[1] |
YANG Quan.
SVM Algorithm for N1+N2 Structure Syntax Relation Determination
[J]. Computer Engineering and Applications, 2021, 57(20): 104-108.
|
[2] |
AN Ning, JIANG Siyuan, TANG Chen, YANG Jiaoyun.
Clustering Method by Combining Simplex Mapping and Entropy Weighting
[J]. Computer Engineering and Applications, 2020, 56(9): 148-155.
|
[3] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[4] |
LI Jinhai, HE Youshi, MA Yunlei, ZHOU Aiping.
Research of Universal Model for Knowledge Representation Based on Multi-layer Domain Ontology
[J]. Computer Engineering and Applications, 2020, 56(11): 149-155.
|
[5] |
PENG Shouzhen.
Pythagorean Fuzzy Decision-Making Model Based on Information Measures and Its Application
[J]. Computer Engineering and Applications, 2019, 55(19): 185-190.
|
[6] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[7] |
ZHAO Juping, LI Fengjun.
Similarity Measurement of Vague Set(Value)
[J]. Computer Engineering and Applications, 2019, 55(15): 69-74.
|
[8] |
QU Hanhua1, HUI Jianzhong1, HE Xianfeng2, WANG Muhua1, HE Xiaofeng1, FENG De’en1.
Formal concept analysis model of meteorological services
[J]. Computer Engineering and Applications, 2018, 54(9): 257-264.
|
[9] |
YOU Yun1,2,3, WAN Changxuan1,3, CHEN Huangye1,3.
Diversified commodity recommendation method considering correlation between objects
[J]. Computer Engineering and Applications, 2018, 54(7): 70-76.
|
[10] |
WANG Zhen.
Engineering change impact analysis based on design knowledge ontology
[J]. Computer Engineering and Applications, 2018, 54(5): 247-252.
|
[11] |
WANG Tiedan, ZHAO Yang, PENG Dinghong.
Research on cloud service safety evaluation based on improved IVHF-TODIM method
[J]. Computer Engineering and Applications, 2018, 54(4): 84-89.
|
[12] |
ZHU Wenyue,LIU Zongtian.
Emergency domain knowledge modeling based on event ontology
[J]. Computer Engineering and Applications, 2018, 54(21): 148-155.
|
[13] |
PENG Fei1, ZHANG Tao1, XU Weiguang1, ZHAO Min1, QIN Hengjia2.
Security policy generation model of operating system based on ontology
[J]. Computer Engineering and Applications, 2018, 54(2): 114-118.
|
[14] |
WANG Hong, ZHANG Hao, SHI Jinchuan.
Research on domain ontology concept acquisition method based on Latent Dirichlet Allocation
[J]. Computer Engineering and Applications, 2018, 54(13): 252-257.
|
[15] |
XIAO Zihan, GENG Xiuli, XU Shidong.
Uncertain multi attribute decision making method for large group based on cloud model
[J]. Computer Engineering and Applications, 2018, 54(11): 254-259.
|