[1] |
ZHOU Youhang, ZHAO Hanyun, LIU Hanjiang, LI Yuze, XIAO Yuqin.
Self-Learning Gait Planning Method for Biped Robot Using DDPG
[J]. Computer Engineering and Applications, 2021, 57(6): 254-259.
|
[2] |
CAI Ruiguang, ZHANG Desheng, ZHANG Xiao.
Bidirectional Selection-Based Pseudo Nearest Neighbor Algorithm
[J]. Computer Engineering and Applications, 2021, 57(13): 102-107.
|
[3] |
XU Hanyu, FENG Xiang, YU Huiqun.
Novel Optimization Algorithm Based on Universal Gravitational and Colon State Adaptation
[J]. Computer Engineering and Applications, 2020, 56(9): 48-55.
|
[4] |
ZENG Chunyan, MA Chaofeng, WANG Zhifeng, ZHU Dongliang, ZHAO Nan, WANG Juan, LIU Cong.
Survey of Speaker Recognition in Deep Learning Framework
[J]. Computer Engineering and Applications, 2020, 56(7): 8-16.
|
[5] |
LIAO Wenxiong, ZENG Bi, LIANG Tiankai, XU Yayun, ZHAO Junfeng.
Personal Credit Risk Assessment Method for High-Dimensional Data
[J]. Computer Engineering and Applications, 2020, 56(4): 219-224.
|
[6] |
SUN Tangle, LI Guohui.
EEMD and RBF neural network prediction of sunspot monthly mean
[J]. Computer Engineering and Applications, 2017, 53(24): 252-256.
|
[7] |
ZHOU Jing1, ZHAO Luyang1, LUO Jufeng1,2.
Fence intrusion pattern classification method based on time domain feature extraction
[J]. Computer Engineering and Applications, 2017, 53(21): 98-102.
|
[8] |
XIE Zhiyu, LIU Xiongfei, HU Zhikun.
Research and design of underground coal mine positioning method based on Taylor algorithm
[J]. Computer Engineering and Applications, 2017, 53(2): 231-235.
|
[9] |
LU Yanan, NAN Jingchang, GAO Mingming.
RBF neural network for modeling based on improved parallel particle swarm optimization
[J]. Computer Engineering and Applications, 2017, 53(14): 45-50.
|
[10] |
WANG Lian1, SUN Heping2, XIE Zhenping3, WANG Shitong3.
Electricity consumer credit evaluation model based on charge payment proactivity
[J]. Computer Engineering and Applications, 2016, 52(22): 253-259.
|
[11] |
TAN Qian1, JIANG Yi1, LIN Fan2.
Load prediction of Swift cloud storage based on AHP-RBF
[J]. Computer Engineering and Applications, 2014, 50(8): 35-39.
|
[12] |
CHEN Hongxing.
Network intrusion detection based on neural network optimized by GA
[J]. Computer Engineering and Applications, 2014, 50(14): 78-81.
|
[13] |
ZHOU Jianzheng1, CHEN Zhiqun2, LI Zhi1, WANG Rongbo2, FENG Kai2.
Methods of questions pattern classification and similarity measure for question answering system
[J]. Computer Engineering and Applications, 2014, 50(1): 116-120.
|
[14] |
QIU Jiandong, JIANG Zhaoyuan.
Research of railway freight volume prediction based on NLA-PSO-RBF
[J]. Computer Engineering and Applications, 2013, 49(22): 253-257.
|
[15] |
ZHONG Jinqin1,3, GU Lichuan2, TAN Jieqing3, LI Yingying3.
Estimating parameters of GMM based on split EM
[J]. Computer Engineering and Applications, 2012, 48(34): 28-32.
|