jingling, DING Yuanyuan, PAN Donghang, LI Lin
  Chinese implicit sentiment classification model based on sequence and contextual features
    Journal of Computer Applications   2021 Vol.41 (10): 2820-2828 [Abstract] (417) [HTML 1 KB] [PDF 839 KB] (458)
2058 Zhenyu WANG, Lei ZHANG, Wenbin GAO, Weiming QUAN
  Human activity recognition based on progressive neural architecture search
    Journal of Computer Applications   2022 Vol.42 (7): 2058-2064 [Abstract] (394) [HTML 1 KB] [PDF 1638 KB] (109)
1036 Zumin WANG, Zhihao ZHANG, Jing QIN, Changqing JI
  Review of mechanical fault diagnosis technology based on convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (4): 1036-1043 [Abstract] (776) [HTML 1 KB] [PDF 532 KB] (561)
2780 Wenting BI, Haitao LIN, Liqun ZHANG
  Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model
    Journal of Computer Applications   2022 Vol.42 (9): 2780-2787 [Abstract] (345) [HTML 1 KB] [PDF 2390 KB] (289)
2001 Yayao ZUO, Haoyu CHEN, Zhiran CHEN, Jiawei HONG, Kun CHEN
  Named entity recognition method combining multiple semantic features
    Journal of Computer Applications   2022 Vol.42 (7): 2001-2008 [Abstract] (586) [HTML 1 KB] [PDF 2326 KB] (276)
1194 Haojie CHEN, Jiangting FAN, Yong LIU
  Solving dynamic traveling salesman problem by deep reinforcement learning
    Journal of Computer Applications   2022 Vol.42 (4): 1194-1200 [Abstract] (735) [HTML 1 KB] [PDF 795 KB] (471)
2139 Linxiu SHA, Fan NIE, Qian GAO, Hao MENG
  Alternately optimizing algorithm based on Brownian movement and gradient information
    Journal of Computer Applications   2022 Vol.42 (7): 2139-2145 [Abstract] (361) [HTML 1 KB] [PDF 2126 KB] (141)
2333 Fengting ZHANG, Juhua YANG, Jinhui REN, Kun JIN
  Container throughput prediction based on optimal variational mode decomposition and kernel extreme learning machine
    Journal of Computer Applications   2022 Vol.42 (8): 2333-2342 [Abstract] (384) [HTML 1 KB] [PDF 1097 KB] (148)
1985 Heng CHEN, Siyi WANG, Zhengguang LI, Guanyu LI, Xin LIU
  Capsule network knowledge graph embedding model based on relational memory
    Journal of Computer Applications   2022 Vol.42 (7): 1985-1992 [Abstract] (444) [HTML 1 KB] [PDF 1243 KB] (237)
1191 Jian GAO, Zhi LI, Bin FAN, Chuanxian JIANG
  Efficient robust zero-watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moment
    Journal of Computer Applications   2023 Vol.43 (4): 1191-1197 [Abstract] (331) [HTML 1 KB] [PDF 2206 KB] (171)
1099 Haoran LUO, Qing YANG
  Sentiment analysis based on sentiment lexicon and stacked residual Bi-LSTM network
    Journal of Computer Applications   2022 Vol.42 (4): 1099-1107 [Abstract] (412) [HTML 1 KB] [PDF 887 KB] (417)
2800 Yuhang WANG, Yongxia ZHOU, Liangwu WU
  Pooling algorithm based on Gaussian function
    Journal of Computer Applications   2022 Vol.42 (9): 2800-2806 [Abstract] (358) [HTML 1 KB] [PDF 1518 KB] (125)
2680 Jie HU, Yan HU, Mengchi LIU, Yan ZHANG
  Chinese named entity recognition based on knowledge base entity enhanced BERT model
    Journal of Computer Applications   2022 Vol.42 (9): 2680-2685 [Abstract] (605) [HTML 1 KB] [PDF 1391 KB] (517)
2274 Haiqi WANG, Zhihai WANG, Liuke LI, Haoran KONG, Qiong WANG, Jianbo XU
  Spatial-temporal prediction model of urban short-term traffic flow based on grid division
    Journal of Computer Applications   2022 Vol.42 (7): 2274-2280 [Abstract] (558) [HTML 1 KB] [PDF 2906 KB] (451)
2201 Zhifeng ZHONG, Yifan XIA, Dongping ZHOU, Yangtian YAN
  Lightweight object detection algorithm based on improved YOLOv4
    Journal of Computer Applications   2022 Vol.42 (7): 2201-2209 [Abstract] (827) [HTML 1 KB] [PDF 5719 KB] (510)
999 Ni ZHANG, Meng HAN, Le WANG, Xiaojuan LI, Haodong CHENG
  Survey of high utility pattern mining methods based on positive and negative utility division
    Journal of Computer Applications   2022 Vol.42 (4): 999-1010 [Abstract] (408) [HTML 1 KB] [PDF 1254 KB] (379)
985 Bing XIA, Jianmin PANG, Xin ZHOU, Zheng SHAN
  Research progress on binary code similarity search
    Journal of Computer Applications   2022 Vol.42 (4): 985-998 [Abstract] (880) [HTML 1 KB] [PDF 841 KB] (1291)
1137 Le WANG, Meng HAN, Xiaojuan LI, Ni ZHANG, Haodong CHENG
  Ensemble classification algorithm based on dynamic weighting function
    Journal of Computer Applications   2022 Vol.42 (4): 1137-1147 [Abstract] (473) [HTML 1 KB] [PDF 838 KB] (106)
94 Zhihui SHAN, Meng HAN, Qiang HAN
  Survey of high utility pattern mining on dynamic data
    Journal of Computer Applications   2022 Vol.42 (1): 94-108 [Abstract] (361) [HTML 1 KB] [PDF 1668 KB] (402)
123 Xiaojuan LI, Meng HAN, Le WANG, Ni ZHENG, Haodong CHENG
  Dynamic weighted ensemble classification algorithm based on accuracy climbing
    Journal of Computer Applications   2022 Vol.42 (1): 123-131 [Abstract] (299) [HTML 1 KB] [PDF 992 KB] (83)
0
  Review of applications of natural language processing in sentiment analysis
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (483) [HTML 1 KB] [PDF 501 KB] (778)
9 Jijie ZHANG, Yan YANG, Yong LIU
  Adaptive deep graph convolution using initial residual and decoupling operations
    Journal of Computer Applications   2022 Vol.42 (1): 9-15 [Abstract] (542) [HTML 1 KB] [PDF 648 KB] (285)
162 Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG
  Nonlinear scrambling diffusion synchronization image encryption based on dynamic network
    Journal of Computer Applications   2022 Vol.42 (1): 162-170 [Abstract] (399) [HTML 1 KB] [PDF 3822 KB] (79)
1260 Zhihua LIU, Wenjie CHEN, Aibin CHEN
  Homologous spectrogram feature fusion with self-attention mechanism for bird sound classification
    Journal of Computer Applications   2022 Vol.42 (4): 1260-1268 [Abstract] (468) [HTML 1 KB] [PDF 1376 KB] (189)
1207 Yongfeng DONG, Yuehua SUN, Lichao GAO, Peng HAN, Haipeng JI
  Fault diagnosis method based on improved one-dimensional convolutional and bidirectional long short-term memory neural networks
    Journal of Computer Applications   2022 Vol.42 (4): 1207-1215 [Abstract] (627) [HTML 1 KB] [PDF 2185 KB] (430)
2192 Xiangyue TAN, Xiao HU, Jiaxin YANG, Junjiang XIANG
  Camouflaged object detection based on progressive feature enhancement aggregation
    Journal of Computer Applications   2022 Vol.42 (7): 2192-2200 [Abstract] (490) [HTML 1 KB] [PDF 2588 KB] (129)
0
  Multi-source and multi-label pedestrian attribute recognition based on domain adaptation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (235) [HTML 0 KB] [PDF 0 KB] (13)
3097 Gangzhu QIAO, Rui WANG, Chaoli SUN
  Improved high-dimensional many-objective evolutionary algorithm based on decomposition
    Journal of Computer Applications   2021 Vol.41 (11): 3097-3103 [Abstract] (665) [HTML 1 KB] [PDF 525 KB] (472)
3385 Yi DING, Cong WANG
  Ship stowage optimization centered on automated terminal
    Journal of Computer Applications   2021 Vol.41 (11): 3385-3393 [Abstract] (352) [HTML 1 KB] [PDF 694 KB] (161)
3302 Ying LEI, Wanbo ZHENG, Wei WEI, Yunni XIA, Xiaobo LI, Chengwu LIU, Hong XIE
  Task offloading method based on probabilistic performance awareness and evolutionary game strategy in “cloud + edge” hybrid environment
    Journal of Computer Applications   2021 Vol.41 (11): 3302-3308 [Abstract] (338) [HTML 1 KB] [PDF 1179 KB] (121)
2741 WANG Hebing, ZHANG Chunmei
  Facial landmark detection based on ResNeXt with asymmetric convolution and squeeze excitation
    Journal of Computer Applications   2021 Vol.41 (9): 2741-2747 [Abstract] (405) [HTML 1 KB] [PDF 2305 KB] (358)
2552 NIU Ruihua, YANG Jun, XING Lanxin, WU Renbiao
  Micro-expression recognition algorithm based on convolutional block attention module and dual path networks
    Journal of Computer Applications   2021 Vol.41 (9): 2552-2559 [Abstract] (578) [HTML 1 KB] [PDF 1663 KB] (818)
1108 Lie PAN, Cheng ZENG, Haifeng ZHANG, Chaodong WEN, Rusong HAO, Peng HE
  Text sentiment analysis method combining generalized autoregressive pre-training language model and recurrent convolutional neural network
    Journal of Computer Applications   2022 Vol.42 (4): 1108-1115 [Abstract] (470) [HTML 1 KB] [PDF 728 KB] (262)
0
  Smoking Behavior Detection Algorithm Based on Human Skeleton Keypoints
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (184) [HTML 0 KB] [PDF 0 KB] (10)
3362 Meng LI, Pinle QIN, Jianchao ZENG, Junbo LI
  Super-resolution and multi-view fusion based on magnetic resonance image inter-layer interpolation
    Journal of Computer Applications   2021 Vol.41 (11): 3362-3367 [Abstract] (364) [HTML 1 KB] [PDF 650 KB] (218)
3151 Yang ZHANG, Xiaoning WANG
  Text feature selection method based on Word2Vec word embedding and genetic algorithm for biomarker selection in high-dimensional omics
    Journal of Computer Applications   2021 Vol.41 (11): 3151-3155 [Abstract] (409) [HTML 1 KB] [PDF 673 KB] (122)
3251 Li LI, Hongfei YANG, Xiuze DONG
  Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
    Journal of Computer Applications   2021 Vol.41 (11): 3251-3256 [Abstract] (273) [HTML 1 KB] [PDF 490 KB] (181)
3219 Jianfang CAO, Minmin YAN, Yiming JIA, Xiaodong TIAN
  Application of Inception-v3 model integrated with transfer learning in dynasty identification of ancient murals
    Journal of Computer Applications   2021 Vol.41 (11): 3219-3227 [Abstract] (484) [HTML 1 KB] [PDF 1665 KB] (153)
3178 Junhua YAN, Ping HOU, Yin ZHANG, Xiangyang LYU, Yue MA, Gaofei WANG
  Multiply distortion type judgement method based on multi-scale and multi-classifier convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (11): 3178-3184 [Abstract] (396) [HTML 1 KB] [PDF 1034 KB] (119)
0
  CCML2021 240:Prediction method of liver transplantation complications based on transfer component analysis and support vector machines
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (106) [HTML 0 KB] [PDF 0 KB] (7)
3499 Xiancong CHEN, Weike PAN, Zhong MING
  Staged variational autoencoder for heterogeneous one-class collaborative filtering
    Journal of Computer Applications   2021 Vol.41 (12): 3499-3507 [Abstract] (376) [HTML 1 KB] [PDF 785 KB] (230)
3409 Keyang CHENG, Chunyun MENG, Wenshan WANG, Wenxi SHI, Yongzhao ZHAN
  Research advances in disentangled representation learning
    Journal of Computer Applications   2021 Vol.41 (12): 3409-3418 [Abstract] (1233) [HTML 1 KB] [PDF 877 KB] (572)
3475 Xuanyi LI, Yun ZHOU
  BNSL-FIM: Bayesian network structure learning algorithm based on frequent item mining
    Journal of Computer Applications   2021 Vol.41 (12): 3475-3479 [Abstract] (472) [HTML 1 KB] [PDF 542 KB] (122)
2187 LIU Fangming, ZHANG Hong
  Cross-modal retrieval algorithm based on multi-level semantic discriminative guided hashing
    Journal of Computer Applications   2021 Vol.41 (8): 2187-2192 [Abstract] (383) [HTML 1 KB] [PDF 1091 KB] (552)
87 Xiaopeng WANG, Yuanyuan SUN, Hongfei LIN
  Encoding-decoding relationship extraction model based on criminal Electra
    Journal of Computer Applications   2022 Vol.42 (1): 87-93 [Abstract] (343) [HTML 1 KB] [PDF 723 KB] (147)
574 Xueming LI, Guohao WU, Shangbo ZHOU, Xiaoran LIN, Hongbin XIE
  Image instance segmentation model based on fractional-order network and reinforcement learning
    Journal of Computer Applications   2022 Vol.42 (2): 574-583 [Abstract] (488) [HTML 1 KB] [PDF 2853 KB] (258)
2092 PEI Chunyang, FAN Kuangang, MA Zheng
  Medical image fusion based on edge-preserving decomposition and improved sparse representation
    Journal of Computer Applications   2021 Vol.41 (7): 2092-2099 [Abstract] (346) [HTML 1 KB] [PDF 4280 KB] (557)
1983 YANG Longhai, WANG Xueyuan, JIANG Hesong
  Blockchain digital signature scheme with improved SM2 signature method
    Journal of Computer Applications   2021 Vol.41 (7): 1983-1988 [Abstract] (523) [HTML 1 KB] [PDF 1080 KB] (549)
1857 ZHANG Yuanjun, ZHANG Xihuang
  Dynamic network representation learning model based on graph convolutional network and long short-term memory network
    Journal of Computer Applications   2021 Vol.41 (7): 1857-1864 [Abstract] (430) [HTML 1 KB] [PDF 1298 KB] (567)
1225 Hanguang LAI, Qing LI, Yong JIANG
  Transmission control protocol congestion control switching scheme based on scenario change
    Journal of Computer Applications   2022 Vol.42 (4): 1225-1234 [Abstract] (439) [HTML 1 KB] [PDF 1097 KB] (243)
3213 Lin SUN, Yubo YUAN
  Drowsiness recognition algorithm based on human eye state
    Journal of Computer Applications   2021 Vol.41 (11): 3213-3218 [Abstract] (594) [HTML 1 KB] [PDF 1688 KB] (417)
3089 ZHUO Yuxin, HAN Suya, ZHANG Yufeng, LI Zhiyao, DONG Yifeng
  Automatic segmentation method of microwave ablation region based on Nakagami parameters images of ultrasonic harmonic envelope
    Journal of Computer Applications   2021 Vol.41 (10): 3089-3096 [Abstract] (335) [HTML 1 KB] [PDF 4320 KB] (347)
2937 GAO Shiwei, ZHANG Changzhu, WANG Zhuping
  Lightweight real-time semantic segmentation algorithm based on separable pyramid
    Journal of Computer Applications   2021 Vol.41 (10): 2937-2944 [Abstract] (410) [HTML 1 KB] [PDF 2525 KB] (309)
310 Hongfei JIA, Xi LIU, Yu WANG, Hongbing XIAO, Suxia XING
  Application of 3DPCANet in image classification of functional magnetic resonance imaging for Alzheimer’s disease
    Journal of Computer Applications   2022 Vol.42 (1): 310-315 [Abstract] (380) [HTML 1 KB] [PDF 568 KB] (116)
71 Qiming RUAN, Yi GUO, Nan ZHENG, Yexiang WANG
  Customs declaration good classification algorithm based on hierarchical multi-task BERT
    Journal of Computer Applications   2022 Vol.42 (1): 71-77 [Abstract] (598) [HTML 1 KB] [PDF 697 KB] (240)
3010 ZHANG Kaiyue, ZHANG Hong
  Shipping monitoring image recognition model based on attention mechanism network
    Journal of Computer Applications   2021 Vol.41 (10): 3010-3016 [Abstract] (291) [HTML 1 KB] [PDF 1343 KB] (384)
2813 ZHU Simiao, Wei Shiwei, WEI Siheng, YU Dunhui
  Video recommendation algorithm based on danmaku sentiment analysis and topic model
    Journal of Computer Applications   2021 Vol.41 (10): 2813-2819 [Abstract] (524) [HTML 1 KB] [PDF 852 KB] (492)
3049 ZHENG Hongxing, ZHU Xutao, LI Zhenfei
  Optimization algorithm of ship dispatching in container terminals with two-way channel
    Journal of Computer Applications   2021 Vol.41 (10): 3049-3055 [Abstract] (386) [HTML 1 KB] [PDF 636 KB] (321)
2799 DONG Yongfeng, LIU Chao, WANG Liqin, LI Yingshuang
  Relationship reasoning method combining multi-hop relationship path information
    Journal of Computer Applications   2021 Vol.41 (10): 2799-2805 [Abstract] (391) [HTML 1 KB] [PDF 763 KB] (469)
2785 WANG Yahui, QIAN Yuhua, LIU Guoqing
  Ordinal decision tree algorithm based on fuzzy advantage complementary mutual information
    Journal of Computer Applications   2021 Vol.41 (10): 2785-2792 [Abstract] (463) [HTML 1 KB] [PDF 1344 KB] (568)
2842 YANG Lu, HE Mingxiang
  Chinese text sentiment analysis model based on gated mechanism and convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (10): 2842-2848 [Abstract] (433) [HTML 1 KB] [PDF 717 KB] (629)
2829 YANG Shuxin, ZHANG Nan
  Text sentiment analysis based on sentiment lexicon and context language model
    Journal of Computer Applications   2021 Vol.41 (10): 2829-2834 [Abstract] (366) [HTML 1 KB] [PDF 696 KB] (294)
2893 SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei
  Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing
    Journal of Computer Applications   2021 Vol.41 (10): 2893-2899 [Abstract] (703) [HTML 1 KB] [PDF 4865 KB] (499)
2952 HUANG Juting, GAO Hongli, DAI Zhikun
  Semantic segmentation method of power line on mobile terminals based on encoder-decoder structure
    Journal of Computer Applications   2021 Vol.41 (10): 2952-2958 [Abstract] (328) [HTML 1 KB] [PDF 1631 KB] (409)
2964 ZHANG Yanjiao, QIAO Zhiwei
  High-precision sparse reconstruction of CT images based on multiply residual UNet
    Journal of Computer Applications   2021 Vol.41 (10): 2964-2969 [Abstract] (476) [HTML 1 KB] [PDF 1075 KB] (627)
2324 ZENG Xiangyin, ZHENG Bochuan, LIU Dan
  Detection of left and right railway tracks based on deep convolutional neural network and clustering
    Journal of Computer Applications   2021 Vol.41 (8): 2324-2329 [Abstract] (410) [HTML 1 KB] [PDF 1502 KB] (532)
0
  Storyline extraction method from Weibo news based on graph convolutional network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (138) [HTML 0 KB] [PDF 0 KB] (7)
2623 XU Liyun, YAN Tao, QIAN Yuhua
  Audio encryption algorithm in fractional domain based on cascaded chaotic system
    Journal of Computer Applications   2021 Vol.41 (9): 2623-2630 [Abstract] (394) [HTML 1 KB] [PDF 2308 KB] (365)
1652 JIA Chengxun, LAI Hua, YU Zhengtao, WEN Yonghua, YU Zhiqiang
  Chinese-Vietnamese pseudo-parallel corpus generation based on monolingual language model
    Journal of Computer Applications   2021 Vol.41 (6): 1652-1658 [Abstract] (404) [HTML 1 KB] [PDF 1333 KB] (379)
1581 YIN Fei, LONG Lingli, KONG Zheng, SHAO Han, LI Xin, QIAN Zhuzhong
  Deployment method of dockers in cluster for dynamic workload
    Journal of Computer Applications   2021 Vol.41 (6): 1581-1588 [Abstract] (338) [HTML 1 KB] [PDF 981 KB] (426)
1589 ZHANG Mingming, LU Qingning, LI Wenzhong, SONG Hu
  Deep neural network compression algorithm based on combined dynamic pruning
    Journal of Computer Applications   2021 Vol.41 (6): 1589-1596 [Abstract] (407) [HTML 1 KB] [PDF 1131 KB] (392)
1557 LIU Shize, ZHU Yida, CHEN Runze, LUO Haiyong, ZHAO Fang, SUN Yi, WANG Baohui
  Traffic mode recognition algorithm based on residual temporal attention neural network
    Journal of Computer Applications   2021 Vol.41 (6): 1557-1565 [Abstract] (335) [HTML 1 KB] [PDF 1075 KB] (708)
109 Yongbo CHEN, Qiaoqin LI, Yongguo LIU
  Dynamic relevance based feature selection algorithm
    Journal of Computer Applications   2022 Vol.42 (1): 109-114 [Abstract] (390) [HTML 1 KB] [PDF 445 KB] (390)
0
  A Searchable Encryption Scheme Based on Splitting Inverted Index
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (174) [HTML 0 KB] [PDF 0 KB] (6)
3113 Wenxia LI, Linzhong LIU, Cunjie DAI, Yu LI
  Artificial bee colony algorithm based on multi-population combination strategy
    Journal of Computer Applications   2021 Vol.41 (11): 3113-3119 [Abstract] (477) [HTML 0 KB] [PDF 757 KB] (310)
631 Yaoming MA, Yu ZHANG
  Insulator detection algorithm based on improved Faster-RCNN
    Journal of Computer Applications   2022 Vol.42 (2): 631-637 [Abstract] (519) [HTML 1 KB] [PDF 1867 KB] (251)
584 Junbo LI, Pinle QIN, Jianchao ZENG, Meng LI
  CT three-dimensional reconstruction algorithm based on super-resolution network
    Journal of Computer Applications   2022 Vol.42 (2): 584-591 [Abstract] (581) [HTML 1 KB] [PDF 1088 KB] (524)
64 Yu PENG, Xiaoyu LI, Shijie HU, Xiaolei LIU, Weizhong QIAN
  Three-stage question answering model based on BERT
    Journal of Computer Applications   2022 Vol.42 (1): 64-70 [Abstract] (697) [HTML 1 KB] [PDF 918 KB] (506)
57 Xueqiang LYU, Chen PENG, Le ZHANG, Zhi’an DONG, Xindong YOU
  Text multi-label classification method incorporating BERT and label semantic attention
    Journal of Computer Applications   2022 Vol.42 (1): 57-63 [Abstract] (1531) [HTML 1 KB] [PDF 577 KB] (1354)
1514 NI Shuiping, LI Huifang
  Battery state-of-charge prediction method based on one-dimensional convolutional neural network combined with long short-term memory network
    Journal of Computer Applications   2021 Vol.41 (5): 1514-1521 [Abstract] (516) [HTML 1 KB] [PDF 2218 KB] (554)
1361 MA Jianhong, CAO Wenbin, LIU Yuangang, XIA Shuang
  Patent clustering method based on functional effect
    Journal of Computer Applications   2021 Vol.41 (5): 1361-1366 [Abstract] (351) [HTML 1 KB] [PDF 916 KB] (571)
557 Wei LI, Qunqun WU, Yiwen ZHANG
  Developer recommendation method based on E-CARGO model
    Journal of Computer Applications   2022 Vol.42 (2): 557-564 [Abstract] (489) [HTML 1 KB] [PDF 649 KB] (190)
3257 Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU
  Digital rights management scheme based on secret sharing in blockchain environment
    Journal of Computer Applications   2021 Vol.41 (11): 3257-3265 [Abstract] (421) [HTML 1 KB] [PDF 580 KB] (133)
258 Yinxin BAO, Yang CAO, Quan SHI
  Improved spatio-temporal residual convolutional neural network for urban road network short-term traffic flow prediction
    Journal of Computer Applications   2022 Vol.42 (1): 258-264 [Abstract] (549) [HTML 1 KB] [PDF 1139 KB] (150)
2945 ZHENG Sicheng, KONG Linghua, YOU Tongfei, YI Dingrong
  Semantic SLAM algorithm based on deep learning in dynamic environment
    Journal of Computer Applications   2021 Vol.41 (10): 2945-2951 [Abstract] (517) [HTML 1 KB] [PDF 1572 KB] (1257)
2517 LIU Yaxuan, ZHONG Yong
  Joint extraction method of entities and relations based on subject attention
    Journal of Computer Applications   2021 Vol.41 (9): 2517-2522 [Abstract] (410) [HTML 1 KB] [PDF 977 KB] (550)
2489 XIE Defeng, JI Jianmin
  Syntax-enhanced semantic parsing with syntax-aware representation
    Journal of Computer Applications   2021 Vol.41 (9): 2489-2495 [Abstract] (448) [HTML 1 KB] [PDF 1042 KB] (425)
2631 AN Xin, YANG Haijiao, LI Jianhua, REN Fuji
  Dynamic mapping method for heterogeneous multi-core system under thermal safety constraint
    Journal of Computer Applications   2021 Vol.41 (9): 2631-2638 [Abstract] (347) [HTML 1 KB] [PDF 1107 KB] (322)
2773 MOU Changning, WANG Haipeng, ZHOU Piyu, HOU Xinhang
  De novo peptide sequencing by tandem mass spectrometry based on graph convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (9): 2773-2779 [Abstract] (501) [HTML 1 KB] [PDF 11373 KB] (381)
2705 JI Zhangjian, REN Xingwang
  Object tracking algorithm of fully-convolutional Siamese networks with rotation and scale estimation
    Journal of Computer Applications   2021 Vol.41 (9): 2705-2711 [Abstract] (378) [HTML 1 KB] [PDF 2425 KB] (314)
2720 XU Jianglang, LI Linyan, WAN Xinjun, HU Fuyuan
  Indoor scene recognition method combined with object detection
    Journal of Computer Applications   2021 Vol.41 (9): 2720-2725 [Abstract] (515) [HTML 1 KB] [PDF 1357 KB] (440)
2761 LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling
  Real-time fall detection method based on threshold and extremely randomized tree
    Journal of Computer Applications   2021 Vol.41 (9): 2761-2766 [Abstract] (361) [HTML 1 KB] [PDF 1152 KB] (386)
2496 ZHAO Hong, KONG Dongyi
  Chinese description of image content based on fusion of image feature attention and adaptive attention
    Journal of Computer Applications   2021 Vol.41 (9): 2496-2503 [Abstract] (420) [HTML 1 KB] [PDF 1520 KB] (519)
2609 ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang
  Detection method of domains generated by dictionary-based domain generation algorithm
    Journal of Computer Applications   2021 Vol.41 (9): 2609-2614 [Abstract] (503) [HTML 1 KB] [PDF 893 KB] (467)
2504 LI Kangkang, ZHANG Jing
  Multi-layer encoding and decoding model for image captioning based on attention mechanism
    Journal of Computer Applications   2021 Vol.41 (9): 2504-2509 [Abstract] (569) [HTML 1 KB] [PDF 1112 KB] (504)
542 Feifan SHI, Xuhua SHI
  Adaptive reference vector based constrained multi-objective evolutionary algorithm
    Journal of Computer Applications   2022 Vol.42 (2): 542-549 [Abstract] (404) [HTML 1 KB] [PDF 1068 KB] (251)
433 Yi ZHANG, Shuangsheng WANG, Bin HE, Peiming YE, Keqiang LI
  Named entity recognition method of elementary mathematical text based on BERT
    Journal of Computer Applications   2022 Vol.42 (2): 433-439 [Abstract] (643) [HTML 1 KB] [PDF 689 KB] (457)
565 Wang TAN, Yi LI
  Synthesis of loop bound functions for loop programs
    Journal of Computer Applications   2022 Vol.42 (2): 565-573 [Abstract] (351) [HTML 1 KB] [PDF 596 KB] (94)
2539 BIAN Lingzhi, WANG Zhijie
  Credit scoring model based on enhanced multi-dimensional and multi-grained cascade forest
    Journal of Computer Applications   2021 Vol.41 (9): 2539-2544 [Abstract] (354) [HTML 1 KB] [PDF 1204 KB] (323)
2767 ZHANG Xiaofei, YANG Yang, HUANG Jiajin, ZHONG Ning
  Degree centrality based method for cognitive feature selection
    Journal of Computer Applications   2021 Vol.41 (9): 2767-2772 [Abstract] (287) [HTML 1 KB] [PDF 2920 KB] (584)
2578 CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian
  Differential privacy high-dimensional data publishing method via clustering analysis
    Journal of Computer Applications   2021 Vol.41 (9): 2578-2585 [Abstract] (404) [HTML 1 KB] [PDF 1281 KB] (416)
2523 ZHANG Cheng, WAN Yuan, QIANG Haopeng
  Deep unsupervised discrete cross-modal hashing based on knowledge distillation
    Journal of Computer Applications   2021 Vol.41 (9): 2523-2531 [Abstract] (467) [HTML 1 KB] [PDF 1705 KB] (568)
2726 SONG Zhongshan, LIANG Jiarui, ZHENG Lu, LIU Zhenyu, TIE Jun
  Remote sensing scene classification based on bidirectional gated scale feature fusion
    Journal of Computer Applications   2021 Vol.41 (9): 2726-2735 [Abstract] (414) [HTML 1 KB] [PDF 3143 KB] (383)
2754 GONG Ying, HE Yanting, CAO Cejun
  Co-evolutionary simulation regarding emergency logistics in major public health risk governance
    Journal of Computer Applications   2021 Vol.41 (9): 2754-2760 [Abstract] (421) [HTML 1 KB] [PDF 1077 KB] (298)
1820 HUANG Li, LU Long
  Segmentation of ischemic stroke lesion based on long-distance dependency encoding and deep residual U-Net
    Journal of Computer Applications   2021 Vol.41 (6): 1820-1827 [Abstract] (545) [HTML 1 KB] [PDF 1812 KB] (603)
3171 Mingwei GAO, Nan SANG, Maolin YANG
  IPTV video-on-demand recommendation model based on capsule network
    Journal of Computer Applications   2021 Vol.41 (11): 3171-3177 [Abstract] (398) [HTML 1 KB] [PDF 555 KB] (76)
316 Jie WU, Shitian ZHANG, Haibin XIE, Guang YANG
  Semi-supervised knee abnormality classification based on multi-imaging center MRI data
    Journal of Computer Applications   2022 Vol.42 (1): 316-324 [Abstract] (380) [HTML 1 KB] [PDF 780 KB] (86)
0
  Color image demosaicking network based on inter-channel correlation and enhanced information distillation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (225) [HTML 0 KB] [PDF 0 KB] (8)
3402 Jiaqi ZHANG, Yueqin ZHANG, Jian CHEN
  Pulse condition recognition method based on optimized reinforcement learning path feature classification
    Journal of Computer Applications   2021 Vol.41 (11): 3402-3408 [Abstract] (481) [HTML 1 KB] [PDF 606 KB] (641)
50 Yongfeng DONG, Xiangqian QU, Linhao LI, Yao DONG
  Academic journal contribution recommendation algorithm based on author preferences
    Journal of Computer Applications   2022 Vol.42 (1): 50-56 [Abstract] (504) [HTML 1 KB] [PDF 605 KB] (295)
148 Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG
  Survey of anonymity and tracking technology in Monero
    Journal of Computer Applications   2022 Vol.42 (1): 148-156 [Abstract] (1570) [HTML 1 KB] [PDF 723 KB] (706)
3332 Yusheng HU, Bingwei HE, Qingkang DENG
  Moving object detection and static map reconstruction with hybrid vision system
    Journal of Computer Applications   2021 Vol.41 (11): 3332-3336 [Abstract] (393) [HTML 1 KB] [PDF 1596 KB] (253)
3702 Chuang GAO, Mian TANG, Liang ZHAO
  B-cell epitope prediction model with overlapping subgraph mining based on L-Metric
    Journal of Computer Applications   2021 Vol.41 (12): 3702-3706 [Abstract] (315) [HTML 1 KB] [PDF 499 KB] (77)
3120 Jicheng CHEN, Hongchang CHEN
  Community detection method based on tensor modeling and evolutionary K-means clustering
    Journal of Computer Applications   2021 Vol.41 (11): 3120-3126 [Abstract] (492) [HTML 1 KB] [PDF 759 KB] (217)
3666 Haiyong WANG, Kaixin ZHANG, Weizheng GUAN
  Single image super-resolution reconstruction method based on dense Inception
    Journal of Computer Applications   2021 Vol.41 (12): 3666-3671 [Abstract] (381) [HTML 1 KB] [PDF 740 KB] (87)
287 Donglin MA, Sizhou MA, Weijie WANG
  Multi-site temperature prediction model based on graph convolutional network and gated recurrent unit
    Journal of Computer Applications   2022 Vol.42 (1): 287-293 [Abstract] (538) [HTML 1 KB] [PDF 753 KB] (220)
44 Jianming LI, Bin CHEN, Zhiwei JIANG, Jian QIN
  Constrained differentiable neural architecture search in optimized search space
    Journal of Computer Applications   2022 Vol.42 (1): 44-49 [Abstract] (405) [HTML 1 KB] [PDF 603 KB] (114)
3319 Yongpeng SHI, Junjie ZHANG, Yujie XIA, Ya GAO, Shangwei ZHANG
  Computation offloading and resource allocation strategy in NOMA-based 5G ultra-dense network
    Journal of Computer Applications   2021 Vol.41 (11): 3319-3324 [Abstract] (351) [HTML 1 KB] [PDF 639 KB] (140)
2346 DANG Weichao, LI Tao, BAI Shangwang, GAO Gaimei, LIU Chunxia
  Real-time remaining life prediction method of Web software system based on self-attention-long short-term memory network
    Journal of Computer Applications   2021 Vol.41 (8): 2346-2351 [Abstract] (372) [HTML 1 KB] [PDF 1238 KB] (464)
3309 Gang CHEN, Xiangru MENG, Qiaoyan KANG, Yong YANG
  Virtual software defined network mapping algorithm based on topology segmentation and clustering analysis
    Journal of Computer Applications   2021 Vol.41 (11): 3309-3318 [Abstract] (432) [HTML 1 KB] [PDF 2050 KB] (109)
3075 LU Rongxiu, CHEN Mingming, YANG Hui, ZHU Jianyong
  Element component content dynamic monitoring system based on time sequence characteristics of solution images
    Journal of Computer Applications   2021 Vol.41 (10): 3075-3081 [Abstract] (482) [HTML 1 KB] [PDF 687 KB] (294)
556 XU Shaowei, QIN Pinle, ZENG Jianchao, ZHAO Zhikai, GAO Yuan
  Automatic segmentation algorithm of two-stage mediastinal lymph nodes using attention mechanism
    Journal of Computer Applications   2021 Vol.41 (2): 556-562 [Abstract] (431) [HTML 1 KB] [PDF 2390 KB] (529)
461 WANG Zekun, HE Yichao, LI Huanzhe, ZHANG Fazhan
  Binary particle swarm optimization algorithm based on novel S-shape transfer function for knapsack problem with a single continuous variable
    Journal of Computer Applications   2021 Vol.41 (2): 461-469 [Abstract] (318) [HTML 1 KB] [PDF 1113 KB] (590)
3082 HUANG Xiaoxiang, HU Yongmei, WU Dan, REN Lijie
  Early identification and prediction of abnormal carotid arteries based on variational autoencoder
    Journal of Computer Applications   2021 Vol.41 (10): 3082-3088 [Abstract] (420) [HTML 1 KB] [PDF 662 KB] (354)
1348 LIN Yixing, TANG Hua
  Hybrid recommendation model based on heterogeneous information network
    Journal of Computer Applications   2021 Vol.41 (5): 1348-1355 [Abstract] (471) [HTML 1 KB] [PDF 1265 KB] (626)
0
  Measurement model of cardiovascular frailty based on Gaussian mixture model
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (161) [HTML 1 KB] [PDF 0 KB] (15)
2242 ZHANG Guohui, LU Xixi, HU Yifan, SUN Jinghe
  Machine breakdown rescheduling of flexible job shop based on improved imperialist competitive algorithm
    Journal of Computer Applications   2021 Vol.41 (8): 2242-2248 [Abstract] (404) [HTML 1 KB] [PDF 1072 KB] (444)
2258 HUANG Chengcheng, DONG Xiaoxiao, LI Zhao
  Deep pipeline 5×5 convolution method based on two-dimensional Winograd algorithm
    Journal of Computer Applications   2021 Vol.41 (8): 2258-2264 [Abstract] (523) [HTML 1 KB] [PDF 1087 KB] (419)
2466 LUO Mingyu, LUO Xiaomeng, ZHU Wenmin, ZHANG Lei, FAN Xiumin
  Modeling technology for maintenance posture of virtual human in narrow space of ship
    Journal of Computer Applications   2021 Vol.41 (8): 2466-2472 [Abstract] (427) [HTML 1 KB] [PDF 1390 KB] (448)
2330 QIN Binbin, PENG Liangkang, LU Xiangming, QIAN Jiangbo
  Research progress on driver distracted driving detection
    Journal of Computer Applications   2021 Vol.41 (8): 2330-2337 [Abstract] (782) [HTML 1 KB] [PDF 2153 KB] (579)
2312 SHI Xuesong, LI Xianhua, SUN Qing, SONG Tao
  Noise image segmentation by adaptive wavelet transform based on artificial bee swarm and fuzzy C-means
    Journal of Computer Applications   2021 Vol.41 (8): 2312-2317 [Abstract] (345) [HTML 1 KB] [PDF 3644 KB] (364)
2373 DING Yin, SANG Nan, LI Xiaoyu, WU Feizhou
  Prediction method of capacity data in telecom industry based on recurrent neural network
    Journal of Computer Applications   2021 Vol.41 (8): 2373-2378 [Abstract] (599) [HTML 1 KB] [PDF 1094 KB] (459)
2835 GUO Kexin, ZHANG Yuxiang
  Visual-textual sentiment analysis method based on multi-level spatial attention
    Journal of Computer Applications   2021 Vol.41 (10): 2835-2841 [Abstract] (522) [HTML 1 KB] [PDF 6772 KB] (646)
2273 CAO Yuhong, XU Hai, LIU Sun'ao, WANG Zixiao, LI Hongliang
  Review of deep learning-based medical image segmentation
    Journal of Computer Applications   2021 Vol.41 (8): 2273-2287 [Abstract] (2028) [HTML 1 KB] [PDF 2539 KB] (1666)
2358 HUANG Jishuang, ZHANG Hua, LI Yonglong, ZHAO Hao, WANG Haoran, FENG Chuncheng
  Hydraulic tunnel defect recognition method based on dynamic feature distillation
    Journal of Computer Applications   2021 Vol.41 (8): 2358-2365 [Abstract] (351) [HTML 1 KB] [PDF 1838 KB] (451)
2205 ZHOU Xianbing, FAN Xiaochao, REN Ge, YANG Yong
  Automated English essay scoring method based on multi-level semantic features
    Journal of Computer Applications   2021 Vol.41 (8): 2205-2211 [Abstract] (636) [HTML 1 KB] [PDF 935 KB] (520)
2288 ZHU Cheng, ZHAO Xiaoqi, ZHAO Liping, JIAO Yuhong, ZHU Yafei, CHENG Jianying, ZHOU Wei, TAN Ying
  Classification of functional magnetic resonance imaging data based on semi-supervised feature selection by spectral clustering
    Journal of Computer Applications   2021 Vol.41 (8): 2288-2293 [Abstract] (419) [HTML 1 KB] [PDF 1318 KB] (505)
1915 LI Yangzhi, YUAN Jiazheng, LIU Hongzhe
  Human skeleton-based action recognition algorithm based on spatiotemporal attention graph convolutional network model
    Journal of Computer Applications   2021 Vol.41 (7): 1915-1921 [Abstract] (1050) [HTML 1 KB] [PDF 1681 KB] (1097)
1902 YANG Su, OUYANG Zhi, DU Nisuo
  Unsupervised parallel hash image retrieval based on correlation distance
    Journal of Computer Applications   2021 Vol.41 (7): 1902-1907 [Abstract] (364) [HTML 1 KB] [PDF 967 KB] (636)
1939 WU Zeju, JIAO Cuijuan, CHEN Liang
  Tire defect detection method based on improved Faster R-CNN
    Journal of Computer Applications   2021 Vol.41 (7): 1939-1946 [Abstract] (637) [HTML 1 KB] [PDF 1816 KB] (591)
1865 LIU Huan, LI Xiaoge, HU Likun, HU Feixiong, WANG Penghua
  Knowledge graph driven recommendation model of graph neural network
    Journal of Computer Applications   2021 Vol.41 (7): 1865-1870 [Abstract] (776) [HTML 1 KB] [PDF 991 KB] (825)
2026 ZHOU Shuo, QIU Runhe, TANG Minjun
  Power allocation algorithm for CR-NOMA system based on tabu search and Q-learning
    Journal of Computer Applications   2021 Vol.41 (7): 2026-2032 [Abstract] (408) [HTML 1 KB] [PDF 1128 KB] (337)
1956 LI Yafang, LIANG Ye, FENG Weiwei, ZU Baokai, KANG Yujian
  Deep network embedding method based on community optimization
    Journal of Computer Applications   2021 Vol.41 (7): 1956-1963 [Abstract] (486) [HTML 1 KB] [PDF 1616 KB] (512)
1812 JIA Heming, LANG Chunbo, JIANG Zichao
  Plant leaf disease recognition method based on lightweight convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (6): 1812-1819 [Abstract] (785) [HTML 1 KB] [PDF 1486 KB] (568)
2062 LIU Shuangyuan, ZHENG Wangli, LIN Yunhan
  Adaptive binary simplification method for 3D feature descriptor
    Journal of Computer Applications   2021 Vol.41 (7): 2062-2069 [Abstract] (302) [HTML 1 KB] [PDF 1286 KB] (407)
1268 LAI Xuemei, TANG Hong, CHEN Hongyu, LI Shanshan
  Multimodal sentiment analysis based on feature fusion of attention mechanism-bidirectional gated recurrent unit
    Journal of Computer Applications   2021 Vol.41 (5): 1268-1274 [Abstract] (1115) [HTML 1 KB] [PDF 960 KB] (1585)
1165 TAN Zhaoyi, CHEN Baifan
  Enhanced vehicle 3D surround view based on coordinate inverse mapping
    Journal of Computer Applications   2021 Vol.41 (4): 1165-1171 [Abstract] (393) [HTML 1 KB] [PDF 4343 KB] (729)
164 CHEN Li, WANG Hongyuan, ZHANG Yunpeng, CAO Liang, YIN Yuchang
  Video-based person re-identification method by jointing evenly sampling-random erasing and global temporal feature pooling
    Journal of Computer Applications   2021 Vol.41 (1): 164-169 [Abstract] (410) [HTML 1 KB] [PDF 1012 KB] (456)
121 LI Mingwei, JIANG Qingyuan, XIE Yinpeng, HE Jindong, WU Dan
  Hash learning based malicious SQL detection
    Journal of Computer Applications   2021 Vol.41 (1): 121-126 [Abstract] (367) [HTML 1 KB] [PDF 816 KB] (622)
36 WANG Lijuan, CHEN Shaomin, YIN Ming, XU Yueying, HAO Zhifeng, CAI Ruichu, WEN Wen
  Improved block diagonal subspace clustering algorithm based on neighbor graph
    Journal of Computer Applications   2021 Vol.41 (1): 36-42 [Abstract] (382) [HTML 1 KB] [PDF 1491 KB] (693)
1378 GU Zhengchuan, GUO Yuanbo, FANG Chen
  End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
    Journal of Computer Applications   2021 Vol.41 (5): 1378-1385 [Abstract] (398) [HTML 1 KB] [PDF 1130 KB] (640)
721 JIANG Li, HUANG Shijian, YAN Wenjuan
  Human action recognition method based on low-rank action information and multi-scale convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (3): 721-726 [Abstract] (423) [HTML 1 KB] [PDF 1376 KB] (995)
706 HOU Yunlong, ZHU Lei, CHEN Qin, LYU Suidong
  Salient object detection based on difference of Gaussian feature network
    Journal of Computer Applications   2021 Vol.41 (3): 706-713 [Abstract] (456) [HTML 1 KB] [PDF 1463 KB] (905)
677 PENG Li, ZHANG Haiqing, LI Daiwei, TANG Dan, YU Xi, HE Lei
  Imputation algorithm for hybrid information system of incomplete data analysis approach based on rough set theory
    Journal of Computer Applications   2021 Vol.41 (3): 677-685 [Abstract] (492) [HTML 1 KB] [PDF 1135 KB] (728)
727 JIANG Kun, LIU Zheng, ZHU Lei, LI Xiaoxing
  Fixed word-aligned partition compression algorithm of inverted list based on directed acyclic graph
    Journal of Computer Applications   2021 Vol.41 (3): 727-732 [Abstract] (542) [HTML 1 KB] [PDF 905 KB] (506)
881 WANG Binrong, TAN Dailun, ZHENG Bochuan
  Solving auto part spraying sequence by transforming to traveling salesman problem and genetic algorithm
    Journal of Computer Applications   2021 Vol.41 (3): 881-886 [Abstract] (345) [HTML 1 KB] [PDF 970 KB] (520)
911 HE Jiean, WU Xiaohong, HE Xiaohai, HU Jianrong, QIN Linbo
  Imperfect wheat kernel recognition combined with image enhancement and conventional neural network
    Journal of Computer Applications   2021 Vol.41 (3): 911-916 [Abstract] (454) [HTML 1 KB] [PDF 1123 KB] (794)
939 ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang
  Data trading scheme based on blockchain and trusted computing
    Journal of Computer Applications   2021 Vol.41 (4): 939-944 [Abstract] (902) [HTML 1 KB] [PDF 1137 KB] (1412)
2076 TAN Daoqiang, ZENG Cheng, QIAO Jinxia, ZHANG Jun
  Shadow detection method based on hybrid attention model
    Journal of Computer Applications   2021 Vol.41 (7): 2076-2081 [Abstract] (410) [HTML 1 KB] [PDF 1583 KB] (310)
1908 WU Guangli, LI Leiting, GUO Zhenzhou, WANG Chengxiang
  Video summarization generation model based on improved bi-directional long short-term memory network
    Journal of Computer Applications   2021 Vol.41 (7): 1908-1914 [Abstract] (633) [HTML 1 KB] [PDF 1515 KB] (690)
1055 CUI Bowen, JIN Tao, WANG Jianmin
  Overview of information extraction of free-text electronic medical records
    Journal of Computer Applications   2021 Vol.41 (4): 1055-1063 [Abstract] (778) [HTML 1 KB] [PDF 1090 KB] (1400)
280 SUN Zhongjie, WAN Tao, CHEN Dong, WANG Hao, ZHAO Yanli, QIN Zengchang
  Application of deep learning in histopathological image classification of aortic medial degeneration
    Journal of Computer Applications   2021 Vol.41 (1): 280-285 [Abstract] (628) [HTML 1 KB] [PDF 1150 KB] (695)
1100 WANG Ning, SONG Huihui, ZHANG Kaihua
  Accurate object tracking algorithm based on distance weighting overlap prediction and ellipse fitting optimization
    Journal of Computer Applications   2021 Vol.41 (4): 1100-1105 [Abstract] (421) [HTML 1 KB] [PDF 2560 KB] (411)
2039 LI Hui, WU Chuansheng, LIU Jun, LIU Wen
  Image smoothing method based on gradient surface area and sparsity constraints
    Journal of Computer Applications   2021 Vol.41 (7): 2039-2047 [Abstract] (441) [HTML 1 KB] [PDF 6854 KB] (259)
1701 YAO Jie, CHENG Chunling, HAN Jing, LIU Zheng
  Anomaly detection method based on multi-task temporal convolutional network in cloud workflow
    Journal of Computer Applications   2021 Vol.41 (6): 1701-1708 [Abstract] (464) [HTML 1 KB] [PDF 1677 KB] (793)
1128 LI Yan, CHEN Qiaoping
  Internet rumor propagation model considering non-supportive comments
    Journal of Computer Applications   2021 Vol.41 (4): 1128-1135 [Abstract] (315) [HTML 1 KB] [PDF 1088 KB] (671)
1227 LI Xueqing, WANG Shi, WANG Zhujun, ZHU Junwu
  Summarization of natural language generation
    Journal of Computer Applications   2021 Vol.41 (5): 1227-1235 [Abstract] (2770) [HTML 1 KB] [PDF 1165 KB] (3877)
1527 XU Meng, WANG Yakun
  Remaining useful life prediction of DA40 aircraft carbon brake pads based on bidirectional long short-term memory network
    Journal of Computer Applications   2021 Vol.41 (5): 1527-1532 [Abstract] (466) [HTML 1 KB] [PDF 1636 KB] (1031)
1432 GUO Maozu, YANG Qiannan, ZHAO Lingling
  Image generation based on conditional-Wassertein generative adversarial network
    Journal of Computer Applications   2021 Vol.41 (5): 1432-1437 [Abstract] (441) [HTML 1 KB] [PDF 2259 KB] (562)
1419 LIU Ziyan, MA Shanshan, BAI He
  Orthogonal matching pursuit hybrid precoding algorithm based on improved intelligent water drop
    Journal of Computer Applications   2021 Vol.41 (5): 1419-1424 [Abstract] (279) [HTML 1 KB] [PDF 956 KB] (491)
1299 ZHANG Wenye, SHANG Fangxin, GUO Hao
  Mixed precision neural network quantization method based on Octave convolution
    Journal of Computer Applications   2021 Vol.41 (5): 1299-1304 [Abstract] (367) [HTML 1 KB] [PDF 2485 KB] (388)
1247 WANG Zhujun, WANG Shi, LI Xueqing, ZHU Junwu
  Review of event causality extraction based on deep learning
    Journal of Computer Applications   2021 Vol.41 (5): 1247-1255 [Abstract] (3052) [HTML 1 KB] [PDF 1460 KB] (3917)
694 LONG Guangyu, CHEN Yiqiang, XING Yunbing
  Text correction and completion method in continuous sign language recognition
    Journal of Computer Applications   2021 Vol.41 (3): 694-698 [Abstract] (473) [HTML 1 KB] [PDF 877 KB] (1161)
774 REN Yiming, WANG Rangding, YAN Diqun, LIN Yuzhen
  Speech steganalysis method based on deep residual network
    Journal of Computer Applications   2021 Vol.41 (3): 774-779 [Abstract] (470) [HTML 1 KB] [PDF 1026 KB] (804)
833 SUN Qichang, MAI Yongfeng, CHEN Xiaojun
  Fast calibration algorithm in surgical navigation system based on augmented reality
    Journal of Computer Applications   2021 Vol.41 (3): 833-838 [Abstract] (512) [HTML 1 KB] [PDF 1272 KB] (946)
904 LUO Hui, JIA Chen, LU Chunyu, LI Jian
  Rail tread block defects detection method based on improved Faster R-CNN
    Journal of Computer Applications   2021 Vol.41 (3): 904-910 [Abstract] (477) [HTML 1 KB] [PDF 1562 KB] (813)
1631 ZHANG Sun, YIN Chunyong
  Sequential multimodal sentiment analysis model based on multi-task learning
    Journal of Computer Applications   2021 Vol.41 (6): 1631-1639 [Abstract] (955) [HTML 1 KB] [PDF 1150 KB] (1377)
1640 ZHAO Xiaohu, LI Xiao
  Image captioning algorithm based on multi-feature extraction
    Journal of Computer Applications   2021 Vol.41 (6): 1640-1646 [Abstract] (492) [HTML 1 KB] [PDF 1144 KB] (706)
1659 DAI Yanran, DAI Guoqing, YUAN Yubo
  Multi-face foreground extraction method based on skin color learning
    Journal of Computer Applications   2021 Vol.41 (6): 1659-1666 [Abstract] (298) [HTML 1 KB] [PDF 1935 KB] (524)
330 NAN Ning, YANG Chengyi, WU Zhihao
  Multi-graph neural network-based session perception recommendation model
    Journal of Computer Applications   2021 Vol.41 (2): 330-336 [Abstract] (643) [HTML 1 KB] [PDF 1052 KB] (615)
537 DU Peide, YAN Hua
  Crowd counting network based on multi-scale spatial attention feature fusion
    Journal of Computer Applications   2021 Vol.41 (2): 537-543 [Abstract] (486) [HTML 1 KB] [PDF 1581 KB] (1435)
479 FU Anbing, WEI Wenhong, ZHANG Yuhui, GUO Wenjing
  Real-valued Cartesian genetic programming algorithm based on quasi-oppositional mutation
    Journal of Computer Applications   2021 Vol.41 (2): 479-485 [Abstract] (533) [HTML 1 KB] [PDF 1178 KB] (486)
307 MENG Xiangrui, YANG Wenzhong, WANG Ting
  Survey of sentiment analysis based on image and text fusion
    Journal of Computer Applications   2021 Vol.41 (2): 307-317 [Abstract] (909) [HTML 1 KB] [PDF 1277 KB] (1800)
590 KONG Lingxu, WU Haifeng, ZENG Yu, LU Xiaoling
  Diagnosis of mild cognitive impairment using deep learning and brain functional connectivities with different frequency dimensions
    Journal of Computer Applications   2021 Vol.41 (2): 590-597 [Abstract] (403) [HTML 1 KB] [PDF 1848 KB] (439)
598 CHANG Zheng, LUO Ping, YANG Bo, ZHANG Xiaoxiao
  Respiratory sound recognition of chronic obstructive pulmonary disease patients based on HHT-MFCC and short-term energy
    Journal of Computer Applications   2021 Vol.41 (2): 598-603 [Abstract] (473) [HTML 1 KB] [PDF 1298 KB] (732)
812 WANG Xiaofeng, JIANG Penglong, ZHOU Hui, ZHAO Xiongbo
  Design of FPGA accelerator with high parallelism for convolution neural network
    Journal of Computer Applications   2021 Vol.41 (3): 812-819 [Abstract] (678) [HTML 1 KB] [PDF 1115 KB] (899)
845 WANG Yongjin, ZUO Yu, WU Lian, CUI Zhongwei, ZHAO Chenjie
  Image super-resolution reconstruction based on attention mechanism
    Journal of Computer Applications   2021 Vol.41 (3): 845-850 [Abstract] (579) [HTML 1 KB] [PDF 2394 KB] (512)
441 HUANG Siyuan, ZHANG Minqing, KE Yan, BI Xinliang
  Image steganalysis method based on saliency detection
    Journal of Computer Applications   2021 Vol.41 (2): 441-448 [Abstract] (548) [HTML 1 KB] [PDF 1782 KB] (882)
1005 QIN Li, HAO Zhigang, LI Guoliang
  Construction and correlation analysis of national food safety standard graph
    Journal of Computer Applications   2021 Vol.41 (4): 1005-1011 [Abstract] (450) [HTML 1 KB] [PDF 2022 KB] (738)
350 WANG Xiaoxia, QIAN Xuezhong, SONG Wei
  Relation extraction model via attention-based graph convolutional network
    Journal of Computer Applications   2021 Vol.41 (2): 350-356 [Abstract] (484) [HTML 1 KB] [PDF 995 KB] (1806)
1891 WU Guoliang, XU Jining
  Chinese emergency event extraction method based on named entity recognition task feedback enhancement
    Journal of Computer Applications   2021 Vol.41 (7): 1891-1896 [Abstract] (479) [HTML 1 KB] [PDF 1083 KB] (578)
1723 ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan
  Optimized CKKS scheme based on learning with errors problem
    Journal of Computer Applications   2021 Vol.41 (6): 1723-1728 [Abstract] (1087) [HTML 1 KB] [PDF 760 KB] (1037)
1667 ZHANG Hui, ZHANG Nana, HUANG Jun
  Multi-angle head pose estimation method based on optimized LeNet-5 network
    Journal of Computer Applications   2021 Vol.41 (6): 1667-1672 [Abstract] (391) [HTML 1 KB] [PDF 1102 KB] (679)
1438 LIANG Min, WANG Haorong, ZHANG Yao, LI Jie
  Image super-resolution reconstruction method based on accelerated residual network
    Journal of Computer Applications   2021 Vol.41 (5): 1438-1444 [Abstract] (468) [HTML 1 KB] [PDF 2387 KB] (433)
1492 LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng
  Self-generated deep neural network based 4D trajectory prediction
    Journal of Computer Applications   2021 Vol.41 (5): 1492-1499 [Abstract] (443) [HTML 1 KB] [PDF 1396 KB] (582)
1933 GAO Qinquan, HUANG Bingcheng, LIU Wenzhe, TONG Tong
  Bamboo strip surface defect detection method based on improved CenterNet
    Journal of Computer Applications   2021 Vol.41 (7): 1933-1938 [Abstract] (975) [HTML 1 KB] [PDF 1734 KB] (617)
2108 YANG Zhen, MA Jianxiao, WANG Baojie
  Signal timing optimization model of dual-ring phase under condition of setting waiting area
    Journal of Computer Applications   2021 Vol.41 (7): 2108-2112 [Abstract] (337) [HTML 1 KB] [PDF 909 KB] (355)
2003 ZHAO Qiuyun, WEI Le, SHU Hongping
  Construction method of cloud manufacturing virtual workshop for manufacturing tasks
    Journal of Computer Applications   2021 Vol.41 (7): 2003-2011 [Abstract] (353) [HTML 1 KB] [PDF 1325 KB] (335)
1256 SUN Heli, SUN Yuzhu, ZHANG Xiaoyun
  Event description generation based on generative adversarial network
    Journal of Computer Applications   2021 Vol.41 (5): 1256-1261 [Abstract] (427) [HTML 1 KB] [PDF 971 KB] (811)
1236 LIU Ruiheng, YE Xia, YUE Zengying
  Review of pre-trained models for natural language processing tasks
    Journal of Computer Applications   2021 Vol.41 (5): 1236-1246 [Abstract] (1004) [HTML 1 KB] [PDF 1296 KB] (3196)
611 LIU Zhuan, HAN Ruichen, ZHANG Yansong, CHEN Yueguo, ZHANG Yu
  Database star-join optimization for multicore CPU and GPU platforms
    Journal of Computer Applications   2021 Vol.41 (3): 611-617 [Abstract] (677) [HTML 1 KB] [PDF 1026 KB] (957)
1761 YAN Junhua, HOU Ping, ZHANG Yin, LYU Xiangyang, MA Yue, WANG Gaofei
  Image single distortion type judgment method based on two-channel convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (6): 1761-1766 [Abstract] (351) [HTML 1 KB] [PDF 1095 KB] (433)
623 TANG Chen, HUANG Guorui, JIN Peiquan
  NVM-LH: non-volatile memory-friendly linear hash index
    Journal of Computer Applications   2021 Vol.41 (3): 623-629 [Abstract] (455) [HTML 1 KB] [PDF 1035 KB] (666)
1767 JING Beibei, GUO Jia, WANG Liqing, CHEN Jing, DING Hongwei
  Image double blind denoising algorithm combining with denoising convolutional neural network and conditional generative adversarial net
    Journal of Computer Applications   2021 Vol.41 (6): 1767-1774 [Abstract] (343) [HTML 1 KB] [PDF 1447 KB] (562)
1741 ZHANG Chen, TIAN Tian, YANG Xiuting, GONG Dunwei
  Communication coverage reduction method of parallel programs based on dominant relation
    Journal of Computer Applications   2021 Vol.41 (6): 1741-1747 [Abstract] (342) [HTML 1 KB] [PDF 944 KB] (387)
1805 WANG Xianwu, ZHANG Ting, JI Xin, DU Yi
  3D shale digital core reconstruction method based on deep convolutional generative adversarial network with gradient penalty
    Journal of Computer Applications   2021 Vol.41 (6): 1805-1811 [Abstract] (536) [HTML 1 KB] [PDF 2129 KB] (563)
1748 CHENG Meiying, QIAN Qian, NI Zhiwei, ZHU Xuhui
  Self-organized migrating algorithm for multi-task optimization with information filtering
    Journal of Computer Applications   2021 Vol.41 (6): 1748-1755 [Abstract] (480) [HTML 1 KB] [PDF 1172 KB] (351)
1484 LUAN Jianing, ZHANG Wei, SUN Wei, ZHANG Ao, HAN Dong
  High-accuracy localization algorithm based on fusion of two-dimensional code vision and laser lidar
    Journal of Computer Applications   2021 Vol.41 (5): 1484-1491 [Abstract] (979) [HTML 1 KB] [PDF 2182 KB] (1084)
1314 WANG Xin, ZHU Haohua, LIU Guangcan
  Convolution robust principal component analysis
    Journal of Computer Applications   2021 Vol.41 (5): 1314-1318 [Abstract] (563) [HTML 1 KB] [PDF 2704 KB] (595)
1522 XU Guobao, CHEN Yuanxiao, WANG Ji
  Drug-target association prediction algorithm based on graph convolutional network
    Journal of Computer Applications   2021 Vol.41 (5): 1522-1526 [Abstract] (463) [HTML 1 KB] [PDF 892 KB] (487)
1290 JIA Heming, JIANG Zichao, LI Yao, SUN Kangjian
  Simultaneous feature selection optimization based on improved spotted hyena optimizer algorithm
    Journal of Computer Applications   2021 Vol.41 (5): 1290-1298 [Abstract] (470) [HTML 1 KB] [PDF 1335 KB] (703)
133 ZHOU Chaoran, ZHAO Jianping, MA Tai, ZHOU Xin
  Web page blacklist discrimination method based on attention mechanism and ensemble learning
    Journal of Computer Applications   2021 Vol.41 (1): 133-138 [Abstract] (406) [HTML 1 KB] [PDF 1076 KB] (520)
1785 LI Congdong, HUANG Hao, ZHANG Fanshun
  Knowledge sharing behavior incentive mechanism for lead users based on evolutionary game
    Journal of Computer Applications   2021 Vol.41 (6): 1785-1791 [Abstract] (373) [HTML 1 KB] [PDF 1217 KB] (383)
1756 WANG Yu, LIU Yanli, CHEN Shaowu
  Maximum common induced subgraph algorithm based on vertex conflict learning
    Journal of Computer Applications   2021 Vol.41 (6): 1756-1760 [Abstract] (499) [HTML 1 KB] [PDF 962 KB] (610)
1386 GUO Shuai, SU Yang
  Encrypted traffic classification method based on data stream
    Journal of Computer Applications   2021 Vol.41 (5): 1386-1391 [Abstract] (619) [HTML 1 KB] [PDF 948 KB] (1301)
738 GUO Jia, HAN Litao, SUN Xianlong, ZHOU Lijuan
  Comparative density peaks clustering algorithm with automatic determination of clustering center
    Journal of Computer Applications   2021 Vol.41 (3): 738-744 [Abstract] (610) [HTML 1 KB] [PDF 2809 KB] (630)
1445 YANG Mengmeng, ZHANG Aihua
  Fractal image compression based on gray-level co-occurrence matrix and simultaneous orthogonal matching pursuit
    Journal of Computer Applications   2021 Vol.41 (5): 1445-1449 [Abstract] (397) [HTML 1 KB] [PDF 968 KB] (478)
1262 LI Wenhui, ZENG Shangyou, WANG Jinjin
  Image description generation algorithm based on improved attention mechanism
    Journal of Computer Applications   2021 Vol.41 (5): 1262-1267 [Abstract] (587) [HTML 1 KB] [PDF 1413 KB] (1096)
1221 OU Lili, SHAO Fengjing, SUN Rencheng, SUI Yi
  Cerebral infarction image recognition based on semi-supervised method
    Journal of Computer Applications   2021 Vol.41 (4): 1221-1226 [Abstract] (487) [HTML 1 KB] [PDF 1167 KB] (672)
150 LIU Nanbo, XIAO Fen, ZHANG Wenlei, LI Wangxin, WENG Zun
  Group scanpath generation based on fixation regions of interest clustering and transferring
    Journal of Computer Applications   2021 Vol.41 (1): 150-156 [Abstract] (445) [HTML 1 KB] [PDF 2048 KB] (469)
139 LUO Jun, CHEN Lifei
  Sentiment classification of incomplete data based on bidirectional encoder representations from transformers
    Journal of Computer Applications   2021 Vol.41 (1): 139-144 [Abstract] (456) [HTML 1 KB] [PDF 921 KB] (994)
112 LI Congcong, LIU Jinglei
  Generating CP-nets with bounded tree width based on Dandelion code
    Journal of Computer Applications   2021 Vol.41 (1): 112-120 [Abstract] (311) [HTML 1 KB] [PDF 1221 KB] (1045)
43 XU Zhoubo, LI Zhen, LIU Huadong, LI Ping
  Subgraph isomorphism matching algorithm based on neighbor information aggregation
    Journal of Computer Applications   2021 Vol.41 (1): 43-47 [Abstract] (519) [HTML 1 KB] [PDF 755 KB] (473)
199 GAO Shile, WANG Ying, LI Hailin, WAN Xiaoji
  Prediction method on financial time series data based on matrix profile
    Journal of Computer Applications   2021 Vol.41 (1): 199-207 [Abstract] (574) [HTML 1 KB] [PDF 1433 KB] (1037)
636 ZHANG Xiaowei, JIANG Dawei, CHEN Ke, CHEN Gang
  AAC-Hunter: efficient algorithm for discovering aggregation algebraic constraints in relational databases
    Journal of Computer Applications   2021 Vol.41 (3): 636-642 [Abstract] (389) [HTML 1 KB] [PDF 1077 KB] (693)
657 SHEN Chen, TAI Lingxiang, PENG Yuwei
  Dynamic workload matching method for automatic parameter tuning
    Journal of Computer Applications   2021 Vol.41 (3): 657-661 [Abstract] (425) [HTML 1 KB] [PDF 867 KB] (606)
1042 HUO Shoujun, HAO Yan, SHI Huiyu, DONG Yanqing, CAO Rui
  Pattern recognition of motor imagery EEG based on deep convolutional network
    Journal of Computer Applications   2021 Vol.41 (4): 1042-1048 [Abstract] (505) [HTML 1 KB] [PDF 2049 KB] (670)
976 CHE Bingqian, ZHOU Dong
  Tag recommendation method combining network structure information and text content
    Journal of Computer Applications   2021 Vol.41 (4): 976-983 [Abstract] (437) [HTML 1 KB] [PDF 1060 KB] (784)
1406 ZHENG Liping, WANG Jianqiang, ZHANG Yuzhao, DONG Zuofan
  Vehicle number optimization approach of autonomous vehicle fleet driven by multi-spatio-temporal distribution task
    Journal of Computer Applications   2021 Vol.41 (5): 1406-1411 [Abstract] (342) [HTML 1 KB] [PDF 1248 KB] (818)
643 LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia
  Personalized privacy protection for spatio-temporal data
    Journal of Computer Applications   2021 Vol.41 (3): 643-650 [Abstract] (527) [HTML 1 KB] [PDF 1280 KB] (941)
662 REN Yuanyuan, WANG Chuanjian
  Remote sensing time-series images classification algorithm with abnormal data
    Journal of Computer Applications   2021 Vol.41 (3): 662-668 [Abstract] (459) [HTML 1 KB] [PDF 1226 KB] (988)
3490 WANG Yajie, ZHANG Yunbo, WU Yanyan, DING Aodong, QI Bingzhi
  General chess piece positioning method under uneven illumination
    Journal of Computer Applications   2020 Vol.40 (12): 3490-3498 [Abstract] (385) [HTML 1 KB] [PDF 3060 KB] (323)
3485 ZHANG Xiaochuan, DAI Xuyao, LIU Lu, FENG Tianshuo
  Chinese short text classification model with multi-head self-attention mechanism
    Journal of Computer Applications   2020 Vol.40 (12): 3485-3489 [Abstract] (706) [HTML 1 KB] [PDF 806 KB] (867)
3413 LIU Jingshu, WANG Li, LIU Jinglei
  Fast spectral clustering algorithm without eigen-decomposition
    Journal of Computer Applications   2020 Vol.40 (12): 3413-3422 [Abstract] (469) [HTML 1 KB] [PDF 1407 KB] (618)
3451 CHEN Li, DING Shifei, YU Wenjia
  Lightweight convolutional neural network based on cross-channel fusion and cross-module connection
    Journal of Computer Applications   2020 Vol.40 (12): 3451-3457 [Abstract] (553) [HTML 1 KB] [PDF 1104 KB] (699)
571 WANG Peng, LI Yanwen, YANG Di, YANG Huamin
  Macroscopic fundamental diagram traffic signal control model based on hierarchical control
    Journal of Computer Applications   2021 Vol.41 (2): 571-576 [Abstract] (491) [HTML 1 KB] [PDF 1351 KB] (766)
318 QIU Ningjia, WANG Xiaoxia, WANG Peng, WANG Yanchun
  Analysis of double-channel Chinese sentiment model integrating grammar rules
    Journal of Computer Applications   2021 Vol.41 (2): 318-323 [Abstract] (484) [HTML 1 KB] [PDF 1093 KB] (1179)
544 FU Qianhui, LI Qingkui, FU Jingnan, WANG Yu
  Dense crowd counting model based on spatial dimensional recurrent perception network
    Journal of Computer Applications   2021 Vol.41 (2): 544-549 [Abstract] (413) [HTML 1 KB] [PDF 1486 KB] (918)
1392 WANG Yijie, FAN Jiafei, WANG Chenyu
  Two-stage task offloading strategy based on game theory in cloud-edge environment
    Journal of Computer Applications   2021 Vol.41 (5): 1392-1398 [Abstract] (436) [HTML 1 KB] [PDF 910 KB] (676)
1113 LI Jing, LUO Jinfei, LI Bingchao
  Reliability analysis models for replication-based storage systems with proactive fault tolerance
    Journal of Computer Applications   2021 Vol.41 (4): 1113-1121 [Abstract] (326) [HTML 1 KB] [PDF 1396 KB] (510)
1305 GAN Lan, SHEN Hongfei, WANG Yao, ZHANG Yuejin
  Data augmentation method based on improved deep convolutional generative adversarial networks
    Journal of Computer Applications   2021 Vol.41 (5): 1305-1313 [Abstract] (1178) [HTML 1 KB] [PDF 1499 KB] (1681)
1533 FU Zhuoxin, SUN Hao, CHEN Jianwen, GUO Yue, CHEN Jin
  Construction of fracture reduction robot system based on cyber-physical systems
    Journal of Computer Applications   2021 Vol.41 (5): 1533-1538 [Abstract] (373) [HTML 1 KB] [PDF 1497 KB] (688)
1332 CHEN Zhengtao, HUANG Can, YANG Bo, ZHAO Li, LIAO Yong
  Yak face recognition algorithm of parallel convolutional neural network based on transfer learning
    Journal of Computer Applications   2021 Vol.41 (5): 1332-1336 [Abstract] (473) [HTML 1 KB] [PDF 842 KB] (882)
1071 YAN Aijun, WEI Zhiyuan
  Weight allocation and case base maintenance method of case-based reasoning classifier
    Journal of Computer Applications   2021 Vol.41 (4): 1071-1077 [Abstract] (338) [HTML 1 KB] [PDF 871 KB] (873)
1148 LI Shanshan, ZHAO Li, ZHANG Hongli
  Image grey level encryption based on cat map
    Journal of Computer Applications   2021 Vol.41 (4): 1148-1152 [Abstract] (414) [HTML 1 KB] [PDF 1056 KB] (503)
1172 WU Lei, YANG Xiaomin
  Improved remote sensing image fusion algorithm based on channel attention feedback network
    Journal of Computer Applications   2021 Vol.41 (4): 1172-1178 [Abstract] (383) [HTML 1 KB] [PDF 5163 KB] (500)
1078 YANG Fengrui, HUO Na, ZHANG Xuhong, WEI Wei
  Topic-expanded emotional conversation generation based on attention mechanism
    Journal of Computer Applications   2021 Vol.41 (4): 1078-1083 [Abstract] (667) [HTML 1 KB] [PDF 937 KB] (1137)
1184 XU Feixue, LIU Qinming, OUYANG Hailing, YE Chunming
  Optimization of maintenance strategy model for multi-component system based on performance-based contract
    Journal of Computer Applications   2021 Vol.41 (4): 1184-1191 [Abstract] (412) [HTML 1 KB] [PDF 1141 KB] (581)
145 WU Xiaoping, ZHANG Qiang, ZHAO Fang, JIAO Lin
  Entity relation extraction method for guidelines of cardiovascular disease based on bidirectional encoder representation from transformers
    Journal of Computer Applications   2021 Vol.41 (1): 145-149 [Abstract] (859) [HTML 1 KB] [PDF 823 KB] (1074)
3701 HE Xiangyu, LI Jing, YANG Shuqiang, XIA Yujie
  Extended target tracking algorithm based on ET-PHD filter and variational Bayesian approximation
    Journal of Computer Applications   2020 Vol.40 (12): 3701-3706 [Abstract] (417) [HTML 1 KB] [PDF 1020 KB] (424)
577 FAN Xiaomao, XIONG Honglin, ZHAO Gansen
  Cleaning scheduling model with constraints and its solution
    Journal of Computer Applications   2021 Vol.41 (2): 577-582 [Abstract] (564) [HTML 1 KB] [PDF 876 KB] (488)
324 SUN Heli, XU Tong, HE Liang, JIA Xiaolin
  Personalized social event recommendation method integrating user historical behaviors and social relationships
    Journal of Computer Applications   2021 Vol.41 (2): 324-329 [Abstract] (441) [HTML 1 KB] [PDF 919 KB] (742)
422 LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang
  Efficient dynamic data audit scheme for resource-constrained users
    Journal of Computer Applications   2021 Vol.41 (2): 422-432 [Abstract] (417) [HTML 1 KB] [PDF 1658 KB] (558)
433 HANG Mengxin, CHEN Wei, ZHANG Renjie
  Abnormal flow detection based on improved one-dimensional convolutional neural network
    Journal of Computer Applications   2021 Vol.41 (2): 433-440 [Abstract] (750) [HTML 1 KB] [PDF 1011 KB] (817)
357 XU Li, LI Jianhua
  Biomedical named entity recognition with graph network based on syntactic dependency parsing
    Journal of Computer Applications   2021 Vol.41 (2): 357-362 [Abstract] (484) [HTML 1 KB] [PDF 845 KB] (1049)
127 TAN Jinyuan, DIAO Yufeng, QI Ruihua, LIN Hongfei
  Automatic summary generation of Chinese news text based on BERT-PGN model
    Journal of Computer Applications   2021 Vol.41 (1): 127-132 [Abstract] (1521) [HTML 1 KB] [PDF 857 KB] (2859)
191 LIANG Zhen, FANG Tiyu, LI Jinping
  Precise visual navigation method for agricultural robot based on virtual navigation line
    Journal of Computer Applications   2021 Vol.41 (1): 191-198 [Abstract] (458) [HTML 1 KB] [PDF 1980 KB] (553)
265 MA Tingting, JI Tianjiao, YANG Guanyu, CHEN Yang, XU Wenbo, LIU Hongtu
  Incidence trend prediction of hand-foot-mouth disease based on long short-term memory neural network
    Journal of Computer Applications   2021 Vol.41 (1): 265-269 [Abstract] (410) [HTML 1 KB] [PDF 892 KB] (779)
185 LIU Sijia, TONG Xiangrong
  Urban transportation path planning based on reinforcement learning
    Journal of Computer Applications   2021 Vol.41 (1): 185-190 [Abstract] (1024) [HTML 1 KB] [PDF 1042 KB] (765)
3563 LI Ming, HU Jiangping, CAO Xiaoli, PENG Peng
  Heterogeneous directional sensor node scheduling algorithm for differentiated coverage
    Journal of Computer Applications   2020 Vol.40 (12): 3563-3570 [Abstract] (353) [HTML 1 KB] [PDF 986 KB] (400)
550 LI Weiqiang, LEI Hang, ZHANG Jingyu, WANG Xupeng
  3D hand pose estimation based on label distribution learning
    Journal of Computer Applications   2021 Vol.41 (2): 550-555 [Abstract] (437) [HTML 1 KB] [PDF 1109 KB] (607)
3534 ZHU Lin, NING Qian, LEI Yinjie, CHEN Bingcai
  Remaining useful life prediction for turbofan engines by genetic algorithm-based selective ensembling and temporal convolutional network
    Journal of Computer Applications   2020 Vol.40 (12): 3534-3540 [Abstract] (503) [HTML 1 KB] [PDF 970 KB] (1129)
3558 SHI Wenxu, BAO Jiahui, YAO Yu
  Remote sensing image target detection and identification based on deep learning
    Journal of Computer Applications   2020 Vol.40 (12): 3558-3562 [Abstract] (820) [HTML 1 KB] [PDF 1188 KB] (1357)
87 CHEN Zhen, ZHONG Yiwen, LIN Juan
  Hybrid greedy genetic algorithm for solving 0-1 knapsack problem
    Journal of Computer Applications   2021 Vol.41 (1): 87-94 [Abstract] (643) [HTML 1 KB] [PDF 974 KB] (778)
2455 ZHU Lin, YU Haitao, LEI Xinyu, LIU Jing, WANG Ruofan
  Brain network feature identification algorithm for Alzheimer's patients based on MRI image
    Journal of Computer Applications   2020 Vol.40 (8): 2455-2459 [Abstract] (553) [HTML 1 KB] [PDF 915 KB] (377)
2171 WU Haiyan, LIU Ying
  Stylistic multiple features mining based on attention network
    Journal of Computer Applications   2020 Vol.40 (8): 2171-2181 [Abstract] (509) [HTML 1 KB] [PDF 1584 KB] (797)
2531 YANG Yunlong, SUN Jianqiang, SONG Guochao
  Text sentiment analysis based on gated recurrent unit and capsule features
    Journal of Computer Applications   2020 Vol.40 (9): 2531-2535 [Abstract] (380) [HTML 1 KB] [PDF 781 KB] (632)
2586 GOU Zi'an, ZHANG Xiao, WU Dongnan, WANG Yanqiu
  Log analysis and workload characteristic extraction in distributed storage system
    Journal of Computer Applications   2020 Vol.40 (9): 2586-2593 [Abstract] (500) [HTML 1 KB] [PDF 1136 KB] (777)
2441 XIA Lunteng, ZHANG Li
  Networked cane system for blind people based on K-nearest neighbor and dynamic time warping algorithms
    Journal of Computer Applications   2020 Vol.40 (8): 2441-2448 [Abstract] (533) [HTML 1 KB] [PDF 1566 KB] (579)
3081 AN Xin, KANG An, XIA Jinwei, LI Jianhua, CHEN Tian, REN Fuji
  Heterogeneous sensing multi-core scheduling method based on machine learning
    Journal of Computer Applications   2020 Vol.40 (10): 3081-3087 [Abstract] (427) [HTML 1 KB] [PDF 1048 KB] (848)
2743 YUAN Quan, WANG Yan, LI Yuxian
  Fast algorithm for distance regularized level set evolution model
    Journal of Computer Applications   2020 Vol.40 (9): 2743-2747 [Abstract] (346) [HTML 1 KB] [PDF 1693 KB] (441)
2639 WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei
  Auditable signature scheme for blockchain based on secure multi-party
    Journal of Computer Applications   2020 Vol.40 (9): 2639-2645 [Abstract] (420) [HTML 1 KB] [PDF 983 KB] (783)
2951 HAO Qinxia
  Course recommendation system based on R2 index and multi-objective differential evolution
    Journal of Computer Applications   2020 Vol.40 (10): 2951-2959 [Abstract] (401) [HTML 1 KB] [PDF 1063 KB] (426)
2305 XU Qiuyan, MA Liang, LIU Yong
  Yin-Yang-pair optimization algorithm based on chaos search and intricate operator
    Journal of Computer Applications   2020 Vol.40 (8): 2305-2312 [Abstract] (468) [HTML 1 KB] [PDF 1180 KB] (502)
2465 ZHENG Yanbin, HAN Mengyun, FAN Wenxin
  Handwritten Chinese character recognition based on two dimensional principal component analysis and convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (8): 2465-2471 [Abstract] (491) [HTML 1 KB] [PDF 1282 KB] (594)
2313 LUO Xiangyu, LI Jianan, LUO Xiaoxia, WANG Jia
  Improved community evolution relationship analysis method for dynamic graphs
    Journal of Computer Applications   2020 Vol.40 (8): 2313-2318 [Abstract] (366) [HTML 1 KB] [PDF 3929 KB] (432)
2536 YIN Chunyong, ZHANG Sun
  End-to-end adversarial variational Bayes method for short text sentiment classification
    Journal of Computer Applications   2020 Vol.40 (9): 2536-2542 [Abstract] (416) [HTML 1 KB] [PDF 1653 KB] (693)
2479 WEI Wenyu, YANG Wenzhong, MA Guoxiang, HUANG Mei
  Survey of person re-identification technology based on deep learning
    Journal of Computer Applications   2020 Vol.40 (9): 2479-2492 [Abstract] (764) [HTML 1 KB] [PDF 1851 KB] (1583)
2410 YAN Huajian, ZHANG Guofu, SU Zhaopin, LIU Yang
  Modeling and solving of high-dimensional multi-objective adaptive allocation for emergency relief supplies
    Journal of Computer Applications   2020 Vol.40 (8): 2410-2419 [Abstract] (406) [HTML 1 KB] [PDF 1120 KB] (590)
2236 ZHOU Yun, CHEN Shurong
  Behavior recognition method based on two-stream non-local residual network
    Journal of Computer Applications   2020 Vol.40 (8): 2236-2240 [Abstract] (550) [HTML 1 KB] [PDF 1122 KB] (587)
3166 CAO Yudong, CAI Xibiao
  No-reference image quality assessment algorithm with enhanced adversarial learning
    Journal of Computer Applications   2020 Vol.40 (11): 3166-3171 [Abstract] (573) [HTML 1 KB] [PDF 1035 KB] (689)
2706 WANG Mingfen
  Handover access scheme in software-defined wireless local area network
    Journal of Computer Applications   2020 Vol.40 (9): 2706-2711 [Abstract] (475) [HTML 1 KB] [PDF 1522 KB] (569)
2507 RONG Wei, JIANG Zheyuan, XIE Zhao, WU Kewei
  Clustering relational network for group activity recognition
    Journal of Computer Applications   2020 Vol.40 (9): 2507-2513 [Abstract] (448) [HTML 1 KB] [PDF 1376 KB] (530)
2493 QIU Yaoru, SUN Weijun, HUANG Yonghui, TANG Yuqi, ZHANG Haochuan, WU Junpeng
  Person re-identification method based on GAN uniting with spatial-temporal pattern
    Journal of Computer Applications   2020 Vol.40 (9): 2493-2498 [Abstract] (457) [HTML 1 KB] [PDF 966 KB] (807)
2737 CHEN Lixia, BAN Ying, WANG Xuewen
  Background subtraction based on tensor nuclear norm and 3D total variation
    Journal of Computer Applications   2020 Vol.40 (9): 2737-2742 [Abstract] (526) [HTML 1 KB] [PDF 950 KB] (577)
2241 LIN Zhixing, WANG Like
  Network situation prediction method based on deep feature and Seq2Seq model
    Journal of Computer Applications   2020 Vol.40 (8): 2241-2247 [Abstract] (360) [HTML 1 KB] [PDF 1073 KB] (625)
3526 LIU Ziwei, DENG Chunhua, LIU Jing
  Object detection algorithm based on asymmetric hourglass network structure
    Journal of Computer Applications   2020 Vol.40 (12): 3526-3533 [Abstract] (510) [HTML 1 KB] [PDF 1337 KB] (882)
407 WEN Chaodong, ZENG Cheng, REN Junwei, ZHANG Yan
  Patent text classification based on ALBERT and bidirectional gated recurrent unit
    Journal of Computer Applications   2021 Vol.41 (2): 407-412 [Abstract] (721) [HTML 1 KB] [PDF 979 KB] (888)
3658 PI Jiatian, YANG Jiezhi, YANG Linxi, PENG Mingjie, DENG Xiong, ZHAO Lijun, TANG Wanmei, WU Zhiyou
  Lightweight face liveness detection method based on multi-modal feature fusion
    Journal of Computer Applications   2020 Vol.40 (12): 3658-3665 [Abstract] (625) [HTML 1 KB] [PDF 1582 KB] (736)
3624 FAN Fan, GAO Yuan, QIN Pinle, WANG Lifang
  Abdominal MRI image multi-scale super-resolution reconstruction based on parallel channel-spatial attention mechanism
    Journal of Computer Applications   2020 Vol.40 (12): 3624-3630 [Abstract] (371) [HTML 1 KB] [PDF 1111 KB] (518)
22 LI Erchao, LI Kangwei
  Decomposition based many-objective evolutionary algorithm based on minimum distance and aggregation strategy
    Journal of Computer Applications   2021 Vol.41 (1): 22-28 [Abstract] (438) [HTML 1 KB] [PDF 953 KB] (534)
3520 WANG Yiting, ZHANG Ke, LI Jie, HAO Zongbo, DUAN Chang, ZHU Ce
  Recognition and localization method of super-large-scale variance objects in the same scene
    Journal of Computer Applications   2020 Vol.40 (12): 3520-3525 [Abstract] (417) [HTML 1 KB] [PDF 1355 KB] (552)
3666 CHEN Fang, LIU Xiaorui, YANG Mingye
  Face recognition security system based on liveness detection and authentication
    Journal of Computer Applications   2020 Vol.40 (12): 3666-3672 [Abstract] (538) [HTML 1 KB] [PDF 1545 KB] (573)
3550 XU Changqing, CHEN Zhenjie, HOU Renfu
  Deep learning classification method of Landsat 8 OLI images based on inaccurate prior knowledge
    Journal of Computer Applications   2020 Vol.40 (12): 3550-3557 [Abstract] (578) [HTML 1 KB] [PDF 2305 KB] (451)
3586 HUANG Xiuli, HUANG Jin, YU Pengfei, MIAO Weiwei, YANG Ruxia, LI Yijing, YU Peng
  Security-risk-oriented distributed resource allocation method in power wireless private network
    Journal of Computer Applications   2020 Vol.40 (12): 3586-3593 [Abstract] (384) [HTML 1 KB] [PDF 2051 KB] (423)
3119 ZHAO Ji, CHENG Cheng
  Dynamic cooperative random drift particle swarm optimization algorithm assisted by evolution information
    Journal of Computer Applications   2020 Vol.40 (11): 3119-3126 [Abstract] (431) [HTML 1 KB] [PDF 941 KB] (603)
2164 XIONG Yong, ZHANG Jia, YU Jiajun, ZHANG Benren, LIANG Xuanzhuo, ZHU Qige
  Intelligent layout optimization algorithm for 3D pipelines of ships
    Journal of Computer Applications   2020 Vol.40 (7): 2164-2170 [Abstract] (877) [HTML 1 KB] [PDF 1094 KB] (738)
2795 HE Haochen, ZHANG Danhong
  Recommendation method based on multidimensional social relationship embedded deep graph neural network
    Journal of Computer Applications   2020 Vol.40 (10): 2795-2803 [Abstract] (544) [HTML 1 KB] [PDF 1544 KB] (1356)
3261 QIN Nan, MA Liang, HUANG Rui
  Software safety requirement analysis and verification method based on system theoretic process analysis
    Journal of Computer Applications   2020 Vol.40 (11): 3261-3266 [Abstract] (402) [HTML 1 KB] [PDF 2126 KB] (507)
3113 XU Xiaoping, XU Li, WANG Feng, LIU Long
  Learning monkey algorithm based on Lagrange interpolation to solve discounted {0-1} knapsack problem
    Journal of Computer Applications   2020 Vol.40 (11): 3113-3118 [Abstract] (373) [HTML 1 KB] [PDF 613 KB] (522)
3346 ZHANG Junjie, SUN Guangmin, ZHENG Kun
  Review of gaze tracking and its application in intelligent education
    Journal of Computer Applications   2020 Vol.40 (11): 3346-3356 [Abstract] (474) [HTML 1 KB] [PDF 1506 KB] (726)
3101 SUN Heli, SUN Yuzhu, ZHANG Xiaoyun
  Social event participation prediction based on event description
    Journal of Computer Applications   2020 Vol.40 (11): 3101-3106 [Abstract] (496) [HTML 1 KB] [PDF 676 KB] (732)
3146 GONG Kaiqiang, ZHANG Chunmei, ZENG Guanghua
  Convolution neural network model compression method based on pruning and tensor decomposition
    Journal of Computer Applications   2020 Vol.40 (11): 3146-3151 [Abstract] (736) [HTML 1 KB] [PDF 1488 KB] (720)
3192 LIU Gaojun, FANG Xiao, DUAN Jianyong
  Query extension based on deep semantic information
    Journal of Computer Applications   2020 Vol.40 (11): 3192-3197 [Abstract] (394) [HTML 1 KB] [PDF 591 KB] (508)
3385 HUANG Weijian, LI Danyang, HUANG Yuan
  Spatio-temporal hybrid prediction model for air quality
    Journal of Computer Applications   2020 Vol.40 (11): 3385-3392 [Abstract] (399) [HTML 1 KB] [PDF 902 KB] (690)
2967 LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang
  Integral attack on PICO algorithm based on division property
    Journal of Computer Applications   2020 Vol.40 (10): 2967-2972 [Abstract] (529) [HTML 1 KB] [PDF 810 KB] (700)
2571 GAO Zhiyong, HUANG Jinzhen, DU Chenggang
  Pulmonary nodule detection based on feature pyramid networks
    Journal of Computer Applications   2020 Vol.40 (9): 2571-2576 [Abstract] (540) [HTML 1 KB] [PDF 988 KB] (674)
3280 LI Cuijin, QU Zhong
  Review of image edge detection algorithms based on deep learning
    Journal of Computer Applications   2020 Vol.40 (11): 3280-3288 [Abstract] (2657) [HTML 1 KB] [PDF 922 KB] (4044)
3107 ZHENG Zongsheng, HU Chenyu, JIANG Xiaoyi
  Deep transfer adaptation network based on improved maximum mean discrepancy algorithm
    Journal of Computer Applications   2020 Vol.40 (11): 3107-3112 [Abstract] (523) [HTML 1 KB] [PDF 2506 KB] (913)
3178 LI Qian, YANG Wenzhu, CHEN Xiangyang, YUAN Tongtong, WANG Yuxia
  Human action recognition model based on tightly coupled spatiotemporal two-stream convolution neural network
    Journal of Computer Applications   2020 Vol.40 (11): 3178-3183 [Abstract] (372) [HTML 1 KB] [PDF 2537 KB] (464)
1879 HU Tiantian, DAN Yabo, HU Jie, LI Xiang, LI Shaobo
  News named entity recognition and sentiment classification based on attention-based bi-directional long short-term memory neural network and conditional random field
    Journal of Computer Applications   2020 Vol.40 (7): 1879-1883 [Abstract] (1058) [HTML 1 KB] [PDF 864 KB] (1034)
2543 SUN Min, LI Yang, ZHUANG Zhengfei, YU Dawei
  Sentiment analysis based on parallel hybrid network and attention mechanism
    Journal of Computer Applications   2020 Vol.40 (9): 2543-2548 [Abstract] (419) [HTML 1 KB] [PDF 938 KB] (713)
2719 LIU Li, HU Haibo, YANG Tao
  Visual analysis system for exploring spatio-temporal exhibition data
    Journal of Computer Applications   2020 Vol.40 (9): 2719-2727 [Abstract] (517) [HTML 1 KB] [PDF 4426 KB] (277)
2117 MA Jinlin, WEI Meng, MA Ziping
  Pulmonary nodule segmentation method based on deep transfer learning
    Journal of Computer Applications   2020 Vol.40 (7): 2117-2125 [Abstract] (619) [HTML 1 KB] [PDF 1631 KB] (600)
1926 HU Xuemin, TONG Xiuchi, GUO Lin, ZHANG Ruohan, KONG Li
  End-to-end autonomous driving model based on deep visual attention neural network
    Journal of Computer Applications   2020 Vol.40 (7): 1926-1931 [Abstract] (448) [HTML 1 KB] [PDF 1287 KB] (780)
2016 LI Zhanghong, LIANG Xiaolei, TIAN Mengdan, ZHOU Wenfeng
  Solution space dynamic compression strategy for permutation and combination problems
    Journal of Computer Applications   2020 Vol.40 (7): 2016-2020 [Abstract] (335) [HTML 1 KB] [PDF 862 KB] (404)
1950 NIE Xichan, ZHANG Yang, YU Dunhui, ZHANG Xingsheng
  Spatial crowdsourcing task allocation algorithm for global optimization
    Journal of Computer Applications   2020 Vol.40 (7): 1950-1958 [Abstract] (529) [HTML 1 KB] [PDF 1314 KB] (728)
2009 HUANG Zhongzhan, XU Shiming
  Automatic generation algorithm of orthogonal grid based on recurrent neural network
    Journal of Computer Applications   2020 Vol.40 (7): 2009-2015 [Abstract] (428) [HTML 1 KB] [PDF 1651 KB] (381)
1884 WANG Minrui, GAO Shu, YUAN Ziyong, YUAN Lei
  Sequence generation model with dynamic routing for multi-label text classification
    Journal of Computer Applications   2020 Vol.40 (7): 1884-1890 [Abstract] (507) [HTML 1 KB] [PDF 978 KB] (735)
3249 JIN Xin, WAN Taochun, LYU Chengmei, WANG Chengtian, CHEN Fulong, ZHAO Chuanxin
  Privacy preservation algorithm of original data in mobile crowd sensing
    Journal of Computer Applications   2020 Vol.40 (11): 3249-3254 [Abstract] (431) [HTML 1 KB] [PDF 631 KB] (560)
2804 LIU Ran, LIU Yu, GU Jinguang
  Improved AdaNet based on adaptive learning rate optimization
    Journal of Computer Applications   2020 Vol.40 (10): 2804-2810 [Abstract] (377) [HTML 1 KB] [PDF 1134 KB] (669)
3203 CHENG Qiwei, CHEN Qimai, HE Chaobo, LIU Hai
  Overlapping community detection method based on improved symmetric binary nonnegative matrix factorization
    Journal of Computer Applications   2020 Vol.40 (11): 3203-3210 [Abstract] (399) [HTML 1 KB] [PDF 750 KB] (431)
3048 YAO Lu, SONG Huihui, ZHANG Kaihua
  Mixed-order channel attention network for single image super-resolution reconstruction
    Journal of Computer Applications   2020 Vol.40 (10): 3048-3053 [Abstract] (324) [HTML 1 KB] [PDF 3787 KB] (550)
3133 WANG Haipeng, JIANG Ailian, LI Pengxiang
  Newton-soft threshold iteration algorithm for robust principal component analysis
    Journal of Computer Applications   2020 Vol.40 (11): 3133-3138 [Abstract] (409) [HTML 1 KB] [PDF 3222 KB] (618)
1856 WU Chongshu, LIN Lin, XUE Yunjing, SHI Peng
  Hierarchical segmentation of pathological images based on self-supervised learning
    Journal of Computer Applications   2020 Vol.40 (6): 1856-1862 [Abstract] (926) [HTML 1 KB] [PDF 2378 KB] (833)
1842 WU Yiyuan, LIAN Peikun, GUO Jiangang, LAI Yuanwen, KANG Yaling
  Optimization method of incremental split selection based on video queue length management
    Journal of Computer Applications   2020 Vol.40 (6): 1842-1849 [Abstract] (367) [HTML 1 KB] [PDF 1558 KB] (619)
1824 FU Lei, REN Dejun, WU Huayun, GAO Ming, QIU Lyu, HU Yunqi
  Real-time segmentation algorithm for bubble defects of plastic bottle based on improved Fast-SCNN
    Journal of Computer Applications   2020 Vol.40 (6): 1824-1829 [Abstract] (514) [HTML 1 KB] [PDF 756 KB] (525)
1806 QIANG Baohua, ZHAI Yijie, CHEN Jinlong, XIE Wu, ZHENG Hong, WANG Xuewen, ZHANG Shihao
  Lightweight human skeleton key point detection model based on improved convolutional pose machines and SqueezeNet
    Journal of Computer Applications   2020 Vol.40 (6): 1806-1811 [Abstract] (681) [HTML 1 KB] [PDF 1242 KB] (526)
1799 ZHANG Jiagang, LI Daping, YANG Xiaodong, ZOU Maoyang, WU Xi, HU Jinrong
  Deformable medical image registration algorithm based on deep convolution feature optical flow
    Journal of Computer Applications   2020 Vol.40 (6): 1799-1805 [Abstract] (555) [HTML 1 KB] [PDF 1420 KB] (570)
1774 ZHANG Jie, CHANG Tianqing, DAI Wenjun, GUO Libin, ZHANG Lei
  Object tracking algorithm based on correlation filtering and color probability model
    Journal of Computer Applications   2020 Vol.40 (6): 1774-1782 [Abstract] (362) [HTML 1 KB] [PDF 3751 KB] (398)
1769 SUN Jianjun, XU Yan
  Estimation of underdetermined mixing matrix based on improved weighted fuzzy C-means clustering
    Journal of Computer Applications   2020 Vol.40 (6): 1769-1773 [Abstract] (337) [HTML 1 KB] [PDF 1377 KB] (444)
1763 ZHANG Haoran, WANG Xueyuan, LI Xiaoxia
  Low SNR denoising algorithm based on adaptive voice activity detection and minimum mean-square error log-spectral amplitude estimation
    Journal of Computer Applications   2020 Vol.40 (6): 1763-1768 [Abstract] (447) [HTML 1 KB] [PDF 2132 KB] (507)
1698 AN Xin, XIA Jinwei, YANG Haijiao, OUYANG Yiming, REN Fuji
  Discrete controller synthesis based resource management method of heterogeneous multi-core processor system
    Journal of Computer Applications   2020 Vol.40 (6): 1698-1706 [Abstract] (383) [HTML 1 KB] [PDF 905 KB] (356)
1685 ZHANG Daowei, DUAN Haixin
  Website fingerprinting technique based on image texture
    Journal of Computer Applications   2020 Vol.40 (6): 1685-1691 [Abstract] (595) [HTML 1 KB] [PDF 1070 KB] (532)
1627 NIU Chunyan, XIA Kewen, ZHANG Jiangnan, HE Ziping
  Extreme learning machine algorithm based on cloud quantum flower pollination
    Journal of Computer Applications   2020 Vol.40 (6): 1627-1632 [Abstract] (444) [HTML 1 KB] [PDF 919 KB] (433)
1607 WANG Benjie, NONG Liping, ZHANG Wenhui, LIN Jiming, WANG Junyi
  3D point cloud classification and segmentation network based on Spider convolution
    Journal of Computer Applications   2020 Vol.40 (6): 1607-1612 [Abstract] (683) [HTML 1 KB] [PDF 689 KB] (951)
1601 XUE Lu, SONG Wei
  Relation extraction method based on dynamic label
    Journal of Computer Applications   2020 Vol.40 (6): 1601-1606 [Abstract] (365) [HTML 1 KB] [PDF 708 KB] (386)
1587 CAO Jianfang, ZHAO Aidi, ZHANG Zibang
  Application of convolutional neural network with threshold optimization in image annotation
    Journal of Computer Applications   0 Vol. (): 1587-1592 [Abstract] (471) [HTML 1 KB] [PDF 695 KB] (647)
1580 YANG Guofeng, YANG Yong
  Question classification of common crop disease question answering system based on BERT
    Journal of Computer Applications   2020 Vol.40 (6): 1580-1586 [Abstract] (745) [HTML 1 KB] [PDF 719 KB] (874)
1553 HU Min, BAI Xue, XU Wei, WU Bingjian
  Review of anomaly detection algorithms for multidimensional time series
    Journal of Computer Applications   2020 Vol.40 (6): 1553-1564 [Abstract] (1541) [HTML 1 KB] [PDF 930 KB] (3322)
3236 YUAN Chi
  Identity-based dynamic clustering authentication algorithm for wireless sensor networks
    Journal of Computer Applications   2020 Vol.40 (11): 3236-3241 [Abstract] (347) [HTML 1 KB] [PDF 572 KB] (443)
3332 FENG Tao, CHEN Bin, ZHANG Yuefei
  Chromosome image segmentation framework based on improved Mask R-CNN
    Journal of Computer Applications   2020 Vol.40 (11): 3332-3339 [Abstract] (739) [HTML 1 KB] [PDF 2168 KB] (870)
3242 LI Kunming, WANG Chaoqian, NI Weiwei, BAO Xiaohan
  High-precision histogram publishing method based on differential privacy
    Journal of Computer Applications   2020 Vol.40 (11): 3242-3248 [Abstract] (477) [HTML 1 KB] [PDF 626 KB] (547)
3088 ZHANG Xiaobo, YANG Yan, LI Tianrui, LU Fan, PENG Lilan
  Early diagnosis and prediction of Parkinson's disease based on clustering medical text data
    Journal of Computer Applications   2020 Vol.40 (10): 3088-3094 [Abstract] (478) [HTML 1 KB] [PDF 1270 KB] (961)
2838 WANG Kun, ZHENG Yi, FANG Shuya, LIU Shouyin
  Long text aspect-level sentiment analysis based on text filtering and improved BERT
    Journal of Computer Applications   2020 Vol.40 (10): 2838-2844 [Abstract] (1105) [HTML 1 KB] [PDF 1014 KB] (1035)
3229 YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen
  Detection method of physical-layer impersonation attack based on deep Q-network in edge computing
    Journal of Computer Applications   2020 Vol.40 (11): 3229-3235 [Abstract] (483) [HTML 1 KB] [PDF 845 KB] (642)
3060 DU Nianmao, XU Jiachen, XIAO Zhiyong
  Undersampled brain magnetic resonance image reconstruction method based on convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (10): 3060-3065 [Abstract] (423) [HTML 1 KB] [PDF 3713 KB] (892)
3340 WEI Xiaona, XING Jiaqi, WANG Zhenyu, WANG Yingshan, SHI Jie, ZHAO Di, WANG Hongzhi
  Magnetic resonance image segmentation of articular synovium based on improved U-Net
    Journal of Computer Applications   2020 Vol.40 (11): 3340-3345 [Abstract] (411) [HTML 1 KB] [PDF 901 KB] (659)
3000 YUAN Zhixin, ZHOU Yanling
  Unambiguous tracking method of AltBOC (15, 10) signal based on combined correlation function
    Journal of Computer Applications   2020 Vol.40 (10): 3000-3005 [Abstract] (376) [HTML 1 KB] [PDF 1183 KB] (417)
3306 ZHOU Jian, HUANG Zhangjin
  3D face reconstruction and dense face alignment method based on improved 3D morphable model
    Journal of Computer Applications   2020 Vol.40 (11): 3306-3313 [Abstract] (466) [HTML 1 KB] [PDF 2638 KB] (659)
3054 ZONG Chunmei, ZHANG Yueqin, CAO Jianfang, ZHAO Qingshan
  Compressed sensing magnetic resonance imaging based on deep priors and non-local similarity
    Journal of Computer Applications   2020 Vol.40 (10): 3054-3059 [Abstract] (440) [HTML 1 KB] [PDF 1058 KB] (459)
2822 SHI Guoqiang, ZHAO Xia
  Object tracking algorithm based on jointly-optimized strong-coupled Siamese region proposal network
    Journal of Computer Applications   2020 Vol.40 (10): 2822-2830 [Abstract] (418) [HTML 1 KB] [PDF 2660 KB] (518)
2904 QI Yongjun, GU Junhua, ZHANG Yajuan, WANG Feng, TIAN Zepei
  Deep mixed convolution model for pulmonary nodule detection
    Journal of Computer Applications   2020 Vol.40 (10): 2904-2909 [Abstract] (483) [HTML 1 KB] [PDF 1572 KB] (763)
2392 GAO Haijun, ZENG Xiangyin, PAN Dazhi, ZHENG Bochuan
  Rectal tumor segmentation method based on improved U-Net model
    Journal of Computer Applications   2020 Vol.40 (8): 2392-2397 [Abstract] (731) [HTML 1 KB] [PDF 1307 KB] (1123)
2817 ZHU Qianqian, LIU Yuan, LI Fu
  Bio-inspired matrix reduction and quantization method for deep neural network
    Journal of Computer Applications   2020 Vol.40 (10): 2817-2821 [Abstract] (371) [HTML 1 KB] [PDF 1067 KB] (648)
2137 CHEN Xiukai, LU Zhihua, ZHOU Yu
  Speech separation algorithm based on convolutional encoder decoder and gated recurrent unit
    Journal of Computer Applications   2020 Vol.40 (7): 2137-2141 [Abstract] (400) [HTML 1 KB] [PDF 830 KB] (650)
1996 WANG Lei
  Network intrusion detection method based on improved rough set attribute reduction and K-means clustering
    Journal of Computer Applications   2020 Vol.40 (7): 1996-2002 [Abstract] (416) [HTML 1 KB] [PDF 1071 KB] (536)
1873 ZHAO Xiaohu, ZHAO Chenglong
  Knowledge base question answering system based on multi-feature semantic matching
    Journal of Computer Applications   2020 Vol.40 (7): 1873-1878 [Abstract] (547) [HTML 1 KB] [PDF 880 KB] (831)
2142 CAO Cejun, LIU Ju
  Overview of modeling method of emergency organization decision in disaster operations management
    Journal of Computer Applications   2020 Vol.40 (7): 2142-2149 [Abstract] (446) [HTML 1 KB] [PDF 1082 KB] (710)
2973 CHEN Yi, ZHANG Meijing, XU Fajian
  Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (10): 2973-2979 [Abstract] (476) [HTML 1 KB] [PDF 1225 KB] (541)
2845 WANG Jian, TANG Shan, HUANG Yuxin, YU Zhengtao
  Chinese-Vietnamese bilingual multi-document news opinion sentence recognition based on sentence association graph
    Journal of Computer Applications   2020 Vol.40 (10): 2845-2849 [Abstract] (409) [HTML 1 KB] [PDF 815 KB] (483)
1483 TAN Wenan, WANG Hui
  Scheme and platform of trusted fund-raising and donation based on smart contract
    Journal of Computer Applications   2020 Vol.40 (5): 1483-1487 [Abstract] (679) [HTML 1 KB] [PDF 1060 KB] (1126)
1529 ZHU Xingdong, TIAN Shaobing, HUANG Kui, FAN Jiali, WANG Zheng, CHENG Huacheng
  Target detection of carrier-based aircraft based on deep convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (5): 1529-1533 [Abstract] (460) [HTML 1 KB] [PDF 823 KB] (454)
1488 CAO Yu, WANG Cheng, WANG Xin, GAO Yueer
  Urban road short-term traffic flow prediction based on spatio-temporal node selection and deep learning
    Journal of Computer Applications   2020 Vol.40 (5): 1488-1493 [Abstract] (570) [HTML 1 KB] [PDF 712 KB] (657)
1470 HUANG Jie, CHAOXIA Chenyu, DONG Xiangyu, GAO Yun, ZHU Jun, YANG Bo, ZHANG Fei, SHANG Weiwei
  Faster R-CNN based color-guided flame detection
    Journal of Computer Applications   2020 Vol.40 (5): 1470-1475 [Abstract] (668) [HTML 1 KB] [PDF 947 KB] (697)
1465 CHENG Guangtao, GONG Jiachang, LI Jian
  Smoke recognition method based on dense convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (5): 1465-1469 [Abstract] (444) [HTML 1 KB] [PDF 847 KB] (404)
1460 XIAO He, LIU Zhiqin, WANG Qingfeng, HUANG Jun, ZHOU Ying, LIU Qiyu, XU Weiyun
  Mass and calcification classification method in mammogram based on multi-view transfer learning
    Journal of Computer Applications   2020 Vol.40 (5): 1460-1464 [Abstract] (442) [HTML 1 KB] [PDF 1943 KB] (368)
1453 ZENG Zhaoxin, LIU Jun
  Microscopic image segmentation method of C.elegans based on deep learning
    Journal of Computer Applications   2020 Vol.40 (5): 1453-1459 [Abstract] (506) [HTML 1 KB] [PDF 2638 KB] (579)
1421 YU Guangji, LUO Weitai, WU Xiaoyun
  Illumination calculation for large-scale scene based on improved voxel cone tracking
    Journal of Computer Applications   2020 Vol.40 (5): 1421-1424 [Abstract] (510) [HTML 1 KB] [PDF 724 KB] (425)
1415 ZHANG Yifei, LI Xinfu, TIAN Xuedong
  Stereo matching algorithm based on image segmentation
    Journal of Computer Applications   2020 Vol.40 (5): 1415-1420 [Abstract] (533) [HTML 1 KB] [PDF 1843 KB] (437)
1409 WANG Jiangkun, HE Kunjin, CAO Hongfei, WANG Jinqiang, ZHANG Yan
  Interactive water flow heating simulation based on smoothed particle hydrodynamics method
    Journal of Computer Applications   2020 Vol.40 (5): 1409-1414 [Abstract] (420) [HTML 1 KB] [PDF 2338 KB] (520)
1403 ZHOU Xiang, TANG Liyu, LIN Ding
  Virtual-real registration method of natural features based on binary robust invariant scalable keypoints and speeded up robust features
    Journal of Computer Applications   2020 Vol.40 (5): 1403-1408 [Abstract] (408) [HTML 1 KB] [PDF 1572 KB] (421)
1392 WANG Yueping, XU Tao
  User association mechanism based on evolutionary game
    Journal of Computer Applications   2020 Vol.40 (5): 1392-1396 [Abstract] (384) [HTML 1 KB] [PDF 546 KB] (331)
1369 PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun
  Design and implementation of Lite register model
    Journal of Computer Applications   2020 Vol.40 (5): 1369-1373 [Abstract] (370) [HTML 1 KB] [PDF 2258 KB] (391)
1354 LI Tianzheng, WANG Chuntao
  Lossy compression algorithm for encrypted binary images using Markov random field
    Journal of Computer Applications   2020 Vol.40 (5): 1354-1363 [Abstract] (372) [HTML 1 KB] [PDF 1082 KB] (350)
1348 WU Liren, LIU Zhenghao, ZHANG Hao, CEN Yueliang, ZHOU Wei
  PS-MIFGSM: focus image adversarial attack algorithm
    Journal of Computer Applications   2020 Vol.40 (5): 1348-1353 [Abstract] (763) [HTML 1 KB] [PDF 1400 KB] (738)
1340 WU Zhijun, WANG Hang
  System wide information management emergency response mechanism based on subscribe/publish service
    Journal of Computer Applications   2020 Vol.40 (5): 1340-1347 [Abstract] (370) [HTML 1 KB] [PDF 1095 KB] (472)
1315 XU Dai, YUE Zhang, YANG Wenxia, REN Xiao
  Tampered image recognition based on improved three-stream Faster R-CNN
    Journal of Computer Applications   2020 Vol.40 (5): 1315-1321 [Abstract] (569) [HTML 1 KB] [PDF 1699 KB] (547)
1309 CAO Xiaowei, QU Zhijian, XU Lingling, LIU Xiaohong
  3D model recognition based on capsule network
    Journal of Computer Applications   2020 Vol.40 (5): 1309-1314 [Abstract] (559) [HTML 1 KB] [PDF 2645 KB] (509)
1301 WANG Yiding, HAO Chenyu, LI Yaoli, CAI Shaoqing, YUAN Yuan
  Microscopic image identification for small-sample Chinese medicinal materials powder based on deep learning
    Journal of Computer Applications   2020 Vol.40 (5): 1301-1308 [Abstract] (644) [HTML 1 KB] [PDF 1619 KB] (771)
1291 YANG Yan, LIU Shengjian, ZHOU Yongquan
  Greedy binary lion swarm optimization algorithm for solving multidimensional knapsack problem
    Journal of Computer Applications   2020 Vol.40 (5): 1291-1294 [Abstract] (804) [HTML 1 KB] [PDF 537 KB] (564)
1278 YANG Yunting, WANG Peng
  Multi-scale quantum free particle optimization algorithm for solving travelling salesman problem
    Journal of Computer Applications   2020 Vol.40 (5): 1278-1283 [Abstract] (430) [HTML 1 KB] [PDF 478 KB] (572)
1272 YI Dongyi, DENG Genqiang, DONG Chaoxiong, ZHU Miaomiao, LYU Zhouping, ZHU Suisong
  Medical insurance fraud detection algorithm based on graph convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (5): 1272-1277 [Abstract] (1191) [HTML 1 KB] [PDF 2297 KB] (1096)
1260 CHEN Chengjun, MAO Yingchi, WANG Yichao
  CNN model compression based on activation-entropy based layer-wise iterative pruning strategy
    Journal of Computer Applications   2020 Vol.40 (5): 1260-1265 [Abstract] (379) [HTML 1 KB] [PDF 718 KB] (473)
2811 LEI Xiaokang, YIN Zhigang, ZHAO Ruilian
  FPGA-based convolutional neural network fixed-point acceleration
    Journal of Computer Applications   2020 Vol.40 (10): 2811-2816 [Abstract] (659) [HTML 1 KB] [PDF 1063 KB] (913)
2299 WANG Shouhua, WU Lirong, JI Yuanfa, SUN Xiyan
  Fast ambiguity resolution method based on lattice theory
    Journal of Computer Applications   2020 Vol.40 (8): 2299-2304 [Abstract] (454) [HTML 1 KB] [PDF 1080 KB] (397)
2182 ZHANG Xinyi, FENG Shimin, DING Enjie
  Entity recognition and relation extraction model for coal mine
    Journal of Computer Applications   2020 Vol.40 (8): 2182-2188 [Abstract] (519) [HTML 1 KB] [PDF 1096 KB] (691)
1901 TIAN Baojun, LIU Shuang, FANG Jiandong
  Hybrid recommendation algorithm by fusion of topic information and convolution neural network
    Journal of Computer Applications   2020 Vol.40 (7): 1901-1907 [Abstract] (497) [HTML 1 KB] [PDF 1419 KB] (633)
2189 HE Hansen, SUN Guozi
  Fake news content detection model based on feature aggregation
    Journal of Computer Applications   2020 Vol.40 (8): 2189-2193 [Abstract] (734) [HTML 1 KB] [PDF 845 KB] (950)
2219 LI Shengwu, ZHANG Xuande
  Multi-domain convolutional neural network based on self-attention mechanism for visual tracking
    Journal of Computer Applications   2020 Vol.40 (8): 2219-2224 [Abstract] (671) [HTML 1 KB] [PDF 1092 KB] (491)
2202 CHEN Jiawei, HAN Fang, WANG Zhijie
  Aspect-based sentiment analysis with self-attention gated graph convolutional network
    Journal of Computer Applications   2020 Vol.40 (8): 2202-2206 [Abstract] (589) [HTML 1 KB] [PDF 803 KB] (654)
2214 XIONG Changzhen, LI Yan
  Dynamic weighted siamese network tracking algorithm
    Journal of Computer Applications   2020 Vol.40 (8): 2214-2218 [Abstract] (446) [HTML 1 KB] [PDF 1142 KB] (701)
2358 SHEN Marui, LI Jincheng, ZHANG Ya, ZOU Jian
  Magnetic resonance image reconstruction algorithm via non-convex total variation regularization
    Journal of Computer Applications   2020 Vol.40 (8): 2358-2364 [Abstract] (576) [HTML 1 KB] [PDF 10893 KB] (231)
2460 XIE Yunxia, HUANG Haiyu, HU Jianbin
  Staging and lesion detection of diabetic retinopathy based on deep convolution neural network
    Journal of Computer Applications   2020 Vol.40 (8): 2460-2464 [Abstract] (604) [HTML 1 KB] [PDF 2044 KB] (554)
2525 YIN Chunyong, HE Miao
  Text classification based on improved capsule network
    Journal of Computer Applications   2020 Vol.40 (9): 2525-2530 [Abstract] (1146) [HTML 1 KB] [PDF 952 KB] (1236)
1977 CONG Jing, WEI Yongzhuang, LIU Zhenghong
  Stepwise correlation power analysis of SM4 cryptographic algorithm
    Journal of Computer Applications   2020 Vol.40 (7): 1977-1982 [Abstract] (541) [HTML 1 KB] [PDF 1949 KB] (574)
2155 GAO Yilu, HU Zhihua
  Path planning for automated guided vehicles based on tempo-spatial network at automated container terminal
    Journal of Computer Applications   2020 Vol.40 (7): 2155-2163 [Abstract] (486) [HTML 1 KB] [PDF 1282 KB] (708)
2110 SHI Lukui, MA Hongqi, ZHANG Chaozong, FAN Shiyan
  Detection method of pulmonary nodules based on improved residual structure
    Journal of Computer Applications   2020 Vol.40 (7): 2110-2116 [Abstract] (471) [HTML 1 KB] [PDF 2429 KB] (513)
0
  Video impulse noise removal method based on global and non-local low rank decomposition
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (173) [HTML 1 KB] [PDF 0 KB] (23)
0
  Image caption model based on attention feature adaptive recalibration
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (230) [HTML 1 KB] [PDF 0 KB] (17)
0
  Lightweight face recognition algorithm based on MobieNetV2
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (587) [HTML 1 KB] [PDF 0 KB] (24)
0
  Opinion extraction and clustering of students’ teaching evaluation text based on sentiment analysis
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (298) [HTML 1 KB] [PDF 0 KB] (28)
0
  Feature extraction method of gesture image based on cascaded convolutional neural network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (232) [HTML 1 KB] [PDF 0 KB] (23)
0
  Solving best spanning tree based on extension analytic hierarchy process
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (137) [HTML 1 KB] [PDF 0 KB] (24)
2910 ZHANG Zelin, XU Jun
  Automatic segmentation of breast epithelial and stromal regions based on conditional generative adversarial network
    Journal of Computer Applications   2020 Vol.40 (10): 2910-2916 [Abstract] (339) [HTML 1 KB] [PDF 7615 KB] (391)
0 LIAO Yun,DUAN Qing,LIU Junhui,ZHOU Hao
  Water line detection algorithm based on deep learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (803) [HTML 1 KB] [PDF 0 KB] (32)
0 ZHANG Huali,KANG Xiaodong,LI Bo,WANG Yage,LIU Hanqing,BAI Fang
  Medical name entity recognition based on Bi-LSTM-CRF and attention mechanism
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (783) [HTML 1 KB] [PDF 0 KB] (47)
0 DAI Jin,WU Feng
  Speech teaching App based on speech recognition
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (201) [HTML 1 KB] [PDF 0 KB] (30)
0 FENG Wei,XIE Dongxiu
  Low rank matrix approximation with weighted nuclear norm and its application
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (170) [HTML 1 KB] [PDF 0 KB] (26)
0 XU Yiliu,HE Peng,REN Dong,WANG Hui,DONG Ting,SHAO Pan
  Timeber transport vehicle detection based on improved faster RCNN
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (353) [HTML 1 KB] [PDF 0 KB] (17)
0 FANG Chenchen,SHI Fanhuai
  Image recognition of tomato diseases based on improved deep residual network
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (277) [HTML 1 KB] [PDF 0 KB] (30)
0
  Adaptive video analysis in edge computing
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (164) [HTML 1 KB] [PDF 0 KB] (24)
0
  Prediction of mango yield based on self-attention CNN and bidirectional GRU
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (381) [HTML 1 KB] [PDF 0 KB] (23)
0
  Design of lightweight convolutional neural network based on MobileNet and YOLOv3
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (664) [HTML 1 KB] [PDF 0 KB] (34)
0
  Simulation of computer room temperature and air conditioning energy saving based on computational fluid dynamics model
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (267) [HTML 1 KB] [PDF 0 KB] (25)
0
  Joint maritime search and rescue plan evaluation based on analytic hierachy process,additive ratio assessment and multi-choice goal programming
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (229) [HTML 1 KB] [PDF 0 KB] (28)
0
  Research and implementation of OBJ model imported into industrial simulation system dynamically
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (231) [HTML 1 KB] [PDF 0 KB] (32)
0
  Fault-tolerant resource provisioning for data-intensive applications in cloud environment
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (206) [HTML 1 KB] [PDF 0 KB] (29)
1919 HU Xuemin, CHENG Yu, CHEN Guowen, ZHANG Ruohan, TONG Xiuchi
  Motion planning for autonomous driving with directional navigation based on deep spatio-temporal Q-network
    Journal of Computer Applications   2020 Vol.40 (7): 1919-1925 [Abstract] (500) [HTML 1 KB] [PDF 2633 KB] (664)
2881 CHEN Lichao, ZHANG Lei, CAO Jianfang, ZHANG Rui
  Vehicle classification based on HOG-C CapsNet in traffic surveillance scenarios
    Journal of Computer Applications   2020 Vol.40 (10): 2881-2889 [Abstract] (355) [HTML 1 KB] [PDF 3651 KB] (415)
3041 OUYANG Ning, WEI Yu, LIN Leping
  Image super-resolution reconstruction method combining perceptual edge constraint and multi-scale fusion network
    Journal of Computer Applications   2020 Vol.40 (10): 3041-3047 [Abstract] (380) [HTML 1 KB] [PDF 4821 KB] (338)
2345 LIN Jing, HUANG Yuqing, LI Leimin
  Image super-resolution reconstruction based on spherical moment matching and feature discrimination
    Journal of Computer Applications   2020 Vol.40 (8): 2345-2350 [Abstract] (435) [HTML 1 KB] [PDF 1395 KB] (469)
2104 CHEN Hao, QIN Zhiguang, DING Yi
  Multi-modal brain tumor segmentation method under same feature space
    Journal of Computer Applications   2020 Vol.40 (7): 2104-2109 [Abstract] (484) [HTML 1 KB] [PDF 874 KB] (583)
2917 CHENG Kai, WANG Yan, LIU Jianfei
  Semi-supervised learning method for automatic nuclei segmentation using generative adversarial network
    Journal of Computer Applications   2020 Vol.40 (10): 2917-2922 [Abstract] (554) [HTML 1 KB] [PDF 3833 KB] (574)
1045 CHEN Lichao, ZHENG Jiamin, CAO Jianfang, PAN Lihu, ZHANG Rui
  Intelligent traffic sign recognition method based on capsule network
    Journal of Computer Applications   2020 Vol.40 (4): 1045-1049 [Abstract] (587) [HTML 1 KB] [PDF 864 KB] (681)
2899 GAO Ming, REN Dejun, HU Yunqi, FU Lei, QIU Lyu
  Ampoule packaging quality inspection algorithm based on machine vision and lightweight neural network
    Journal of Computer Applications   2020 Vol.40 (10): 2899-2903 [Abstract] (502) [HTML 1 KB] [PDF 1784 KB] (466)
2555 SONG Yifan, ZHANG Peng, ZONG Libo, MA Bo, LIU Libo
  Improved redundant point filtering-based 3D object detection method
    Journal of Computer Applications   2020 Vol.40 (9): 2555-2560 [Abstract] (490) [HTML 1 KB] [PDF 1674 KB] (523)
2069 HU Xueying, GUO Hairu, ZHU Rong
  Image super-resolution reconstruction based on hybrid deep convolutional network
    Journal of Computer Applications   2020 Vol.40 (7): 2069-2076 [Abstract] (491) [HTML 1 KB] [PDF 1446 KB] (949)
2754 ZHAO Chuan, MIAO Liye, YANG Haoxiong, HE Mingke
  Interactive dynamic optimization of dual-channel supply chain inventory under stochastic demand
    Journal of Computer Applications   2020 Vol.40 (9): 2754-2761 [Abstract] (391) [HTML 1 KB] [PDF 1530 KB] (763)
335 Cui LI, Qingkui CHEN
  Dynamic monitoring model based on DPDK parallel communication
    Journal of Computer Applications   2020 Vol.40 (2): 335-341 [Abstract] (446) [HTML 0 KB] [PDF 846 KB] (349)
162 WANG Bo, CAI Honghao, SU Yang
  Classification of malicious code variants based on VGGNet
    Journal of Computer Applications   2020 Vol.40 (1): 162-167 [Abstract] (578) [HTML 1 KB] [PDF 897 KB] (474)
23 HUANG Youwen, YOU Yadong, ZHAO Peng
  Image caption generation model with convolutional attention mechanism
    Journal of Computer Applications   2020 Vol.40 (1): 23-27 [Abstract] (494) [HTML 1 KB] [PDF 810 KB] (615)
3639 LIANG Bai'ou
  Flowchart automatic generation algorithm base on Sugiyama
    Journal of Computer Applications   2019 Vol.39 (12): 3639-3643 [Abstract] (892) [HTML 1 KB] [PDF 749 KB] (412)
3456 LIU Yalong, LI Jie, WANG Ying, WU Saifei, ZOU Pei
  Segmentation model of neonatal punctate white matter lesion based on refined deep residual U-Net
    Journal of Computer Applications   2019 Vol.39 (12): 3456-3461 [Abstract] (559) [HTML 1 KB] [PDF 1112 KB] (398)
947 ZHAO Wei, ZHANG Wenyin, WANG Jiuru, WANG Haifeng, WU Chuankun
  Smart contract vulnerability detection scheme based on symbol execution
    Journal of Computer Applications   2020 Vol.40 (4): 947-953 [Abstract] (1413) [HTML 1 KB] [PDF 775 KB] (1502)
1030 ZHANG Kailin, YAN Qing, XIA Yi, ZHANG Jun, DING Yun
  Semi-supervised hyperspectral image classification based on focal loss
    Journal of Computer Applications   2020 Vol.40 (4): 1030-1037 [Abstract] (681) [HTML 1 KB] [PDF 3567 KB] (549)
1127 GUAN Hao, QIN Xiaolin, RAO Yongsheng, CAO Sheng
  Domain model of Web-based dynamic geometry software and its applications
    Journal of Computer Applications   2020 Vol.40 (4): 1127-1132 [Abstract] (583) [HTML 1 KB] [PDF 1285 KB] (600)
1237 SUN Peng, XIAO Jing, ZHAO Haimeng, LIU Fan, YAN Lei, ZHAO Hongying
  Design and implementation of SIFT algorithm for UAV remote sensing image based on DSP platform
    Journal of Computer Applications   2020 Vol.40 (4): 1237-1242 [Abstract] (1076) [HTML 1 KB] [PDF 1347 KB] (921)
571 Jiangfeng XU, Yulong TAN
  Optimization of multidimensional index query mechanism based on HBase
    Journal of Computer Applications   2020 Vol.40 (2): 571-577 [Abstract] (557) [HTML 0 KB] [PDF 1005 KB] (362)
942 ZHAO Yulong, NIU Baoning, LI Peng, FAN Xing
  Blockchain enhanced lightweight node model
    Journal of Computer Applications   2020 Vol.40 (4): 942-946 [Abstract] (841) [HTML 1 KB] [PDF 632 KB] (840)
990 LIU Shangwang, LIU Chengwei, ZHANG Aili
  Real-time facial expression and gender recognition based on depthwise separable convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (4): 990-995 [Abstract] (1004) [HTML 1 KB] [PDF 1052 KB] (844)
1091 XUE Feng, SHI Xuhua, SHI Feifan
  Surrogate-based differential evolution constrained optimization
    Journal of Computer Applications   2020 Vol.40 (4): 1091-1096 [Abstract] (520) [HTML 1 KB] [PDF 641 KB] (671)
1104 XU Zhiqiang, JIANG Tiegang, YANG Libo
  Stochastic support selection based generalized orthogonal matching pursuit algorithm
    Journal of Computer Applications   2020 Vol.40 (4): 1104-1108 [Abstract] (362) [HTML 1 KB] [PDF 797 KB] (386)
698 ZHU Zhe, XU Shaohua
  Denoising autoencoder deep convolution process neural network and its application in time-varying signal classification
    Journal of Computer Applications   2020 Vol.40 (3): 698-703 [Abstract] (611) [HTML 1 KB] [PDF 709 KB] (511)
3233 TAN Yang, TANG Dequan, CAO Shoufu
  Many-objective particle swarm optimization algorithm based on hyper-spherical fuzzy dominance
    Journal of Computer Applications   2019 Vol.39 (11): 3233-3241 [Abstract] (432) [HTML 1 KB] [PDF 1319 KB] (385)
1109 SHEN Liang, WANG Xin, CHEN Shuhui
  Structural signature extraction method for mobile application recognition
    Journal of Computer Applications   2020 Vol.40 (4): 1109-1114 [Abstract] (653) [HTML 1 KB] [PDF 1236 KB] (498)
735 FENG Liping, HAN Qi, ZHOU Zhigang, BAI Zengliang
  Bad information diffusion modeling and optimal control strategy influenced by social networks
    Journal of Computer Applications   2020 Vol.40 (3): 735-739 [Abstract] (610) [HTML 1 KB] [PDF 585 KB] (347)
996 XIAO Shihua, SANG Nan, WANG Xupeng
  3D point cloud head pose estimation based on deep learning
    Journal of Computer Applications   2020 Vol.40 (4): 996-1001 [Abstract] (1060) [HTML 1 KB] [PDF 794 KB] (730)
1223 MAO Minli, LIANG Chengji, HU Xiaoyuan
  Optimization of quay crane assignment based on ship efficiency
    Journal of Computer Applications   2020 Vol.40 (4): 1223-1230 [Abstract] (597) [HTML 1 KB] [PDF 1246 KB] (871)
465 Dong MA, Hongmei CHEN, Lizhen WANG, Qing XIAO
  Dominant feature mining of spatial sub-prevalent co-location patterns
    Journal of Computer Applications   2020 Vol.40 (2): 465-472 [Abstract] (471) [HTML 0 KB] [PDF 1839 KB] (342)
547 Fuxin LIU, Jingwei LI, Yihong WANG, Lin LI
  Design and implementation of cloud native massive data storage system based on Kubernetes
    Journal of Computer Applications   2020 Vol.40 (2): 547-552 [Abstract] (818) [HTML 0 KB] [PDF 560 KB] (649)
1177 SONG Yun, ZHANG Yuanke, LU Hongbing, XING Yuxiang, MA Jianhua
  Regional-content-aware nuclear norm for low-does CT image denosing
    Journal of Computer Applications   2020 Vol.40 (4): 1177-1183 [Abstract] (482) [HTML 1 KB] [PDF 5420 KB] (351)
1196 WANG Yan, HE Hongke
  Improved fuzzy c-means MRI segmentation based on neighborhood information
    Journal of Computer Applications   2020 Vol.40 (4): 1196-1201 [Abstract] (497) [HTML 1 KB] [PDF 1675 KB] (452)
1151 SHI Zhiliang, CAI Wangyue, WANG Guoqiang, XIONG Linjie
  Intrinsic shape signature algorithm based on adaptive neighborhood
    Journal of Computer Applications   2020 Vol.40 (4): 1151-1156 [Abstract] (636) [HTML 1 KB] [PDF 5956 KB] (422)
1171 GENG Yuanqian, WU Chuansheng, LIU Wen
  Mixed non-convex and non-smooth regularization constraint based blind image restoration
    Journal of Computer Applications   2020 Vol.40 (4): 1171-1176 [Abstract] (529) [HTML 1 KB] [PDF 2187 KB] (410)
1164 WANG Ruiyao, YUE Xueting, ZHOU Zhiqing, GENG Zexun
  Adaptive enhancement algorithm of low illumination image based on maximum difference image decision
    Journal of Computer Applications   2020 Vol.40 (4): 1164-1170 [Abstract] (508) [HTML 1 KB] [PDF 1501 KB] (540)
454 Jing QIN, Qingbo ZHANG, Bin WANG
  Recommendation method with focus on long tail items
    Journal of Computer Applications   2020 Vol.40 (2): 454-458 [Abstract] (972) [HTML 0 KB] [PDF 799 KB] (578)
819 LIN Chuanjian, DENG Wei, TONG Tong, GAO Qinquan
  Blurred video frame interpolation method based on deep voxel flow
    Journal of Computer Applications   2020 Vol.40 (3): 819-824 [Abstract] (513) [HTML 1 KB] [PDF 1085 KB] (528)
1069 WANG Liuyang, YU Yangxin, CHEN Bolun, ZHANG Hui
  Discrimination information method based on consensus and classification for improving document clustering
    Journal of Computer Applications   2020 Vol.40 (4): 1069-1073 [Abstract] (594) [HTML 1 KB] [PDF 886 KB] (522)
954 LI Jing, JING Xu, YANG Huijun
  Blockchain electronic counting scheme based on practical Byzantine fault tolerance algorithm
    Journal of Computer Applications   2020 Vol.40 (4): 954-960 [Abstract] (405) [HTML 1 KB] [PDF 743 KB] (576)
441 Jingfeng GUO, Hui DONG, Tingwei ZHANG, Xiao CHEN
  Representation learning for topic-attention network
    Journal of Computer Applications   2020 Vol.40 (2): 441-447 [Abstract] (337) [HTML 0 KB] [PDF 955 KB] (323)
392 Zhiyang ZENG, Yan CHEN, Ke WANG
  Design and implementation of parallel genetic algorithm for cutting stock of circular parts
    Journal of Computer Applications   2020 Vol.40 (2): 392-397 [Abstract] (364) [HTML 0 KB] [PDF 658 KB] (323)
621 XIE Binhong, ZHONG Rixin, PAN Lihu, ZHANG Yingjun
  Accelerated compression method for convolutional neural network combining with pruning and stream merging
    Journal of Computer Applications   2020 Vol.40 (3): 621-625 [Abstract] (565) [HTML 1 KB] [PDF 740 KB] (934)
825 FENG Lang, ZHANG Ling, ZHANG Xiaolong
  Image inpainting based on dilated convolution
    Journal of Computer Applications   2020 Vol.40 (3): 825-831 [Abstract] (522) [HTML 1 KB] [PDF 1069 KB] (548)
426 Ming DU, Anping YANG, Junfeng ZHOU, Ziyang CHEN, Yun YANG
  Optimized algorithm for k-step reachability queries on directed acyclic graphs
    Journal of Computer Applications   2020 Vol.40 (2): 426-433 [Abstract] (502) [HTML 0 KB] [PDF 654 KB] (437)
416 Wenli WU, Guohua LIU, Junbao ZHANG
  Complexity analysis of functional query answering on big data
    Journal of Computer Applications   2020 Vol.40 (2): 416-419 [Abstract] (448) [HTML 0 KB] [PDF 436 KB] (315)
503 Yusheng CHENG, Fan SONG, Yibin WANG, Kun QIAN
  Multi-label feature selection algorithm based on conditional mutual information of expert feature
    Journal of Computer Applications   2020 Vol.40 (2): 503-509 [Abstract] (522) [HTML 0 KB] [PDF 818 KB] (365)
524 Chen CHEN, Shaowu ZHANG, Liang YANG, Dongyu ZHANG, Hongfei LIN
  Analysis of international influence of news media for major social security emergencies
    Journal of Computer Applications   2020 Vol.40 (2): 524-529 [Abstract] (616) [HTML 0 KB] [PDF 1388 KB] (350)
491 Meishu ZHANG, Yabin XU
  Personalized privacy protection method for data with multiple numerical sensitive attributes
    Journal of Computer Applications   2020 Vol.40 (2): 491-496 [Abstract] (474) [HTML 0 KB] [PDF 588 KB] (457)
535 Yue WANG, Mengxuan WANG, Sheng ZHANG, Wen DU
  Alarm text named entity recognition based on BERT
    Journal of Computer Applications   2020 Vol.40 (2): 535-540 [Abstract] (966) [HTML 0 KB] [PDF 642 KB] (1012)
473 Yang LI, Wei ZHANG, Chen PENG
  Target-dependent method for authorship attribution
    Journal of Computer Applications   2020 Vol.40 (2): 473-478 [Abstract] (498) [HTML 0 KB] [PDF 650 KB] (484)
530 Kai DENG, Jiajin HUNAG, Jin QIN
  Item-based unified recommendation model
    Journal of Computer Applications   2020 Vol.40 (2): 530-534 [Abstract] (508) [HTML 0 KB] [PDF 565 KB] (416)
1002 REN Haipei, LI Teng
  FaceYoLo algorithm for face detection on mobile platform
    Journal of Computer Applications   2020 Vol.40 (4): 1002-1008 [Abstract] (1016) [HTML 1 KB] [PDF 1482 KB] (686)
1133 QIU Yunfei, LIU Xing
  Local feature point matching algorithm with anti-affine property
    Journal of Computer Applications   2020 Vol.40 (4): 1133-1137 [Abstract] (430) [HTML 1 KB] [PDF 635 KB] (399)
925 ZHANG Zhancheng, ZHANG Dalong, LUO Xiaoqing
  Pulmonary nodule detection method with semantic feature score
    Journal of Computer Applications   2020 Vol.40 (3): 925-930 [Abstract] (542) [HTML 1 KB] [PDF 632 KB] (402)
677 LI Quan, XU Xinhua, LIU Xinghong, CHEN Qi
  Next location recommendation based on spatiotemporal-aware GRU and attention
    Journal of Computer Applications   2020 Vol.40 (3): 677-682 [Abstract] (790) [HTML 1 KB] [PDF 669 KB] (582)
704 GONG Rui, DING Sheng, ZHANG Chaohua, SU Hao
  Lightweight and multi-pose face recognition method based on deep learning
    Journal of Computer Applications   2020 Vol.40 (3): 704-709 [Abstract] (961) [HTML 1 KB] [PDF 852 KB] (656)
717 LI Dongbo, HUANG Lyuwen
  Reweighted sparse principal component analysis algorithm and its application in face recognition
    Journal of Computer Applications   2020 Vol.40 (3): 717-722 [Abstract] (596) [HTML 1 KB] [PDF 868 KB] (373)
854 LIU Ge, ZHENG Yelong, ZHAO Meirong
  Vehicle information detection based on improved RetinaNet
    Journal of Computer Applications   2020 Vol.40 (3): 854-858 [Abstract] (750) [HTML 1 KB] [PDF 745 KB] (429)
897 CAI Yun, LIU Pengqing, XIONG Hegen
  Berth joint scheduling based on quantum genetic hybrid algorithm
    Journal of Computer Applications   2020 Vol.40 (3): 897-901 [Abstract] (403) [HTML 1 KB] [PDF 623 KB] (258)
595 Xi CHEN, Guang MEI, Jinjin ZHANG, Weisheng XU
  Student grade prediction method based on knowledge graph and collaborative filtering
    Journal of Computer Applications   2020 Vol.40 (2): 595-601 [Abstract] (1021) [HTML 0 KB] [PDF 714 KB] (764)
626 ZENG Yuanpeng, WANG Kaijun, LIN Song
  Interference entropy feature selection method for two-class distinguishing ability
    Journal of Computer Applications   2020 Vol.40 (3): 626-630 [Abstract] (474) [HTML 1 KB] [PDF 977 KB] (473)
740 JIANG Zetao, XU Juanjuan
  Heterogenous cross-domain identity authentication scheme based on signcryption in cloud environment
    Journal of Computer Applications   2020 Vol.40 (3): 740-746 [Abstract] (498) [HTML 1 KB] [PDF 693 KB] (506)
3673 GUO Yihui, HUANG Chenghui, ZHONG Xueling, LU Jiyuan
  Direction-perception feature recognition on mesh model
    Journal of Computer Applications   2019 Vol.39 (12): 3673-3677 [Abstract] (450) [HTML 1 KB] [PDF 840 KB] (313)
3644 XU Dezhi, SUN Jifeng, LUO Shasha
  Vehicle-based image super-resolution reconstruction based on weight quantification and information compression
    Journal of Computer Applications   2019 Vol.39 (12): 3644-3649 [Abstract] (361) [HTML 1 KB] [PDF 992 KB] (307)
304 WANG Zhizhong, LI Hongyi, HAN Chuang
  QRS complex detection algorithm of electrocardiograph based on Shannon energy and adaptive threshold
    Journal of Computer Applications   2020 Vol.40 (1): 304-310 [Abstract] (560) [HTML 1 KB] [PDF 1024 KB] (305)
3548 WANG Jianren, MA Xin, DUAN Ganglong, XUE Hongquan
  Handwritten numeral recognition under edge intelligence background
    Journal of Computer Applications   2019 Vol.39 (12): 3548-3555 [Abstract] (543) [HTML 1 KB] [PDF 1271 KB] (362)
3541 LUO Guoting, LIU Zhiqin, ZHOU Ying, WANG Qingfeng, CHENG Jiezhi, LIU Qiyu
  Pneumothorax detection and localization in X-ray images based on dense convolutional network
    Journal of Computer Applications   2019 Vol.39 (12): 3541-3547 [Abstract] (336) [HTML 1 KB] [PDF 1217 KB] (369)
3703 WANG Xin, GAO Yuan, WANG Bin, SUN Jie, XIANG Jie
  Application of multimodal network fusion in classification of mild cognitive impairment
    Journal of Computer Applications   2019 Vol.39 (12): 3703-3708 [Abstract] (668) [HTML 1 KB] [PDF 997 KB] (483)
3685 JI Yi, SHI Xin, ZHAO Xiangmo
  Car-following model for intelligent connected vehicles based on multiple headway information fusion
    Journal of Computer Applications   2019 Vol.39 (12): 3685-3690 [Abstract] (633) [HTML 1 KB] [PDF 907 KB] (373)
3697 WANG Zhongjie, ZHANG Hong
  Shipping monitoring event recognition based on three-dimensional convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (12): 3697-3702 [Abstract] (411) [HTML 1 KB] [PDF 982 KB] (372)
3528 GAO Yuan, WU Fan, QIN Pinle, WANG Lifang
  Medical image fusion algorithm based on generative adversarial residual network
    Journal of Computer Applications   2019 Vol.39 (12): 3528-3534 [Abstract] (676) [HTML 1 KB] [PDF 1184 KB] (467)
56 CHEN Meiyun, WANG Bisheng, CAO Guo, LIANG Yongbo
  Crowd counting method based on pixel-level attention mechanism
    Journal of Computer Applications   2020 Vol.40 (1): 56-61 [Abstract] (687) [HTML 1 KB] [PDF 1007 KB] (582)
181 SUN Tianqi, HU Jianpeng, HUANG Juan, FAN Ying
  Bandwidth resource prediction and management of Web applications hosted on cloud
    Journal of Computer Applications   2020 Vol.40 (1): 181-187 [Abstract] (377) [HTML 1 KB] [PDF 1217 KB] (577)
3268 LIU Weibo, ZENG Qingning, BU Yuting, ZHENG Zhanheng
  Speech recognition method based on dual micro-array and convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (11): 3268-3273 [Abstract] (529) [HTML 1 KB] [PDF 938 KB] (366)
3604 FENG Wenbo, HONG Zheng, WU Lifa, FU Menglin
  Review of network protocol recognition techniques
    Journal of Computer Applications   2019 Vol.39 (12): 3604-3614 [Abstract] (795) [HTML 1 KB] [PDF 1987 KB] (643)
3482 GUO Mingxiang, SONG Quanjun, XU Zhannan, DONG Jun, XIE Chengjun
  Human behavior recognition algorithm based on three-dimensional residual dense network
    Journal of Computer Applications   2019 Vol.39 (12): 3482-3489 [Abstract] (459) [HTML 1 KB] [PDF 1300 KB] (247)
3535 QIN Pinle, LI Pengbo, ZHANG Ruiping, ZENG Jianchao, LIU Shijie, XU Shaowei
  Automatic recognition algorithm of cervical lymph nodes using adaptive receptive field mechanism
    Journal of Computer Applications   2019 Vol.39 (12): 3535-3540 [Abstract] (477) [HTML 1 KB] [PDF 965 KB] (404)
3490 WANG Xin, ZHANG Xin, NING Chen
  Infrared human target recognition method based on multi-feature dimensionality reduction and transfer learning
    Journal of Computer Applications   2019 Vol.39 (12): 3490-3495 [Abstract] (357) [HTML 1 KB] [PDF 1009 KB] (354)
375 Jie WANG, Rangding WANG, Diqun YAN, Yuzhen LIN
  Detection method for echo hiding based on convolutional neural network framework
    Journal of Computer Applications   2020 Vol.40 (2): 375-380 [Abstract] (440) [HTML 0 KB] [PDF 713 KB] (499)
363 Yening ZHOU, Taoshen LI, Min ZENG, Nan XIAO
  Minimizing transmit power sum of full-duplex relay system with simultaneous wireless information and power transmission
    Journal of Computer Applications   2020 Vol.40 (2): 363-368 [Abstract] (594) [HTML 0 KB] [PDF 718 KB] (331)
566 Xu TENG, Hui ZHANG, Chunming YANG, Xujian ZHAO, Bo LI
  Digital camouflage generation method based on cycle-consistent adversarial network
    Journal of Computer Applications   2020 Vol.40 (2): 566-570 [Abstract] (668) [HTML 0 KB] [PDF 5080 KB] (525)
561 Junhua GU, Feng WANG, Yongjun QI, Zheran SUN, Zepei TIAN, Yajuan ZHANG
  Retrieval method of pulmonary nodule images based on multi-scale convolution feature fusion
    Journal of Computer Applications   2020 Vol.40 (2): 561-565 [Abstract] (547) [HTML 0 KB] [PDF 644 KB] (379)
2923 GAN Lan, GUO Zihan, WANG Yao
  Gastric tumor cell image recognition method based on radial transformation and improved AlexNet
    Journal of Computer Applications   2019 Vol.39 (10): 2923-2929 [Abstract] (336) [HTML 1 KB] [PDF 1200 KB] (323)
2883 WEI Xin, WU Shuhong, WANG Yaoli
  Forest fire smoke detection model based on deep convolution long short-term memory network
    Journal of Computer Applications   2019 Vol.39 (10): 2883-2887 [Abstract] (526) [HTML 1 KB] [PDF 774 KB] (449)
2865 FU Jiupeng, ZENG Guohui, HUANG Bo, FANG Zhijun
  Narrow channel path planning based on bidirectional rapidly-exploring random tree
    Journal of Computer Applications   2019 Vol.39 (10): 2865-2869 [Abstract] (523) [HTML 1 KB] [PDF 813 KB] (308)
2847 XI Zhihong, HAN Shuangquan, WANG Hongxu
  Simultaneous localization and semantic mapping of indoor dynamic scene based on semantic segmentation
    Journal of Computer Applications   2019 Vol.39 (10): 2847-2851 [Abstract] (430) [HTML 1 KB] [PDF 735 KB] (391)
116 CHI Yaping, MO Chongwei, YANG Yintan, CHEN Chunxia
  Design and implementation of intrusion detection model for software defined network architecture
    Journal of Computer Applications   2020 Vol.40 (1): 116-122 [Abstract] (451) [HTML 1 KB] [PDF 1026 KB] (594)
71 DENG Qi, LEI Yinjie, TIAN Feng
  Optimized convolutional neural network method for classification of pneumonia images
    Journal of Computer Applications   2020 Vol.40 (1): 71-76 [Abstract] (705) [HTML 1 KB] [PDF 889 KB] (854)
90 HUANG Yongxin, TANG Xuefei
  Discovery of functional dependencies in university data based on affinity propagation clustering and TANE algorithms
    Journal of Computer Applications   2020 Vol.40 (1): 90-95 [Abstract] (576) [HTML 1 KB] [PDF 1057 KB] (540)
1 YANG Jian, LI Zhenpeng, SU Peng
  Review of speech segmentation and endpoint detection
    Journal of Computer Applications   2020 Vol.40 (1): 1-7 [Abstract] (821) [HTML 1 KB] [PDF 1105 KB] (1083)
36 ZHAO Guanghua, LAI Jianhui, CHEN Yanyan, SUN Haodong, ZHANG Ye
  Residents' travel origin and destination identification method based on naive Bayes classification
    Journal of Computer Applications   2020 Vol.40 (1): 36-42 [Abstract] (492) [HTML 1 KB] [PDF 1036 KB] (483)
16 ZHAO Hong, WANG Le, WANG Weijie
  Text sentiment analysis based on serial hybrid model of bi-directional long short-term memory and convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (1): 16-22 [Abstract] (754) [HTML 1 KB] [PDF 1101 KB] (755)
3615 FENG Wenbo, HONG Zheng, WU Lifa, LI Yihao, LIN Peihong
  Application protocol recognition method based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (12): 3615-3621 [Abstract] (446) [HTML 1 KB] [PDF 1254 KB] (503)
258 ZHANG Wu, CHEN Hongmei
  Hyperspectral band selection algorithm based on kernelized fuzzy rough set
    Journal of Computer Applications   2020 Vol.40 (1): 258-263 [Abstract] (404) [HTML 1 KB] [PDF 959 KB] (271)
783 LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke
  Outlier node detection algorithm in wireless sensor networks based ongraph signal processing
    Journal of Computer Applications   2020 Vol.40 (3): 783-787 [Abstract] (525) [HTML 1 KB] [PDF 785 KB] (418)
651 ZHAO Ya'ou, ZHANG Jiachong, LI Yibin, FU Xianrui, SHENG Wei
  Sentiment analysis using embedding from language model and multi-scale convolutional neural network
    Journal of Computer Applications   2020 Vol.40 (3): 651-657 [Abstract] (546) [HTML 1 KB] [PDF 866 KB] (618)
1157 WEI Wenle, JIN Guodong, TAN Lining, LU Libin, CHEN Danqi
  Real-time SLAM algorithm with keyframes determined by inertial measurement unit
    Journal of Computer Applications   2020 Vol.40 (4): 1157-1163 [Abstract] (610) [HTML 1 KB] [PDF 3649 KB] (410)
978 WU Yuxin, CAI Ting, ZHANG Dabin
  Automatic smart contract classification model based on hierarchical attention mechanism and bidirectional long short-term memory neural network
    Journal of Computer Applications   2020 Vol.40 (4): 978-984 [Abstract] (687) [HTML 1 KB] [PDF 1079 KB] (1020)
358 Junying HAN, Zhenyu ZHANG, Deshi KONG
  Distributed multi-task allocation method for user area in mobile crowd sensing
    Journal of Computer Applications   2020 Vol.40 (2): 358-362 [Abstract] (482) [HTML 0 KB] [PDF 575 KB] (579)
43 WANG Jianhua, PAN Yujie, SUN Rui
  Flexible job-shop green scheduling algorithm considering machine tool depreciation
    Journal of Computer Applications   2020 Vol.40 (1): 43-49 [Abstract] (407) [HTML 1 KB] [PDF 997 KB] (388)
233 LIU Ying, WANG Fengwei, LIU Weihua, AI Da, LI Yun, YANG Fanchao
  High dynamic range imaging algorithm based on luminance partition fuzzy fusion
    Journal of Computer Applications   2020 Vol.40 (1): 233-238 [Abstract] (503) [HTML 1 KB] [PDF 1027 KB] (365)
3633 LIU Chengbin, ZHENG Wei, FAN Xin, YANG Fengyu
  Hybrid defect prediction model based on network representation learning
    Journal of Computer Applications   2019 Vol.39 (12): 3633-3638 [Abstract] (383) [HTML 1 KB] [PDF 946 KB] (316)
207 YUAN Zhixin, ZHOU Yanling
  Unambiguous tracking method based on combined correlation function for CosBOC (10, 5) signal
    Journal of Computer Applications   2020 Vol.40 (1): 207-211 [Abstract] (396) [HTML 1 KB] [PDF 749 KB] (292)
202 ZHOU Zhen, YUAN Zhengdao
  Efficient communication receiver design for Internet of things environment
    Journal of Computer Applications   2020 Vol.40 (1): 202-206 [Abstract] (462) [HTML 1 KB] [PDF 819 KB] (331)
212 WANG Shuyan, ZHENG Jiani, SUN Jiaze
  Test case generation method for Web applications based on page object
    Journal of Computer Applications   2020 Vol.40 (1): 212-217 [Abstract] (534) [HTML 1 KB] [PDF 870 KB] (435)
148 ZHANG En, HOU Yingying, LI Gongli, LI Huimin, LI Yu
  Adaptive hierarchical searchable encryption scheme based on learning with errors
    Journal of Computer Applications   2020 Vol.40 (1): 148-156 [Abstract] (507) [HTML 1 KB] [PDF 1430 KB] (463)
891 ZHOU Leilei, LIANG Chengji, HU Xiaoyuan
  Delivery truck strategy under uncertain interference constraints
    Journal of Computer Applications   2020 Vol.40 (3): 891-896 [Abstract] (628) [HTML 1 KB] [PDF 1027 KB] (470)
658 YU Dunhui, YUAN Xu, ZHANG Wanshan, WANG Chenxu
  Spatiotemporal crowdsourcing online task allocation algorithm based ondynamic threshold
    Journal of Computer Applications   2020 Vol.40 (3): 658-664 [Abstract] (356) [HTML 1 KB] [PDF 974 KB] (798)
103 WU Zhenhua, ZHANG Chao, SUN He, YAN Xuexiong
  Survey on application of binary reverse analysis in detecting software supply chain pollution
    Journal of Computer Applications   2020 Vol.40 (1): 103-115 [Abstract] (755) [HTML 1 KB] [PDF 2085 KB] (743)
865 WANG Yunfei, WANG Yuanyu
  MP-CGAN: night single image dehazing algorithm based on Msmall-Patch training
    Journal of Computer Applications   2020 Vol.40 (3): 865-871 [Abstract] (583) [HTML 1 KB] [PDF 2098 KB] (492)
710 XU Ruobo, LU Tao, WANG Yu, ZHANG Yanduo
  Face hallucination algorithm via combined learning
    Journal of Computer Applications   2020 Vol.40 (3): 710-716 [Abstract] (507) [HTML 1 KB] [PDF 1595 KB] (490)
2893 ZHANG Fangyan, WANG Xin, XU Xinzheng
  Partial occlusion face recognition based on structured occlusion coding and extreme learning machine
    Journal of Computer Applications   2019 Vol.39 (10): 2893-2898 [Abstract] (416) [HTML 1 KB] [PDF 865 KB] (344)
3140 ZHENG Wenbin, LI Jinjin, YU Peiqiu, LIN Yidong
  Matrix-based algorithm for updating approximations in variable precision multi-granulation rough sets
    Journal of Computer Applications   2019 Vol.39 (11): 3140-3145 [Abstract] (539) [HTML 1 KB] [PDF 801 KB] (191)
3146 ZHANG Yu, YU Dongjun
  Protein-ATP binding site prediction based on 1D-convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (11): 3146-3150 [Abstract] (434) [HTML 1 KB] [PDF 775 KB] (363)
3210 ZHU Fan, WANG Hongyuan, ZHANG Ji
  Fine-grained pedestrian detection algorithm based on improved Mask R-CNN
    Journal of Computer Applications   2019 Vol.39 (11): 3210-3215 [Abstract] (565) [HTML 1 KB] [PDF 935 KB] (464)
3216 LIU Baocheng, PIAO Yan, TANG Yue
  Person re-identification in video sequence based on spatial-temporal regularization
    Journal of Computer Applications   2019 Vol.39 (11): 3216-3220 [Abstract] (449) [HTML 1 KB] [PDF 808 KB] (380)
788 JIN Yong, LUO Ming, DONG Mingyang
  User grouping and power allocation strategy based on NOMA system
    Journal of Computer Applications   2020 Vol.40 (3): 788-792 [Abstract] (803) [HTML 1 KB] [PDF 574 KB] (489)
631 CHEN Meijie, XIE Zhenping, CHEN Xiaoqi, XU Peng
  Novel bidirectional aggregation degree feature extraction method forpatent new word discovery
    Journal of Computer Applications   2020 Vol.40 (3): 631-637 [Abstract] (465) [HTML 1 KB] [PDF 772 KB] (499)
227 MA Weiping, LI Wenxin, SUN Jinchuan, CAO Pengxia
  Binocular vision target positioning method based on coarse-fine stereo matching
    Journal of Computer Applications   2020 Vol.40 (1): 227-232 [Abstract] (451) [HTML 1 KB] [PDF 996 KB] (401)
3440 DENG Yang, XIE Ning, YANG Yang
  Siamese detection network based real-time video tracking algorithm
    Journal of Computer Applications   2019 Vol.39 (12): 3440-3444 [Abstract] (570) [HTML 1 KB] [PDF 787 KB] (470)
3450 XU Shanshan, YAN Chao, GAO Linming
  Lake extraction algorithm based on three-dimensional convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (12): 3450-3455 [Abstract] (575) [HTML 1 KB] [PDF 920 KB] (434)
3445 LU Jingang, ZHANG Li
  Crowd counting model based on multi-scale multi-column convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (12): 3445-3449 [Abstract] (573) [HTML 1 KB] [PDF 773 KB] (431)
3420 YANG Donghai, LIN Minmin, ZHANG Wenjie, YANG Jingmin
  Image classification learning via unsupervised mixed-order stacked sparse autoencoder
    Journal of Computer Applications   2019 Vol.39 (12): 3420-3425 [Abstract] (654) [HTML 1 KB] [PDF 1005 KB] (447)
3415 CHEN Kejia, YANG Zeyu, LIU Zheng, LU Hao
  Graph convolutional network model using neighborhood selection strategy
    Journal of Computer Applications   2019 Vol.39 (12): 3415-3419 [Abstract] (779) [HTML 1 KB] [PDF 759 KB] (830)
3575 ZHOU Jian, JIN Yu, HE Heng, LI Peng
  Dynamic cloud data audit model based on nest Merkle Hash tree block chain
    Journal of Computer Applications   2019 Vol.39 (12): 3575-3583 [Abstract] (684) [HTML 1 KB] [PDF 1372 KB] (375)
3298 WANG Peng, WU Kang, YAN Fang, WANG Kenian, ZHANG Xiaochen
  Security verification method of safety critical software based on system theoretic process analysis
    Journal of Computer Applications   2019 Vol.39 (11): 3298-3303 [Abstract] (524) [HTML 1 KB] [PDF 969 KB] (281)
3665 ZHANG Wenbin, ZHU Min, ZHANG Ning, DONG Le
  Plant image segmentation method under bias light based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (12): 3665-3672 [Abstract] (511) [HTML 1 KB] [PDF 1365 KB] (466)
3328 SUN Min, YE Qiaonan, CHEN Zhongxiong
  Task scheduling of variance-directional variation genetic algorithm in cloud environment
    Journal of Computer Applications   2019 Vol.39 (11): 3328-3332 [Abstract] (444) [HTML 1 KB] [PDF 814 KB] (253)
3257 LIU Xiaoming, SHEN Mingyu, HOU Zhengfeng
  Firefly fuzzy clustering algorithm based on Levy flight
    Journal of Computer Applications   2019 Vol.39 (11): 3257-3262 [Abstract] (545) [HTML 1 KB] [PDF 858 KB] (408)
3349 JI Xiaofei, QIN Linlin, WANG Yangyang
  Human interaction recognition based on RGB and skeleton data fusion model
    Journal of Computer Applications   2019 Vol.39 (11): 3349-3354 [Abstract] (535) [HTML 1 KB] [PDF 993 KB] (413)
3293 SUN Shilei, WANG Chao, ZHAO Yuandi
  Parameter independent clustering of air traffic trajectory based on silhouette coefficient
    Journal of Computer Applications   2019 Vol.39 (11): 3293-3297 [Abstract] (471) [HTML 1 KB] [PDF 818 KB] (209)
3274 WANG Ping, GAO Chen, ZHU Li, ZHAO Jun, ZHANG Jing, KONG Weiming
  Segmentation algorithm of ischemic stroke lesion based on 3D deep residual network and cascade U-Net
    Journal of Computer Applications   2019 Vol.39 (11): 3274-3279 [Abstract] (685) [HTML 1 KB] [PDF 959 KB] (460)
3250 CHEN Linfeng, QI Xuemei, CHEN Junwen, HUANG Cheng, CHEN Fulong
  Quantum-inspired migrating birds co-optimization algorithm for lot-streaming flow shop scheduling problem
    Journal of Computer Applications   2019 Vol.39 (11): 3250-3256 [Abstract] (615) [HTML 1 KB] [PDF 949 KB] (321)
3343 MIAO Sheng, DONG Liang, DONG Jian'e, ZHONG Lihui
  Multi-objective automatic identification and localization system in mobile cellular networks
    Journal of Computer Applications   2019 Vol.39 (11): 3343-3348 [Abstract] (540) [HTML 1 KB] [PDF 905 KB] (330)
2870 BAI Liyun, HU Xuemin, SONG Sheng, TONG Xiuchi, ZHANG Ruohan
  Motion planning model based on deep cascaded neural network for autonomous driving
    Journal of Computer Applications   2019 Vol.39 (10): 2870-2875 [Abstract] (553) [HTML 1 KB] [PDF 992 KB] (401)
2930 QIU Jinyi, LUO Jun, LI Xiu, JIA Wei, NI Fuchuan, FENG Hui
  Multi-scale grape image recognition method based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (10): 2930-2936 [Abstract] (550) [HTML 1 KB] [PDF 1038 KB] (445)
3046 LI Hong, WANG Ruiyao, GENG Zexun, HU Haifeng
  Low-illumination image enhancement algorithm based on multi-scale gradient domain guided filtering
    Journal of Computer Applications   2019 Vol.39 (10): 3046-3052 [Abstract] (421) [HTML 1 KB] [PDF 1112 KB] (409)
3018 QIN Biao, GUO Fan, TU Fengtao
  Correctness verification of static taint analysis results for Android application
    Journal of Computer Applications   2019 Vol.39 (10): 3018-3027 [Abstract] (506) [HTML 1 KB] [PDF 1509 KB] (303)
3002 DONG Haiyan, YU Feng, CHENG Ke, HUANG Shucheng
  Credibility analysis method of online user behavior based on non-interference theory
    Journal of Computer Applications   2019 Vol.39 (10): 3002-3006 [Abstract] (391) [HTML 1 KB] [PDF 863 KB] (309)
2937 WANG Kang, DONG Yuanfei
  Angular interval embedding based end-to-end voiceprint recognition model
    Journal of Computer Applications   2019 Vol.39 (10): 2937-2941 [Abstract] (413) [HTML 1 KB] [PDF 827 KB] (338)
2381 WANG Shouhua, LI Yunke, SUN Xiyan, JI Yuanfa
  Dual-antenna attitude determination algorithm based on low-cost receiver
    Journal of Computer Applications   2019 Vol.39 (8): 2381-2385 [Abstract] (498) [HTML 1 KB] [PDF 723 KB] (338)
2276 CHEN Shanxue, CHU Chengquan
  Hyperspectral unmixing based on sparse and orthogonal constrained non-negative matrix factorization
    Journal of Computer Applications   2019 Vol.39 (8): 2276-2280 [Abstract] (683) [HTML 1 KB] [PDF 773 KB] (358)
2252 LIU Guoqing, WANG Jieting, HU Zhiguo, QIAN Yuhua
  Best action identification of tree structure based on ternary multi-arm bandit
    Journal of Computer Applications   2019 Vol.39 (8): 2252-2260 [Abstract] (405) [HTML 1 KB] [PDF 1397 KB] (296)
2223 DENG Xuan, LIAO Kaiyang, ZHENG Yuanlin, YUAN Hui, LEI Hao, CHEN Bing
  Person re-identification based on deep multi-view feature distance learning
    Journal of Computer Applications   2019 Vol.39 (8): 2223-2229 [Abstract] (746) [HTML 1 KB] [PDF 1190 KB] (364)
2134 CHEN Li, CHEN Xiaoyun
  Detection method of hard exudates in fundus images by combining local entropy and robust principal components analysis
    Journal of Computer Applications   2019 Vol.39 (7): 2134-2140 [Abstract] (357) [HTML 1 KB] [PDF 1062 KB] (281)
2121 ZHU Kai, FU Zhongliang, CHEN Xiaoqing
  Left ventricular segmentation method of ultrasound image based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (7): 2121-2124 [Abstract] (594) [HTML 1 KB] [PDF 690 KB] (374)
2103 LI Wenjun, CHEN Bin, LI Jianming, QIAN Jide
  Surface scratch recognition method based on deep neural network
    Journal of Computer Applications   2019 Vol.39 (7): 2103-2108 [Abstract] (615) [HTML 1 KB] [PDF 997 KB] (438)
2087 WAGN Keqiang, ZHANG Yushuai, WANG Baoqun
  Multi-exposure image fusion algorithm based on Retinex theory
    Journal of Computer Applications   2019 Vol.39 (7): 2087-2092 [Abstract] (628) [HTML 1 KB] [PDF 994 KB] (383)
1948 WU Hao, WANG Xincan, LI Xinyun, LIU Zhifen, CHEN Junjie, GUO Hao
  Brain function network feature selection and classification based on multi-level template
    Journal of Computer Applications   2019 Vol.39 (7): 1948-1953 [Abstract] (389) [HTML 1 KB] [PDF 1024 KB] (335)
1931 MENG Shilin, ZHAO Yunlong, GUAN Donghai, ZHAI Xiangping
  Sentiment analysis method combining sentiment and semantic information
    Journal of Computer Applications   2019 Vol.39 (7): 1931-1935 [Abstract] (625) [HTML 1 KB] [PDF 825 KB] (423)
1899 HU Liang, XIAO Renbin, LI Hao
  Bee colony double inhibition labor division algorithm and its application in traffic signal timing
    Journal of Computer Applications   2019 Vol.39 (7): 1899-1904 [Abstract] (493) [HTML 1 KB] [PDF 1080 KB] (337)
3065 GE Wanying, ZHANG Tianqi
  Monaural speech enhancement algorithm based on mask estimation and optimization
    Journal of Computer Applications   2019 Vol.39 (10): 3065-3070 [Abstract] (438) [HTML 1 KB] [PDF 892 KB] (325)
2795 LI Xinbin, ZHANG Shoutao, YAN Lei, HAN Song
  Multiple autonomous underwater vehicle task allocation policy based on robust Restless Bandit model
    Journal of Computer Applications   2019 Vol.39 (10): 2795-2801 [Abstract] (417) [HTML 1 KB] [PDF 1025 KB] (452)
2905 XU Yue, FENG Mengru, PI Jiatian, CHEN Yong
  Remote sensing image segmentation method based on deep learning model
    Journal of Computer Applications   2019 Vol.39 (10): 2905-2914 [Abstract] (922) [HTML 1 KB] [PDF 1531 KB] (644)
2802 GAO Qinquan, ZHAO Yan, LI Gen, TONG Tong
  Compression method of super-resolution convolutional neural network based on knowledge distillation
    Journal of Computer Applications   2019 Vol.39 (10): 2802-2808 [Abstract] (786) [HTML 1 KB] [PDF 1103 KB] (829)
2636 MA Minyao, XU Yi, LIU Zhuo
  Privacy preserving Hamming distance computing problem of DNA sequences
    Journal of Computer Applications   2019 Vol.39 (9): 2636-2640 [Abstract] (623) [HTML 1 KB] [PDF 816 KB] (385)
2669 SHAO Hao, WANG Lunwen, DENG Jian
  Important node identification method for dynamic networks based on H operation
    Journal of Computer Applications   2019 Vol.39 (9): 2669-2674 [Abstract] (790) [HTML 1 KB] [PDF 850 KB] (446)
1863 CHEN Tian, ZUO Yongsheng, AN Xin, REN Fuji
  Test data compatible compression method based on tri-state signal
    Journal of Computer Applications   2019 Vol.39 (6): 1863-1868 [Abstract] (461) [HTML 1 KB] [PDF 942 KB] (299)
1824 WANG Xilong, WANG Jicheng, LUO Cheng, TIAN Xiuxia
  Evolutionary game model under synergistic effect of time scale and selection preference
    Journal of Computer Applications   2019 Vol.39 (6): 1824-1828 [Abstract] (485) [HTML 1 KB] [PDF 800 KB] (317)
1780 DING Ning, GUAN Xinrong, YANG Weiwei
  Quantitative analysis of physical secret key in OFDM channel based on universal software radio peripheral
    Journal of Computer Applications   2019 Vol.39 (6): 1780-1785 [Abstract] (463) [HTML 1 KB] [PDF 990 KB] (264)
1753 AN Xin, ZHANG Ying, KANG An, CHEN Tian, LI Jianhua
  Machine learning based online mapping approach for heterogeneous multi-core processor system
    Journal of Computer Applications   2019 Vol.39 (6): 1753-1759 [Abstract] (436) [HTML 1 KB] [PDF 1164 KB] (334)
1747 KONG Jing, GUO Yuanbo, LIU Chunhui, WANG Yifeng
  Gait feature identification method based on motion sensor in smartphone
    Journal of Computer Applications   2019 Vol.39 (6): 1747-1752 [Abstract] (597) [HTML 1 KB] [PDF 1043 KB] (381)
1735 XU Bingfeng, ZHONG Zhicheng, HE Gaofeng
  Risk analysis of cyber-physical system based on dynamic fault trees
    Journal of Computer Applications   2019 Vol.39 (6): 1735-1741 [Abstract] (452) [HTML 1 KB] [PDF 1050 KB] (355)
1713 ZENG Jianping, CHEN Qile, WU Chengrong, FANG Xi
  Analysis method of passwords under Chinese context
    Journal of Computer Applications   2019 Vol.39 (6): 1713-1718 [Abstract] (497) [HTML 1 KB] [PDF 1028 KB] (230)
1690 LIU Yuzhen, JIANG Zhengquan, ZHAO Na
  Three dimensional palmprint recognition based on neighbor ternary pattern and collaborative representation
    Journal of Computer Applications   2019 Vol.39 (6): 1690-1695 [Abstract] (389) [HTML 1 KB] [PDF 887 KB] (347)
1685 SANG Gaoli, YAN Chao, ZHU Rong
  Expression-insensitive three-dimensional face recognition algorithm based on multi-region fusion
    Journal of Computer Applications   2019 Vol.39 (6): 1685-1689 [Abstract] (460) [HTML 1 KB] [PDF 841 KB] (196)
1675 ZHENG Yi, QI Donglian, WANG Zhenyu
  YOLO network character recognition method with variable candidate box density for international phonetic alphabet
    Journal of Computer Applications   2019 Vol.39 (6): 1675-1679 [Abstract] (425) [HTML 1 KB] [PDF 730 KB] (346)
1669 SHENG Heng, HUANG Ming, YANG Jingjing
  Laboratory personnel statistics and management system based on Faster R-CNN and IoU optimization
    Journal of Computer Applications   2019 Vol.39 (6): 1669-1674 [Abstract] (455) [HTML 1 KB] [PDF 912 KB] (370)
1657 ZHANG Dezheng, WENG Liguo, XIA Min, CAO Hui
  Video frame prediction based on deep convolutional long short-term memory neural network
    Journal of Computer Applications   2019 Vol.39 (6): 1657-1662 [Abstract] (509) [HTML 1 KB] [PDF 1005 KB] (373)
1652 YANG Kang, SONG Huihui, ZHANG Kaihua
  Real-time visual tracking based on dual attention siamese network
    Journal of Computer Applications   2019 Vol.39 (6): 1652-1656 [Abstract] (614) [HTML 1 KB] [PDF 800 KB] (496)
1646 WEN Chang, LIU Yu, GU Jinguang
  Evolution relationship extraction of emergency based on attention-based bidirectional long short-term memory network model
    Journal of Computer Applications   2019 Vol.39 (6): 1646-1651 [Abstract] (441) [HTML 1 KB] [PDF 973 KB] (448)
1639 CHEN Zhihao, YU Xiang, LIU Zichen, QIU Dawei, GU Bengang
  Chinese medical question answer matching method based on attention mechanism and character embedding
    Journal of Computer Applications   2019 Vol.39 (6): 1639-1645 [Abstract] (490) [HTML 1 KB] [PDF 1101 KB] (440)
1632 WANG Wentao, WU Lintao, HUANG Ye, ZHU Rongbo
  Link prediction model based on densely connected convolutional network
    Journal of Computer Applications   2019 Vol.39 (6): 1632-1638 [Abstract] (524) [HTML 1 KB] [PDF 1061 KB] (424)
2992 CHEN Menghui, LIU Junlin, XU Jianfeng, LI Xiangjun
  Imperialist competitive algorithm based on multiple search strategy for solving traveling salesman problem
    Journal of Computer Applications   2019 Vol.39 (10): 2992-2996 [Abstract] (367) [HTML 1 KB] [PDF 802 KB] (312)
3053 YANG Chunde, CHENG Yanfei
  Fast image mosaic algorithm based on adaptive elimination of stitching seam and panorama alignment
    Journal of Computer Applications   2019 Vol.39 (10): 3053-3059 [Abstract] (660) [HTML 1 KB] [PDF 1150 KB] (466)
2568 LI Minze, LI Xiaoxia, WANG Xueyuan, SUN Wei
  Real-time facial expression recognition based on convolutional neural network with multi-scale kernel feature
    Journal of Computer Applications   2019 Vol.39 (9): 2568-2574 [Abstract] (848) [HTML 1 KB] [PDF 1097 KB] (571)
2784 LI Bo, ZHANG Xiao, YAN Jingyi, LI Kewei, LI Heng, LING Yulong, ZHANG Yong
  Application of KNN algorithm based on value difference metric and clustering optimization in bank customer behavior prediction
    Journal of Computer Applications   2019 Vol.39 (9): 2784-2788 [Abstract] (535) [HTML 1 KB] [PDF 806 KB] (545)
2652 WANG Dan, LI Anyi, YANG Yanjuan
  Low complexity narrowband physical downlink control channel blind detection algorithm based on correlation detection
    Journal of Computer Applications   2019 Vol.39 (9): 2652-2657 [Abstract] (677) [HTML 1 KB] [PDF 1016 KB] (357)
2738 CHEN Longbiao, CHEN Yuzhang, WANG Xiaochen, ZOU Peng, HU Xuemin
  Underwater image super-resolution reconstruction method based on deep learning
    Journal of Computer Applications   2019 Vol.39 (9): 2738-2743 [Abstract] (675) [HTML 1 KB] [PDF 893 KB] (558)
2955 LI Jianxun, MA Meiling, GUO Jianhua, YAN Jun
  False trend time series detection based on randomness analysis
    Journal of Computer Applications   2019 Vol.39 (10): 2955-2959 [Abstract] (355) [HTML 1 KB] [PDF 805 KB] (336)
2841 WANG Liya, LIU Changhui, CAI Dunbo, LU Tao
  Chinese text sentiment analysis based on CNN-BiGRU network with attention mechanism
    Journal of Computer Applications   2019 Vol.39 (10): 2841-2846 [Abstract] (1907) [HTML 1 KB] [PDF 909 KB] (548)
2580 ZHAO Ruixiang, HOU Honghua, ZHANG Pengcheng, LIU Yi, TIAN Zhu, GUI Zhiguo
  Welding ball edge bubble segmentation for ball grid array based on full convolutional network and K-means clustering
    Journal of Computer Applications   2019 Vol.39 (9): 2580-2585 [Abstract] (460) [HTML 1 KB] [PDF 1006 KB] (442)
2712 LIAO Bin, TAN Daoqiang, WU Wen
  Single image shadow removal based on attenuated generative adversarial networks
    Journal of Computer Applications   2019 Vol.39 (9): 2712-2718 [Abstract] (463) [HTML 1 KB] [PDF 1327 KB] (338)
3034 CAI Xingquan, SUN Chen, GE Yakun
  Mesh parameterization method based on limiting distortion
    Journal of Computer Applications   2019 Vol.39 (10): 3034-3039 [Abstract] (312) [HTML 1 KB] [PDF 991 KB] (284)
2915 QIN Pinle, LI Pengbo, ZENG Jianchao, ZHU Hui, XU Shaowei
  Automatic recognition algorithm for cervical lymph nodes using cascaded fully convolutional neural networks
    Journal of Computer Applications   2019 Vol.39 (10): 2915-2922 [Abstract] (358) [HTML 1 KB] [PDF 1267 KB] (374)
2695 CAO Yunyang, WANG Tao
  Semi-supervised image segmentation based on prior Laplacian coordinates
    Journal of Computer Applications   2019 Vol.39 (9): 2695-2700 [Abstract] (402) [HTML 1 KB] [PDF 1037 KB] (397)
2541 LIU Ying, LIANG Nannan, LI Daxiang, YANG Fanchao
  Hyperspectral image unmixing algorithm based on spectral distance clustering
    Journal of Computer Applications   2019 Vol.39 (9): 2541-2546 [Abstract] (849) [HTML 1 KB] [PDF 997 KB] (413)
2689 YAO Luji, ZHANG Li
  Design and implementation of Chinese architecture history teaching system based on mixed reality technology
    Journal of Computer Applications   2019 Vol.39 (9): 2689-2694 [Abstract] (406) [HTML 1 KB] [PDF 1150 KB] (510)
2505 SONG Xiaona, RUI Ting, WANG Xinqing
  Semantic segmentation method of road environment combined semantic boundary information
    Journal of Computer Applications   2019 Vol.39 (9): 2505-2510 [Abstract] (569) [HTML 1 KB] [PDF 1018 KB] (763)
2726 ZHANG Zheng, HE Shan, HE Jingqi
  Video colorization method based on hybrid neural network model of long short term memory and convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (9): 2726-2730 [Abstract] (583) [HTML 1 KB] [PDF 985 KB] (392)
2765 LI Zhuo, LI Yinzhen, LI Wenxia
  Multi-objective optimization model and solution algorithm for emergency material transportation path
    Journal of Computer Applications   2019 Vol.39 (9): 2765-2771 [Abstract] (1133) [HTML 1 KB] [PDF 983 KB] (518)
2658 LI Fangwei, ZHOU Jiawei, ZHANG Haibo
  Secure optimized transmission scheme of artificial noise assisted time inversion in D2D cross-cell communication
    Journal of Computer Applications   2019 Vol.39 (9): 2658-2663 [Abstract] (523) [HTML 1 KB] [PDF 857 KB] (357)
2604 YANG Hongyu, WANG Fengyan
  Network intrusion detection model based on improved convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (9): 2604-2610 [Abstract] (666) [HTML 1 KB] [PDF 1032 KB] (508)
2552 JIA Ruiming, QIU Zhenzhi, CUI Jiali, WANG Yiding
  Deep multi-scale encoder-decoder convolutional network for blind deblurring
    Journal of Computer Applications   2019 Vol.39 (9): 2552-2557 [Abstract] (766) [HTML 1 KB] [PDF 1078 KB] (544)
1512 ZHANG Yansheng, LI Xiwang, LI Dan, YANG Hua
  Abnormal flow monitoring of industrial control network based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (5): 1512-1517 [Abstract] (874) [HTML 1 KB] [PDF 956 KB] (612)
1495 SHU Lingzhou, WU Jia, WANG Chen
  Urban traffic signal control based on deep reinforcement learning
    Journal of Computer Applications   2019 Vol.39 (5): 1495-1499 [Abstract] (1277) [HTML 1 KB] [PDF 850 KB] (850)
1485 LI Xian, WANG Yan, LUO Yong, ZHOU Jiliu
  Segmentation of nasopharyngeal neoplasms based on random forest feature selection algorithm
    Journal of Computer Applications   2019 Vol.39 (5): 1485-1489 [Abstract] (434) [HTML 1 KB] [PDF 796 KB] (439)
1440 LIU Yuefeng, YANG Hanxi, CAI Shuang, ZHANG Chenrong
  Single image super-resolution reconstruction method based on improved convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (5): 1440-1447 [Abstract] (585) [HTML 1 KB] [PDF 1411 KB] (388)
1421 YANG Yanan, XIA Bin, ZHAO Lei, YUAN Wenhao
  Ultra-wideband channel environment classification algorithm based on CNN
    Journal of Computer Applications   2019 Vol.39 (5): 1421-1424 [Abstract] (412) [HTML 1 KB] [PDF 561 KB] (336)
1405 ZHOU Fei, XIA Pengcheng
  Signal strength difference fingerprint localization algorithm based on principal component analysis and chi-square distance
    Journal of Computer Applications   2019 Vol.39 (5): 1405-1410 [Abstract] (429) [HTML 1 KB] [PDF 958 KB] (331)
1394 ZHANG Shuxuan, KANG Haiyan, YAN Han
  Privacy preserving for social network relational data based on Skyline computing
    Journal of Computer Applications   2019 Vol.39 (5): 1394-1399 [Abstract] (504) [HTML 1 KB] [PDF 902 KB] (360)
1389 ZHANG Hanfang, ZHOU Anmin, JIA Peng, LIU Luping, LIU Liang
  Directed fuzzing method for binary programs
    Journal of Computer Applications   2019 Vol.39 (5): 1389-1393 [Abstract] (710) [HTML 1 KB] [PDF 899 KB] (538)
1378 HAN Si, ZHENG Baokun, CAO Qimin
  Logical key hierarchy plus based key management program for wireless sensor network
    Journal of Computer Applications   2019 Vol.39 (5): 1378-1384 [Abstract] (481) [HTML 1 KB] [PDF 1118 KB] (309)
1357 ZHANG Xingsheng, YU Dunhui, ZHANG Wanshan, WANG Chenxu
  Time utility balanced online task assignment algorithm under spatial crowdsourcing environment
    Journal of Computer Applications   2019 Vol.39 (5): 1357-1363 [Abstract] (1489) [HTML 1 KB] [PDF 1051 KB] (488)
1330 FAN Jili, HE Pu, LI Xiaohua, NIE Tiezheng, YU Ge
  Blockchain based decentralized item sharing and transaction service system
    Journal of Computer Applications   2019 Vol.39 (5): 1330-1335 [Abstract] (944) [HTML 1 KB] [PDF 933 KB] (490)
1312 WANG Kun, ZENG Guohui, LU Dunke, HUANG Bo, LI Xiaobin
  Path planning of mobile robot based on improved asymptotically-optimal bidirectional rapidly-exploring random tree algorithm
    Journal of Computer Applications   2019 Vol.39 (5): 1312-1317 [Abstract] (642) [HTML 1 KB] [PDF 910 KB] (450)
1299 TANG Chen, LI Yonghua, RAO Mengni, HU Gangjun
  Semantic judgement method of polysemous keywords in dynamic requirement traceability
    Journal of Computer Applications   2019 Vol.39 (5): 1299-1304 [Abstract] (551) [HTML 1 KB] [PDF 892 KB] (412)
1288 YAN Hong, CHEN Xingshu, WANG Wenxian, WANG Haizhou, YIN Mingyong
  Recognition model for French named entities based on deep neural network
    Journal of Computer Applications   2019 Vol.39 (5): 1288-1292 [Abstract] (516) [HTML 1 KB] [PDF 796 KB] (638)
1261 SHAO Changcheng, CHEN Pinghua
  Point-of-interest recommendation integrating social networks and image contents
    Journal of Computer Applications   2019 Vol.39 (5): 1261-1268 [Abstract] (716) [HTML 1 KB] [PDF 1145 KB] (585)
1247 XU Yi, XIAO Peng
  Dynamic updating method of approximations in multigranulation rough sets based on tolerance relation
    Journal of Computer Applications   2019 Vol.39 (5): 1247-1251 [Abstract] (542) [HTML 1 KB] [PDF 717 KB] (600)
2997 HUANG Bin, BAO Liyong, DING Hongwei
  Construction and characteristic analysis of Chebyshev mapping system based on homogenized distribution
    Journal of Computer Applications   2019 Vol.39 (10): 2997-3001 [Abstract] (308) [HTML 1 KB] [PDF 719 KB] (232)
2302 REN Yuzhu, ZHANG Youwei, AI Chengwei
  Survey on taint analysis technology
    Journal of Computer Applications   2019 Vol.39 (8): 2302-2309 [Abstract] (2519) [HTML 1 KB] [PDF 1432 KB] (1084)
2683 HE Huaiqing, ZHENG Liyuan, LIU Haohan, ZHANG Yumin
  Visual analysis method for pilot eye movement data based on user-defined interest area
    Journal of Computer Applications   2019 Vol.39 (9): 2683-2688 [Abstract] (408) [HTML 1 KB] [PDF 922 KB] (405)
2629 CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng
  Threshold signature scheme suitable for blockchain electronic voting scenes
    Journal of Computer Applications   2019 Vol.39 (9): 2629-2635 [Abstract] (584) [HTML 1 KB] [PDF 1051 KB] (545)
2744 WAN Yongjing, WANG Bowei, LOU Dingfeng
  Insect sound feature recognition method based on three-dimensional convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (9): 2744-2748 [Abstract] (665) [HTML 1 KB] [PDF 794 KB] (440)
2333 LANG Dapeng, DING Wei, JIANG Haocheng, CHEN Zhiyuang
  Malicious code classification algorithm based on multi-feature fusion
    Journal of Computer Applications   2019 Vol.39 (8): 2333-2338 [Abstract] (472) [HTML 1 KB] [PDF 902 KB] (418)
2535 JING Nianzhao, YANG Wei
  Fine edge detection model based on RCF
    Journal of Computer Applications   2019 Vol.39 (9): 2535-2540 [Abstract] (1521) [HTML 1 KB] [PDF 970 KB] (658)
2181 CAI Guoyong, HE Xinhao, CHU Yangyang
  Visual sentiment analysis by combining global and local regions of image
    Journal of Computer Applications   2019 Vol.39 (8): 2181-2185 [Abstract] (675) [HTML 1 KB] [PDF 901 KB] (829)
2210 DING Lianjing, LIU Guangshuai, LI Xurui, CHEN Xiaowen
  Face recognition combining weighted information entropy with enhanced local binary pattern
    Journal of Computer Applications   2019 Vol.39 (8): 2210-2216 [Abstract] (513) [HTML 1 KB] [PDF 1131 KB] (412)
2402 LIU Hu, ZHOU Ye, YUAN Jiabin
  Fine-grained vehicle recognition under multiple angles based on multi-scale bilinear convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (8): 2402-2407 [Abstract] (922) [HTML 1 KB] [PDF 936 KB] (558)
2431 LI Yefei, XU Chao, XU Daoqiang, ZOU Yunfeng, ZHANG Xiaoda, QIAN Zhuzhong
  Online task scheduling algorithm for big data analytics based on cumulative running work
    Journal of Computer Applications   2019 Vol.39 (8): 2431-2437 [Abstract] (459) [HTML 1 KB] [PDF 1056 KB] (325)
2081 WANG Ping, PANG Wenhao
  Two-stream CNN for action recognition based on video segmentation
    Journal of Computer Applications   2019 Vol.39 (7): 2081-2086 [Abstract] (583) [HTML 1 KB] [PDF 1002 KB] (522)
1918 CHEN Jiafeng, TENG Chong
  Joint entity and relation extraction model based on reinforcement learning
    Journal of Computer Applications   2019 Vol.39 (7): 1918-1924 [Abstract] (749) [HTML 1 KB] [PDF 1115 KB] (510)
2297 GONG Yanlu, LYU Jia
  Co-training algorithm with combination of active learning and density peak clustering
    Journal of Computer Applications   2019 Vol.39 (8): 2297-2301 [Abstract] (566) [HTML 1 KB] [PDF 770 KB] (329)
2475 YANG Huihua, ZHANG Tianyu, LI Lingqiao, PAN Xipeng
  Target recognition algorithm for urban management cases by mobile devices based on MobileNet
    Journal of Computer Applications   2019 Vol.39 (8): 2475-2479 [Abstract] (588) [HTML 1 KB] [PDF 819 KB] (381)
2484 DING Yingzi, DING Xiangqian, GUO Baoqi
  Application of improved GoogLeNet based on weak supervision in DR detection
    Journal of Computer Applications   2019 Vol.39 (8): 2484-2488 [Abstract] (533) [HTML 1 KB] [PDF 750 KB] (344)
2065 YUAN Yue, LI Yi
  Polynomial ranking function detection method based on Dixon resultant and successive difference substitution
    Journal of Computer Applications   2019 Vol.39 (7): 2065-2073 [Abstract] (366) [HTML 1 KB] [PDF 1216 KB] (283)
2391 OUYANG Ning, LIANG Ting, LIN Leping
  Self-attention network based image super-resolution
    Journal of Computer Applications   2019 Vol.39 (8): 2391-2395 [Abstract] (762) [HTML 1 KB] [PDF 798 KB] (448)
2125 WANG Lishun, ZHONG Yong, LI Zhendong, HE Yilong
  On-line fabric defect recognition algorithm based on deep learning
    Journal of Computer Applications   2019 Vol.39 (7): 2125-2128 [Abstract] (912) [HTML 1 KB] [PDF 681 KB] (481)
2456 LYU Ruimin, YANG Fan, LU Jing, CHEN Wei
  Gamification design and effect analysis of color education
    Journal of Computer Applications   2019 Vol.39 (8): 2456-2461 [Abstract] (516) [HTML 1 KB] [PDF 875 KB] (306)
2414 ZHANG Yubo, ZHANG Yadong, ZHANG Bin
  Desktop dust detection algorithm based on gray gradient co-occurrence matrix
    Journal of Computer Applications   2019 Vol.39 (8): 2414-2419 [Abstract] (682) [HTML 1 KB] [PDF 1004 KB] (295)
1888 KIM Chungsong, LI Dong
  Deep learning neural network model for consumer preference prediction
    Journal of Computer Applications   2019 Vol.39 (7): 1888-1893 [Abstract] (859) [HTML 1 KB] [PDF 1094 KB] (579)
2109 DENG Zhonghao, CHEN Xiaodong
  Pulmonary nodule detection algorithm based on deep convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (7): 2109-2115 [Abstract] (764) [HTML 1 KB] [PDF 1207 KB] (498)
2450 MENG Zhao, TIAN Shengwei, YU Long, WANG Ruijin
  Regional bullying recognition based on joint hierarchical attentional network and independent recurrent neural network
    Journal of Computer Applications   2019 Vol.39 (8): 2450-2455 [Abstract] (564) [HTML 1 KB] [PDF 983 KB] (345)
1973 MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun
  Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system
    Journal of Computer Applications   2019 Vol.39 (7): 1973-1978 [Abstract] (489) [HTML 1 KB] [PDF 900 KB] (344)
1229 LIU Shuai, LIU Changliang, ZHEN Chenggang
  Multivariate time series fault warning for wind turbine gearbox
    Journal of Computer Applications   2019 Vol.39 (4): 1229-1233 [Abstract] (542) [HTML 1 KB] [PDF 820 KB] (436)
1201 ZHOU Yujin, WANG Xiaodong, ZHANG Lige, ZHU Kai, YAO Yu
  Feature point localization of left ventricular ultrasound image based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (4): 1201-1207 [Abstract] (564) [HTML 1 KB] [PDF 1169 KB] (408)
1196 QIU Jiajun, WU Yue, HUI Bei, LIU Yanbo
  Fractional differential algorithm based on wavelet transform applied on texture enhancement of liver tumor in CT image
    Journal of Computer Applications   2019 Vol.39 (4): 1196-1200 [Abstract] (464) [HTML 1 KB] [PDF 920 KB] (372)
1183 PAN Peike, WANG Yan, LUO Yong, ZHOU Jiliu
  Automatic segmentation of nasopharyngeal neoplasm in MR image based on U-net model
    Journal of Computer Applications   2019 Vol.39 (4): 1183-1188 [Abstract] (493) [HTML 1 KB] [PDF 970 KB] (404)
1162 CHENG Yu, DENG Dexiang, YAN Jia, FAN Ci'en
  Weakly illuminated image enhancement algorithm based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (4): 1162-1169 [Abstract] (2068) [HTML 1 KB] [PDF 1448 KB] (992)
1138 XU Xingchen, CHENG Jian, TANG Jingyu, ZHANG Jian
  Phase error analysis and amplitude improvement algorithm for asymmetric paired carry multiple access signal
    Journal of Computer Applications   2019 Vol.39 (4): 1138-1144 [Abstract] (407) [HTML 1 KB] [PDF 935 KB] (284)
1133 ZHOU Wei, XIANG Danlei, GUO Mengyu
  Low complexity reactive tabu search detection algorithm in MIMO-GFDM systems
    Journal of Computer Applications   2019 Vol.39 (4): 1133-1137 [Abstract] (481) [HTML 1 KB] [PDF 721 KB] (290)
1122 HUANG Sheng, FU Yuanpeng, ZHANG Qianyun
  Rate smooth switching algorithm based on DASH standard
    Journal of Computer Applications   2019 Vol.39 (4): 1122-1126 [Abstract] (408) [HTML 1 KB] [PDF 887 KB] (360)
1117 WU Jie, LYU Yongle
  Optimal combination prediction based on polynomial coefficient autoregressive model for radar performance parameter
    Journal of Computer Applications   2019 Vol.39 (4): 1117-1121 [Abstract] (376) [HTML 1 KB] [PDF 795 KB] (346)
1100 REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun
  Low-density 3D model information hiding algorithm based on multple fusion states
    Journal of Computer Applications   2019 Vol.39 (4): 1100-1105 [Abstract] (608) [HTML 1 KB] [PDF 929 KB] (296)
1095 ZHOU Yang, WU Qiwu, JIANG Lingzhi
  Group key management scheme based on distributed path computing element in multi-domain optical network
    Journal of Computer Applications   2019 Vol.39 (4): 1095-1099 [Abstract] (481) [HTML 1 KB] [PDF 786 KB] (272)
1089 CHEN Wanzhi, XU Dongsheng, ZHANG Jing, TANG Yu
  Intrusion detection method for industrial control system with optimized support vector machine and K-means++
    Journal of Computer Applications   2019 Vol.39 (4): 1089-1094 [Abstract] (411) [HTML 1 KB] [PDF 829 KB] (353)
1066 ZOU Chengming, LIU Panwen, TANG Xing
  Real-time defence against dynamic host configuration protocol flood attack in software defined network
    Journal of Computer Applications   2019 Vol.39 (4): 1066-1072 [Abstract] (386) [HTML 1 KB] [PDF 1082 KB] (336)
1059 PANG Xiaoqiong, YAN Xiaolong, CHEN Wenjun, YU Benguo, NIE Mengfei
  Dynamic multi-keyword ranked search over encrypted data supporting semantic extension
    Journal of Computer Applications   2019 Vol.39 (4): 1059-1065 [Abstract] (725) [HTML 1 KB] [PDF 1001 KB] (381)
1032 MAO Yimin, LIU Yinping, LIANG Tian, MAO Dinghui
  Functional module mining in uncertain protein-protein interaction network based on fuzzy spectral clustering
    Journal of Computer Applications   2019 Vol.39 (4): 1032-1040 [Abstract] (443) [HTML 1 KB] [PDF 1499 KB] (341)
994 DENG Tianmin, FANG Fang, YUE Yunxia, YANG Qizhi
  GNSS/INS global high-precision positioning method based on Elman neural network
    Journal of Computer Applications   2019 Vol.39 (4): 994-1000 [Abstract] (595) [HTML 1 KB] [PDF 1000 KB] (309)
989 HU Zhangfang, ZENG Linquan, LUO Yuan, LUO Xin, ZHAO Liming
  Adaptive Monte-Carlo localization algorithm integrated with two-dimensional code information
    Journal of Computer Applications   2019 Vol.39 (4): 989-993 [Abstract] (781) [HTML 1 KB] [PDF 790 KB] (431)
977 QI Ziliang, QU Hanbing, ZHAO Chuanhu, DONG Liang, LI Bozhao, WANG changsheng
  Person re-identification based on Siamese network and bidirectional max margin ranking loss
    Journal of Computer Applications   2019 Vol.39 (4): 977-983 [Abstract] (724) [HTML 1 KB] [PDF 1221 KB] (412)
972 YU Chongchong, CAO Shuai, PAN Bo, ZHANG Qingchuan, XU Shixuan
  Retrieval matching question and answer method based on improved CLSM with attention mechanism
    Journal of Computer Applications   2019 Vol.39 (4): 972-976 [Abstract] (456) [HTML 1 KB] [PDF 752 KB] (360)
963 DING Chao, ZHAO Hai, SI Shuaizong, ZHU Jian
  Evolution model of normal aging human brain functional network
    Journal of Computer Applications   2019 Vol.39 (4): 963-971 [Abstract] (526) [HTML 1 KB] [PDF 1354 KB] (425)
940 XU Tao, WANG Xiaoming
  Generalization error bound guided discriminative dictionary learning
    Journal of Computer Applications   2019 Vol.39 (4): 940-948 [Abstract] (665) [HTML 1 KB] [PDF 1327 KB] (455)
2480 HU Zhangfang, ZHANG Li, HUANG Lijia, LUO Yuan
  Motor imagery electroencephalogram signal recognition method based on convolutional neural network in time-frequency domain
    Journal of Computer Applications   2019 Vol.39 (8): 2480-2483 [Abstract] (911) [HTML 1 KB] [PDF 643 KB] (439)
2098 LUO Yuan, YUN Mingjing, WANG Yi, ZHAO Liming
  Human fatigue detection based on eye information characteristics
    Journal of Computer Applications   2019 Vol.39 (7): 2098-2102 [Abstract] (424) [HTML 1 KB] [PDF 799 KB] (397)
2192 CHEN Jie, SHAO Zhiqing, ZHANG Huanhuan, FEI Jiahui
  Short text sentiment analysis based on parallel hybrid neural network model
    Journal of Computer Applications   2019 Vol.39 (8): 2192-2197 [Abstract] (834) [HTML 1 KB] [PDF 884 KB] (513)
1936 CHEN Zhenghao, FENG Ao, HE Jia
  Text sentiment classification based on 1D convolutional hybrid neural network
    Journal of Computer Applications   2019 Vol.39 (7): 1936-1941 [Abstract] (491) [HTML 1 KB] [PDF 1060 KB] (410)
1985 MA Fangfang, LIU Shubo, XIONG Xingxing, NIU Xiaoguang
  Privacy protection based on local differential privacy for numerical sensitive data of wearable devices
    Journal of Computer Applications   2019 Vol.39 (7): 1985-1990 [Abstract] (739) [HTML 1 KB] [PDF 956 KB] (371)
1997 WANG Zhong, HAN Yiliang
  Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem
    Journal of Computer Applications   2019 Vol.39 (7): 1997-2000 [Abstract] (422) [HTML 1 KB] [PDF 743 KB] (359)
2242 JIANG Sihao, SONG Huihui, ZHANG Kaihua, TANG Runfa
  Video object segmentation method based on dual pyramid network
    Journal of Computer Applications   2019 Vol.39 (8): 2242-2246 [Abstract] (611) [HTML 1 KB] [PDF 787 KB] (287)
1894 WEI Xing, LE Yue, HAN Jianghong, LU Yang
  Vehicle behavior dynamic recognition network based on long short-term memory
    Journal of Computer Applications   2019 Vol.39 (7): 1894-1898 [Abstract] (628) [HTML 1 KB] [PDF 858 KB] (492)
1991 SU Zhenyu, SONG Guixiang, LIU Yanming, ZHAO Yuan
  Threat modeling and application of server management control system
    Journal of Computer Applications   2019 Vol.39 (7): 1991-1996 [Abstract] (250) [HTML 1 KB] [PDF 1026 KB] (335)
2030 LI Shibao, WANG Yixin, ZHAO Dayin, YE Wei, GUO Lin, LIU Jianhang
  Partial interference alignment scheme with limited antenna resource in heterogeneous network
    Journal of Computer Applications   2019 Vol.39 (7): 2030-2034 [Abstract] (403) [HTML 1 KB] [PDF 838 KB] (291)
924 TAO Tao, ZHOU Xi, MA Bo, ZHAO Fan
  Abnormal time series data detection of gas station by Seq2Seq model based on bidirectional long short-term memory
    Journal of Computer Applications   2019 Vol.39 (3): 924-929 [Abstract] (1984) [HTML 1 KB] [PDF 936 KB] (671)
918 FAN Li, ZHENG Hong, HUANG Jianhua, LI Zhongcheng, JIANG Yahui
  Cooperative evolution method for blockchain mining pool based on adaptive zero-determinant strategy
    Journal of Computer Applications   2019 Vol.39 (3): 918-923 [Abstract] (456) [HTML 1 KB] [PDF 834 KB] (466)
907 HUANG Fengyu, WU Yefu, CHEN Jingren, WU Bing
  Traffic behavior spectrum analysis method based on regional road live data
    Journal of Computer Applications   2019 Vol.39 (3): 907-912 [Abstract] (650) [HTML 1 KB] [PDF 906 KB] (426)
824 REN Xiaokui, LI Feng, CHENG Lin
  Improved centroid localization algorithm based on dynamic loss factor and weight
    Journal of Computer Applications   2019 Vol.39 (3): 824-828 [Abstract] (540) [HTML 1 KB] [PDF 810 KB] (316)
796 JIN Tao, DONG Xiucheng, LI Yining, REN Lei, FAN Peipei
  Optimization of fractional PID controller parameters based on improved PSO algorithm
    Journal of Computer Applications   2019 Vol.39 (3): 796-801 [Abstract] (709) [HTML 1 KB] [PDF 931 KB] (537)
734 MAO Yingchi, CAO Hai, PING Ping, LI Xiaofang
  Feature selection based on maximum conditional and joint mutual information
    Journal of Computer Applications   2019 Vol.39 (3): 734-741 [Abstract] (1097) [HTML 1 KB] [PDF 1284 KB] (522)
695 LI Qiuzhen, LUAN Chaoyang, WANG Shuangxi
  Quality evaluation of face image based on convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (3): 695-699 [Abstract] (1024) [HTML 1 KB] [PDF 821 KB] (711)
688 HAN Jianghong, YUAN Jiaxuan, WEI Xing, LU Yang
  Pedestrian visual positioning algorithm for underground roadway based on deep learning
    Journal of Computer Applications   2019 Vol.39 (3): 688-694 [Abstract] (705) [HTML 1 KB] [PDF 1079 KB] (654)
663 SHEN Ying, HUANG Zhangcan, TAN Qing, LIU Ning
  Krill herd algorithm based on dynamic pressure control operator
    Journal of Computer Applications   2019 Vol.39 (3): 663-667 [Abstract] (505) [HTML 1 KB] [PDF 786 KB] (348)
656 YANG Yang, PAN Dazhi, LIU Yi, TAN Dailun
  New simplified model of discounted {0-1} knapsack problem and solution by genetic algorithm
    Journal of Computer Applications   2019 Vol.39 (3): 656-662 [Abstract] (642) [HTML 1 KB] [PDF 1164 KB] (453)
644 QIU Ningjia, CONG Lin, ZHOU Sicheng, WANG Peng, LI Yanfang
  SVD-CNN barrage text classification algorithm combined with improved active learning
    Journal of Computer Applications   2019 Vol.39 (3): 644-650 [Abstract] (914) [HTML 1 KB] [PDF 1109 KB] (456)
618 MO Zan, GAI Yanrong, FAN Guanlong
  Credit card fraud classification based on GAN-AdaBoost-DT imbalanced classification algorithm
    Journal of Computer Applications   2019 Vol.39 (2): 618-622 [Abstract] (1666) [HTML 1 KB] [PDF 771 KB] (755)
589 GUO Rongzuo, FENG Chaosheng, QIN Zhiguang
  Modeling and analysis of fault tolerant service composition for intelligent logistics systems of Internet of Things
    Journal of Computer Applications   2019 Vol.39 (2): 589-597 [Abstract] (516) [HTML 1 KB] [PDF 1487 KB] (401)
556 LIAO Bin, WU Wen
  Video shadow removal method using region matching guided by illumination transfer
    Journal of Computer Applications   2019 Vol.39 (2): 556-563 [Abstract] (390) [HTML 1 KB] [PDF 1465 KB] (290)
551 TAO Yongpeng, JING Yu, XU Cong
  Image denoising algorithm based on grouped dictionaries and variational model
    Journal of Computer Applications   2019 Vol.39 (2): 551-555 [Abstract] (481) [HTML 1 KB] [PDF 838 KB] (405)
540 WU Zongjun, WU Wei, YANG Xiaomin, LIU Kai, Gwanggil Jeon, YUAN Hao
  Improved panchromatic sharpening algorithm based on sparse representation
    Journal of Computer Applications   2019 Vol.39 (2): 540-545 [Abstract] (505) [HTML 1 KB] [PDF 1149 KB] (394)
523 WANG Bo, LIU Deliang
  Two-dimensional parameter estimation of near-field sources based on iterative adaptive approach
    Journal of Computer Applications   2019 Vol.39 (2): 523-527 [Abstract] (392) [HTML 1 KB] [PDF 810 KB] (350)
513 ZHENG Zhuoran, ZHENG Xiangwei, TIAN Jie
  Energy-saving method for wireless body area network based on synchronous prediction with penalty error matrix
    Journal of Computer Applications   2019 Vol.39 (2): 513-517 [Abstract] (439) [HTML 1 KB] [PDF 785 KB] (321)
494 LI Lei, XUE Yang, LYU Nianling, FENG Min
  Online task and resource scheduling designing for container cloud queue based on Lyapunov optimization method
    Journal of Computer Applications   2019 Vol.39 (2): 494-500 [Abstract] (993) [HTML 1 KB] [PDF 1156 KB] (591)
488 MA Lan, WANG Jingjie, CHEN Huan
  Business data security of system wide information management based on content mining
    Journal of Computer Applications   2019 Vol.39 (2): 488-493 [Abstract] (489) [HTML 1 KB] [PDF 1015 KB] (361)
483 LI Qi, YAN Bin, CHEN Na, YANG Hongmei
  3D medical image reversible watermarking algorithm based on unidirectional prediction error expansion
    Journal of Computer Applications   2019 Vol.39 (2): 483-487 [Abstract] (544) [HTML 1 KB] [PDF 830 KB] (366)
453 GUO Xuancheng, LIN Hui, YE Xiucai, XU Chuanfeng
  Controller deployment and switch dynamic migration strategy in software defined WAN
    Journal of Computer Applications   2019 Vol.39 (2): 453-457 [Abstract] (515) [HTML 1 KB] [PDF 801 KB] (355)
409 HAN Zhonghua, BI Kaiyuan, SI Wen, LYU Zhe
  Clustering by fast search and find of density peaks based on spectrum analysis
    Journal of Computer Applications   2019 Vol.39 (2): 409-413 [Abstract] (454) [HTML 1 KB] [PDF 869 KB] (328)
392 QIN Pingle, LI Qi, ZENG Jianchao, ZHANG Na, SONG Yulong
  Image retrieval algorithm for pulmonary nodules based on multi-scale dense network
    Journal of Computer Applications   2019 Vol.39 (2): 392-397 [Abstract] (443) [HTML 1 KB] [PDF 1084 KB] (430)
388 XIE Zhihua, JIANG Peng, YU Xinhe, ZHANG Shuai
  Hyperspectral face recognition system based on VGGNet and multi-band recurrent network
    Journal of Computer Applications   2019 Vol.39 (2): 388-391 [Abstract] (786) [HTML 1 KB] [PDF 635 KB] (510)
382 WANG Xin, LI Ke, XU Mingjun, NING Chen
  Improved remote sensing image classification algorithm based on deep learning
    Journal of Computer Applications   2019 Vol.39 (2): 382-387 [Abstract] (742) [HTML 1 KB] [PDF 1083 KB] (624)
348 YANG Shiqiang, LUO Xiaoyu, QIAO Dan, LIU Peilei, LI Dexin
  Continuous action segmentation and recognition based on sliding window and dynamic programming
    Journal of Computer Applications   2019 Vol.39 (2): 348-353 [Abstract] (1634) [HTML 1 KB] [PDF 911 KB] (517)
311 ZHANG Kejun, LI Weinan, QIAN Rong, SHI Taimeng, JIAO Meng
  Automatic text summarization scheme based on deep learning
    Journal of Computer Applications   2019 Vol.39 (2): 311-315 [Abstract] (813) [HTML 1 KB] [PDF 867 KB] (946)
292 LU Qiuqin, JIN Chao
  Reliability simulation analysis of coal transportation road network
    Journal of Computer Applications   2019 Vol.39 (1): 292-297 [Abstract] (508) [HTML 1 KB] [PDF 1046 KB] (311)
275 XIANG Wen, ZHANG Ling, CHEN Yunhua, JI Qiumin
  Single image super resolution algorithm based on structural self-similarity and deformation block feature
    Journal of Computer Applications   2019 Vol.39 (1): 275-280 [Abstract] (395) [HTML 1 KB] [PDF 1016 KB] (356)
267 LIAO Bin, LI Haowen
  Image depth estimation model based on atrous convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (1): 267-274 [Abstract] (490) [HTML 1 KB] [PDF 1380 KB] (307)
262 WANG Yan, LYU Meng, MENG Xiangfu, LI Yuhao
  Image matching method with illumination robustness
    Journal of Computer Applications   2019 Vol.39 (1): 262-266 [Abstract] (523) [HTML 1 KB] [PDF 774 KB] (324)
256 DING Jianli, MU Tao, WANG Huaichao
  Fast indoor positioning algorithm of airport terminal based on spectral regression kernel discriminant analysis
    Journal of Computer Applications   2019 Vol.39 (1): 256-261 [Abstract] (452) [HTML 1 KB] [PDF 899 KB] (305)
239 GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui
  Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption
    Journal of Computer Applications   2019 Vol.39 (1): 239-244 [Abstract] (675) [HTML 1 KB] [PDF 978 KB] (289)
227 ZHAO Hong, CHANG Zhaobin, WANG Le
  Fast malicious domain name detection algorithm based on lexical features
    Journal of Computer Applications   2019 Vol.39 (1): 227-231 [Abstract] (572) [HTML 1 KB] [PDF 863 KB] (364)
220 DUAN Zongtao, GONG Xuehui, TANG Lei, CHEN Zhe
  Spatio-temporal trajectory retrieval and group discovery in shared transportation
    Journal of Computer Applications   2019 Vol.39 (1): 220-226 [Abstract] (389) [HTML 1 KB] [PDF 1102 KB] (341)
213 LIU Wei, ZHANG Mingxin, AN Dezhi
  User influence analysis algorithm for Weibo topics
    Journal of Computer Applications   2019 Vol.39 (1): 213-219 [Abstract] (786) [HTML 1 KB] [PDF 1163 KB] (387)
199 CAO Jinmeng, NI Rongrong, YANG Biao
  Crowd counting using multi-scale multi-task convolutional neural network
    Journal of Computer Applications   2019 Vol.39 (1): 199-204 [Abstract] (1266) [HTML 1 KB] [PDF 1063 KB] (489)
186 CHEN Guangxi, WANG Jiaxin, HUANG Yong, ZHAN Yijun, ZHAN Baoying
  Pedestrian detection method based on cascade networks
    Journal of Computer Applications   2019 Vol.39 (1): 186-191 [Abstract] (526) [HTML 1 KB] [PDF 967 KB] (398)
160 ZHI Shuting, LI Xiaoge, WANG Jingbo, WANG Penghua
  Sentiment analysis of entity aspects based on multi-attention long short-term memory
    Journal of Computer Applications   2019 Vol.39 (1): 160-167 [Abstract] (568) [HTML 1 KB] [PDF 1273 KB] (337)
136 CHEN Hongyu, DENG Dexiang, YAN Jia, FAN Ci'en
  Image retrieval algorithm based on saliency semantic region weighting
    Journal of Computer Applications   2019 Vol.39 (1): 136-142 [Abstract] (633) [HTML 1 KB] [PDF 1175 KB] (391)
131 BU Tongtong, CAO Tianjie
  Risk assessment method of Android application based on permission
    Journal of Computer Applications   2019 Vol.39 (1): 131-135 [Abstract] (776) [HTML 1 KB] [PDF 874 KB] (561)
105 XU Yao, LI Zhuoran, MENG Jinlong, ZHAO Lipo, WEN Jianxin, WANG Guiling
  Extraction method of marine lane boundary from exploiting trajectory big data
    Journal of Computer Applications   2019 Vol.39 (1): 105-112 [Abstract] (673) [HTML 1 KB] [PDF 1324 KB] (470)
93 ZHANG Jiachen, CHEN Qingkui
  Road vehicle congestion analysis model based on YOLO
    Journal of Computer Applications   2019 Vol.39 (1): 93-97 [Abstract] (951) [HTML 1 KB] [PDF 775 KB] (686)
78 FENG Guangsheng, ZHANG Xiaoxue, WANG Huiqiang, LI Bingyang, YUAN Quan, CHEN Shijun, CHEN Dawei
  Classification method and updating mechanism of hierarchical 3D indoor map
    Journal of Computer Applications   2019 Vol.39 (1): 78-81 [Abstract] (424) [HTML 1 KB] [PDF 713 KB] (312)
61 ZHANG Yang, LIANG Yanan, ZHANG Dongwen, SUN Shixin
  Data race detection approach in concurrent programs
    Journal of Computer Applications   2019 Vol.39 (1): 61-65 [Abstract] (620) [HTML 1 KB] [PDF 857 KB] (374)
33 ZHANG Roujia, ZHAN Qingxiang, ZHU Yuhang, TAN Guoping
  Multi-cell uplink joint power control algorithm for LTE system
    Journal of Computer Applications   2019 Vol.39 (1): 33-38 [Abstract] (535) [HTML 1 KB] [PDF 866 KB] (245)
26 TAN Jing, DONG Chengfeng, WANG Huiqiang, WANG Hezhe, FENG Guangsheng, LYU Hongwu, YUAN Quan, CHEN Shijun
  ERC 2: DTN Epidemic Routing method with Congestion Control strategy
    Journal of Computer Applications   2019 Vol.39 (1): 26-32 [Abstract] (454) [HTML 1 KB] [PDF 1110 KB] (325)
15 SONG Zihui, LI Zhuo, CHEN Xin
  Mobile crowdsensing task distribution mechanism based on compressed sensing
    Journal of Computer Applications   2019 Vol.39 (1): 15-21 [Abstract] (532) [HTML 1 KB] [PDF 1085 KB] (404)
1 MAO Yingchi, HAO Shuai, PING Ping, QI Rongzhi
  Cloud resource scheduling method based on combinatorial double auction
    Journal of Computer Applications   2019 Vol.39 (1): 1-7 [Abstract] (633) [HTML 1 KB] [PDF 1103 KB] (545)
3643 CHEN Binjie, LU Zhihua, ZHOU Yu, YE Qingwei
  Indoor speech separation and sound source localization system based on dual-microphone
    Journal of Computer Applications   2018 Vol.38 (12): 3643-3648 [Abstract] (815) [HTML 1 KB] [PDF 866 KB] (530)
3638 YUAN Yongpeng, YOU Datao, QU Shenming, WU Xiangjun, WEI Mengfan, ZHU Mengbo, GENG Xudong, JIA Nairen
  Application of convolution neural network in heart beat recognition
    Journal of Computer Applications   2018 Vol.38 (12): 3638-3642 [Abstract] (702) [HTML 1 KB] [PDF 987 KB] (689)
3612 YU Dunhui, WANG Yi, ZHANG Wanshan
  Ability dynamic measurement algorithm for software crowdsourcing workers
    Journal of Computer Applications   2018 Vol.38 (12): 3612-3617 [Abstract] (769) [HTML 1 KB] [PDF 968 KB] (364)
3607 LI Jinman, WANG Jianming, JIN Guanghao
  Facial attractiveness evaluation method based on fusion of feature-level and decision-level
    Journal of Computer Applications   2018 Vol.38 (12): 3607-3611 [Abstract] (571) [HTML 1 KB] [PDF 818 KB] (406)
3591 YI Guoxian, XIONG Shuhua, HE Xiaohai, WU Xiaohong, ZHENG Xinbo
  People counting method combined with feature map learning
    Journal of Computer Applications   2018 Vol.38 (12): 3591-3595 [Abstract] (377) [HTML 1 KB] [PDF 841 KB] (372)
3584 GAO Jingzhi, LIU Yi, BAI Xu, ZHANG Quan, GUI Zhiguo
  Stationary wavelet domain deep residual convolutional neural network for low-dose computed tomography image estimation
    Journal of Computer Applications   2018 Vol.38 (12): 3584-3590 [Abstract] (460) [HTML 1 KB] [PDF 1168 KB] (400)
3557 LIU Boning, ZHAI Donghai
  Image completion method of generative adversarial networks based on two discrimination networks
    Journal of Computer Applications   2018 Vol.38 (12): 3557-3562 [Abstract] (583) [HTML 1 KB] [PDF 1246 KB] (628)
3518 TANG Junyong, TIAN Penghui, WANG Hui
  Network availability based on Markov chain and quality of service
    Journal of Computer Applications   2018 Vol.38 (12): 3518-3523 [Abstract] (393) [HTML 1 KB] [PDF 1144 KB] (376)
3490 YU Dekuang, YANG Yi, QIAN Jun
  Dynamic random distribution particle swarm optimization strategy for cloud computing resources
    Journal of Computer Applications   2018 Vol.38 (12): 3490-3495 [Abstract] (429) [HTML 1 KB] [PDF 1078 KB] (350)
3471 LI Qi, XIONG Jinbo, HUANG Lizhi, WANG Xuan, MAO Qiming, YAO Lanwu
  Attribute-based access control scheme in smart health
    Journal of Computer Applications   2018 Vol.38 (12): 3471-3475 [Abstract] (579) [HTML 1 KB] [PDF 764 KB] (418)
3462 LUO Yujie, ZHANG Jian, TANG Zhangguo, LI Huanzhou
  Research summary of secure routing protocol for low-power and lossy networks
    Journal of Computer Applications   2018 Vol.38 (12): 3462-3470 [Abstract] (430) [HTML 1 KB] [PDF 1423 KB] (379)
3455 ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia
  Efficient and provably secure short proxy signature scheme
    Journal of Computer Applications   2018 Vol.38 (12): 3455-3461 [Abstract] (384) [HTML 1 KB] [PDF 1106 KB] (391)
3450 SONG Tianyu, YANG Geng
  Design and implementation of middleware system for ciphertext database
    Journal of Computer Applications   2018 Vol.38 (12): 3450-3454 [Abstract] (563) [HTML 1 KB] [PDF 997 KB] (484)
3403 BU Lingzheng, WANG Hongdong, ZHU Meiqiang, DAI Wei
  Multi-source digit recognition algorithm based on improved convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (12): 3403-3408 [Abstract] (368) [HTML 1 KB] [PDF 955 KB] (683)
3348 LIU Yiming, ZHANG Pengcheng, LIU Yi, GUI Zhiguo
  Segmentation of cervical nuclei based on fully convolutional network and conditional random field
    Journal of Computer Applications   2018 Vol.38 (11): 3348-3354 [Abstract] (1089) [HTML 1 KB] [PDF 1095 KB] (915)
3342 GAO Junqiang, TANG Xiaqing, ZHANG Huan, GUO Libin
  Processing method of INS/GPS information delay based on factor graph algorithm
    Journal of Computer Applications   2018 Vol.38 (11): 3342-3347 [Abstract] (964) [HTML 1 KB] [PDF 963 KB] (696)
3336 YAO Xiaoqiang, HOU Zhisen
  Financial time series prediction by long short term memory neural network with tree structure
    Journal of Computer Applications   2018 Vol.38 (11): 3336-3341 [Abstract] (677) [HTML 1 KB] [PDF 941 KB] (562)
3305 CHEN Wenbing, GUAN Zhengxiong, CHEN Yunjie
  Data augmentation method based on conditional generative adversarial net model
    Journal of Computer Applications   2018 Vol.38 (11): 3305-3311 [Abstract] (1942) [HTML 1 KB] [PDF 1131 KB] (1248)
3287 WANG Shuai, YANG Xiaodong
  RFID tag number estimation algorithm based on sequential linear Bayes method
    Journal of Computer Applications   2018 Vol.38 (11): 3287-3292 [Abstract] (561) [HTML 1 KB] [PDF 923 KB] (540)
3282 LIU Yi, HU Zhe, JING Xiaorong
  Downlink beamforming design based user scheduling for MIMO-NOMA systems
    Journal of Computer Applications   2018 Vol.38 (11): 3282-3286 [Abstract] (450) [HTML 1 KB] [PDF 774 KB] (501)
3270 CHEN Fatang, XING Pingping, YANG Yanjuan
  Analysis and design of uplink resource scheduling in narrow band Internet of things
    Journal of Computer Applications   2018 Vol.38 (11): 3270-3274 [Abstract] (524) [HTML 1 KB] [PDF 942 KB] (551)
3258 ZHANG Chuanhao, GU Xuehui, MENG Caixia
  Anti-sniffering attack method based on software defined network
    Journal of Computer Applications   2018 Vol.38 (11): 3258-3262 [Abstract] (724) [HTML 1 KB] [PDF 986 KB] (474)
3241 CAO Xiangying, SUN Weimin, ZHU Youxiang, QIAN Xin, LI Xiaoyu, YE Ning
  Plant image recoginiton based on family priority strategy
    Journal of Computer Applications   2018 Vol.38 (11): 3241-3245 [Abstract] (752) [HTML 1 KB] [PDF 819 KB] (676)
3236 HE Xueying, HAN Zhongyi, WEI Benzheng
  Pigmented skin lesion recognition and classification based on deep convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (11): 3236-3240 [Abstract] (858) [HTML 1 KB] [PDF 810 KB] (784)
3211 LAI Chuanbin, HAN Yuexing, GU Hui, WANG Bing
  Novel virtual boundary detection method based on deep learning
    Journal of Computer Applications   2018 Vol.38 (11): 3211-3215 [Abstract] (753) [HTML 1 KB] [PDF 875 KB] (510)
3199 WANG Peng, ZHANG Aofan, WANG Liqin, DONG Yongfeng
  Image automatic annotation based on transfer learning and multi-label smoothing strategy
    Journal of Computer Applications   2018 Vol.38 (11): 3199-3203 [Abstract] (822) [HTML 1 KB] [PDF 960 KB] (682)
3188 ZHANG Runlian, ZHANG Xin, ZHANG Chuyun, XI Yuang
  Path planning algorithm based on distance and slope in regular Grid digital elevation model
    Journal of Computer Applications   2018 Vol.38 (11): 3188-3192 [Abstract] (536) [HTML 1 KB] [PDF 985 KB] (434)
3180 XIE Jiyang, YAN Dong, XIE Yao, MA Zhanyu
  Analysis of key factors in heat demand prediction based on NARX neural network
    Journal of Computer Applications   2018 Vol.38 (11): 3180-3187 [Abstract] (660) [HTML 1 KB] [PDF 1202 KB] (537)
3150 ZHANG Fangjuan, YANG Yan, DU Shengdong
  Stipend prediction based on enhanced-discriminative canonical correlations analysis and classification ensemble
    Journal of Computer Applications   2018 Vol.38 (11): 3150-3155 [Abstract] (410) [HTML 1 KB] [PDF 893 KB] (432)
3127 LI Wanying, HUANG Ruizhang, DING Zhiyuan, CHEN Yanping, XU Liyang
  Multi-dimensional text clustering with user behavior characteristics
    Journal of Computer Applications   2018 Vol.38 (11): 3127-3131 [Abstract] (966) [HTML 1 KB] [PDF 970 KB] (523)
3084 FAN Zhen, GUO Yi, ZHANG Zhenhao, HAN Meiqi
  Sentiment analysis of movie reviews based on dictionary and weak tagging information
    Journal of Computer Applications   2018 Vol.38 (11): 3084-3088 [Abstract] (793) [HTML 1 KB] [PDF 804 KB] (777)
3081 QU Liping, WU Jiaxi
  Cross-domain personalized recommendation method based on scoring reliability
    Journal of Computer Applications   2018 Vol.38 (11): 3081-3083 [Abstract] (579) [HTML 1 KB] [PDF 589 KB] (451)
3075 LI Yang, DONG Hongbin
  Text sentiment analysis based on feature fusion of convolution neural network and bidirectional long short-term memory network
    Journal of Computer Applications   2018 Vol.38 (11): 3075-3080 [Abstract] (3068) [HTML 1 KB] [PDF 906 KB] (1847)
3063 LIU Yuxin, WANG Li, ZHANG Hao
  Hierarchical attention-based neural network model for spam review detection
    Journal of Computer Applications   2018 Vol.38 (11): 3063-3068 [Abstract] (538) [HTML 1 KB] [PDF 1130 KB] (708)
3057 ZHAO Junhao, LI Yuhua, HUO Lin, LI Ruixuan, GU Xiwu
  Macroeconomic forecasting method fusing Weibo sentiment analysis and deep learning
    Journal of Computer Applications   2018 Vol.38 (11): 3057-3062 [Abstract] (585) [HTML 1 KB] [PDF 994 KB] (733)
3053 QU Zhaowei, WANG Yuan, WANG Xiaoru
  Transfer learning based hierarchical attention neural network for sentiment analysis
    Journal of Computer Applications   2018 Vol.38 (11): 3053-3056 [Abstract] (1014) [HTML 1 KB] [PDF 759 KB] (953)
0
  Hierarchical 3D Indoor Map Classification Method and Updating Mechanism
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (320) [HTML 0 KB] [PDF 0 KB] (27)
0
  DPCS2018+69+ERC2: A DTN Epidemic Routing Method with Congestion Control Strategy
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (233) [HTML 0 KB] [PDF 0 KB] (41)
3048 YANG Yaqian, TANG Shaoting
  Brain node recognition method based on extended low-rank multivariate general linear model
    Journal of Computer Applications   2018 Vol.38 (10): 3048-3052 [Abstract] (476) [HTML 1 KB] [PDF 764 KB] (339)
3025 HUANG Hainan, LI Xiaofeng, LIAN Peikun, RONG Jian
  Trigger probability model of transit signal priority strategies based on signal timing
    Journal of Computer Applications   2018 Vol.38 (10): 3025-3029 [Abstract] (591) [HTML 1 KB] [PDF 741 KB] (371)
2990 JIA Shangkun, HE Fei
  Software regression verification based on witness automata
    Journal of Computer Applications   2018 Vol.38 (10): 2990-2995 [Abstract] (497) [HTML 1 KB] [PDF 1103 KB] (357)
2965 CHEN Yonghong, GUO Lili, ZHANG Shibing
  Energy efficiency analysis of relay assisted cellular network
    Journal of Computer Applications   2018 Vol.38 (10): 2965-2970 [Abstract] (862) [HTML 1 KB] [PDF 801 KB] (377)
2960 LIU Yanjun, ZHAO Zhiqiang, LIU Yan, CUI Ying, WANG Dayong, RAN Peng, GUO Yijun
  Fast intra algorithm based on quality scalable high efficiency video coding
    Journal of Computer Applications   2018 Vol.38 (10): 2960-2964 [Abstract] (481) [HTML 1 KB] [PDF 786 KB] (335)
2950 ZHOU Wei, GUO Mengyu, XIANG Danlei
  Improved QRD-M detection algorithm for spatial modulation system
    Journal of Computer Applications   2018 Vol.38 (10): 2950-2954 [Abstract] (559) [HTML 1 KB] [PDF 781 KB] (403)
2945 WANG Meile, ZHANG Zhizhong, WANG Guangya
  Design and implementation of PDSCH de-resource mapping in LTE-A air interface analyzer
    Journal of Computer Applications   2018 Vol.38 (10): 2945-2949 [Abstract] (562) [HTML 1 KB] [PDF 762 KB] (345)
2940 WANG Songwei, CHEN Jianhua
  Multi-factor authentication key agreement scheme based on chaotic mapping
    Journal of Computer Applications   2018 Vol.38 (10): 2940-2944 [Abstract] (567) [HTML 1 KB] [PDF 877 KB] (397)
2929 JIANG Chen, HU Yupeng, SI Kai, KUANG Wenxin
  Malicious file detection method based on image texture and convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (10): 2929-2933 [Abstract] (1116) [HTML 1 KB] [PDF 716 KB] (566)
2923 WANG Yaojie, NIU Ke, YANG Xiaoyuan
  Information hiding scheme based on generative adversarial network
    Journal of Computer Applications   2018 Vol.38 (10): 2923-2928 [Abstract] (1189) [HTML 1 KB] [PDF 882 KB] (870)
2903 FANG Yuan, LI Ming, WANG Ping, JIANG Xinghe, ZHANG Xinming
  Intrusion detection model based on hybrid convolutional neural network and recurrent neural network
    Journal of Computer Applications   2018 Vol.38 (10): 2903-2907 [Abstract] (1242) [HTML 1 KB] [PDF 918 KB] (940)
2899 FENG Liping, HAN Xie, HAN Qi, ZHENG Fang
  Network virus propagation modeling considering social network user behaviors
    Journal of Computer Applications   2018 Vol.38 (10): 2899-2902 [Abstract] (562) [HTML 1 KB] [PDF 761 KB] (493)
2892 MIAO Junmin, FENG Chaosheng, LI Min, LIU Xia
  Public auditing scheme of data integrity for public cloud
    Journal of Computer Applications   2018 Vol.38 (10): 2892-2898 [Abstract] (559) [HTML 1 KB] [PDF 1067 KB] (451)
2886 FENG Yong, HAN Xiaolong, FU Chenping, WANG Rongbing, XU Hongyan
  Commodity recommendation method integrating user trust and brand recognition
    Journal of Computer Applications   2018 Vol.38 (10): 2886-2891 [Abstract] (532) [HTML 1 KB] [PDF 848 KB] (430)
2850 SHAO Lun, ZHOU Xinzhi, ZHAO Chengping, ZHANG Xu
  Improved K-means clustering algorithm based on multi-dimensional grid space
    Journal of Computer Applications   2018 Vol.38 (10): 2850-2855 [Abstract] (464) [HTML 1 KB] [PDF 828 KB] (370)
2839 SUN Nian, ZHANG Yi, LIN Haibo, HUANG Chao
  Short utterance speaker recognition algorithm based on multi-featured i-vector
    Journal of Computer Applications   2018 Vol.38 (10): 2839-2843 [Abstract] (591) [HTML 1 KB] [PDF 731 KB] (379)
2794 WANG Jian, ZHANG Zhiyong, QIAO Kuoyuan
  Evidence combination rule with similarity collision reduced
    Journal of Computer Applications   2018 Vol.38 (10): 2794-2800 [Abstract] (401) [HTML 1 KB] [PDF 1010 KB] (373)
1912 SHI Wenxu, YANG Yang, BAO Shengli
  Greedy core acceleration dynamic programming algorithm for solving discounted {0-1} knapsack problem
    Journal of Computer Applications   2019 Vol.39 (7): 1912-1917 [Abstract] (737) [HTML 1 KB] [PDF 860 KB] (463)
2747 ZHANG Gang, GAO Junpeng
  Weak signal detection based on combination of power and exponential function model in tri-stable stochastic resonance
    Journal of Computer Applications   2018 Vol.38 (9): 2747-2752 [Abstract] (585) [HTML 1 KB] [PDF 902 KB] (405)
2730 ZHANG Cheng, GUO Qingxiu, FENG Liwei, LI Yuan
  Fault detection strategy based on local neighbor standardization and dynamic principal component analysis
    Journal of Computer Applications   2018 Vol.38 (9): 2730-2734 [Abstract] (610) [HTML 1 KB] [PDF 785 KB] (336)
2712 ZHANG Ming, WANG Jindong, WEI Bo
  Satellite scheduling method for intensive tasks based on improved fireworks algorithm
    Journal of Computer Applications   2018 Vol.38 (9): 2712-2719 [Abstract] (608) [HTML 1 KB] [PDF 1302 KB] (390)
2678 LI Wei, LI Weixiang, ZHANG Fan, JIE Wei
  Rapid mismatching elimination algorithm based on motion smoothing constraints
    Journal of Computer Applications   2018 Vol.38 (9): 2678-2682 [Abstract] (735) [HTML 1 KB] [PDF 1019 KB] (405)
2673 GAO Jingang, LIU Zhiyong, ZHANG Shuang, HOU Daishuang, LIU Xiaofeng
  Application of binocular stereo vision technology in key dimension detection of CRH body
    Journal of Computer Applications   2018 Vol.38 (9): 2673-2677 [Abstract] (782) [HTML 1 KB] [PDF 1010 KB] (441)
2666 XU Xiaodan, LI Bingjie, LI Bosen, LYU Shun
  New 3D scene modeling language and environment based on BNF paradigm
    Journal of Computer Applications   2018 Vol.38 (9): 2666-2672 [Abstract] (744) [HTML 1 KB] [PDF 1259 KB] (445)
2660 GAO Qinquan, HUANG Weiping, DU Min, WEI Mengyu, KE Dongzhong
  Design of augmented reality navigation simulation system for pelvic minimally invasive surgery based on stereoscopic vision
    Journal of Computer Applications   2018 Vol.38 (9): 2660-2665 [Abstract] (582) [HTML 1 KB] [PDF 1132 KB] (426)
2644 LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu
  Dynamic measurement of Android kernel based on ARM virtualization extension
    Journal of Computer Applications   2018 Vol.38 (9): 2644-2649 [Abstract] (984) [HTML 1 KB] [PDF 996 KB] (533)
2568 YANG Guofeng, DAI Jiacai, LIU Xiangjun, WU Xiaolong, TIAN Yanni
  Dynamic multi-subgroup collaborative barebones particle swarm optimization based on kernel fuzzy clustering
    Journal of Computer Applications   2018 Vol.38 (9): 2568-2574 [Abstract] (426) [HTML 1 KB] [PDF 1251 KB] (316)
2549 ZHU Zhu, FU Xiao, WANG Zhijian
  Stealth download hijacking vulnerability of Android application package
    Journal of Computer Applications   2018 Vol.38 (9): 2549-2553 [Abstract] (606) [HTML 1 KB] [PDF 1030 KB] (363)
2535 WU Muyang, LIU Zheng, WANG Yang, LI Yun, LI Tao
  Quality evaluation model of network operation and maintenance based on correlation analysis
    Journal of Computer Applications   2018 Vol.38 (9): 2535-2542 [Abstract] (621) [HTML 1 KB] [PDF 1421 KB] (432)
2500 SONG Jundian, DAI Bingrong, JIANG Liwen, ZHAO Yao, LI Chao, WANG Xiaoqiang
  Data governance collaborative method based on blockchain
    Journal of Computer Applications   2018 Vol.38 (9): 2500-2506 [Abstract] (1496) [HTML 1 KB] [PDF 1276 KB] (807)
2489 WAN Yuan, ZHANG Jinghui, WU Kefeng, MENG Xiaojing
  Image classification based on multi-layer non-negativity and locality Laplacian sparse coding
    Journal of Computer Applications   2018 Vol.38 (9): 2489-2494 [Abstract] (694) [HTML 1 KB] [PDF 1164 KB] (568)
2469 LAI Wenhui, QIAO Yupeng
  Spam messages recognizing method based on word embedding and convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (9): 2469-2476 [Abstract] (1088) [HTML 1 KB] [PDF 1380 KB] (883)
2464 ZHANG Chen, QIAN Tao, JI Donghong
  Joint model of microblog emotion recognition of emoticons and emotion cause detection based on neural network
    Journal of Computer Applications   2018 Vol.38 (9): 2464-2468 [Abstract] (760) [HTML 1 KB] [PDF 949 KB] (696)
2411 LI Qiang, YU Fengqin
  Improved pitch contour creation and selection algorithm for melody extraction
    Journal of Computer Applications   2018 Vol.38 (8): 2411-2415 [Abstract] (757) [HTML 1 KB] [PDF 803 KB] (470)
2370 XU Dong, LI Yong, LIU Dongdong, LU Yakai
  Weight adjustable interference alignment algorithm with imperfect channel state information
    Journal of Computer Applications   2018 Vol.38 (8): 2370-2374 [Abstract] (575) [HTML 1 KB] [PDF 938 KB] (398)
2359 LU Mingchi, WANG Shouhua, LI Yunke, JI Yuanfa, SUN Xiyan, DENG Guihui
  Bluetooth location algorithm based on feature matching and distance weighting
    Journal of Computer Applications   2018 Vol.38 (8): 2359-2364 [Abstract] (700) [HTML 1 KB] [PDF 966 KB] (538)
2306 BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong
  Information hiding algorithm based on fractal graph
    Journal of Computer Applications   2018 Vol.38 (8): 2306-2310 [Abstract] (497) [HTML 1 KB] [PDF 823 KB] (525)
2280 JIANG Bingcheng, HE Qian, CHEN Yiting, LIU Peng
  Cloud database oriented attribute based encryption and query translation middleware
    Journal of Computer Applications   2018 Vol.38 (8): 2280-2286 [Abstract] (715) [HTML 1 KB] [PDF 1123 KB] (450)
2261 ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan
  Data transmission protocol based on short signature scheme for railway bridge monitoring
    Journal of Computer Applications   2018 Vol.38 (8): 2261-2266 [Abstract] (514) [HTML 1 KB] [PDF 973 KB] (363)
2218 WENG Liguo, LIU Wan'an, SHI Bicheng, XIA Min
  Cloud/Snow classification based on multi-dimensional multi-grained cascade forest in plateau region
    Journal of Computer Applications   2018 Vol.38 (8): 2218-2223 [Abstract] (848) [HTML 1 KB] [PDF 1085 KB] (544)
2211 HU Cong, QU Jinjin, XU Chuanpei, ZHU Aijun
  Garment image recognition based on adaptive pooling neural network
    Journal of Computer Applications   2018 Vol.38 (8): 2211-2217 [Abstract] (583) [HTML 1 KB] [PDF 1133 KB] (473)
2205 LI Xinchun, CAO Zhiqiang, LIN Sen, ZHANG Chunhua
  Palmprint and palmvein image fusion recognition algorithm based on super-wavelet domain
    Journal of Computer Applications   2018 Vol.38 (8): 2205-2210 [Abstract] (525) [HTML 1 KB] [PDF 890 KB] (416)
2192 YE Yuanzheng, LI Xiaoxia, LI Minze
  Rapid stable detection of human faces in image sequence based on MS-KCF model
    Journal of Computer Applications   2018 Vol.38 (8): 2192-2197 [Abstract] (737) [HTML 1 KB] [PDF 1139 KB] (663)
2185 ZHANG Cheng, GUO Qingxiu, LI Yuan
  Batch process monitoring based on k nearest neighbors in discriminated kernel principle component space
    Journal of Computer Applications   2018 Vol.38 (8): 2185-2191 [Abstract] (421) [HTML 1 KB] [PDF 977 KB] (365)
2175 XIONG Changzhen, CHE Manqiang, WANG Runling
  Real-time visual tracking algorithm based on correlation filters and sparse convolutional features
    Journal of Computer Applications   2018 Vol.38 (8): 2175-2179 [Abstract] (440) [HTML 1 KB] [PDF 1053 KB] (397)
2170 YU Hui, FENG Xupeng, LIU Lijun, HUANG Qingsong
  Identification method of user's medical intention in chatting robot
    Journal of Computer Applications   2018 Vol.38 (8): 2170-2174 [Abstract] (751) [HTML 1 KB] [PDF 781 KB] (645)
2141 XIA Min, SONG Wenzhu, SHI Bicheng, LIU Jia
  Deep reinforcement learning method based on weighted densely connected convolutional network
    Journal of Computer Applications   2018 Vol.38 (8): 2141-2147 [Abstract] (613) [HTML 1 KB] [PDF 1090 KB] (820)
0
  Design of AR Navigation Simulation System for Pelvic Minimally Invasive Surgery Based on Stereoscopic Vision
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (415) [HTML 0 KB] [PDF 0 KB] (35)
2136 WANG Yan, LUO Qian, DENG Hui
  Bearing fault diagnosis method based on Gibbs sampling
    Journal of Computer Applications   2018 Vol.38 (7): 2136-2140 [Abstract] (520) [HTML 1 KB] [PDF 804 KB] (395)
2130 FENG Liwei, ZHANG Cheng, LI Yuan, XIE Yanhong
  Fault detection for multistage process based on improved local neighborhood standardization and kNN
    Journal of Computer Applications   2018 Vol.38 (7): 2130-2135 [Abstract] (410) [HTML 1 KB] [PDF 905 KB] (352)
2100 WU Renbiao, LI Jiayi, QU Jingyi
  Flight delay prediction model based on dual-channel convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (7): 2100-2106 [Abstract] (792) [HTML 1 KB] [PDF 1206 KB] (438)
2083 LI Yuanyuan, CAI Yiheng, GAO Xurong
  Retinal vessel segmentation algorithm based on hybrid phase feature
    Journal of Computer Applications   2018 Vol.38 (7): 2083-2088 [Abstract] (559) [HTML 1 KB] [PDF 1042 KB] (399)
2076 LIU Xiaohui, LU Lijun, FENG Qianjin, CHEN Wufan
  Proximal smoothing iterative algorithm for magnetic resonance image reconstruction based on Moreau-envelope
    Journal of Computer Applications   2018 Vol.38 (7): 2076-2082 [Abstract] (599) [HTML 1 KB] [PDF 1157 KB] (378)
2070 ZHANG Yonghong, XIA Guanghao, KAN Xi, HE Jing, GE Taotao, WANG Jiangeng
  Road extraction from multi-source high resolution remote sensing image based on fully convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (7): 2070-2075 [Abstract] (922) [HTML 1 KB] [PDF 961 KB] (549)
2050 DU Liuqing, XU Hezuo, YU Yongwei, ZHANG Jianheng
  Fast workpiece matching method for flexible clamping robot based on improved SURF algorithm
    Journal of Computer Applications   2018 Vol.38 (7): 2050-2055 [Abstract] (553) [HTML 1 KB] [PDF 980 KB] (236)
2020 WANG Aizhen, HU Jiao, HAN Hangcheng
  Capture method of direct sequence spread spectrum signal based on cascade stochastic resonance
    Journal of Computer Applications   2018 Vol.38 (7): 2020-2023 [Abstract] (487) [HTML 1 KB] [PDF 794 KB] (369)
2015 SUO Longlong, ZHANG Gengxin, BIAN Dongming, XIE Zhidong, TIAN Xiang
  Performance analysis of Luby transform codes under Gaussian elimination decoding
    Journal of Computer Applications   2018 Vol.38 (7): 2015-2019 [Abstract] (562) [HTML 1 KB] [PDF 744 KB] (305)
2001 HUANG Sheng, HU Lingwei, FU Yuanpeng
  State machine based video rate adaptation algorithm
    Journal of Computer Applications   2018 Vol.38 (7): 2001-2004 [Abstract] (619) [HTML 1 KB] [PDF 803 KB] (383)
1989 FANG Wenhao, LU Yang, WEI Xing
  UWB high-precision localization in underground coal mine based on region determination
    Journal of Computer Applications   2018 Vol.38 (7): 1989-1994 [Abstract] (677) [HTML 1 KB] [PDF 913 KB] (404)
1981 WANG Ming, XU Liang, HE Xiaomin
  RSSI collaborative location algorithm of selecting preference accuracy for wireless sensor network
    Journal of Computer Applications   2018 Vol.38 (7): 1981-1988 [Abstract] (425) [HTML 1 KB] [PDF 1237 KB] (393)
1967 YANG Jie, LI Songbin, DENG Haojiang
  Steganalysis based on Bayesian network for compressed speech
    Journal of Computer Applications   2018 Vol.38 (7): 1967-1973 [Abstract] (498) [HTML 1 KB] [PDF 1111 KB] (384)
1916 CHEN Jingren, WU Yefu, WU Bing
  Driver behavior spectrum analysis method based on vehicle driving data
    Journal of Computer Applications   2018 Vol.38 (7): 1916-1922 [Abstract] (1457) [HTML 1 KB] [PDF 1311 KB] (659)
1910 CHANG Bingguo, ZANG Hongying
  Time series classifier design based on piecewise dimensionality reduction and updated dynamic time warping
    Journal of Computer Applications   2018 Vol.38 (7): 1910-1915 [Abstract] (577) [HTML 1 KB] [PDF 935 KB] (378)
1853 ZOU Chengming, LUO Ying, XU Xiaolong
  Fine-grained image classification method based on multi-feature combination
    Journal of Computer Applications   2018 Vol.38 (7): 1853-1856 [Abstract] (956) [HTML 1 KB] [PDF 862 KB] (574)
1839 YANG Chunni, FENG Chaosheng
  Multi-intention recognition model with combination of syntactic feature and convolution neural network
    Journal of Computer Applications   2018 Vol.38 (7): 1839-1845 [Abstract] (1910) [HTML 1 KB] [PDF 1194 KB] (985)
1831 ZHANG Runyan, MENG Fanrong, ZHOU Yong, LIU Bing
  Semantic relation extraction model via attention based neural Turing machine
    Journal of Computer Applications   2018 Vol.38 (7): 1831-1838 [Abstract] (802) [HTML 1 KB] [PDF 1298 KB] (773)
1820 FAN Jun, WANG Xin, XU Hui
  Prediction method of tectonic coal thickness based on particle swarm optimized hybrid kernel extreme learning machine
    Journal of Computer Applications   2018 Vol.38 (6): 1820-1825 [Abstract] (457) [HTML 1 KB] [PDF 1149 KB] (425)
1801 CAO Ang, ZHANG Shenjia, LIU Rui, ZOU Lian, FAN Ci'en
  Muscle fatigue state classification system based on surface electromyography signal
    Journal of Computer Applications   2018 Vol.38 (6): 1801-1808 [Abstract] (768) [HTML 1 KB] [PDF 1309 KB] (549)
1795 CHEN Tian, WANG Jiawei, AN Xin, REN Fuji
  Parallel test scheduling optimization method for three-dimensional chip with multi-core and multi-layer
    Journal of Computer Applications   2018 Vol.38 (6): 1795-1800 [Abstract] (492) [HTML 1 KB] [PDF 1090 KB] (391)
1777 CHEN Chen, ZHAO Jianwei, CAO Feilong
  Image super-resolution reconstruction based on four-channel convolutional sparse coding
    Journal of Computer Applications   2018 Vol.38 (6): 1777-1783 [Abstract] (362) [HTML 1 KB] [PDF 1085 KB] (376)
1771 XIE Benming, HAN Mingming, ZHANG Pan, ZHANG Wei
  Optimization algorithm of dynamic time warping for speech recognition of aircraft towing vehicle
    Journal of Computer Applications   2018 Vol.38 (6): 1771-1776 [Abstract] (437) [HTML 1 KB] [PDF 1117 KB] (413)
1765 XIE Yonghua, HAN Liping
  Local binary pattern based on dominant gradient encoding for pollen image recognition
    Journal of Computer Applications   2018 Vol.38 (6): 1765-1770 [Abstract] (552) [HTML 1 KB] [PDF 1090 KB] (448)
1760 WU Liang, HE Yi, MEI Xue, LIU Huan
  Online behavior recognition using space-time interest points and probabilistic latent-dynamic conditional random field model
    Journal of Computer Applications   2018 Vol.38 (6): 1760-1764 [Abstract] (340) [HTML 1 KB] [PDF 783 KB] (436)
1755 ZUO Xiangmei, JIA Lijiao, HAN Pengcheng
  Hierarchical three-dimensional shape ring feature extraction method
    Journal of Computer Applications   2018 Vol.38 (6): 1755-1759 [Abstract] (417) [HTML 1 KB] [PDF 1054 KB] (399)
1726 YAN Xiaoyong, LI Qing
  Method for determining boundaries of binary protocol format keywords based on optimal path search
    Journal of Computer Applications   2018 Vol.38 (6): 1726-1731 [Abstract] (420) [HTML 1 KB] [PDF 953 KB] (426)
1709 SUN Wange, XIA Kewen, LAN Pu
  Regularized weighted incomplete robust principal component analysis method and its application in fitting trajectory of wireless sensor network nodes
    Journal of Computer Applications   2018 Vol.38 (6): 1709-1714 [Abstract] (350) [HTML 1 KB] [PDF 961 KB] (353)
1675 LIU Zhanghu, CHENG Chunling
  Variance reduced stochastic variational inference algorithm for topic modeling of large-scale data
    Journal of Computer Applications   2018 Vol.38 (6): 1675-1681 [Abstract] (454) [HTML 1 KB] [PDF 1144 KB] (388)
1653 ZHANG Youjie, ZHANG Qingping, WU wei, SHI Zhe
  Security analysis and evaluation of representational state transfer based on attack graph
    Journal of Computer Applications   2018 Vol.38 (6): 1653-1657 [Abstract] (525) [HTML 1 KB] [PDF 800 KB] (457)
1633 LI Cong, YANG Xiaoyuan, WANG Xu'an
  Effecient outsourced computing based on extended attribute-based functional encryption
    Journal of Computer Applications   2018 Vol.38 (6): 1633-1639 [Abstract] (424) [HTML 1 KB] [PDF 1066 KB] (279)
1628 GAO Baojian, WANG Shaodi, HU Yun, CAO Yanjun
  Physical layer parallel interpolation encryption algorithm based on orthogonal frequency division multiplexing
    Journal of Computer Applications   2018 Vol.38 (6): 1628-1632 [Abstract] (481) [HTML 1 KB] [PDF 777 KB] (392)
1620 ZHOU Zhicheng, LI Lixin, GUO Song, LI Zuohui
  Biometric and password two-factor cross domain authentication scheme based on blockchain technology
    Journal of Computer Applications   2018 Vol.38 (6): 1620-1627 [Abstract] (615) [HTML 1 KB] [PDF 1299 KB] (615)
1554 YANG Shuo, CHEN Lifang, SHI Yu, MAO Yiming
  Semantic segmentation of blue-green algae based on deep generative adversarial net
    Journal of Computer Applications   2018 Vol.38 (6): 1554-1561 [Abstract] (712) [HTML 1 KB] [PDF 1306 KB] (638)
1542 LI ping, DAI Yueming, WU Dinghui
  Application of dual-channel convolutional neural network in sentiment analysis
    Journal of Computer Applications   2018 Vol.38 (6): 1542-1546 [Abstract] (942) [HTML 1 KB] [PDF 780 KB] (790)
1527 XU Yan, XIONG Yingjun, YANG Jing
  Review of spike sequence learning methods for spiking neurons
    Journal of Computer Applications   2018 Vol.38 (6): 1527-1534 [Abstract] (600) [HTML 1 KB] [PDF 1516 KB] (636)
1488 TIAN Hao, ZHANG Gexiang, RONG Haina, Mario J. PÉREZ-JIMÉNEZ, Luis VALENCIA-CABRERA, CHEN Peng, HOU Rong, QI Dunwu
  Population model of giant panda ecosystem based on population dynamics P system
    Journal of Computer Applications   2018 Vol.38 (5): 1488-1493 [Abstract] (517) [HTML 1 KB] [PDF 1014 KB] (418)
1427 LEI Sijia, ZHAO Fengqun
  Foggy image enhancement based on adaptive Riesz fractional differential
    Journal of Computer Applications   2018 Vol.38 (5): 1427-1431 [Abstract] (375) [HTML 1 KB] [PDF 794 KB] (485)
1420 LIANG Zhonghao, PENG Dewei, JIN Yanxu, GUO Liang
  Single image dehazing algorithm based on traffic scene region enhancement
    Journal of Computer Applications   2018 Vol.38 (5): 1420-1426 [Abstract] (538) [HTML 1 KB] [PDF 1224 KB] (537)
1393 XU Jiaqing, WAN Wen, CAI Dongjing, TANG Fuqiao, HE Jie, ZHANG Lei
  Implementation of deterministic routing fault-tolerant strategies for K-Ary N-Bridge system
    Journal of Computer Applications   2018 Vol.38 (5): 1393-1398 [Abstract] (378) [HTML 1 KB] [PDF 956 KB] (514)
1346 YAN Hong, YANG Bo, YANG Hongyu
  Outlier detection in time series data based on heteroscedastic Gaussian processes
    Journal of Computer Applications   2018 Vol.38 (5): 1346-1352 [Abstract] (623) [HTML 1 KB] [PDF 1092 KB] (502)
1304 WANG Keli, YUAN Hongchun
  Aquatic animal image classification method based on transfer learning
    Journal of Computer Applications   2018 Vol.38 (5): 1304-1308 [Abstract] (734) [HTML 1 KB] [PDF 949 KB] (655)
1294 YANG Xiaoling, LI Zhiqing, LIU Yutong
  Automatic image annotation based on multi-label discriminative dictionary learning
    Journal of Computer Applications   2018 Vol.38 (5): 1294-1298 [Abstract] (557) [HTML 1 KB] [PDF 930 KB] (561)
1278 LI Yakun, PAN Qing, WANG Feng
  Joint Chinese word segmentation and punctuation prediction based on improved multilayer BLSTM network
    Journal of Computer Applications   2018 Vol.38 (5): 1278-1282 [Abstract] (577) [HTML 1 KB] [PDF 903 KB] (608)
1272 LU Ling, YANG Wu, WANG Yuanlun, LEI Zijian, LI Ying
  Long text classification combined with attention mechanism
    Journal of Computer Applications   2018 Vol.38 (5): 1272-1277 [Abstract] (2643) [HTML 1 KB] [PDF 946 KB] (1220)
1261 XU Yinjie, SUN Chunhua, LIU Yezheng
  Joint sentiment/topic model integrating user characteristics
    Journal of Computer Applications   2018 Vol.38 (5): 1261-1266 [Abstract] (413) [HTML 1 KB] [PDF 1024 KB] (558)
1254 YUAN Yichuan, YANG Zhou, LUO Tingxing, QIN Jin
  Multi-population-based competitive differential evolution algorithm for dynamic optimization problem
    Journal of Computer Applications   2018 Vol.38 (5): 1254-1260 [Abstract] (381) [HTML 1 KB] [PDF 1051 KB] (464)
1230 JI Ting, ZHANG Hua
  Nonparametric approximation policy iteration reinforcement learning based on Dyna framework
    Journal of Computer Applications   2018 Vol.38 (5): 1230-1238 [Abstract] (540) [HTML 1 KB] [PDF 1297 KB] (591)
1207 PU Yuwen, HU Haibo, HE Lingjun
  Visual analytics on trajectory of pseudo base-stations based on SMS spam collected from mobilephone users
    Journal of Computer Applications   2018 Vol.38 (4): 1207-1212 [Abstract] (479) [HTML 1 KB] [PDF 1083 KB] (442)
1201 WANG Jian, WANG Zhihong, ZHANG Lejun
  Dynamic model of public opinion and simulation analysis of complex network evolution
    Journal of Computer Applications   2018 Vol.38 (4): 1201-1206 [Abstract] (624) [HTML 1 KB] [PDF 868 KB] (525)
1195 LIANG Lidong, JIA Wenyou
  Heuristic packing algorithm based on forbearing stratified strategy
    Journal of Computer Applications   2018 Vol.38 (4): 1195-1200 [Abstract] (502) [HTML 1 KB] [PDF 899 KB] (478)
1189 WEI Yaru, ZHU Jin
  Modeling of twin rail-mounted gantry scheduling and container slot selection in automated terminal
    Journal of Computer Applications   2018 Vol.38 (4): 1189-1194 [Abstract] (547) [HTML 1 KB] [PDF 1037 KB] (502)
1176 JIANG Maosong, WANG Dongxia, NIU Fanglin, CAO Yudong
  Speech enhancement method based on sparsity-regularized non-negative matrix factorization
    Journal of Computer Applications   2018 Vol.38 (4): 1176-1180 [Abstract] (477) [HTML 1 KB] [PDF 800 KB] (462)
1141 SUN Yitang, SONG Huihui, ZHANG Kaihua, YAN Fei
  Face super-resolution via very deep convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (4): 1141-1145 [Abstract] (682) [HTML 1 KB] [PDF 890 KB] (536)
1134 WANG Lifang, DONG Xia, QIN Pinle, GAO Yuan
  Multi-modal brain image fusion method based on adaptive joint dictionary learning
    Journal of Computer Applications   2018 Vol.38 (4): 1134-1140 [Abstract] (638) [HTML 1 KB] [PDF 1149 KB] (711)
1072 FU Chaojiang, WANG Tianqi, LIN Yuerong
  Parallel algorithm for explicit finite element analysis based on efficient parallel computational strategy
    Journal of Computer Applications   2018 Vol.38 (4): 1072-1077 [Abstract] (383) [HTML 1 KB] [PDF 1072 KB] (502)
1046 LIU Li, ZHAN Enqi, ZHENG Jianbin, WANG Yang
  Online signature verification based on curve segment similarity matching
    Journal of Computer Applications   2018 Vol.38 (4): 1046-1050 [Abstract] (447) [HTML 1 KB] [PDF 930 KB] (435)
1041 WANG Yan, HOU Zhengfeng, ZHANG Xueqi, HUANG Mengjie
  Dynamic threshold signature scheme based on Chinese remainder theorem
    Journal of Computer Applications   2018 Vol.38 (4): 1041-1045 [Abstract] (650) [HTML 1 KB] [PDF 761 KB] (498)
1017 REN Shuai, ZHANG Tao, XU Zhenchao, WANG Zhen, HE Yuan, LIU Yunong
  Information hiding algorithm for 3D models based on feature point labeling and clustering
    Journal of Computer Applications   2018 Vol.38 (4): 1017-1022 [Abstract] (404) [HTML 1 KB] [PDF 994 KB] (403)
949 LIU Yutong, LI Zhiqing, YANG Xiaoling
  Application of improved convolution neural network in remote sensing image classification
    Journal of Computer Applications   2018 Vol.38 (4): 949-954 [Abstract] (718) [HTML 1 KB] [PDF 980 KB] (960)
935 AN Xuxiao, DENG Hongmin, SHI Xingyu
  Parking lot space detection method based on mini convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (4): 935-938 [Abstract] (743) [HTML 1 KB] [PDF 638 KB] (994)
905 XUE Yu, MEI Xue, ZHI Youran, XU Zhixing, SHI Xiang
  Sub-health state identification method of subway door based on time series data mining
    Journal of Computer Applications   2018 Vol.38 (3): 905-910 [Abstract] (567) [HTML 1 KB] [PDF 974 KB] (502)
900 SUN Gongwu, XIE Jirong, WANG Junxuan
  Ship course identification model based on recursive least squares algorithm with dynamic forgetting factor
    Journal of Computer Applications   2018 Vol.38 (3): 900-904 [Abstract] (695) [HTML 1 KB] [PDF 768 KB] (505)
891 WANG Fei, YU Fengqing
  Musical instrument identification based on multiscale time-frequency modulation and multilinear principal component analysis
    Journal of Computer Applications   2018 Vol.38 (3): 891-894 [Abstract] (424) [HTML 1 KB] [PDF 815 KB] (426)
879 YIN Li, LIN Xinqi, CHEN Lifei
  Moving object removal forgery detection algorithm in video frame
    Journal of Computer Applications   2018 Vol.38 (3): 879-883 [Abstract] (468) [HTML 1 KB] [PDF 862 KB] (476)
859 ZOU Jiabin, SUN Wei
  Multi-focus image fusion based on lifting stationary wavelet transform and joint structural group sparse representation
    Journal of Computer Applications   2018 Vol.38 (3): 859-865 [Abstract] (423) [HTML 1 KB] [PDF 1250 KB] (485)
812 LI Zhen, NIU Jun, WANG Kui, XIN Yuanyuan
  Optimization of source code search based on multi-feature weight assignment
    Journal of Computer Applications   2018 Vol.38 (3): 812-817 [Abstract] (627) [HTML 1 KB] [PDF 968 KB] (563)
786 LI Ruying, ZHANG Zhizhong, DENG Xiangtian
  Design and implementation of carrier aggregation in LTE-A air-interface analyzer
    Journal of Computer Applications   2018 Vol.38 (3): 786-790 [Abstract] (747) [HTML 1 KB] [PDF 765 KB] (597)
780 ABDURAHMAN Kadir, MUTALLIP Sattar, MIREGULI Aili
  Asynchronous hexadecimal digital secure communication system based on shift keying of coupled hyperchaotic systems
    Journal of Computer Applications   2018 Vol.38 (3): 780-785 [Abstract] (493) [HTML 1 KB] [PDF 976 KB] (384)
763 HAO Dehua, GUAN Weiguo, ZOU Linjie, JIAO Meng
  Fast virtual grid matching localization algorithm based on Pearson correlation coefficient
    Journal of Computer Applications   2018 Vol.38 (3): 763-768 [Abstract] (543) [HTML 1 KB] [PDF 962 KB] (511)
741 TANG Yaxin, LI Yanlong, YANG Chao, WANG Bo
  Time and frequency synchronization for OFDM/OQAM in ground air channel
    Journal of Computer Applications   2018 Vol.38 (3): 741-745 [Abstract] (541) [HTML 1 KB] [PDF 779 KB] (499)
734 HE He, LI Linlin, LU Yunfei
  Delay tolerant network clustering routing algorithm based on vehicular Ad Hoc network communication terminals and motion information
    Journal of Computer Applications   2018 Vol.38 (3): 734-740 [Abstract] (475) [HTML 1 KB] [PDF 1142 KB] (502)
728 REN Zhi, TIAN Jieli, YOU Lei, LYU Yuhui
  Access protocol for terahertz wireless personal area networks based on high efficient handover of piconet coordinator
    Journal of Computer Applications   2018 Vol.38 (3): 728-733 [Abstract] (514) [HTML 1 KB] [PDF 956 KB] (468)
722 TANG Jiaqi, WU Jingli
  Protein function prediction method based on PPI network and machine learning
    Journal of Computer Applications   2018 Vol.38 (3): 722-727 [Abstract] (773) [HTML 1 KB] [PDF 948 KB] (673)
666 WANG Lin, ZHANG Hehe
  Application of Faster R-CNN model in vehicle detection
    Journal of Computer Applications   2018 Vol.38 (3): 666-670 [Abstract] (1766) [HTML 1 KB] [PDF 877 KB] (1291)
661 SHI En, LI Qian, GU Daquan, ZHAO Zhangming
  Weather radar echo extrapolation method based on convolutional neural networks
    Journal of Computer Applications   2018 Vol.38 (3): 661-665 [Abstract] (2462) [HTML 1 KB] [PDF 963 KB] (1045)
610 WU Hailong, BAI Zhengyao, ZHANG Yu, HE Qian
  Design and realization of low frequency radio astronomical signal acquisition circuit based on modulated wideband converter
    Journal of Computer Applications   2018 Vol.38 (2): 610-614 [Abstract] (457) [HTML 1 KB] [PDF 738 KB] (530)
602 HE Chun, LI Qi, WU Ranghao, LIU Bangxin
  Diagnosis of fault circuit by modularized BP neural network based on fault propagation
    Journal of Computer Applications   2018 Vol.38 (2): 602-609 [Abstract] (514) [HTML 1 KB] [PDF 1169 KB] (496)
582 QIU Hanguang, ZHOU Yufeng
  Reception box locating-vehicle routing problems in urban distribution based on nested Logit model
    Journal of Computer Applications   2018 Vol.38 (2): 582-588 [Abstract] (374) [HTML 1 KB] [PDF 1100 KB] (457)
568 LI Zhou, CUI Chen
  Observation matrix optimization algorithm in compressive sensing based on singular value decomposition
    Journal of Computer Applications   2018 Vol.38 (2): 568-572 [Abstract] (590) [HTML 1 KB] [PDF 756 KB] (462)
563 ZHOU Feng, LIN Nan, CHEN Xiaoping
  Inverse kinematics equation solving method for six degrees of freedom manipulator based on six dimensional linear interpolation
    Journal of Computer Applications   2018 Vol.38 (2): 563-567 [Abstract] (477) [HTML 1 KB] [PDF 677 KB] (441)
522 WANG Guisheng, REN Qinghua, XU Bingzheng, LIU Yang
  Design of transform domain communication system for long distance aeronautical communication
    Journal of Computer Applications   2018 Vol.38 (2): 522-527 [Abstract] (440) [HTML 1 KB] [PDF 869 KB] (403)
497 SUN Limei, LI Yue, Ejike Ifeanyi Michael, CAO Keyan
  Simplified Slope One algorithm for online rating prediction
    Journal of Computer Applications   2018 Vol.38 (2): 497-502 [Abstract] (471) [HTML 1 KB] [PDF 939 KB] (533)
483 LI Ye, CHEN Yiyan, ZHANG Shufen
  Design of mixed data clustering algorithm based on density peak
    Journal of Computer Applications   2018 Vol.38 (2): 483-490 [Abstract] (392) [HTML 1 KB] [PDF 1493 KB] (407)
471 SONG Baoyan, JIA Chunjie, SHAN Xiaohuan, DING Linlin, DING Xingyan
  Dynamic Top- K interesting subgraph query on large-scale labeled graph
    Journal of Computer Applications   2018 Vol.38 (2): 471-477 [Abstract] (421) [HTML 1 KB] [PDF 1088 KB] (497)
448 SUN Jinyu, WANG Hongyuan, ZHANG Ji, ZHANG Wenwen
  Person re-identification method based on block sparse representation
    Journal of Computer Applications   2018 Vol.38 (2): 448-453 [Abstract] (527) [HTML 1 KB] [PDF 1006 KB] (394)
443 TONG Nan, FU Qiang, ZHONG Caiming
  Improved teaching-learning-based optimization algorithm based on self-learning mechanism
    Journal of Computer Applications   2018 Vol.38 (2): 443-447 [Abstract] (565) [HTML 1 KB] [PDF 836 KB] (484)
433 LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng
  Differential crow search algorithm based on Lévy flight for solving discount {0-1} knapsack problem
    Journal of Computer Applications   2018 Vol.38 (2): 433-442 [Abstract] (552) [HTML 1 KB] [PDF 1349 KB] (468)
357 XU Bing, GUO Yuanbo, YE Ziwei, HU Yongjin
  Abnormal user detection in enterprise network based on graph analysis and support vector machine
    Journal of Computer Applications   2018 Vol.38 (2): 357-362 [Abstract] (599) [HTML 1 KB] [PDF 971 KB] (488)
352 ZHONG Ya, GUO Yuanbo
  Design and implementation of log parsing system based on machine learning
    Journal of Computer Applications   2018 Vol.38 (2): 352-356 [Abstract] (2053) [HTML 1 KB] [PDF 841 KB] (1223)
348 LIU Rong, PAN Hongzhi, LIU Bo, ZU Ting, FANG Qun, HE Xin, WANG Yang
  Data updating method for cloud storage based on ciphertext-policy attribute-based encryption
    Journal of Computer Applications   2018 Vol.38 (2): 348-351 [Abstract] (564) [HTML 1 KB] [PDF 763 KB] (519)
316 ZHOU Zhicheng, LI Lixin, LI Zuohui
  Efficient cross-domain authentication scheme based on blockchain technology
    Journal of Computer Applications   2018 Vol.38 (2): 316-320 [Abstract] (1303) [HTML 1 KB] [PDF 945 KB] (1871)
305 CAI Mengjuan, CHEN Xingshu, JIN Xin, ZHAO Cheng, YIN Mingyong
  Paging-measurement method for virtual machine process code based on hardware virtualization
    Journal of Computer Applications   2018 Vol.38 (2): 305-309 [Abstract] (465) [HTML 1 KB] [PDF 1037 KB] (601)
300 JIA Fujin, JIANG Yuan
  Design of controller based on backstepping nonlinear pure feedback system
    Journal of Computer Applications   2018 Vol.38 (1): 300-304 [Abstract] (701) [HTML 1 KB] [PDF 666 KB] (374)
290 NIU Guochen, YUAN Jie, GU Runping
  Design and implementation of positioning system for embedded aeronautical ground lights
    Journal of Computer Applications   2018 Vol.38 (1): 290-294 [Abstract] (473) [HTML 1 KB] [PDF 760 KB] (445)
277 WANG Chao, ZHU Ming, WANG Min
  Evaluation of sector dynamic traffic capacity based on controller's cognitive load and improved ant colony algorithm
    Journal of Computer Applications   2018 Vol.38 (1): 277-283 [Abstract] (406) [HTML 1 KB] [PDF 1149 KB] (385)
255 ZHU Junpeng, ZHAO Hongli, YANG Haitao
  Disparity map generation technology based on convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (1): 255-259 [Abstract] (562) [HTML 1 KB] [PDF 1010 KB] (482)
228 ZHENG Jianhong, ZHANG Heng, LI Fei, LI Xiang, DENG Zhan
  Time-frequency combination de-noising algorithm based on orthogonal frequency division multiplexing/offset quadrature amplitude modulation in power line communication system
    Journal of Computer Applications   2018 Vol.38 (1): 228-232 [Abstract] (429) [HTML 1 KB] [PDF 790 KB] (326)
222 KANG Zhaoling, XU Qinbao, WANG Changda
  Multi-granularity topology-based stepwise refinement provenance method for wireless sensor networks
    Journal of Computer Applications   2018 Vol.38 (1): 222-227 [Abstract] (424) [HTML 1 KB] [PDF 1030 KB] (354)
217 JIN Yong, GONG Shengli
  Cluster-based resource allocation scheme in dense femtocell network
    Journal of Computer Applications   2018 Vol.38 (1): 217-221 [Abstract] (444) [HTML 1 KB] [PDF 821 KB] (407)
201 ZHOU Ying, FANG Yong, HUANG Cheng, LIU Liang
  Detection of SQL injection behaviors for PHP applications
    Journal of Computer Applications   2018 Vol.38 (1): 201-206 [Abstract] (790) [HTML 1 KB] [PDF 1074 KB] (468)
146 ZHAO Erping, LIU Wei, DANG Hong'en
  Data compression and spatial indexing technology for massive 3D point cloud
    Journal of Computer Applications   2018 Vol.38 (1): 146-151 [Abstract] (472) [HTML 1 KB] [PDF 1209 KB] (542)
137 LIU Xuejing, HE Yichao, LU Fengjia, WU Congcong, CAI Xiufeng
  Chaotic crow search algorithm based on differential evolution strategy for solving discount {0-1} knapsack problem
    Journal of Computer Applications   2018 Vol.38 (1): 137-145 [Abstract] (526) [HTML 1 KB] [PDF 1387 KB] (451)
126 LI Juan, YOU Xiaoming, LIU Sheng, CHEN Jia
  Dynamic chaotic ant colony system and its application in robot path planning
    Journal of Computer Applications   2018 Vol.38 (1): 126-131 [Abstract] (553) [HTML 1 KB] [PDF 968 KB] (383)
91 YANG Fan, LI Jianping, LI Xin, CHEN Leiting
  Salient object detection algorithm based on multi-task deep convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (1): 91-96 [Abstract] (573) [HTML 1 KB] [PDF 1057 KB] (730)
84 LUO Ming, HUANG Hailiang
  Information extraction method of financial events based on lexical-semantic pattern
    Journal of Computer Applications   2018 Vol.38 (1): 84-90 [Abstract] (504) [HTML 1 KB] [PDF 1071 KB] (474)
79 LI Can, WANG Rangding, YAN Diqun
  Recaptured speech detection algorithm based on convolutional neural network
    Journal of Computer Applications   2018 Vol.38 (1): 79-83 [Abstract] (579) [HTML 1 KB] [PDF 838 KB] (447)
73 WANG Hong, GE Lina, WANG Suqing, WANG Liying, ZHANG Yipeng, LIANG Juncheng
  Improvement of differential privacy protection algorithm based on OPTICS clustering
    Journal of Computer Applications   2018 Vol.38 (1): 73-78 [Abstract] (725) [HTML 1 KB] [PDF 988 KB] (504)
3592 WANG Shuyan, CHEN Pengyuan, SUN Jiaze
  Reduction method of test suites based on mutation analysis
    Journal of Computer Applications   2017 Vol.37 (12): 3592-3596 [Abstract] (525) [HTML 1 KB] [PDF 825 KB] (635)
3574 CHANG Tianyou, WEI Qiang, GENG Yangyang
  Constructing method of PLC program model based on state transition
    Journal of Computer Applications   2017 Vol.37 (12): 3574-3580 [Abstract] (541) [HTML 1 KB] [PDF 1124 KB] (702)
3569 LIU Ying, ZHANG Tao, LI Kun, LI Nan
  Evaluation model of mobile application crowdsourcing testers
    Journal of Computer Applications   2017 Vol.37 (12): 3569-3573 [Abstract] (514) [HTML 1 KB] [PDF 937 KB] (720)
3563 YUAN Bo
  Application of MRF's spatial correlation model in NMF-based linear unmixing
    Journal of Computer Applications   2017 Vol.37 (12): 3563-3568 [Abstract] (476) [HTML 1 KB] [PDF 1038 KB] (693)
3558 XIA Jun, LI Yinghua
  Delaunay triangulation subdivision algorithm of spherical convex graph and its convergence analysis
    Journal of Computer Applications   2017 Vol.37 (12): 3558-3562 [Abstract] (460) [HTML 1 KB] [PDF 738 KB] (577)
3554 GAO Yuan, JIA Ziting, QIN Pinle, WANG Lifang
  Medical image fusion algorithm based on linking synaptic computation network
    Journal of Computer Applications   2017 Vol.37 (12): 3554-3557 [Abstract] (445) [HTML 1 KB] [PDF 871 KB] (828)
3547 SUN Zengyou, DUAN Yushuai, LI Ya
  Image feature point matching algorithm based on center surround filter detection
    Journal of Computer Applications   2017 Vol.37 (12): 3547-3553 [Abstract] (499) [HTML 1 KB] [PDF 1171 KB] (777)
3523 HU Xuegang, QIU Xiulan
  Novel image segmentation algorithm based on Snake model
    Journal of Computer Applications   2017 Vol.37 (12): 3523-3527 [Abstract] (644) [HTML 1 KB] [PDF 894 KB] (721)
3504 LIN Weiming, GAO Qinquan, DU Min
  Convolutional neural network based method for diagnosis of Alzheimer's disease
    Journal of Computer Applications   2017 Vol.37 (12): 3504-3508 [Abstract] (994) [HTML 1 KB] [PDF 844 KB] (967)
3498 LU Ling, YANG Wu, YANG Youjun, CHEN Menghan
  Chinese short text classification method by combining semantic expansion and convolutional neural network
    Journal of Computer Applications   2017 Vol.37 (12): 3498-3503 [Abstract] (576) [HTML 1 KB] [PDF 928 KB] (955)
3482 QIU Baozhi, TANG Yamin
  Efficient clustering algorithm for fast recognition of density backbone
    Journal of Computer Applications   2017 Vol.37 (12): 3482-3486 [Abstract] (512) [HTML 1 KB] [PDF 810 KB] (689)
3458 WANG Zeyu, WU Yanxia, ZHANG Guoyin, BU Shuhui
  Three-dimensional spatial structured encoding deep network for RGB-D scene parsing
    Journal of Computer Applications   2017 Vol.37 (12): 3458-3466 [Abstract] (653) [HTML 1 KB] [PDF 11074 KB] (1136)
3442 CHEN Gang, GUO Yudong, WEI Xiaofeng
  Dynamic defense method of Web server based on Linux namespace
    Journal of Computer Applications   2017 Vol.37 (12): 3442-3446 [Abstract] (531) [HTML 1 KB] [PDF 811 KB] (732)
3423 WANG Jingwei, YIN Xinchun
  Ciphertext policy attribute-based encryption scheme with weighted attribute revocation
    Journal of Computer Applications   2017 Vol.37 (12): 3423-3429 [Abstract] (547) [HTML 1 KB] [PDF 1079 KB] (788)
3381 HU Qiang, LIN Yun
  Adaptive compressed sensing algorithm based on observation matrix optimization
    Journal of Computer Applications   2017 Vol.37 (12): 3381-3385 [Abstract] (548) [HTML 1 KB] [PDF 780 KB] (471)
3374 LI Xinchun, GAO Baisheng
  WSN routing algorithm based on optimal number of clusters and improved gravitational search
    Journal of Computer Applications   2017 Vol.37 (12): 3374-3380 [Abstract] (438) [HTML 1 KB] [PDF 1066 KB] (567)
3361 LIAO Han, MA Dongya, YIN Lixin
  Capacity optimization of secondary user system in MIMO cognitive networks based on non-orthogonal multiple access
    Journal of Computer Applications   2017 Vol.37 (12): 3361-3367 [Abstract] (459) [HTML 1 KB] [PDF 1016 KB] (487)
3356 FAN Zifu, HU Min, LI Yuening
  Dynamic pilot allocation based on graph coloring in massive MIMO systems
    Journal of Computer Applications   2017 Vol.37 (12): 3356-3360 [Abstract] (531) [HTML 1 KB] [PDF 785 KB] (587)
3339 GUO Hao, LIU Lei, CHEN Junjie
  Brain network analysis and classification for patients of Alzheimer's disease based on high-order minimum spanning tree
    Journal of Computer Applications   2017 Vol.37 (11): 3339-3344 [Abstract] (525) [HTML 1 KB] [PDF 1091 KB] (598)
3335 ZENG Ling, XIAO Ruliang
  Session identification algorithm based on dynamic time threshold of adjacent requests
    Journal of Computer Applications   2017 Vol.37 (11): 3335-3338 [Abstract] (606) [HTML 1 KB] [PDF 674 KB] (540)
3330 WU Qingsong, YANG Hongbing, FANG Jia
  Production scheduling and preventive maintenance integrated optimization based on catastrophe mechanism
    Journal of Computer Applications   2017 Vol.37 (11): 3330-3334 [Abstract] (558) [HTML 1 KB] [PDF 769 KB] (506)
3304 GU Zeyu, ZHANG Xingming, LIN Senjie
  Load-aware dynamic scheduling mechanism based on security strategies
    Journal of Computer Applications   2017 Vol.37 (11): 3304-3310 [Abstract] (649) [HTML 1 KB] [PDF 1196 KB] (556)
3294 JIANG Zhongqing, ZHOU Anmin, JIA Peng
  DEX unpacking technology in ART virtual machine
    Journal of Computer Applications   2017 Vol.37 (11): 3294-3298 [Abstract] (761) [HTML 1 KB] [PDF 980 KB] (704)
3288 ZHOU Min, ZHOU Anmin, LIU Liang, JIA Peng, TAN Cuijiang
  Mining denial of service vulnerability in Android applications automatically
    Journal of Computer Applications   2017 Vol.37 (11): 3288-3293 [Abstract] (643) [HTML 1 KB] [PDF 1044 KB] (535)
3270 PENG Hongxing, HU Yiwen, YANG Xueqing, LI Xingwang
  Upper bounds on sum rate of 3D distributed MIMO systems over K fading cpmposite channels
    Journal of Computer Applications   2017 Vol.37 (11): 3270-3275 [Abstract] (506) [HTML 1 KB] [PDF 861 KB] (510)
3238 ZHU Jie, WU Shufang, XIE Bojun, MA Liyan
  Color based compact hierarchical image representation
    Journal of Computer Applications   2017 Vol.37 (11): 3238-3243 [Abstract] (444) [HTML 1 KB] [PDF 1047 KB] (499)
3226 SUN Qiang, TAN Xiaoyang
  Super-resolution and frontalization in unconstrained face images
    Journal of Computer Applications   2017 Vol.37 (11): 3226-3230 [Abstract] (690) [HTML 1 KB] [PDF 963 KB] (528)
3212 ZHANG Yongliang, ZHOU Bing, ZHAN Xiaosi, QIU Xiaoguang, LU Tianpei
  Small-size fingerprint matching based on deep learning
    Journal of Computer Applications   2017 Vol.37 (11): 3212-3218 [Abstract] (1125) [HTML 1 KB] [PDF 1270 KB] (864)
3207 HUANG Hongwei, GE Xiaotian, CHEN Xuansong
  Density clustering method based on complex learning classification system
    Journal of Computer Applications   2017 Vol.37 (11): 3207-3211 [Abstract] (571) [HTML 1 KB] [PDF 779 KB] (538)
3182 DONG Linjia, QIANG Yan, ZHAO Juanjuan, YUAN jie, ZHAO Wenting
  Automatic detection of pulmonary nodules based on 3D shape index
    Journal of Computer Applications   2017 Vol.37 (11): 3182-3187 [Abstract] (645) [HTML 1 KB] [PDF 935 KB] (614)
3139 YU Huangyue, WANG Han, GUO Mengting
  Video keyframe extraction based on users' interests
    Journal of Computer Applications   2017 Vol.37 (11): 3139-3144 [Abstract] (665) [HTML 1 KB] [PDF 1017 KB] (555)
3134 LI Xuejun, ZHANG Kaihua, SONG Huihui
  Unsupervised video segmentation by fusing multiple spatio-temporal feature representations
    Journal of Computer Applications   2017 Vol.37 (11): 3134-3138 [Abstract] (576) [HTML 1 KB] [PDF 1045 KB] (559)
3128 LIN Lingpeng, HUANG Tianqiang, LIN Jing
  Object tracking based on foreground discrimination and circle search
    Journal of Computer Applications   2017 Vol.37 (11): 3128-3133 [Abstract] (559) [HTML 1 KB] [PDF 1049 KB] (562)
3124 GUO Xiao, TAN Wenan
  High-performance image super-resolution restruction based on cascade deep convolutional network
    Journal of Computer Applications   2017 Vol.37 (11): 3124-3127 [Abstract] (684) [HTML 1 KB] [PDF 783 KB] (562)
3107 TAN Zheng, LIU JingLei, YU Hang
  Conditional preference mining based on MaxClique
    Journal of Computer Applications   2017 Vol.37 (11): 3107-3114 [Abstract] (525) [HTML 1 KB] [PDF 1274 KB] (631)
3101 ZHENG Yongguang, YUE Kun, YIN Zidu, ZHANG Xuejie
  Efficient approach for selecting key users in large-scale social networks
    Journal of Computer Applications   2017 Vol.37 (11): 3101-3106 [Abstract] (707) [HTML 1 KB] [PDF 965 KB] (607)
3057 DAI Lijie, ZHANG Changjiang, MA Leiming
  Dynamic forecasting model of short-term PM2.5 concentration based on machine learning
    Journal of Computer Applications   2017 Vol.37 (11): 3057-3063 [Abstract] (792) [HTML 1 KB] [PDF 1092 KB] (729)
0
  Online signature verification based on curve segment similarity matching
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (363) [HTML 0 KB] [PDF 863 KB] (159)
0
  BIGDATA-34 Person re-identification method based on block sparse representation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (248) [HTML 1 KB] [PDF 734 KB] (467)
3034 ZHU Linqi, ZHANG Chong, ZHOU Xueqing, WEI Yang, HUANG Yuyang, GAO Qiming
  Nuclear magnetic resonance logging reservoir permeability prediction method based on deep belief network and kernel extreme learning machine algorithm
    Journal of Computer Applications   2017 Vol.37 (10): 3034-3038 [Abstract] (573) [HTML 1 KB] [PDF 791 KB] (571)
3017 XIU Chao, CAO Lin, WANG Dongfeng, ZHANG Fan
  Automatic lane division method based on echo signal of microwave radar
    Journal of Computer Applications   2017 Vol.37 (10): 3017-3023 [Abstract] (544) [HTML 1 KB] [PDF 990 KB] (506)
3012 HAN Jiandong, DENG Yifan
  Multi-channel pedestrian detection algorithm based on textural and contour features
    Journal of Computer Applications   2017 Vol.37 (10): 3012-3016 [Abstract] (662) [HTML 1 KB] [PDF 950 KB] (595)
2999 WANG Ting, WANG Qi, HUANG Yueqi, YIN Yichao, GAO Ju
  Automatic hyponymy extracting method based on symptom components
    Journal of Computer Applications   2017 Vol.37 (10): 2999-3005 [Abstract] (579) [HTML 1 KB] [PDF 1095 KB] (595)
2983 LIU Jiajun, YU Gang, HU Min
  Intelligent integration approach of big data for urban infrastructure management and maintenance
    Journal of Computer Applications   2017 Vol.37 (10): 2983-2990 [Abstract] (775) [HTML 1 KB] [PDF 1394 KB] (817)
2907 JIN Yanxia, MA Guangyuan, LEI Haiwei
  Hybrid control rate algorithm based on dynamic adaptive streaming over HTTP protocol
    Journal of Computer Applications   2017 Vol.37 (10): 2907-2911 [Abstract] (497) [HTML 1 KB] [PDF 801 KB] (494)
2899 SU Jianjun, MU Shiyou, YANG bo, SUN Xiaobin, ZHAO Haiwu, GU Xiao
  Distortion analysis of digital video transcoding
    Journal of Computer Applications   2017 Vol.37 (10): 2899-2902 [Abstract] (427) [HTML 1 KB] [PDF 709 KB] (467)
2888 LI Xiao, GE Baozhen, LUO Qijun, LI Yunpeng, TIAN Qingguo
  Acquisition of camera dynamic extrinsic parameters in free binocular stereo vision system
    Journal of Computer Applications   2017 Vol.37 (10): 2888-2894 [Abstract] (544) [HTML 1 KB] [PDF 989 KB] (648)
2871 LIU Jingrong, DU Huimin, DU Qinqin
  Improvement of sub-pixel morphological anti-aliasing algorithm
    Journal of Computer Applications   2017 Vol.37 (10): 2871-2874 [Abstract] (522) [HTML 1 KB] [PDF 815 KB] (485)
2866 YANG Cheng
  Click through rate prediction algorithm based on user's real-time feedback
    Journal of Computer Applications   2017 Vol.37 (10): 2866-2870 [Abstract] (1016) [HTML 1 KB] [PDF 780 KB] (698)
2841 LIU Tong, HUANG Xiutian, MA Jianshe, SU Ping
  Image labeling based on fully-connected conditional random field
    Journal of Computer Applications   2017 Vol.37 (10): 2841-2846 [Abstract] (548) [HTML 1 KB] [PDF 939 KB] (616)
2828 JIN Liang, YU Jiong, YANG Xingyao, LU Liang, WANG Yuefei, GUO Binglei, Liao Bin
  Video recommendation algorithm based on clustering and hierarchical model
    Journal of Computer Applications   2017 Vol.37 (10): 2828-2833 [Abstract] (640) [HTML 1 KB] [PDF 1025 KB] (750)
2823 ZHU Zhanlei, LI Zheng, ZHAO Ruilian
  Many-objective optimization algorithm based on linear weighted minimal/maximal dominance
    Journal of Computer Applications   2017 Vol.37 (10): 2823-2827 [Abstract] (616) [HTML 1 KB] [PDF 923 KB] (553)
2819 CAO Xiaolu, XIN Yunhong
  Probabilistic distribution model based on Wasserstein distance for nonlinear dimensionality reduction
    Journal of Computer Applications   2017 Vol.37 (10): 2819-2822 [Abstract] (713) [HTML 1 KB] [PDF 669 KB] (694)
2787 ZHANG Ning, ZHONG Shan
  Mechanism of personal privacy protection based on blockchain
    Journal of Computer Applications   2017 Vol.37 (10): 2787-2793 [Abstract] (1612) [HTML 1 KB] [PDF 1120 KB] (1500)
0
  Research on inverse kinematics equation of six DOF Manipulator Based on six dimensional linear interpolation
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (283) [HTML 0 KB] [PDF 448 KB] (260)
0
  Dynamic Top-K interesting subgraph query on large-scale labeled graph
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (205) [HTML 1 KB] [PDF 353 KB] (115)
0 XUE Yu, MEI Xue, ZHI Youran, XU Zhixin, SHI Xiang
  Method for identifying sub-health status of train door based on time series data mining
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (234) [HTML 1 KB] [PDF 330 KB] (290)
0
  Efficient cross domain authentication scheme based on blockchain technology
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (326) [HTML 1 KB] [PDF 327 KB] (633)
0
  Design of hybrid data clustering algorithm based on density peak
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (221) [HTML 1 KB] [PDF 1145 KB] (322)
2433 WANG Xiang, HU Xuegang
  Overview on feature selection in high-dimensional and small-sample-size classification
    Journal of Computer Applications   2017 Vol.37 (9): 2433-2438 [Abstract] (1194) [HTML 1 KB] [PDF 1146 KB] (1393)
2728 GUO Jian
  Target detection method based on beamforming output DC response of sub-covariance matrix
    Journal of Computer Applications   2017 Vol.37 (9): 2728-2734 [Abstract] (444) [HTML 1 KB] [PDF 1027 KB] (489)
2722 DING Jianli, HAN Yuchao, WANG Jialiang
  Estimation method for RFID tags based on rough and fine double estimation
    Journal of Computer Applications   2017 Vol.37 (9): 2722-2727 [Abstract] (619) [HTML 1 KB] [PDF 1041 KB] (491)
2717 CHEN Dapeng, ZHANG Jiugen, LIANG Xing
  Optimal control of chilled water system in central air-conditioning based on artificial immune and particle swarm optimization algorithm
    Journal of Computer Applications   2017 Vol.37 (9): 2717-2721 [Abstract] (573) [HTML 1 KB] [PDF 775 KB] (503)
2705 XU Qingyong, JIANG Shunliang, XU Shaoping, GE Yun, TANG Yiling
  Tattoo image detection algorithm based on three-channel convolution neural network
    Journal of Computer Applications   2017 Vol.37 (9): 2705-2711 [Abstract] (671) [HTML 1 KB] [PDF 1176 KB] (726)
2700 XIE Xiaoyu, LIU Zhejie
  Dynamic gesture recognition method based on EMG and ACC signal
    Journal of Computer Applications   2017 Vol.37 (9): 2700-2704 [Abstract] (983) [HTML 1 KB] [PDF 823 KB] (663)
2665 GUO Yudong, GUO Zhigang, CHEN Gang, WEI Han
  Recommendation method based on k nearest neighbors using data dimensionality reduction and exact Euclidean locality-sensitive hashing
    Journal of Computer Applications   2017 Vol.37 (9): 2665-2670 [Abstract] (558) [HTML 1 KB] [PDF 1114 KB] (519)
2659 GUO Houqian, WANG Weiwei, SHANG Ying, ZHAO Ruilian
  Weak mutation test case set generation based on dynamic set evolutionary algorithm
    Journal of Computer Applications   2017 Vol.37 (9): 2659-2664 [Abstract] (560) [HTML 1 KB] [PDF 1113 KB] (476)
2576 REN Shuai, ZHANG Tao, YANG Tao, SUO Li, MU Dejun
  Information hiding algorithm based on spherical segmentation of 3D model
    Journal of Computer Applications   2017 Vol.37 (9): 2576-2580 [Abstract] (570) [HTML 1 KB] [PDF 779 KB] (511)
2507 LIU Dinghao, LYU Jing, SUO Longlong, HU Xiangyu
  Spoofing detection method of carrier tracking loop statistical property analysis
    Journal of Computer Applications   2017 Vol.37 (9): 2507-2511 [Abstract] (443) [HTML 1 KB] [PDF 774 KB] (477)
2474 LIU Ziyan, TANG Hu, LIU Shimei
  Multi-cell channel estimation based on compressive sensing in MASSIVE MIMO system
    Journal of Computer Applications   2017 Vol.37 (9): 2474-2478 [Abstract] (621) [HTML 1 KB] [PDF 919 KB] (810)
2463 MAO Lingchu, ZHAO Haitao
  Distributed deployment algorithm for connected on-demand coverage in mobile sensor network
    Journal of Computer Applications   2017 Vol.37 (9): 2463-2469 [Abstract] (537) [HTML 1 KB] [PDF 1106 KB] (476)
2454 FENG Kai
  Conditional strong matching preclusion for k-ary n-cubes
    Journal of Computer Applications   2017 Vol.37 (9): 2454-2456 [Abstract] (602) [HTML 1 KB] [PDF 623 KB] (498)
2427 HUANG Leiming, WANG Liming, CHEN Zhongqin
  Time synchronization of ship fault recording device based on Lagrange once interpolation
    Journal of Computer Applications   2017 Vol.37 (8): 2427-2432 [Abstract] (700) [HTML 1 KB] [PDF 947 KB] (786)
2421 NAN Jingchang, CUI Hongyan
  Modeling of power amplifier based on dynamic X-parameter of new two-dimensional kernel function
    Journal of Computer Applications   2017 Vol.37 (8): 2421-2426 [Abstract] (548) [HTML 1 KB] [PDF 864 KB] (661)
2416 GUO Leiyong, LI Yu, LIN Shengyi, TAN Hongzhou
  Excitation piecewise expansion method for speech bandwidth expansion based on hidden Markov model
    Journal of Computer Applications   2017 Vol.37 (8): 2416-2420 [Abstract] (521) [HTML 1 KB] [PDF 810 KB] (640)
2410 DAI Zhaokun, LIU Hui, WANG Wenzhe, WANG Yanan
  Dimension reduction method of brain network state observation matrix based on Spectral Embedding
    Journal of Computer Applications   2017 Vol.37 (8): 2410-2415 [Abstract] (550) [HTML 1 KB] [PDF 1084 KB] (670)
2395 XIAO Chunjing, XIA Kewen, QIAO Yongwei, ZHANG Yuxiang
  Tourism route recommendation based on dynamic clustering
    Journal of Computer Applications   2017 Vol.37 (8): 2395-2400 [Abstract] (682) [HTML 1 KB] [PDF 916 KB] (739)
2381 ZHENG Linjang, LIU Xu, YI Bing
  Dynamic weighted real-time map matching algorithm considering spatio-temporal property
    Journal of Computer Applications   2017 Vol.37 (8): 2381-2386 [Abstract] (657) [HTML 1 KB] [PDF 891 KB] (728)
2362 XU Xiaowei, DU Yi, ZHOU Yuanchun
  Resident behavior model analysis method based on multi-source travel data
    Journal of Computer Applications   2017 Vol.37 (8): 2362-2367 [Abstract] (922) [HTML 1 KB] [PDF 965 KB] (894)
2349 YU Siqin, YAN Qiuyan, YAN Xinming
  Clustering algorithm of time series with optimal u-shapelets
    Journal of Computer Applications   2017 Vol.37 (8): 2349-2356 [Abstract] (769) [HTML 1 KB] [PDF 1191 KB] (831)
2313 LI Tao, HE Xiaohai, TENG Qizhi, WU Xiaoqiang
  Adaptive bi-l p-l 2-norm based blind super-resolution reconstruction for single blurred image
    Journal of Computer Applications   2017 Vol.37 (8): 2313-2318 [Abstract] (564) [HTML 1 KB] [PDF 972 KB] (665)
2287 LI Zhenlin, ZHANG Wei, BAI Ping, WANG Xu'an
  BGN type outsourcing the decryption of attribute-based encryption ciphertexts
    Journal of Computer Applications   2017 Vol.37 (8): 2287-2291 [Abstract] (1004) [HTML 1 KB] [PDF 765 KB] (1135)
2281 GAO Jie, WU Jiangxing, HU Yuxiang, LI Junfei
  Research of control plane' anti-attacking in software-defined network based on Byzantine fault-tolerance
    Journal of Computer Applications   2017 Vol.37 (8): 2281-2286 [Abstract] (564) [HTML 1 KB] [PDF 941 KB] (769)
2264 CHAI Yun, XIONG Tao
  Second-order information based formation control in multi-Agent system
    Journal of Computer Applications   2017 Vol.37 (8): 2264-2269 [Abstract] (503) [HTML 1 KB] [PDF 835 KB] (514)
2244 ZHANG Yong, YANG Hao
  Image classification method based on optimized bag-of-visual words model
    Journal of Computer Applications   2017 Vol.37 (8): 2244-2247 [Abstract] (700) [HTML 1 KB] [PDF 790 KB] (629)
2189 ZHANG Ting, ZHANG Tianqi, XIONG Mei
  Blind estimation of combination code sequence for TDDM-BOC based on Sanger neural network
    Journal of Computer Applications   2017 Vol.37 (8): 2189-2194 [Abstract] (498) [HTML 1 KB] [PDF 845 KB] (467)
2184 HONG Liugen, ZHENG Lin, YANG Chao
  Multi-target detection via sparse recovery of least absolute shrinkage and selection operator model
    Journal of Computer Applications   2017 Vol.37 (8): 2184-2188 [Abstract] (1183) [HTML 1 KB] [PDF 828 KB] (574)
2145 ZHANG Gang, JIANG Wei, LIU Shixiao
  Hybrid dynamic clustering algorithm for long term evolution system in unlicensed bands
    Journal of Computer Applications   2017 Vol.37 (8): 2145-2149 [Abstract] (562) [HTML 1 KB] [PDF 929 KB] (507)
0
  MRI Data Classification Method Based on High-Order Minimum Spanning Tree
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (278) [HTML 0 KB] [PDF 306 KB] (75)
0 Qiang Sun
  Image super-resolution and face frontalization in unconstrained image
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (432) [HTML 1 KB] [PDF 396 KB] (196)
0
  A CT/MR brain image fusion method via improved coupled dictionary learning
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (241) [HTML 0 KB] [PDF 0 KB] (30)
0 Xi-Yang ZHAI WANG Xiao-danWANG LEI Lei
  Improved multi-class AdaBoost algorithm based on SAMME
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (2665) [HTML 0 KB] [PDF 0 KB] (163)
0
  Speech Enhancement Method Based On OS-DL
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (188) [HTML 0 KB] [PDF 0 KB] (24)
0
  Based on entropy theory and AHP's protection effectiveness evaluation of underground command Engineering
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (230) [HTML 0 KB] [PDF 0 KB] (28)
2124 WANG Zhongqiang, CHEN Jide, PENG Jian, HUANG Feihu, TONG Bo
  Airline predicting algorithm based on improved Markov chain
    Journal of Computer Applications   2017 Vol.37 (7): 2124-2128 [Abstract] (668) [HTML 1 KB] [PDF 756 KB] (515)
2067 ZHAN Yi, LI Meng
  Variable exponent variational model for image interpolation
    Journal of Computer Applications   2017 Vol.37 (7): 2067-2070 [Abstract] (504) [HTML 1 KB] [PDF 702 KB] (412)
2044 CUI Di, GUO Xiaoyan, CHEN Wei
  Challenges and recent progress in big data visualization
    Journal of Computer Applications   2017 Vol.37 (7): 2044-2049 [Abstract] (878) [HTML 1 KB] [PDF 1184 KB] (982)
2034 WANG Jing, WANG Chunmei, ZHI Jia, YANG Jiasen, CHEN Tuo
  Multi-Agent-based real-time self-adaptive discrimination method
    Journal of Computer Applications   2017 Vol.37 (7): 2034-2038 [Abstract] (733) [HTML 1 KB] [PDF 988 KB] (479)
2019 YANG Tao, SHI Lin, SONG Mengdie, LI Shoubin, WANG Qing
  Design and implementation of process management system supporting multi-tool collaboration
    Journal of Computer Applications   2017 Vol.37 (7): 2019-2026 [Abstract] (640) [HTML 1 KB] [PDF 1269 KB] (548)
2014 DONG Junfei, ZHENG Bochuan, YANG Zejing
  Character recognition of license plate based on convolution neural network
    Journal of Computer Applications   2017 Vol.37 (7): 2014-2018 [Abstract] (1731) [HTML 1 KB] [PDF 792 KB] (1553)
2008 YE Lihua, WANG Lei, ZHAO Liping
  Field scene recognition method for low-small-slow unmanned aerial vehicle landing
    Journal of Computer Applications   2017 Vol.37 (7): 2008-2013 [Abstract] (648) [HTML 1 KB] [PDF 1005 KB] (432)
1999 ZHAO Yiding, TIAN Senping
  Facial age estimation method based on hybrid model of classification and regression
    Journal of Computer Applications   2017 Vol.37 (7): 1999-2002 [Abstract] (941) [HTML 1 KB] [PDF 813 KB] (589)
1960 FENG Hui, JING Xiaoyuan, ZHU Xiaoke
  Multi-view feature projection and synthesis-analysis dictionary learning for image classification
    Journal of Computer Applications   2017 Vol.37 (7): 1960-1966 [Abstract] (694) [HTML 1 KB] [PDF 1171 KB] (450)
1943 TIAN Jiwei, WANG Buhong, SHANG Fute
  False data injection attacks based on robust principal component analysis in smart grid
    Journal of Computer Applications   2017 Vol.37 (7): 1943-1947 [Abstract] (734) [HTML 1 KB] [PDF 969 KB] (510)
1906 ZHAI Guangming, LI Guohe, WU Weijiang, HONG Yunfeng, ZHOU Xiaoming, WANG Jing
  Improved algorithm of artificial bee colony based on Spark
    Journal of Computer Applications   2017 Vol.37 (7): 1906-1910 [Abstract] (593) [HTML 1 KB] [PDF 766 KB] (570)
1877 LI Yangguang, BAO Jianrong, JIANG Bin, LIU Chao
  Frequency offset estimation algorithm of time domain synchronous orthogonal frequency division multiplexing based on correlations of cyclic pseudo-random noise
    Journal of Computer Applications   2017 Vol.37 (7): 1877-1882 [Abstract] (528) [HTML 1 KB] [PDF 988 KB] (446)
1849 XU Zhongming, TAN Li, YANG Chaoyu, TANG Xiaojiang
  Node coverage optimization algorithm in directional heterogeneous wireless sensor network
    Journal of Computer Applications   2017 Vol.37 (7): 1849-1854 [Abstract] (514) [HTML 1 KB] [PDF 851 KB] (534)
1837 YANG Qiang, ZHANG Tianqi, ZHAO Liang
  Blind period estimation of PN sequence for multipath tamed spread spectrum signal
    Journal of Computer Applications   2017 Vol.37 (7): 1837-1842 [Abstract] (569) [HTML 1 KB] [PDF 893 KB] (497)
1825 CAI Yueping, ZHANG Wenpeng, LUO Sen
  Minimum access guaranteed bandwidth allocation mechanism in data center network
    Journal of Computer Applications   2017 Vol.37 (7): 1825-1829 [Abstract] (662) [HTML 1 KB] [PDF 833 KB] (697)
0
  A Second Revision based Analysis and Evaluation Method for Education and Test Data
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (205) [HTML 0 KB] [PDF 0 KB] (18)
0
  Multi-target Detection via Sparse Recovery of the Lasso Model
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (237) [HTML 1 KB] [PDF 0 KB] (43)
1820 REN Dongmei, ZHANG Yuyang, DONG Xinling
  Application of improved principal component analysis-Bayes discriminant analysis method to petroleum drilling safety evaluation
    Journal of Computer Applications   2017 Vol.37 (6): 1820-1824 [Abstract] (505) [HTML 1 KB] [PDF 753 KB] (677)
1793 DAI Hepu, LIU Gang, HE Yanyan
  Orthogonalization of regressors in functional magnetic resonance imaging based on general linear model
    Journal of Computer Applications   2017 Vol.37 (6): 1793-1797 [Abstract] (457) [HTML 1 KB] [PDF 904 KB] (494)
1782 WANG Xinqing, MENG Fanjie, LYU Gaowang, REN Guoting
  Unstructured road detection based on improved region growing with PCA-SVM rule
    Journal of Computer Applications   2017 Vol.37 (6): 1782-1786 [Abstract] (736) [HTML 1 KB] [PDF 861 KB] (682)
1759 LI Zhuo, LIU Jieyu, LI Hui, ZHOU Xiaogang, LI Weipeng
  Feature detection and description algorithm based on ORB-LATCH
    Journal of Computer Applications   2017 Vol.37 (6): 1759-1762 [Abstract] (704) [HTML 1 KB] [PDF 794 KB] (721)
1741 WANG Yuanlong
  Sentence composition model for reading comprehension
    Journal of Computer Applications   2017 Vol.37 (6): 1741-1746 [Abstract] (697) [HTML 1 KB] [PDF 965 KB] (774)
1735 LIU Xinxing, JI Donghong, REN Yafeng
  Product property sentiment analysis based on neural network model
    Journal of Computer Applications   2017 Vol.37 (6): 1735-1740 [Abstract] (737) [HTML 1 KB] [PDF 897 KB] (940)
1728 SANG Cheng, CHENG Jian, SHI Yiming
  Knowledge integration and semantic annotation in closed-loop lifecycle management system
    Journal of Computer Applications   2017 Vol.37 (6): 1728-1734 [Abstract] (521) [HTML 1 KB] [PDF 1131 KB] (685)
1722 DONG Xia, WANG Lifang, QIN Pinle, GAO Yuan
  CT/MR brain image fusion method via improved coupled dictionary learning
    Journal of Computer Applications   2017 Vol.37 (6): 1722-1727 [Abstract] (677) [HTML 1 KB] [PDF 1146 KB] (752)
1716 LI Zhengming, YANG Nanyue, CEN Jian
  Dictionary learning algorithm based on Fisher discriminative criterion constraint of atoms
    Journal of Computer Applications   2017 Vol.37 (6): 1716-1721 [Abstract] (649) [HTML 1 KB] [PDF 1114 KB] (705)
1708 XU Chao, YAN Shengye
  Improved pedestrian detection method based on convolutional neural network
    Journal of Computer Applications   2017 Vol.37 (6): 1708-1715 [Abstract] (642) [HTML 1 KB] [PDF 1327 KB] (1235)
1702 YU Rujie, YANG Zhen, XIONG Huilin
  Aircraft detection and recognition based on deep convolutional neural network
    Journal of Computer Applications   2017 Vol.37 (6): 1702-1707 [Abstract] (652) [HTML 1 KB] [PDF 1130 KB] (935)
1692 ZHAI Xiyang, WANG Xiaodan, LEI Lei, WEI Xiaohui
  Improved multi-class AdaBoost algorithm based on stagewise additive modeling using a multi-class exponential loss function
    Journal of Computer Applications   2017 Vol.37 (6): 1692-1696 [Abstract] (566) [HTML 1 KB] [PDF 877 KB] (541)
1680 XI Xi, ZHANG Fengqin, LI Xiaoqing, GUAN Hua, CHEN Guirong, WANG Mengfei
  Linear kernel support vector machine based on dual random projection
    Journal of Computer Applications   2017 Vol.37 (6): 1680-1685 [Abstract] (466) [HTML 1 KB] [PDF 809 KB] (657)
1650 SU Zhida, ZHU Yuefei, LIU Long
  Android malware application detection using deep learning
    Journal of Computer Applications   2017 Vol.37 (6): 1650-1656 [Abstract] (931) [HTML 1 KB] [PDF 1160 KB] (1463)
1630 XIE Lixia, XU Weihua
  Improved weight distribution method of vulnerability basic scoring index
    Journal of Computer Applications   2017 Vol.37 (6): 1630-1635 [Abstract] (463) [HTML 1 KB] [PDF 896 KB] (690)
1605 CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui
  Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm
    Journal of Computer Applications   2017 Vol.37 (6): 1605-1608 [Abstract] (621) [HTML 1 KB] [PDF 751 KB] (512)
1574 LIU Bei, TAN Xinming, CAO Wenbin
  Dynamic resource allocation strategy in Spark Streaming
    Journal of Computer Applications   2017 Vol.37 (6): 1574-1579 [Abstract] (847) [HTML 1 KB] [PDF 982 KB] (639)
1550 ZHANG Mingyang, CHEN Jian, WEN Yingyou, ZHAO Hong, WANG Yugang
  Fingerprint matching indoor localization algorithm based on dynamic time warping distance for Wi-Fi network
    Journal of Computer Applications   2017 Vol.37 (6): 1550-1554 [Abstract] (717) [HTML 1 KB] [PDF 856 KB] (695)
1539 WEI Mingdong, HE Xiaomin, XU Liang
  Dynamic clustering target tracking based on energy optimization in wireless sensor networks
    Journal of Computer Applications   2017 Vol.37 (6): 1539-1544 [Abstract] (531) [HTML 1 KB] [PDF 945 KB] (562)
0 Kai FENG
  Conditional strong matching preclusion for k-ary n-cubes
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (170) [HTML 0 KB] [PDF 278 KB] (375)
1516 NAN Jingchang, ZHANG Yunxue, GAO Mingming
  Adaptive bee colony algorithm combined with BFGS algorithm for microwave circuit harmonic balance analysis
    Journal of Computer Applications   2017 Vol.37 (5): 1516-1520 [Abstract] (527) [HTML 1 KB] [PDF 796 KB] (506)
1503 WEI Hao, XU Qing
  Redundant group based trajectory abstraction algorithm
    Journal of Computer Applications   2017 Vol.37 (5): 1503-1506 [Abstract] (665) [HTML 1 KB] [PDF 638 KB] (469)
1485 XIONG Ruiqi, MA Changxi
  Robust vehicle route optimization for multi-depot hazardous materials transportation
    Journal of Computer Applications   2017 Vol.37 (5): 1485-1490 [Abstract] (699) [HTML 1 KB] [PDF 1056 KB] (567)
1460 LEI Lin, LI Lepeng, YANG Min, DONG Fangmin, SUN Shuifa
  Non-stationary subtle motion magnification based on S transform
    Journal of Computer Applications   2017 Vol.37 (5): 1460-1465 [Abstract] (652) [HTML 1 KB] [PDF 1009 KB] (478)
1434 TAO Pan, FU Zhongliang, ZHU Kai, WANG Lili
  Echocardiogram view recognition using deep convolutional neural network
    Journal of Computer Applications   2017 Vol.37 (5): 1434-1438 [Abstract] (692) [HTML 1 KB] [PDF 1056 KB] (664)
1430 YANG Xuefeng, CHENG Yaoyu, WANG Gao
  Super-resolution algorithm for remote sensing images based on compressive sensing in wavelet domain
    Journal of Computer Applications   2017 Vol.37 (5): 1430-1433 [Abstract] (601) [HTML 1 KB] [PDF 856 KB] (555)
1419 LIU Qiaoling, LI Jin, XIAO Renbin
  Trend prediction of public opinion propagation based on parameter inversion — an empirical study on Sina micro-blog
    Journal of Computer Applications   2017 Vol.37 (5): 1419-1423 [Abstract] (861) [HTML 1 KB] [PDF 790 KB] (627)
1413 GAN Yanling, JIN Cong
  Margin discriminant projection and its application in expression recognition
    Journal of Computer Applications   2017 Vol.37 (5): 1413-1418 [Abstract] (502) [HTML 1 KB] [PDF 987 KB] (515)
1407 SHI Qingwei, LIU Yushi, ZHANG Fengtian
  Biterm topic evolution model of microblog
    Journal of Computer Applications   2017 Vol.37 (5): 1407-1412 [Abstract] (739) [HTML 1 KB] [PDF 939 KB] (592)
1347 LU Jintian, YAO Lili, HE Xudong, MENG Bo
  Improvement of OpenID Connect protocol and its security analysis
    Journal of Computer Applications   2017 Vol.37 (5): 1347-1352 [Abstract] (977) [HTML 1 KB] [PDF 1006 KB] (614)
1326 WEI Chunling, WANG Bufei
  Indoor activity-recognition based on received signal strength in WLAN
    Journal of Computer Applications   2017 Vol.37 (5): 1326-1330 [Abstract] (713) [HTML 1 KB] [PDF 704 KB] (599)
1321 HU Jing, ZHENG Wu
  Proportional fairness and maximum weighted sum-rate in D2D communications underlaying cellular networks
    Journal of Computer Applications   2017 Vol.37 (5): 1321-1325 [Abstract] (756) [HTML 1 KB] [PDF 752 KB] (698)
1292 WU Congcong, HE Yichao, CHEN Yiying, LIU Xuejing, CAI Xiufeng
  Mutated bat algorithm for solving discounted {0-1} knapsack problem
    Journal of Computer Applications   2017 Vol.37 (5): 1292-1299 [Abstract] (557) [HTML 1 KB] [PDF 1156 KB] (615)
1263 HAN Dezhi, CHEN Xuguang, LEI Yuxin, DAI Yongtao, ZHANG Xiao
  Real-time data analysis system based on Spark Streaming and its application
    Journal of Computer Applications   2017 Vol.37 (5): 1263-1269 [Abstract] (1137) [HTML 1 KB] [PDF 1159 KB] (902)
1246 TANG Guofei, ZHOU Haifang, TAN Qingping
  Design and implementation of space-borne parallel remote sensing image compression system based on multi-core DSP
    Journal of Computer Applications   2017 Vol.37 (5): 1246-1250 [Abstract] (611) [HTML 1 KB] [PDF 774 KB] (584)
1198 WANG Xuqiao, WANG Jinkun
  Integrated indoor positioning algorithm based on D-S evidence theory
    Journal of Computer Applications   2017 Vol.37 (4): 1198-1201 [Abstract] (563) [HTML 1 KB] [PDF 762 KB] (595)
1185 FANG Yiguang, LIU Wu, ZHANG Ji, ZHANG Lingchen, YUAN Meigui, QU Lei
  Learning based kernel image differential filter for face recognition
    Journal of Computer Applications   2017 Vol.37 (4): 1185-1188 [Abstract] (503) [HTML 1 KB] [PDF 767 KB] (554)
1179 LIANG Rui, ZHU Qingxin, LIAO Shujiao, NIU Xinzheng
  Deep natural language description method for video based on multi-feature fusion
    Journal of Computer Applications   2017 Vol.37 (4): 1179-1184 [Abstract] (575) [HTML 1 KB] [PDF 999 KB] (646)
1169 LIN Jinyong, DENG Dexiang, YAN Jia, LIN Xiaoying
  Self-adaptive group based sparse representation for image inpainting
    Journal of Computer Applications   2017 Vol.37 (4): 1169-1173 [Abstract] (990) [HTML 1 KB] [PDF 827 KB] (884)
1149 LEI Bingbing, YAN Hua
  Garbage collection algorithm for NAND flash memory based on logical region heat
    Journal of Computer Applications   2017 Vol.37 (4): 1149-1152 [Abstract] (578) [HTML 1 KB] [PDF 808 KB] (556)
1129 LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli
  Benchmarks construction and evaluation for resource leak in Android apps
    Journal of Computer Applications   2017 Vol.37 (4): 1129-1134 [Abstract] (508) [HTML 1 KB] [PDF 1015 KB] (578)
1122 WANG Long, ZHANG Zheng, WANG Li
  Improved extended Kalman filter for attitude estimation of quadrotor
    Journal of Computer Applications   2017 Vol.37 (4): 1122-1128 [Abstract] (790) [HTML 1 KB] [PDF 1094 KB] (637)
1083 ZHANG Yanan, SUN Shibao, ZHANG Jingshan, YIN Lihang, YAN Xiaolong
  Opinion formation model of social network based on node intimacy and influence
    Journal of Computer Applications   2017 Vol.37 (4): 1083-1087 [Abstract] (632) [HTML 1 KB] [PDF 778 KB] (760)
1065 DENG Yang, ZHANG Chenxi, LI Jiangfeng
  Video shot recommendation model based on emotion analysis using time-sync comments
    Journal of Computer Applications   2017 Vol.37 (4): 1065-1070 [Abstract] (1045) [HTML 1 KB] [PDF 1074 KB] (1083)
1044 ZHOU Shuangshuang, XU Jin'an, CHEN Yufeng, ZHANG Yujie
  New words detection method for microblog text based on integrating of rules and statistics
    Journal of Computer Applications   2017 Vol.37 (4): 1044-1050 [Abstract] (506) [HTML 1 KB] [PDF 1117 KB] (700)
1038 WANG Xuerong, WAN Nianhong
  Dynamic prediction model on export sales based on controllable relevance big data of cross-border e-commerce
    Journal of Computer Applications   2017 Vol.37 (4): 1038-1043 [Abstract] (650) [HTML 1 KB] [PDF 1121 KB] (687)
1014 ZHU Huijuan, JIANG Tonghai, ZHOU Xi, CHENG Li, ZHAO Fan, MA Bo
  Data cleaning method based on dynamic configurable rules
    Journal of Computer Applications   2017 Vol.37 (4): 1014-1020 [Abstract] (878) [HTML 1 KB] [PDF 1069 KB] (669)
1004 LIU Wei, WANG Yang, ZHENG Jianbin, ZHAN Enqi
  Chinese signature authentication based on accelerometer
    Journal of Computer Applications   2017 Vol.37 (4): 1004-1007 [Abstract] (590) [HTML 1 KB] [PDF 777 KB] (517)
954 LI Yang, LI Qing, ZHANG Xia
  Automatic protocol format signature construction algorithm based on discrete series protocol message
    Journal of Computer Applications   2017 Vol.37 (4): 954-959 [Abstract] (616) [HTML 1 KB] [PDF 1104 KB] (602)
941 ZENG Qin, LI Yongsheng
  Three dimensional strom tracking method based on distributed computing architecture
    Journal of Computer Applications   2017 Vol.37 (4): 941-944 [Abstract] (671) [HTML 1 KB] [PDF 706 KB] (584)
883 ZHOU Huizi, HU Xuemin, CHEN Long, TIAN Mei, XIONG Dou
  Dynamic path planning for autonomous driving with avoidance of obstacles
    Journal of Computer Applications   2017 Vol.37 (3): 883-888 [Abstract] (1138) [HTML 1 KB] [PDF 1001 KB] (1099)
876 LI Xiaolin, HUANG Shuang, LU Tao, LI Lin
  Administrative division extracting algorithm for non-normalized Chinese addresses
    Journal of Computer Applications   2017 Vol.37 (3): 876-882 [Abstract] (996) [HTML 1 KB] [PDF 1226 KB] (599)
849 CHEN Benzhi, FANG Zhihong, XIA Yong, ZHANG Ling, LAN Shouren, WANG Lisheng
  Automatic detection of blowholes defects in X-ray images of thick steel pipes
    Journal of Computer Applications   2017 Vol.37 (3): 849-853 [Abstract] (698) [HTML 1 KB] [PDF 866 KB] (634)
844 XIAO Bing, WEI Xin, HU Wei, XIA Hongjian
  Tooth segmentation algorithm based on segmentation of feature line
    Journal of Computer Applications   2017 Vol.37 (3): 844-848 [Abstract] (811) [HTML 1 KB] [PDF 916 KB] (714)
827 ZHANG Jieyu
  Binarization method with local threshold based on image blocks
    Journal of Computer Applications   2017 Vol.37 (3): 827-831 [Abstract] (950) [HTML 1 KB] [PDF 889 KB] (694)
786 FANG Ning, ZHOU Yu, YE Qingwei, LI Yugang
  Modal parameter identification of vibration signal based on unsupervised learning convolutional neural network
    Journal of Computer Applications   2017 Vol.37 (3): 786-790 [Abstract] (786) [HTML 1 KB] [PDF 905 KB] (762)
760 LIN Kai, CHEN Guochu, ZHANG Xin
  Multiple interactive artificial bee colony algorithm and its convergence analysis
    Journal of Computer Applications   2017 Vol.37 (3): 760-765 [Abstract] (976) [HTML 1 KB] [PDF 893 KB] (523)
755 LI Zhen, ZHENG Xiangwei, ZHANG Hui
  Virtual network embedding algorithm based on multi-objective particle swarm optimization
    Journal of Computer Applications   2017 Vol.37 (3): 755-759 [Abstract] (593) [HTML 1 KB] [PDF 940 KB] (593)
736 ZHANG Zhaoxia, LIU Jie, ZHAO Yan, HU Xiu, YANG Lingzhen
  Radar signal design based on nonlinear combination modulation of piecewise fitting
    Journal of Computer Applications   2017 Vol.37 (3): 736-740 [Abstract] (1310) [HTML 1 KB] [PDF 735 KB] (466)
699 DING Pengli, LI Qingyong, ZHANG Zhen, LI Feng
  Diabetic retinal image classification method based on deep neural network
    Journal of Computer Applications   2017 Vol.37 (3): 699-704 [Abstract] (641) [HTML 1 KB] [PDF 1070 KB] (690)
695 GUAN Feifan, YU Mei, SONG Yang, SHAO Hua, JIANG Gangyi
  Objective quality assessment method of high dynamic range image
    Journal of Computer Applications   2017 Vol.37 (3): 695-698 [Abstract] (1055) [HTML 1 KB] [PDF 813 KB] (780)
673 LIANG Shuang, ZHOU Lihua, YANG Peizhong
  Query performance and data migration for social network database with shard strategy based on clustering analysis
    Journal of Computer Applications   2017 Vol.37 (3): 673-679 [Abstract] (641) [HTML 1 KB] [PDF 1109 KB] (463)
654 LI Fumin, TONG Lingling, DU Cuilan, LI Yangxi, ZHANG Yangsen
  Weibo users credibility evaluation based on user relationships
    Journal of Computer Applications   2017 Vol.37 (3): 654-659 [Abstract] (618) [HTML 1 KB] [PDF 972 KB] (488)
628 TANG Lizhe, FENG Dawei, LI Dongsheng, LI Rongchun, LIU Feng
  Analysis of large-scale distributed machine learning systems: a case study on LDA
    Journal of Computer Applications   2017 Vol.37 (3): 628-634 [Abstract] (981) [HTML 1 KB] [PDF 1169 KB] (664)
602 GUO Yuhan, ZHANG Meiqi, ZHOU Nan
  Genetic algorithm with preference matrix for solving long-term carpooling problem
    Journal of Computer Applications   2017 Vol.37 (2): 602-607 [Abstract] (541) [HTML 1 KB] [PDF 918 KB] (627)
587 PENG Xingxiong, XIAO Ruliang
  Multi-fractal Web log simulation generation algorithm based on stable process
    Journal of Computer Applications   2017 Vol.37 (2): 587-592 [Abstract] (719) [HTML 1 KB] [PDF 939 KB] (494)
569 HUANG Zhibiao, YAO Yu
  Ultrasound image segmentation based on pixel clustering
    Journal of Computer Applications   2017 Vol.37 (2): 569-573 [Abstract] (787) [HTML 1 KB] [PDF 898 KB] (673)
553 ZOU Weigang, ZHOU Zhihui, WANG Yang
  Image inpainting algorithm based on non-subsampled contourlet transform
    Journal of Computer Applications   2017 Vol.37 (2): 553-558 [Abstract] (608) [HTML 1 KB] [PDF 1059 KB] (610)
546 ZHOU Shangbo, WANG Liping, YIN Xuehui
  Applications of fractional partial differential equations in image processing
    Journal of Computer Applications   2017 Vol.37 (2): 546-552 [Abstract] (803) [HTML 1 KB] [PDF 1147 KB] (863)
530 WANG Xiaobin, HUANG Jinjie, LIU Wenju
  Traffic sign recognition based on optimized convolutional neural network architecture
    Journal of Computer Applications   2017 Vol.37 (2): 530-534 [Abstract] (601) [HTML 1 KB] [PDF 868 KB] (983)
512 FENG Shu
  Unsupervised local feature learning for robust face recognition
    Journal of Computer Applications   2017 Vol.37 (2): 512-516 [Abstract] (719) [HTML 1 KB] [PDF 843 KB] (648)
505 CHEN Qiuju, LI Ying
  Sound recognition based on optimized orthogonal matching pursuit and deep belief network
    Journal of Computer Applications   2017 Vol.37 (2): 505-511 [Abstract] (658) [HTML 1 KB] [PDF 1251 KB] (590)
488 DENG Jingsong, LUO Yonglong, YU Qingying, CHEN Fulong
  Privacy-preserving trajectory data publishing based on non-sensitive information analysis
    Journal of Computer Applications   2017 Vol.37 (2): 488-493 [Abstract] (640) [HTML 1 KB] [PDF 1003 KB] (702)
463 XU Meiling, QIAO Ying, MO Yuchang, ZHONG Farong
  Performance analysis of cluster computing systems using binary decision diagram
    Journal of Computer Applications   2017 Vol.37 (2): 463-467 [Abstract] (624) [HTML 1 KB] [PDF 869 KB] (495)
445 FENG Huifang, WANG Junxia
  Dynamic centrality analysis of vehicle Ad Hoc networks
    Journal of Computer Applications   2017 Vol.37 (2): 445-449 [Abstract] (620) [HTML 1 KB] [PDF 830 KB] (520)
432 MA Yao, TIAN Ming, ZHAO Zhiwei, FAN Ruilong
  Content delivery model based on polymorphic routing in named data networking
    Journal of Computer Applications   0 Vol. (): 432-439 [Abstract] (811) [HTML 1 KB] [PDF 1339 KB] (656)
417 SUN Liang, CHEN Xiaochun, ZHENG Shujian, LIU Ying
  Research and application for terminal location management system based on firmware
    Journal of Computer Applications   2017 Vol.37 (2): 417-421 [Abstract] (670) [HTML 1 KB] [PDF 848 KB] (621)
408 FU Xixu, GONG Xizhang
  Spreading activation method to encrypt data with images as references
    Journal of Computer Applications   2017 Vol.37 (2): 408-411 [Abstract] (719) [HTML 1 KB] [PDF 569 KB] (472)
402 ZHANG Fan, ZHANG Cong, ZHAO Zemao, XU Mingdi
  Secure instant-messaging method for mobile intelligent terminal
    Journal of Computer Applications   2017 Vol.37 (2): 402-407 [Abstract] (609) [HTML 1 KB] [PDF 1072 KB] (646)
378 RONG Xing, ZHAO Yong
  Trustworthiness attestation scheme for virtual machine based on certificateless ring signature
    Journal of Computer Applications   2017 Vol.37 (2): 378-382 [Abstract] (649) [HTML 1 KB] [PDF 784 KB] (749)
367 LIU Yuanying, GUO Jingfeng, WEI Lidong, HU Xinzhuan
  Fast influence maximization algorithm in social network under budget control
    Journal of Computer Applications   2017 Vol.37 (2): 367-372 [Abstract] (633) [HTML 1 KB] [PDF 878 KB] (588)
329 QIN Qibing, TAN Long
  Top-Rank- k frequent patterns mining algorithm based on TCM prescription database
    Journal of Computer Applications   2017 Vol.37 (2): 329-334 [Abstract] (816) [HTML 1 KB] [PDF 854 KB] (582)
299 XING Zhiwei, TANG Yunxiao, LUO Qian
  Dynamic estimation about service time of flight support based on Bayesian network
    Journal of Computer Applications   2017 Vol.37 (1): 299-304 [Abstract] (571) [HTML 1 KB] [PDF 1004 KB] (588)
244 SONG Chao, XU Xin, GUI Rong, XIE Xinfang, XU Feng
  Polarimetric synthetic aperture radar feature analysis and classification based on multi-layer support vector machine classifier
    Journal of Computer Applications   2017 Vol.37 (1): 244-250 [Abstract] (585) [HTML 1 KB] [PDF 1250 KB] (504)
233 HUANG Nian'e, HUANG He, WANG Rujing
  Agriculture-related product name extraction and category labeling based on ontology and conditional random field
    Journal of Computer Applications   2017 Vol.37 (1): 233-238 [Abstract] (792) [HTML 1 KB] [PDF 940 KB] (674)
217 XU Guoyu, WANG Yingfeng, MA Xiaofei, WANG Kefeng, YAN Ruoyu
  Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification
    Journal of Computer Applications   2017 Vol.37 (1): 217-221 [Abstract] (677) [HTML 1 KB] [PDF 708 KB] (506)
188 WANG Qiang, ZHANG Peilin, WANG Huaiguang, YANG Wangcan, CHEN Yanlong
  Survey on construction of measurement matrices in compressive sensing
    Journal of Computer Applications   2017 Vol.37 (1): 188-196 [Abstract] (789) [HTML 1 KB] [PDF 1425 KB] (1153)
183 SONG Yang, HUANG Zhiqing, ZHANG Yanxin, LI Mengjia
  Dynamic sampling method for wireless sensor network based on compressive sensing
    Journal of Computer Applications   2017 Vol.37 (1): 183-187 [Abstract] (682) [HTML 1 KB] [PDF 948 KB] (524)
120 TANG Zhanyong, LI Zhen, ZHANG Cong, GONG Xiaoqing, FANG Dingyi
  Software protection method based on monitoring attack threats
    Journal of Computer Applications   2017 Vol.37 (1): 120-127 [Abstract] (525) [HTML 1 KB] [PDF 1263 KB] (529)
114 ZHANG Jianxun, GU Zhimin
  Real-time online evaluation method of helper thread prefetching quality
    Journal of Computer Applications   2017 Vol.37 (1): 114-119 [Abstract] (612) [HTML 1 KB] [PDF 1172 KB] (392)
108 ZHANG Weixiang, QI Yuhua, LI Dezhi
  Test case prioritization based on discrete particle swarm optimization algorithm
    Journal of Computer Applications   2017 Vol.37 (1): 108-113 [Abstract] (538) [HTML 1 KB] [PDF 1100 KB] (591)
90 SONG Guozhi, WANG Cheng, TU Yao, ZHANG Dakun
  Low power mapping based on improved genetic algorithm with Prim initial population selection for 3D network-on-chip
    Journal of Computer Applications   2017 Vol.37 (1): 90-96 [Abstract] (660) [HTML 1 KB] [PDF 1103 KB] (509)
84 YANG Zhiwei, CHEN Haoliang, ZHANG Bo, WU Lijuan, WU Weigang
  Data forwarding mechanism in software-defined vehicular Ad Hoc network
    Journal of Computer Applications   2017 Vol.37 (1): 84-89 [Abstract] (742) [HTML 1 KB] [PDF 1090 KB] (696)
79 HUANG Dan, HUANG Yan, HUAN Tian
  Data forwarding strategy based on weak state in vehicular Ad Hoc network
    Journal of Computer Applications   2017 Vol.37 (1): 79-83 [Abstract] (666) [HTML 1 KB] [PDF 964 KB] (464)
73 DENG Jian, DONG Baihong, CAO Hui, WU Lijuan, ZHANG Bo, WU Weigang
  Named data networking based data dissemination mechanism for vehicular Ad Hoc network
    Journal of Computer Applications   2017 Vol.37 (1): 73-78 [Abstract] (618) [HTML 1 KB] [PDF 917 KB] (609)
65 BAO Wei, MAO Yingchi, WANG Longbao, CHEN Xiaoli
  Moving target tracking scheme based on dynamic clustering
    Journal of Computer Applications   2017 Vol.37 (1): 65-72 [Abstract] (748) [HTML 1 KB] [PDF 1185 KB] (523)
48 XU Guoyan, LUO Zhangxuan, SONG Jian, LYU Xin
  Provenance graph query method based on double layer index structure
    Journal of Computer Applications   2017 Vol.37 (1): 48-53 [Abstract] (728) [HTML 1 KB] [PDF 858 KB] (533)
42 HU Yuanyuan, XIE Jiang, ZHANG Wu
  Solution of two dimensional incompressible Navier-Stokes equation by parallel spectral finite element method
    Journal of Computer Applications   2017 Vol.37 (1): 42-47 [Abstract] (719) [HTML 1 KB] [PDF 930 KB] (739)
37 FU Chen, ZHONG Cheng, YE Bo
  Accelerating parallel searching similar multiple patterns from data streams by using MapReduce
    Journal of Computer Applications   2017 Vol.37 (1): 37-41 [Abstract] (615) [HTML 1 KB] [PDF 941 KB] (558)
24 MING Li, LI Tong, QIN Jianglong, ZHENG Ming, JIANG Xudong, XIE Zhongwen
  SaaS-oriented modeling and analysis of load balancing strategy
    Journal of Computer Applications   2017 Vol.37 (1): 24-30 [Abstract] (635) [HTML 1 KB] [PDF 1177 KB] (522)
6 YAUN Ying, WANG Cong, WANG Cuirong, SONG Xin, LYU Yanxia
  Virtual network embedding algorithm for dynamic virtual network requests
    Journal of Computer Applications   2017 Vol.37 (1): 6-11 [Abstract] (670) [HTML 1 KB] [PDF 989 KB] (736)
1 GAO Xianming, WANG Baosheng, LI Tongbiao, XUE Huawei
  Design and implementation of resource management plane in virtual router platform
    Journal of Computer Applications   2017 Vol.37 (1): 1-5 [Abstract] (697) [HTML 1 KB] [PDF 1037 KB] (751)
0
  Research on Dynamic Resource Allocation strategy in Spark Streaming
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (350) [HTML 0 KB] [PDF 0 KB] (42)
0
  Research on Linear Kernel Support Vector Machine Based on Dual Random Projection
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (211) [HTML 0 KB] [PDF 0 KB] (43)
0
  Echocardiogram View Recognition Using Deep Convolutional Neural Networks
    Journal of Computer Applications   0 Vol. (): 0-0 [Abstract] (667) [HTML 0 KB] [PDF 1253 KB] (465)
3515 YUAN Guangjie, LI Xiaodong, JIANG Zhaoyi, YUAN Peng, GUO Zhiwei
  Mobile terminal positioning method driven by road test data
    Journal of Computer Applications   2016 Vol.36 (12): 3515-3520 [Abstract] (933) [HTML 1 KB] [PDF 979 KB] (341)
3476 PENG Xingxiong, XIAO Ruliang
  Simulation generating algorithm of Web log based on user interest migration
    Journal of Computer Applications   2016 Vol.36 (12): 3476-3480 [Abstract] (553) [HTML 1 KB] [PDF 864 KB] (430)
3461 CHEN Zhuo, ZHANG Liping, WANG Chunhui
  Clone genealogy extraction method based on software code evolution information
    Journal of Computer Applications   2016 Vol.36 (12): 3461-3467 [Abstract] (807) [HTML 1 KB] [PDF 1115 KB] (419)
3448 YU Hai, LI Bin, WANG Peixia, JIA Di, WANG Yongji
  Source code comments quality assessment method based on aggregation of classification algorithms
    Journal of Computer Applications   2016 Vol.36 (12): 3448-3453 [Abstract] (809) [HTML 1 KB] [PDF 1127 KB] (618)
3442 RUAN Feng, ZHANG Hui, LI Xuanlun
  Rapid displacement compensation method for liquid impurity detection images
    Journal of Computer Applications   2016 Vol.36 (12): 3442-3447 [Abstract] (657) [HTML 1 KB] [PDF 1067 KB] (336)
3436 TANG Hao, HE Chu
  SAR image scene classification with fully convolutional network and modified conditional random field-recurrent neural network
    Journal of Computer Applications   2016 Vol.36 (12): 3436-3441 [Abstract] (890) [HTML 1 KB] [PDF 982 KB] (670)
3429 QIAN Ying, LIAO Tingting
  Cone-beam CT functional imaging method by using area integral model
    Journal of Computer Applications   2016 Vol.36 (12): 3429-3435 [Abstract] (518) [HTML 1 KB] [PDF 1043 KB] (490)
3423 CHENG Xiaoya, WANG Chunhong
  Characterized dictionary-based low-rank representation for face recognition
    Journal of Computer Applications   2016 Vol.36 (12): 3423-3428 [Abstract] (713) [HTML 1 KB] [PDF 876 KB] (440)
3418 ZHANG Kuang, ZHU Yuanping
  Text segmentation based on superpixel fusion
    Journal of Computer Applications   2016 Vol.36 (12): 3418-3422 [Abstract] (743) [HTML 1 KB] [PDF 825 KB] (429)
3411 WANG Haoran, XIA Kewen, REN Miaomiao, LI Chuo
  Adaptive denoising method of hyperspectral remote sensing image based on PCA and dictionary learning
    Journal of Computer Applications   2016 Vol.36 (12): 3411-3417 [Abstract] (838) [HTML 1 KB] [PDF 1265 KB] (561)
3402 FANG Yiguang, LIU Wu, GAO Mengzhu, TAN Shoubiao, ZHANG Ji
  Improved accurate image registration algorithm based on FREAK descriptor
    Journal of Computer Applications   2016 Vol.36 (12): 3402-3405 [Abstract] (697) [HTML 1 KB] [PDF 806 KB] (448)
3398 LI Yan, WANG Yaoli
  Backtracking regularized stage-wised orthogonal matching pursuit algorithm
    Journal of Computer Applications   2016 Vol.36 (12): 3398-3401 [Abstract] (840) [HTML 1 KB] [PDF 596 KB] (513)
3389 YU Yafeng, LIU Guangshuai, MA Ziheng, GAO Pan
  Improved pairwise rotation invariant co-occurrence local binary pattern algorithm used for texture feature extraction
    Journal of Computer Applications   2016 Vol.36 (12): 3389-3393 [Abstract] (650) [HTML 1 KB] [PDF 801 KB] (473)
3378 LIU Weixiao
  Hybrid intelligent model for fashion sales forecasting based on discrete grey forecasting model and artificial neural network
    Journal of Computer Applications   2016 Vol.36 (12): 3378-3384 [Abstract] (1052) [HTML 1 KB] [PDF 1039 KB] (583)
3333 HUANG Bin, LU Jinjin, WANG Jianhua, WU Xingming, CHEN Weihai
  Object recognition algorithm based on deep convolution neural networks
    Journal of Computer Applications   2016 Vol.36 (12): 3333-3340 [Abstract] (933) [HTML 1 KB] [PDF 1436 KB] (1384)
3311 LIU Mei, ZHANG Yongbin, RAN Chongshan, SUN Lianshan
  Mechanism of parked domain recognition based on authoritative domain name servers
    Journal of Computer Applications   2016 Vol.36 (12): 3311-3316 [Abstract] (724) [HTML 1 KB] [PDF 897 KB] (443)
3285 LIN Yang, JIANG Yu'e, LIN Jie
  Local similarity detection algorithm for time series based on distributed architecture
    Journal of Computer Applications   2016 Vol.36 (12): 3285-3291 [Abstract] (667) [HTML 1 KB] [PDF 1125 KB] (524)
3269 LIU Dafu, SU Yang, XIE Hong'an, YANG Kai
  Analysis of evolutionary game on client's evaluation strategy selection in e-commerce
    Journal of Computer Applications   2016 Vol.36 (12): 3269-3273 [Abstract] (1058) [HTML 1 KB] [PDF 746 KB] (482)
3262 HUANG Guangqiu, HE Tong, LU Qiuqin
  System dynamics relevancy analysis model based on stochastic function Petri-net
    Journal of Computer Applications   2016 Vol.36 (12): 3262-3268 [Abstract] (649) [HTML 1 KB] [PDF 1046 KB] (553)
3256 HUANG Chengbing, TANG Gang, WANG Bo
  Non-orthogonal network coding for complex field distributed detection based on super node MAC relay
    Journal of Computer Applications   2016 Vol.36 (12): 3256-3261 [Abstract] (655) [HTML 1 KB] [PDF 991 KB] (441)
3244 GUAN Zhiyan, FENG Xiufang
  Coverage algorithm based on differential evolution and mixed virtual force for directional sensor networks
    Journal of Computer Applications   2016 Vol.36 (12): 3244-3250 [Abstract] (613) [HTML 1 KB] [PDF 1073 KB] (910)
3222 ZHANG Yang, ZHAO Xiaoqun, WANG Digang
  Chinese speech segmentation into syllables based on energies in different times and frequencies
    Journal of Computer Applications   2016 Vol.36 (11): 3222-3228 [Abstract] (660) [HTML 1 KB] [PDF 1015 KB] (564)
3217 YANG Fan, CAI Chao
  Significant visual attention method guided by object-level features
    Journal of Computer Applications   2016 Vol.36 (11): 3217-3221 [Abstract] (780) [HTML 1 KB] [PDF 1006 KB] (521)
3188 BIAN Le, HUO Guanying, LI Qingwu
  Multi-threshold MRI image segmentation algorithm based on Curevelet transformation and multi-objective particle swarm optimization
    Journal of Computer Applications   2016 Vol.36 (11): 3188-3195 [Abstract] (599) [HTML 1 KB] [PDF 1337 KB] (498)
3161 YAN Mengdi, QIN Linlin, WU Gang
  File type detection algorithm based on principal component analysis and K nearest neighbors
    Journal of Computer Applications   2016 Vol.36 (11): 3161-3164 [Abstract] (625) [HTML 1 KB] [PDF 583 KB] (567)
3146 FENG Yanhong, YU Hong, SUN Geng, ZHAO Yujin
  Domain-specific term recognition method based on word embedding and conditional random field
    Journal of Computer Applications   2016 Vol.36 (11): 3146-3151 [Abstract] (701) [HTML 1 KB] [PDF 982 KB] (754)
3136 YANG Jie, GAO Hong, LIU Tao, LIU Wei
  Integrated berth and quay-crane scheduling based on improved genetic algorithm
    Journal of Computer Applications   2016 Vol.36 (11): 3136-3140 [Abstract] (617) [HTML 1 KB] [PDF 771 KB] (571)
3131 YU Shunkun, YAN Hongxu
  Evaluation model based on dual-threshold constrained tolerance dominance relation
    Journal of Computer Applications   2016 Vol.36 (11): 3131-3135 [Abstract] (628) [HTML 1 KB] [PDF 831 KB] (395)
3127 SHEN Li, LI Jie, ZHU Huayong
  Task coordination and workload balance method for multi-robot based on trading-tree
    Journal of Computer Applications   2016 Vol.36 (11): 3127-3130 [Abstract] (562) [HTML 1 KB] [PDF 765 KB] (566)
3098 REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong
  Partially blind signature scheme with ID-based server-aided verification
    Journal of Computer Applications   2016 Vol.36 (11): 3098-3102 [Abstract] (574) [HTML 1 KB] [PDF 704 KB] (498)
3093 TANG Yan, LYU Guonian, ZHANG Hong
  Advanced marking scheme algorithm based on multidimensional pseudo-random sequences
    Journal of Computer Applications   2016 Vol.36 (11): 3093-3097 [Abstract] (587) [HTML 1 KB] [PDF 946 KB] (569)
3050 MA Junfeng, WANG Yan
  Efficient file management system based on cloud instances in smartphone
    Journal of Computer Applications   2016 Vol.36 (11): 3050-3054 [Abstract] (562) [HTML 1 KB] [PDF 1004 KB] (623)
3033 XIE Bin, YANG Liqing, CHEN Qin
  Improved adaptive linear minimum mean square error channel estimation algorithm in discrete wavelet transform domain based on empirical mode decomposition-singular value decomposition difference spectrum
    Journal of Computer Applications   2016 Vol.36 (11): 3033-3038 [Abstract] (639) [HTML 1 KB] [PDF 948 KB] (513)
2974 BAI Xiaohong, WEN Jing, ZHAO Xue, CHEN Jinguang
  target tracking algorithm based on the speeded up robust features and multi-instance learning
    Journal of Computer Applications   2016 Vol.36 (11): 2974-2978 [Abstract] (644) [HTML 1 KB] [PDF 797 KB] (456)
2933 YE Weidong, YANG Tao
  Single-channel vibration signal blind source separation by combining extreme-point symmetric mode decomposition with time-frequency analysis
    Journal of Computer Applications   2016 Vol.36 (10): 2933-2939 [Abstract] (472) [HTML 0 KB] [PDF 1014 KB] (501)
2927 WANG Sixiu, XU Zhou, WANG Xiaojie, WANG Jianghua
  Whole parameters estimation for linear frequency modulation pulse based on partial correlationtle
    Journal of Computer Applications   2016 Vol.36 (10): 2927-2932 [Abstract] (502) [HTML 0 KB] [PDF 877 KB] (475)
2922 JIA Yulan, HUO Zhanqiang, HOU Zhanwei, WANG Zhiheng
  Automatic positioning and detection method for jewelry based on principal component analysis
    Journal of Computer Applications   2016 Vol.36 (10): 2922-2926 [Abstract] (471) [HTML 0 KB] [PDF 739 KB] (498)
2916 HE Lin, ZHANG Quan, SHANGGUAN Hong, ZHANG Wen, ZHANG Pengcheng, LIU Yi, GUI Zhiguo
  Statistical iterative algorithm based on adaptive weighted total variation for low-dose CT
    Journal of Computer Applications   2016 Vol.36 (10): 2916-2921 [Abstract] (501) [HTML 0 KB] [PDF 888 KB] (489)
2900 FENG Aijing, XIAO Deqin
  Motion parameter extraction algorithm for pigs under natural conditions
    Journal of Computer Applications   2016 Vol.36 (10): 2900-2906 [Abstract] (345) [HTML 0 KB] [PDF 1164 KB] (485)
2895 GAN Lan, ZHANG Yonghuan
  Regularized robust coding for tumor cell image recognition based on dictionary learning
    Journal of Computer Applications   2016 Vol.36 (10): 2895-2899 [Abstract] (466) [HTML 0 KB] [PDF 928 KB] (495)
2885 SHANG Changjun, DING Rui
  Gesture feature extraction of depth image based on curvature and local binary pattern
    Journal of Computer Applications   2016 Vol.36 (10): 2885-2889 [Abstract] (513) [HTML 0 KB] [PDF 956 KB] (589)
2875 WANG Peiyao, CAO Jiangtao, JI Xiaofei
  Two-person interaction recognition based on improved spatio-temporal interest points
    Journal of Computer Applications   2016 Vol.36 (10): 2875-2879 [Abstract] (431) [HTML 0 KB] [PDF 972 KB] (491)
2849 WANG Hanguang, WANG Xuguang, WANG Haoyuan
  Multi-channel real-time video stitching based on circular region of interest
    Journal of Computer Applications   2016 Vol.36 (10): 2849-2853 [Abstract] (647) [HTML 0 KB] [PDF 909 KB] (449)
2842 WEN Peizhi, ZHU Likun, HUANG Jia
  Realistic real-time rendering method for translucent three-dimensional objects
    Journal of Computer Applications   2016 Vol.36 (10): 2842-2848 [Abstract] (567) [HTML 0 KB] [PDF 1158 KB] (549)
2811 TANG Yang, ZENG Fanping, WANG Jiankang, HUANG Xinyi
  Android GUI traversal method based on static analysis
    Journal of Computer Applications   2016 Vol.36 (10): 2811-2815 [Abstract] (534) [HTML 0 KB] [PDF 759 KB] (549)
2794 LIU Chunli, LI Xiaoge, LIU Rui, FAN Xian, DU Liping
  Chinese word segment based on character representation learning
    Journal of Computer Applications   2016 Vol.36 (10): 2794-2798 [Abstract] (621) [HTML 1 KB] [PDF 754 KB] (686)
2767 LI Xueming, ZHANG Chaoyang, SHE Weijun
  Review helpfulness based on opinion support of user discussion
    Journal of Computer Applications   2016 Vol.36 (10): 2767-2771 [Abstract] (445) [HTML 1 KB] [PDF 941 KB] (772)
2758 ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong
  Improved certificate-based aggregate proxy signature scheme
    Journal of Computer Applications   2016 Vol.36 (10): 2758-2761 [Abstract] (416) [HTML 1 KB] [PDF 708 KB] (457)
2742 ABDURAHMAN Kadir, MIREGULI Aili, MUTALLIP Sattar
  Adaptive asynchronous and anti-noise secure communication scheme based on hyper-chaotic Lorenz system
    Journal of Computer Applications   2016 Vol.36 (10): 2742-2746 [Abstract] (477) [HTML 1 KB] [PDF 670 KB] (405)
2738 WANG Xiong, DENG Lunzhi
  Provably secure undeniable signature scheme based on identity
    Journal of Computer Applications   2016 Vol.36 (10): 2738-2741 [Abstract] (497) [HTML 1 KB] [PDF 749 KB] (507)
2704 LU Haoyang, CHEN Shiping
  Resource allocation framework based on cloud computing package cluster mapping
    Journal of Computer Applications   2016 Vol.36 (10): 2704-2709 [Abstract] (996) [HTML 1 KB] [PDF 914 KB] (492)
2647 WANG Jun, YANG Yang, CHENG Yong
  Data preprocessing based recovery model in wireless meteorological sensor network
    Journal of Computer Applications   2016 Vol.36 (10): 2647-2652 [Abstract] (725) [HTML 1 KB] [PDF 1082 KB] (796)
2642 LUO Qi, HAN Hua, GONG Jiangtao, WANG Haijun
  Random matrix denoising method based on Monte Carlo simulation as amended
    Journal of Computer Applications   2016 Vol.36 (9): 2642-2646 [Abstract] (553) [HTML 1 KB] [PDF 708 KB] (298)
2620 LI Zhongxun, HUA Jinzhi, LIU Zhen, ZHENG Jianbin
  Comprehensive evaluation on merchants based on G1 method improved by composite power function
    Journal of Computer Applications   2016 Vol.36 (9): 2620-2625 [Abstract] (601) [HTML 1 KB] [PDF 911 KB] (369)
2609 QIN Chuxiong, ZHANG Lianhai
  Acoustic modeling approach of multi-stream feature incorporated convolutional neural network for low-resource speech recognition
    Journal of Computer Applications   2016 Vol.36 (9): 2609-2615 [Abstract] (685) [HTML 1 KB] [PDF 1145 KB] (444)
2605 WU Xi, XU Qing, BU Hongjuan, WANG Zheng
  Metropolis ray tracing based integrated filter
    Journal of Computer Applications   2016 Vol.36 (9): 2605-2608 [Abstract] (399) [HTML 1 KB] [PDF 658 KB] (261)
2601 LI Weiwei, MEI Xue, ZHOU Yu
  fMRI time series stepwise denoising based on wavelet transform
    Journal of Computer Applications   2016 Vol.36 (9): 2601-2604 [Abstract] (450) [HTML 1 KB] [PDF 734 KB] (292)
2597 ZHANG Gengning, WANG Jiabao, LI Yang, MIAO Zhuang, ZHANG Yafei, LI Hang
  Person re-identification based on feature fusion and kernel local Fisher discriminant analysis
    Journal of Computer Applications   2016 Vol.36 (9): 2597-2600 [Abstract] (694) [HTML 1 KB] [PDF 785 KB] (332)
2590 MA Zhiqiang, LI Haisheng
  Fast and effective compression for 3D dynamic scene based on KD-tree division
    Journal of Computer Applications   2016 Vol.36 (9): 2590-2596 [Abstract] (589) [HTML 1 KB] [PDF 1150 KB] (277)
2540 TANG Deyou, ZHOU Zilin
  No-fit-polygon-based heuristic nesting algorithm for irregular shapes
    Journal of Computer Applications   2016 Vol.36 (9): 2540-2544 [Abstract] (776) [HTML 1 KB] [PDF 778 KB] (369)
2526 LI Yan, ZHANG Bowen, HAO Hongwei
  Query expansion with semantic vector representation
    Journal of Computer Applications   2016 Vol.36 (9): 2526-2530 [Abstract] (560) [HTML 1 KB] [PDF 905 KB] (306)
2508 LI Yandong, HAO Zongbo, LEI Hang
  Survey of convolutional neural network
    Journal of Computer Applications   2016 Vol.36 (9): 2508-2515 [Abstract] (6525) [HTML 1 KB] [PDF 1569 KB] (17784)
2486 ZHANG Lei, ZHU Yixin, XU Chun, YU Kai
  Software defect detection algorithm based on dictionary learning
    Journal of Computer Applications   2016 Vol.36 (9): 2486-2491 [Abstract] (477) [HTML 1 KB] [PDF 881 KB] (360)
2481 ZHAO Di, HUA Baojian, ZHU Hongjun
  Design and implementation of performance comparing frame for higher-order code elimination
    Journal of Computer Applications   2016 Vol.36 (9): 2481-2485 [Abstract] (530) [HTML 1 KB] [PDF 713 KB] (337)
2475 JIN Yan, PENG Xinguang
  Composite classification model learned on multiple isolated subdomains for imbalanced class
    Journal of Computer Applications   2016 Vol.36 (9): 2475-2480 [Abstract] (577) [HTML 1 KB] [PDF 878 KB] (235)
2452 HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang
  Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem
    Journal of Computer Applications   2016 Vol.36 (9): 2452-2458 [Abstract] (507) [HTML 1 KB] [PDF 1002 KB] (316)
2447 XIE Hong'an, LI Dong, SU Yang, YANG Kai
  Trusted network management model based on clustering analysis
    Journal of Computer Applications   2016 Vol.36 (9): 2447-2451 [Abstract] (578) [HTML 1 KB] [PDF 936 KB] (386)
2427 XIAO Mansheng, XIAO Zhe
  Improvement of penalty factor in suppressed fuzzy C-means clustering
    Journal of Computer Applications   2016 Vol.36 (9): 2427-2431 [Abstract] (480) [HTML 1 KB] [PDF 795 KB] (305)
2409 YUAN Bin, LI Wenwei
  Design and implementation of QoE measuring tool for personal cloud storage services
    Journal of Computer Applications   2016 Vol.36 (9): 2409-2415 [Abstract] (517) [HTML 1 KB] [PDF 1117 KB] (290)
2402 WANG Yuefei, YU Jiong, LU Liang
  Coordinator selection strategy based on RAMCloud
    Journal of Computer Applications   2016 Vol.36 (9): 2402-2408 [Abstract] (361) [HTML 1 KB] [PDF 1102 KB] (287)
2396 DENG Li, YAO Li, JIN Yu
  Dynamic resource configuration based on multi-objective optimization in cloud computing
    Journal of Computer Applications   2016 Vol.36 (9): 2396-2401 [Abstract] (632) [HTML 1 KB] [PDF 1092 KB] (471)
2390 HE Jie, XIAO Kun
  Performance analysis of OSTBC-MIMO systems over i.n.i.d. generalized-K fading channels
    Journal of Computer Applications   2016 Vol.36 (9): 2390-2395 [Abstract] (609) [HTML 1 KB] [PDF 783 KB] (424)
2386 WANG Shanshan, LENG Supeng
  Friend recommendation method for mobile social networks
    Journal of Computer Applications   2016 Vol.36 (9): 2386-2389 [Abstract] (543) [HTML 1 KB] [PDF 771 KB] (362)
2374 HAO Jing, DU Taihang, JIANG Chundong, SUN Shuguang, FU Chao
  Application of parameter-tuning stochastic resonance for detecting weak signal with ultrahigh frequency
    Journal of Computer Applications   2016 Vol.36 (9): 2374-2380 [Abstract] (804) [HTML 1 KB] [PDF 1141 KB] (450)
2362 WANG Changzheng, MAO Jianlin, FU Lixa, GUO Ning, QU Weixian
  Coverage optimization algorithm for three-dimensional directional heterogeneous sensor network
    Journal of Computer Applications   2016 Vol.36 (9): 2362-2366 [Abstract] (598) [HTML 1 KB] [PDF 913 KB] (476)
2357 WANG Renqun, PENG Li
  Topology-aware congestion control algorithm in data center network
    Journal of Computer Applications   2016 Vol.36 (9): 2357-2361 [Abstract] (738) [HTML 1 KB] [PDF 819 KB] (652)
2335 ZHANG Guangsheng, LIU Wei
  Coordinating emergency task allocation of logistics service supply chain under time-to-service
    Journal of Computer Applications   2016 Vol.36 (8): 2335-2339 [Abstract] (402) [HTML 0 KB] [PDF 825 KB] (406)
2327 ZHANG Jianfa, ZHANG Fengfeng, SUN Lining, KUANG Shaolong
  Camera calibration method of surgical navigation based on C-arm
    Journal of Computer Applications   2016 Vol.36 (8): 2327-2331 [Abstract] (750) [HTML 0 KB] [PDF 756 KB] (589)
2306 HE Wei, QI Qi, ZHANG Guoyun, WU Jianhui
  Moving object detection method based on multi-information dynamic fusion
    Journal of Computer Applications   2016 Vol.36 (8): 2306-2310 [Abstract] (429) [HTML 0 KB] [PDF 843 KB] (370)
2292 HUANG Xiaodong, SUN Liang
  Retrieval method of images based on robust Cosine-Euclidean metric dimensionality reduction
    Journal of Computer Applications   2016 Vol.36 (8): 2292-2295 [Abstract] (465) [HTML 0 KB] [PDF 766 KB] (444)
2252 TENG Fei, ZHENG Chaomei, LI Wen
  Multidimensional topic model for oriented sentiment analysis based on long short-term memory
    Journal of Computer Applications   2016 Vol.36 (8): 2252-2256 [Abstract] (812) [HTML 0 KB] [PDF 784 KB] (811)
2219 ZENG Xiaofei, LU Jianzhu, WANG Jie
  Broadcast authentication using cooperative sensor nodes
    Journal of Computer Applications   2016 Vol.36 (8): 2219-2224 [Abstract] (993) [HTML 0 KB] [PDF 966 KB] (366)
2207 YANG Wanchun, ZHANG Chenxi, MU Bin
  Optimal QoS-aware service selection approach considering semantics and transactional properties
    Journal of Computer Applications   2016 Vol.36 (8): 2207-2212 [Abstract] (1182) [HTML 0 KB] [PDF 875 KB] (377)
2197 LI Wenjie, YANG Tao, MEI Yanying
  Two-dimensional direction-of-arrival estimation based on sparse representation of reduced covariance matrix
    Journal of Computer Applications   2016 Vol.36 (8): 2197-2201 [Abstract] (467) [HTML 0 KB] [PDF 726 KB] (372)
2192 WANG Youguo, DONG Hongcheng, LIU Jian
  Using noise to improve information transmission in optimal matching array stochastic resonance system
    Journal of Computer Applications   2016 Vol.36 (8): 2192-2196 [Abstract] (438) [HTML 0 KB] [PDF 771 KB] (337)
2170 LIU Xing, ZHANG Hao, XU Lingwei
  Beamforming based localization algorithm in 60GHz wireless local area networks
    Journal of Computer Applications   2016 Vol.36 (8): 2170-2174 [Abstract] (438) [HTML 0 KB] [PDF 731 KB] (417)
2163 DUAN Ruijie, YAO Fuqiang, LI Yonggui, GUO Pengcheng
  Dynamic spectrum allocation algorithm of HF radio access network based on intelligent frequency hopping
    Journal of Computer Applications   2016 Vol.36 (8): 2163-2169 [Abstract] (436) [HTML 0 KB] [PDF 1127 KB] (429)
2157 LIU Baojian, ZHANG Xiaoyi, LI Qing
  Evolutionary game theory based clustering algorithm for multi-target localization in wireless sensor network
    Journal of Computer Applications   2016 Vol.36 (8): 2157-2162 [Abstract] (436) [HTML 0 KB] [PDF 952 KB] (479)
2144 GAO Panpan, WANG Ning, ZHOU Xuezhong, LIU Guangming, WANG Huixin
  Functional homogeneity analysis on topology module of human interaction network for disease classification
    Journal of Computer Applications   2016 Vol.36 (8): 2144-2149 [Abstract] (604) [HTML 0 KB] [PDF 1006 KB] (421)
2128 LIU Xi, ZHANG Xiaolu, ZHANG Xuejie
  Fair allocation of multi-dimensional resources based on intelligent optimization algorithm in heterogeneous cloud environment
    Journal of Computer Applications   2016 Vol.36 (8): 2128-2133 [Abstract] (488) [HTML 1 KB] [PDF 1014 KB] (487)
2121 WANG Yingjie, CAI Zhipeng, TONG Xiangrong, PAN Qingxian, GAO Yang, YIN Guisheng
  Online incentive mechanism based on reputation for mobile crowdsourcing system
    Journal of Computer Applications   2016 Vol.36 (8): 2121-2127 [Abstract] (1237) [HTML 1 KB] [PDF 1144 KB] (768)
2114 HAO Zhifeng, CHEN Wei, CAI Ruichu, HUANG Ruihui, WEN Wen, WANG Lijuan
  Performance optimization of wireless network based on canonical causal inference algorithm
    Journal of Computer Applications   2016 Vol.36 (8): 2114-2120 [Abstract] (669) [HTML 1 KB] [PDF 1089 KB] (681)
2092 XIN Guanlin, LIU Jinglei
  Mining Ceteris Paribus preference from preference database
    Journal of Computer Applications   2016 Vol.36 (8): 2092-2098 [Abstract] (415) [HTML 1 KB] [PDF 1198 KB] (516)
2087 HU Weijian, TENG Fei, LI Lingfang, WANG Huan
  Improved adaptive collaborative filtering algorithm to change of user interest
    Journal of Computer Applications   2016 Vol.36 (8): 2087-2091 [Abstract] (490) [HTML 1 KB] [PDF 767 KB] (425)
2076 WEN Wen, WU Biao, CAI Ruichu, HAO Zhifeng, WANG Lijuan
  Emotion classification for news readers based on multi-category semantic word clusters
    Journal of Computer Applications   2016 Vol.36 (8): 2076-2081 [Abstract] (662) [HTML 1 KB] [PDF 966 KB] (574)
2066 YANG Huihua, WANG Ke, LI Lingqiao, WEI Wen, HE Shengtao
  K-means clustering algorithm based on adaptive cuckoo search and its application
    Journal of Computer Applications   2016 Vol.36 (8): 2066-2070 [Abstract] (676) [HTML 1 KB] [PDF 803 KB] (721)
2056 ZHANG Wenying, HE Kunjin, ZHANG Rongli, LIU Yuxing
  3-D visualization and information management system design based on open scene graph
    Journal of Computer Applications   2016 Vol.36 (7): 2056-2060 [Abstract] (592) [HTML 0 KB] [PDF 830 KB] (322)
2021 ZHANG Jiujie, ZHAI Ye, WANG Chunhui, ZHANG Liping, LIU Dongsheng
  Evolution pattern recognition and genealogy construction based on clone mapping of versions
    Journal of Computer Applications   2016 Vol.36 (7): 2021-2030 [Abstract] (489) [HTML 1 KB] [PDF 1721 KB] (358)
1993 MA Youzhong, JIA Shijie, ZHANG Yongxin
  Chi-square distribution based similarity join query algorithm on high-dimensional data
    Journal of Computer Applications   2016 Vol.36 (7): 1993-1997 [Abstract] (652) [HTML 1 KB] [PDF 829 KB] (363)
1981 LI Bin, DI Lan, WANG Shaohua, YU Xiaotong
  Clustering algorithm with maximum distance between clusters based on improved kernel fuzzy C-means
    Journal of Computer Applications   2016 Vol.36 (7): 1981-1987 [Abstract] (388) [HTML 1 KB] [PDF 886 KB] (357)
1965 DU Kun, TAN Taizhe
  General method for gesture recognition in complex environment
    Journal of Computer Applications   2016 Vol.36 (7): 1965-1970 [Abstract] (870) [HTML 1 KB] [PDF 948 KB] (368)
1904 SONG Tao, WANG Xing
  Customer behavior prediction for card consumption based on two-step clustering and hidden Markov chain
    Journal of Computer Applications   2016 Vol.36 (7): 1904-1908 [Abstract] (407) [HTML 1 KB] [PDF 786 KB] (316)
1899 LU Xiaoyong, CHEN Musheng, WU Jhenglong, CHANG Peichan
  Web spam detection based on immune clonal feature selection and under-sampling ensemble
    Journal of Computer Applications   2016 Vol.36 (7): 1899-1903 [Abstract] (592) [HTML 1 KB] [PDF 808 KB] (297)
1870 WANG Xingfu, CHEN Jing, WANG Lin
  Mutation fruit fly optimization algorithm based on adaptive dynamic step size
    Journal of Computer Applications   2016 Vol.36 (7): 1870-1874 [Abstract] (446) [HTML 1 KB] [PDF 768 KB] (340)
1866 JIANG Tiejin, REN Yanli
  Secure outsourcing algorithm of bilinear pairings with single server
    Journal of Computer Applications   2016 Vol.36 (7): 1866-1869 [Abstract] (430) [HTML 1 KB] [PDF 546 KB] (359)
1861 SUN Yiru, LIANG Xiangqian, SHANG Yufang
  Identity based ring signature scheme in ideal lattice
    Journal of Computer Applications   2016 Vol.36 (7): 1861-1865 [Abstract] (456) [HTML 1 KB] [PDF 889 KB] (462)
1816 ZHANG Xinpeng, XU Chunxiang, ZHANG Xinyan, SAI Wei, HAN Xingyang, LIU Guoping
  Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme
    Journal of Computer Applications   2016 Vol.36 (7): 1816-1821 [Abstract] (538) [HTML 1 KB] [PDF 927 KB] (404)
1811 GAO Chao, ZHENG Xiaomei, JIA Xiaoqi
  Diversified malware detection framework toward cloud platform
    Journal of Computer Applications   2016 Vol.36 (7): 1811-1815 [Abstract] (453) [HTML 1 KB] [PDF 949 KB] (372)
1789 FENG Huifang, LI Caihong
  Invulnerability analysis of vehicular Ad Hoc network based on complex network
    Journal of Computer Applications   2016 Vol.36 (7): 1789-1792 [Abstract] (505) [HTML 1 KB] [PDF 791 KB] (350)
1724 HE Chuanyang, WANG Ping, ZHANG Xiaohua, SONG Danni
  Abnormal behavior detection of small and medium crowd based on intelligent video surveillance
    Journal of Computer Applications   2016 Vol.36 (6): 1724-1729 [Abstract] (717) [HTML 1 KB] [PDF 905 KB] (785)
1719 PAN Lei, ZHOU Huan, WANG Minghui
  Real-time detection method of abnormal event in crowds
    Journal of Computer Applications   2016 Vol.36 (6): 1719-1723 [Abstract] (610) [HTML 1 KB] [PDF 735 KB] (442)
1673 LI Na, ZHOU Pengbo, GENG Guohua, JIA Hui
  Quality evaluation method for color restoration image
    Journal of Computer Applications   2016 Vol.36 (6): 1673-1676 [Abstract] (494) [HTML 1 KB] [PDF 645 KB] (414)
1654 LI Xin, CUI Ziguan, SUN Linhui, ZHU Xiuchang
  Image super-resolution reconstruction based on local regression model
    Journal of Computer Applications   2016 Vol.36 (6): 1654-1658 [Abstract] (596) [HTML 1 KB] [PDF 798 KB] (346)
1650 LUO Bo, LI Tao, WANG Jie
  Tracking mechanism of service provenance based on graph
    Journal of Computer Applications   2016 Vol.36 (6): 1650-1653 [Abstract] (445) [HTML 1 KB] [PDF 691 KB] (315)
1639 CHEN Mingwei, SUN Lihua, XU Jianfeng
  Temporal similarity algorithm of coarse-granularity based dynamic time warping
    Journal of Computer Applications   2016 Vol.36 (6): 1639-1644 [Abstract] (518) [HTML 1 KB] [PDF 974 KB] (440)
1613 SU Ying, ZHANG Yong, HU Po, TU Xinhui
  Sentiment analysis research based on combination of naive Bayes and latent Dirichlet allocation
    Journal of Computer Applications   2016 Vol.36 (6): 1613-1618 [Abstract] (648) [HTML 1 KB] [PDF 947 KB] (709)
1605 CHEN Xue, HU Xiaofeng, XU Hao
  Burst-event evolution process expression based on short-text
    Journal of Computer Applications   2016 Vol.36 (6): 1605-1612 [Abstract] (509) [HTML 1 KB] [PDF 1215 KB] (457)
1567 MAN Yujia, YIN Qing, ZHU Xiaodong
  Fine-grained data randomization technique based on field-sensitive pointer analysis
    Journal of Computer Applications   2016 Vol.36 (6): 1567-1572 [Abstract] (461) [HTML 1 KB] [PDF 842 KB] (377)
1558 LIU Jianhua, MAO Kefei, HU Junwei
  Certificateless aggregate signcryption scheme based on bilinear pairings
    Journal of Computer Applications   2016 Vol.36 (6): 1558-1562 [Abstract] (506) [HTML 1 KB] [PDF 763 KB] (506)
1538 ZHANG Jing, LI Xiaopeng, WANG Hengjun, LI Junquan, YU Bin
  Real-time alert correlation approach based on attack planning graph
    Journal of Computer Applications   2016 Vol.36 (6): 1538-1543 [Abstract] (482) [HTML 1 KB] [PDF 840 KB] (360)
1510 WANG Feng, LI Lixin, CAO Jingyuan, PAN Cong
  Research on replication consistency of cache in publish/subscribe systems
    Journal of Computer Applications   2016 Vol.36 (6): 1510-1514 [Abstract] (402) [HTML 1 KB] [PDF 804 KB] (350)
1496 OU Zhengbao, GUO Chengjun
  Unambiguous capture model for binary offset carrier modulated signals based on correlation function
    Journal of Computer Applications   2016 Vol.36 (6): 1496-1501 [Abstract] (671) [HTML 1 KB] [PDF 738 KB] (426)
1486 LIU Xiankai
  Establishment of virtual chain network in ZigBee network
    Journal of Computer Applications   2016 Vol.36 (6): 1486-1491 [Abstract] (656) [HTML 1 KB] [PDF 850 KB] (400)
1469 MENG Tangyu, PU Jiantao, FANG Jianjun, LIANG Lanzhen
  Synchronization estimation algorithm for attitude algorithm and external force acceleration
    Journal of Computer Applications   2016 Vol.36 (5): 1469-1474 [Abstract] (543) [HTML 1 KB] [PDF 871 KB] (1191)
1464 ZHANG Minlong, WANG Tao, WANG Xuping, CHANG Hongwei, WANG Fang
  Step dynamic auto-regression kernel principal component analysis and its application in fault diagnosis
    Journal of Computer Applications   2016 Vol.36 (5): 1464-1468 [Abstract] (434) [HTML 1 KB] [PDF 731 KB] (436)
1430 WANG Jinyang, YAN Hua
  Wear-leveling algorithm for NAND flash memory based on separation of hot and cold logic pages
    Journal of Computer Applications   2016 Vol.36 (5): 1430-1433 [Abstract] (416) [HTML 1 KB] [PDF 671 KB] (544)
1410 ZHANG Yang, ZHAO Xiaoqun, WANG Digang
  Chinese speech segmentation method based on Gauss distribution of time spans of syllables
    Journal of Computer Applications   2016 Vol.36 (5): 1410-1414 [Abstract] (721) [HTML 1 KB] [PDF 957 KB] (430)
1394 MO Jianwen, ZENG Ermeng, ZHANG Tong, YUAN Hua
  Super-resolution reconstruction based on multi-dictionary learning and image patches mapping
    Journal of Computer Applications   2016 Vol.36 (5): 1394-1398 [Abstract] (545) [HTML 1 KB] [PDF 960 KB] (455)
1387 LI Hua, WANG Xuyang, YANG Huamin, HAN Cheng
  Illumination direction measurement based on halo analysis in high-dynamic range images
    Journal of Computer Applications   2016 Vol.36 (5): 1387-1393 [Abstract] (400) [HTML 1 KB] [PDF 1084 KB] (421)
1383 YANG Wenhao, LI Xiaoman
  Single Gaussian model for background using block-based gradient and linear prediction
    Journal of Computer Applications   2016 Vol.36 (5): 1383-1386 [Abstract] (552) [HTML 1 KB] [PDF 642 KB] (436)
1341 LIU Jiao, MA Di, MA Tengbo, ZHANG Wei
  Dynamic multi-species particle swarm optimization based on food chain mechanism
    Journal of Computer Applications   2016 Vol.36 (5): 1341-1346 [Abstract] (538) [HTML 1 KB] [PDF 856 KB] (518)
1319 GENG Huantong, LI Huijian, ZHAO Yaguang, CHEN Zhengpeng
  Improved NSGA-Ⅱ algorithm based on adaptive hybrid non-dominated individual sorting strategy
    Journal of Computer Applications   2016 Vol.36 (5): 1319-1324 [Abstract] (511) [HTML 1 KB] [PDF 1017 KB] (603)
1313 SUN Xinyu, WU Jiang, PU Qiang
  Relevance model estimation based on stable semantic clustering
    Journal of Computer Applications   2016 Vol.36 (5): 1313-1318 [Abstract] (421) [HTML 1 KB] [PDF 1012 KB] (426)
1290 ZHANG Junchi, HU Jie, LIU Mengchi
  Chinese natural language interface based on paraphrasing
    Journal of Computer Applications   2016 Vol.36 (5): 1290-1295 [Abstract] (568) [HTML 1 KB] [PDF 1117 KB] (504)
1284 XU Tao, MENG Ye
  Importance sorting method of organizational enities based on trace clustering
    Journal of Computer Applications   2016 Vol.36 (5): 1284-1289 [Abstract] (522) [HTML 1 KB] [PDF 901 KB] (483)
1257 HU Zhihua, YAN Shuo, XIONG Kuanjiang
  Dynamic S-box construction method and dynamic cryptography property analysis
    Journal of Computer Applications   2016 Vol.36 (5): 1257-1261 [Abstract] (520) [HTML 1 KB] [PDF 736 KB] (528)
1246 LI Jie, YU Yan, WU Jiashun
  Vulnerability detection algorithm of DOM XSS based on dynamic taint analysis
    Journal of Computer Applications   2016 Vol.36 (5): 1246-1249 [Abstract] (835) [HTML 1 KB] [PDF 801 KB] (673)
1236 LI Yun, CHEN Pangsen, SUN Shanlin
  Security analysis and implementation for wireless local area network access protocol via near field communication authentication
    Journal of Computer Applications   2016 Vol.36 (5): 1236-1245 [Abstract] (517) [HTML 1 KB] [PDF 1362 KB] (611)
1222 WANG Yuefei, YU Jiong, LU Liang
  Strategy for object index based on RAMCloud
    Journal of Computer Applications   2016 Vol.36 (5): 1222-1227 [Abstract] (404) [HTML 1 KB] [PDF 876 KB] (466)
1216 KE Zunwang, YU Jiong, LIAO Bin
  Adaptive multi-resource scheduling dominant resource fairness algorithm for Mesos in heterogeneous clusters
    Journal of Computer Applications   2016 Vol.36 (5): 1216-1221 [Abstract] (492) [HTML 1 KB] [PDF 870 KB] (561)
1212 HUANG Wei, LIN Jie, JIANG Yu'e
  Improved automatic classification algorithm of software bug report in cloud environment
    Journal of Computer Applications   2016 Vol.36 (5): 1212-1215 [Abstract] (549) [HTML 1 KB] [PDF 705 KB] (481)
1192 TIAN Zengshan, DAI Haipeng
  WiFi fingerprint database updating based on surface fitting
    Journal of Computer Applications   2016 Vol.36 (5): 1192-1195 [Abstract] (420) [HTML 1 KB] [PDF 571 KB] (564)
1183 LIU Yang, PENG Jian, LIU Tang, WANG Bin
  Routing algorithm based on layered mechanism in river underwater sensor networks
    Journal of Computer Applications   2016 Vol.36 (5): 1183-1187 [Abstract] (514) [HTML 1 KB] [PDF 723 KB] (542)
1173 WANG Yong, ZHAO Xianli, FU Chengqun, XIE Lijun
  Laser bathymetry waveform processing based on robust least square support vector machine
    Journal of Computer Applications   2016 Vol.36 (4): 1173-1178 [Abstract] (493) [HTML 1 KB] [PDF 801 KB] (535)
1167 WANG Lifu, SUN Yi
  Inpainting of seismic signal using consistent sparse representation method
    Journal of Computer Applications   2016 Vol.36 (4): 1167-1172 [Abstract] (581) [HTML 1 KB] [PDF 860 KB] (482)
1163 LIU Dongming, CHEN Lian, LI Xinyan
  Geometric structure analysis method based on scalable vector graphics
    Journal of Computer Applications   2016 Vol.36 (4): 1163-1166 [Abstract] (525) [HTML 1 KB] [PDF 766 KB] (543)
1096 NI Hao, RUAN Ruolin, LIU Fanghua, WANG Jianfeng
  Single image super-resolution via independently adjustable sparse coefficients
    Journal of Computer Applications   2016 Vol.36 (4): 1096-1099 [Abstract] (587) [HTML 1 KB] [PDF 849 KB] (446)
1092 JI Xiaohong, XIONG Shuhua, HE Xiaohai, CHEN Honggang
  Adaptive video super-resolution reconstruction algorithm based on multi-order derivative
    Journal of Computer Applications   2016 Vol.36 (4): 1092-1095 [Abstract] (500) [HTML 1 KB] [PDF 717 KB] (492)
1085 LI Peng, PENG Zongju, LI Chihang, CHEN Fen
  Fast intra hierarchical algorithm for high efficiency video coding based on texture property and spatial correlation
    Journal of Computer Applications   2016 Vol.36 (4): 1085-1091 [Abstract] (515) [HTML 1 KB] [PDF 1056 KB] (466)
1054 QIU Gui, YAN Renwu
  Distributed collaborative filtering recommendation algorithm based on gray association analysis
    Journal of Computer Applications   2016 Vol.36 (4): 1054-1059 [Abstract] (666) [HTML 1 KB] [PDF 883 KB] (460)
1045 GAO Yan, CHEN Baifan, CHAO Xuyao, MAO Fang
  Sentiment analysis of product reviews based on contrastive divergence- restricted Boltzmann machine deep learning
    Journal of Computer Applications   2016 Vol.36 (4): 1045-1049 [Abstract] (769) [HTML 1 KB] [PDF 767 KB] (813)
1033 ZHANG Wenda, XU Yuelei, NI Jiacheng, MA Shiping, SHI Hehuan
  Image target recognition method based on multi-scale block convolutional neural network
    Journal of Computer Applications   2016 Vol.36 (4): 1033-1038 [Abstract] (1038) [HTML 1 KB] [PDF 891 KB] (1384)
1015 ZHANG Wenqiang, LU Jiaming, ZHANG Hongmei
  Fast multi-objective hybrid evolutionary algorithm for flow shop scheduling problem
    Journal of Computer Applications   2016 Vol.36 (4): 1015-1021 [Abstract] (493) [HTML 1 KB] [PDF 974 KB] (639)
973 SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi
  Behavior oriented method of Android malware detection and its effectiveness
    Journal of Computer Applications   2016 Vol.36 (4): 973-978 [Abstract] (685) [HTML 1 KB] [PDF 856 KB] (743)
966 JIN Jianguo, XIAO Ying, DI Zhigang
  Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor
    Journal of Computer Applications   2016 Vol.36 (4): 966-972 [Abstract] (452) [HTML 1 KB] [PDF 1115 KB] (531)
956 HUANG Wenzhen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang
  Identity-based broadcast encryption based on lattice
    Journal of Computer Applications   2016 Vol.36 (4): 956-961 [Abstract] (597) [HTML 1 KB] [PDF 883 KB] (541)
941 ZHANG Yang, LIU Tingwen, SHA Hongzhou, SHI Jinqiao
  Malicious domain detection based on multiple-dimensional features
    Journal of Computer Applications   2016 Vol.36 (4): 941-944 [Abstract] (833) [HTML 1 KB] [PDF 688 KB] (857)
899 LIAO Yunfeng, CHEN Yong, SUN Aiwei, SHAO Hongxiang
  Dynamic spectrum access based on budget and quality of service
    Journal of Computer Applications   2016 Vol.36 (4): 899-904 [Abstract] (526) [HTML 1 KB] [PDF 765 KB] (475)
889 XIE Zehua, ZHOU Jinhe, TANG Zhijun
  Dynamic weight traffic queue scheduling algorithm for network energy efficiency optimization
    Journal of Computer Applications   2016 Vol.36 (4): 889-893 [Abstract] (472) [HTML 1 KB] [PDF 655 KB] (626)
849 CHEN Xi, YANG Tao, HE Hongsen
  Orientation angle estimation based on improved 2-D ESPRIT-like algorithm
    Journal of Computer Applications   2016 Vol.36 (3): 849-853 [Abstract] (700) [HTML 1 KB] [PDF 820 KB] (352)
843 FAN Lubin, LIANG Chengji, SHE Wenjing
  Coupling model and its algorithm for coordinated scheduling of quay crane and truck under uncertain environment
    Journal of Computer Applications   2016 Vol.36 (3): 843-848 [Abstract] (682) [HTML 1 KB] [PDF 977 KB] (370)
833 ZHOU Nan, TIAN Xuedong
  Analyzing and indexing method on LaTeX formulae
    Journal of Computer Applications   2016 Vol.36 (3): 833-836 [Abstract] (668) [HTML 1 KB] [PDF 704 KB] (403)
811 JIANG Zibo, ZHAO Jingxiu, ZHANG Yuanke, MENG Jing
  Fast reconstruction algorithm for photoacoustic computed tomography in vivo
    Journal of Computer Applications   2016 Vol.36 (3): 811-814 [Abstract] (490) [HTML 1 KB] [PDF 602 KB] (420)
800 ZHAO Xiaole, WU Yadong, TIAN Jinsha, ZHANG Hongying
  Single image super-resolution algorithm based on unified iterative least squares regulation
    Journal of Computer Applications   2016 Vol.36 (3): 800-805 [Abstract] (480) [HTML 1 KB] [PDF 984 KB] (431)
789 TIAN Jinsha, HAN Yongguo, WU Yadong, ZHAO Xiaole, ZHANG Hongying
  No-reference image quality assessment based on scale invariance
    Journal of Computer Applications   2016 Vol.36 (3): 789-794 [Abstract] (542) [HTML 1 KB] [PDF 1088 KB] (410)
783 MA Yun, WANG Xiaodong, ZHANG Lianjun
  No-reference stereoscopic image quality assessment model based on natural scene statistics
    Journal of Computer Applications   2016 Vol.36 (3): 783-788 [Abstract] (1156) [HTML 1 KB] [PDF 897 KB] (450)
774 LONG Chao, HAN Bo, ZHANG Yu
  Three-dimensional SLAM using Kinect and visual dictionary
    Journal of Computer Applications   2016 Vol.36 (3): 774-778 [Abstract] (543) [HTML 1 KB] [PDF 849 KB] (445)
770 KONG Weiting, ZHAN Yongzhao
  Video semantic detection based on topographic independent component analysis and Gaussian mixture model
    Journal of Computer Applications   2016 Vol.36 (3): 770-773 [Abstract] (578) [HTML 1 KB] [PDF 772 KB] (530)
740 LU Zhigang, SUN Yadan
  Multidimensional collaborative intelligence recommendation based on social media context
    Journal of Computer Applications   2016 Vol.36 (3): 740-745 [Abstract] (512) [HTML 1 KB] [PDF 1137 KB] (420)
726 YAN Yang, ZHAO Jiapeng, LI Quangang, ZHANG Yang, LIU Tingwen, SHI Jinqiao
  Personal relation extraction based on text headline
    Journal of Computer Applications   2016 Vol.36 (3): 726-730 [Abstract] (803) [HTML 1 KB] [PDF 754 KB] (733)
713 LI Jin, QIAN Xu
  Image recognition algorithm based on dual-view discriminant correlation analysis
    Journal of Computer Applications   2016 Vol.36 (3): 713-717 [Abstract] (487) [HTML 1 KB] [PDF 850 KB] (438)
708 WANG Peichong
  Improved dynamic self-adaptive teaching-learning-based optimization algorithm
    Journal of Computer Applications   2016 Vol.36 (3): 708-712 [Abstract] (613) [HTML 1 KB] [PDF 816 KB] (508)
703 REN Hongge, LI Dongmei, LI Fujin
  Dynamic neural network structure design based on semi-supervised learning
    Journal of Computer Applications   2016 Vol.36 (3): 703-707 [Abstract] (580) [HTML 1 KB] [PDF 881 KB] (498)
697 DENG Junfeng, ZHANG Xiaolong
  Deep learning algorithm optimization based on combination of auto-encoders
    Journal of Computer Applications   2016 Vol.36 (3): 697-702 [Abstract] (1086) [HTML 1 KB] [PDF 899 KB] (1266)
687 AI Bing, DONG Minggang
  Improved particle swarm optimization algorithm based on Gaussian disturbance and natural selection
    Journal of Computer Applications   2016 Vol.36 (3): 687-691 [Abstract] (588) [HTML 1 KB] [PDF 781 KB] (477)
670 LIU Chao, HU Chengyu, YAO Hong, LIANG Qingzhong, YAN Xuesong
  Non-relational data storage management mechanism for massive unstructured data
    Journal of Computer Applications   2016 Vol.36 (3): 670-674 [Abstract] (723) [HTML 1 KB] [PDF 819 KB] (535)
665 HE Zhixue, LIAO Husheng
  Query processing method of XML streaming data using list
    Journal of Computer Applications   2016 Vol.36 (3): 665-669 [Abstract] (468) [HTML 1 KB] [PDF 845 KB] (408)
647 WANG Yujie, JIANG Weiwei
  Audio steganalysis method based on fuzzy C-means clustering and one class support vector machine
    Journal of Computer Applications   2016 Vol.36 (3): 647-652 [Abstract] (657) [HTML 1 KB] [PDF 912 KB] (522)
642 REN Shuai, SHI Fangxia, ZHANG Tao
  Information hiding scheme for 3D model based on profile analysis
    Journal of Computer Applications   2016 Vol.36 (3): 642-646 [Abstract] (598) [HTML 1 KB] [PDF 658 KB] (372)
633 SHENG Xiaodong, LI Qiang, LIU Zhaozhao
  Task scheduling method based on template genetic algorithm in cloud environment
    Journal of Computer Applications   2016 Vol.36 (3): 633-636 [Abstract] (716) [HTML 1 KB] [PDF 529 KB] (436)
628 CAI Yong, LI Sheng
  Graphics processor unit parallel computing in Matlab and its application in topology optimization
    Journal of Computer Applications   2016 Vol.36 (3): 628-632 [Abstract] (914) [HTML 1 KB] [PDF 892 KB] (661)
620 WANG Yang, WANG Bin, JIANG Tianli, LIU Huaixing, CHEN Ting
  Existence detection algorithm for non-cooperative burst signals in wideband
    Journal of Computer Applications   2016 Vol.36 (3): 620-627 [Abstract] (657) [HTML 1 KB] [PDF 1062 KB] (403)
610 LIU Linlin, GUO Chengjun, TIAN Zhong
  Multipath error of deep coupling system based on integrity
    Journal of Computer Applications   2016 Vol.36 (3): 610-615 [Abstract] (567) [HTML 1 KB] [PDF 885 KB] (358)
601 LI Yong, CHENG Zhirui
  Dynamic scheduling mechanism for wireless video transmission
    Journal of Computer Applications   2016 Vol.36 (3): 601-605 [Abstract] (560) [HTML 1 KB] [PDF 926 KB] (490)
568 XU Haining, CHEN Enqing, LIANG Chengwu
  Three-dimensional spatio-temporal feature extraction method for action recognition
    Journal of Computer Applications   2016 Vol.36 (2): 568-573 [Abstract] (670) [HTML 1 KB] [PDF 1005 KB] (892)
556 HUANG Zhi, FU Xingwu, LIU Wanjun
  Non-local means denoising algorithm with hybrid similarity weight
    Journal of Computer Applications   2016 Vol.36 (2): 556-562 [Abstract] (541) [HTML 1 KB] [PDF 1247 KB] (929)
551 ZHAO Jingkun, ZHOU Yingyue, LIN Maosong
  Image denoising algorithm based on sparse representation and nonlocal similarity
    Journal of Computer Applications   2016 Vol.36 (2): 551-555 [Abstract] (752) [HTML 1 KB] [PDF 1050 KB] (963)
546 HE Chen, WANG Lei, WANG Chunmeng
  Mesh slicer: novel algorithm for 3D mesh compression
    Journal of Computer Applications   2016 Vol.36 (2): 546-550 [Abstract] (861) [HTML 1 KB] [PDF 818 KB] (793)
531 LIU Bing, ZHANG Hong
  Image retrieval algorithm based on convolutional neural network and manifold ranking
    Journal of Computer Applications   2016 Vol.36 (2): 531-534 [Abstract] (1134) [HTML 1 KB] [PDF 802 KB] (1277)
521 YANG Cunqiang, HAN Xiaojun, ZHANG Nan
  Super-resolution image reconstruction algorithm based on image patche iteration and sparse representation
    Journal of Computer Applications   2016 Vol.36 (2): 521-525 [Abstract] (709) [HTML 1 KB] [PDF 830 KB] (847)
516 HANG Bo, WANG Yi, KANG Changqing
  Computational complexity optimization for mobile audio bandwidth extension
    Journal of Computer Applications   2016 Vol.36 (2): 516-520 [Abstract] (603) [HTML 1 KB] [PDF 761 KB] (831)
492 FANG Jianchao, MAO Xuesong
  Fourier spectrum analysis for non-uniform sampled signals
    Journal of Computer Applications   2016 Vol.36 (2): 492-494 [Abstract] (1464) [HTML 1 KB] [PDF 629 KB] (1119)
483 XU Xiaoqiong, ZHOU Zhaorong, MA Xiaoxia, YANG Liu
  Cooperative behavior based on evolutionary game in delay tolerant networks
    Journal of Computer Applications   2016 Vol.36 (2): 483-487 [Abstract] (475) [HTML 1 KB] [PDF 883 KB] (893)
478 TANG Haijian, BAO Yu, MIN Xuan, LUO Yuxuan, ZOU Yuchi
  Autonomous mobile strategy of carrier in wireless sensor network
    Journal of Computer Applications   2016 Vol.36 (2): 478-482 [Abstract] (500) [HTML 1 KB] [PDF 806 KB] (837)
465 MA Jianhong, ZHANG Mingyue, ZHAO Yanan
  Patent knowledge extraction method for innovation design
    Journal of Computer Applications   2016 Vol.36 (2): 465-471 [Abstract] (524) [HTML 1 KB] [PDF 1005 KB] (907)
455 YU Dong, LIU Chunhua, TIAN Yue
  Personal title and career attributes extraction based on distant supervision and pattern matching
    Journal of Computer Applications   2016 Vol.36 (2): 455-459 [Abstract] (673) [HTML 1 KB] [PDF 1000 KB] (928)
449 SUN Liping, GUO Yi, TANG Wenwu, XU Yongbin
  Enterprise abbreviation prediction based on constitution pattern and conditional random field
    Journal of Computer Applications   2016 Vol.36 (2): 449-454 [Abstract] (864) [HTML 1 KB] [PDF 990 KB] (1050)
444 ZHANG Li, ZHANG Dongming, ZHENG Hong
  Vehicle logo recognition using convolutional neural network combined with multiple layer feature
    Journal of Computer Applications   2016 Vol.36 (2): 444-448 [Abstract] (626) [HTML 1 KB] [PDF 800 KB] (1005)
428 CAI Guoyong, XIA Binbin
  Multimedia sentiment analysis based on convolutional neural network
    Journal of Computer Applications   2016 Vol.36 (2): 428-431 [Abstract] (844) [HTML 1 KB] [PDF 787 KB] (1565)
419 LIANG Junjie, GAN Wenting, YU Dunhui
  Personalized recommendation algorithm based on location bitcode tree
    Journal of Computer Applications   2016 Vol.36 (2): 419-423 [Abstract] (472) [HTML 1 KB] [PDF 915 KB] (868)
408 LIU Panpan, HONG Xudong, GUO Jianyi, YU Zhengtao, WEN Yonghua, CHEN Wei
  Recognition of Chinese news event correlation based on grey relational analysis
    Journal of Computer Applications   2016 Vol.36 (2): 408-413 [Abstract] (470) [HTML 1 KB] [PDF 895 KB] (898)
402 CHI Yaping, WANG Yan, WANG Huili, LI Xin
  Cross-domain access control for e-government cloud based on classification
    Journal of Computer Applications   2016 Vol.36 (2): 402-407 [Abstract] (507) [HTML 1 KB] [PDF 875 KB] (999)
382 XIONG Hao, REN Yanzhen, WANG Lina
  Universal steganalysis scheme of advanced audio coding
    Journal of Computer Applications   2016 Vol.36 (2): 382-386 [Abstract] (657) [HTML 1 KB] [PDF 893 KB] (904)
377 TIAN Shoucai, SUN Xili, LU Yonggang
  Stochastic nonlinear dimensionality reduction based on nearest neighbors
    Journal of Computer Applications   2016 Vol.36 (2): 377-381 [Abstract] (637) [HTML 1 KB] [PDF 781 KB] (950)
372 WU Jieqi, LI Xiaoyu, YUAN Xiaotong, LIU Qingshan
  Parallel sparse subspace clustering via coordinate descent minimization
    Journal of Computer Applications   2016 Vol.36 (2): 372-376 [Abstract] (738) [HTML 1 KB] [PDF 877 KB] (979)
364 LI Yuanhao, LU Ping, WU Yifan, WEI Wei, SONG Guojie
  Mobile social network oriented user feature recognition of age and sex
    Journal of Computer Applications   2016 Vol.36 (2): 364-371 [Abstract] (581) [HTML 1 KB] [PDF 1248 KB] (1067)
358 SONG Baoyan, JI Wanting, DING Linlin
  Similarity nodes query algorithm on large dynamic graph based on the snapshots
    Journal of Computer Applications   2016 Vol.36 (2): 358-363 [Abstract] (819) [HTML 1 KB] [PDF 951 KB] (919)
353 ZHOU Guoliang, SA Churila, ZHU Yongli
  Star join algorithm based on multi-dimensional Bloom filter in Spark
    Journal of Computer Applications   2016 Vol.36 (2): 353-357 [Abstract] (976) [HTML 1 KB] [PDF 765 KB] (901)
348 SA Churila, ZHOU Guoliang, SHI Lei, WANG Liuwang, SHI Xin, ZHU Yongli
  Parallel cube computing in Spark
    Journal of Computer Applications   2016 Vol.36 (2): 348-352 [Abstract] (518) [HTML 1 KB] [PDF 769 KB] (972)
301 ZHAO Hong, GUO Lilu
  Space coordinate transformation algorithm for built-in accelerometer data of smartphone
    Journal of Computer Applications   2016 Vol.36 (2): 301-306 [Abstract] (1857) [HTML 1 KB] [PDF 896 KB] (1594)
287 DING Jiaru, DU Changping, ZHAO Yao, YIN Dengyu
  Path planning algorithm for unmanned aerial vehicles based on improved artificial potential field
    Journal of Computer Applications   2016 Vol.36 (1): 287-290 [Abstract] (975) [HTML 1 KB] [PDF 678 KB] (900)
266 SUN Jiaze, GENG Guohua
  Global optimal matching method for 3D fragments based on swarm intelligence
    Journal of Computer Applications   2016 Vol.36 (1): 266-270 [Abstract] (436) [HTML 1 KB] [PDF 781 KB] (354)
254 LIU Xinrui, REN Fengyu, LEI Guoping
  Research of domain ontology driven enterprise on-line analytical processing systems
    Journal of Computer Applications   2016 Vol.36 (1): 254-259 [Abstract] (462) [HTML 1 KB] [PDF 997 KB] (368)
248 YANG Yipu, YANG Fan, PAN Guofeng, ZHANG Huimin
  River information extraction from high resolution remote sensing image based on homomorphic system filtering
    Journal of Computer Applications   2016 Vol.36 (1): 248-253 [Abstract] (386) [HTML 1 KB] [PDF 1143 KB] (413)
227 WANG Chengxiao, HUANG Huixian, YANG Hui, XU Jianmin
  New improved 1-2-order fractional differential edge detection model based on Riemann-Liouville integral
    Journal of Computer Applications   2016 Vol.36 (1): 227-232 [Abstract] (496) [HTML 1 KB] [PDF 962 KB] (466)
222 DUAN Fengfeng, WANG Yongbin, YANG Lifang, PAN Shujing
  Feature extraction for stereoscopic vision depth map based on principal component analysis and histogram of oriented depth gradient
    Journal of Computer Applications   2016 Vol.36 (1): 222-226 [Abstract] (478) [HTML 1 KB] [PDF 794 KB] (734)
216 LI Chengwen, WANG Xiaoming
  Outsourced data encryption scheme with access privilege revocation
    Journal of Computer Applications   2016 Vol.36 (1): 216-221 [Abstract] (544) [HTML 1 KB] [PDF 958 KB] (359)
212 TANG Shang, LI Yonggui, ZHU Yonggang
  Wireless communication security strategy based on differential flag byte
    Journal of Computer Applications   2016 Vol.36 (1): 212-215 [Abstract] (363) [HTML 1 KB] [PDF 757 KB] (310)
194 WANG Kun, QIU Hui, YANG Haopu
  Network security situation evaluation method based on attack pattern recognition
    Journal of Computer Applications   2016 Vol.36 (1): 194-198 [Abstract] (571) [HTML 1 KB] [PDF 945 KB] (594)
171 WANG Fuqiang, PENG Furong, DING Xiaohuan, LU Jianfeng
  Location-based asymmetric similarity for collaborative filtering recommendation algorithm
    Journal of Computer Applications   2016 Vol.36 (1): 171-174 [Abstract] (539) [HTML 1 KB] [PDF 702 KB] (426)
154 HU Qinghui, WEI Shiwei, XIE Zhongqian, REN Yafeng
  Correlation between phrases in advertisement based on recursive autoencoder
    Journal of Computer Applications   2016 Vol.36 (1): 154-157 [Abstract] (635) [HTML 1 KB] [PDF 737 KB] (406)
143 LI Kangshun, ZUO Lei, LI Wei
  Novel differential evolution algorithm based on simplex-orthogonal experimental design
    Journal of Computer Applications   2016 Vol.36 (1): 143-149 [Abstract] (412) [HTML 1 KB] [PDF 1013 KB] (356)
128 GAO Qingji, LI Yongsheng, LUO Qijun
  Optimization of baggage tag reader layout based on improved particle swarm optimization
    Journal of Computer Applications   2016 Vol.36 (1): 128-132 [Abstract] (420) [HTML 1 KB] [PDF 699 KB] (451)
101 LONG Zhaohua, GONG Tengfei
  Estimation algorithm of radio frequency identification tags based on non-empty slot number
    Journal of Computer Applications   2016 Vol.36 (1): 101-106 [Abstract] (467) [HTML 1 KB] [PDF 874 KB] (355)
87 ZHAO Zhijin, CHEN Jinglai
  Wide-band spectrum sensing algorithm using sparsity estimation based on Gerschgorin theorem
    Journal of Computer Applications   2016 Vol.36 (1): 87-90 [Abstract] (584) [HTML 1 KB] [PDF 706 KB] (443)
21 DING Xinzhe, ZHANG Zhaogong, LI Jianzhong, TAN Long, LIU Yong
  Relational algebraic operation algorithm on compressed data
    Journal of Computer Applications   2016 Vol.36 (1): 21-26 [Abstract] (668) [HTML 1 KB] [PDF 923 KB] (415)
1 WENG Haixing, GONG Xueqing, ZHU Yanchao, HU Hualiang
  Implementation of distributed index in cluster environment
    Journal of Computer Applications   2016 Vol.36 (1): 1-7 [Abstract] (948) [HTML 1 KB] [PDF 1303 KB] (753)
3602 XIE Yu, HU Xintong, MENG Xiyun, LIU Yunjie
  Passenger counting system based on intelligent detection of polyvinylidene fluoride human gait
    Journal of Computer Applications   2015 Vol.35 (12): 3602-3606 [Abstract] (494) [HTML 1 KB] [PDF 741 KB] (312)
3597 WANG Fuqiang, LI Xiaoli, ZHANG Qiusheng, ZHANG Jinying
  Fast calculation method of multivariable control for reheat steam temperature based on Smith control and predictive functional control
    Journal of Computer Applications   2015 Vol.35 (12): 3597-3601 [Abstract] (438) [HTML 1 KB] [PDF 700 KB] (349)
3592 WANG Chong, AN Weiqiang, WANG Hongjuan
  Tunnel intersection modeling based on cylinder-axis aligned bounding box detection
    Journal of Computer Applications   2015 Vol.35 (12): 3592-3596 [Abstract] (529) [HTML 1 KB] [PDF 677 KB] (329)
3586 KONG Yu, WANG Shuying
  Information acquisition solution for automotive after-sales service based on Android platform
    Journal of Computer Applications   2015 Vol.35 (12): 3586-3591 [Abstract] (918) [HTML 1 KB] [PDF 991 KB] (472)
3581 LAO Jiajun, YANG Jiang, ZHU Wuming
  Dynamic obstacle avoidance method of mobile online water quality monitoring platform
    Journal of Computer Applications   2015 Vol.35 (12): 3581-3585 [Abstract] (1057) [HTML 1 KB] [PDF 876 KB] (391)
3550 YU Liyang, FAN Chunxiao, MING Yue
  Improved target tracking algorithm based on kernelized correlation filter
    Journal of Computer Applications   2015 Vol.35 (12): 3550-3554 [Abstract] (1172) [HTML 1 KB] [PDF 798 KB] (938)
3520 WANG Lei, WANG Bidou, LUO Gangyin, NIE Lanshun, ZHAN Dechen, TIAN Haoran
  Application of time-Petri net for process modeling of point-of-care testing
    Journal of Computer Applications   2015 Vol.35 (12): 3520-3523 [Abstract] (540) [HTML 1 KB] [PDF 699 KB] (360)
3515 PAN Xiong, JIANG Wei, WEN Liang, ZHOU Keran, DONG Qi, WANG Junlong
  Energy consumption optimization of stochastic real-time tasks for dependable embedded system
    Journal of Computer Applications   2015 Vol.35 (12): 3515-3519 [Abstract] (577) [HTML 1 KB] [PDF 864 KB] (443)
3502 GUO Qiang, SONG Wenjun, HU Zhaolong, HOU Lei, ZHANG Yilu, CHEN Fangjiao
  Non-equilibrium mass diffusion recommendation algorithm based on popularity
    Journal of Computer Applications   2015 Vol.35 (12): 3502-3505 [Abstract] (496) [HTML 1 KB] [PDF 605 KB] (361)
3487 MA Huifang, SHI Yakai, XIE Meng, ZHUANG Fuzhen
  User influence algorithm based on user content and relational structure
    Journal of Computer Applications   2015 Vol.35 (12): 3487-3490 [Abstract] (493) [HTML 1 KB] [PDF 768 KB] (270)
3481 LIU Li, WANG Yongheng, WEI Hang
  Fine-grained sentiment analysis oriented to product comment
    Journal of Computer Applications   2015 Vol.35 (12): 3481-3486 [Abstract] (892) [HTML 1 KB] [PDF 1058 KB] (847)
3450 ZOU Yu, XUE Xiaoping, ZHANG Fang, PAN Yong, PAN Teng
  Error detection algorithm of program loop control
    Journal of Computer Applications   2015 Vol.35 (12): 3450-3455 [Abstract] (439) [HTML 1 KB] [PDF 945 KB] (332)
3424 XUE Feng, WANG Ding, CAO Pinjun, LI Yong
  Cryptanalysis of two anonymous user authentication schemes for wireless sensor networks
    Journal of Computer Applications   2015 Vol.35 (12): 3424-3428 [Abstract] (534) [HTML 1 KB] [PDF 931 KB] (418)
3419 PAN Lei, LI Tingyuan
  Dynamic information security evaluation model in mobile Ad Hoc network
    Journal of Computer Applications   2015 Vol.35 (12): 3419-3423 [Abstract] (507) [HTML 1 KB] [PDF 726 KB] (306)
3392 GUO Gang, YU Jiong, LU Liang, YING Changtian, YIN Lutong
  Data migration model based on RAMCloud hierarchical storage architecture
    Journal of Computer Applications   2015 Vol.35 (12): 3392-3397 [Abstract] (518) [HTML 1 KB] [PDF 878 KB] (366)
3368 WANG Donghui, HAN Jianmin, ZHUANG Jiaqi
  Efficient memory management algorithm based on segment tree and its space optimization
    Journal of Computer Applications   2015 Vol.35 (12): 3368-3373 [Abstract] (818) [HTML 1 KB] [PDF 951 KB] (502)
3357 ZHOU Yun, LU Xiaxia, YU Xuelian, WANG Xuegang
  Multiple input multiple output radar orthogonal waveform design of joint frequency-phase modulation based on chaos
    Journal of Computer Applications   2015 Vol.35 (12): 3357-3361 [Abstract] (449) [HTML 1 KB] [PDF 655 KB] (344)
3352 WANG Sixiu, GUO Wenqiang, TANG Jianguo, WANG Xiaojie
  Detection method of linear frequency modulated signal based on frequency domain phase variance weighting
    Journal of Computer Applications   2015 Vol.35 (12): 3352-3356 [Abstract] (930) [HTML 1 KB] [PDF 906 KB] (297)
3348 DING Yaojun
  Imbalanced network traffic classification method based on improved forest rotation algorithm
    Journal of Computer Applications   2015 Vol.35 (12): 3348-3351 [Abstract] (650) [HTML 1 KB] [PDF 611 KB] (465)
3316 FU Hui, WU Bin, HAN Dongxuan, HUANG Yangqiang
  Fast visual optimization defogging algorithm based on atmospheric physical model
    Journal of Computer Applications   2015 Vol.35 (11): 3316-3320 [Abstract] (558) [HTML 0 KB] [PDF 840 KB] (561)
3308 ZHAO Wei, TIAN Zheng, YANG Lijuan, YAN Weidong, WEN Jinhuan
  Scale invariant feature transform mismatches removal based on canonical correlation analysis
    Journal of Computer Applications   2015 Vol.35 (11): 3308-3311 [Abstract] (507) [HTML 0 KB] [PDF 654 KB] (640)
3280 FAN Lei, QI Guoqing
  High accuracy frequency estimation algorithm of sinusoidal signals based on fast Fourier transform
    Journal of Computer Applications   2015 Vol.35 (11): 3280-3283 [Abstract] (597) [HTML 0 KB] [PDF 574 KB] (643)
3265 XIE Bin, CHEN Bo, LE Honghao
  Improved linear minimum mean square error channel estimation algorithm based on orthogonal frequency division multiplexing
    Journal of Computer Applications   2015 Vol.35 (11): 3265-3269 [Abstract] (459) [HTML 0 KB] [PDF 768 KB] (442)
3261 CAO Kaitian, CHEN Xiaosi, ZHU Wenjun
  Compressive wideband spectrum blind detection based on high-order statistics
    Journal of Computer Applications   2015 Vol.35 (11): 3261-3264 [Abstract] (557) [HTML 0 KB] [PDF 803 KB] (517)
3252 QIU Wenhao, HUANG Kaoli, JIN Saisai, LIAN Guangyao
  Fault prediction model based on health analysis and harmony search-ant colony algorithm-support vector machine
    Journal of Computer Applications   2015 Vol.35 (11): 3252-3255 [Abstract] (546) [HTML 0 KB] [PDF 730 KB] (497)
3247 YIN Lutong, YU Jiong, LU Liang, YING Changtian, GUO Gang
  Video recommendation algorithm fusing comment analysis and latent factor model
    Journal of Computer Applications   2015 Vol.35 (11): 3247-3251 [Abstract] (491) [HTML 0 KB] [PDF 790 KB] (652)
3227 WANG Shaohua, DI Lan, LIANG Jiuzhen
  Multi-dimensional fuzzy clustering image segmentation algorithm based on kernel metric and local information
    Journal of Computer Applications   2015 Vol.35 (11): 3227-3231 [Abstract] (520) [HTML 0 KB] [PDF 1025 KB] (499)
3222 CHEN Lifang, WANG Yun, ZHANG Feng
  Research and application of dynamic rule extraction algorithm based on rough set and decision tree
    Journal of Computer Applications   2015 Vol.35 (11): 3222-3226 [Abstract] (511) [HTML 0 KB] [PDF 713 KB] (519)
3208 LIN Yidong, ZHANG Yanlan, LIN Menglei
  Rough set based matrix method for dynamic change covering family
    Journal of Computer Applications   2015 Vol.35 (11): 3208-3212 [Abstract] (452) [HTML 0 KB] [PDF 630 KB] (488)
3187 LI Jinjing, CHEN Qingkui, LIU Baoping, LIU Bocheng
  Binary probability segmentation of video based on graphics processing unit
    Journal of Computer Applications   2015 Vol.35 (11): 3187-3193 [Abstract] (474) [HTML 0 KB] [PDF 1079 KB] (511)
3172 ZHANG Dongwen, LIU Chenguang, ZHANG Yang
  Fork/Join-oriented software refactoring and performance analysis
    Journal of Computer Applications   2015 Vol.35 (11): 3172-3177 [Abstract] (396) [HTML 0 KB] [PDF 853 KB] (555)
3151 YUAN Lei, LIANG Dingwen, CAI Zhihua, WU Zhao, GU Qiong
  Short-term traffic flow prediction algorithm based on orthogonal differential evolution unscented Kalman filter
    Journal of Computer Applications   2015 Vol.35 (11): 3151-3156 [Abstract] (486) [HTML 0 KB] [PDF 861 KB] (431)
3139 LI Huiyong, CHEN Yixiang
  Improved heterogereous earliest finish time scheduling algorithm with multi-dimensional quality of service for data stream processing task in Internet of vehicles
    Journal of Computer Applications   2015 Vol.35 (11): 3139-3145 [Abstract] (540) [HTML 0 KB] [PDF 1089 KB] (634)
3112 HUA Qing, XU Guoyan, ZHANG Ye
  Improved Kalman algorithm for abnormal data detection based on multidimensional impact factors
    Journal of Computer Applications   2015 Vol.35 (11): 3112-3115 [Abstract] (539) [HTML 0 KB] [PDF 705 KB] (601)
3106 MAO Yingchi, JIE Qing, CHEN Hao
  Online abnormal event detection with spatio-temporal relationship in river networks
    Journal of Computer Applications   2015 Vol.35 (11): 3106-3111 [Abstract] (524) [HTML 0 KB] [PDF 1073 KB] (510)
3083 YIN Yi, WANG Yun
  Analysis method of inclusion relations between firewall rules
    Journal of Computer Applications   2015 Vol.35 (11): 3083-3086 [Abstract] (518) [HTML 0 KB] [PDF 747 KB] (593)
3063 ZHANG Qian, CHEN Chaogen, LIANG Hong
  Private cloud platform design based on virtualization technology
    Journal of Computer Applications   2015 Vol.35 (11): 3063-3069 [Abstract] (675) [HTML 0 KB] [PDF 1140 KB] (823)
3055 NAN Yang, CHEN Lin
  Performance evaluation method based on objective weight determination for data center network
    Journal of Computer Applications   2015 Vol.35 (11): 3055-3058 [Abstract] (527) [HTML 1 KB] [PDF 764 KB] (743)
3026 MA Haifeng, YI Hebali, WANG Ye, YANG Jiahai, ZHANG Chao
  Cloud migration performance of tsinghua cloud monitoring platform
    Journal of Computer Applications   2015 Vol.35 (11): 3026-3030 [Abstract] (594) [HTML 1 KB] [PDF 919 KB] (719)
3021 DANG Xiaochao, YANG Dongdong, HAO Zhanjun
  Three-dimensional coverage algorithm based on virtual force in sensor network
    Journal of Computer Applications   2015 Vol.35 (11): 3021-3025 [Abstract] (534) [HTML 1 KB] [PDF 727 KB] (825)
3013 ZENG Wenhua
  3D geoinformation network sharing based on decomposition and combination method
    Journal of Computer Applications   2015 Vol.35 (10): 3013-3016 [Abstract] (419) [HTML 1 KB] [PDF 666 KB] (498)
3008 XU Yuanchao, SUN Fengyun, YAN Junfeng, WAN Hu
  Directory-adaptive journaling mode selective mechanism for Android systems
    Journal of Computer Applications   2015 Vol.35 (10): 3008-3012 [Abstract] (487) [HTML 1 KB] [PDF 798 KB] (474)
2980 LI Xinye, SUN Zhihua, CHEN Mingyu
  Fast algorithm for object tracking based on binary feature and structured output support vector machine
    Journal of Computer Applications   2015 Vol.35 (10): 2980-2984 [Abstract] (478) [HTML 1 KB] [PDF 732 KB] (483)
2963 WANG Bing, MAO Qian, SU Dongqi
  Image authentication agorithm based on two-dimensional histogram shifting
    Journal of Computer Applications   2015 Vol.35 (10): 2963-2968 [Abstract] (455) [HTML 1 KB] [PDF 856 KB] (475)
2905 LI Chaoxiong, HUANG Faliang, WEN Xiaoqian, LI Xuan, YUAN Chang'an
  Evolution analysis method of microblog topic-sentiment based on dynamic topic sentiment combining model
    Journal of Computer Applications   2015 Vol.35 (10): 2905-2910 [Abstract] (501) [HTML 1 KB] [PDF 921 KB] (538)
2901 WANG Jingzhong, QIU Tongxiang
  Focused topic Web crawler based on improved TF-IDF alogorithm
    Journal of Computer Applications   2015 Vol.35 (10): 2901-2904 [Abstract] (537) [HTML 1 KB] [PDF 797 KB] (565)
2896 DONG Qihai, WANG Yagang
  Partition-based binary file similarity comparison method
    Journal of Computer Applications   2015 Vol.35 (10): 2896-2900 [Abstract] (408) [HTML 1 KB] [PDF 983 KB] (511)
2883 YAO Wei, WANG Juan, ZHANG Shengli
  Intrusion detection model based on decision tree and Naive-Bayes classification
    Journal of Computer Applications   2015 Vol.35 (10): 2883-2885 [Abstract] (470) [HTML 1 KB] [PDF 465 KB] (641)
2867 WANG Qian, ZHENG Dong, REN Fang
  Code-based blind signature scheme
    Journal of Computer Applications   2015 Vol.35 (10): 2867-2871 [Abstract] (364) [HTML 1 KB] [PDF 746 KB] (358)
2858 SUN Li, SONG Xizhong
  Multi-slot allocation data transmission algorithm based on dynamic tree topology for wireless sensor network
    Journal of Computer Applications   2015 Vol.35 (10): 2858-2862 [Abstract] (417) [HTML 1 KB] [PDF 765 KB] (1033)
2838 MO Yiwen, JI Donghong, HUANG Jiangping
  Slight-pause marks boundary identification based on conditional random field
    Journal of Computer Applications   2015 Vol.35 (10): 2838-2842 [Abstract] (484) [HTML 1 KB] [PDF 786 KB] (435)
2833 WANG Xiuqing, HOU Zengguang, PAN Shiying, TAN Min, WANG Yongji, ZENG Hui
  Corridor scene recognition for mobile robots based on multi-sonar-sensor information and NeuCube
    Journal of Computer Applications   2015 Vol.35 (10): 2833-2837 [Abstract] (516) [HTML 1 KB] [PDF 769 KB] (464)
2824 SHI Jiarong, ZHENG Xiuyun, YANG Wei
  Regularized approach for incomplete robust principal component analysis and its applications in background modeling
    Journal of Computer Applications   2015 Vol.35 (10): 2824-2827 [Abstract] (654) [HTML 1 KB] [PDF 782 KB] (483)
2813 LU Huiling, ZHOU Tao, WANG Huiqun, WANG Wenwen
  Prostate tumor CAD model based on neural network with feature-level fusion in magnetic resonance imaging
    Journal of Computer Applications   2015 Vol.35 (10): 2813-2818 [Abstract] (417) [HTML 1 KB] [PDF 894 KB] (7654)
2808 XU Wenxuan, ZHANG Li
  Human promoter recognition based on single nucleotide statistics and support vector machine ensemble
    Journal of Computer Applications   2015 Vol.35 (10): 2808-2812 [Abstract] (484) [HTML 1 KB] [PDF 756 KB] (422)
2798 HUANG Xiaojuan, ZHANG Li
  Modified multi-class support vector machine recursive feature elimination for cancer multi-classification
    Journal of Computer Applications   2015 Vol.35 (10): 2798-2802 [Abstract] (712) [HTML 1 KB] [PDF 716 KB] (865)
2781 ZHENG Fengfei, HUANG Wenpei, JIA Mingzheng
  Matrix factorization recommendation algorithm based on Spark
    Journal of Computer Applications   2015 Vol.35 (10): 2781-2783 [Abstract] (721) [HTML 1 KB] [PDF 570 KB] (586)
2771 HUANG Guoshun, WEN Han
  Conditional information entropy and attribute reduction based on boundary region
    Journal of Computer Applications   2015 Vol.35 (10): 2771-2776 [Abstract] (398) [HTML 1 KB] [PDF 830 KB] (480)
2761 TAN Hefeng, LIU Zhengyi
  Multi-label K nearest neighbor algorithm by exploiting label correlation
    Journal of Computer Applications   2015 Vol.35 (10): 2761-2765 [Abstract] (571) [HTML 1 KB] [PDF 656 KB] (664)
2752 WU Jinhua, ZUO Kaizhong, JIE Biao, DING Xintao
  New discriminative feature selection method
    Journal of Computer Applications   2015 Vol.35 (10): 2752-2756 [Abstract] (474) [HTML 1 KB] [PDF 666 KB] (469)
2747 LIN Jianghao, ZHOU Yongmei, YANG Aimin, CHEN Yuhong, CHEN Xiaofan
  Analysis of public emotion evolution based on probabilistic latent semantic analysis
    Journal of Computer Applications   2015 Vol.35 (10): 2747-2751 [Abstract] (406) [HTML 1 KB] [PDF 900 KB] (575)
2721 SHI Shaoliang, WEN Yimin, MIAO Yuqing
  Simple multi-label ranking for Chinese microblog sentiment classification
    Journal of Computer Applications   2015 Vol.35 (10): 2721-2726 [Abstract] (924) [HTML 1 KB] [PDF 1000 KB] (714)
2710 LI Jingzhe, LI Taifu, GU Xiaohua, QIU Kui
  Anomaly detection and diagnosis of high sulfur natural gas purification process based on dynamic kernel independent component analysis
    Journal of Computer Applications   2015 Vol.35 (9): 2710-2714 [Abstract] (521) [HTML 1 KB] [PDF 739 KB] (471)
2701 HAN Min, SUN Zhuoran
  Epileptic EEG signals classification based on wavelet transform and AdaBoost extreme learning machine
    Journal of Computer Applications   2015 Vol.35 (9): 2701-2705 [Abstract] (486) [HTML 1 KB] [PDF 934 KB] (511)
2673 ZHOU Jingxian, HU Zhihua
  Scheduling optimization for cross-over twin automated stacking cranes in automated container terminal
    Journal of Computer Applications   2015 Vol.35 (9): 2673-2677 [Abstract] (587) [HTML 1 KB] [PDF 743 KB] (369)
2652 LIU Yu, CAO Guo, ZHOU Licun, QU Baozhu
  Building-damage detection based on combination of multi-features
    Journal of Computer Applications   2015 Vol.35 (9): 2652-2655 [Abstract] (516) [HTML 1 KB] [PDF 828 KB] (327)
2640 CHEN Xianyi, ZHAO Liping, CHEN Zhizhong, LIN Tao
  2D intra string copy for screen content coding
    Journal of Computer Applications   2015 Vol.35 (9): 2640-2647 [Abstract] (414) [HTML 1 KB] [PDF 1264 KB] (320)
2624 ZHENG Bin, NIU Yuzhen, KE Lingling
  New multi-object image dataset construction and evaluation of visual saliency analysis algorithm
    Journal of Computer Applications   2015 Vol.35 (9): 2624-2628 [Abstract] (516) [HTML 1 KB] [PDF 966 KB] (324)
2619 CHEN Binbin, DENG Xinpu, YANG Jungang
  Orientation-invariant generalized Hough transform algorithm based on U-chord curvature
    Journal of Computer Applications   2015 Vol.35 (9): 2619-2623 [Abstract] (466) [HTML 1 KB] [PDF 704 KB] (315)
2616 YANG Huiling, LIU Hongyan, LI Yan, SUN Huiting
  Fast removal algorithm for trailing smear effect in CCD drift-scan star image
    Journal of Computer Applications   2015 Vol.35 (9): 2616-2618 [Abstract] (598) [HTML 1 KB] [PDF 491 KB] (475)
2611 GUO Hongshuai, SUN Dianzhu, LI Yanrui, LI Cong
  Dynamic spatial index of mesh surface for supporting STL data source
    Journal of Computer Applications   2015 Vol.35 (9): 2611-2615 [Abstract] (484) [HTML 1 KB] [PDF 743 KB] (366)
2606 XU Youcai, WAN Zhou
  Bearing fault diagnosis method based on conditional local mean decomposition and variable predictive model
    Journal of Computer Applications   2015 Vol.35 (9): 2606-2610 [Abstract] (445) [HTML 1 KB] [PDF 708 KB] (393)
2590 LONG Wen, ZHAO Dongquan, XU Songjin
  Improved grey wolf optimization algorithm for constrained optimization problem
    Journal of Computer Applications   2015 Vol.35 (9): 2590-2595 [Abstract] (2287) [HTML 1 KB] [PDF 842 KB] (1138)
2584 TAN Yang, NING Ke, CHEN Lin
  Chromosomal translocation-based Dynamic evolutionary algorithm
    Journal of Computer Applications   2015 Vol.35 (9): 2584-2589 [Abstract] (469) [HTML 1 KB] [PDF 863 KB] (391)
2569 ZHENG Xiangyun, CHEN Zhigang, HUANG Rui, LI Bo
  Personalized book recommendation algorithm based on topic model
    Journal of Computer Applications   2015 Vol.35 (9): 2569-2573 [Abstract] (619) [HTML 1 KB] [PDF 762 KB] (18412)
2560 CHEN Yongheng, ZUO Wanli, LIN Yaojing
  Sentiment-aspect analysis method based on seed words
    Journal of Computer Applications   2015 Vol.35 (9): 2560-2564 [Abstract] (566) [HTML 1 KB] [PDF 884 KB] (409)
2546 FU Rong
  Practical power analysis of smart card implementation of block cipher
    Journal of Computer Applications   2015 Vol.35 (9): 2546-2552 [Abstract] (576) [HTML 1 KB] [PDF 1064 KB] (11906)
2508 CHEN Peng, MENG Chen, WANG Cheng, CHEN Hua
  Simultaneous iterative hard thresholding for joint sparse recovery based on redundant dictionaries
    Journal of Computer Applications   2015 Vol.35 (9): 2508-2512 [Abstract] (513) [HTML 1 KB] [PDF 756 KB] (315)
2497 SHAO Tian, CHEN Guangsheng, JING Weipeng
  Cut-GAR: solution to determine cut-off point in cloud storage system
    Journal of Computer Applications   2015 Vol.35 (9): 2497-2502 [Abstract] (570) [HTML 1 KB] [PDF 864 KB] (318)
2492 XIA Hao, LI Liuliu
  Internal model control based automatic tuning method for PID controller
    Journal of Computer Applications   2015 Vol.35 (9): 2492-2496 [Abstract] (817) [HTML 1 KB] [PDF 699 KB] (350)
2465 LI Yinuo, XIAO Ruliang, NI Youcong, SU Xiaomin, DU Xin, CAI Shengzhen
  Indoor positioning algorithm with dynamic environment attenuation based on particle filtering
    Journal of Computer Applications   2015 Vol.35 (9): 2465-2469 [Abstract] (722) [HTML 1 KB] [PDF 796 KB] (372)
2461 XIE Bin, LE Honghao, CHEN Bo
  Channel estimation algorithm for orthogonal frequency division multiplexing based on wavelet de-noising and discrete cosine transform
    Journal of Computer Applications   2015 Vol.35 (9): 2461-2464 [Abstract] (488) [HTML 1 KB] [PDF 757 KB] (445)
2453 SHI Lixing, HU Fangyu
  Users' mobility analysis based on call detail record in two-dimensional space
    Journal of Computer Applications   2015 Vol.35 (9): 2453-2456 [Abstract] (721) [HTML 1 KB] [PDF 752 KB] (351)
2424 ZHANG Qingfeng, WANG Sheng, LIAO Dan
  Nash bargaining based resource allocation in peer-to-peer network
    Journal of Computer Applications   2015 Vol.35 (9): 2424-2429 [Abstract] (511) [HTML 1 KB] [PDF 994 KB] (407)
2397 LI Feng, GAO Feng, KOU Peng
  Integrating piecewise linear representation and Gaussian process classification for stock turning points prediction
    Journal of Computer Applications   2015 Vol.35 (8): 2397-2403 [Abstract] (923) [HTML 1 KB] [PDF 1083 KB] (714)
2386 ZENG Xiangfei, GUO Fan, TU Fengtao
  Object-based dynamic taint analysis for J2EE program
    Journal of Computer Applications   2015 Vol.35 (8): 2386-2391 [Abstract] (773) [HTML 1 KB] [PDF 937 KB] (526)
2371 HUANG Shengbing, ZHENG Qilong, GUO Lianwei
  SIMD compiler optimization by selecting single or double word mode for clustered VLIW DSP
    Journal of Computer Applications   2015 Vol.35 (8): 2371-2374 [Abstract] (671) [HTML 1 KB] [PDF 606 KB] (387)
2350 PENG Xindong, YANG Yong
  Information measures for interval-valued fuzzy soft sets and their clustering algorithm
    Journal of Computer Applications   2015 Vol.35 (8): 2350-2354 [Abstract] (730) [HTML 1 KB] [PDF 793 KB] (431)
2345 WAN Jing, LIU Fang
  Membership of mixed dependency set in strong partial ordered temporal scheme
    Journal of Computer Applications   2015 Vol.35 (8): 2345-2349 [Abstract] (503) [HTML 1 KB] [PDF 919 KB] (366)
2341 MA Jinlong, ZENG Qingning, HU Dan, LONG Chao, XIE Xianming
  Speech enhancement algorithm based on microphone array under multiple noise environments
    Journal of Computer Applications   2015 Vol.35 (8): 2341-2344 [Abstract] (481) [HTML 1 KB] [PDF 591 KB] (476)
2336 JIN Liyan, CHEN Li, FAN Taiting, GAO Jing
  Speech denoising algorithm based on singular spectrum analysis and Wiener filtering
    Journal of Computer Applications   2015 Vol.35 (8): 2336-2340 [Abstract] (674) [HTML 1 KB] [PDF 727 KB] (608)
2316 CHEN Pengzhan, LI Jie, LUO Man
  Study of human motion tracking system based on wireless sensor network
    Journal of Computer Applications   2015 Vol.35 (8): 2316-2320 [Abstract] (443) [HTML 1 KB] [PDF 942 KB] (382)
2301 WANG Xiaoyuan, ZHANG Hongying, WU Yadong, LIU Yan
  Low-illumination image enhancement based on physical model
    Journal of Computer Applications   2015 Vol.35 (8): 2301-2304 [Abstract] (683) [HTML 1 KB] [PDF 825 KB] (713)
2285 ZHANG Heng, LIU Dayong, LIU Yanli, NIE Chenxi
  Improved binary robust invariant scalable keypoints algorithm fusing depth information
    Journal of Computer Applications   2015 Vol.35 (8): 2285-2290 [Abstract] (603) [HTML 1 KB] [PDF 1012 KB] (543)
2280 LYU Ruimin, CHEN Wei, MENG Lei, CHEN Lifang, WU Haotian, LI Jingyuan
  Fourier representation, rendering techniques and applications of periodic dynamic images
    Journal of Computer Applications   2015 Vol.35 (8): 2280-2284 [Abstract] (480) [HTML 1 KB] [PDF 896 KB] (368)
2274 LIN Zecheng, ZHU Jianqing, LIAO Shengcai, LI Stan Z.
  Uniform SILTP based background modeling and its implementation on Intel HD graphics
    Journal of Computer Applications   2015 Vol.35 (8): 2274-2279 [Abstract] (680) [HTML 1 KB] [PDF 934 KB] (405)
2266 ZHAO Xiaole, WU Yadong, ZHANG Hongying, ZHAO Jing
  Polynomial interpolation algorithm framework based on osculating polynomial approximation
    Journal of Computer Applications   2015 Vol.35 (8): 2266-2273 [Abstract] (557) [HTML 1 KB] [PDF 1379 KB] (374)
2249 QIAN Shuqu, WU Huihong, XU Guofeng
  Constrained multiobjective optimization algorithm based on repairing strategy for solving dynamic environment/economic dispatch
    Journal of Computer Applications   2015 Vol.35 (8): 2249-2255 [Abstract] (760) [HTML 1 KB] [PDF 967 KB] (348)
2227 LI Ruiguo, ZHANG Hongli, WANG Ya
  New orthogonal basis neural network based on quantum particle swarm optimization algorithm for fractional order chaotic time series single-step prediction
    Journal of Computer Applications   2015 Vol.35 (8): 2227-2232 [Abstract] (513) [HTML 1 KB] [PDF 975 KB] (18291)
2174 LU Jingqiao, FU Xiufen
  Cascading failure model based on community theory in complex network
    Journal of Computer Applications   2015 Vol.35 (8): 2174-2177 [Abstract] (437) [HTML 1 KB] [PDF 616 KB] (499)
2164 WEN Zhicheng, CAO Chunli, ZHOU Hao
  Network security situation assessment method based on Naive Bayes classifier
    Journal of Computer Applications   2015 Vol.35 (8): 2164-2168 [Abstract] (563) [HTML 1 KB] [PDF 778 KB] (546)
2137 GAO Wenyu, LI Hua
  Approximation algorithm of cluster vertex deletion
    Journal of Computer Applications   2015 Vol.35 (8): 2137-2139 [Abstract] (382) [HTML 1 KB] [PDF 562 KB] (452)
2129 ZHANG Guangyu, CHEN Hong, CAI Xiaoxia
  Blind source separation method for mixed digital modulation signals based on RobustICA
    Journal of Computer Applications   2015 Vol.35 (8): 2129-2132 [Abstract] (602) [HTML 1 KB] [PDF 597 KB] (393)
2105 YAN Dong, ZHANG Zhaoxia, ZHAO Yan, WANG Juanfen, YANG Lingzhen, SHI Junpeng
  Cognitive radar waveform design for extended target detection based on signal-to-clutter-and-noise ratio
    Journal of Computer Applications   2015 Vol.35 (7): 2105-2108 [Abstract] (587) [HTML 1 KB] [PDF 703 KB] (599)
2093 QIU Jigang, LI Wenlong, YANG Jia
  Path optimization algorithm for team navigation based on multiple point collaboration
    Journal of Computer Applications   2015 Vol.35 (7): 2093-2095 [Abstract] (566) [HTML 1 KB] [PDF 608 KB] (516)
2088 SONG Xiaoxiao, WANG Jun
  Improved artificial bee colony algorithm based on P system for 0-1 knapsack problem
    Journal of Computer Applications   2015 Vol.35 (7): 2088-2092 [Abstract] (606) [HTML 1 KB] [PDF 726 KB] (574)
2077 YAO Hongliang, LI Daguang, LI Junzhao
  Stock market volatility forecast based on calculation of characteristic hysteresis
    Journal of Computer Applications   2015 Vol.35 (7): 2077-2082 [Abstract] (447) [HTML 1 KB] [PDF 869 KB] (546)
2056 XIE Pei, WU Xiaojun
  Face recognition algorithm of collaborative representation based on Shearlet transform and uniform local binary pattern
    Journal of Computer Applications   2015 Vol.35 (7): 2056-2061 [Abstract] (358) [HTML 1 KB] [PDF 1149 KB] (634)
2051 FEI Bowen, LIU Wanjun, SHAO Liangshan, LIU Daqian, SUN Hu
  Face recognition algorithm based on cluster-sparse of active appearance model
    Journal of Computer Applications   2015 Vol.35 (7): 2051-2055 [Abstract] (610) [HTML 1 KB] [PDF 864 KB] (517)
2033 YANG Dayong, YANG Jianhua, LU Wei
  Foreground detection algorithm based on dynamic threshold kernel density estimation
    Journal of Computer Applications   2015 Vol.35 (7): 2033-2038 [Abstract] (599) [HTML 1 KB] [PDF 971 KB] (527)
1999 WANG Jinshui, XUE Xingsi, WENG Wei
  Source code summarization technology based on syntactic analysis
    Journal of Computer Applications   2015 Vol.35 (7): 1999-2003 [Abstract] (506) [HTML 1 KB] [PDF 792 KB] (639)
1975 XU Hao, CHEN Xue, HU Xiaofeng
  Finding method of users' real-time demands for literature search systems
    Journal of Computer Applications   2015 Vol.35 (7): 1975-1978 [Abstract] (384) [HTML 1 KB] [PDF 827 KB] (433)
1969 XU Xiangping, LU Haiyan, CHENG Biyun
  Improved artificial bee colony algorithm based on dynamic evaluation selection strategy
    Journal of Computer Applications   2015 Vol.35 (7): 1969-1974 [Abstract] (421) [HTML 1 KB] [PDF 831 KB] (494)
1945 ZHOU Xiang, LI Shaobo, YANG Guanci
  Entity recognition of clothing commodity attributes
    Journal of Computer Applications   2015 Vol.35 (7): 1945-1949 [Abstract] (879) [HTML 1 KB] [PDF 769 KB] (749)
1933 ZHANG Xin, HU Xintao, GUO Lei
  Characterization of motor-related task brain states based on dynamic functional connectivity
    Journal of Computer Applications   2015 Vol.35 (7): 1933-1938 [Abstract] (1092) [HTML 1 KB] [PDF 1042 KB] (907)
1915 HAO Yanbin, GUO Xiao, YANG Naiding
  Computing method of attribute granule structure of information system based on incremental computation
    Journal of Computer Applications   2015 Vol.35 (7): 1915-1920 [Abstract] (397) [HTML 1 KB] [PDF 924 KB] (469)
1908 CHEN Wenxin, SHAO Liping, SHI Jun
  Iterative adaptive reversible image watermarking algorithm combined with mean-adjustable integer transform
    Journal of Computer Applications   2015 Vol.35 (7): 1908-1914 [Abstract] (507) [HTML 1 KB] [PDF 1400 KB] (550)
1897 DU Ming, HAO Guosheng
  DR-PRO: cloud-storage privilege revoking optimization mechanism based on dynamic re-encryption
    Journal of Computer Applications   2015 Vol.35 (7): 1897-1902 [Abstract] (447) [HTML 1 KB] [PDF 880 KB] (544)
1854 HE Tingting, PENG Yuanxi, LEI Yuanwu
  Floating point divider design of high-performance double precision based on Goldschmidt's algorithm
    Journal of Computer Applications   2015 Vol.35 (7): 1854-1857 [Abstract] (955) [HTML 1 KB] [PDF 740 KB] (747)
1849 LI Zhenju, LI Xuejun, XIE Jianwei, LI Yannan
  Massive terrain data storage based on HBase
    Journal of Computer Applications   2015 Vol.35 (7): 1849-1853 [Abstract] (567) [HTML 1 KB] [PDF 807 KB] (712)
1824 CHEN Xiaolong, MA Lei, ZHANG Wenxu
  Quantized distributed Kalman filtering based on dynamic weighting
    Journal of Computer Applications   2015 Vol.35 (7): 1824-1828 [Abstract] (755) [HTML 1 KB] [PDF 766 KB] (642)
1780 PANG Yongchun, SUN Ziwen, WANG Yao
  Authentication algorithm of multi-touch based on mobile touch sensor
    Journal of Computer Applications   2015 Vol.35 (6): 1780-1784 [Abstract] (660) [HTML 1 KB] [PDF 675 KB] (529)
1749 SHEN Hui, YUAN Xiaotong, LIU Qingshan
  Fast super-resolution reconstruction for single image based on predictive sparse coding
    Journal of Computer Applications   2015 Vol.35 (6): 1749-1752 [Abstract] (680) [HTML 1 KB] [PDF 648 KB] (561)
1734 ZHOU Zhenzhen, SUN Fengrong, SONG Shangling, WANG Lixin, LUAN Yuhuan, YAO Guihua
  Spatial-temporal filtering for coronary angiography image sequence
    Journal of Computer Applications   2015 Vol.35 (6): 1734-1738 [Abstract] (629) [HTML 1 KB] [PDF 784 KB] (440)
1710 ZHANG Zheng, XIE Zhengguang, YANG Sanjia, JIANG Xinling
  Expectation-maximization Bernoulli-asymmetric-Gaussian approximate message passing algorithm based on compressed sensing
    Journal of Computer Applications   2015 Vol.35 (6): 1710-1715 [Abstract] (605) [HTML 1 KB] [PDF 932 KB] (591)
1705 SHEN Xueli, SHEN Jie
  Optimization method of tracing distributed denial of service attacks based on autonomous system and dynamic probabilistic packet-marking
    Journal of Computer Applications   2015 Vol.35 (6): 1705-1709 [Abstract] (528) [HTML 1 KB] [PDF 752 KB] (575)
1678 HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen
  Identity-based proxy re-signature scheme without bilinear pairing
    Journal of Computer Applications   2015 Vol.35 (6): 1678-1682 [Abstract] (516) [HTML 1 KB] [PDF 761 KB] (459)
1673 WANG Guangsai, ZENG Guang, HAN Wenbao, LI Yongguang
  Fast greatest common divisor algorithm based on k-ary reduction
    Journal of Computer Applications   2015 Vol.35 (6): 1673-1677 [Abstract] (484) [HTML 1 KB] [PDF 874 KB] (438)
1617 WU Dinghui, KONG Fei, TIAN Na, JI Zhicheng
  Teaching and peer-learning particle swarm optimization for multi-objective flexible job-shop scheduling problem
    Journal of Computer Applications   2015 Vol.35 (6): 1617-1622 [Abstract] (583) [HTML 1 KB] [PDF 1018 KB] (533)
1611 XIU Yu, WANG Jun, WANG Zhongqun, LIU Sanmin
  Graph transduction via alternating minimization method based on multi-graph
    Journal of Computer Applications   2015 Vol.35 (6): 1611-1616 [Abstract] (821) [HTML 1 KB] [PDF 929 KB] (501)
1595 XU Haofeng, LING Qing
  Decentralized online alternating direction method of multipliers
    Journal of Computer Applications   2015 Vol.35 (6): 1595-1599 [Abstract] (806) [HTML 1 KB] [PDF 826 KB] (655)
1531 HUANG Yanyan, PENG Hua
  Joint blind estimation of multiple frequency offsets and multiple channels for distributed MIMO-OFDM systems
    Journal of Computer Applications   2015 Vol.35 (6): 1531-1536 [Abstract] (525) [HTML 1 KB] [PDF 851 KB] (540)
1499 JIN Shan, JIN Zhigang
  Reasoning and forecasting of regional fire data based on adaptive fuzzy generalized regression neural network
    Journal of Computer Applications   2015 Vol.35 (5): 1499-1504 [Abstract] (636) [HTML 1 KB] [PDF 830 KB] (637)
1479 PU Song, LYU Hongxia
  Dynamic evaluation for train line planning in high speedrailway based on improved data envelopment analysis
    Journal of Computer Applications   2015 Vol.35 (5): 1479-1482 [Abstract] (542) [HTML 1 KB] [PDF 722 KB] (637)
1474 ZHANG Wen, WANG Wenwei
  Face recognition based on local binary pattern and deep learning
    Journal of Computer Applications   2015 Vol.35 (5): 1474-1478 [Abstract] (1198) [HTML 1 KB] [PDF 765 KB] (1578)
1471 ZHANG Zongnian, LIN Shengxin, MAO Huanzhang, HUANG Rentai
  Cosparsity analysis subspace pursuit algorithm
    Journal of Computer Applications   2015 Vol.35 (5): 1471-1473 [Abstract] (577) [HTML 1 KB] [PDF 595 KB] (776)
1467 ZHOU Zhiping, MIAO Minmin
  Dynamic time warping gesture authentication algorithm based on improved Mahalanobis distance
    Journal of Computer Applications   2015 Vol.35 (5): 1467-1470 [Abstract] (706) [HTML 1 KB] [PDF 582 KB] (870)
1462 JIANG Wei, LYU Xiaoqi, REN Xiaoying, REN Guoyin
  3D segmentation method combining region growing and graph cut for coronary arteries computed tomography angiography images
    Journal of Computer Applications   2015 Vol.35 (5): 1462-1466 [Abstract] (775) [HTML 1 KB] [PDF 814 KB] (814)
1459 SONG Yuan, LIANG Xuechun, ZHANG Ran
  Feature selection based on statistical random forest algorithm
    Journal of Computer Applications   2015 Vol.35 (5): 1459-1461 [Abstract] (1367) [HTML 1 KB] [PDF 569 KB] (1061)
1449 LIU Ting, PAN Guangzhen, YANG Jian, ZHANG Caihong
  Improved Stoilov algorithm based on short distance priority and weighted mean
    Journal of Computer Applications   2015 Vol.35 (5): 1449-1453 [Abstract] (607) [HTML 1 KB] [PDF 807 KB] (631)
1444 ZHANG Jun, WANG Zhizhou, YANG Zhengling
  Correction of single circular fisheye image
    Journal of Computer Applications   2015 Vol.35 (5): 1444-1448 [Abstract] (1085) [HTML 1 KB] [PDF 782 KB] (960)
1406 ZHAN Huo, LIN Yaping, ZHANG Jiliang, TANG Bing
  Reliability and randomness enhancing techniques for physical unclonable functions
    Journal of Computer Applications   2015 Vol.35 (5): 1406-1411 [Abstract] (749) [HTML 1 KB] [PDF 927 KB] (792)
1399 YUAN Simin, MA Chuangui, XIANG Shengqi
  Identity-based group key exchange protocol for unbalanced network environment
    Journal of Computer Applications   2015 Vol.35 (5): 1399-1405 [Abstract] (434) [HTML 1 KB] [PDF 1048 KB] (635)
1385 LIU Dan, SHI Runhua, ZHONG Hong, ZHANG Shun, CUI Jie, XU Yan
  Conditional privacy-preserving authentication scheme for vehicular Ad Hoc network
    Journal of Computer Applications   2015 Vol.35 (5): 1385-1392 [Abstract] (550) [HTML 1 KB] [PDF 1336 KB] (748)
1361 YOU Ziyi, CHEN Shiguo, WANG Yi
  Intelligent control based on ε-support vector regression theory for regional traffic signal system
    Journal of Computer Applications   2015 Vol.35 (5): 1361-1366 [Abstract] (466) [HTML 1 KB] [PDF 901 KB] (664)
1353 ZHOU Deyun, ZHANG Hao, ZHANG Kun, ZHANG Kai, PAN Qian
  Range-parameterized square root cubature Kalman filter using hybrid coordinates for bearings-only target tracking
    Journal of Computer Applications   2015 Vol.35 (5): 1353-1357 [Abstract] (588) [HTML 1 KB] [PDF 535 KB] (590)
1333 WANG Shenwen, ZHANG Wensheng, QIN Jin, XIE Chengwang, GUO Zhaolu
  Naïve differential evolution algorithm
    Journal of Computer Applications   2015 Vol.35 (5): 1333-1335 [Abstract] (657) [HTML 1 KB] [PDF 434 KB] (777)
1320 FEI Shaodong, YANG Yuzhen, LIU Peiyu, WANG Jian
  Method of bursty events detection based on sentiment filter
    Journal of Computer Applications   2015 Vol.35 (5): 1320-1323 [Abstract] (537) [HTML 1 KB] [PDF 624 KB] (701)
1314 WANG Rongbo, LI Jie, HUANG Xiaoxi, ZHOU Changle, CHEN Zhiqun, WANG Xiaohua
  Automatic Chinese sentences group method based on multiple discriminant analysis
    Journal of Computer Applications   2015 Vol.35 (5): 1314-1319 [Abstract] (483) [HTML 1 KB] [PDF 995 KB] (758)
1310 HU Yang, DAI Dan, LIU Li, FENG Xupeng, LIU Lijun, HUANG Qingsong
  Classification method of text sentiment based on emotion role model
    Journal of Computer Applications   2015 Vol.35 (5): 1310-1313 [Abstract] (540) [HTML 1 KB] [PDF 780 KB] (837)
1302 YAN Hongwen, ZHOU Yamei, PAN Chu
  Novel K-medoids clustering algorithm based on breadth-first search
    Journal of Computer Applications   2015 Vol.35 (5): 1302-1305 [Abstract] (610) [HTML 1 KB] [PDF 626 KB] (708)
1284 YU Hongyan, CEN Kailun, YANG Tengxiao
  Design and implementation of abnormal behavior detection system in cloud computing
    Journal of Computer Applications   2015 Vol.35 (5): 1284-1289 [Abstract] (598) [HTML 1 KB] [PDF 997 KB] (852)
1273 LIU Yong, ZHANG Jinlong, ZHANG Yanbo, WANG Tao
  Improved weighted centroid localization algorithm in narrow space
    Journal of Computer Applications   2015 Vol.35 (5): 1273-1275 [Abstract] (580) [HTML 1 KB] [PDF 627 KB] (691)
1242 ZENG Zhendong, CHEN Xiao, SUN bo, WU Shuxin
  Sensor network queue management algorithm based on duty cycle control and delay guarantee
    Journal of Computer Applications   2015 Vol.35 (5): 1242-1245 [Abstract] (431) [HTML 1 KB] [PDF 775 KB] (560)
1196 ZHANG Youliang, ZHANG Hongjun, ZHANG Rui, YANG Bojiang, ZENG Zilin, GUO Lisheng
  Ranking of military training performances based on data envelopment analysis of common weights
    Journal of Computer Applications   2015 Vol.35 (4): 1196-1199 [Abstract] (785) [HTML 1 KB] [PDF 521 KB] (659)
1174 SHEN Feng, LI Weidong
  GPS signal tracking algorithm based on carrier frequency assist phase
    Journal of Computer Applications   2015 Vol.35 (4): 1174-1178 [Abstract] (623) [HTML 1 KB] [PDF 707 KB] (660)
1169 TU Ying, ZHANG Liping, WANG Chunhui, HOU Min, LIU Dongsheng
  Clone genealogies extraction based on software evolution over multiple versions
    Journal of Computer Applications   2015 Vol.35 (4): 1169-1173 [Abstract] (1178) [HTML 1 KB] [PDF 985 KB] (706)
1154 YIN Wenke, WU Shanshan, DING Feng, XUN Zhide
  Skyline based search results sorting method
    Journal of Computer Applications   2015 Vol.35 (4): 1154-1158 [Abstract] (477) [HTML 1 KB] [PDF 871 KB] (634)
1148 ZHENG Hui, LI Bing, CHEN Donglin, LIU Pingfeng
  Personalized recommendation technique for mobile life services based on location cluster
    Journal of Computer Applications   2015 Vol.35 (4): 1148-1153 [Abstract] (674) [HTML 1 KB] [PDF 842 KB] (657)
1124 CHEN Xiaolong, WANG Xiaodong, LI Xin, YE Jianyu, YAO Yu
  Echocardiography chamber segmentation based on integration of speeded up robust feature fitting and Chan-Vese model
    Journal of Computer Applications   2015 Vol.35 (4): 1124-1128 [Abstract] (467) [HTML 1 KB] [PDF 757 KB] (633)
1120 GENG Dandan, WANG Tingting, CAO Lei, ZHANG Yu
  Reconstruction of images at intermediate phases of lung 4D-CT data based on deformable registration
    Journal of Computer Applications   2015 Vol.35 (4): 1120-1123 [Abstract] (503) [HTML 1 KB] [PDF 609 KB] (674)
1093 ZHANG Sulan, ZHANG Jifu, HU Lihua, CHU Meng
  Semantic annotation model for scenes based on formal concept analysis
    Journal of Computer Applications   2015 Vol.35 (4): 1093-1096 [Abstract] (750) [HTML 1 KB] [PDF 590 KB] (724)
1075 HUANG Detian, ZHENG Lixin, LIU Peizhong, GU Peiting
  Improved non-negativity and support constraint recursive inverse filtering algorithm for blind restoration based on interband prediction
    Journal of Computer Applications   2015 Vol.35 (4): 1075-1078 [Abstract] (512) [HTML 1 KB] [PDF 792 KB] (567)
1062 XIAO Huihui, WAN Changxuan, DUAN Yanming, ZHONG Qing
  Flower pollination algorithm based on simulated annealing
    Journal of Computer Applications   2015 Vol.35 (4): 1062-1066 [Abstract] (931) [HTML 1 KB] [PDF 799 KB] (24633)
1045 HUANG Huiqun
  Partner selection based on grey relational analysis and particle swarm optimization algorithm
    Journal of Computer Applications   2015 Vol.35 (4): 1045-1048 [Abstract] (780) [HTML 1 KB] [PDF 492 KB] (628)
1040 LIN Guohan, ZHANG Jing, LIU Zhaohua
  Particle swarm optimization with adaptive task allocation
    Journal of Computer Applications   2015 Vol.35 (4): 1040-1044 [Abstract] (1587) [HTML 1 KB] [PDF 695 KB] (707)
1030 HAO Yanbin, GUO Xiao, YANG Naiding
  Computing method of attribute information granule of information system
    Journal of Computer Applications   2015 Vol.35 (4): 1030-1034 [Abstract] (467) [HTML 1 KB] [PDF 761 KB] (685)
1001 CHEN Yongheng, ZUO Wanli, LIN Yaojin
  Application of labeled author topic model in scientific literature
    Journal of Computer Applications   2015 Vol.35 (4): 1001-1005 [Abstract] (587) [HTML 1 KB] [PDF 712 KB] (713)
985 WANG Hao, ZHANG Yuqing
  Enhanced attack-resistible ant-based trust and reputation model
    Journal of Computer Applications   2015 Vol.35 (4): 985-990 [Abstract] (645) [HTML 1 KB] [PDF 1189 KB] (652)
981 XIE Shuzhen, TAN Xiaoqing
  Efficient quantum information splitting scheme based on W states
    Journal of Computer Applications   2015 Vol.35 (4): 981-984 [Abstract] (590) [HTML 1 KB] [PDF 758 KB] (642)
964 ZHANG Yue, ZHENG Dong, ZHANG Yinghui
  Access control mechanism with dynamic authorization and file evaluation
    Journal of Computer Applications   2015 Vol.35 (4): 964-967 [Abstract] (535) [HTML 1 KB] [PDF 619 KB] (654)
950 XU Jinlong, ZHAO Rongcai, HAN Lin
  Vector exploring path optimization algorithm of superword level parallelism with subsection constraints
    Journal of Computer Applications   2015 Vol.35 (4): 950-955 [Abstract] (826) [HTML 1 KB] [PDF 877 KB] (659)
944 DU Xiongjie, WANG Min, TANG Xuehai, ZHANG Zhang
  Scheduling mechanism based on service level objective in multi-tenant cluster
    Journal of Computer Applications   2015 Vol.35 (4): 944-949 [Abstract] (675) [HTML 1 KB] [PDF 949 KB] (660)
934 WANG Aizhen, HOU Chengguo, REN Guofeng
  Layered and cascaded stochastic resonance algorithm for direct sequence spread spectrum signal receiving
    Journal of Computer Applications   2015 Vol.35 (4): 934-937 [Abstract] (489) [HTML 1 KB] [PDF 738 KB] (697)
921 ZHANG Kaiping, MAO Jianjing
  Interference-aware routing for wireless sensor networks based on signal power random fading model
    Journal of Computer Applications   2015 Vol.35 (4): 921-924 [Abstract] (554) [HTML 1 KB] [PDF 736 KB] (873)
916 WU Xiaolin, SHAN Zhilong, CAO Shulin, CAO Chuqun
  Monte Carlo boxed localization algorithm for mobile nodes based on received signal strength indication ranging
    Journal of Computer Applications   2015 Vol.35 (4): 916-920 [Abstract] (620) [HTML 1 KB] [PDF 768 KB] (818)
896 SHANG Qingjian, ZHANG Jinming, WANG Tingzhang
  Weak signal detection in chaotic clutter based on effective K-means and effective extreme learning machine
    Journal of Computer Applications   2015 Vol.35 (3): 896-900 [Abstract] (537) [HTML 1 KB] [PDF 747 KB] (558)
891 ZHU Haiyang, CUI Bingmou, HU Zhiyao
  Comprehensive coordination optimization of train break-up and make-up scheme based on hard time windows at railway technical station
    Journal of Computer Applications   2015 Vol.35 (3): 891-895 [Abstract] (592) [HTML 1 KB] [PDF 753 KB] (444)
886 HU Jiajie, JIANG Letian
  High performance simulation of Win32 environment in Android system
    Journal of Computer Applications   2015 Vol.35 (3): 886-890 [Abstract] (635) [HTML 1 KB] [PDF 776 KB] (490)
882 WANG Kechao, WANG Tiantian, REN Xiangmin, JIA Zongfu
  Software fault localization approach by statistical analysis of failure context
    Journal of Computer Applications   2015 Vol.35 (3): 882-885 [Abstract] (706) [HTML 1 KB] [PDF 749 KB] (410)
858 ZHANG Xiaolin, CUI Ningning, YANG Tao, LI Jie
  Salient points extraction method of furnace flame image based on hierarchical adaptive algorithm
    Journal of Computer Applications   2015 Vol.35 (3): 858-862 [Abstract] (513) [HTML 1 KB] [PDF 710 KB] (442)
830 ZHANG Xiangyu, TIAN Qingguo, GE Baozhen
  Multi-constrained segmentation of 3D human point-cloud
    Journal of Computer Applications   2015 Vol.35 (3): 830-834 [Abstract] (602) [HTML 1 KB] [PDF 895 KB] (441)
816 ZHANG Jing, SANG Qingbing
  Quality assessment method of color stereoscopic images
    Journal of Computer Applications   2015 Vol.35 (3): 816-820 [Abstract] (724) [HTML 1 KB] [PDF 782 KB] (501)
797 XUE Anrong, JIA Xiaoyan, GE Qinglong, YANG Xiaoqin
  Context feature extraction method of terrorism behavior based on dependence maximization
    Journal of Computer Applications   2015 Vol.35 (3): 797-801 [Abstract] (515) [HTML 1 KB] [PDF 835 KB] (464)
783 XIA Haiying, XU Luhui
  Facial expression recognition based on feature fusion of active shape model differential texture and local directional pattern
    Journal of Computer Applications   2015 Vol.35 (3): 783-786 [Abstract] (587) [HTML 1 KB] [PDF 767 KB] (549)
766 SANG Xiuli, XIAO Qingtai, WANG Hua, HAN Jiguang
  Support vector machine combined model forecast based on ensemble empirical mode decomposition-principal component analysis
    Journal of Computer Applications   2015 Vol.35 (3): 766-769 [Abstract] (584) [HTML 1 KB] [PDF 792 KB] (628)
761 WANG Weidong, LIU Bing, GUAN Hongjie, ZHOU Yong, XIA Shixiong
  Spectral embedded clustering algorithm based on kernel function
    Journal of Computer Applications   2015 Vol.35 (3): 761-765 [Abstract] (860) [HTML 1 KB] [PDF 846 KB] (528)
717 XIANG Lingyun, WANG Xinhui
  Text steganographic method with hierarchical security
    Journal of Computer Applications   2015 Vol.35 (3): 717-721 [Abstract] (491) [HTML 1 KB] [PDF 816 KB] (501)
712 ZUO Liming, CHEN Renqun, GUO Hongli
  Provable identity-based signcryption scheme
    Journal of Computer Applications   2015 Vol.35 (3): 712-716 [Abstract] (806) [HTML 1 KB] [PDF 770 KB] (506)
663 QI Xuemei, WANG Hongtao, CHEN Fulong, TANG Qimei, SUN Yunxiang
  Novel quantum differential evolutionary algorithm for blocking flowshop scheduling
    Journal of Computer Applications   2015 Vol.35 (3): 663-667 [Abstract] (517) [HTML 1 KB] [PDF 746 KB] (605)
610 REN Xiuli, WANG Chong
  Multi-path routing protocol based on three-dimensional space and regional co-evolution in wireless sensor network
    Journal of Computer Applications   2015 Vol.35 (3): 610-614 [Abstract] (549) [HTML 1 KB] [PDF 739 KB] (539)
590 YIN Jun, DONG Lida, CHI Tianyang
  Mobile robot motion estimation based on classified feature points
    Journal of Computer Applications   2015 Vol.35 (2): 590-594 [Abstract] (661) [HTML 1 KB] [PDF 779 KB] (407)
566 ZHANG Lei, YANG Chenghu, LU Meijin
  Optimal strategy for production-distribution network of perishable products based on WCVaR
    Journal of Computer Applications   2015 Vol.35 (2): 566-571 [Abstract] (524) [HTML 1 KB] [PDF 1090 KB] (428)
550 GUO Rongzuo, FAN Xiangkui, CUI Dongxia, LI Ming
  Reliability modeling and analysis of embedded system hardware based on Copula function
    Journal of Computer Applications   2015 Vol.35 (2): 550-554 [Abstract] (600) [HTML 1 KB] [PDF 843 KB] (374)
545 DONG Yuehua, DAI Yuqian
  Automatic software test data generation based on hybrid particle swarm optimization
    Journal of Computer Applications   2015 Vol.35 (2): 545-549 [Abstract] (487) [HTML 1 KB] [PDF 776 KB] (432)
531 LIANG Zengyan, LIU Benyong
  Fast algorithm for color image haze removal using principle component analysis and atmospheric scattering mode
    Journal of Computer Applications   2015 Vol.35 (2): 531-534 [Abstract] (709) [HTML 1 KB] [PDF 621 KB] (690)
515 ZHENG Bingbin, FAN Xinnan, LI Min, ZHANG Ji
  Trajectory segment-based abnormal behavior detection method using LDA model
    Journal of Computer Applications   2015 Vol.35 (2): 515-518 [Abstract] (750) [HTML 1 KB] [PDF 830 KB] (551)
506 QIN Longlong, QIAN Yuan, ZHANG Xiaoyan, HOU Xue, ZHOU Qin
  MAP super-resolution reconstruction based on adaptive constraint regularization HL-MRF prior model
    Journal of Computer Applications   2015 Vol.35 (2): 506-509 [Abstract] (1132) [HTML 1 KB] [PDF 716 KB] (367)
502 ZHANG Yupu, YANG Qi, ZHANG Qi
  Image multi-scale recognition method based on computer vision
    Journal of Computer Applications   2015 Vol.35 (2): 502-505 [Abstract] (637) [HTML 1 KB] [PDF 726 KB] (671)
499 PU Guolin, QIU Yuhui
  Image classification based on global dictionary learning method with sparse representation
    Journal of Computer Applications   2015 Vol.35 (2): 499-501 [Abstract] (972) [HTML 1 KB] [PDF 568 KB] (18283)
495 ZHANG Yongku, LI Yunfeng, SUN Jinguang
  Image retrieval based on multi-feature fusion
    Journal of Computer Applications   2015 Vol.35 (2): 495-498 [Abstract] (836) [HTML 1 KB] [PDF 608 KB] (868)
476 KONG Fei, WU Dinghui, JI Zhicheng
  Flexible job-shop scheduling optimization based on two-layer particle swarm optimization algorithm
    Journal of Computer Applications   2015 Vol.35 (2): 476-480 [Abstract] (556) [HTML 1 KB] [PDF 674 KB] (505)
470 ZHANG Cheng, LIU Yadong, LI Yuan
  Nonlinear feature extraction based on discriminant diffusion map analysis
    Journal of Computer Applications   2015 Vol.35 (2): 470-475 [Abstract] (568) [HTML 1 KB] [PDF 868 KB] (417)
452 LIU Runtao, ZHAO Zhenguo, TIAN Guangyue
  Space vector model algorithm for query of continuous and multidirectional regions
    Journal of Computer Applications   2015 Vol.35 (2): 452-455 [Abstract] (474) [HTML 1 KB] [PDF 614 KB] (429)
424 DAI Wei, LIU Zhi, LIU Yihe
  Function pointer attack detection with address integrity checking
    Journal of Computer Applications   2015 Vol.35 (2): 424-429 [Abstract] (552) [HTML 1 KB] [PDF 973 KB] (472)
407 DU Guiying, HUANG Zhenjie
  Efficient certificate-based verifiably encrypted signature scheme
    Journal of Computer Applications   2015 Vol.35 (2): 407-411 [Abstract] (546) [HTML 1 KB] [PDF 777 KB] (495)
378 WANG Zhengying, YU Jiong, YING Changtian, LU Liang
  Energy-efficient strategy of distributed file system based on data block clustering storage
    Journal of Computer Applications   2015 Vol.35 (2): 378-382 [Abstract] (524) [HTML 1 KB] [PDF 766 KB] (431)
374 RUI Zhiliang, ZHU Yuquan, GENG Xia, CHEN Geng
  microRNA identification method based on feature clustering and random subspace
    Journal of Computer Applications   2015 Vol.35 (2): 374-377 [Abstract] (538) [HTML 1 KB] [PDF 644 KB] (385)
369 LIU Xiaohong, QU Zhijian, CAO Yanfeng, ZHANG Xianwei, FENG Gang
  Multi-universe parallel quantum-inspired evolutionary algorithm based on adaptive mechanism
    Journal of Computer Applications   2015 Vol.35 (2): 369-373 [Abstract] (608) [HTML 1 KB] [PDF 738 KB] (484)
364 LUO Yiping, DENG Fei, ZHOU Bifeng
  Non-fragile synchronous guaranteed cost control for complex dynamic network with time-varying delay
    Journal of Computer Applications   2015 Vol.35 (2): 364-368 [Abstract] (686) [HTML 1 KB] [PDF 578 KB] (398)
358 YAN Lin, LIU Tao, YAN Shuo, LI Feng, RUAN Ning
  Data combination method based on structure's granulation
    Journal of Computer Applications   2015 Vol.35 (2): 358-363 [Abstract] (472) [HTML 1 KB] [PDF 1014 KB] (385)
351 LIU Deliang, LIU Kaihua, YU Jiexiao, ZHANG Liang, ZHAO Yang
  DOA estimation for wideband chirp signal with a few snapshots
    Journal of Computer Applications   2015 Vol.35 (2): 351-353 [Abstract] (581) [HTML 1 KB] [PDF 538 KB] (436)
317 WANG Jing, GAO Zehua, GAO Feng, PAN Xiang
  Enhanced frequency-domain channel contention mechanism in wireless local area network
    Journal of Computer Applications   2015 Vol.35 (2): 317-321 [Abstract] (883) [HTML 1 KB] [PDF 718 KB] (28876)
313 PENG Yali, XU Hong, YIN Hong, ZHANG Zhiming
  Routing protocol for bus vehicle network with cyclical movement
    Journal of Computer Applications   2015 Vol.35 (2): 313-316 [Abstract] (483) [HTML 1 KB] [PDF 806 KB] (433)
309 ZHOU Haiyang, CHE Ming
  Communication scheme design for embedded control node cluster
    Journal of Computer Applications   2015 Vol.35 (2): 309-312 [Abstract] (415) [HTML 1 KB] [PDF 751 KB] (390)
294 JIAO Fangyuan, LI Jia, LI Wei
  Characteristic information extraction and dynamic warning algorithm of watershed disaster
    Journal of Computer Applications   2015 Vol.35 (1): 294-298 [Abstract] (532) [HTML 1 KB] [PDF 767 KB] (504)
289 FU Hua, ZI Hai
  Dynamic prediction model for gas emission quantity based on least square support vector machine and Kalman filter
    Journal of Computer Applications   2015 Vol.35 (1): 289-293 [Abstract] (444) [HTML 1 KB] [PDF 726 KB] (557)
283 LI Pengju, LIU Hui, WANG Bin, WANG Long
  Blowing state recognition of basic oxygen furnace based on feature of flame color texture complexity
    Journal of Computer Applications   2015 Vol.35 (1): 283-288 [Abstract] (484) [HTML 1 KB] [PDF 881 KB] (477)
262 LU Yang, BAO Shudi, ZHOU Xiang, CHEN Jinheng
  Real-time human identification algorithm based on dynamic electrocardiogram signals
    Journal of Computer Applications   2015 Vol.35 (1): 262-264 [Abstract] (607) [HTML 1 KB] [PDF 603 KB] (526)
252 JI Lianen, ZOU Yinlong, XIN Bing
  Data processing techniques on sensors of smart terminals for 3D navigation
    Journal of Computer Applications   2015 Vol.35 (1): 252-256 [Abstract] (526) [HTML 1 KB] [PDF 1006 KB] (567)
239 YUAN Xi, LI Qiang
  Research and development of intelligent healthy community system based on mobile Internet
    Journal of Computer Applications   2015 Vol.35 (1): 239-242 [Abstract] (585) [HTML 1 KB] [PDF 762 KB] (1137)
211 HOU He, LYU Xiaoqi, JIA Dongzheng, YU Hefeng
  Curved planar reformation algorithm based on coronary artery outline extraction by multi-planar reformation
    Journal of Computer Applications   2015 Vol.35 (1): 211-214 [Abstract] (1189) [HTML 1 KB] [PDF 784 KB] (580)
206 NIE Xiao, CHEN Leiting
  Boundary handling algorithm for weakly compressible fluids
    Journal of Computer Applications   2015 Vol.35 (1): 206-210 [Abstract] (557) [HTML 1 KB] [PDF 794 KB] (487)
198 JIANG Xingguo, LI Zhifeng, ZHANG Long
  Adaptive improvement of video compressed sensing based on linear dynamic system
    Journal of Computer Applications   2015 Vol.35 (1): 198-201 [Abstract] (477) [HTML 1 KB] [PDF 672 KB] (546)
189 LIU Hong, LIU Rong, LI Shuling
  Acceleration gesture recognition based on random projection
    Journal of Computer Applications   2015 Vol.35 (1): 189-193 [Abstract] (707) [HTML 1 KB] [PDF 719 KB] (571)
183 ZHANG Jing, WU Husheng
  Modified binary cuckoo search algorithm for multidimensional knapsack problem
    Journal of Computer Applications   2015 Vol.35 (1): 183-188 [Abstract] (659) [HTML 1 KB] [PDF 813 KB] (605)
179 WU Zongyu, LUO Wencai
  Construction method of radial basis function approximation model based on parameter optimization of space decomposition
    Journal of Computer Applications   2015 Vol.35 (1): 179-182 [Abstract] (481) [HTML 1 KB] [PDF 701 KB] (549)
147 ZHANG Danpu, FU Zhongliang, WANG Lili, LI Xin
  Multi-label classification algorithm based on floating threshold classifiers combination
    Journal of Computer Applications   2015 Vol.35 (1): 147-151 [Abstract] (703) [HTML 1 KB] [PDF 777 KB] (553)
140 DU Yuanwei, SHI Fangyuan, YANG Na
  Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process
    Journal of Computer Applications   2015 Vol.35 (1): 140-146 [Abstract] (729) [HTML 1 KB] [PDF 1250 KB] (747)
108 LI Qiusheng, WU Yadong, LIN Maosong, WANG Song, WANG Haiyang, FENG Xinmiao
  Ranking- k: effective subspace dominating query algorithm
    Journal of Computer Applications   2015 Vol.35 (1): 108-114 [Abstract] (573) [HTML 1 KB] [PDF 1078 KB] (745)
68 FENG Liping, SONG Lipeng, WANG Hongbin, ZHAO Qingshan
  Propagation modeling and analysis of peer-to-peer botnet
    Journal of Computer Applications   2015 Vol.35 (1): 68-71 [Abstract] (678) [HTML 1 KB] [PDF 543 KB] (608)
27 XIONG Ying, MAO Xuesong, LIU Xing, WANG Yaling, JIN Gang
  Transmission length design of IP network with wavelength-selectable reconfigurable optical add/drop multiplexer
    Journal of Computer Applications   2015 Vol.35 (1): 27-30 [Abstract] (553) [HTML 1 KB] [PDF 560 KB] (596)
23 PAN Hao, CHEN Meng
  Optimization of anti-collision algorithm for radio frequency identification reader system in Internet of things
    Journal of Computer Applications   2015 Vol.35 (1): 23-26 [Abstract] (805) [HTML 1 KB] [PDF 721 KB] (592)
19 MU Yuchao, ZHANG Xiaohong
  Adaptive tree grouping and blind separation anti-collision algorithm for radio frequency identification system
    Journal of Computer Applications   2015 Vol.35 (1): 19-22 [Abstract] (989) [HTML 1 KB] [PDF 583 KB] (523)
3545 ZHAO Yudan WANG Qian FAN Jiulun
  Texture images retrieval based on Float-LBP
    Journal of Computer Applications   2014 Vol.34 (12): 3545-3548 [Abstract] (178) [HTML 1 KB] [PDF 596 KB] (730)
3540 XU Zhan CAO Zhe
  Video background completion with complexly moving camera
    Journal of Computer Applications   2014 Vol.34 (12): 3540-3544 [Abstract] (209) [HTML 1 KB] [PDF 1032 KB] (663)
3491 TAO Yongcai HE Zongzhen SHI Lei WEI Lin CAO Yangjie
  Personalized microblogging recommendation based on weighted dynamic degree of interest
    Journal of Computer Applications   2014 Vol.34 (12): 3491-3496 [Abstract] (195) [HTML 1 KB] [PDF 895 KB] (788)
3470 ZHANG Liping LI Song MA Lin TANG Yuanxin HAO Xiaohong
  Methods of Voronoi diagram construction and near neighbor relations query
    Journal of Computer Applications   2014 Vol.34 (12): 3470-3474 [Abstract] (202) [HTML 1 KB] [PDF 754 KB] (706)
3446 QU Sheng SHI Wuxi XIU Chunbo
  Criticality analysis method based on fuzzy Bayesian networks
    Journal of Computer Applications   2014 Vol.34 (12): 3446-3450 [Abstract] (157) [HTML 1 KB] [PDF 825 KB] (675)
3157 ZHAO Yuan LU Tianbo
  Multi-dimensional trust management mechanism for peer-to-peer networks
    Journal of Computer Applications   2014 Vol.34 (11): 3157-3159 [Abstract] (240) [HTML 1 KB] [PDF 566 KB] (554)
3135 LIANG Junjie LIU Qiongni YU Dunhui
  Personalization recommendation algorithm for Web resources based on ontology
    Journal of Computer Applications   2014 Vol.34 (11): 3135-3139 [Abstract] (281) [HTML 1 KB] [PDF 752 KB] (611)
3086 CHEN Bingliang ZHANG Yuhui JI Zhiyuan
  Performance tests and analysis of distributed evolutionary algorithms
    Journal of Computer Applications   2014 Vol.34 (11): 3086-3090 [Abstract] (236) [HTML 1 KB] [PDF 745 KB] (574)
3078 WANG Mingkun YUAN Shaoguang ZHU Yongli WANG Dewen
  Real-time clustering for massive data using Storm
    Journal of Computer Applications   2014 Vol.34 (11): 3078-3081 [Abstract] (314) [HTML 1 KB] [PDF 611 KB] (820)
3024 WAGN Shengzheng HUANG Yugui
  Method of marine radar image simulation based on electronic chart display information system
    Journal of Computer Applications   2014 Vol.34 (10): 3024-3028 [Abstract] (222) [HTML 1 KB] [PDF 806 KB] (390)
3020 WU Milong QIU Weibao LIU Baoqiang CHI Liyang MU Peitian LI Xiaolong ZHENG Hairong
  High speed data transfer and imaging for intravascular ultrasound
    Journal of Computer Applications   2014 Vol.34 (10): 3020-3023 [Abstract] (220) [HTML 1 KB] [PDF 598 KB] (389)
2971 YANG Zhuzhong ZHOU Jiliu LANG Fangnian
  Improving ideal low-pass filter with noise detection algorithm
    Journal of Computer Applications   2014 Vol.34 (10): 2971-2975 [Abstract] (459) [HTML 1 KB] [PDF 799 KB] (506)
2913 LI Lin LIAN Jin WU Yue YE Mao
  Survey on image holistic scene understanding based on probabilistic graphical model
    Journal of Computer Applications   2014 Vol.34 (10): 2913-2921 [Abstract] (482) [HTML 1 KB] [PDF 1472 KB] (665)
2895 ZHANG Cheng LI Na LI Yuan PANG Yujun
  Application of kernel parameter discriminant method in kernel principal component analysis
    Journal of Computer Applications   2014 Vol.34 (10): 2895-2898 [Abstract] (193) [HTML 1 KB] [PDF 549 KB] (523)
2761 HAN Guodong KONG Feng SHEN Jianliang
  Hierarchical networks-on-chip routing algorithm based on source region path selection
    Journal of Computer Applications   2014 Vol.34 (10): 2761-2765 [Abstract] (266) [HTML 1 KB] [PDF 862 KB] (451)
2630 SUN Yongyong HUANG Guangqiu
  Matrix obfuscation based on data refinement
    Journal of Computer Applications   2014 Vol.34 (9): 2630-2634 [Abstract] (235) [HTML 1 KB] [PDF 655 KB] (396)
2585 YU Juan WANG Wenxian ZHONG Qinglun
  Regional blood supply system optimization under stochastic demand
    Journal of Computer Applications   2014 Vol.34 (9): 2585-2589 [Abstract] (185) [HTML 1 KB] [PDF 628 KB] (413)
2571 LIN Mingming QIU Yunfei SHAO Liangshan
  Consumption sentiment classification based on two-dimensional coordinate mapping method
    Journal of Computer Applications   2014 Vol.34 (9): 2571-2576 [Abstract] (198) [HTML 1 KB] [PDF 1043 KB] (496)
2543 WANG Xiaojuan LIU Sanyang TIAN Wenkai
  Improved backtracking search optimization algorithm with new effective mutation scale factor and greedy crossover strategy
    Journal of Computer Applications   2014 Vol.34 (9): 2543-2546 [Abstract] (362) [HTML 1 KB] [PDF 681 KB] (627)
2434 WEI Bing GUO Yutang SONG Jie ZHANG Lei
  New NAND device management solution with high storage density
    Journal of Computer Applications   2014 Vol.34 (8): 2434-2437 [Abstract] (255) [HTML 1 KB] [PDF 619 KB] (314)
2415 NIU Guochen ZHANG Weicheng LI Ziwei
  Path planning algorithm based on regional-advance strategy for aircraft fuel tank inspection robot
    Journal of Computer Applications   2014 Vol.34 (8): 2415-2418 [Abstract] (268) [HTML 1 KB] [PDF 528 KB] (476)
2385 WANG Yong RAO Qinfei TANG Jing YUAN Chaoyan
  Automatic coding algorithm based on color structure light
    Journal of Computer Applications   2014 Vol.34 (8): 2385-2389 [Abstract] (273) [HTML 1 KB] [PDF 779 KB] (494)
2202 WANG Chao BI Guihong ZHANG Shouming WEI Chuntao
  Agent-based language competition model with social circle network
    Journal of Computer Applications   2014 Vol.34 (8): 2202-2208 [Abstract] (230) [HTML 1 KB] [PDF 1102 KB] (468)
2192 GAO Xiaolong ZHU Xinde ZHAO Jianmin CAO Cungen XU Huiying WU De
  Building and consistency analysis of movie ontology
    Journal of Computer Applications   2014 Vol.34 (8): 2192-2196 [Abstract] (258) [HTML 1 KB] [PDF 881 KB] (537)
1978 JI Xiang GUO Zhigang WANG Kai
  Design of multi-carrier transceivers based on time domain improved discrete Fourier transform
    Journal of Computer Applications   2014 Vol.34 (7): 1978-1982 [Abstract] (176) [HTML 1 KB] [PDF 720 KB] (512)
1848 ZHANG Xiaoqing YUE Qiang
  Cloud resource game allocation based on cooperation
    Journal of Computer Applications   2014 Vol.34 (7): 1848-1851 [Abstract] (229) [HTML 1 KB] [PDF 698 KB] (596)
1843 HE Huaiwen FU Yu YANG Yihong XIAO Tao
  Service performance analysis of cloud computing center based on M/M/n/n+r queuing model
    Journal of Computer Applications   2014 Vol.34 (7): 1843-1847 [Abstract] (283) [HTML 1 KB] [PDF 634 KB] (558)
1792 DU Yibo
  Workflow weighting colored Petri-net modeling method
    Journal of Computer Applications   2014 Vol.34 (6): 1792-1797 [Abstract] (196) [HTML 1 KB] [PDF 677 KB] (295)
1746 GAO Peng GUO Lijun ZHU Yiwei ZHANG Rong
  Multi-camera person identification based on hidden markov model
    Journal of Computer Applications   2014 Vol.34 (6): 1746-1752 [Abstract] (270) [HTML 1 KB] [PDF 1042 KB] (335)
1711 ZHANG Jing ZHANG Quan LIU Yi GUI Zhiguo
  Symmetry optimization of polar coordinate back-projection reconstruction algorithm for fan beam CT
    Journal of Computer Applications   2014 Vol.34 (6): 1711-1714 [Abstract] (366) [HTML 1 KB] [PDF 592 KB] (310)
1622 XUE Xingsi
  Large scale ontology aligning approach based on NSGA-Ⅱ
    Journal of Computer Applications   2014 Vol.34 (6): 1622-1625 [Abstract] (229) [HTML 1 KB] [PDF 754 KB] (313)
1604 OU Guojian WANG Weiqiang JIANG Qingping
  Fast algorithm for sparse decomposition of real first-order polynomial phase signal based on group testing
    Journal of Computer Applications   2014 Vol.34 (6): 1604-1607 [Abstract] (186) [HTML 1 KB] [PDF 705 KB] (433)
1573 XUE Rui XU Xichao WEI Qiang
  New signal system design for satellite navigation system
    Journal of Computer Applications   2014 Vol.34 (6): 1573-1577 [Abstract] (391) [HTML 1 KB] [PDF 756 KB] (479)
1563 ZHOU Mu ZHANG Qiao QIU Feng
  Fingerprinting location method for WLAN using physical neighbor points information
    Journal of Computer Applications   2014 Vol.34 (6): 1563-1566 [Abstract] (224) [HTML 1 KB] [PDF 587 KB] (366)
1511 JI Jun XING Feifei DU Jun SHIning CUI Yaodong
  Deterministic algorithm for optimal two-stage cutting layouts with same-shape block
    Journal of Computer Applications   2014 Vol.34 (5): 1511-1515 [Abstract] (167) [HTML 1 KB] [PDF 654 KB] (360)
1499 WANG Pei ZHANG Genyao LI Zhi WANG Jing
  Wavelet threshold denoising algorithm based on new threshold function
    Journal of Computer Applications   2014 Vol.34 (5): 1499-1502 [Abstract] (304) [HTML 1 KB] [PDF 578 KB] (429)
1386 LU Yuanyao ZHOU Ni
  Improved speech endpoint detection algorithm in strong noise environment
    Journal of Computer Applications   2014 Vol.34 (5): 1386-1390 [Abstract] (474) [HTML 1 KB] [PDF 690 KB] (551)
1243 XIAO Heng LV Shaohe
  Efficient spectrum sensing mechanism with interference cancellation in cognitive radio network
    Journal of Computer Applications   2014 Vol.34 (5): 1243-1246 [Abstract] (487) [HTML 1 KB] [PDF 582 KB] (399)
1213 LI Hongbo JIANG Lin WANG Haitang
  Simulation on low speed stable operation of full-order observer for induction motor
    Journal of Computer Applications   2014 Vol.34 (4): 1213-1216 [Abstract] (667) [HTML 1 KB] [PDF 638 KB] (434)
1209 HAO Dapeng FU Weiping WANG Wen
  Mobile robot safety navigation based on time to contact
    Journal of Computer Applications   2014 Vol.34 (4): 1209-1212 [Abstract] (406) [HTML 1 KB] [PDF 590 KB] (425)
1201 BAO Jikai LUO Changyuan ZHOU Daoshui LI
  Equipment system availability analysis and project optimization based on cannibalization
    Journal of Computer Applications   2014 Vol.34 (4): 1201-1204 [Abstract] (473) [HTML 1 KB] [PDF 670 KB] (595)
1182 YE Shuangqing YANG Xiaomei
  Super resolution image reconstruction based on wavelet transform and non-local means
    Journal of Computer Applications   2014 Vol.34 (4): 1182-1186 [Abstract] (568) [HTML 1 KB] [PDF 789 KB] (461)
1118 WEI Shimin DAI Duhong
  Multi-Agent cooperative E-commerce recommender system model
    Journal of Computer Applications   2014 Vol.34 (4): 1118-1121 [Abstract] (442) [HTML 1 KB] [PDF 649 KB] (775)
1114 ZHAO Ting XIAO Ruliang SUN Cong CHEN Hongtao LI Yuanxin LI Hongen
  Personalized recommendation algorithm integrating roulette walk and combined time effect
    Journal of Computer Applications   2014 Vol.34 (4): 1114-1117 [Abstract] (559) [HTML 1 KB] [PDF 790 KB] (534)
1105 YUN Hongyan XU Liangjian GUO Zhenbo WEI Xiaoyan
  Modeling of marine ecology ontology
    Journal of Computer Applications   2014 Vol.34 (4): 1105-1108 [Abstract] (499) [HTML 1 KB] [PDF 609 KB] (474)
1047 HUANG Dan
  Attribute-based encryption scheme combined with trust management in wireless sensor network
    Journal of Computer Applications   2014 Vol.34 (4): 1047-1050 [Abstract] (436) [HTML 1 KB] [PDF 686 KB] (657)
1042 MO Lequn GUO Gengqi LI Feng
  Security-analysis of a kind of generalized group-oriented threshold signcryption schemes
    Journal of Computer Applications   2014 Vol.34 (4): 1042-1046 [Abstract] (320) [HTML 1 KB] [PDF 797 KB] (443)
1019 GU Chunsheng JING Zhengjun LI Hongwei YU Zhimin
  Security Analysis of Range Query with Single Assertion on Encrypted Data
    Journal of Computer Applications   2014 Vol.34 (4): 1019-1024 [Abstract] (572) [HTML 1 KB] [PDF 962 KB] (452)
969 LIU Yangyang XIE Zheng CHEN Zhi
  Improved algorithm for vital arc of maximum dynamic flow
    Journal of Computer Applications   2014 Vol.34 (4): 969-972 [Abstract] (563) [HTML 1 KB] [PDF 622 KB] (480)
963 LI Dujuan ZHOU Zifeng WU Cheng-mao
  Multi-user chaotic communication and its bit error rate based on orthogonal chaos
    Journal of Computer Applications   2014 Vol.34 (4): 963-968 [Abstract] (471) [HTML 1 KB] [PDF 1043 KB] (563)
902 ZHANG Jinghua WANG Renhuang YUE Hongwei
  Research on dynamic stability of badminton
    Journal of Computer Applications   2014 Vol.34 (3): 902-906 [Abstract] (430) [HTML 1 KB] [PDF 754 KB] (381)
873 LIU Zunxiong HUANG Zhiqiang LIU Jiangwei CHEN Ying
  Financial failure prediction using truncated Hinge loss support vector machine with smoothly clipped absolute deviation penalty
    Journal of Computer Applications   2014 Vol.34 (3): 873-878 [Abstract] (700) [HTML 1 KB] [PDF 878 KB] (504)
865 HAN Guanghui ZENG Cheng
  Improvement of Boyer-Moore string matching algorithm
    Journal of Computer Applications   2014 Vol.34 (3): 865-868 [Abstract] (458) [HTML 1 KB] [PDF 489 KB] (570)
857 ZHANG Tianjiong WANG Zheng
  Runtime error site analysis tool based on variable tracking
    Journal of Computer Applications   2014 Vol.34 (3): 857-860 [Abstract] (467) [HTML 1 KB] [PDF 574 KB] (466)
833 ZHANG Yi LIU Yuran LUO Yuan
  Vision-based gesture recognition method and its implementation on digital signal processor
    Journal of Computer Applications   2014 Vol.34 (3): 833-836 [Abstract] (428) [HTML 1 KB] [PDF 762 KB] (551)
801 JIANG Wei LI Xiaolong YANG Yongqing ZHANG Heng
  New image denoising method based on rational-order differential
    Journal of Computer Applications   2014 Vol.34 (3): 801-805 [Abstract] (548) [HTML 1 KB] [PDF 792 KB] (371)
785 HU Qingxin CHEN Yun FANG Jing
  Tone mapping algorithm based on multi-scale decomposition
    Journal of Computer Applications   2014 Vol.34 (3): 785-789 [Abstract] (701) [HTML 1 KB] [PDF 1008 KB] (474)
658 LI Lina ZENG Qingxun GAN Xiaoye LIANG Desu
  Under-determined blind source separation based on potential function and compressive sensing
    Journal of Computer Applications   2014 Vol.34 (3): 658-662 [Abstract] (522) [HTML 1 KB] [PDF 843 KB] (672)
653 LI Yanjie HE Jingsong LI Ran
  Intellectual property core design of communication terminal based on 1553B bus
    Journal of Computer Applications   2014 Vol.34 (3): 653-657 [Abstract] (464) [HTML 1 KB] [PDF 657 KB] (371)
649 HOU Yunshan ZHANG Xincheng JIN Yong
  Adaptive beamforming algorithm based on interference-noise covariance matrix reconstruction
    Journal of Computer Applications   2014 Vol.34 (3): 649-652 [Abstract] (510) [HTML 1 KB] [PDF 715 KB] (688)
644 SHEN Jian XIA Jingbo FU Kai SUN Yu
  Active congestion control strategy based on historical probability in delay tolerant networks
    Journal of Computer Applications   2014 Vol.34 (3): 644-648 [Abstract] (516) [HTML 1 KB] [PDF 739 KB] (403)
632 WU Dong
  Active queue management algorithm of queue delay control
    Journal of Computer Applications   2014 Vol.34 (3): 632-634 [Abstract] (665) [HTML 1 KB] [PDF 565 KB] (431)
610 CHEN Ping TANG Xinmin XING Jian
  Taxiway conflict control strategy based on objective perception events driven model
    Journal of Computer Applications   2014 Vol.34 (2): 610-614 [Abstract] (555) [HTML 0 KB] [PDF 714 KB] (536)
601 ZHENG Yanbin WANG Ning DUAN Lingyu
  Multi-Agent urban traffic coordination control research based on game learning
    Journal of Computer Applications   2014 Vol.34 (2): 601-604 [Abstract] (479) [HTML 0 KB] [PDF 626 KB] (593)
576 ZHAO Liang CHEN Min LI Hongchen
  Optimized data association algorithm based on visual simultaneous localization and mapping
    Journal of Computer Applications   2014 Vol.34 (2): 576-579 [Abstract] (472) [HTML 0 KB] [PDF 612 KB] (606)
562 SHENG Shuai CAO Liping HUANG Zengxi WU Pengfei
  Image super-resolution algorithm based on improved sparse coding
    Journal of Computer Applications   2014 Vol.34 (2): 562-566 [Abstract] (557) [HTML 0 KB] [PDF 904 KB] (557)
546 YANG Huixian CAI Yongyong ZHAi Yunlong LI Qiuqiu FENG Junpeng
  Single sample face recognition based on orthogonal gradient binary pattern
    Journal of Computer Applications   2014 Vol.34 (2): 546-549 [Abstract] (536) [HTML 0 KB] [PDF 590 KB] (546)
538 ZHAO Yongli ZHONG Heng LI Dingyuan HU Tao
  Simultaneous recursive identification algorithm of system order and parameters based on determinant ratio method
    Journal of Computer Applications   2014 Vol.34 (2): 538-541 [Abstract] (668) [HTML 0 KB] [PDF 501 KB] (514)
519 SHI Xin ZHANG Tao LEI Luning
  Dynamic evaluation of ecological security based on set pair analysis and Markov chain
    Journal of Computer Applications   2014 Vol.34 (2): 519-522 [Abstract] (506) [HTML 0 KB] [PDF 711 KB] (545)
501 YANG Chao YAN Xuefeng ZHANG Jie ZHOU Yong
  Weight-based cloud reasoning algorithm
    Journal of Computer Applications   2014 Vol.34 (2): 501-505 [Abstract] (604) [HTML 0 KB] [PDF 732 KB] (614)
496 QI Hao WANG Fubao DENG Hong ZHAO Kun WANG Liang MA Yin DUAN Weijun
  Quantum-inspired clonal algorithm based method for optimizing neural networks
    Journal of Computer Applications   2014 Vol.34 (2): 496-500 [Abstract] (496) [HTML 0 KB] [PDF 719 KB] (506)
481 WU Jiang TANG Chang-jie LI Taiyong CUI Liang
  Sentiment analysis on Web financial text based on semantic rules
    Journal of Computer Applications   2014 Vol.34 (2): 481-485 [Abstract] (928) [HTML 0 KB] [PDF 922 KB] (1616)
464 MING Yang ZHANG Lin HAN Juan ZHOU Jun
  Universal designated verifier signcryption scheme in standard model
    Journal of Computer Applications   2014 Vol.34 (2): 464-468 [Abstract] (425) [HTML 0 KB] [PDF 702 KB] (422)
456 YE Xiang XU Zhan HU Xiang LIU Dan
  Low-cost mutual authenticate and encrypt scheme for active RIFD system
    Journal of Computer Applications   2014 Vol.34 (2): 456-460 [Abstract] (483) [HTML 0 KB] [PDF 798 KB] (531)
448 CAI Zemin WANG Yi LI Renfa
  Differential power analysis attack based on algebraic expression for power model
    Journal of Computer Applications   2014 Vol.34 (2): 448-451 [Abstract] (512) [HTML 0 KB] [PDF 735 KB] (505)
428 REN Zhiyu CHEN Xingyuan
  Reachability analysis for attribute based user-role assignment model
    Journal of Computer Applications   2014 Vol.34 (2): 428-432 [Abstract] (425) [HTML 0 KB] [PDF 755 KB] (511)
421 WU YinghongWU HUANG Hao ZHOU Jingkang ZENG Qingkai
  Conflict analysis of distributed application access control policies refinement
    Journal of Computer Applications   2014 Vol.34 (2): 421-427 [Abstract] (563) [HTML 0 KB] [PDF 1019 KB] (503)
401 ZHANG Jian WANG Jindong YU Dingkun
  Continuous-valued attributes reduction algorithm based on gray correlation
    Journal of Computer Applications   2014 Vol.34 (2): 401-405 [Abstract] (448) [HTML 0 KB] [PDF 725 KB] (486)
382 ZHANG Yongjun XU Xinhai
  Fault-tolerance period optimization method for computational fluid dynamics-oriented application development frameworks
    Journal of Computer Applications   2014 Vol.34 (2): 382-386 [Abstract] (494) [HTML 0 KB] [PDF 767 KB] (571)
360 CAI Song ZHANG Jianming CHEN Jiming PAN Jingui
  Load balancing technology based on naive Bayes algorithm in cloud computing environment
    Journal of Computer Applications   2014 Vol.34 (2): 360-364 [Abstract] (605) [HTML 0 KB] [PDF 718 KB] (739)
357 YUAN Aiping WAN Chanjun
  Virtual machine deployment strategy based on improved genetic algorithm in cloud computing environment
    Journal of Computer Applications   2014 Vol.34 (2): 357-359 [Abstract] (569) [HTML 0 KB] [PDF 604 KB] (721)
351 YANG Jing WU Lei WU Dean WANG Xiaomin LIU Nianbo
  Artificial immune algorithm for dynamic task scheduling on cloud computing platform
    Journal of Computer Applications   2014 Vol.34 (2): 351-356 [Abstract] (537) [HTML 0 KB] [PDF 933 KB] (614)
346 LIN Xiaoxu LIU Naijin QIAN Jinxi ZHAO Danfeng
  Analysis and suppression of influence on spotbeam selection of GMR-1 system under antenna oscillation
    Journal of Computer Applications   2014 Vol.34 (2): 346-350 [Abstract] (475) [HTML 0 KB] [PDF 758 KB] (1296)
341 JIA Lei WANG Lingjiao GUO Hua XU Yawei LI Juan
  Enhanced distributed mobility management based on host identity protocol
    Journal of Computer Applications   2014 Vol.34 (2): 341-345 [Abstract] (619) [HTML 0 KB] [PDF 724 KB] (476)
302 JIANG Zhenghua
  Application of variance-based optimal combined weight process in evaluating Internet information resources
    Journal of Computer Applications   2014 Vol.34 (1): 302-308 [Abstract] (588) [HTML 1 KB] [PDF 1003 KB] (597)
297 HOU Rongtao LU Yu WANG Qin YUAN Chengsheng WANG Jun
  Application of OPTICS to lightning nowcasting
    Journal of Computer Applications   2014 Vol.34 (1): 297-301 [Abstract] (529) [HTML 1 KB] [PDF 850 KB] (426)
286 LI Baolian ZHANG Xiaolong
  Steel furnace online quality monitoring method based on real-time data processing
    Journal of Computer Applications   2014 Vol.34 (1): 286-291 [Abstract] (542) [HTML 1 KB] [PDF 868 KB] (485)
265 QI Yaohui PAN Fuping GE Fengpei YAN Yonghong
  Discriminative maximum a posteriori for acoustic model adaptation
    Journal of Computer Applications   2014 Vol.34 (1): 265-269 [Abstract] (536) [HTML 1 KB] [PDF 706 KB] (548)
244 HUANG Shunliang WANG Qi
  Method for customer segmentation based on three-way decisions theory
    Journal of Computer Applications   2014 Vol.34 (1): 244-248 [Abstract] (3527) [HTML 1 KB] [PDF 752 KB] (526)
239 DONG Hongyu CHEN Xiaoyun
  Classification of multivariate time series based on singular value decomposition and discriminant locality preserving projection
    Journal of Computer Applications   2014 Vol.34 (1): 239-243 [Abstract] (703) [HTML 1 KB] [PDF 704 KB] (660)
222 LONG Yu TONG Xiangrong
  Property of trust-based recommender systems
    Journal of Computer Applications   2014 Vol.34 (1): 222-226 [Abstract] (520) [HTML 1 KB] [PDF 852 KB] (700)
218 CHEN Hongtao XIAO Ruliang NI Youcong DU Xin GONG Ping CAI Sheng-zhen
  Hybrid recommendation model for personalized trend prediction of fused recommendation potential
    Journal of Computer Applications   2014 Vol.34 (1): 218-221 [Abstract] (674) [HTML 1 KB] [PDF 641 KB] (540)
213 ZHANG Xuan LIU Cong WANG Lixia ZHAO Qian YANG Shuai
  Trustworthy Web service recommendation based on collaborative filtering
    Journal of Computer Applications   2014 Vol.34 (1): 213-217 [Abstract] (714) [HTML 1 KB] [PDF 792 KB] (724)
204 CAO Yongchun CAI Zhenqi SHAO Yabin
  Improved artificial bee colony clustering algorithm based on K-means
    Journal of Computer Applications   2014 Vol.34 (1): 204-207 [Abstract] (633) [HTML 1 KB] [PDF 814 KB] (635)
179 WANG Xu ZHAO Shuguang
  Differential evolution algorithm for high dimensional optimization problem
    Journal of Computer Applications   2014 Vol.34 (1): 179-181 [Abstract] (575) [HTML 1 KB] [PDF 467 KB] (440)
175 YUAN Xun
  Preliminary application of combination resultant theory
    Journal of Computer Applications   2014 Vol.34 (1): 175-178 [Abstract] (434) [HTML 1 KB] [PDF 469 KB] (517)
145 FU Lijuan YAO Yu FU Zhongliang
  Filtering method for medical images based on median filtering and anisotropic diffusion
    Journal of Computer Applications   2014 Vol.34 (1): 145-148 [Abstract] (544) [HTML 1 KB] [PDF 698 KB] (642)
113 WANBaoji ZHANG Tao
  Universal blind detection based on multiple classifiers fusion and image complexity
    Journal of Computer Applications   2014 Vol.34 (1): 113-118 [Abstract] (704) [HTML 1 KB] [PDF 888 KB] (387)
108 ZHU Menging XU Lei
  Hybrid model of alert correlation based on attack graph and alert similarity
    Journal of Computer Applications   2014 Vol.34 (1): 108-112 [Abstract] (454) [HTML 1 KB] [PDF 765 KB] (511)
99 LI Jia ZHENG Yiping LIU Chunlong
  Embed safety mechanism of a RFID anti-collision strategy
    Journal of Computer Applications   2014 Vol.34 (1): 99-103 [Abstract] (506) [HTML 1 KB] [PDF 761 KB] (561)
90 WANG Binbin ZHANG Yanyan ZHANG Xuelin
  Mixed key management scheme based on domain for wireless sensor network
    Journal of Computer Applications   2014 Vol.34 (1): 90-94 [Abstract] (552) [HTML 1 KB] [PDF 768 KB] (505)
78 CAO Jie YANG Yatao LI Zichen
  Lattice signature and its application based on small integer solution problem
    Journal of Computer Applications   2014 Vol.34 (1): 78-81 [Abstract] (525) [HTML 1 KB] [PDF 591 KB] (463)
64 YANG Yufei DAI Qi JIA Zhen YI Hongfeng
  Weakly supervised method for attribute relation extraction
    Journal of Computer Applications   2014 Vol.34 (1): 64-68 [Abstract] (542) [HTML 1 KB] [PDF 776 KB] (589)
46 JIN Peiquan XING Baoping JIN Yong YUE Lihua
  Survey on energy-aware green databases
    Journal of Computer Applications   2014 Vol.34 (1): 46-53 [Abstract] (563) [HTML 1 KB] [PDF 1418 KB] (514)
31 SONG Yunhua BO Wenyang ZHOU Qi
  Prediction on hard disk failure of cloud computing framework by using SMART on COG-OS framework
    Journal of Computer Applications   2014 Vol.34 (1): 31-35 [Abstract] (615) [HTML 1 KB] [PDF 802 KB] (635)
27 YU Xing HU Demin CHANG Huang
  Integrity check method for fine-grained cloud storage data
    Journal of Computer Applications   2014 Vol.34 (1): 27-30 [Abstract] (788) [HTML 1 KB] [PDF 612 KB] (545)
13 ZHANG Aihua LI Chunlei GUI Guan
  Sparse channel estimation method based on compressed sensing for OFDM cooperation system
    Journal of Computer Applications   2014 Vol.34 (1): 13-17 [Abstract] (697) [HTML 1 KB] [PDF 702 KB] (436)
1 REN Zhi SUO Jianwei LIU Yan LEI Hongjiang
  High-efficiency and low-delay address assignment algorithm for LR-WPAN mesh networks
    Journal of Computer Applications   2014 Vol.34 (1): 1-3 [Abstract] (573) [HTML 1 KB] [PDF 552 KB] (666)
3608 CHEN Liping KONG Xiangzeng ZHEN Zhi LIN Xinqi ZHAN Xiaoshan
  Application of geometric moving average martingale algorithm in anomaly analysis before earthquake based on sliding window
    Journal of Computer Applications   2013 Vol.33 (12): 3608-3610 [Abstract] (613) [HTML 0 KB] [PDF 506 KB] (535)
3591 JIN Weijian WANG Chunzhi
  Iteration MapReduce framework for evolution algorithm
    Journal of Computer Applications   2013 Vol.33 (12): 3591-3595 [Abstract] (652) [HTML 0 KB] [PDF 806 KB] (469)
3580 LI` Chunyan ZHANG Xuejie
  Performance evaluation on open source cloud platform for high performance computing
    Journal of Computer Applications   2013 Vol.33 (12): 3580-3585 [Abstract] (664) [HTML 0 KB] [PDF 940 KB] (729)
3522 WU Ruifeng HE Lu FANG Dingyi
  Automatic evaluation scheme for imperceptibility of natural language watermarking
    Journal of Computer Applications   2013 Vol.33 (12): 3522-3526 [Abstract] (658) [HTML 0 KB] [PDF 908 KB] (873)
3519 LI Yanhong GAO Zhide FENG Wenwen
  Blind verifiably encrypted signature scheme based on certificateless
    Journal of Computer Applications   2013 Vol.33 (12): 3519-3521 [Abstract] (586) [HTML 0 KB] [PDF 660 KB] (465)
3514 HONG Xiaojing WANG Bin
  Leakage-resilient designated verifier signature scheme
    Journal of Computer Applications   2013 Vol.33 (12): 3514-3518 [Abstract] (567) [HTML 0 KB] [PDF 764 KB] (438)
3506 LI Chun ZHAO Jianbao SHEN Xiaoliu
  Network security situational awareness method of multi-period assessment
    Journal of Computer Applications   2013 Vol.33 (12): 3506-3510 [Abstract] (607) [HTML 0 KB] [PDF 819 KB] (503)
3494 HUANG Hui GUO Fan XU Shufang
  Polymorphic worms signature extraction based on improved ant colony algorithm
    Journal of Computer Applications   2013 Vol.33 (12): 3494-3498 [Abstract] (666) [HTML 0 KB] [PDF 786 KB] (446)
3473 LI Weibin ZHANG Yingxin GUO Xinming ZHANG Wei
  Bit-flipping prediction acquisition algorithm of weak GPS signal
    Journal of Computer Applications   2013 Vol.33 (12): 3473-3476 [Abstract] (766) [HTML 0 KB] [PDF 652 KB] (493)
3469 ZENG Yaoping YANG Yixin LU Guangyue
  Fast DOA estimation for coherent wideband sources based on symmetrical spectrum
    Journal of Computer Applications   2013 Vol.33 (12): 3469-3472 [Abstract] (524) [HTML 0 KB] [PDF 756 KB] (459)
3465 JI Xiang ZHUANG Ling SHAO Kai WANG Guangyu
  Design of multi-carrier transceivers based on modified discrete fourier transform filter bank
    Journal of Computer Applications   2013 Vol.33 (12): 3465-3468 [Abstract] (728) [HTML 0 KB] [PDF 634 KB] (534)
3453 WANG Ling SHI Weiren SHI Xin SONG Ningbo RAN Qike
  Data compression and optimization algorithm for wireless sensor network based on temporal correlation
    Journal of Computer Applications   2013 Vol.33 (12): 3453-3456 [Abstract] (643) [HTML 0 KB] [PDF 751 KB] (486)
3444 LIANG Dingwen YUAN Lei CAI Zhihua GU Qiong
  Vehicle navigation algorithm based on unscented Kalman filter sensor information fusion
    Journal of Computer Applications   2013 Vol.33 (12): 3444-3448 [Abstract] (544) [HTML 0 KB] [PDF 709 KB] (525)
3432 GUO Dong WANG Wei ZENG Guoshun
  Distributed data storage method based on consistent tree distribution
    Journal of Computer Applications   2013 Vol.33 (12): 3432-3436 [Abstract] (667) [HTML 0 KB] [PDF 828 KB] (481)
3428 HUO Yuanhong LIU Yi JI Weixing
  Recovery method for high-level language control structures based on structural analysis
    Journal of Computer Applications   2013 Vol.33 (12): 3428-3431 [Abstract] (964) [HTML 0 KB] [PDF 578 KB] (437)
3406 ZHENG Ruoqin DU Jinglin XIE Li
  Directional simple auction aggregation protocol for wireless sensor and actor network
    Journal of Computer Applications   2013 Vol.33 (12): 3406-3409 [Abstract] (519) [HTML 0 KB] [PDF 570 KB] (395)
3380 LI Shuang LI Wenjing SHUN Huanlong LIN Zhongming
  Artificial fish swarm parallel algorithm based on multi-core cluster
    Journal of Computer Applications   2013 Vol.33 (12): 3380-3384 [Abstract] (732) [HTML 0 KB] [PDF 769 KB] (419)
3363 FANG Chao YANG Yiling HUANG Yu
  Case study of achieving context-awareness based on predicate detection
    Journal of Computer Applications   2013 Vol.33 (12): 3363-3367 [Abstract] (586) [HTML 0 KB] [PDF 859 KB] (430)
3350 DAI Jin LIU Bo BIAN Haoyu
  Design and implementation of E-mail security service system with cloud computing
    Journal of Computer Applications   2013 Vol.33 (12): 3350-3353 [Abstract] (881) [HTML 0 KB] [PDF 687 KB] (654)
3345 FAN Min XU Shengcai
  Massive medical image retrieval system based on Hadoop
    Journal of Computer Applications   2013 Vol.33 (12): 3345-3349 [Abstract] (711) [HTML 0 KB] [PDF 776 KB] (614)
3326 QIAN Yurong YU Jiong WANG Weiyuan SHUN Hua LIAO Bin YANG Xingyao
  Energy saving and load balance strategy in cloud computing
    Journal of Computer Applications   2013 Vol.33 (12): 3326-3330 [Abstract] (735) [HTML 0 KB] [PDF 867 KB] (752)
3309 SHAN Zhichao JU Jianbo QU Xiaohui WEN Wei
  Calculation of submarine distribution probability in call searching submarine for several typical cases
    Journal of Computer Applications   2013 Vol.33 (11): 3309-3312 [Abstract] (616) [HTML 0 KB] [PDF 521 KB] (470)
3300 XIE Guocheng JIANG Yun CHEN Na
  New medical image classification approach based on hypersphere multi-class support vector data description
    Journal of Computer Applications   2013 Vol.33 (11): 3300-3304 [Abstract] (635) [HTML 0 KB] [PDF 800 KB] (472)
3296 WANG Lei CHEN Jindong PAN Feng
  Applications of gravitational search algorithm in parameters estimation of penicillin fermentation process model
    Journal of Computer Applications   2013 Vol.33 (11): 3296-3299 [Abstract] (519) [HTML 0 KB] [PDF 737 KB] (489)
3284 YANG Tongyao WANG Bin LI Chuan HE Bi XIONG Xin
  Real-time monitoring and warning system of tunnel strain based on improved principal component analysis method
    Journal of Computer Applications   2013 Vol.33 (11): 3284-3287 [Abstract] (649) [HTML 0 KB] [PDF 823 KB] (461)
3271 HE Chan LIU Wei
  Logistics service supply chain coordination based on forecast-commitment contract
    Journal of Computer Applications   2013 Vol.33 (11): 3271-3275 [Abstract] (597) [HTML 0 KB] [PDF 810 KB] (434)
3252 WANG Wei FU Xiaodong XIA Yongying TIAN Qiang LI Changzhi
  Score distribution method for Web service composition
    Journal of Computer Applications   2013 Vol.33 (11): 3252-3256 [Abstract] (683) [HTML 0 KB] [PDF 858 KB] (438)
3247 XU Jun
  About the secret sharing scheme applied in the Pi calculus
    Journal of Computer Applications   2013 Vol.33 (11): 3247-3251 [Abstract] (636) [HTML 0 KB] [PDF 796 KB] (389)
3239 CAI Jianzhang WEI Qiang ZHU Yuefei
  Identification of encrypted function in malicious software
    Journal of Computer Applications   2013 Vol.33 (11): 3239-3243 [Abstract] (604) [HTML 0 KB] [PDF 773 KB] (459)
3232 ZHANG Tao REN Shuai JU Yongfeng LING Rao YANG Zhaohui
  Secret information sharing algorithm based on CL multi-wavelet and combination bit plane for confidential communication
    Journal of Computer Applications   2013 Vol.33 (11): 3232-3234 [Abstract] (682) [HTML 0 KB] [PDF 490 KB] (477)
3224 HUANG Zhengxing SU Yang
  Network security situational assessment based on link performance analysis
    Journal of Computer Applications   2013 Vol.33 (11): 3224-3227 [Abstract] (566) [HTML 0 KB] [PDF 650 KB] (423)
3204 LI Gaoxi CAO Jun ZHANG Fuyuan LI Hua
  Iterative filtering algorithm for color image based on visual sensitivity and improved directional distance
    Journal of Computer Applications   2013 Vol.33 (11): 3204-3208 [Abstract] (681) [HTML 0 KB] [PDF 840 KB] (379)
3187 ZHANG Yi HUANG Cong LUO Yuan
  Behavior recognition in rehabilitation training based on modified naive bayes classifier
    Journal of Computer Applications   2013 Vol.33 (11): 3187-3189 [Abstract] (570) [HTML 0 KB] [PDF 638 KB] (609)
3167 WANG Hailing WANG Jian YIN Guisheng FU Qiao ZHOU Bo
  Multi-feature fusion method for mesh simplification
    Journal of Computer Applications   2013 Vol.33 (11): 3167-3171 [Abstract] (569) [HTML 0 KB] [PDF 780 KB] (474)
3160 WANG Fang LI Meian DUAN Weijun
  Cloud computing task scheduling based on dynamically adaptive ant colony algorithm
    Journal of Computer Applications   2013 Vol.33 (11): 3160-3162 [Abstract] (660) [HTML 0 KB] [PDF 621 KB] (548)
3149 HOU Yongsheng ZHAO Rongcai GAO Wei GAO Wei
  Single instruction multiple data vectorization of non-normalized loops
    Journal of Computer Applications   2013 Vol.33 (11): 3149-3154 [Abstract] (575) [HTML 0 KB] [PDF 948 KB] (414)
3138 ZHU Guoteng SUN Wei
  Rapid speech keyword spotting method based on template matching
    Journal of Computer Applications   2013 Vol.33 (11): 3138-3140 [Abstract] (698) [HTML 0 KB] [PDF 484 KB] (570)
3134 WU Jiehua
  TAN Model For Ties Prediction In Social Networks
    Journal of Computer Applications   2013 Vol.33 (11): 3134-3137 [Abstract] (604) [HTML 0 KB] [PDF 711 KB] (450)
3123 WU Jin ZHANG Guoliang TANG Wenjun SHUN Yijie
  Collision avoidance algorithm for multi-robot system based on improved artificial coordinating field
    Journal of Computer Applications   2013 Vol.33 (11): 3123-3128 [Abstract] (537) [HTML 0 KB] [PDF 895 KB] (435)
3107 ZHANG Yanliang CHEN Xin LI Yadong
  Modified method for wavelet neural network model
    Journal of Computer Applications   2013 Vol.33 (11): 3107-3110 [Abstract] (565) [HTML 0 KB] [PDF 757 KB] (467)
3097 CHEN Dayao CHEN Xiuhong
  Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding
    Journal of Computer Applications   2013 Vol.33 (11): 3097-3101 [Abstract] (695) [HTML 0 KB] [PDF 733 KB] (438)
3094 LI Taiyong WANG Huijun WU Jiang ZHANG Zhilin TANG Changjie
  Sparse Bayesian learning for credit risk evaluation
    Journal of Computer Applications   2013 Vol.33 (11): 3094-3096 [Abstract] (947) [HTML 0 KB] [PDF 609 KB] (509)
3080 SHI Qingwei LI Yanni GUO Pengliang
  Dynamic finding of authors‘ research interests in scientific literature
    Journal of Computer Applications   2013 Vol.33 (11): 3080-3083 [Abstract] (670) [HTML 0 KB] [PDF 534 KB] (452)
3049 DONG Lin SHU Hong
  Incremental maintenance of discovered spatial association rules
    Journal of Computer Applications   2013 Vol.33 (11): 3049-3051 [Abstract] (722) [HTML 0 KB] [PDF 687 KB] (474)
3035 ZHAO Huaqiong TANG Xuewen
  Evaluation model of network service performance based on fuzzy analytic hierarchy process
    Journal of Computer Applications   2013 Vol.33 (11): 3035-3038 [Abstract] (641) [HTML 0 KB] [PDF 635 KB] (478)
3032 BIAN Hongyu WANG Junlin
  Wideband estimating signal parameters via rotational invariance technique algorithm based on spatial-temporal discrete Fourier transformation projection
    Journal of Computer Applications   2013 Vol.33 (11): 3032-3034 [Abstract] (579) [HTML 0 KB] [PDF 610 KB] (352)
3024 XU Xiulan LI Keqing HUANG Yuyue
  Efficient node deployment algorithm based on dynamic programming in wireless sensor networks
    Journal of Computer Applications   2013 Vol.33 (11): 3024-3027 [Abstract] (578) [HTML 0 KB] [PDF 785 KB] (433)
3010 SONG Yan FU Qian
  Network proxy research and implementation for Internet of things applications based on constrained application protocol
    Journal of Computer Applications   2013 Vol.33 (11): 3010-3015 [Abstract] (678) [HTML 0 KB] [PDF 964 KB] (550)
3000 DENG Tao YAO Hong PAN Yunliang
  Adaptive dynamic surface control for a class of high-order stochastic nonlinear systems
    Journal of Computer Applications   2013 Vol.33 (10): 3000-3004 [Abstract] (518) [HTML 0 KB] [PDF 619 KB] (510)
2981 ZHANG Yang WANG Chen
  Spatial data visualization based on cluster analysis
    Journal of Computer Applications   2013 Vol.33 (10): 2981-2983 [Abstract] (730) [HTML 1 KB] [PDF 695 KB] (1080)
2996 LI Mansi SHANG Yongshuang ZHANG Yongyu
  Carrier aircrafts operational readiness based on condition-based maintenance
    Journal of Computer Applications   2013 Vol.33 (10): 2996-2999 [Abstract] (639) [HTML 0 KB] [PDF 654 KB] (548)
2984 LYU Rui SUN Linfu LIU Shuya
  Research on form dynamic configuration technology for industrial-chain coordination SaaS platform
    Journal of Computer Applications   2013 Vol.33 (10): 2984-2988 [Abstract] (607) [HTML 0 KB] [PDF 767 KB] (673)
2977 YANG Xiaoyan CUI Bingmei
  Molten iron transportation scheduling optimization and simulation of iron and steel enterprises
    Journal of Computer Applications   2013 Vol.33 (10): 2977-2980 [Abstract] (707) [HTML 0 KB] [PDF 618 KB] (623)
2960 LU Zhigang ZHU Wenjin
  Profit distribution for information production supply chain based on modified interval-valued fuzzy Shapley value
    Journal of Computer Applications   2013 Vol.33 (10): 2960-2963 [Abstract] (590) [HTML 0 KB] [PDF 576 KB] (559)
2954 LUO Biao YAN Weiwei WAN Liang
  Customer value classification model and application based on analytic network process and K-means clustering
    Journal of Computer Applications   2013 Vol.33 (10): 2954-2959 [Abstract] (643) [HTML 0 KB] [PDF 926 KB] (780)
2950 HE Wei XU Fuyuan
  Inventory model for promotional merchandise with time-dependent partial backlogging rate and inventory-level-dependent demand rate
    Journal of Computer Applications   2013 Vol.33 (10): 2950-2953 [Abstract] (607) [HTML 0 KB] [PDF 564 KB] (639)
2931 GENG Hai HE Xiaowei FAN Junli
  Image denoising algorithm with variable exponent regularization and L1 fidelity
    Journal of Computer Applications   2013 Vol.33 (10): 2931-2934 [Abstract] (715) [HTML 0 KB] [PDF 678 KB] (591)
2918 JIANG Aiwen LIU Changhong WANG Mingwen
  Video jitter detection algorithm based on forward-backward optical flow point matching motion entropy
    Journal of Computer Applications   2013 Vol.33 (10): 2918-2921 [Abstract] (531) [HTML 0 KB] [PDF 671 KB] (725)
2895 XIA Xiaoluan DENG Hongxia LI Haifang
  Application of PCNN with the improved traversal process in image processing
    Journal of Computer Applications   2013 Vol.33 (10): 2895-2898 [Abstract] (662) [HTML 0 KB] [PDF 742 KB] (580)
2874 SHAO Nan ZHANG Ke
  Image recognition algorithm based on projection entropy
    Journal of Computer Applications   2013 Vol.33 (10): 2874-2877 [Abstract] (822) [HTML 0 KB] [PDF 597 KB] (570)
2868 QI Ke XIE Dongqing
  Universal steganalysis for RGB images based on color gradient matrix
    Journal of Computer Applications   2013 Vol.33 (10): 2868-2870 [Abstract] (621) [HTML 0 KB] [PDF 588 KB] (699)
2865 ZHANG Wenquan ZHANG Ye ZHOU Nanrun
  Nonlinear image encryption algorithm based on random fractional Mellin transform
    Journal of Computer Applications   2013 Vol.33 (10): 2865-2867 [Abstract] (759) [HTML 0 KB] [PDF 643 KB] (679)
2846 YE Xiaolong LAN Julong GUO Tong
  Network anomaly detection method based on principle component analysis and tabu search and decision tree classification
    Journal of Computer Applications   2013 Vol.33 (10): 2846-2850 [Abstract] (614) [HTML 0 KB] [PDF 987 KB] (860)
2838 ZHOU Yingjie JIAO Chengbo CHEN Huinan MA Li HU Guangmin
  Traffic behavior feature based DoSⅅoS attack detection and abnormal flow identification for backbone networks
    Journal of Computer Applications   2013 Vol.33 (10): 2838-2841 [Abstract] (879) [HTML 0 KB] [PDF 808 KB] (801)
2832 LUO Wenjun XU Min
  Attribute-based encryption and re-encryption key management in cloud computing
    Journal of Computer Applications   2013 Vol.33 (10): 2832-2834 [Abstract] (646) [HTML 0 KB] [PDF 661 KB] (740)
2807 XU Jianmin SUN Xiaolei WU Guifang
  Dynamic model combining with time facter for event tracking
    Journal of Computer Applications   2013 Vol.33 (10): 2807-2810 [Abstract] (574) [HTML 0 KB] [PDF 775 KB] (592)
2787 ZHANG Binlian XU Hongzhi
  On-line energy-aware scheduling algorithm in multiprocessor system
    Journal of Computer Applications   2013 Vol.33 (10): 2787-2791 [Abstract] (546) [HTML 0 KB] [PDF 823 KB] (699)
2783 Liang DENG XU Chuanfu LIU Wei ZHANG Lilun
  Parallelization and optimization of alternating direction implicit CFD solver on GPU
    Journal of Computer Applications   2013 Vol.33 (10): 2783-2786 [Abstract] (730) [HTML 0 KB] [PDF 594 KB] (707)
2778 ZHU Dongfang SU Qunxing LIU Pengyuan
  Key technology of cloud simulation for distributed virtual maintenance training system
    Journal of Computer Applications   2013 Vol.33 (10): 2778-2782 [Abstract] (519) [HTML 0 KB] [PDF 1008 KB] (659)
2772 WANG Jiajing ZENG Hui HE Tengjiao ZHANG Na
  Virtual machine placement and optimization for data center
    Journal of Computer Applications   2013 Vol.33 (10): 2772-2777 [Abstract] (788) [HTML 0 KB] [PDF 944 KB] (825)
2769 LI Yanmin YI Qingming SHI Min
  High-sensitive GPS signal acquisition method based on wavelet filtering
    Journal of Computer Applications   2013 Vol.33 (10): 2769-2771 [Abstract] (755) [HTML 0 KB] [PDF 622 KB] (697)
2765 ZHU Hongbo ZHANG Tianqi WANG Zhichao LI Junwei
  Algorithm for modulation recognition based on cumulants in Rayleigh channel
    Journal of Computer Applications   2013 Vol.33 (10): 2765-2768 [Abstract] (612) [HTML 0 KB] [PDF 563 KB] (857)
2739 ZHANG Kunfeng GUO Ying ZHANG Guoxiang ZHAO Yang
  Demodulation algorithm design of VHF data broadcast signal
    Journal of Computer Applications   2013 Vol.33 (10): 2739-2741 [Abstract] (689) [HTML 0 KB] [PDF 535 KB] (706)
2711 YANG Xiaoliang YE Ayong LING Yuanjing
  Indoor localization algorithm based on threshold classification and signal strength weighting
    Journal of Computer Applications   2013 Vol.33 (10): 2711-2714 [Abstract] (678) [HTML 0 KB] [PDF 620 KB] (935)
2683 ZHAO Wendian DENG Zhensheng
  Improved fuzzy level set method for automatic MR image segmentation based on edge competition
    Journal of Computer Applications   2013 Vol.33 (09): 2683-2685 [Abstract] (765) [HTML 1 KB] [PDF 684 KB] (394)
2679 YANG Zhi LUO Guo YUAN Fangfang
  Application of adaptive wavelet scalogram threshold in diaphragmatic electromyographic signal denoising
    Journal of Computer Applications   2013 Vol.33 (09): 2679-2682 [Abstract] (623) [HTML 1 KB] [PDF 599 KB] (516)
2675 WUQian JIA Jing CAO Ruifen PEI Xi WU Aidong WU Yichan FDS Team
  Application of three-dimensional medical image registration algorithm in image-guided radiotherapy
    Journal of Computer Applications   2013 Vol.33 (09): 2675-2678 [Abstract] (776) [HTML 1 KB] [PDF 714 KB] (519)
2667 CHEN Dayao CHEN Weiqi CHEN Xiuhong
  Face recognition based on complete orthogonal neighbourhood preserving discriminant embedding
    Journal of Computer Applications   2013 Vol.33 (09): 2667-2670 [Abstract] (804) [HTML 1 KB] [PDF 742 KB] (456)
2662 LIU Jinming WANG Kuanquan
  School of Computer Science and Technology, Harbin Institute of Technology, Harbin Heilongjiang 150001, China
    Journal of Computer Applications   2013 Vol.33 (09): 2662-2666 [Abstract] (610) [HTML 1 KB] [PDF 872 KB] (633)
2658 WEN Hui CHEN Yufei WANG Zhicheng ZHAO Xiaodong YUE Xiaodong
  Liver segmentation method based on hierarchical vascular tree
    Journal of Computer Applications   2013 Vol.33 (09): 2658-2661 [Abstract] (712) [HTML 1 KB] [PDF 663 KB] (442)
2653 WANG Bin ZHOU Xuemei SHENG Jingfang
  Health degree evaluation model of miners escaping from a mine fire
    Journal of Computer Applications   2013 Vol.33 (09): 2653-2657 [Abstract] (651) [HTML 1 KB] [PDF 748 KB] (429)
2610 LI Hongsheng XUE Yueju HUANG Xiaolin HUANG Ke HE Jinhui
  Improved object detection method of adaptive Gaussian mixture model
    Journal of Computer Applications   2013 Vol.33 (09): 2610-2613 [Abstract] (655) [HTML 1 KB] [PDF 659 KB] (538)
2595 REN Zhong LIU Ying LIU Guodong HUANG Zhen
  Improved wavelet denoising with dual-threshold and dual-factor function
    Journal of Computer Applications   2013 Vol.33 (09): 2595-2598 [Abstract] (717) [HTML 1 KB] [PDF 632 KB] (483)
2588 CHEN Zhongqiu SHI Rui LIU Jingmiao
  Color image denoising based on Gaussian weighting and manifold for high fidelity
    Journal of Computer Applications   2013 Vol.33 (09): 2588-2591 [Abstract] (625) [HTML 1 KB] [PDF 822 KB] (493)
2580 ZHANG Jun LI Hui
  Mathematical model for reconstructing luminance distribution of the projector-screen system
    Journal of Computer Applications   2013 Vol.33 (09): 2580-2583 [Abstract] (674) [HTML 1 KB] [PDF 649 KB] (831)
2577 ZHUANG Yanbin GUI Yuan XIAO Xianjian
  Compressed Video Sensing Method Based on Motion Estimation and Backtracking based Adaptive Orthogonal Matching Pursuit
    Journal of Computer Applications   2013 Vol.33 (09): 2577-2579 [Abstract] (638) [HTML 1 KB] [PDF 649 KB] (692)
2557 WANG Jianlong SUN Heming
  Study Knapsack Problem Based On Greedy Discrete Electromagnetism-like Mechanism Algorithm
    Journal of Computer Applications   2013 Vol.33 (09): 2557-2561 [Abstract] (630) [HTML 1 KB] [PDF 678 KB] (458)
2550 LI Guozhu
  Real-coded quantum evolutionary algorithm based on cloud model
    Journal of Computer Applications   2013 Vol.33 (09): 2550-2552 [Abstract] (638) [HTML 1 KB] [PDF 632 KB] (598)
2540 QIU Yunfei LIN Mingming SHAO Liangshan
  Establishment and application of consumption sentiment ontology library based on three-dimensional coordinate
    Journal of Computer Applications   2013 Vol.33 (09): 2540-2545 [Abstract] (614) [HTML 1 KB] [PDF 925 KB] (720)
2529 YAN Lixia XIAO Mingbo
  Digital watermarking protocol based on El Gamal algorithm
    Journal of Computer Applications   2013 Vol.33 (09): 2529-2531 [Abstract] (821) [HTML 1 KB] [PDF 623 KB] (528)
2520 ZHANG Guimin LI Qingbao WANG Wei ZHU Yi
  Software tamper resistance based on function-level control-flow monitoring
    Journal of Computer Applications   2013 Vol.33 (09): 2520-2524 [Abstract] (773) [HTML 1 KB] [PDF 798 KB] (573)
2511 REN Zhiyu CHEN Xingyuan SHAN Dibin
  Cross-domain authorization management model based on two-tier role mapping
    Journal of Computer Applications   2013 Vol.33 (09): 2511-2515 [Abstract] (601) [HTML 1 KB] [PDF 785 KB] (434)
2493 LIU Xueqiong WU Gang DENG Houping
  Data deduplication in Web information integration
    Journal of Computer Applications   2013 Vol.33 (09): 2493-2496 [Abstract] (624) [HTML 1 KB] [PDF 645 KB] (426)
2470 TANG Jie HUANG Hongguang
  Three dimensional localization algorithm for wireless sensor networks based on projection and grid scan
    Journal of Computer Applications   2013 Vol.33 (09): 2470-2473 [Abstract] (651) [HTML 1 KB] [PDF 561 KB] (388)
2460 TONG Yinghua GENG Shengling
  Signal decomposition algorithm for reducing peak-to-average power ratio of OFDM
    Journal of Computer Applications   2013 Vol.33 (09): 2460-2462 [Abstract] (625) [HTML 1 KB] [PDF 393 KB] (532)
2455 LI Zhen ZHU Lei CHEN Xushan JIANG Haixia
  Joint call admission control algorithm based on reputation model
    Journal of Computer Applications   2013 Vol.33 (09): 2455-2459 [Abstract] (648) [HTML 1 KB] [PDF 721 KB] (373)
2432 LAN Zhongzhou LE Lihua GAO Yun
  Numerical simulation of one-dimensional Burgers' equation based on lattice Boltzmann method
    Journal of Computer Applications   2013 Vol.33 (09): 2432-2435 [Abstract] (716) [HTML 1 KB] [PDF 482 KB] (535)
2428 WEI Haoyang ZENG Guosun DING Chunling
  Parallel computing and numerical analysis of laminar diffusion combustion on GPU
    Journal of Computer Applications   2013 Vol.33 (09): 2428-2431 [Abstract] (636) [HTML 1 KB] [PDF 712 KB] (455)
2423 YANG Lipeng CHE Yonggang
  HDF5 based parallel I/O technology for structure grid CFD applications
    Journal of Computer Applications   2013 Vol.33 (09): 2423-2427 [Abstract] (702) [HTML 1 KB] [PDF 791 KB] (573)
2404 FANG Juan GUO Mei DU Wenjuan LEI Ding
  Low-power oriented cache design for multi-core processor
    Journal of Computer Applications   2013 Vol.33 (09): 2404-2409 [Abstract] (757) [HTML 1 KB] [PDF 880 KB] (487)
2194 LI Zhean CHEN Jianping ZHANG Yajuan ZHAO Weihua
  Robust feature selection method in high-dimensional data mining
    Journal of Computer Applications   2013 Vol.33 (08): 2194-2197 [Abstract] (1039) [HTML 1 KB] [PDF 811 KB] (872)
2394 HAN Liang PU Xiujuan
  Extraction of fetal electrocardiogram signal utilizing blind source separation based on time-frequency distributions and wavelet packet denoising
    Journal of Computer Applications   2013 Vol.33 (08): 2394-2396 [Abstract] (616) [HTML 0 KB] [PDF 629 KB] (442)
2387 ZHANG Zongnian LI Jinhui HUANG Rentai YAN Jingwen
  Iterative Hard Thresholding Orthogonal Projection under Cosparsity Analysis Model
    Journal of Computer Applications   2013 Vol.33 (08): 2387-2389 [Abstract] (474) [HTML 0 KB] [PDF 624 KB] (421)
2383 LINJingdong WANG Wei LIAO Xiaoyong
  Method for music soft-cutting and classification in rough-emotion area
    Journal of Computer Applications   2013 Vol.33 (08): 2383-2386 [Abstract] (533) [HTML 0 KB] [PDF 625 KB] (444)
2379 HAN Guanghui ZENG Cheng
  Research on function shift in Boyer-Moore algorithm
    Journal of Computer Applications   2013 Vol.33 (08): 2379-2382 [Abstract] (589) [HTML 0 KB] [PDF 536 KB] (366)
2375 Li-Xia LIU ZHANG Zhiqiang
  Similar string search algorithm based on Trie tree
    Journal of Computer Applications   2013 Vol.33 (08): 2375-2378 [Abstract] (787) [HTML 0 KB] [PDF 651 KB] (524)
2177 WANG Zhe GAO Sanhong ZHENG Huiying LI Lichun
  Parallel Delaunay algorithm design in lunar surface terrain reconstruction system
    Journal of Computer Applications   2013 Vol.33 (08): 2177-2183 [Abstract] (827) [HTML 1 KB] [PDF 1078 KB] (686)
2289 MO Dongcheng LIU Guodong
  Improved RRT-Connect path planning algorithm for biped robot
    Journal of Computer Applications   2013 Vol.33 (08): 2289-2292 [Abstract] (1254) [HTML 0 KB] [PDF 622 KB] (603)
2253 PENG Shuo OUYANG Aijia YUE Guangxue HE Minghua ZHOU Xu
  Improved glowworm swarm optimization algorithm for high-dimensional functions
    Journal of Computer Applications   2013 Vol.33 (08): 2253-2256 [Abstract] (846) [HTML 1 KB] [PDF 700 KB] (660)
2359 XIONG Ping LU Hua
  Modified 3D facial reconstruction algorithm based on a single photo
    Journal of Computer Applications   2013 Vol.33 (08): 2359-2361 [Abstract] (812) [HTML 0 KB] [PDF 663 KB] (585)
2341 LU Jun GAO Le ZHANG Xin
  Color clustering method for high and low intensity stripes of color structured light system
    Journal of Computer Applications   2013 Vol.33 (08): 2341-2345 [Abstract] (600) [HTML 0 KB] [PDF 763 KB] (396)
2337 TAN Zhiying CHEN Ying FENG Yong SONG Xiaobo
  Learning optimal kernel mapping based on function space with dynamic parameters
    Journal of Computer Applications   2013 Vol.33 (08): 2337-2340 [Abstract] (732) [HTML 0 KB] [PDF 573 KB] (455)
2293 LI Qian DU Youtian XUE Jiao
  Web video classification based on bidirectional propagation of heterogeneous attributes
    Journal of Computer Applications   2013 Vol.33 (08): 2293-2296 [Abstract] (494) [HTML 0 KB] [PDF 707 KB] (437)
2250 WANG Yi DU Weizhang
  Security analysis and improvement of certificateless signature scheme without bilinear pairing
    Journal of Computer Applications   2013 Vol.33 (08): 2250-2252 [Abstract] (899) [HTML 1 KB] [PDF 467 KB] (523)
2232 JING Li ZHANG Hongjun
  Quantitative estimation of parameters in quantization modulation watermarking method of wavelet domain based on PSNR
    Journal of Computer Applications   2013 Vol.33 (08): 2232-2235 [Abstract] (554) [HTML 0 KB] [PDF 637 KB] (457)
2112 DU Peng BAI Guangwei SHEN Hang CAO Lei
  Energy-aware P2P data sharing mechanism for heterogeneous mobile terminals
    Journal of Computer Applications   2013 Vol.33 (08): 2112-2116 [Abstract] (942) [HTML 1 KB] [PDF 985 KB] (651)
2100 Fen LIU GE Guodong ZHAO Yu LIU Bingyang
  Associating User Mining of Location Group in The Mobile Communication Network
    Journal of Computer Applications   2013 Vol.33 (08): 2100-2103 [Abstract] (875) [HTML 1 KB] [PDF 675 KB] (638)
2059 CHEN Xiuliang LIANG Yingjie GUO Fuliang
  Fireworks simulation based on CUDA particle system
    Journal of Computer Applications   2013 Vol.33 (07): 2059-2062 [Abstract] (1236) [HTML 1 KB] [PDF 603 KB] (579)
2055 WU Youde ZHU Liuxian LI Bailin
  Dynamic simulation based on dyna971 for computer numerical control boring and milling machine
    Journal of Computer Applications   2013 Vol.33 (07): 2055-2058 [Abstract] (857) [HTML 1 KB] [PDF 736 KB] (484)
2051 CHU Caijun HU Dasha JIANG Yuming
  Contention management model based on relativity-detection of conflicts
    Journal of Computer Applications   2013 Vol.33 (07): 2051-2054 [Abstract] (823) [HTML 1 KB] [PDF 832 KB] (597)
2046 DU Kunping KANG Fei SHU Hui SUN Jing
  Behavior analysis technology of software network communication based on session association
    Journal of Computer Applications   2013 Vol.33 (07): 2046-2050 [Abstract] (632) [HTML 1 KB] [PDF 959 KB] (494)
2009 ZHANG Ning LIU Wenping
  Plant leaf recognition method based on clonal selection algorithm and K nearest neighbor
    Journal of Computer Applications   2013 Vol.33 (07): 2009-2013 [Abstract] (923) [HTML 1 KB] [PDF 782 KB] (704)
2005 GUO Qiumei HUANG Yuqing
  Unstructured road detection based on two-dimensional entropy and contour features
    Journal of Computer Applications   2013 Vol.33 (07): 2005-2008 [Abstract] (685) [HTML 1 KB] [PDF 640 KB] (601)
2002 DANG Xiangying BAO Rong JIANG Daihong
  GPU parallel implementation of edge-detection algorithm based on multidirectional linear gradient adjusted predictor
    Journal of Computer Applications   2013 Vol.33 (07): 2002-2004 [Abstract] (938) [HTML 1 KB] [PDF 630 KB] (578)
1984 LIU Heng ZHENG Quan QIN Long ZHAO Tianhao WANG Song
  Star pattern recognition algorithm of large field of view based on concentric circles segmentation
    Journal of Computer Applications   2013 Vol.33 (07): 1984-1987 [Abstract] (729) [HTML 1 KB] [PDF 706 KB] (476)
1938 LI Shuling LIU Rong ZHANG Liuqin LIU Hong
  Speech emotion recognition algorithm based on modified SVM
    Journal of Computer Applications   2013 Vol.33 (07): 1938-1941 [Abstract] (1264) [HTML 1 KB] [PDF 664 KB] (741)
1935 CHU Wen LI Yinguo XU Yang MENG Xiangtao
  Speaker recognition method based on utterance level principal component analysis
    Journal of Computer Applications   2013 Vol.33 (07): 1935-1937 [Abstract] (784) [HTML 1 KB] [PDF 635 KB] (599)
1930 LI Feng WANG Zhengqun XU Chunlin ZHOU Zhongxia XUE Wei
  Dimensionality reduction algorithm of local marginal Fisher analysis based on Mahalanobis distance
    Journal of Computer Applications   2013 Vol.33 (07): 1930-1934 [Abstract] (809) [HTML 1 KB] [PDF 778 KB] (534)
1926 GENG Huantong GAO Jun JIA Tingting WU Zhengxue
  Multi-objective particle swarm optimization method with balanced diversity and convergence
    Journal of Computer Applications   2013 Vol.33 (07): 1926-1929 [Abstract] (949) [HTML 1 KB] [PDF 724 KB] (556)
1917 SHAO Chao WAN Chunhong
  Manifold learning and visualization based on self-organizing map
    Journal of Computer Applications   2013 Vol.33 (07): 1917-1921 [Abstract] (930) [HTML 1 KB] [PDF 1010 KB] (597)
1912 GAO Qiankun WANG Yujun WANG Jingxiao
  New coordinate optimization method for non-smooth losses based on alternating direction method of multipliers
    Journal of Computer Applications   2013 Vol.33 (07): 1912-1916 [Abstract] (856) [HTML 1 KB] [PDF 628 KB] (521)
1908 LI Bo WANG Shi SHI Songxin HU Junyong
  Optimum packing of rectangles based on heuristic dynamic decomposition algorithm
    Journal of Computer Applications   2013 Vol.33 (07): 1908-1911 [Abstract] (1118) [HTML 1 KB] [PDF 597 KB] (556)
1898 ZHANG Liang XU ChengCheng TIAN Zheng LI Tao
  Hardware/software partitioning based on greedy algorithm and simulated annealing algorithm
    Journal of Computer Applications   2013 Vol.33 (07): 1898-1902 [Abstract] (920) [HTML 1 KB] [PDF 769 KB] (608)
1890 DU Xin LIU Dagang ZHANG Kaihuo SHEN Yuan ZHAO Kang NI Youcong
  Auto-clustering algorithm based on compute unified device architecture and gene expression programming
    Journal of Computer Applications   2013 Vol.33 (07): 1890-1893 [Abstract] (963) [HTML 1 KB] [PDF 718 KB] (582)
1870 LAI Zhongxi ZHANG Zhanjun TAO Dongya
  Algorithm for directly computing 7P elliptic curves and its application
    Journal of Computer Applications   2013 Vol.33 (07): 1870-1874 [Abstract] (836) [HTML 1 KB] [PDF 637 KB] (570)
1851 ZHANG Ji DU Xiaoni LI Xu LIN Jipo
  Security key pre-distribution scheme for wireless sensor networks
    Journal of Computer Applications   2013 Vol.33 (07): 1851-1853 [Abstract] (997) [HTML 1 KB] [PDF 604 KB] (717)
1839 WANG Zhen-chaoZhenchao GAO Yang XUE Wenling YANG Jianpo
  Echo cancellation technique solutions based on parallel filter
    Journal of Computer Applications   2013 Vol.33 (07): 1839-1841 [Abstract] (883) [HTML 1 KB] [PDF 469 KB] (483)
1828 WANG Zhichao ZHANG Tianqi WAN Yilong ZHU Hongbo
  Direction of arrival estimation of orthogonal frequency division multiplexing signal based on wideband focused matrix and higher-order cumulant
    Journal of Computer Applications   2013 Vol.33 (07): 1828-1832 [Abstract] (1006) [HTML 1 KB] [PDF 760 KB] (666)
1813 ZHAO Xin ZHANG Xin
  Inter-cluster routing algorithm in wireless sensor network based on game theory
    Journal of Computer Applications   2013 Vol.33 (07): 1813-1815 [Abstract] (1171) [HTML 1 KB] [PDF 623 KB] (594)
1805 MA Yubin XIE Zheng CHEN Zhi
  Shortest dynamic time flow problem in continuous-time capacitated network
    Journal of Computer Applications   2013 Vol.33 (07): 1805-1808 [Abstract] (797) [HTML 1 KB] [PDF 689 KB] (534)
1790 LAN Kun ZHANG Yue
  Application of Android in remote medical information system
    Journal of Computer Applications   2013 Vol.33 (06): 1790-1792 [Abstract] (1433) [HTML 1 KB] [PDF 511 KB] (1300)
1767 LIU Zunxiong HUANG Zhiqiang YAN Feng ZHANG Heng
  Financial failure prediction using support vector machine with Q-Gaussian kernel
    Journal of Computer Applications   2013 Vol.33 (06): 1767-1770 [Abstract] (822) [HTML 1 KB] [PDF 601 KB] (652)
1763 LUO Ya’nan FU Yongqing
  Path planning algorithm based on hierarchical road network
    Journal of Computer Applications   2013 Vol.33 (06): 1763-1766 [Abstract] (1030) [HTML 1 KB] [PDF 639 KB] (757)
1739 FENG Yangqin CHEN Fei
  Fast volume measurement algorithm based on image edge detection
    Journal of Computer Applications   2013 Vol.33 (06): 1739-1741 [Abstract] (804) [HTML 1 KB] [PDF 494 KB] (664)
1737 XIANG Yan HE Jianfeng MA Lei YI Sanli XU Jiaping
  New method for multiple sclerosis white matter lesions segmentation
    Journal of Computer Applications   2013 Vol.33 (06): 1737-1741 [Abstract] (939) [HTML 1 KB] [PDF 509 KB] (768)
1727 LI Chao LI Guangyao TAN Yunlan XU Xianglong
  Medical images fusion of nonsubsampled Contourlet transform and regional feature
    Journal of Computer Applications   2013 Vol.33 (06): 1727-1731 [Abstract] (881) [HTML 1 KB] [PDF 787 KB] (747)
1723 HUANG Kekun
  Regularized marginal Fisher analysis and sparse representation for face recognition
    Journal of Computer Applications   2013 Vol.33 (06): 1723-1726 [Abstract] (1026) [HTML 1 KB] [PDF 632 KB] (709)
1682 QIANG Zhenping LIU Hui SHANG Zhenhong CHEN Xu
  Improved foreground detection based on statistical model
    Journal of Computer Applications   2013 Vol.33 (06): 1682-1694 [Abstract] (657) [HTML 1 KB] [PDF 912 KB] (766)
1670 TIAN Yuanrong TIAN Song XU Yuelei ZHA Yufei
  Image object detection based on local feature and sparse representation
    Journal of Computer Applications   2013 Vol.33 (06): 1670-1673 [Abstract] (735) [HTML 1 KB] [PDF 649 KB] (828)
1665 CHEN Xueling ZHAO Chunhui LI Yaojun CHENG Yongmei
  Multi-feature suitability analysis of matching area based on D-S theory
    Journal of Computer Applications   2013 Vol.33 (06): 1665-1669 [Abstract] (666) [HTML 1 KB] [PDF 798 KB] (750)
1642 XU Kaiyong FANG Ming YANG Tianchi MENG Fanwei HUANG Huixin
  Value-at-risk quantitative method about password chip under differential power analysis attacks
    Journal of Computer Applications   2013 Vol.33 (06): 1642-1645 [Abstract] (913) [HTML 1 KB] [PDF 673 KB] (884)
1612 CHEN Shanshan
  Trust model based on weight factor in P2P network
    Journal of Computer Applications   2013 Vol.33 (06): 1612-1614 [Abstract] (802) [HTML 1 KB] [PDF 461 KB] (765)
1600 MAO Wentao ZHAO Zhongtang HE Huanhuan
  Model selection of extreme learning machine based on latent feature space
    Journal of Computer Applications   2013 Vol.33 (06): 1600-1603 [Abstract] (863) [HTML 1 KB] [PDF 623 KB] (770)
1574 YANG Ligong ZHU Jian TANG Shiping
  Survey of text sentiment analysis
    Journal of Computer Applications   2013 Vol.33 (06): 1574-1607 [Abstract] (1305) [HTML 1 KB] [PDF 987 KB] (3987)
1571 PENG Fuming YAO Min BAI Shunke
  Convergence analysis of general evolutionary algorithms
    Journal of Computer Applications   2013 Vol.33 (06): 1571-1573 [Abstract] (781) [HTML 1 KB] [PDF 436 KB] (709)
1566 FENG Dengke RUAN Qi DU Limin
  Binary cuckoo search algorithm
    Journal of Computer Applications   2013 Vol.33 (06): 1566-1570 [Abstract] (1343) [HTML 1 KB] [PDF 797 KB] (951)
1563 GUO Xin SUN Lijie LI Guangming JIANG Kaizhong
  Discrete free search algorithm
    Journal of Computer Applications   2013 Vol.33 (06): 1563-1570 [Abstract] (685) [HTML 1 KB] [PDF 572 KB] (681)
1548 GAO Wenchao ZHOU Qiang QIAN Xu CAI Yici
  Chip layer assignment method for analytical placement of 3D ICs
    Journal of Computer Applications   2013 Vol.33 (06): 1548-1552 [Abstract] (857) [HTML 1 KB] [PDF 736 KB] (777)
1540 FU Jiyun JIA Weile CAO Zongyan WANG Long YE Huang CHI Xuebin
  First-principle nonlocal projector potential calculation on GPU cluster
    Journal of Computer Applications   2013 Vol.33 (06): 1540-1552 [Abstract] (1207) [HTML 1 KB] [PDF 793 KB] (754)
1527 ZHU Shibing JIN Jie SU Hansong CUI Ya'nan
  Femtocell downlink power control algorithm in long term evolution
    Journal of Computer Applications   2013 Vol.33 (06): 1527-1530 [Abstract] (1232) [HTML 1 KB] [PDF 540 KB] (859)
1505 DONG Ting
  Opportunistic routing strategy based on local information in mobile sensor networks
    Journal of Computer Applications   2013 Vol.33 (06): 1505-1518 [Abstract] (833) [HTML 1 KB] [PDF 675 KB] (924)
1508 JIANG Shan QIU Hongbing HAN Xu
  Sparsity adaptive matching pursuit algorithm based on adaptive threshold for OFDM sparse channel estimation
    Journal of Computer Applications   2013 Vol.33 (06): 1508-1514 [Abstract] (982) [HTML 1 KB] [PDF 592 KB] (772)
1334 ZHANG Yongjun LIU Jinling
  Spam short message classifier model based on word terms
    Journal of Computer Applications   2013 Vol.33 (05): 1334-1337 [Abstract] (920) [HTML 1 KB] [PDF 575 KB] (783)
1330 ZHANG Wei HUANG Wei XIA Limin
  Recommendation research based on general content probabilistic latent semantic analysis model
    Journal of Computer Applications   2013 Vol.33 (05): 1330-1333 [Abstract] (686) [HTML 1 KB] [PDF 587 KB] (620)
1446 XIANG Wei
  Automated debug for common information model defect using natural language processing algorithm
    Journal of Computer Applications   2013 Vol.33 (05): 1446-1449 [Abstract] (836) [HTML 1 KB] [PDF 656 KB] (643)
1473 HU Liaolin ZHANG Weichao HUA Dengxin WANG Li DI Huige
  Dynamic demodulation of fiber Bragg grating sensing based on LabVIEW
    Journal of Computer Applications   2013 Vol.33 (05): 1473-1475 [Abstract] (931) [HTML 1 KB] [PDF 488 KB] (771)
1463 XIANG Rong ZHOU Huijuan
  Automatic on-screen-display verification system based on Gabor features and BP neural network
    Journal of Computer Applications   2013 Vol.33 (05): 1463-1466 [Abstract] (946) [HTML 1 KB] [PDF 638 KB] (14024)
1233 GU Fanglin ZHANG Hang LI Lunhui
  Adaptive variable step-size blind source separation algorithm based on nonlinear principal component analysis
    Journal of Computer Applications   2013 Vol.33 (05): 1233-1236 [Abstract] (817) [HTML 1 KB] [PDF 591 KB] (747)
1230 GUO Jiantao WANG Lin
  Spectrogram analysis of frequency-hopping signals based on entropy measure
    Journal of Computer Applications   2013 Vol.33 (05): 1230-1236 [Abstract] (982) [HTML 1 KB] [PDF 594 KB] (927)
1217 DAI Li SHU Hui HUANG Hejie
  Network protocol reverse parsing technique based on dataflow analysis
    Journal of Computer Applications   2013 Vol.33 (05): 1217-1221 [Abstract] (912) [HTML 1 KB] [PDF 825 KB] (873)
1317 ZHANG Weiping REN Xuefei LI Guoqiang NIU Peifeng
  Improved gravitation search algorithm and its application to function optimization
    Journal of Computer Applications   2013 Vol.33 (05): 1317-1320 [Abstract] (1026) [HTML 1 KB] [PDF 606 KB] (830)
1298 YANG Xiaofang NI Jianjun
  Multi-robot formation based on biological inspired neural network
    Journal of Computer Applications   2013 Vol.33 (05): 1298-1304 [Abstract] (686) [HTML 1 KB] [PDF 566 KB] (707)
1386 LIU Kui LIANG Xiangqian LI Xiaolin
  Concurrent signature scheme constructed by identity-based ring signcryption
    Journal of Computer Applications   2013 Vol.33 (05): 1386-1390 [Abstract] (851) [HTML 1 KB] [PDF 812 KB] (648)
1382 TONG Ruiyang MENG Qingxian CHEN Ming
  Effective and secure identity-based hybrid signcryption scheme
    Journal of Computer Applications   2013 Vol.33 (05): 1382-1393 [Abstract] (789) [HTML 1 KB] [PDF 815 KB] (601)
1378 HE Junjie WANG Juan QI Chuanda
  Cryptanalysis and improvement of a certificateless signature scheme
    Journal of Computer Applications   2013 Vol.33 (05): 1378-1381 [Abstract] (1180) [HTML 1 KB] [PDF 643 KB] (754)
1374 XIAO Zhenjiu HU Chi CHEN Hong
  Research and implementation of four-prime RSA digital signature algorithm
    Journal of Computer Applications   2013 Vol.33 (05): 1374-1377 [Abstract] (875) [HTML 1 KB] [PDF 629 KB] (645)
1357 ZHANG Zongfei
  Feature selection for network intrusion detection based on quantum evolutionary algorithm
    Journal of Computer Applications   2013 Vol.33 (05): 1357-1361 [Abstract] (800) [HTML 1 KB] [PDF 771 KB]