Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 246-249.doi: 10.11896/jsjkx.200900131
• Big Data & Data Science • Previous Articles Next Articles
SUN Ming-wei, SI Wei-chao, DONG Qi
CLC Number:
[1] XIAO X C,WANG X Q,FU K Y,et al.Grey Relational Analysis on Factors of the Quality of Web Service[J].Physics Procedia,2012,33:1992-1998. [2] ZHAO L J.Research on the Measurement Technology of Network Service Quality [D].University of Electronic Science and Technology of China,2012. [3] 虞益诚,陈威.基于BP神经网络的云服务质量评价[J].财会月刊,2016(11):48-50. [4] HAN P,LIU Y,GUO L.QoS Satisfaction Aware and Network Reconfiguration Enabled Resource Allocation for Virtual Network Embedding in Fiber-Wireless Access Network[J].Computer Networks,2018,143. [5] TEWARI V,THAKAR U,DAGDEE N.Classifying Web Ser-vices based on QoS Parameters using Extended Dataset[J].International Journal of Computer Applications,2013,74(8):33-36. [6] SHE D M,SHE D M,JIA M P,et al.Sparse auto-encoder with regularization method for health indicator construction and remaining useful life prediction of rolling bearing[J].Measurement Science and Technology,2020,31(10). [7] GAO H B,XIE G T,LIU H Z,et al.Lateral control of autonomous vehicles based on learning driver behavior via cloud model[J].The Journal of China Universities of Posts and Telecommunications,2017,24(2):10-17. [8] LI G J.Network traffic prediction based on grey prediction theory and Markov process[D].Xi'an:Xidian University,2017. [9] LI G,LI J P,SUN X L,et al.Research on a Combined Method of Subjective-Objective Weighing and the Its Rationality[J].Business Review,2017,29(12):17-26,61. [10] 唐贺.基于改进的灰色关联分析法在地表水环境评价中的应用[J].海河水利,2020(4):36-39. [11] TANG H.Application of improved Grey relational analysismethod in surface Water environmental assessment[J].Haihe Water Resources,2020(4):36-39. [12] SCHAUL T,ZHANG S,LECUN Y.No more pesky learning rates[C]//International Conference on International Conference on Machine Learning.2013. [13] KONG X K.Grey correlation analysis and motion video image classification by support vector Machine[J].Modern electronic technology,2020,43(18):128-131. |
[1] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[2] | FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631. |
[3] | LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69. |
[4] | LIU Kai-xiang, XIE Yong-fang, CHEN Xin, LYU Fei, LIU Jun-jiao. Industrial Serial Protocol State Detection Algorithm Based on DTMC [J]. Computer Science, 2022, 49(3): 301-307. |
[5] | WANG Yun-xiao, ZHAO Li-na, MA Lin, LI Ning, LIU Zi-yan, ZHANG Jie. TCAM Multi-field Rule Coding Technique Based on Hypercube [J]. Computer Science, 2021, 48(11A): 490-494. |
[6] | MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596. |
[7] | GAO Ya-zhuo, LIU Ya-qun, ZHANG Guo-min, XING Chang-you, WANG Xiu-lei. Multi-stage Game Based Dynamic Deployment Mechanism of Virtualized Honeypots [J]. Computer Science, 2021, 48(10): 294-300. |
[8] | LI Yi-meng, LI Cheng-hai, SONG Ya-fei, WANG Jian. Method of Malware Family Classification Based on Attention-DenseNet-BC Model Mechanism [J]. Computer Science, 2021, 48(10): 308-314. |
[9] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[10] | SONG Yuan-long, LYU Guang-hong, WANG Gui-zhi, JIA Wu-cai. SDN Traffic Prediction Based on Graph Convolutional Network [J]. Computer Science, 2021, 48(6A): 392-397. |
[11] | PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431. |
[12] | YANG Ping, SHU Hui, KANG Fei, BU Wen-juan, HUANG Yu-yao. Generating Malicious Code Attack Graph Using Semantic Analysis [J]. Computer Science, 2021, 48(6A): 448-458. |
[13] | YANG Lin, WANG Yong-jie. Application and Simulation of Ant Colony Algorithm in Continuous Path Prediction of Dynamic Network [J]. Computer Science, 2021, 48(6A): 485-490. |
[14] | ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei. Research on DoS Intrusion Detection Technology of IPv6 Network Based on GR-AD-KNN Algorithm [J]. Computer Science, 2021, 48(6A): 524-528. |
[15] | ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian. Team Cooperative Attack Planning Based on Multi-agent Joint Decision [J]. Computer Science, 2021, 48(5): 301-307. |
|