[1] |
LEI Henglin, Gulanbaier Tuerhong, Mairidan Wushouer, ZHANG Dongmei.
Review of Novelty Detection
[J]. Computer Engineering and Applications, 2021, 57(5): 47-55.
|
[2] |
ZHAO Qi, DU Yanhui, LU Tianliang, SHEN Shaoyu.
Algorithm of Text Similarity Analysis Based on Capsule-BiGRU
[J]. Computer Engineering and Applications, 2021, 57(15): 171-177.
|
[3] |
LIU Cong, WANG Yongli, ZHOU Zitao, YOU Feng, ZHANG Caijun.
Sensitive Information Recognition Method Combining Trigger Event and Part of Speech Analysis
[J]. Computer Engineering and Applications, 2020, 56(20): 132-137.
|
[4] |
ZHU Yanhui1,2, LI Fei1,2, HU Junfei1,2, QIAN Jisheng3, WANG Tianji1,2.
Research on two-stage entity relation extraction based on three-way decisions
[J]. Computer Engineering and Applications, 2018, 54(9): 145-150.
|
[5] |
CHEN Jianxia1, ZHU Jiqi1, ZHANG Yue1, ZHANG Xiaoxing2, LV Juntao3, BAI Demeng3.
Real-time fault monitoring of transmission lines based on Spark
[J]. Computer Engineering and Applications, 2018, 54(5): 265-270.
|
[6] |
SONG Dongyun, ZHENG Jin, ZHANG Zuping.
Chinese short text similarity computation based on hybrid strategy
[J]. Computer Engineering and Applications, 2018, 54(12): 116-120.
|
[7] |
LI Xiaoguang, BU Fangling, XU Xin.
Hierarchical seismic scene recognition method based on mobile accelerometer
[J]. Computer Engineering and Applications, 2017, 53(6): 252-257.
|
[8] |
JIANG Wen,LIU Likang.
Recognition of handwritten Uyghur character based on combination of two features
[J]. Computer Engineering and Applications, 2017, 53(5): 192-196.
|
[9] |
ZHOU Zhiyang, FENG Baiming, YANG Penglin, WEN Xianghui.
Research and Implementation of KNN classification algorithm for streaming data based on Storm
[J]. Computer Engineering and Applications, 2017, 53(19): 71-75.
|
[10] |
ZHANG Shaoyang, CAO Jiabo, WANG Zifan, QU Weidong.
Chinese paragraph similarity calculated based on weighted bipartite graph match
[J]. Computer Engineering and Applications, 2017, 53(18): 95-101.
|
[11] |
WANG Lingling1, LIU Guozhu1, MA Chunguang2.
Identity attack algorithm based on bipartite graph in location-based services
[J]. Computer Engineering and Applications, 2016, 52(9): 67-70.
|
[12] |
CHENG Yusheng1,2, LIANG Hui2, WANG Yibin1,2, REN Yong2.
Research of text similarity combining micro variation of keywords and LD algorithm
[J]. Computer Engineering and Applications, 2016, 52(8): 70-73.
|
[13] |
XIAO He, FU Lina, JI Donghong.
Neural language model and semantic compositionality model in semantic similarity
[J]. Computer Engineering and Applications, 2016, 52(7): 139-142.
|
[14] |
REN Zhuojun, HAN Xiuling, KONG Defeng, CHEN Guang.
Pixel normalization method applied in malware visualization analysis
[J]. Computer Engineering and Applications, 2016, 52(21): 121-125.
|
[15] |
ZHOU Lijie1, YU Weihai2, GUO Cheng3.
Research on text similarity calculation strategy based on semantic combination of keywords
[J]. Computer Engineering and Applications, 2016, 52(19): 90-93.
|