Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 530-534.doi: 10.11896/JsJkx.190700124
• Database & Big Data & Data Science • Previous Articles Next Articles
ZHU Di-chen1, XIA Huan2, YANG Xiu-zhang1, YU Xiao-min2, ZHANG Ya-cheng1 and WU Shuai1
CLC Number:
[1] 中国产业信息网.2018年手游行业市场现状分析及行业市场交易规模分析..http://www.chyxx.com/industry/201807/662714.html. [2] 中华网.2018年度游戏收入榜TOP50:钱都让谁赚了?..https://game.china.com/industry/news/11011446/20190116/35008882.html. [3] 郭伏,姜钧译,吕伟,等.手机游戏用户体验评价量表开发与验证.人类工效学,2017,23(4):24-32. [4] 巫溪.手机游戏设计中用户交互行为的原型分析.河南科技大学学报(社会科学版),2018,36(4):67-72. [5] 李鸿明.基于手机游戏中的人机界面交互设计及应用研究.华南理工大学,2012. [6] 郭丹.手机网络游戏玩家的留存意向影响因素研究.西安理工大学,2018. [7] 李菁.基于数据挖掘分析的游戏APP“旅行青蛙”的传播研究.传播力研究,2018,2(7):88-90. [8] 叶志龙.基于数据挖掘的移动手机游戏玩家行为分析.福州:福州大学,2017. [9] 尤海浪,钱锋,黄祥为,等.基于大数据挖掘构建游戏平台个性化推荐系统的研究与实践.电信科学,2014,30(10):27-32. [10] 过岩巍,吴悦昕,赵鑫,等.网络游戏案例研究:用户行为分析和流失预测.中文信息学报,2016,30(1):183-189,197. [11] 钱亚蕾.网易公司手机网络游戏《倩女幽魂》市场营销策略案例研究.武汉:武汉纺织大学,2017. [12] 罗森林.手机游戏行业的天使投资模式研究.上海:上海交通大学,2015. |
[1] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[2] | CONG Ying-nan, WANG Zhao-yu, ZHU Jin-qing. Insights into Dataset and Algorithm Related Problems in Artificial Intelligence for Law [J]. Computer Science, 2022, 49(4): 74-79. |
[3] | JIANG Hao-chen, WEI Zi-qi, LIU Lin, CHEN Jun. Imbalanced Data Classification:A Survey and Experiments in Medical Domain [J]. Computer Science, 2022, 49(1): 80-88. |
[4] | YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117. |
[5] | BAI Yong, ZHANG Zhan-long, XIONG Jun-di. Power Knowledge Text Mining Based on FP-Growth Algorithm and GRNN [J]. Computer Science, 2021, 48(8): 86-90. |
[6] | ZHANG Tong-ming, ZHANG Ning. Review of Research on Investor Sentiment Index in Stock Market [J]. Computer Science, 2021, 48(6A): 143-150. |
[7] | WU Guang-zhi, GUO Bin, DING Ya-san, CHENG Jia-hui, YU Zhi-wen. Cognitive Mechanisms of Fake News [J]. Computer Science, 2021, 48(6): 306-314. |
[8] | ZHANG Han-shuo, YANG Dong-ju. Technology Data Analysis Algorithm Based on Relational Graph [J]. Computer Science, 2021, 48(3): 174-179. |
[9] | GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591. |
[10] | HU Teng, WANG Yan-ping, ZHANG Xiao-song, NIU Wei-na. Data and Behavior Analysis of Blockchain-based DApp [J]. Computer Science, 2021, 48(11): 116-123. |
[11] | GAO Nan,LI Li-juan,Wei-william LEE,ZHU Jian-ming. Keywords Extraction Method Based on Semantic Feature Fusion [J]. Computer Science, 2020, 47(3): 110-115. |
[12] | JIA Jing-dong, ZHANG Xiao-man, HAO Lu, TAN Huo-bin. Analysis of Focuses of Requirements Engineering in Industry [J]. Computer Science, 2020, 47(12): 25-34. |
[13] | HAN Cheng-cheng, LIN Qiang, MAN Zheng-xing, CAO Yong-chun, WANG Hai-jun, WANG Wei-lan. Mining Nuclear Medicine Diagnosis Text for Correlation Extraction Between Lesions and Their Representations [J]. Computer Science, 2020, 47(11A): 524-530. |
[14] | XU Chuan-fu,WANG Xi,LIU Shu,CHEN Shi-zhao,LIN Yu. Large-scale High-performance Lattice Boltzmann Multi-phase Flow Simulations Based on Python [J]. Computer Science, 2020, 47(1): 17-23. |
[15] | HUANG Mei-rong, OU Bo, HE Si-yuan. Access Control Method Based on Feature Extraction [J]. Computer Science, 2019, 46(2): 109-114. |
|