Computer Science ›› 2020, Vol. 47 ›› Issue (12): 144-148.doi: 10.11896/jsjkx.191000064
Previous Articles Next Articles
ZHANG Min-jun, HUA Qing-yi
CLC Number:
[1] ZHU G,CAO X L,SUN Y.Game Strategy Analysis of Privacy Protection input in Social Network Environment-based on the Perspective of Evolutionary Game[J].Information Science,2017,25(7):25-30. [2] CHEN Z X,ZENG C,GAO R.A point of interest recommendation model based on location social network fusion of a variety of situational information[J].Research on Computer Application,2017,34(10):2978-2983. [3] LU L,ZHU F X,GAO R,et al.Joint recommendation algorithm of interest points based on user-content topic model[J].Computer Engineering and its Application,2018,54(4):154-159. [4] XIAN X F,CHEN X J,ZHAO P P,et al.The next point of interest recommendation based on context awareness and persona-lization metric embedding[J].Computer Engineering and Science,2018,280(4):50-59. [5] XIAO Y P,LIU H S,LIU Y B.A social network recommendation scheme based on bipartite graph and node role division[J].Electronic Journal,2017,45(10):2425-2433. [6] LIU Y J,HE S,WU Z Q,et al.Recommendation of topic Diversity Reading in University Library based on user Social Network Analysis[J].Library and Information Work,2018,62(8):67-73. [7] CHEN J M,LI J G,TANG F Y,et al.Cooperative friend recommendation algorithm based on user-Project-user interest tagDia-gram[J].Computer Science and Exploration,2018,12(1):92-100. [8] XIAO Y P,SUN H C,DAI T J,et al.A social network recommendation system scoring prediction method based on cloud model[J].Journal of Electronics,2018,425(7):229-234. [9] LIU H T,YANG L Q,LING C.A recommendation algorithmfor integrating social relations and semantic information in social networks[J].Pattern Recognition and Artificial Intelligence,2018,31(3):236-244. [10] WEI Y,LIU G,LI F.Identification and influence evaluation of “invisible” key nodes in online social network information diffusion[J].Information science,2018,36(3):138-143. [11] WANG J F,ZHANG P F,GU Z P,et al.An optimized matrix decomposition algorithm with bias probability[J].Minicomputer System,2017,38(5):1081-1085. [12] FENG X,ZHAO Z F,ZHAO Y.Cognitive tracking waveform design based on matrix weighted multi-model fusion[J].Journal of Harbin University of Technology ,2018,50(5):30-37. [13] WANG J F,MIAO Y L,HAN P F.A probability matrix decomposition cooperative filtering recommendation algorithm based on trust mechanism[J].Minicomputer System,2019,40(1):33-37. [14] WEN J H,SUN G H,LI S.Research of matrix decomposition recommendation algorithm based on user clustering and mobile context[J].Computer Science,2018,45(4):215-219. [15] ZHAO J.Personalized book recommendation algorithm based on improved user interest model[J].Machine Tool &Hydraulics,2018,46(6):193-198. [16] MAN T,SHEN H W,HUANG J M,et al.SCMF:A soft constraint matrix decomposition recommendation algorithm for fusion of multi-source data[J].Chinese Journal of Information,2017,31(4):174-183. [17] SHAO C C,CHEN P H.Recommendation of interest points that combine social networks and image content[J].Computer Application,2019,39(5):21-28. [18] WANG Z Q,LIANG J Y,LI R.Probability matrix decomposition link prediction method based on information fusion[J].Computer Research and Development,2019,56(2):82-94. [19] WEN K,ZHU C L.The canonical matrix decomposition recommendation model of the social network and interest is fused[J].Computer Application,2018(9):2523-2528. [20] DENG M T,LIU X J,LI B.Diversity recommendation method based on user preference and dynamic interest[J].Minicompu-ter System,2018(9):2029-2034. [21] DUAN Z T,CAI D D,TANG L,et al.Based on the predicted LBSN interest point recommendation algorithm[J].Microelectronics and Computers,2019,36(1):72-75. [22] GAO B,WANG L N,LI L.A social network partitioning method based on clustering ensemble and minimumspanning tree[J].Machine Tool &Hydraulics,2017,45(24):120-125. |
[1] | LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222. |
[2] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[3] | ZHANG Zhi-qiang, LU Xiao-feng, SUI Lian-sheng, LI Jun-huai. Salp Swarm Algorithm with Random Inertia Weight and Differential Mutation Operator [J]. Computer Science, 2020, 47(8): 297-301. |
[4] | LI Sheng-zhi, QIAO Jian-zhong, LIN Shu-kuan. Location Prediction Method Based on Similarity of Users Moving Behavior [J]. Computer Science, 2018, 45(12): 288-292. |
[5] | YANG Chao, QIN Ting-dong, FAN Bo, LI Tao. Study on Detection of Weibo Spammers Based on Danger Theory in Artificial Immunity System [J]. Computer Science, 2018, 45(11): 138-142. |
[6] | XU Kai, QIU Jia-yu and LI Yan. Offline Efficient Compression Algorithm for AIS Data Retains Time Elapsing Dimension [J]. Computer Science, 2017, 44(Z11): 498-502. |
[7] | GUO Yan-qing, ZHAO Rui, KONG Xiang-wei, FU Hai-yan and JIANG Jin-ping. News-summarization Extraction Method Based on Weighted Event Elements Strategy [J]. Computer Science, 2016, 43(1): 237-241. |
[8] | CAO Ju,LI Yan-jiao and CHEN Gang. Explosion Search Algorithm with Conjugate Gradient Operator [J]. Computer Science, 2014, 41(5): 230-234. |
[9] | ZHAO Zhi-gang,WANG Wei-qian and HUANG Shu-yun. Bi-level Programming Problem Based on Improved Particle Swarm Algorithm [J]. Computer Science, 2013, 40(Z11): 115-119. |
[10] | CHEN Jia-mei,CHEN Jin-fu,ZHAN Yong-zhao,WANG Huan-huan and LI Qing. Design and Implementation of Web Service Vulnerability Testing System Based on SOAP Messages Mutation [J]. Computer Science, 2013, 40(7): 143-146. |
[11] | WANG Fei and GOU Jin. Mining Fuzzy Association Rules Based on Multi-mutation Particle Swarm Optimization Algorithm [J]. Computer Science, 2013, 40(5): 217-223. |
[12] | . Modified Decimal MIMIC Algorithm for TSP [J]. Computer Science, 2012, 39(8): 233-236. |
[13] | . Improved Genetic Algorithm with Adaptive Convergence Populations [J]. Computer Science, 2012, 39(10): 214-217. |
[14] | . [J]. Computer Science, 2008, 35(6): 283-286. |
[15] | . [J]. Computer Science, 2007, 34(8): 145-147. |
|