[1] |
Jiuyuan HUO, Hongyang WANG, Tao JU, Jun HU.
Research on Human Health States Assessment Model Based on AHP-EWM in Multiple Scenarios
[J]. Computer Engineering, 2024, 50(7): 372-380.
|
[2] |
Jie ZHAI, Yanhao LI, Binbin LI, Weibin GUO.
Personalized Experiment Report Comments Auto-Generation and Application Based on Large Language Models
[J]. Computer Engineering, 2024, 50(7): 42-52.
|
[3] |
ZHOU Chunliang, LIU Yangguan, MENG Xiangpei.
Social Network User Influence Evaluation Model Based on Bayesian Derived Classifier
[J]. Computer Engineering, 2024, 50(6): 394-400.
|
[4] |
YU XUE, Changchang LU.
Continuous Evolutionary Neural Architecture Search Based on Biased Sampling
[J]. Computer Engineering, 2024, 50(2): 91-97.
|
[5] |
LIU Hangbo, MA Li, LI Yang, MA Dongchao, FU Yingxun.
Obstacle Avoidance Method Using DQN to Classify Obstacles in Unmanned Driving
[J]. Computer Engineering, 2024, 50(11): 380-389.
|
[6] |
WANG Wenjing, FAN Tao, WANG Guozhong, ZHAO Haiwu.
Teaching Quality Evaluation Method Based on SA-BPNN Multi-Modal Fusion
[J]. Computer Engineering, 2024, 50(11): 390-398.
|
[7] |
Ping YANG, Zhenyu WU, Gang LONG, Huahui YANG, Junduo YANG, Penghui LIU, Yingbei NIU.
Research on Test Adequacy of Command Information System Based on Mission Profile
[J]. Computer Engineering, 2023, 49(7): 295-304.
|
[8] |
YE Qi, ZHANG Yiqian, RUAN Tong, DU Wen.
Quality Verification Method for Knowledge Graph Based on Semantic and Structural Trustworthiness
[J]. Computer Engineering, 2023, 49(5): 48-55.
|
[9] |
GU Zhimin, WANG Ziying, GUO Jing, GUO Yajuan, FENG Jingyu.
5G-Power-Compromised Terminal Threat Detection Based on Atomized Zero-Trust Component
[J]. Computer Engineering, 2023, 49(2): 161-168.
|
[10] |
CHEN Kai, XU Cheng, LIU Hongzhe, DAI Songyin.
Blockchain-based Evaluation Model for Dangerous Driving Map Data
[J]. Computer Engineering, 2022, 48(8): 160-165,172.
|
[11] |
FANG Zhiyuan, SHI Shoudong, ZHENG Jiaqing, HU Jiadian.
Pruning Method of Convolutional Neural Network Model with Weak Layer Penalty
[J]. Computer Engineering, 2022, 48(5): 67-73.
|
[12] |
ZHANG Xuhao, FENG Wenlong, HUANG Mengxing, LIU Wei.
Trust Evaluation Scheme for Technology Quality of Service Based on Blockchain
[J]. Computer Engineering, 2022, 48(5): 127-135,144.
|
[13] |
GU Qingzhu, DONG Hongbin.
MI Loss Evaluation Model for k-Anonymity in PPDM
[J]. Computer Engineering, 2022, 48(4): 143-147.
|
[14] |
FU Pengbin, LIU Penghui, YANG Huirong, DONG Aojing.
Online Chinese and English Handwriting Recognition Method Based on Multiple Rules and Path Evaluation
[J]. Computer Engineering, 2022, 48(3): 253-262.
|
[15] |
HUANG Zhiqing, XIE Luyang, ZHANG Yanxin, YIN Zeming.
Blockchain-based Reputation Evaluation Model for Data Services in Internet of Things
[J]. Computer Engineering, 2022, 48(1): 33-42.
|