Journal: Central Europ. J. Computer Science

Volume 13, Issue 1

0 -- 0Cheng Chen, Bin Dong. Digital forensics analysis based on cybercrime and the study of the rule of law in space governance
0 -- 0YaJuan Zhang, Ru Jing, Xiang Ji, Nan Hu. Application of wireless sensor network technology based on artificial intelligence in security monitoring system
0 -- 0Xu Chen. UAV patrol path planning based on machine vision and multi-sensor fusion
0 -- 0Yanzhao Wang. Intelligent cluster construction of internet financial security protection system in banking industry
0 -- 0Alberto Amato, Vincenzo Di Lecce. Data preprocessing impact on machine learning algorithm performance
0 -- 0Qingwei Zhou, Yongjun Qi, Hailin Tang, Peng Wu. Machine learning-based processing of unbalanced data sets for computer algorithms
0 -- 0Chen Zhu, Dong-Yuan Ge, Xi-fan Yao, Wen-Jiang Xiang, Jian Li, Yong-xiang Li. Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics
0 -- 0Qilang Liang, Bangshun Luo. Visual inspection intelligent robot technology for large infusion industry
0 -- 0Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, Atif Ishaq. SMACS: A framework for formal verification of complex adaptive systems
0 -- 0Yinglun Lu, Xiang Wang, Taotao Xie, Tian Xie. Analysis of research results of different aspects of network security and Internet of Things under the background of big data
0 -- 0Tao Jiang. Application of SSD network algorithm in panoramic video image vehicle detection system
0 -- 0Lin Xu. Blockchain localization cloud computing big data application evaluation method
0 -- 0Hang Zhao. Artificial intelligence-based public safety data resource management in smart cities
0 -- 0Xinhua Lv. Application of fingerprint image fuzzy edge recognition algorithm in criminal technology
0 -- 0Shan Li. Application of artificial intelligence-based style transfer algorithm in animation special effects design
0 -- 0Donglin Tang, Long Li. Simulation evaluation of underwater robot structure and control system based on ADAMS
0 -- 0Li Liu. Exploration on the application of electronic information technology in signal processing based on big data
0 -- 0Ying Chen. Big data technology for computer intrusion detection
0 -- 0Chunhua Lin, Longzi Li, Yuanyi Chen. Dynamic system allocation and application of cloud computing virtual resources based on system architecture
0 -- 0Huiying Zhang, Ze Li. RFID supply chain data deconstruction method based on artificial intelligence technology