[1] |
LI Junxiao1, ZHANG Xiaolin1, SHI Jing2.
Blockchain-enhanced Vehicle Edge Computing Networks Security Data Storage and Share
[J]. Computer and Modernization, 2024, 0(07): 69-75.
|
[2] |
LI Jiaduo, YAN Xiuying.
Method of Location and Capacity Determination for Distributed Generator Based on#br#
Enhanced Capuchin Search Algorithm
[J]. Computer and Modernization, 2024, 0(04): 27-32.
|
[3] |
YU Chun-lei1, 2, LIU Du-jin1, ZHU Hua-wei1, YANG Jia-rong3.
Fractional Repetition Codes Based on Petersen Graphs
[J]. Computer and Modernization, 2024, 0(03): 122-126.
|
[4] |
CHEN Chao, GU Qing-feng.
Design of Hybrid Workload-oriented Distributed Meteorological Data Management System
[J]. Computer and Modernization, 2023, 0(12): 118-122.
|
[5] |
GUAN Jin-ping, YANG Jin-ji, YANG Cheng-long.
Formal Verification of Raft Protocol Based on Probabilistic Model
[J]. Computer and Modernization, 2023, 0(09): 77-81.
|
[6] |
LIU Xian-zhuo, DENG Wei-si, XIE En-yan.
Adaptive Protection System for Distribution Network Considering Grid Connection of Distributed Generation
[J]. Computer and Modernization, 2023, 0(09): 120-126.
|
[7] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|
[8] |
WANG Zhe, WANG Yu-mei, WU Ya-fei, ZANG Yi-hua.
Latency Optimization of Distributed Key-value Store Based on RDMA
[J]. Computer and Modernization, 2023, 0(02): 24-27.
|
[9] |
ZHANG Hao, LU Hong-ying.
Byzantine Fault-tolerant Distributed Consistency Algorithm for Edge Computing Applications
[J]. Computer and Modernization, 2022, 0(12): 33-41.
|
[10] |
QIU Jin-shui, ZHUANG Hui-fu, JIN Tao.
Design of Intelligent Retrieval System for Massive Plant Images
[J]. Computer and Modernization, 2022, 0(10): 62-67.
|
[11] |
YUAN Jia-li, LIU Meng-chi.
Dynamic Data Partition Algorithm for Information Network Model
[J]. Computer and Modernization, 2022, 0(10): 100-105.
|
[12] |
RAO Hai-bing, ZHU Su-lei, YANG Chun-xia.
Network Intrusion Detection Model Based on Space-time Feature Fusion and Attention Mechanism
[J]. Computer and Modernization, 2022, 0(06): 116-121.
|
[13] |
WU Shui-ming, JI Zhi-yuan, WANG Zhen-yu, JING Dong-sheng.
Power Information Network Intrusion Detection Algorithm Based on Dueling-DDQN
[J]. Computer and Modernization, 2021, 0(12): 43-47.
|
[14] |
DENG Bin-tao, XU Sheng-chao.
A Differential Evolution K-mediods Clustering Algorithm Based on Dynamic Gemini Population
[J]. Computer and Modernization, 2021, 0(07): 54-59.
|
[15] |
LEI Ming, JIANG Han-sheng, WU Guo-liang, ZHAO Yu-juan, LIANG Jian.
Load Balancing Technology Under Big Data Architecture Based on HBase
[J]. Computer and Modernization, 2021, 0(06): 91-95.
|