[1] |
JIANG Bin, LIANG Xiao’an, ZHANG Liang, GAO Yangjun.
Evidence Combination Method Based on Improved Modified Weight
[J]. Computer Engineering and Applications, 2021, 57(24): 100-106.
|
[2] |
LIU Xiaoya, WANG Yingming.
Research on Personal Credit Scoring Based on SVM Ensemble
[J]. Computer Engineering and Applications, 2020, 56(14): 272-278.
|
[3] |
LUO Lan, XIAO Jianyu.
Conflict Evidence Synthesis Method of Effective Discount Evidence Sources
[J]. Computer Engineering and Applications, 2019, 55(4): 154-158.
|
[4] |
LI Guo, MA Chunyang, MA Jianxiao.
Fusion Fault Diagnosis Using DPCA & Improved Evidence Theory
[J]. Computer Engineering and Applications, 2019, 55(20): 197-201.
|
[5] |
YAN Zhijun, TAO Yang.
Conflict evidence combination rule based on uncertainty measurement and evidence distance
[J]. Computer Engineering and Applications, 2018, 54(10): 54-58.
|
[6] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[7] |
ZHU Lun1, MA Qinggong2.
Decision-making method with regret theory under intuitionistic fuzzy information environment
[J]. Computer Engineering and Applications, 2017, 53(14): 123-129.
|
[8] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[9] |
WANG Xinying, JIANG Zhiwei, CHEN Haiqun, WANG Kaiquan.
Study on pipeline leak diagnosis method based on SVM and DS theory
[J]. Computer Engineering and Applications, 2016, 52(5): 262-265.
|
[10] |
XU Shoukun, KONG Ying, SHI Lin, LI Ning.
Approach of activity recognition with complementary of D-S theory and ontology reasoning
[J]. Computer Engineering and Applications, 2016, 52(4): 6-12.
|
[11] |
MENG Chenchen, XIAO Jianyu.
Study on correction coefficient of D-S evidence combination rule
[J]. Computer Engineering and Applications, 2016, 52(19): 63-67.
|
[12] |
SUN Jinbo, YU Suihuai, CHEN Dengkai.
Object recognition method based on multi-feature fusion of D-S evidence theory
[J]. Computer Engineering and Applications, 2015, 51(9): 147-151.
|
[13] |
CHEN Jinguang1,2, ZHANG Fen1, MA Lili1.
Uncertainty measure method of evidence and its application
[J]. Computer Engineering and Applications, 2015, 51(23): 48-53.
|
[14] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Network security situation assessment model fusing multi-source data
[J]. Computer Engineering and Applications, 2015, 51(17): 96-101.
|
[15] |
WANG Yongwei1,2, LIU Yunan1,2, ZHAO Rongcai1, CHANG Dexian1,2, QIU Wei1,2.
Situation forecast model based on evidence theory optimization
[J]. Computer Engineering and Applications, 2015, 51(16): 63-69.
|