JOURNAL OF COMPUTERS Vol. 33 No. 2 April 2022
0. |
Contents and cover
|
1. | Research on a Buckling Detection Technique for Rectangular Concrete-filled Steel Tubular Columns based on Grating Projection Bing Xu, Lang Wang, Ming-Zhi Xie full article
|
2. | Research on Practical Byzantine Fault Tolerant Algorithm Based on Trust Mechanism Hui Pang, Yanan Li, Xiumei Wen, Yingxue Mu full article
|
3. | Short-term PV Power Prediction based on VMD-SE-TCAN Model
Yun Wu, Dan-Nan Zhang, Jie-Ming Yang, Zhen-Hong Liu full article
|
5. | A Guided Mutation Grey Wolf Optimizer Algorithm Integrating Flower Pollination Mechanism
Jing-Sen Liu, Qing-Qing Liu, Fang Zuo full article
|
6. | An Improved Kernel Correlation Filter Tracking Combined with Mobilenet SSD
Chang-Jian Wang, Yong Ding, Ye Ji full article
|
7. | Face Recognition Based on SRC Combined with Sparse Embedding Dimensionality Reduction
Chun-Man Yan, Yu-Yao Zhang full article
|
8. | Research on Online and Offline Mixed Education Mode in Post Epidemic Era Based on Fuzzy Neural Network-Taking Introduction of Petrochemical Equipment Management as an Example
Bin Zhao, Jia-Ming Sun, Dian-Kui Gao, Li-Zhi Xu full article
|
9. | An E-mail Classification Algorithm based on Stacking Integrated Learning
Li-Xia Wan, Wei-Xing Huang, Qing-Hua Tang full article
|
10. | Named Entity Recognition Model Based on TextCNN-BiLSTM-CRF with Chinese Text Classification
Ji-Ru Zhang, Bo He full article
|
11. | A Motor Fault Diagnosis Method Based on Industrial Wireless Sensor Networks
Xiaolu Wang, Aohan Li, Guangjie Han, Yanqing Cui full article
|
12. | An Optimization Method of Knowledge Mapping Relationship Based on Improved Ant Colony Algorithm
Shi-Fu Xu, Ya-Nan Jiang full article
|
13. | Development and Application of E-commerce System Based on Column Storage and SAP TREX Technology
Jun Li, Yan-Qin Li, Ming-Xiao Li, Xu-Hua Pan, Zhen-Ze Peng full article
|
14. | The Pointer-type Instrument Recognition Method based on Yolov3
Shu-Qiang Guo, Xian-Jin Li, Huan-Qiang Lin, Yue Lou, Jun-Cheng Li, Zhi-Heng Wang full article
|
15. | Missing Data Interpolation with Variational Bayesian Inference for Socio-economic Statistics Applications
Yun-Shan Sun, Hong-Yan Xu, Yan-Qin Li full article
|
16. | Conditional Privacy Protection Scheme based on Blockchain and Ring Signcryption in VANETs
Nan Cui, Haibing Mu full article
|
17. | FASSFuzzer¡XAn Automated Vulnerability Detection System for Android System Services
Le Weng, Chao Feng, Zhi-Yuan Shi, Ying-Min Zhang, Lian-Fen Huang full article |
18. | Density Space Clustering Algorithm Based on Users Behaviors
Boqing Feng, Mohan Liu, Jiuqiang Jin, Xiuyu Sui full article |
19. | Design and Implementation of Road Traffic Responsibility Identification System based on Semantic Understanding and Similar Cases
Hongde Zhou, Zhenjiang Zhang, Nayue Chen, Yinglong Li, Ruiheng Zhao full article |