[1] |
ZHANG Hao-yang, YIN Zi-ming, LE Jun-yi, SHEN Da-cong, SHU Yi-jun, YANG Zi-yi, .
3D-SPRNet: Segmentation Model of Gallbladder Cancer Based on Parallel Decoder and Double Attention Mechanism
[J]. Computer and Modernization, 2023, 0(12): 59-66.
|
[2] |
XIA Yi-chun, LI Wang-gen, LI Dou-dou, GE Ying-kui, WANG Zhi-ge.
CTR Prediction Model Combining Attention Mechanism and Graph Neural Network
[J]. Computer and Modernization, 2023, 0(03): 29-37.
|
[3] |
TANG Shu-fang, WANG Zhi-sheng.
Semantic Segmentation of Street Scenes Based on Double Attention Mechanism
[J]. Computer and Modernization, 2021, 0(10): 69-74.
|
[4] |
CUI Wen-di, DUAN Peng-fei, ZHU Hong-qiang, LIU Na.
Security Risk Assessmenton of Attack Graph and HMM Industrial Control Network
[J]. Computer and Modernization, 2020, 0(07): 32-37.
|
[5] |
LIU Bo1, WANG Ming-wei2, CHANG Li-bo3.
A System of Sports Monitoring and Fall Warning for Elderly
[J]. Computer and Modernization, 2020, 0(05): 101-.
|
[6] |
LIU Wei, WANG Jun-min, LIU Ke-qin.
Longitudinal Shredded Paper Stitching Method Based on Edge Matching
[J]. Computer and Modernization, 2019, 0(02): 55-.
|
[7] |
WANG Wei.
Non-rigid 3D Point Cloud Registration Method
[J]. Computer and Modernization, 2018, 0(12): 116-.
|
[8] |
XIONG Su-sheng1,2.
Identifying Transportation Mode Based on Improved LightGBM Algorithm
[J]. Computer and Modernization, 2018, 0(10): 68-.
|
[9] |
JU Shu-cun1,2, CHENG Wen-jie1,2, XU Jian-peng1,2, ZHOU Lu-yang1,2,.
Data Acquisition System for Agricultural Meteorological IOT
[J]. Computer and Modernization, 2018, 0(09): 105-.
|
[10] |
BUYi-chen,HUANGHuan,QINHai-peng,JINXin.
AControlSystemforLaserLevelingMachinesBasedonCANBus
[J]. Computer and Modernization, 2018, 0(07): 58-.
|
[11] |
WUJian-tai,LIUGuang-jie,LIUWei-wei,DAIYue-wei.
CyberSecuritySituationEvaluationMethodBasedon#br#
AssociationAnalysisandHiddenMarkovModel
[J]. Computer and Modernization, 2018, 0(06): 30-.
|
[12] |
MOPei-ji1,2,LEIHong1.
ImageDenoisingAlgorithmBasedonReactionDiffusionandNonlocalSelf-similarity
[J]. Computer and Modernization, 2018, 0(06): 54-.
|
[13] |
CHEN Cheng, Nurmamat HELIL.
Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE
[J]. Computer and Modernization, 2018, 0(05): 74-.
|
[14] |
HUANG Shu-juan1, ZHU Yi-an2, GAO Wu-qi1, LUO Jun-min1.
Dual Triggered Security Access Mechanism for Embedded System Kernel
[J]. Computer and Modernization, 2018, 0(05): 79-.
|
[15] |
NI Man-man1,2.
Improved Collaborative Filtering Recommendation Algorithm Based on ALS Model
[J]. Computer and Modernization, 2018, 0(02): 76-.
|