[1] |
MENG Xianwei, TANG Jinjun, WANG Zhe.
Trajectory Prediction of Vehicles Based on LSTM-AdaBoost Model Considering Lane-Changing Intention
[J]. Computer Engineering and Applications, 2022, 58(13): 280-287.
|
[2] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[3] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[4] |
HAN Zhengtao, ZHANG Wuyi.
Revenue Sharing Mechanism of Knowledge Transfer in Collaborative Innovation of Supply Chain
[J]. Computer Engineering and Applications, 2020, 56(16): 234-240.
|
[5] |
MA Lihong, TAN Xueshi.
Zero-Shot Classification with Manifold Regularization Graph Based on Common Structure Assumption
[J]. Computer Engineering and Applications, 2019, 55(15): 153-160.
|
[6] |
YANG Shiqiang, LUO Xiaoyu, LI Xiaoli, YANG Jiangtao, LI Dexin.
Human Action Recognition Based on DBN-HMM
[J]. Computer Engineering and Applications, 2019, 55(15): 169-176.
|
[7] |
HUAN Zhan, LI Chen, WAN Caiyan, CHEN Xuejie.
Personnel Identification Based on Walking Acceleration Information Segmentation
[J]. Computer Engineering and Applications, 2019, 55(1): 203-209.
|
[8] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[9] |
PAN Li1,2, DENG Jia1, WANG Yongli1.
HMM-Cluster: Trajectory clustering for discovering traffic volume overload
[J]. Computer Engineering and Applications, 2018, 54(1): 77-85.
|
[10] |
MA Zhenghua1, LI Lei2, QIAO Yutao2, RONG Hailong3, CAO Haiting2.
Dynamic gesture recognition research and analysis based on multi-sensor fusion
[J]. Computer Engineering and Applications, 2017, 53(17): 153-159.
|
[11] |
GE Yongkan, YU Fengqin .
Improved speech synthesis with adaptive postfilter parameters
[J]. Computer Engineering and Applications, 2017, 53(1): 168-171.
|
[12] |
HU Yifan, HU Youbin, LI Qian, GENG Dongdong.
Research on face detection, tracking and recognition system based on video surveillance
[J]. Computer Engineering and Applications, 2016, 52(21): 1-7.
|
[13] |
JIANG Fang1,2, LI Guohe1,2,3, YUE Xiang4, WU Weijiang1,2,3, HONG Yunfeng3, LIU Zhiyuan3, CHENG Yuan3.
Segmentation of Chinese word based on method of rough segment and part of speech tagging
[J]. Computer Engineering and Applications, 2015, 51(6): 204-207.
|
[14] |
CHAI Qian, WANG Huiqin, LIAO Yuting, LU Ying, MA Zongfang.
Flame recognition algorithm based on Hidden Markov Model and Support Vector Machines
[J]. Computer Engineering and Applications, 2015, 51(13): 202-205.
|
[15] |
SU Peng, CHENG Jian.
Application of DHMM to mechanical equipment audio recognition
[J]. Computer Engineering and Applications, 2015, 51(1): 266-270.
|