| [1] |
LI Xiongqing1, 2, PENG Mingtian1, 2, LI Yong1, 2, WANG Junfei1, 2, LIU Dezhi1, 3, BIAN Yuxuan1, 3, CHAI Yuelin1, 3, LIU Yuntao1, 3.
Survey on Bundle Recommendation Algorithms
[J]. Computer and Modernization, 2025, 0(09): 1-13.
|
| [2] |
GUO Jinhao, WANG Fengping, WANG Haoqi.
PB-YOLOv7 Pedestrian Detection Method for Dense Scenes
[J]. Computer and Modernization, 2025, 0(09): 14-19.
|
| [3] |
YAO Jie1, YIN Honghai1, WANG Dahai1, LI Runzi2, ZHANG Qianwen2, GUO Yu2.
Target Pose Estimation Methods for Distribution Network Bypass Operation Robots
[J]. Computer and Modernization, 2025, 0(09): 20-26.
|
| [4] |
ZHANG Jingying1, GENG Lin2, LIU Ningzhong2.
Low-data Fine-grained Image Classification Based on Self-distillation and Self-attention Enhancement
[J]. Computer and Modernization, 2025, 0(09): 27-34.
|
| [5] |
LUO Deyan, XU Yang, ZUO Fengyun, ZHANG Yongdan.
Lightweight Garbage Classification and Detection of Improved YOLOv8
[J]. Computer and Modernization, 2025, 0(09): 35-42.
|
| [6] |
JIA Tao1, WU Yuechao2, LYU Yang2, FU Wenlong3.
Defect Detection of Photovoltaic Panel Based on Improved YOLOv8-EDD
[J]. Computer and Modernization, 2025, 0(09): 43-49.
|
| [7] |
WANG Song1, LI Yuanzhi2, CHEN Wei1, BIAN Yuxiang3.
Quantum Identity Authentication Protocol Based on Quantum Secure Direct Communication
[J]. Computer and Modernization, 2025, 0(09): 50-54.
|
| [8] |
JI Xiulan.
User Device Security Authentication Method for Cloud Computing Data Transmission
[J]. Computer and Modernization, 2025, 0(09): 55-60.
|
| [9] |
JI Xingyu1, HUANG Chenrong2, YAO Juncai2, WANG Kai1, GU Mingjie1.
Insulator Defect Detection Based on Complex Environment
[J]. Computer and Modernization, 2025, 0(09): 67-72.
|
| [10] |
ZHU Lulu, GU Lin.
Arbitrary Style Transfer Method with Multi-scale Semantic Adaptation
[J]. Computer and Modernization, 2025, 0(09): 73-78.
|
| [11] |
YANG Tianshun1, SONG Huansheng1, LIANG Haoxiang2, LIU Haonan1, MA Xinzhou1, SUN Shijie1, ZHANG Shaoyang1.
Multimodal Tunnel Fire Detection Based on Temporal Features of Video
[J]. Computer and Modernization, 2025, 0(09): 79-89.
|
| [12] |
LI Su, LI Dequan, QING Yu.
Single View 3D Hair Modeling Based on Mask Constraints
[J]. Computer and Modernization, 2025, 0(09): 90-96.
|
| [13] |
LIU Cheng, FENG Guang.
CNN-BiLSTM and LightGBM Stock Prediction Based on Dual Attention Mechanism
[J]. Computer and Modernization, 2025, 0(09): 97-103.
|
| [14] |
SHANG Boxiang1, GUO Xiaoyan2, ZHENG Jian1, SUN Xianfan2.
Joint Knowledge Extraction for Cloud-edge Collaborative Multi-source Transmission Data
[J]. Computer and Modernization, 2025, 0(09): 104-108.
|
| [15] |
CHENG Mengyuan, LI Yanhui, LYU Tianci, ZHAO Yuxin, HUANG Chen.
FedLDP: Efficient Federated Learning with Localized Differential Privacy
[J]. Computer and Modernization, 2025, 0(09): 109-118.
|