[1] |
GUO Xuekun, QIN Yuanhui, DU Liang, LUO Yongliang, WANG Hongan.
Flight Deck Aviation Support Job Detection Based on Multi-entity Bayesian Networks
[J]. Computer Engineering and Applications, 2021, 57(1): 242-253.
|
[2] |
CHEN Haiyang, LIU Xiqing, HUAN Xiaomin.
One-step Prediction SVDDBN Missing Data Interpolation Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 81-87.
|
[3] |
ZHENG Wei, HOU Hongxu, BAN Zhijie.
Expert Finding Method Using Baysian Network on Query Semantic Extension
[J]. Computer Engineering and Applications, 2020, 56(13): 194-198.
|
[4] |
SHI Leyi, LIU Jia, LIU Yihao, ZHU Hongqiang, DUAN Pengfei.
Survey of Research on Network Security Situation Awareness
[J]. Computer Engineering and Applications, 2019, 55(24): 1-9.
|
[5] |
GAO Ang, DUAN Li, ZHANG Guohui, DONG Zhiming, CAO Jie, GUO Qisheng.
Development Status of Computer Generated Force Behavior Modeling
[J]. Computer Engineering and Applications, 2019, 55(19): 43-51.
|
[6] |
YAN Zhi, ZHANG Peng, XIE Chuan.
Research on Bayesian Network Structure Learning Algorithm Based on Jaya
[J]. Computer Engineering and Applications, 2019, 55(19): 173-177.
|
[7] |
WANG Le, HUANG Changqiang, WEI Zhenglei.
Automatic Extraction of Flight Maneuver Rules Based on SSA
[J]. Computer Engineering and Applications, 2019, 55(14): 203-208.
|
[8] |
CAI Qingsong, CHEN Xihou.
Bayesian Network Structure Merging Algorithm Based on Scoring Function
[J]. Computer Engineering and Applications, 2019, 55(11): 147-152.
|
[9] |
HAN Jin1, WANG Xiaofei2, ZHOU Hu2, SUN Chu2, LI Cong2.
Robust optimization based on modified SOS for UCAV maneuvering decision
[J]. Computer Engineering and Applications, 2018, 54(2): 168-172.
|
[10] |
GUO Wenqiang, GAO Wenqiang, HOU Yongyan, LI Ran.
Target recognition based on BN parameter learning under scarce data set
[J]. Computer Engineering and Applications, 2018, 54(17): 122-125.
|
[11] |
YAN Yan1,2, WANG Wanjun3.
Privacy risk situation assessment method based on partial connection numbers
[J]. Computer Engineering and Applications, 2018, 54(10): 143-148.
|
[12] |
LIU Shiwen, SI Cheng, ZHANG Hongqi.
Fine-grained network threat situation assessment method
[J]. Computer Engineering and Applications, 2018, 54(10): 149-153.
|
[13] |
ZHU Xuetong1, QIAN Xiujuan2, SUN Weiwei1, HOU Xianchun1, CHEN Guangsheng3, WANG Yongli4.
Analysis method of heart disease for pervasive health monitoring
[J]. Computer Engineering and Applications, 2018, 54(1): 159-165.
|
[14] |
WANG Dong1,2, CHEN Zhi1, YUE Wenjing3, LIU Yawei1.
Trust-driven recommendation method using Bayesian network in social networks
[J]. Computer Engineering and Applications, 2017, 53(9): 146-151.
|
[15] |
DING Dong1, FU Xiaodong1,2, YUE Kun3.
Review quality evaluation of online products based on Bayesian network
[J]. Computer Engineering and Applications, 2017, 53(2): 21-26.
|