[1] |
MA Jun,WANG Yuhao.
Object Tracking Algorithm Based on Adaptive Update Strategy and Re-detection Technology
[J]. Computer Engineering and Applications, 2021, 57(9): 217-224.
|
[2] |
ZHAO Linsuo, MA Ruiqiang, JIANG Tian, SONG Baoyan,PAN Yishan.
Adaptive Early Warning Method for Streaming Big Data Events Based on Two-Stage Regression
[J]. Computer Engineering and Applications, 2021, 57(7): 88-94.
|
[3] |
WAN Qin, ZHU Xiaolin, CHEN Guoquan, XIAO Yueping.
Research on Depth Map Restoration Algorithm Based on Hierarchical Joint Bilateral Filter
[J]. Computer Engineering and Applications, 2021, 57(6): 184-190.
|
[4] |
QIAO Xunshuang, BI Wenjie.
Application of Multi-armed Bandit Algorithm with Time-Varying Rewardsin Dynamic Pricing
[J]. Computer Engineering and Applications, 2021, 57(12): 237-242.
|
[5] |
TAN Xuemin, GUO Chao.
Classification of Motor-Imagery-Based Brain Computer Interface of Semi-Supervised Learning
[J]. Computer Engineering and Applications, 2020, 56(3): 139-145.
|
[6] |
WANG Dexue, LIN Yi, CHEN Junjie.
Application of Cooperative Training Algorithm in Fault Diagnosis of Rolling Bearing
[J]. Computer Engineering and Applications, 2020, 56(12): 273-278.
|
[7] |
GUO Haoyue, FAN Chongjun.
Fuzzy Ranking Method Considering Decision-Makers Weight and Core Rating
[J]. Computer Engineering and Applications, 2020, 56(10): 163-170.
|
[8] |
WANG Yang, WU Jianying, HUANG Jinlei, HU Hao, LIU Yuling.
Network Intrusion Intention Recognition Method Based on Bayesian Attack Graph
[J]. Computer Engineering and Applications, 2019, 55(22): 73-79.
|
[9] |
CHENG Yue, LI Jianzeng, LI Aihua, ZHU Lina.
Weighted Feature Fusion Correlation Filter Tracking Based on Confidence Level
[J]. Computer Engineering and Applications, 2019, 55(20): 152-158.
|
[10] |
WANG Yuye, CHEN Jianmei.
Safe semi-supervised collaborative filtering recommendation algorithm
[J]. Computer Engineering and Applications, 2018, 54(8): 107-111.
|
[11] |
ZHAO Tongtong1, ZHANG Chunlei2, ZHANG Chunyu3, GAO Shichen1.
Application of KNN classification model based on fuzzy entropy in lithology recognition
[J]. Computer Engineering and Applications, 2018, 54(24): 260-265.
|
[12] |
LU Hong1,2, YANG Chen1, FEI Shumin2.
Multi-object detection through multi-orientation saliency subregions voting by confidence
[J]. Computer Engineering and Applications, 2018, 54(22): 173-179.
|
[13] |
LIU Lihua1, ZHOU Tao2, ZHOU Qianzhi1.
Image segmentation on entropy of variable precision rough entropy
[J]. Computer Engineering and Applications, 2018, 54(20): 178-183.
|
[14] |
LI Zhilei, JIANG Yun, HU Xuewei, SHEN Jian.
New method of VPRS classification based on β boundary threshold selection
[J]. Computer Engineering and Applications, 2017, 53(9): 152-157.
|
[15] |
LI Jiang1, ZHANG Haitao1,2, LIU Rangsu2.
Moving target lock tracking method in dynamic background
[J]. Computer Engineering and Applications, 2017, 53(4): 214-222.
|