Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 591-594.
• Interdiscipline & Application • Previous Articles Next Articles
HAO Jun-sheng1,LI Bing-feng1,CHEN Xi2,GAO Wen-juan3
CLC Number:
[1]张宁,刘宏磊,谭薇,等.基于校园一卡通的电子商务平台的设计与实现[J].华中师范大学学报(自然科学版),2017(S1):195-199. [2]杨斯博.基于安卓平台的手机订餐系统的设计与实现[D].长春:吉林大学,2016. [3]马勇喆.基于Android平台的高校订餐软件设计与实现[J].信息技术,2016(3):170-174. [4]张裔智,赵毅,汤小斌.MD5算法研究[J].计算机科学,2008,35(7):295-297. [5]WANG X,FENG D,LAI X,et al.Collisions for Hash Functions MD4,MD5,HAVAL-128 and RIPEMD[EB/OL]. [2013-10-20].http://eprint.iacr.org/2004/199.pdf. [6]PIMENTE l V,NICKERSON B G.Communicating and displaying real-time data with WebSocket[J].IEEE Internet Computing,2012,16(4):45-53. [7]COWARD D.Java WebSocket编程[M].北京:清华大学出版社,2015. [8]沈海波,洪帆.基于Cookie的跨域单点登录认证机制分析[J].计算机应用与软件,2006,23(12):48-51. [9]OSKARSSON A,SKERFVING S,et al.Total and inorganic mercury in breast milk and blood in relation to fish consumption and amalgam fillings in lactating women[J].Archives of Environmental Health:An International Journal,1996,51(3):234-241. [10]JIANG F,KU S.How to display the data from database by Listview on An-droid[C]∥2010 2nd International Workshop on Intelligent Systems and Applications (ISA).IEEE,2010:1-4. [11]BATYUK L,HERPICH M,CAMTEPE S A,et al.Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications[C]∥2011 6th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2011:66-72. [12]任敏丽.排队论在银行服务系统中的若干应用研究[D].哈尔滨:哈尔滨工业大学,2010. [13]CHEN N,XU Z S,XIA M M.Hierarchical hesitant fuzzy K-means clustering algorithm[J].Applied Mathematics:A Journal of Chinese Universities(Series B),2014,1:1-17. [14]韩微,翟盘茂.3种聚类分析方法在中国温度区划分中的应用研究[J].气候与环境研究,2015,20(1):112-113. [15]章基嘉,孙照渤,陈松军.应用K均值聚类法对东亚各自然天气季节500毫巴候平均环流的分型试验[J].气象学报,1984(3):55-63. [16]贾俊平,何晓群,金勇进.统计学[M].北京:中国人民大学出版社,2012. |
[1] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[2] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[3] | XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240. |
[4] | CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322. |
[5] | SUN Zhi-qiang, WAN Liang, DING Hong-wei. Android Malware Detection Method Based on Deep Autoencoder Network [J]. Computer Science, 2020, 47(4): 298-304. |
[6] | ZHONG Ya,GUO Yuan-bo,LIU Chun-hui,LI Tao. User Attributes Profiling Method and Application in Insider Threat Detection [J]. Computer Science, 2020, 47(3): 292-297. |
[7] | RAO Meng,MIAO Duo-qian,LUO Sheng. Rough Uncertain Image Segmentation Method [J]. Computer Science, 2020, 47(2): 72-75. |
[8] | JIAO Yang, YANG Chuan-ying, SHI Bao. Relevance Feedback Method Based on SVM in Shoeprint Images Retrieval [J]. Computer Science, 2020, 47(11A): 244-247. |
[9] | YAO Li-shuang, LIU Dan, PEI Zuo-fei, WANG Yun-feng. Real-time Network Traffic Prediction Model Based on EMD and Clustering [J]. Computer Science, 2020, 47(11A): 316-320. |
[10] | SUN Zhi-gang, WANG Guo-tao, JIANG Ai-ping, GAO Meng-meng, LIU Jin-gang. Monitoring System of Traffic Safety Based on Information Fusion Technology [J]. Computer Science, 2020, 47(11A): 642-650. |
[11] | LI Gui-hui,LI Jin-jiang,FAN Hui. Image Denoising Algorithm Based on Adaptive Matching Pursuit [J]. Computer Science, 2020, 47(1): 176-185. |
[12] | JIANG Hua,WU Yao,WANG Xin,WANG Hui-jiao. Study on Ocean Data Anomaly Detection Algorithm Based on Improved K-means Clustering [J]. Computer Science, 2019, 46(7): 211-216. |
[13] | WEN Jun-hao,WAN Yuan,ZENG Jun,WANG Xi-bin,LIANG Guan-zhong. Application of Illumination Clustering and SVM in Energy-saving Control Strategy of Street Lamps [J]. Computer Science, 2019, 46(7): 327-332. |
[14] | LIU Chang-qi, SHAO Kun, HUO Xing, FAN Dong-yang, TAN Jie-qing. K-means Image Segmentation Algorithm Based on Weighted Quality Evaluation Function [J]. Computer Science, 2019, 46(6A): 158-160. |
[15] | HOU Yuan-yuan, HE Ru-han, LI Min, CHEN Jia. Clothing Image Retrieval Method Combining Convolutional Neural Network Multi-layerFeature Fusion and K-Means Clustering [J]. Computer Science, 2019, 46(6A): 215-221. |
|