Quantitative Evaluation of Promotion of Traditional National Sports Events Based on Probity Multiple Regression Analysis
暂无分享,去创建一个
Li Wu | Jun Yang | Zongxian Yu | Jun Yang | Li Wu | Jun Yang | Li Wu | Zongxian Yu
[1] Shahaboddin Shamshirband,et al. Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix: A Case Study on Mechanical Application , 2019, Computers, Materials & Continua.
[2] Xuyu Xiang,et al. Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition , 2019, Computers, Materials & Continua.
[3] Pan Jun-yang. Signal Detection in Strong Chaotic Interference Based on RBF Neural Network , 2010 .
[4] Mznah Al-Rodhaan,et al. A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest , 2019, Computers, Materials & Continua.
[5] Wei Li,et al. A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things , 2019 .
[6] Wenbing Wu,et al. An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks , 2019 .
[7] Alex Thomo,et al. Fuzzy Joins in MapReduce: An Experimental Study , 2015, Proc. VLDB Endow..
[8] Zhe Liu,et al. An Improved Unsupervised Image Segmentation Method Based on Multi-objective Particle Swarm Optimization Clustering Algorithm , 2019, Computers, Materials & Continua.
[9] Baoyu Ma,et al. Implementation System of Human Eye Tracking Algorithm Based on FPGA , 2019 .
[10] Edwin Hsing-Mean Sha,et al. Designing an efficient persistent in-memory file system , 2015, 2015 IEEE Non-Volatile Memory System and Applications Symposium (NVMSA).
[11] Zhou Lei,et al. Novel Data Integrity Verification Schemes in Cloud Storage , 2015, Computer and Information Science.
[12] Qing Yang,et al. The Application of BP Neural Networks to Analysis the National Vulnerability , 2019, Computers, Materials & Continua.
[13] Xiaoding Xu,et al. A Study on Dual-Load-Zone Model of Overlying Strata and Evolution Law of Mining Stress , 2019, Computers, Materials & Continua.
[14] Ju Liu,et al. Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications , 2019 .
[15] Feng Xu,et al. Investigation on the Chinese Text Sentiment Analysis Based on Convolutional Neural Networks in Deep Learning , 2019 .
[16] Tong Wu-qin. Estimation of the Time Varying TDOA and FDOA in GEO-LEO Dual-satellites Location System , 2012 .
[17] Min Long,et al. Detecting Iris Liveness with Batch Normalized Convolutional Neural Network , 2019, Computers, Materials & Continua.
[18] Mohammed Kaddi,et al. An Energy-Efficient Protocol Using an Objective Function & Random Search with Jumps for WSN , 2019, Computers, Materials & Continua.
[19] Qi Wang,et al. Research on the Signal Reconstruction of the Phased Array Structural Health Monitoring Based Using the Basis Pursuit Algorithm , 2019, Computers, Materials & Continua.
[20] P. K. Santhosh and B. Kaarthick,et al. An Automated Player Detection and Tracking in Basketball Game , 2019 .
[21] Yukari Nagai,et al. Optimal Building Frame Column Design Based on the Genetic Algorithm , 2019 .
[22] Jimmy J. Lin. Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce , 2009, SIGIR.
[23] Xueye Wei,et al. Online magnetic flux leakage detection system for sucker rod defects based on LabVIEW programming , 2019 .
[24] Yongbin Zhao,et al. Design of Feedback Shift Register of Against Power Analysis Attack , 2019 .
[25] Liang Wang,et al. Forecasting model based on information-granulated GA-SVR and ARIMA for producer price index , 2019, ArXiv.
[26] Yasin N. Silva,et al. An Experimental Survey of MapReduce-Based Similarity Joins , 2016, SISAP.
[27] Kaladhar Voruganti,et al. An empirical study of file systems on NVM , 2015, 2015 31st Symposium on Mass Storage Systems and Technologies (MSST).
[28] Sifan Long,et al. Yield Stress Prediction Model of RAFM Steel Based on the Improved GDM-SA-SVR Algorithm , 2019, Computers, Materials & Continua.
[29] Li Zhang,et al. A Union Authentication Protocol of Cross-domain Based on Bilinear Pairing , 2013, J. Softw..
[30] Chen Li,et al. Efficient parallel set-similarity joins using MapReduce , 2010, SIGMOD Conference.
[31] Anthony K. H. Tung,et al. Efficient and Scalable Processing of String Similarity Join , 2013, IEEE Transactions on Knowledge and Data Engineering.
[32] Duo Liu,et al. A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT , 2019, Computers, Materials & Continua.