[1] |
HAN Weiyu, CHENG Longsheng.
Research on Roling Bearing Failure Mode Classification Based on MTS and SVM
[J]. Computer Engineering and Applications, 2021, 57(6): 239-246.
|
[2] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|
[3] |
LIU Jingsheng, WU Xing, WANG Honggang, LI Jiangnan.
Improved FCOS Two-Stage SAR Ship Detection Algorithm
[J]. Computer Engineering and Applications, 2021, 57(24): 144-151.
|
[4] |
QIN Boyu, HAO Xiaoyan, LIU Yongfang.
Frame Disambiguation of FrameNet Based on SVM and CRF Two-Stage Model
[J]. Computer Engineering and Applications, 2021, 57(18): 255-262.
|
[5] |
TANG Dengping, CAI Wenjia, ZOU Li, HU Xiang, DING Li, WANG Xue.
Application of Improved Convolution Neural Network in Fault Diagnosis of Transformer
[J]. Computer Engineering and Applications, 2021, 57(11): 239-247.
|
[6] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[7] |
XU Xinjian, QIU Runhe.
Physical Layer Security of Cognitive Relay Network
[J]. Computer Engineering and Applications, 2020, 56(6): 79-85.
|
[8] |
ZHANG Yuchen, ZHANG Renchuan, LIU Jing, WANG Yongwei.
Network Security Situation Evaluation Using Deep Auto-Encoders Network
[J]. Computer Engineering and Applications, 2020, 56(6): 92-98.
|
[9] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[10] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|
[11] |
WANG Longfei, DENG Liang, LIU Ping.
Improved Fruit Fly Optimization Based Hysteresis Bouc-Wen Model Identification of Piezoelectric Precision Positioning Stages
[J]. Computer Engineering and Applications, 2020, 56(2): 242-247.
|
[12] |
DING Qingfeng, WU Zexiang, LIU Mengxia, XI Tao.
Research on Security Performance of Full-Duplex Two-Way Relay Network Under Imperfect CSI
[J]. Computer Engineering and Applications, 2020, 56(19): 99-104.
|
[13] |
GAO Man, HAN Meng, LEI Bingbing.
Survey of High Utility Pattern Generate Strategy
[J]. Computer Engineering and Applications, 2020, 56(16): 1-12.
|
[14] |
MA Yanfang, YING Bin, KANG Kai, LUAN Xinfeng.
Algorithms for Green Simultaneous Pickup and Delivery Problem with Fuzzy Demand
[J]. Computer Engineering and Applications, 2020, 56(16): 248-257.
|
[15] |
WANG Hao, LI Jun, ZHOU Rong.
Adaptive Combine and Split Multi-population Differential Evolution Algorithm
[J]. Computer Engineering and Applications, 2020, 56(15): 162-171.
|