| [1] |
HU Guikai, YANG Peirong.
Hybrid distance measurement method and application based on conditional probability distribution
[J]. Journal of Hebei University(Natural Science Edition), 2025, 45(5): 520-529.
|
| [2] |
CHENG Tao, LI Meixi, LI Jiali.
Algorithm of site selection path integration problem under the background of simultaneous distribution and collection
[J]. Journal of Hebei University(Natural Science Edition), 2024, 44(4): 346-354.
|
| [3] |
HAN Shuo, YUAN Weicheng, DU Zeyu.
Semi-supervised skin cancer diagnosis based on self-feedback threshold learning
[J]. Journal of Hebei University(Natural Science Edition), 2024, 44(4): 441-448.
|
| [4] |
TIAN Junfeng, SONG Qianqian, WANG Haoning.
A review of proof of data possession in cloud storage environment
[J]. Journal of Hebei University(Natural Science Edition), 2021, 41(5): 599-611.
|
| [5] |
LI Kunlun, RONG Jingyue,SU Huading.
An improved collaborative filtering recommendation algorithm
[J]. Journal of Hebei University (Natural Science Edition), 2020, 40(1): 77-86.
|
| [6] |
ZHANG Hao, AN Jingwen.
Application of new PSGA algorithm in performance optimization of general aviation logistics system
[J]. Journal of Hebei University (Natural Science Edition), 2020, 40(1): 104-112.
|
| [7] |
LIU Xingjian, WEI Xuguang, KANG Kai.
Cloud computing application performance relationship model based on information resources sharing
[J]. Journal of Hebei University (Natural Science Edition), 2018, 38(3): 327-336.
|
| [8] |
SU Haifeng,XU Daolin,LI Wenjiang,HUANG Hao,ZHENG Wei.
Automatic search of the transmission line path based on the improved ant colony and A* algorithm
[J]. Journal of Hebei University (Natural Science Edition), 2017, 37(1): 92-100.
|
| [9] |
KONG Dehan,QIU Xiaoli,LIU Yongshan.
On query mechanism of EPCIS based on cost function of cache replacement algorithms
[J]. Journal of Hebei University (Natural Science Edition), 2016, 36(5): 541-546.
|
| [10] |
HAO Lei,GAO Yuehua,LI Yapeng,WAN Zhenzhen.
Application of virtual simulation technology for assembly manipulator
[J]. Journal of Hebei University (Natural Science Edition), 2016, 36(4): 444-448.
|
| [11] |
YUAN Min-ying,GAO Lin-qing,HA Ming-hu.
Mathematical Definition and Evaluation Model of Trust Based on the Relationship
[J]. Journal of Hebei University (Natural Science Edition), 2010, 30(3): 231-234.
|
| [12] |
ZHU Yu-hua,SHI Feng-liang,YANG Xi-dong,WANG Xing-yuan.
Watermarking of Digital Images Based on Logistic Mapping
[J]. Journal of Hebei University (Natural Science Edition), 2010, 30(2): 205-210.
|
| [13] |
ZHU Yu-hua,SHI Feng-liang,ZHAO Hong-wei,WANG Zhi-gang,WANG Xing-yuan.
Chaotic Encryption Method to Enhance the Communication Security
[J]. Journal of Hebei University (Natural Science Edition), 2008, 28(5): 545-549.
|
| [14] |
ZHAI Jun-hai,ZHANG su-fang,WANG Xi-zhao.
Verification on Optimal ID3 Algorithm
[J]. Journal of Hebei University (Natural Science Edition), 2006, 26(5): 547-550,556.
|
| [15] |
.
Improvement of Mail Encryption Algorithm PGP
[J]. Journal of Hebei University (Natural Science Edition), 2004, 24(3): 311-314.
|