[1] |
YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2.
Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection
[J]. Computer and Modernization, 2024, 0(05): 46-54.
|
[2] |
MENG Yalei1, SHI Hongyu1, WANG Yu2.
A Method of Predicting Open Flow Potential
[J]. Computer and Modernization, 2024, 0(04): 33-37.
|
[3] |
XIE Shi-bin, LIU Meng-chi, TANG Shi-qi, ZHOU Rui-ping, .
A Temporal Convolutional Knowledge Tracking Model Based on#br#
Multiple Feature Extraction#br#
[J]. Computer and Modernization, 2023, 0(07): 25-29.
|
[4] |
LIU Pei.
Medical Insurance Fee Control System Based on Data Mining
[J]. Computer and Modernization, 2023, 0(06): 89-94.
|
[5] |
PAN Yu-qing, ZHANG Su-ning, FENG Ren-jun, JING Dong-sheng.
Intrusion Detection Method Based on Particle Swarm Optimization Combined with LightGBM
[J]. Computer and Modernization, 2023, 0(04): 123-126.
|
[6] |
WANG Shao-hua, OUYANG Hui-dan, SUN Dan, WANG Kang, WU Hong-ping, ZHONG Xun, CHU Xing-ping, YANG Song-tao.
Association Rule Mining of Undergraduate Physical Test Items Based on Apriori Algorithm
[J]. Computer and Modernization, 2023, 0(03): 66-70.
|
[7] |
ZHANG Zi-sen, XU Xiao-zhong.
Load Forecasting Based on Decomposition and Multi-component Ensemble Learning
[J]. Computer and Modernization, 2023, 0(03): 96-101.
|
[8] |
SONG Xiao-li, ZHANG Yong-bo, ZHANG Pei-ying.
Anomaly Detection of Student Consumption Data Based on Semi-supervised Learning
[J]. Computer and Modernization, 2022, 0(12): 13-17.
|
[9] |
DUAN Gui-qin, ZOU Chen-song.
Occupational Competence Evaluation Model Based on Affinity Propagation Clustering
[J]. Computer and Modernization, 2022, 0(05): 21-27.
|
[10] |
YANG Lin, BAI Zhao, KOU Yong-gang.
Analysis of Airline Customer Churn by Random Forest Algorithm Based on RFM Model
[J]. Computer and Modernization, 2021, 0(01): 100-104.
|
[11] |
GUO Xin, CHEN Ying, ZHANG Ming-huan, ZHANG Xuan, PAN Shu-ming, TANG Lu-jia.
Analysis and Prediction of Training Effects of National Disaster Life Support Course with Machine Learning Methods
[J]. Computer and Modernization, 2020, 0(12): 61-66.
|
[12] |
LI Ke-xin, LI Jing, SHAO Jia-wei, XIAO Yi.
High-dimensional Numerical Anomaly Data Detection Based on Multi-level Sequence Integration
[J]. Computer and Modernization, 2020, 0(06): 73-.
|
[13] |
JIANG Yi, OU Yu-qiang, LIANG Guang, GAO Yang, YAN Yong-gao, LIN Jie, ZHAO Xiao-ning.
Risk Situation Assessment Method of Field Operation Based on Data Mining
[J]. Computer and Modernization, 2020, 0(04): 78-.
|
[14] |
WANG Yao, LI Wei, WU Ke-he, CUI Wen-chao.
Application of Fusion Model of GBDT and LR in Encrypted Traffic Identification
[J]. Computer and Modernization, 2020, 0(03): 93-.
|
[15] |
QI Yu-dong1, DING Hai-qiang1, ZHAO Jin-chao2, SUN Ming-wei1.
biRNN-based Method for Processing Unbalanced Text Data Sets of Naval Ordnance
[J]. Computer and Modernization, 2019, 0(12): 21-.
|