[1] |
CAI Dongli, ZHONG Qinghua, ZHU Yongsheng, LIAO Jinxiang, HAN Maizhi.
EEG Emotion Recognition Using Convolutional Neural Network with 3D Input
[J]. Computer Engineering and Applications, 2021, 57(5): 161-167.
|
[2] |
WU Weijie, ZHANG Jingxiang.
Random Forest Feature Selection Algorithm Based on Categorization Information and Application
[J]. Computer Engineering and Applications, 2021, 57(17): 147-156.
|
[3] |
HU Ting, SUN Jie, NIU Yan, GAO Yuan, XIANG Jie.
Application of Gene and Permutation Entropy in Early Diagnosis of Alzheimer’s Disease
[J]. Computer Engineering and Applications, 2020, 56(15): 274-278.
|
[4] |
HE Yongmei, NING Aibing, PENG Dajiang, SHANG Chunjian, ZHANG Huizhen.
Competitive Decision Algorithm for Soft-Capacitated Facility Location Problem
[J]. Computer Engineering and Applications, 2019, 55(3): 50-54.
|
[5] |
LIU Shishi1,2, ZHANG Fengrong1,2, XIA Shixiong1, ZHOU Yong1.
Constructions of Triples of Boolean Permutations
[J]. Computer Engineering and Applications, 2019, 55(11): 40-45.
|
[6] |
ZHU Shuqin, WANG Wenhong, LI Junqing.
Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator
[J]. Computer Engineering and Applications, 2018, 54(9): 84-88.
|
[7] |
PENG Jiayin.
Joint remote state preparation of arbitrary four-qubit [χ]-state and five-qubit Brown-state
[J]. Computer Engineering and Applications, 2017, 53(2): 38-46.
|
[8] |
SUN Liangxu1, QU Dianli2, LIU Guoli3.
Two-stage estimation distribution algorithm for permutation flowshop scheduling problem
[J]. Computer Engineering and Applications, 2017, 53(2): 64-71.
|
[9] |
CHENG Zhihui1,2, HUANG Yu1,2.
H-infinity filtering tracking method using Cauchy decomposition
[J]. Computer Engineering and Applications, 2017, 53(17): 41-46.
|
[10] |
NIU Ying, ZHANG Xuncai.
Chaotic image encryption algorithm based on bit permutation and DNA sequence
[J]. Computer Engineering and Applications, 2017, 53(17): 130-136.
|
[11] |
LI Xia1,2, LI Peng1, XIONG Jing2.
Path planning for flexible needle based on environment properties and random method
[J]. Computer Engineering and Applications, 2017, 53(16): 121-125.
|
[12] |
ZHANG Chen, LI Hongjun, LUO Liuhong, HE Yinghao.
Congruent permutation and computation of canonical form on matrix of equivalence relation
[J]. Computer Engineering and Applications, 2017, 53(13): 42-48.
|
[13] |
SUN Liting1, YIN Guimei1,3, TAN Shuping2, ZHAO Yanli2, ZHANG Jinguo2, LI Dong2, LI Haifang1.
Properties analysis of working memory EEG functional network in schizophrenia
[J]. Computer Engineering and Applications, 2017, 53(12): 25-30.
|
[14] |
LIANG Sheng, WAN Yangsuo.
Heuristic network topology layout algorithm based on properties of nodes
[J]. Computer Engineering and Applications, 2016, 52(20): 122-126.
|
[15] |
TANG Ni1,2, XIONG Qingyu1,2, WANG Xibin1,2, GAO Min1,2, WEN Junhao1,2, ZENG Jun1,2.
Web service recommendation based on location clustering and tensor decomposition
[J]. Computer Engineering and Applications, 2016, 52(15): 65-72.
|