[1] |
LAI Jun, WEI Jingyi, CHEN Xiliang.
Overview of Hierarchical Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(3): 72-79.
|
[2] |
YANG Quan.
SVM Algorithm for N1+N2 Structure Syntax Relation Determination
[J]. Computer Engineering and Applications, 2021, 57(20): 104-108.
|
[3] |
LIU Zihao, ZHAO Jin, LIU Chang, LAI Kuncheng, WANG Xiqiao.
Path Planning of Indoor Mobile Robot Based on Improved A* Algorithm
[J]. Computer Engineering and Applications, 2021, 57(2): 186-190.
|
[4] |
TAN Lixing, LU Jiaqi, ZHANG Xiaonan, LIU Yuhong, ZHANG Rongfen.
Improved Ghost Machine Gesture Interaction System Based on Lightweight OpenPose
[J]. Computer Engineering and Applications, 2021, 57(16): 159-166.
|
[5] |
WANG Faming, LI Jianwei, CHEN Sixi.
Overview of Research on 3D Human Pose Estimation
[J]. Computer Engineering and Applications, 2021, 57(10): 26-38.
|
[6] |
TENG Tong, SHEN Wenzhong, MAO Yunfeng.
Multi-task Iris Fast Location Method Based on Cascaded Neural Network
[J]. Computer Engineering and Applications, 2020, 56(12): 118-124.
|
[7] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[8] |
LI Jinhai, HE Youshi, MA Yunlei, ZHOU Aiping.
Research of Universal Model for Knowledge Representation Based on Multi-layer Domain Ontology
[J]. Computer Engineering and Applications, 2020, 56(11): 149-155.
|
[9] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[10] |
QU Hanhua1, HUI Jianzhong1, HE Xianfeng2, WANG Muhua1, HE Xiaofeng1, FENG De’en1.
Formal concept analysis model of meteorological services
[J]. Computer Engineering and Applications, 2018, 54(9): 257-264.
|
[11] |
YOU Yun1,2,3, WAN Changxuan1,3, CHEN Huangye1,3.
Diversified commodity recommendation method considering correlation between objects
[J]. Computer Engineering and Applications, 2018, 54(7): 70-76.
|
[12] |
WANG Zhen.
Engineering change impact analysis based on design knowledge ontology
[J]. Computer Engineering and Applications, 2018, 54(5): 247-252.
|
[13] |
ZHU Wenyue,LIU Zongtian.
Emergency domain knowledge modeling based on event ontology
[J]. Computer Engineering and Applications, 2018, 54(21): 148-155.
|
[14] |
PENG Fei1, ZHANG Tao1, XU Weiguang1, ZHAO Min1, QIN Hengjia2.
Security policy generation model of operating system based on ontology
[J]. Computer Engineering and Applications, 2018, 54(2): 114-118.
|
[15] |
SUN Chengcheng, XI Jingke, ZHAN Wenwei, LI Dong.
Hierarchical overlapping community detection algorithm based on maximum clique
[J]. Computer Engineering and Applications, 2018, 54(18): 105-109.
|