[1] |
CAI Dongli, ZHONG Qinghua, ZHU Yongsheng, LIAO Jinxiang, HAN Maizhi.
EEG Emotion Recognition Using Convolutional Neural Network with 3D Input
[J]. Computer Engineering and Applications, 2021, 57(5): 161-167.
|
[2] |
WU Weijie, ZHANG Jingxiang.
Random Forest Feature Selection Algorithm Based on Categorization Information and Application
[J]. Computer Engineering and Applications, 2021, 57(17): 147-156.
|
[3] |
HU Ting, SUN Jie, NIU Yan, GAO Yuan, XIANG Jie.
Application of Gene and Permutation Entropy in Early Diagnosis of Alzheimer’s Disease
[J]. Computer Engineering and Applications, 2020, 56(15): 274-278.
|
[4] |
LIU Shishi1,2, ZHANG Fengrong1,2, XIA Shixiong1, ZHOU Yong1.
Constructions of Triples of Boolean Permutations
[J]. Computer Engineering and Applications, 2019, 55(11): 40-45.
|
[5] |
PENG Jiayin.
Joint remote state preparation of arbitrary four-qubit [χ]-state and five-qubit Brown-state
[J]. Computer Engineering and Applications, 2017, 53(2): 38-46.
|
[6] |
SUN Liangxu1, QU Dianli2, LIU Guoli3.
Two-stage estimation distribution algorithm for permutation flowshop scheduling problem
[J]. Computer Engineering and Applications, 2017, 53(2): 64-71.
|
[7] |
NIU Ying, ZHANG Xuncai.
Chaotic image encryption algorithm based on bit permutation and DNA sequence
[J]. Computer Engineering and Applications, 2017, 53(17): 130-136.
|
[8] |
ZHANG Chen, LI Hongjun, LUO Liuhong, HE Yinghao.
Congruent permutation and computation of canonical form on matrix of equivalence relation
[J]. Computer Engineering and Applications, 2017, 53(13): 42-48.
|
[9] |
WANG Weichao1, SHI Guoliang2, LI Xiao2, JIN Weidong2.
Application of EMD entropy and ReliefF in fault analysis of high-speed train lateral damper failure
[J]. Computer Engineering and Applications, 2016, 52(14): 226-231.
|
[10] |
DU Zhen, YE Chunming, LING Yuanxiong.
Permutation flow-shop scheduling problem with learning effect based on firefly algorithm
[J]. Computer Engineering and Applications, 2015, 51(16): 248-251.
|
[11] |
QI Xuemei, WANG Hongtao, CHEN Fulong, LUO Yonglong.
Improved genetic algorithm for multi-objective of PFSP
[J]. Computer Engineering and Applications, 2015, 51(11): 242-247.
|
[12] |
SHENG Xiaohua, YE Chunming.
Research of bat algorithm for disruption management on PFSP scheduling
[J]. Computer Engineering and Applications, 2014, 50(8): 241-246.
|
[13] |
ZHOU Qing, WANG Hong.
Study and implementation of block-encryption permutation algorithm based on Hadoop platform
[J]. Computer Engineering and Applications, 2014, 50(20): 91-95.
|
[14] |
DONG Binhui,ZHOU Jianyong.
Transposition encryption algorithm based on chaotic random permutation and its application
[J]. Computer Engineering and Applications, 2011, 47(8): 59-61.
|
[15] |
ZHANG Haimo1,ZHENG Haoran2.
Construction and enumeration of Boolean permutations
[J]. Computer Engineering and Applications, 2011, 47(13): 103-105.
|