[1] |
ZHOU Wanying, MA Yingcang, XU Qiuxia, ZHENG Yi.
Unsupervised Feature Selection Algorithm Based on Maximum Entropy and [l2,0] Norm Constraints
[J]. Computer Engineering and Applications, 2020, 56(11): 51-59.
|
[2] |
YONG Qiaoling, YI Junyan.
Elastic Net Algorithm with Dynamic Characteristics for Clustering
[J]. Computer Engineering and Applications, 2019, 55(8): 102-109.
|
[3] |
CHEN Jianping, CHEN Qiqiang, FU Qiming, GAO Zhen, WU Hongjie, LU You.
Maximum Entropy Inverse Reinforcement Learning Based on Generative Adversarial Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 119-126.
|
[4] |
XIA Wuji1,2, HUAQUE Cairang1.
Research of tibetan personal pronouns anaphora resolution based on mixed strategy
[J]. Computer Engineering and Applications, 2018, 54(7): 66-69.
|
[5] |
SHAO Liangshan1, ZHAO Linlin1, WEN Tingxin2, KONG Xiangbo2.
Bidirectional projection method with interval-valued intuitionistic fuzzy number
[J]. Computer Engineering and Applications, 2017, 53(1): 83-86.
|
[6] |
WU Bin, MA Jitao, WU Ping.
Expert random selection algorithm based on information entropy
[J]. Computer Engineering and Applications, 2016, 52(5): 119-121.
|
[7] |
LIU Ying, WANG Nan.
Comparison of clause alignment based on maximum entropy model and Back Propagation neural network model
[J]. Computer Engineering and Applications, 2015, 51(7): 112-117.
|
[8] |
GULIZADA·Haisa1, GULILA·Altenbek2,3.
Research on automatic identification of base verb phrases in Kazakh
[J]. Computer Engineering and Applications, 2015, 51(2): 218-223.
|
[9] |
GU Jingjing, ZHOU Guodong.
Chinese comma classification based on segmentation and part of speech tagging
[J]. Computer Engineering and Applications, 2015, 51(18): 120-125.
|
[10] |
WU Peng.
Image segmentation method based on firefly algorithm and maximum entropy method
[J]. Computer Engineering and Applications, 2014, 50(12): 115-119.
|
[11] |
WANG Guoqiang, QU Jingying.
Improved watershed medical image segmentation method research
[J]. Computer Engineering and Applications, 2013, 49(8): 185-187.
|
[12] |
ZHENG Li, LV Xueqiang.
“N+V+N”、“V+N+N” structure phrase recognition in search engine query logs
[J]. Computer Engineering and Applications, 2013, 49(6): 143-147.
|
[13] |
SANG Haiyan1,2, Gulia·Altenbek1,2, NIU Ningning1,2.
Kazakh part-of-speech tagging method based on maximum entropy
[J]. Computer Engineering and Applications, 2013, 49(11): 126-129.
|
[14] |
Guljamal Mamateli1,Askar Rozi2,Askar Hamdulla1.
Hybrid algorithm of polyphonic word disambiguation in Uyghur language
[J]. Computer Engineering and Applications, 2011, 47(35): 158-160.
|
[15] |
ZHANG Xinjuan,LEI Xiujuan.
Application of improved PSO algorithm on two dimension best threshold image segmentation
[J]. Computer Engineering and Applications, 2011, 47(26): 207-209.
|