Computer Science ›› 2015, Vol. 42 ›› Issue (8): 269-272.
Previous Articles Next Articles
YANG Wei-jie
[1] Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network [J].International Journal of Network Security,2012,14(3):149-155 [2] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619 [3] Zhu Q Y,Yang X F,Ren J,et al.Modeling and analysis of the spread of computer virus[J].Communications in Nonlinear Science and Numerical Simulation,2012,17(12):5117-5124 [4] Zahran B M,Kanaan G.Text feature selection using particle swarm algorithm [J].World Applied Sciences Journal,2009,25(7):69-74 [5] 姜大庆,周勇,夏士雄.基于语义描述与优化的网络性能数据聚类方法[J].计算机应用,2012,32(6):1522-1525 Jiang Da-qing,Zhou Yong,Xia Shi-xiong.Network performance data clustering method based on semantic description and optimization[J].Journal of Compater Applications,2012,32(6):1522-1525 [6] Hu W M,Hu M,Maybank S.Adaboost based algorithm for network intrusion detection [J].IEEE Transactions on Systems,Man and Cybernetic,Parb B:Cybernetics,2008,38(2):577-583 [7] 何永强,谷春英.基于子任务区域分片下的分布式空间查询处理与并行调度方法[J].科技通报,2014,0(1):110-116 He Yong-qiang,Gu Chun-ying.Distributed Spatial Query Processing and Parallel Schedule Based on Zonal Fragmentation[J].Bulletin of Science and Technology,2014,0(1):110-116 [8] 邓兵,陶然,平殿发,等.基于分数阶傅里叶变换补偿多普勒徙动的动目标检测算法[J].兵工学报,2009,0(10):1034-1039 Deng Bing,Tao Ran,Ping Dian-fa,et al.Moving-Target-Detection Algorithm with Compensation for Doppler Migration Based on FRFT[J].Acta A rmanentarii,2009,30(10):1034-1039 [9] 蒋芸,陈娜,明利特,等.基于Bagging的概率神经网络集成分类算法[J].计算机科学,2013,40(5):242-246 Jiang Yun,Chen Na,Ming Li-te,et al.Bagging-based probability Neural Network Ensemble Classification Algorithm[J].Computer Science,2013,40(5):242-246 [10] 陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法[J].计算机学报,2012,35(5):1011-1017Chen Hao,Yang Jun-an,Zhuang Zhen-quan.The Core of Attri-butes and Minimal Attributes reduction in Variable Precision Rough Set[J].Chinese Journal of Computers,2012,35(5):1011-1017 |
No related articles found! |
|