Computer Science ›› 2022, Vol. 49 ›› Issue (10): 252-257.doi: 10.11896/jsjkx.210900210
• Artificial Intelligence • Previous Articles Next Articles
MENG Yuan, QIN Yun-chuan, CAI Yu-hui, LI Ken-li
CLC Number:
[1]CHUONG L V,HUNG P D,DIEP V T,et al.Robotic Process Automation and Opportunities for Vietnamese Market[C]//Proceedings of The 7th International Conference on Computer and Communications Management.2019:94-98. [2]UNAL M A,BOLUKBAS O.The Acquirements of Digitali-zation with RPA(Robotic Process Automation) Technology in the Vakif Participation Bank[C]//ICISS 2021:2021 The 4th International Conference on Information Science and Systems.2021:68-73. [3]ISSAC R,MUNI R,DESAI K.Delineated Analysis of Robotic Process Automation Tools[C]//2018 Second International Conference on Advances in Electronics,Computers and Communications(ICAECC).2018:1-5. [4]XU Y F,LIU Y,WU W P.Research and Application of Social Network Data Acquisition Technology[J].Computer Science,2017,44(1):277-282. [5]LI W Q,SUN X,ZHANG C Y,et al.A Semantic Similarity Measure between Ontological Concepts [J].ACTA Automatica Sinica,2012,38(2):229-235. [6]WU G Q,HU J,LI L,et al.Online Web News Extraction via Tag Path Feature Fusio[J].Journal of Software,2016,27(3):714-735. [7]SONG J,YANG X F,LI Y C,et al.Research onRecognition Algorithm for Subject Web Pages Based on Tag Tree Adjacency Matrix[J].Computer Science,2016,43(6):316-320. [8]NASSIRI H,MACHKOUR M,HACHIMI M.One Query toRetrieve XML and Relational Data[J].Procedia Computer Science,2018,134:340-345. [9]UZUN E.A Regular Expression Generator Based on CSS Selectors for Efficient Extractionfrom HTML Pages[J].Turkish Journal of Electrical Engineering and Computer Sciences,2020,28(6):3389-3401. [10]SU Q,LI Z Z,LIU T T,et al.Tree Structure Evaluation Visua-lization Model for Program Debugging[J].Computer Science,2021,48(5):68-74. [11]THACKSTON R.Exploring the Use of XPath Queries for Automated Assessment of Student Web Development Projects[C]//SIGITE 20:The 21st Annual Conference on Information Technology Education.2020:255-259. |
[1] | WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li. Design and Implementation of RPA System Based on UIA Interface [J]. Computer Science, 2022, 49(8): 225-229. |
[2] | ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian. Team Cooperative Attack Planning Based on Multi-agent Joint Decision [J]. Computer Science, 2021, 48(5): 301-307. |
[3] | LIU Fang, HONG Mei, WANG Xiao, GUO Dan, YANG Zheng-hui, HUANG Xiao-dan. Performance Analysis of Randoop Automated Unit Test Generation Tool for Java [J]. Computer Science, 2020, 47(9): 24-30. |
[4] | MA Wen-zhuo and ZHANG Jie. Design Robot System Based on Stereo Perception Technology Computer Engineering and Applications [J]. Computer Science, 2016, 43(Z6): 563-567. |
[5] | WANG Bin, YUE Peng, LI Jie and ZHANG Li-hai. Research of GIS Second Development Based on OLE Technology [J]. Computer Science, 2016, 43(Z11): 578-580. |
[6] | YAN Cong, JI Mo-xuan and JI Qing-ge. Research on Video Copy Detection Algorithm Based on Spatial-Temporal Domain Informative Fusion [J]. Computer Science, 2016, 43(9): 274-279. |
[7] | SONG Jun, YANG Xiao-fu, LI Yi-cai and WANG Jia-wei. Research on Recognition Algorithm for Subject Web Pages Based on Tag Tree Adjacency Matrix [J]. Computer Science, 2016, 43(6): 316-320. |
[8] | WANG Huan-huan, WU Yi-jian and ZHAO Wen-yun. Automatic Detection Method of Cross-browser Web Application [J]. Computer Science, 2015, 42(Z11): 444-449. |
[9] | WANG Ya-pu, WANG Zhi-jian and YE Feng. Research of Improved Tree Path Model in Web Page Clustering [J]. Computer Science, 2015, 42(5): 109-113. |
[10] | LAI Xin and HUANG Bang-ju. Research of Information Security Assessment for ATC Automation Systems [J]. Computer Science, 2014, 41(Z6): 474-476. |
[11] | WANG Mao-guang and CAO Huai-hu. Scenario Automation Machine Based Internetware Evolution [J]. Computer Science, 2014, 41(11): 94-98. |
[12] | CHEN Shu,YE Jun-min and ZHANG Fan. Automatic Program Testing with Dynamic Symbolic Execution and Model Learning [J]. Computer Science, 2013, 40(8): 161-164. |
[13] | MA Jun and ZHANG Yi-bin. Security Protocol Based on IEC60870-5-104for Communication in Distribution Automation [J]. Computer Science, 2013, 40(11): 81-84. |
[14] | ZHU Chuang-ying,CHANG Liang,XU Zhou-bo and LI Feng-ying. Model Checking of Temporal Description Logic ALC-LTL Based on Label Büchi Automata [J]. Computer Science, 2013, 40(10): 166-171. |
[15] | . Program Attack and Protection Based on Return-Oriented Programming [J]. Computer Science, 2012, 39(Z6): 1-5. |
|