正在加载图片...
Transactions on Information Forensics and Security,2020.PP(99):1-1 [16]Zhu Q,Chen Z,Soh Y C.A Novel Semisupervised Deep Learning Method for Human Activity Recognition.IEEE transactions on industrial informatics,2019,15(7):3821-3830. [17]Wang D,Li M.Stochastic Configuration Networks:Fundamentals and Algorithms.IEEE Transactions on Cybernetics, 2017.47(10):3466-3479 [18]Dai W,Li D P.Chen QX,Chai TY.Data driven particle size estimation of hematite grinding process using stochastic configuration network with robust technique.Journal of Central South University.2019,26(1):43-62 [19]Sheng Z,Zeng Z,Qu H,et al.Optical fiber intrusion signal recognition method based on TSVD-SCN.Optical Fiber Technology,2019,48(MAR.):270-277. [20]Ren Y,Zhang L,Suganthan P N.Ensemble Classification and Regression-Recent Developments,Applications and Future Directions [Review Article].IEEE Computational Intelligence Magazine,2016,11(1):41-53 [21]Zhou H,Chen J,Dong G,et al.Bearing fault recognition method based on neighbourhood com nent analysis and coupled hidden Markov model.Mechanical Systems and Signal Processing,2016 [22]Qin C,Song S,Huang G,et al.Unsupervised neighborhood component analysis for clustering Neurocomputing,2015. 168(nov.30):609-617. [23]Zhao L,Zou S,Huang M,et al.Distributed regularized stochastic configuration networks via the elastic net.Neural Computing and Applications,2020(3). [24]Wang W,Wang D.Prediction of component concentrations in sodium aluminate liquor using stochastic configuration networks.Neural Computing and Applications,2020:1-14 录用稿件,最 [25]Song B C.Ra J B.A fast search algorithm for vector using L2-norm pyramid of codewords.IEEE Transactions on Image Processing,2002,11(1):10-15. [26]Anguita D,Ghio A,Oneto L,et al.A public domain data an activity recognition using smartphones//2013.Transactions on Information Forensics and Security, 2020, PP(99):1-1. [16] Zhu Q, Chen Z, Soh Y C. A Novel Semisupervised Deep Learning Method for Human Activity Recognition. IEEE transactions on industrial informatics, 2019, 15(7):3821-3830. [17] Wang D, Li M. Stochastic Configuration Networks: Fundamentals and Algorithms. IEEE Transactions on Cybernetics, 2017, 47(10):3466-3479. [18] Dai W, Li D P, Chen Q X, Chai T Y. Data driven particle size estimation of hematite grinding process using stochastic configuration network with robust technique. Journal of Central South University, 2019, 26(1): 43-62. [19] Sheng Z, Zeng Z, Qu H, et al. Optical fiber intrusion signal recognition method based on TSVD-SCN. Optical Fiber Technology, 2019, 48(MAR.):270-277. [20] Ren Y, Zhang L, Suganthan P N. Ensemble Classification and Regression-Recent Developments, Applications and Future Directions [Review Article]. IEEE Computational Intelligence Magazine, 2016, 11(1):41-53. [21] Zhou H, Chen J, Dong G, et al. Bearing fault recognition method based on neighbourhood component analysis and coupled hidden Markov model. Mechanical Systems and Signal Processing, 2016. [22] Qin C, Song S, Huang G, et al. Unsupervised neighborhood component analysis for clustering. Neurocomputing, 2015, 168(nov.30):609-617. [23] Zhao L, Zou S, Huang M, et al. Distributed regularized stochastic configuration networks via the elastic net. Neural Computing and Applications, 2020(3). [24] Wang W, Wang D. Prediction of component concentrations in sodium aluminate liquor using stochastic configuration networks. Neural Computing and Applications, 2020:1-14. [25] Song B C, Ra J B. A fast search algorithm for vector quantization using L2-norm pyramid of codewords. IEEE Transactions on Image Processing, 2002, 11(1):10-15. [26] Anguita D, Ghio A, Oneto L, et al. A public domain dataset for human activity recognition using smartphones// 2013. 录用稿件,非最终出版稿
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有