


default search action
Open Computer Science, Volume 14
Volume 14, Number 1, 2024
- Liangrui Fu, Jinqiu Deng, Baoliang Zhu, Zengyan Li, Xudong Liao:
AFOD: Two-stage object detection based on anchor-free remote sensing photos. - Xiang Huang, Yan Liu:
A Bi-GRU-DSA-based social network rumor detection approach. - Saleh ALFahad, Qiyuan Wang, Christos Anagnostopoulos, Kostas Kolomvatsos:
Task offloading in mobile edge computing using cost-based discounted optimal stopping. - Weiwei Hou:
The establishment of a performance evaluation model using education informatization to evaluate teacher morality construction in colleges and universities. - Shaina Smith, Sabine McConnell:
The use of artificial neural networks and decision trees: Implications for health-care research. - Zhen Yuan:
The construction of sports tourism projects under the strategy of national fitness by wireless sensor network. - Qingjian Jiang:
Communication network security situation analysis based on time series data mining technology. - Qiyuan Wang, Saleh ALFahad, Jordi Mateo-Fornés, Christos Anagnostopoulos, Kostas Kolomvatsos:
Resilient edge predictive analytics by enhancing local models. - Haifeng Lu, Haiwei Wu, Ru Jing:
Evaluation of Internet of Things computer network security and remote control technology. - Meirong Lin:
Application of big data technology in emergency management platform informatization construction. - Yang Li:
Moving object detection via feature extraction and classification. - Yufen Wei:
Chinese and English text classification techniques incorporating CHI feature selection for ELT cloud classroom. - Petr Veigend, Gabriela Necasová, Václav Sátek:
Solving linear and nonlinear problems using Taylor series method. - Lili Liu:
The implementation of a proposed deep-learning algorithm to classify music genres. - Pavle Dakic
:
Software compliance in various industries using CI/CD, dynamic microservices, and containers. - Penghua Dang:
The extraction method used for English-Chinese machine translation corpus based on bilingual sentence pair coverage. - Samer Nofal:
Listing all delta partitions of a given set: Algorithm design and results. - Qingna Pu:
Material selection system of literature and art multimedia courseware based on data analysis algorithm. - You Xu, Juan Gao, Man Li:
Spatial relationship description model and algorithm of urban and rural planning in the smart city. - Ru Jing, Yajuan Zhang, Shulong Zhuo
:
Hardware automatic test scheme and intelligent analyze application based on machine learning model. - Huihui Wang, Jianhua Li:
Integration path of digital media art and environmental design based on virtual reality technology. - Andrea Galadíková, Norbert Adamko:
Simulation-based optimization of decision-making process in railway nodes. - Jing Yang:
WSN intrusion detection method using improved spatiotemporal ResNet and GAN. - Mozamel M. Saeed:
Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals. - Zhen Song, Xuwen Qing, Meng Zhou, Yuting Men:
Mine underground object detection algorithm based on TTFNet and anchor-free. - Hua Liang, Liqin Yang, Jinhua Chen, Xin Liu, Guihua Hang:
Detection and tracking of safety helmet wearing based on deep learning.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.