[1] |
DAI Qi, LI Min, LIU Yang, LI Lihong.
Fast Attribute Reduction Algorithm Based on Fuzzy Hierarchical Quotient Space
[J]. Computer Engineering and Applications, 2021, 57(4): 55-60.
|
[2] |
FAN Jianping, CHENG Rui, WU Meiqin.
Distance Measure of Interval-Valued Complex Fuzzy Soft Sets and Its Application
[J]. Computer Engineering and Applications, 2020, 56(9): 248-259.
|
[3] |
WANG Zilong, LI Jin, SONG Yafei.
Improved K-means Algorithm Based on Distance and Weight
[J]. Computer Engineering and Applications, 2020, 56(23): 87-94.
|
[4] |
LI Kang1, YANG Yudong2.
Image Segmentation Algorithm Based on Improved Chan-Vese Model and Edge Transformation
[J]. Computer Engineering and Applications, 2019, 55(6): 204-208.
|
[5] |
CAI Pengfei, YE Jianfeng.
CBIR Method Based on Improved CNN and Bilinear Model
[J]. Computer Engineering and Applications, 2019, 55(16): 191-196.
|
[6] |
LIU Yudong, WANG Xu’an, GAO Zhongshi.
Euclidean Distance Outsourcing Computation Protocol Based on Homomorphic Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(15): 110-116.
|
[7] |
YAN Xuelong, CHEN Zhuo.
Analog Circuit Fault Prognostic Utilizing Particle Swarm Optimized Multi-Kernel Relevance Vector Machine
[J]. Computer Engineering and Applications, 2019, 55(12): 140-144.
|
[8] |
FENG Wenbin1, LIU Baohua2.
Research on image matching based on improved SIFT algorithm
[J]. Computer Engineering and Applications, 2018, 54(3): 200-205.
|
[9] |
LI Zhilei, CHENG Yongqiang, JIA Haoli.
Photoshop subjective examination questions marking method based on image contrast
[J]. Computer Engineering and Applications, 2018, 54(23): 150-155.
|
[10] |
WANG Wenhui1, YANG Geng1, GE Wei1, LIU Peidong2, QIAN Chen3.
Fuzzy C-Means clustering algorithm under noise uneven condition and its application
[J]. Computer Engineering and Applications, 2018, 54(19): 172-178.
|
[11] |
FAN Qingfu, ZHANG Lei, LIU Leijun, BAO Suning, FANG Chen.
Online GPS trajectory data compression based on offset calculation
[J]. Computer Engineering and Applications, 2017, 53(8): 254-259.
|
[12] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[13] |
PEI Jingdong, WANG Wenhu, WANG Shu, CHENG Langyong.
Elliptical leading edge fitting strategy of elementary blade profile
[J]. Computer Engineering and Applications, 2015, 51(3): 243-246.
|
[14] |
YANG Dexin1, LIU Liming1, YANG Bo2.
Secure Euclidean distance computation in presence of malicious adversaries
[J]. Computer Engineering and Applications, 2015, 51(24): 109-113.
|
[15] |
ZHANG Yankai1, BAO Fang2, WANG Shitong1.
Protection-type transfer learning clustering algorithm with cosine distance metric
[J]. Computer Engineering and Applications, 2015, 51(23): 131-138.
|