default search action
Open Computer Science, Volume 13
Volume 13, Number 1, 2023
- Qilang Liang, Bangshun Luo:
Visual inspection intelligent robot technology for large infusion industry. - Shan Li:
Application of artificial intelligence-based style transfer algorithm in animation special effects design. - Chen Zhu, Dong-Yuan Ge, Xi-fan Yao, Wen-Jiang Xiang, Jian Li, Yong-Xiang Li:
Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics. - Xinhua Lv:
Application of fingerprint image fuzzy edge recognition algorithm in criminal technology. - Huiying Zhang, Ze Li:
RFID supply chain data deconstruction method based on artificial intelligence technology. - Chunhua Lin, Longzi Li, Yuanyi Chen:
Dynamic system allocation and application of cloud computing virtual resources based on system architecture. - Ying Chen:
Big data technology for computer intrusion detection. - Qingwei Zhou, Yongjun Qi, Hailin Tang, Peng Wu:
Machine learning-based processing of unbalanced data sets for computer algorithms. - Hang Zhao:
Artificial intelligence-based public safety data resource management in smart cities. - Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, Atif Ishaq:
SMACS: A framework for formal verification of complex adaptive systems. - Yanzhao Wang:
Intelligent cluster construction of internet financial security protection system in banking industry. - Cheng Chen, Bin Dong:
Digital forensics analysis based on cybercrime and the study of the rule of law in space governance. - Donglin Tang, Long Li:
Simulation evaluation of underwater robot structure and control system based on ADAMS. - Tao Jiang:
Application of SSD network algorithm in panoramic video image vehicle detection system. - Xu Chen:
UAV patrol path planning based on machine vision and multi-sensor fusion. - Alberto Amato, Vincenzo Di Lecce:
Data preprocessing impact on machine learning algorithm performance. - Yinglun Lu, Xiang Wang, Taotao Xie, Tian Xie:
Analysis of research results of different aspects of network security and Internet of Things under the background of big data. - Li Liu:
Exploration on the application of electronic information technology in signal processing based on big data. - Lin Xu:
Blockchain localization cloud computing big data application evaluation method. - Yajuan Zhang, Ru Jing, Xiang Ji, Nan Hu:
Application of wireless sensor network technology based on artificial intelligence in security monitoring system. - Changqing Du, Jingjian Li, Bin Yuan:
Low-illumination image enhancement with logarithmic tone mapping. - Samer Nofal:
A combinatorial algorithm and its application in computing all minimum toll sets of graphs. - Jingxiang Zhao, Panpan Peng, Jinping Wang:
Nondestructive detection of potato starch content based on near-infrared hyperspectral imaging technology.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.