[1] |
LUO Huilan, PENG Shan, CHEN Hongkun.
Review on Latest Research Progress of Challenging Problems in Object Detection
[J]. Computer Engineering and Applications, 2021, 57(5): 36-46.
|
[2] |
YU Juan,LUO Shun.
Detection Method of Illegal Building Based on YOLOv5
[J]. Computer Engineering and Applications, 2021, 57(20): 236-244.
|
[3] |
YANG Hui, QUAN Jichuan, LIANG Xinyu, WANG Zhongwei.
Research Progress of Object Detection Based on Weakly Supervised Learning
[J]. Computer Engineering and Applications, 2021, 57(16): 40-49.
|
[4] |
LUO Hanwu, LI Wenzhen, PAN Fucheng, JU Xiaoming.
Progressive Adversarial Learning for Weakly Supervised Object Localization
[J]. Computer Engineering and Applications, 2021, 57(14): 187-193.
|
[5] |
ZHANG Yu, ZHANG Yansong.
Research on Vector Grouping Aggregation Technology
[J]. Computer Engineering and Applications, 2021, 57(11): 84-94.
|
[6] |
LI Mengmeng, SHAO Liangzhi, CUI Wenchao, SUN Shuifa.
Joint Bilateral Filtering Method for Ultrasound Image by Fisher-Tippett Distribution Fitting
[J]. Computer Engineering and Applications, 2020, 56(9): 221-227.
|
[7] |
CHEN Yingchun.
Fast Low-Light Image Enhancement Based on Tone Mapping
[J]. Computer Engineering and Applications, 2020, 56(9): 234-239.
|
[8] |
LIU Changyong, WANG Yihuai, CAI Chuanghua, JIANG Jianwu.
Anatomy of Real-Time Operating System mbedOS Startup Process
[J]. Computer Engineering and Applications, 2020, 56(20): 46-51.
|
[9] |
QIAN Man, ZHANG Xiangyang, LI Renchang.
Improved Convolutional Neural Network for SAR Image Despeckling Algorithm
[J]. Computer Engineering and Applications, 2020, 56(14): 176-182.
|
[10] |
DU De, GAO Baolu, TIAN Li.
Terrain Compression Rendering Technology Combining Fast Layered DCT and Dynamic LOD
[J]. Computer Engineering and Applications, 2020, 56(13): 223-229.
|
[11] |
WANG Like, CUI Xiaoli, ZHANG Lige.
Multi-attribute Filtering Deep Feature Synthesis Algorithm
[J]. Computer Engineering and Applications, 2020, 56(12): 169-174.
|
[12] |
ZHANG Guipeng, KUANG Zhenxi, CHEN Pinghua.
Cloud Storage Deduplication Scheme Using Signature and Hash Technology
[J]. Computer Engineering and Applications, 2020, 56(1): 76-82.
|
[13] |
ZHANG Kaibi, ZHOU Zhen, WEI Pengcheng, LI Li.
Multi-Keyword Verifiable Ciphertext Search Scheme in Outsourced Database
[J]. Computer Engineering and Applications, 2019, 55(17): 76-81.
|
[14] |
ZHOU Yipeng, MA Dongliang, SUN Jun.
Target Localization Based on Multi-Scale Feature Convolutional Neural Network
[J]. Computer Engineering and Applications, 2019, 55(16): 115-122.
|
[15] |
SU Qing, TANG Yihao, ZENG Yong’an, LIU Tiantian, ZHENG Liming.
Research on Real-Time Identification and Visualization Layout Algorithm for Single Linklist Structure
[J]. Computer Engineering and Applications, 2019, 55(16): 240-245.
|