[1] |
HUANG Yilei, XIA Zhijie, WANG Yiming.
Research on False Information Dissemination Model of Strong-Ties Social Media
[J]. Computer Engineering and Applications, 2021, 57(9): 126-133.
|
[2] |
JIANG Bin, LIANG Xiao’an, ZHANG Liang, GAO Yangjun.
Evidence Combination Method Based on Improved Modified Weight
[J]. Computer Engineering and Applications, 2021, 57(24): 100-106.
|
[3] |
WANG Hui, LI Yingshun.
Dynamic Fault Diagnosis Algorithm for Improved Evidence Update Rules
[J]. Computer Engineering and Applications, 2020, 56(2): 261-265.
|
[4] |
LIU Xiaoya, WANG Yingming.
Research on Personal Credit Scoring Based on SVM Ensemble
[J]. Computer Engineering and Applications, 2020, 56(14): 272-278.
|
[5] |
WANG Huapeng, JIANG Nan, LIU En, CHAO Yadong.
Study on Modeling Method of Inter-Speaker Variability in Forensic Voice Comparison
[J]. Computer Engineering and Applications, 2019, 55(8): 110-115.
|
[6] |
LUO Lan, XIAO Jianyu.
Conflict Evidence Synthesis Method of Effective Discount Evidence Sources
[J]. Computer Engineering and Applications, 2019, 55(4): 154-158.
|
[7] |
LI Guo, MA Chunyang, MA Jianxiao.
Fusion Fault Diagnosis Using DPCA & Improved Evidence Theory
[J]. Computer Engineering and Applications, 2019, 55(20): 197-201.
|
[8] |
ZHANG Jian1, CAO Ping2.
Analytical evidence-reasoning evaluation model of software outsourcing project
[J]. Computer Engineering and Applications, 2018, 54(8): 236-241.
|
[9] |
ZHANG Weihua1,2, SUN Qichen1, ZHANG Lijing1.
New distribution interacting multiple model generalized probabilistic data association algorithm
[J]. Computer Engineering and Applications, 2018, 54(4): 44-49.
|
[10] |
ZHENG Na, WANG Jiayang.
Evidence characteristics and attribute reduction of incomplete ordered information system
[J]. Computer Engineering and Applications, 2018, 54(21): 43-47.
|
[11] |
YAN Zhijun, TAO Yang.
Conflict evidence combination rule based on uncertainty measurement and evidence distance
[J]. Computer Engineering and Applications, 2018, 54(10): 54-58.
|
[12] |
TU Shijie1,2, CHEN Hang1, FENG Gang2.
Using evidence theory and fuzzy function to identify ballistic target
[J]. Computer Engineering and Applications, 2017, 53(6): 169-173.
|
[13] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[14] |
GUAN Xin, GUO Junping, WANG Xing.
Double fuzzy information security evaluation algorithm based on improved DS theory
[J]. Computer Engineering and Applications, 2017, 53(2): 112-117.
|
[15] |
LIU Zuanshi, GENG Xiuli.
Trusted cloud service evaluation method research based on D-S theory
[J]. Computer Engineering and Applications, 2017, 53(17): 70-76.
|