Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 1-5.doi: 10.11896/JsJkx.190700078
• Artificial Intelligence • Previous Articles Next Articles
LIU Zi-qi1, 2, 3, 4, GUO Bing-hui1, 2, 3, 4, CHENG Zhen5, YANG Xiao-bo1, 2, 3, 4 and YIN Zi-qiao1, 2, 3, 4
CLC Number:
[1] MA P.A Review of Research Based on Bibliometric Analytic Hierarchy Process.Economic Research Gguide,2018(32):6-8. [2] YIN H.Performance Evaluation of Scientific and Technological Achievements Transformation Based on AHP-Entropy Method.Operations Research and Management Science,2007(12):111-117. [3] DONG B S.Coal Mine Safety Risk Assessment Based on Entropy Weight Fuzzy Analytic Hierarchy Process.Journal of Shanxi Institute of Energy,2019(4):25-28. [4] HUANG X F,HUANG X Q,FANG G H,et al.Benefit Evaluation of Reservoir Reinforcement Based on GA-AHP and Matter Element Analysisl.Water Resources and Power,2016(10):141-145. [5] WANG N,SHEN Z Z,XU L Q,et al.Evaluation of reinforcement effect of dangerous reservoirs based on simulated annealing analytic hierarchy process.Water Resources and Power,2013(9):65-67. [6] CHAI C C,XU D Q,ZHANG L,et al.Urban river channel based on fuzzy hierarchy-principal component analysis Comprehensive evaluation of ecological slope protection.Bulletin of Soil and Water Conservation,2016(10):167-177. [7] WANG L P,CHEN X X.Comprehensive evaluation of river ecological slope protection based on fuzzy hierarchy-principal component analysis.Water Conservancy Science and Technology and Economy,2018(8):38-42. [8] FENG Y.Research on Network Security Evaluation Based on Inter-regional Analytic Hierarchy Process.Mathematics in Practice and Theory,2016(3):162-167. [9] WANG W.Research on Network Security Evaluation by AHP and SVM Combination.Computer Simulation,2011(3):182-185. [10] XIAO H.The application of analytic hierarchy process in the choice of transportation mode.Economic and Trade Practice,2019,02,298. [11] CHENG Z,XUE H F.Evaluation of National Defense Science and Technology Strategy Effectiveness Based on Fuzzy Analytic Hierarchy Process[J].Scientific Management Research,2019(2). [12] LIN C R,YANG X Y.Product quality evaluation based on entropy method and sequence relation analysis method.Modular Machine Tools and Automated Processing Technology,2018,1001-2265:10-0156-05. [13] SONG Y Y,LU Y.Decision tree methods:application for classification and prediction.Shanghai Archives of Psychiatry,2015,27(2):130-135. [14] BAI X M,ZHAO S S.The method of weight determination derived from index correlation.Jiangsu Statistics,1998(4):16-18. |
[1] | XIA Yuan, ZHAO Yun-long, FAN Qi-lin. Data Stream Ensemble Classification Algorithm Based on Information Entropy Updating Weight [J]. Computer Science, 2022, 49(3): 92-98. |
[2] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[3] | ZHAO Qin-yan, LI Zong-min, LIU Yu-jie, LI Hua. Cascaded Siamese Network Visual Tracking Based on Information Entropy [J]. Computer Science, 2020, 47(9): 157-162. |
[4] | ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621. |
[5] | YUE Wen-jiao, LI Peng, WEN Jun-hao, XING Bin. Study on Impact Assessment Model of Enterprise Data Application [J]. Computer Science, 2020, 47(11A): 520-523. |
[6] | FENG Shen-feng, GAO Jian-hua. Test Case Prioritization Method Based on AHP for Regression Testing [J]. Computer Science, 2019, 46(8): 233-238. |
[7] | WANG Ya-ge, KANG Xiao-dong, GUO Jun, HONG Rui, LI Bo, ZHANG Xiu-fang. Image Compression Method Combining Canny Edge Detection and SPIHT [J]. Computer Science, 2019, 46(6A): 222-225. |
[8] | ZHANG Fang, ZHAO Shu-liang, WU Yong-liang. Data Scaling Method for Multi-scale Data Mining [J]. Computer Science, 2019, 46(4): 57-65. |
[9] | ZHU Pei-pei, LONG Min. Recommendation Methods Considering User Indirect Trust and Gaussian Filling [J]. Computer Science, 2019, 46(11A): 178-184. |
[10] | ZHENG Shu-fu,YU Gao-feng. Attribute Transfer and Knowledge Discovery Based on Formal Context [J]. Computer Science, 2018, 45(6A): 117-119. |
[11] | ZOU Na, TIAN Jin-wen. Research on Multi Feature Fusion Infrared Ship Wake Detection [J]. Computer Science, 2018, 45(11A): 172-175. |
[12] | WANG Feng, LIU Ji-chao, WEI Wei. Semi-supervised Feature Selection Algorithm Based on Information Entropy [J]. Computer Science, 2018, 45(11A): 427-430. |
[13] | YUAN Xiao-yan, WANG An-zhi, PAN Gang and WANG Ming-hui. Visual Attention Modeling Based on Multi-scale Fusion of Amplitude Spectrum and Phase Spectrum [J]. Computer Science, 2017, 44(7): 293-298. |
[14] | ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun. Computing Research of User Similarity Based on Micro-blog [J]. Computer Science, 2017, 44(2): 262-266. |
[15] | WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327. |
|