[1] |
YANG Quan.
SVM Algorithm for N1+N2 Structure Syntax Relation Determination
[J]. Computer Engineering and Applications, 2021, 57(20): 104-108.
|
[2] |
YANG Yanjiao, ZHAO Guotao, WANG Pidong.
Sentence Similarity Calculation Method Based on Semantics and Emotion
[J]. Computer Engineering and Applications, 2021, 57(16): 151-158.
|
[3] |
LIU Fasheng, XU Minlin, DENG Xiaohong.
Research on Sentiment Analysis Combining Attention Mechanism and Sentence Ranking
[J]. Computer Engineering and Applications, 2020, 56(13): 12-19.
|
[4] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[5] |
LI Jinhai, HE Youshi, MA Yunlei, ZHOU Aiping.
Research of Universal Model for Knowledge Representation Based on Multi-layer Domain Ontology
[J]. Computer Engineering and Applications, 2020, 56(11): 149-155.
|
[6] |
ALIFU·Kuerban1, ASAN·Yasin2, ZHANG Dandan2.
Design of Grammatical Sign Language Editing System for Uyghur KP_V Sentence Pattern
[J]. Computer Engineering and Applications, 2019, 55(7): 248-252.
|
[7] |
ZHENG Cheng, QIAN Gailin, ZHANG Jinping.
Research on Sentiment Classification of Title and TextRank Extracting Key Sentences
[J]. Computer Engineering and Applications, 2019, 55(20): 95-100.
|
[8] |
XU Shoukun1, XU Jian1, LI Ning1,2, ZHOU Jia1, LIU Chuqiu3.
Image Sentence Annotation Based on Sentence-Rank Algorithm
[J]. Computer Engineering and Applications, 2019, 55(2): 121-127.
|
[9] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[10] |
JI Mingyu, WANG Chenlong, AN Xiang, MU Weiye.
Method of Sentence Similarity Calculation for Intelligent Customer Service
[J]. Computer Engineering and Applications, 2019, 55(13): 123-128.
|
[11] |
QU Hanhua1, HUI Jianzhong1, HE Xianfeng2, WANG Muhua1, HE Xiaofeng1, FENG De’en1.
Formal concept analysis model of meteorological services
[J]. Computer Engineering and Applications, 2018, 54(9): 257-264.
|
[12] |
YOU Yun1,2,3, WAN Changxuan1,3, CHEN Huangye1,3.
Diversified commodity recommendation method considering correlation between objects
[J]. Computer Engineering and Applications, 2018, 54(7): 70-76.
|
[13] |
WANG Zhen.
Engineering change impact analysis based on design knowledge ontology
[J]. Computer Engineering and Applications, 2018, 54(5): 247-252.
|
[14] |
ZHU Wenyue,LIU Zongtian.
Emergency domain knowledge modeling based on event ontology
[J]. Computer Engineering and Applications, 2018, 54(21): 148-155.
|
[15] |
PENG Fei1, ZHANG Tao1, XU Weiguang1, ZHAO Min1, QIN Hengjia2.
Security policy generation model of operating system based on ontology
[J]. Computer Engineering and Applications, 2018, 54(2): 114-118.
|