[1] |
HUANG Yilei, XIA Zhijie, WANG Yiming.
Research on False Information Dissemination Model of Strong-Ties Social Media
[J]. Computer Engineering and Applications, 2021, 57(9): 126-133.
|
[2] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[3] |
LI Gaoyuan, WANG Jinyu, ZHANG Changgong, FENG Bodi, GAO Yuge, YANG Haitao.
Review of SAR Image Simulation Methods
[J]. Computer Engineering and Applications, 2021, 57(15): 62-72.
|
[4] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[5] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|
[6] |
WU Jie, DUAN Jin, DONG Suoqin, LI Yingchao.
Research on Face Recognition Technology of DFM-GAN Network in Cross-Age Simulation
[J]. Computer Engineering and Applications, 2021, 57(10): 117-124.
|
[7] |
ZHANG Wuyi, LI Jianguo, GONG Yuwen.
Safety Awareness Evolution Model of High-Altitude Parabolic and Falling Objects Prevention
[J]. Computer Engineering and Applications, 2021, 57(1): 254-260.
|
[8] |
KANG Leilei, LU Weike, LIU Lan.
Coordinate Control Strategy Between Entrance Ramp of City Expressway and Upstream Intersection
[J]. Computer Engineering and Applications, 2020, 56(9): 267-271.
|
[9] |
WANG Qi, XUE Hong, CHEN Maomao.
Simulation of Ruin Probability for Risk Model Perturbed by Fractional Brown Motion
[J]. Computer Engineering and Applications, 2020, 56(8): 215-219.
|
[10] |
YE Yingshi, WEI Fuyi, CAI Xianzi.
Research on Fast Dijkstra Algorithm Based on Parallel Computing
[J]. Computer Engineering and Applications, 2020, 56(6): 58-65.
|
[11] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[12] |
LIU Hongchen, LIU Zhaoxia, ZHANG Long.
Mixed [L2] and KL Fidelity Item Image Recovery Algorithm
[J]. Computer Engineering and Applications, 2020, 56(5): 214-221.
|
[13] |
ZHU Huijuan, WANG Yongli, CHEN Linlin.
Research on Selfish Herd Optimization Algorithm for 3D Model Lightweight
[J]. Computer Engineering and Applications, 2020, 56(3): 42-48.
|
[14] |
ZHOU Fei, LUO Xiaoyong, LIU Yunping.
Real-Time Correction of IMM Target Tracking Algorithm Based on Probability Model
[J]. Computer Engineering and Applications, 2020, 56(21): 85-92.
|
[15] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|