Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 196-203.doi: 10.11896/jsjkx.191100203
• Computer Graphics & Multimedia • Previous Articles Next Articles
ZHONG Ma-chi, ZHANG Jun-lang, LAN Yang-bo, HE Yue-hua
CLC Number:
[1] WU L Q.A comparative study on the effect of online classroom teaching and traditional classroom teaching[J].Education Mo-dernization,2019,6(9):276-277. [2] TU Y,ZHANG Y J.An empirical study on the supervision mo-del of knowledge construction effect in online classroom[J].Education Modemization,2018,41(3):64-73. [3] WANG J J.Research on the application of emotion computing based on expression recognition technology in Modern Distance Education[D].Tianjin:Tianjin Normal University,2005. [4] YUAN Y.Research on the recognition of bad expression in Distance Education[D].Chengdu:Sichuan Normal University,2014. [5] LI W Q.Research on learning focus recognition method for Distance Education[D].Hangzhou:Hangzhou Dianzi University,2018. [6] PAN X.Research on face detection and expression feature extraction of learners in online teaching context[D].Beijing:Capital Normal University,2009. [7] XIONG B H.Research and application of attention detectionmethod integrating sight analysis in online learning [D].Hangzhou:Hangzhou University of Electronic Science and technology,2018. [8] PENG D L.General psychology [M].Beijing:Beijing NormalUniversity Press,2001:169-193. [9] WIERWILLE W W,ELLSWORT L A,WREGGIT S S,et al.Research on vehicle-based driver status/performance monitoring;development,validation,and refinemen of algorithms for detection of driver drowsiness,final report[R].Office of Crash Avoidance Research National Highway Traffic Safety Administration,1994,12:247. [10] LIN C D,YANG Z L,HUANG X T.Dictionary of Psychology(Volume I)[M].Shanghai:Shanghai Education Press,2003:947-948. [11] FENG M N,LIU X M.The relationship between cognitive inhibition and emotion and action control style of college students[J].Chinese Journal of mental health,2019(11):862-867. [12] SHEN J C,DU S X,LUO Y,et al.Fuzzy comprehensive evaluation method and application based on cloud model[J].Fuzzy System and Mathematics,2012,26(6):115-123. [13] LU Y,WANG Z.Detecting Driver Yawning in Successive Images[C]//The International Conference on Bioinformatics and Biomedical Engineering.IEEE Xplore,2007,07:581-583. [14] SAATY,THOMAS L,PENIWATI,et al.Group Decision Ma-king:Drawing out and Reconciling Differences[M].Pittsburgh,Pennsylvania:RWS Publications,2013:1-385. [15] LI X C.Fuzzy mathematics method and application[M].Beijing:Chemical Industry Press,2017:83-113. |
[1] | JING Hui-yun, ZHOU Chuan, HE Xin. Security Evaluation Method for Risk of Adversarial Attack on Face Detection [J]. Computer Science, 2021, 48(7): 17-24. |
[2] | ZHANG Kai-qiang, JIANG Cong-feng, CHENG Xiao-lan, JIA Gang-yong, ZHANG Ji-lin, WAN Jian. Resource-aware Based Adaptive-scaling Image Target Detection Under Multi-resolution Scenario [J]. Computer Science, 2021, 48(4): 180-186. |
[3] | DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168. |
[4] | ZHAO Bo, YANG Ming, TANG Zhi-wei and CAI Yu-xin. Intelligent Video Surveillance Systems Based on FPGA [J]. Computer Science, 2020, 47(6A): 609-611. |
[5] | LIN Zeng-min, HONG Chao-qun, ZHUANG Wei-wei. Face Image Deduplication Based on Fusion of Face Tracking and Clustering [J]. Computer Science, 2020, 47(11A): 615-619. |
[6] | ZHENG Hong-bo, WU Bin, XU Fei, ZHANG Mei-yu, QIN Xu-jia. Visualization of Solid Waste Incineration Exhaust Emissions Based on Gaussian Diffusion Model [J]. Computer Science, 2019, 46(6A): 527-531. |
[7] | HENG Hong-jun, WANG Rui. Long-term Operational Situation Assessment System for Terminal Buildings [J]. Computer Science, 2019, 46(5): 310-314. |
[8] | ZHAO Qian-qian, LV Min, XU Yin-long. Estimating Graphlets via Two Common Substructures Aware Sampling in Social Networks [J]. Computer Science, 2019, 46(3): 314-320. |
[9] | FENG Yan-hong, YU Hong, SUN Geng, PENG Song. Diversity Measures Method in High-dimensional Semantic Vector Based on Asymmetric Multi-valued Feature Jaccard Coefficient [J]. Computer Science, 2018, 45(6): 57-66. |
[10] | LI Yan, GUO Na-na, WU Ting-ting, ZHAN Yan. Attribute Reduction Based on Concentration Boolean Matrix under Dominance Relations [J]. Computer Science, 2018, 45(10): 229-234. |
[11] | LI Yan, GUO Na-na and ZHAO Hao. Attribute Reduction Based on Variable Precision Rough Sets and Concentration Boolean Matrix [J]. Computer Science, 2017, 44(Z6): 70-74. |
[12] | YANG Yan and JIANG Guo-ping. Improved Method of Computer Virus Signature Automatic Extraction Based on N-Gram [J]. Computer Science, 2017, 44(Z11): 338-341. |
[13] | LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546. |
[14] | XU Wen-hua, CHEN Hai-yan, ZHANG Yu-ping and WANG Jian-dong. Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree [J]. Computer Science, 2016, 43(2): 204-209. |
[15] | HUO Yu-lin and FU Yi-de. Face Detection Design Based on Zynq [J]. Computer Science, 2016, 43(10): 322-325. |
|