0 | -- | 0 | Cheng Chen, Bin Dong. Digital forensics analysis based on cybercrime and the study of the rule of law in space governance |
0 | -- | 0 | YaJuan Zhang, Ru Jing, Xiang Ji, Nan Hu. Application of wireless sensor network technology based on artificial intelligence in security monitoring system |
0 | -- | 0 | Xu Chen. UAV patrol path planning based on machine vision and multi-sensor fusion |
0 | -- | 0 | Yanzhao Wang. Intelligent cluster construction of internet financial security protection system in banking industry |
0 | -- | 0 | Alberto Amato, Vincenzo Di Lecce. Data preprocessing impact on machine learning algorithm performance |
0 | -- | 0 | Qingwei Zhou, Yongjun Qi, Hailin Tang, Peng Wu. Machine learning-based processing of unbalanced data sets for computer algorithms |
0 | -- | 0 | Chen Zhu, Dong-Yuan Ge, Xi-fan Yao, Wen-Jiang Xiang, Jian Li, Yong-xiang Li. Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics |
0 | -- | 0 | Qilang Liang, Bangshun Luo. Visual inspection intelligent robot technology for large infusion industry |
0 | -- | 0 | Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, Atif Ishaq. SMACS: A framework for formal verification of complex adaptive systems |
0 | -- | 0 | Yinglun Lu, Xiang Wang, Taotao Xie, Tian Xie. Analysis of research results of different aspects of network security and Internet of Things under the background of big data |
0 | -- | 0 | Tao Jiang. Application of SSD network algorithm in panoramic video image vehicle detection system |
0 | -- | 0 | Lin Xu. Blockchain localization cloud computing big data application evaluation method |
0 | -- | 0 | Hang Zhao. Artificial intelligence-based public safety data resource management in smart cities |
0 | -- | 0 | Xinhua Lv. Application of fingerprint image fuzzy edge recognition algorithm in criminal technology |
0 | -- | 0 | Shan Li. Application of artificial intelligence-based style transfer algorithm in animation special effects design |
0 | -- | 0 | Donglin Tang, Long Li. Simulation evaluation of underwater robot structure and control system based on ADAMS |
0 | -- | 0 | Li Liu. Exploration on the application of electronic information technology in signal processing based on big data |
0 | -- | 0 | Ying Chen. Big data technology for computer intrusion detection |
0 | -- | 0 | Chunhua Lin, Longzi Li, Yuanyi Chen. Dynamic system allocation and application of cloud computing virtual resources based on system architecture |
0 | -- | 0 | Huiying Zhang, Ze Li. RFID supply chain data deconstruction method based on artificial intelligence technology |