[1] |
JIANG Bin, LIANG Xiao’an, ZHANG Liang, GAO Yangjun.
Evidence Combination Method Based on Improved Modified Weight
[J]. Computer Engineering and Applications, 2021, 57(24): 100-106.
|
[2] |
LIU Xiaoya, WANG Yingming.
Research on Personal Credit Scoring Based on SVM Ensemble
[J]. Computer Engineering and Applications, 2020, 56(14): 272-278.
|
[3] |
LUO Lan, XIAO Jianyu.
Conflict Evidence Synthesis Method of Effective Discount Evidence Sources
[J]. Computer Engineering and Applications, 2019, 55(4): 154-158.
|
[4] |
LI Guo, MA Chunyang, MA Jianxiao.
Fusion Fault Diagnosis Using DPCA & Improved Evidence Theory
[J]. Computer Engineering and Applications, 2019, 55(20): 197-201.
|
[5] |
LI Juan, YOU Xiaoming, LIU Sheng, CHEN Jia.
Adaptive Fuzzy Ant Colony System
[J]. Computer Engineering and Applications, 2019, 55(15): 75-81.
|
[6] |
SHENG Xiaoxia1, YANG Zhimin2, WANG Tiantian1.
DP Clustering, Creditability Weighted Fuzzy Support Vector Machine
[J]. Computer Engineering and Applications, 2019, 55(10): 169-178.
|
[7] |
YANG Zhimin1, WANG Tiantian2, SHAO Yuanhai1.
Weighted fuzzy support vector machine faced on fuzzy membership of imbalanced classification
[J]. Computer Engineering and Applications, 2018, 54(2): 68-75.
|
[8] |
LIU Hanqiang, ZHAO Jing.
Semi-supervised color image segmentation with superpixels and spectral clustering
[J]. Computer Engineering and Applications, 2018, 54(14): 186-190.
|
[9] |
YAN Zhijun, TAO Yang.
Conflict evidence combination rule based on uncertainty measurement and evidence distance
[J]. Computer Engineering and Applications, 2018, 54(10): 54-58.
|
[10] |
TU Shijie1,2, CHEN Hang1, FENG Gang2.
Using evidence theory and fuzzy function to identify ballistic target
[J]. Computer Engineering and Applications, 2017, 53(6): 169-173.
|
[11] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[12] |
HU Qian, MI Jusheng.
Representation of multigranularity fuzzy rough sets and corresponding belief structure
[J]. Computer Engineering and Applications, 2017, 53(19): 51-54.
|
[13] |
ZHU Lun1, MA Qinggong2.
Decision-making method with regret theory under intuitionistic fuzzy information environment
[J]. Computer Engineering and Applications, 2017, 53(14): 123-129.
|
[14] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[15] |
PENG Yanfei, ZHOU Nan, LIN Sen.
Improved SLTP feature extraction algorithm for palmprint recognition
[J]. Computer Engineering and Applications, 2016, 52(5): 179-184.
|