[1] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[2] |
LIU Chen, CHEN Jingxian, HAO Yuchen, LI Qiu, ZHEN Juntao.
Entrance and Exit Passenger Flow Prediction of Subway Stations Based on Spatio-Temporal Network
[J]. Computer Engineering and Applications, 2021, 57(18): 248-254.
|
[3] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[4] |
WU Chutian, CHEN Yongle, CHEN Junjie.
Cross-Protocol Anomaly Detection Algorithm Based on HMM
[J]. Computer Engineering and Applications, 2020, 56(8): 81-86.
|
[5] |
YANG Lu, SONG Huansheng, ZHANG Zhaoyang.
Highway Vehicle Detection Based on Sparse Trajectory Clustering
[J]. Computer Engineering and Applications, 2020, 56(15): 251-258.
|
[6] |
WU Xiaoquan1,2, LI Hui1,2, CHEN Mei1,2, DAI Zhenyu1,2.
DRVisSys: visualization recommendation system based on attribute correlation analysis
[J]. Computer Engineering and Applications, 2018, 54(7): 251-256.
|
[7] |
YANG Shuliang, BI Shuoben, Athanase Nkunzimana, HUANG Tong, WAN Lei.
Spatial clustering method for taxi passenger trajectory
[J]. Computer Engineering and Applications, 2018, 54(14): 249-255.
|
[8] |
GE Yongkan, YU Fengqin .
Improved speech synthesis with adaptive postfilter parameters
[J]. Computer Engineering and Applications, 2017, 53(1): 168-171.
|
[9] |
HU Yifan, HU Youbin, LI Qian, GENG Dongdong.
Research on face detection, tracking and recognition system based on video surveillance
[J]. Computer Engineering and Applications, 2016, 52(21): 1-7.
|
[10] |
KANG Kai, WANG Jiabao, LIU Fangxin.
Anomaly detection of public safety based on trajectory clustering
[J]. Computer Engineering and Applications, 2016, 52(14): 7-11.
|
[11] |
JIANG Fang1,2, LI Guohe1,2,3, YUE Xiang4, WU Weijiang1,2,3, HONG Yunfeng3, LIU Zhiyuan3, CHENG Yuan3.
Segmentation of Chinese word based on method of rough segment and part of speech tagging
[J]. Computer Engineering and Applications, 2015, 51(6): 204-207.
|
[12] |
CHAI Qian, WANG Huiqin, LIAO Yuting, LU Ying, MA Zongfang.
Flame recognition algorithm based on Hidden Markov Model and Support Vector Machines
[J]. Computer Engineering and Applications, 2015, 51(13): 202-205.
|
[13] |
LI Shuangqing, MU Shengdi.
Improved DBSCAN algorithm and its application
[J]. Computer Engineering and Applications, 2014, 50(8): 72-76.
|
[14] |
ZHANG Jijun1, MA Dengwu2, WANG Lin1.
Recognition and diagnosis of incipient faults in analog circuit using improved HMM
[J]. Computer Engineering and Applications, 2014, 50(3): 261-264.
|
[15] |
ZHAO Hongjian1, DA Hanqiao2.
Fault diagnosis method based on HMM-LSSVM
[J]. Computer Engineering and Applications, 2014, 50(19): 237-240.
|