[1] |
HUAI Chuangfeng, GUO Long, JIA Xueyan, ZHANG Zihao.
Improved A* Algorithm and Dynamic Window Method for Robot Dynamic Path Planning
[J]. Computer Engineering and Applications, 2021, 57(8): 244-248.
|
[2] |
ZHAO Wei, WU Ziying.
Dynamic Path Planning Based on Bilevel Optimization A* Algorithm and Dynamic Window Method
[J]. Computer Engineering and Applications, 2021, 57(22): 295-303.
|
[3] |
LIU Jianjuan, XUE Liqi, ZHANG Huijuan, LIU Zhongpu.
Robot Dynamic Path Planning Based on Improved A* and DWA Algorithm
[J]. Computer Engineering and Applications, 2021, 57(15): 73-81.
|
[4] |
Ahmatjan Mattohti, Askar Hamdulla, Abdusalam Dawut.
Uyghur Text Regions Localization Using Channel-Enhanced MSER and CNN
[J]. Computer Engineering and Applications, 2020, 56(16): 132-138.
|
[5] |
LUO Lan, XIAO Jianyu.
Conflict Evidence Synthesis Method of Effective Discount Evidence Sources
[J]. Computer Engineering and Applications, 2019, 55(4): 154-158.
|
[6] |
XU Degang, ZHAO Ping.
Literature Survey on Research and Application of Bat Algorithm
[J]. Computer Engineering and Applications, 2019, 55(15): 1-12.
|
[7] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[8] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[9] |
XU Shoukun, KONG Ying, SHI Lin, LI Ning.
Approach of activity recognition with complementary of D-S theory and ontology reasoning
[J]. Computer Engineering and Applications, 2016, 52(4): 6-12.
|
[10] |
MENG Chenchen, XIAO Jianyu.
Study on correction coefficient of D-S evidence combination rule
[J]. Computer Engineering and Applications, 2016, 52(19): 63-67.
|
[11] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Network security situation assessment model fusing multi-source data
[J]. Computer Engineering and Applications, 2015, 51(17): 96-101.
|
[12] |
YAN Ying1, YUAN Ming1, HE Xiaolan1, SUO Bin2.
Risk evaluation for inventory financing before loans based on D-S evidence theory
[J]. Computer Engineering and Applications, 2015, 51(13): 239-244.
|
[13] |
HOU Yuting, PENG Jinye, HAN Dongchen.
Research of improved Criminisi image resoration algorithm
[J]. Computer Engineering and Applications, 2015, 51(11): 135-138.
|
[14] |
DU Yuanwei, HAN Chen.
Improved DS/AHP method based on three-point internal number
[J]. Computer Engineering and Applications, 2014, 50(3): 211-214.
|
[15] |
LIU Weidong1,2, LIU Yang1, GAO Li’e1,2.
Research of track fusion based on convex combination and Bar-Shalom-Campo
[J]. Computer Engineering and Applications, 2014, 50(2): 49-53.
|