[1] |
WANG Fang, ZHANG Xueying, HU Fengyun, LI Fenglian.
Ensemble Method Classifies EEG from Stroke Patients
[J]. Computer Engineering and Applications, 2021, 57(24): 276-282.
|
[2] |
LIU Shuxuan, QIU Peng, NIE Yongqi, LIU Jing, CAO Hui.
Application of Virtual Reality in Motor Rehabilitation of Stroke Patients
[J]. Computer Engineering and Applications, 2021, 57(21): 68-79.
|
[3] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[4] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[5] |
GENG Yinfeng, ZHANG Xueying, LI Fenglian, HU Fengyun, JIA Wenhui, WANG Chao.
Optimized Extreme Learning Machine and Its Application in Classification of Stroke TCD Data
[J]. Computer Engineering and Applications, 2020, 56(10): 268-272.
|
[6] |
FANG Jianwen, HUANG Gang, CAO Wenming.
Survey of Stroke-Based Rendering
[J]. Computer Engineering and Applications, 2019, 55(9): 33-37.
|
[7] |
WANG Can, LI Fenglian, HU Fengyun, ZHANG Xueying, JIA Wenhui.
Classification of Stroke EEG Signals Based on Feature Fusion
[J]. Computer Engineering and Applications, 2019, 55(24): 154-158.
|
[8] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[9] |
WANG Lin, HE Bingqing.
Keystroke dynamic identity authentication algorithm based on diversity degree of keystroke feature curve
[J]. Computer Engineering and Applications, 2018, 54(22): 160-166.
|
[10] |
LV Xiaoyan1, GUO Jianjun2, LI Xiangsheng1.
Risk prediction model of cerebral stroke based on fuzzy theory
[J]. Computer Engineering and Applications, 2018, 54(20): 259-262.
|
[11] |
ZHENG Ling, LIANG Yiwen, TAN Chengyu.
Multi-template joint decision updating method of keystroke dynamics
[J]. Computer Engineering and Applications, 2018, 54(20): 128-131.
|
[12] |
PAN Li1,2, DENG Jia1, WANG Yongli1.
HMM-Cluster: Trajectory clustering for discovering traffic volume overload
[J]. Computer Engineering and Applications, 2018, 54(1): 77-85.
|
[13] |
GE Yongkan, YU Fengqin .
Improved speech synthesis with adaptive postfilter parameters
[J]. Computer Engineering and Applications, 2017, 53(1): 168-171.
|
[14] |
HU Yifan, HU Youbin, LI Qian, GENG Dongdong.
Research on face detection, tracking and recognition system based on video surveillance
[J]. Computer Engineering and Applications, 2016, 52(21): 1-7.
|
[15] |
WANG Min, SUN Xiangnan, LIU Li, ZHU Xiaojuan, ZENG Baoying.
Method of handwriting spurious dynamic feature extraction based on strokes
[J]. Computer Engineering and Applications, 2016, 52(18): 179-182.
|