[1] |
LI Yuqi, LIU Zhiqian, CHENG Ningyi, WANG Yingying, ZHU Chunli.
Path Planning of UAV Under Multi-constraint Conditions
[J]. Computer Engineering and Applications, 2021, 57(4): 225-230.
|
[2] |
MENG Xiangfu, WANG Dandan, ZHANG Feng.
Overview of Spatial Keyword Queries
[J]. Computer Engineering and Applications, 2021, 57(20): 13-24.
|
[3] |
WANG Xiuli, ZHOU Peng, HOU Jingnan, WANG Shijun, LIN Xia.
Research on Algorithm of Inspection Path Planning for Substation Robot
[J]. Computer Engineering and Applications, 2021, 57(14): 245-250.
|
[4] |
YE Yingshi, WEI Fuyi, CAI Xianzi.
Research on Fast Dijkstra Algorithm Based on Parallel Computing
[J]. Computer Engineering and Applications, 2020, 56(6): 58-65.
|
[5] |
XIE Boyu, LI Maoqing, YUE Lili, CHEN Qixiang.
Research on Route Real-Time Planning of UAV-Intelligent Platoons Cooperative Systems
[J]. Computer Engineering and Applications, 2020, 56(20): 20-27.
|
[6] |
CHEN Xiaoqian, LIU Ruixiang.
Route Planning Method Based on Least-Squares Policy Iteration for Unmanned Aerial Vehicle
[J]. Computer Engineering and Applications, 2020, 56(1): 191-195.
|
[7] |
LUO Lan, XIAO Jianyu.
Conflict Evidence Synthesis Method of Effective Discount Evidence Sources
[J]. Computer Engineering and Applications, 2019, 55(4): 154-158.
|
[8] |
ZHAO Yihong, WANG Ze, ZHANG Haijuan.
Dynamic beacon spanning tree algorithm for sensor localization
[J]. Computer Engineering and Applications, 2018, 54(6): 68-74.
|
[9] |
LU Mingming, ZHENG Lin.
Traffic big data based subway and taxi connection travel planning
[J]. Computer Engineering and Applications, 2018, 54(15): 262-270.
|
[10] |
DUAN Suolin, YANG Ke, MAO Dan, REN Juepeng.
Fuzzy evidence theory-based algorithm in application of fire detection
[J]. Computer Engineering and Applications, 2017, 53(5): 231-235.
|
[11] |
HAO Qinzhi, ZHOU Zhongliang, ZHANG Yu.
Comprehensive path planning in penetration phase under standoff jamming
[J]. Computer Engineering and Applications, 2017, 53(20): 95-99.
|
[12] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[13] |
XU Shoukun, KONG Ying, SHI Lin, LI Ning.
Approach of activity recognition with complementary of D-S theory and ontology reasoning
[J]. Computer Engineering and Applications, 2016, 52(4): 6-12.
|
[14] |
MENG Chenchen, XIAO Jianyu.
Study on correction coefficient of D-S evidence combination rule
[J]. Computer Engineering and Applications, 2016, 52(19): 63-67.
|
[15] |
LV Jinqiu1, YOU Xiaoming2, LIU Sheng2.
Hybrid ACS algorithm for robot global path planning
[J]. Computer Engineering and Applications, 2016, 52(11): 38-43.
|