[1] |
WEN Tingxin, KONG Xiangbo.
Research on Extreme Risk Warning in Financial Market from Imbalance Distribution of Samples
[J]. Computer Engineering and Applications, 2020, 56(8): 256-260.
|
[2] |
WANG Keqin, WU Fengjun.
Online Reviews Mining for Product Design Improvement
[J]. Computer Engineering and Applications, 2019, 55(19): 235-245.
|
[3] |
DENG Hui, LUO Qian, WANG Yan.
Rolling Bearing Diagnosis Based on IMF Energy Moments and Bayes-LSSVM
[J]. Computer Engineering and Applications, 2019, 55(17): 156-161.
|
[4] |
JIA Songda1, PANG Yusong1,2, YAN Gaowei1.
Multi-task LS-SVM for application of time series prediction
[J]. Computer Engineering and Applications, 2018, 54(3): 233-237.
|
[5] |
JIANG Yan1, SHUAI Renjun1, ZHANG Shu2, ZHA Daifeng3.
Prediction for fasting blood glucose level of health records based on KPCA-LSSVM
[J]. Computer Engineering and Applications, 2018, 54(13): 241-245.
|
[6] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[7] |
ZHANG Wenxing, CHEN Xiaojie.
Application in LSSVM of feature selection based on kernel polarization
[J]. Computer Engineering and Applications, 2017, 53(19): 164-167.
|
[8] |
WEI Yanhua, ZHOU Yan, WANG Dongli.
Location fingerprints based indoor positioning using least squares support vector machines
[J]. Computer Engineering and Applications, 2016, 52(9): 122-125.
|
[9] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[10] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[11] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[12] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[13] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[14] |
CAO Jing, LI Wenyun, ZHAO Dangshu, SONG Zhigang, DING Wenyun.
Forecast of building inclination around foundation pit based on PSO-LSSVM model
[J]. Computer Engineering and Applications, 2016, 52(1): 254-259.
|
[15] |
YIN Rongwang.
Network traffic predicting model based on FCM-LSSVM
[J]. Computer Engineering and Applications, 2016, 52(1): 105-109.
|