[1] |
梁鹏毅. 建立车脸识别系统查打“遁牌黑车”犯罪研究[J]. 辽宁警察学院学报, 2021, 23(1):9-13.
|
|
Liang Pengyi. Research on fighting the crime of “conceal vehicle license plate” by the car-face recognition management system[J]. Journal of Liaoning Police College, 2021, 23(1):9-13.
|
[2] |
赵光辉. 交通运输行业超限超载与黑车治理困境及突围—来自赏金猎人制度的借鉴[J]. 中国流通经济, 2020, 34(1):112-121.
|
|
Zhao Guanghui. Dilemmas and breakthrough of overload and the “black car” governance system in Chain's transportation industry-the experience from bounty hunters[J]. China Business and Market, 2020, 34(1):112-121.
|
[3] |
刘善清, 朱祎伟. “堵”“疏”结合治理非法营运[J]. 黑龙江人力资源和社会保障, 2022(16):53-55.
|
|
Liu Shanqing, Zhu Yiwei. "Blocking" and "sparing" combined to cure illegal operation[J]. Human Resources and Social Security, 2022(16):53-55.
|
[4] |
杨贺雅, 邢纹硕, 陈聪, 等. 基于随机森林二分类器的模块化多电平换流器子模块开路故障检测方法[J]. 中国电机工程学报, 2023, 43(10):3916-3928.
|
|
Yang Heya, Xing Wenshuo, Chen Cong, et al. A fault d-etection and location strategy for sub-module open-circuit fault in modular multilevel converters based onrandom forest binary classifier[J]. Proceeding of the CSEE, 2023, 43(10):3916-3928.
|
[5] |
魏山森, 梁建芳, 雷钦渊. 基于CART决策树算法的服装可持续消费者画像构建[J]. 丝绸, 2022, 59(9):71-79.
|
|
Wei Shansen, Liang Jianfang, Lei Qinyuan. Portrait construction of sustainable clothing consumers based on CART algorithm[J]. Journal of Silk, 2022, 59(9):71-79.
|
[6] |
杨越佳, 华蓓, 钟志威, 等. 基于同态加密的隐私保护逻辑回归协同计算[J]. 计算机工程, 2023, 49(4):23-31.
doi: 10.19678/j.issn.1000-3428.0064391
|
|
Yang Yuejia, Hua Bei, Zhong Zhiwei, et al. Collaborative computing of privacy-preserving logistic regression based on homomorphic encryption[J]. Computer Engineering, 2023, 49(4):23-31.
doi: 10.19678/j.issn.1000-3428.0064391
|
[7] |
孙悦, 袁健. 基于Spark的改进随机森林算法[J]. 电子科技, 2019, 32(4):60-63,67.
|
|
Sun Yue, Yuan Jian. Improved random forest algorithm based on Spark[J]. Electronic Science and Technology, 2019, 32(4):60-63,67.
|
[8] |
石玉琳, 刘嘉懿, 胡晓娟, 等. 基于舌脉象数据的决策树算法的非小细胞肺癌证候分类方法[J]. 世界科学技术-中医药现代化, 2022, 24(7):2766-2775.
|
|
Shi Yulin, Liu Jiayi, Hu Xiaojuan, et al. Classification of syndromes of non-small cell lung cancer based on decision tree algorithm based on tongue data and pulse data[J]. Modernization of Traditional Chinese Medicine and Materia Medica-World Science and Technology, 2022, 24(7):2766-2775.
|
[9] |
郑博文, 赵逢禹. 基于决策树分类算法异构数据的索引优化[J]. 电子科技, 2018, 31(3):48-52,60.
|
|
Zheng Bowen, Zhao Fengyu. Optimization for heterogeneous data index based on decision tree classification[J]. Electronic Science and Technology, 2018, 31(3):48-52,60.
|
[10] |
范天程, 贾云飞, 李云飞, 等. 基于遥感影像与逻辑回归模型的延河流域沟壑分布概率预测[J]. 水土保持研究, 2022, 29(4):316-321.
|
|
Fan Tiancheng, Jia Yunfei, Li Yunfei, et al. Prediction of gully distribution probabilit in Yanhe basin based on remote sensin image and logistic regression model[J]. Research of Soil and Water Conservation, 2022, 29(4):316-321.
|
[11] |
Dou Q, Coelho de Castro D, Kamnitsas K, et al. Domain generalization via model-agnostic learning of semantic features[C]. Curran: Advances in Neural Information Processing Systems, 2019:697-705.
|
[12] |
胡雪梅, 蒋慧凤. 具有技术指标的逻辑回归模型预测谷歌股票的涨跌趋势[J]. 系统科学与数学, 2021, 41(3):802-823.
|
|
Hu Xuemei, Jiang Huifeng. Logistic regression model with technical indicators predicts ups and downs for Google stock prices[J]. Journal of Systems Science and Mathematical Sciences, 2021, 41(3):802-823.
|
|
崔静静, 胡泽文, 任萍. 基于决策树和逻辑回归模型的人工智能领域潜在“精品”论文识别研究[J]. 情报科学, 2022, 40(5):90-96.
|
|
Cui Jingjing, Hu Zewen, Ren Ping. Identification of "hidden treasures" among massive literature from artificial intelligence field based on decision tree and logistic regression[J]. Information Science, 2020, 40(5):90-96.
|
[13] |
田晓, 陈锦欢. 治理网约车非法营运乱象的路径探析[J]. 西部交通科技, 2020(5):178-180.
|
|
Tian Xiao, Chen Jinhuan. Analysis on the path to cure the disorder of illegal operation of online car hailing[J]. Western China Communications Science & Technology, 2020(5):178-180.
|
[14] |
雷丽彩, 高尚, 蒋艳. 网约车新政下网约车平台与网约车司机的演化博弈分析[J]. 管理工程学报, 2020, 34(1):55-62.
|
|
Lei Licai, Gao Shang, Jiang Yan. Evolutionary game analysis of car-hailing industry between platforms and drivers based on new policy of car-hailing[J]. Journal of Industrial Engineering and Engineering Management, 2020, 34(1):55-62.
|
[15] |
高宁波, 许文波, 徐兰花. 基于大数据的两客一危全过程安全监管模型及平台[J]. 软件, 2022, 43(1):38-40.
|
|
Gao Ningbo, Xu Wenbo, Xu Lanhua. Safety supervision model and platform for the whole process based on big data[J]. Software, 2022, 43(1):38-40.
|
[16] |
王玉臻. 网约车行政纠纷案件中非法营运的识别与运用[J]. 山西省政法管理干部学院学报, 2020, 33(2):27-29.
|
|
Wang Yuzhen. Identification and application of illegal operation in administrative dispute cases of online car- hailing[J]. Journal of Shanxi Politics and Law Institute for Administrators, 2020, 33(2):27-29.
|
[17] |
陈斌, 叶敬元. 阻断“黑车”黑色经济链[J]. 中国公路, 2021(4):52-54.
|
|
Chen Bin, Ye Jingyuan. Blocking the black economic chain of "black car"[J]. China Highway, 2021(4):52-54.
|
[18] |
Fox V, Poulikakos D. Travel arrangements in hemodialysis patients during the COVID-19 pandemic including London-style "black cabs" for transfer to a designated isolation unit[J]. Hemodialysis International, 2021, 25(4): 563-564.
doi: 10.1111/hdi.v25.4
|
[19] |
Katie C, Janet S. Shape of black cab fares badly on route to registration[J]. European Intellectual Property Review, 2018, 40(3):195-199.
|
[20] |
Sacks T. All-electric black cab developer aims to make cities greener[J]. Drives & Controls, 2021(7):37-45.
|
[21] |
马仕玉, 孙承东, 朱家利. SOM神经网络在非法营运车辆识别中的应用[J]. 信息与电脑(理论版), 2017(8):83-85.
|
|
Ma Shiyu, Sun Chengdong, Zhu Jiali. Application of SOM neural network in the identification of illegal operating vehicles[J]. Information & Computer(Theoretical Version), 2017(8):83-85.
|
[22] |
王娜, 段鹏飞, 武林林. 基于卷积神经网络的非法营运车辆识别[J]. 计算机应用, 2016, 36(S2):193-196.
|
|
Wang Na, Duan Pengfei, Wu Linlin. Research of illegal operation vehicle identification based on convolutional neural network[J]. Journal of Computer Applications, 2016, 36(S2):193-196.
|
[23] |
帅丹, 蓝章礼, 李益才. 基于k-mediods及其改进算法的非法营运车辆识别[J]. 计算机应用与软件, 2016, 33(5):154-157,211.
|
|
Shuai Dan, Lan Zhangli, Li Yicai. Recognition illegal operation vehicles based on k-mediods and its improved algorithm[J]. Computer Applications and Software, 2016, 33(5):154-157,211.
|