Synchronous End-to-End Vehicle Pedestrian Detection Algorithm Based on Improved YOLOv8 in Complex Scenarios.
Sensors, September, 2024
Blockchain-based internet of things security architecture and applications.
J. Ambient Intell. Humaniz. Comput., December, 2023
Modeling an web community discovery method with web page attraction.
J. Intell. Fuzzy Syst., 2021
A novel WSNs routing algorithm based on game theory and energy consumption balance.
Clust. Comput., 2019
English Writing Teaching Model Dependent on Computer Network Corpus Drive Model.
Int. J. Emerg. Technol. Learn., 2018
Bifurcation Analysis of a Coupled Kuramoto-Sivashinsky- and Ginzburg-Landau-Type Model.
J. Appl. Math., 2013
Adverse Selection and Moral Hazard in Infrastructure Performance-Based Maintenance Contracts.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012
The Connected and Tree Domination Number of P(n, k) for k = 4, 6, 8.
Ars Comb., 2009