[1] |
LIU Yong, XIE Ruoying, FENG Yang, WANG Yahui, LIU Yaqing.
Survey on Resident’s Daily Activity Recognition in Smart Homes
[J]. Computer Engineering and Applications, 2021, 57(4): 35-42.
|
[2] |
JIA Xiaoyun1, WANG Erhu1, WU Jingyi2.
Real-time human behavior recognition based on Android platform
[J]. Computer Engineering and Applications, 2018, 54(24): 164-167.
|
[3] |
LIU Jinyi1, ZHANG Le1,2, HU Haibo1,2, ZU He3.
Strong robustness human activity recognition based on wearable sensors
[J]. Computer Engineering and Applications, 2017, 53(4): 176-183.
|
[4] |
ZHAO Zhongtang1,3, CHEN Jiguang1,3, MA Qian2.
Research on imbalance learning problem in fall detection
[J]. Computer Engineering and Applications, 2017, 53(23): 142-146.
|
[5] |
SU Lei, LI Guanyu, TIAN Guangqiang.
Novel approach to human activity recognition based on improved Markov logic networks
[J]. Computer Engineering and Applications, 2017, 53(17): 20-25.
|
[6] |
XU Xian1,2, LU Xianling1,2, WANG Hongbin1,2.
Accelerometer data feature selection for activity recognition based on GA optimization
[J]. Computer Engineering and Applications, 2016, 52(6): 139-143.
|
[7] |
XU Shoukun, KONG Ying, SHI Lin, LI Ning.
Approach of activity recognition with complementary of D-S theory and ontology reasoning
[J]. Computer Engineering and Applications, 2016, 52(4): 6-12.
|
[8] |
LIU Bin1, LIU Hongjian2, JIN Xiaotian1, GUO Defeng2.
Human activity recognition based on sensors of smart phone
[J]. Computer Engineering and Applications, 2016, 52(4): 188-193.
|
[9] |
ZHU Xiangbin, QIU Huiling.
Human activity recognition with smartphone sensor data
[J]. Computer Engineering and Applications, 2016, 52(23): 1-5.
|
[10] |
GU Xiaoqing, WANG Hongyuan, NI Tongguang, DING Hui.
Phishing detection approach based on Na?ve Bayes and support vector machine
[J]. Computer Engineering and Applications, 2015, 51(4): 87-90.
|
[11] |
BAO Yi1,2, WANG Tao2, QIU Guoyong2.
Software defect prediction model based on line geometry division
[J]. Computer Engineering and Applications, 2013, 49(14): 34-38.
|
[12] |
Alimjan AYSA1,2, Turgun IBRAHIM2, Hasan OMAR2, Marhaba ALI2.
Machine learning based Uyghur language text categorization
[J]. Computer Engineering and Applications, 2012, 48(5): 110-112.
|
[13] |
ZHAI Junchang1, QIN Yuping1, CHE Weiwei2.
Feature words classification contribution applied in spam filtering
[J]. Computer Engineering and Applications, 2012, 48(34): 116-119.
|
[14] |
WANG Zuhui, JIANG Wei.
Approach of improving incremental Bayes based spam filter by data amoothing
[J]. Computer Engineering and Applications, 2012, 48(16): 21-25.
|
[15] |
YIN Yong1, ZHANG Jing1, WANG Jiandong2.
Human activity recognition based on improved Radon transforms
[J]. Computer Engineering and Applications, 2012, 48(11): 196-200.
|