[1] |
TONG Wenlin, CHEN Dewang, HUANG Yunhu, LYU Yisheng.
Fuzzy System Optimization Method Based on Simulated Annealing and Rule Reduction
[J]. Computer Engineering and Applications, 2021, 57(16): 142-150.
|
[2] |
LIU Shuyi, ZHAI Ye, LIU Dongsheng.
Cross-Project Software Defect Prediction Based on Multi-Strategy Feature Filtering
[J]. Computer Engineering and Applications, 2019, 55(8): 53-58.
|
[3] |
SUN Qin1, 2, JIANG Yanhuang1, 2, HU Wei2, ZHANG Yi2, GAO Feng3.
Feature selection algorithm based on multi-criterion ranking and C-SVM
[J]. Computer Engineering and Applications, 2018, 54(3): 125-130.
|
[4] |
LV Xuezhi1,2, FAN Baoxin2, ZHAO Xinhui2, YIN Jian2, WANG Xianwen2, YAO Yao2.
Availability analysis of complex redundancy system based on discrete event simulation
[J]. Computer Engineering and Applications, 2018, 54(15): 255-261.
|
[5] |
WANG Shuaijun, LI Deshi.
Turbo decoding method using residual redundancy
[J]. Computer Engineering and Applications, 2018, 54(1): 107-111.
|
[6] |
LONG Shengchun, LU Jiawei.
HOG-GLRLM features for classification of colon cancer histopathological images
[J]. Computer Engineering and Applications, 2017, 53(5): 197-201.
|
[7] |
HE Wei, XU Du.
Improved uneven cluster routing algorithm for wireless sensor network
[J]. Computer Engineering and Applications, 2017, 53(24): 136-141.
|
[8] |
SHI Qingwei, CONG Shiyuan.
Research on text categorization based on mRMR and LDA
[J]. Computer Engineering and Applications, 2016, 52(5): 127-133.
|
[9] |
QIU Yunfei, LIU Shixing, WANG Lu.
Evaluation and selection algorithm based on text features multiple indicator fusion
[J]. Computer Engineering and Applications, 2016, 52(24): 95-101.
|
[10] |
LI Dan, HU Xiaoguang.
Redundant fault-tolerant system based on VxWorks and fault diagnosis of PNN
[J]. Computer Engineering and Applications, 2016, 52(15): 13-18.
|
[11] |
REN Xiaoli1, WANG Ji1, WAN Qun2.
Direction-of-Arrival estimation based on sparse signal reconstruction
[J]. Computer Engineering and Applications, 2015, 51(1): 195-199.
|
[12] |
YAO Minghai1,2, WANG Na3, QI Miao2, LI Yan4.
Study on feature selection method of modified maximal relevance minimal redundancy
[J]. Computer Engineering and Applications, 2014, 50(9): 116-122.
|
[13] |
XUE Jin1, ZHANG Dong1, TANG Bin2.
Research on active detection forwarding strategy for Named Data Networking(NDN)
[J]. Computer Engineering and Applications, 2014, 50(18): 89-93.
|
[14] |
ZHANG Yanhong1, GENG Yongjun1, WU Changze2.
Dynamic redundancy strategy to assure availability of services
[J]. Computer Engineering and Applications, 2013, 49(8): 43-47.
|
[15] |
JIA Xian1,2, LIU Peiyu1,2, GONG Wei1,2.
Research of intrusion forensics based on improved attribute Weighted Naive Bayes
[J]. Computer Engineering and Applications, 2013, 49(7): 81-84.
|