[1] |
TIAN Zejin, HUANG Ruilu, LV Yuejin.
Two Consistencies of Complementary Judgment Matrix Based on Interval Rough Numbers
[J]. Computer Engineering and Applications, 2019, 55(24): 235-240.
|
[2] |
YIN Qiao1,2, WEI Zhanchen1,2, HUANG Qiulan1, SUN Gongxing1, SHI Jingyan1.
Development and Application of Hadoop Massive Data Migration System
[J]. Computer Engineering and Applications, 2019, 55(13): 66-71.
|
[3] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[4] |
HAN Xiaolong, LI Shang, YANG Quanye.
Strategic supply chain integration research based on genetic algorithm
[J]. Computer Engineering and Applications, 2018, 54(2): 214-221.
|
[5] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[6] |
HOU Xiaoqin1, HU Zhihua1, GAO Chaofeng1, LUO Xunjie2.
Priority-based genetic algorithm for routing automated guided vehicles for traversing blocks in warehouse aisles
[J]. Computer Engineering and Applications, 2016, 52(12): 31-36.
|
[7] |
CAO Dun1,2, TANG Yulong2.
Dynamic priority scheduling mechanism of MAC layer in DSRC
[J]. Computer Engineering and Applications, 2016, 52(10): 100-103.
|
[8] |
LI Xuanni, WANG Huiqin, WU Meng.
Research of image inpainting algorithm led by contourlet coefficients
[J]. Computer Engineering and Applications, 2015, 51(19): 206-209.
|
[9] |
HAN Mingzhu, GUO Shuxu, ZANG Lingling, ZHONG Fei.
Improved exemplar block-based image inpainting algorithm
[J]. Computer Engineering and Applications, 2015, 51(16): 192-194.
|
[10] |
TU Hui1, LIU Li1,2, ZHANG Zhengjin1.
Improved DTW algorithm to measure similarity of ECG signal
[J]. Computer Engineering and Applications, 2015, 51(16): 215-218.
|
[11] |
LU Na, LU Fei, ZHANG Wei.
Research of robots multi-tasks optimization using improved JSHOP2 planner
[J]. Computer Engineering and Applications, 2015, 51(13): 230-234.
|
[12] |
SUN Li1,2, XU Qi1.
Evaluation model of order priority based on HHS-SVM
[J]. Computer Engineering and Applications, 2015, 51(12): 241-245.
|
[13] |
HOU Yuting, PENG Jinye, HAN Dongchen.
Research of improved Criminisi image resoration algorithm
[J]. Computer Engineering and Applications, 2015, 51(11): 135-138.
|
[14] |
ZHANG Shenhua1, WANG Kegang1, ZHU Xuan2.
Improved Criminisi algorithm constrained by local feature
[J]. Computer Engineering and Applications, 2014, 50(8): 127-130.
|
[15] |
XIAO Juan, WANG Song, ZHANG Wenfen.
Improved algorithm for image inpainting based on clustering segmentation and texture synthesis
[J]. Computer Engineering and Applications, 2014, 50(8): 131-135.
|