[1] |
LIU Xing1, 2, GUO Liang1, 2, WANG Zhengqi1, 2, WEI Xiaogang1, 2, XU Xuefei1, 2, LIU Jing3.
Q-learning-based Algorithm for Orchestrating Security Service Function Chain
[J]. Computer and Modernization, 2024, 0(11): 34-40.
|
[2] |
DONG Yuwen.
Multi-scale Moving Object Detection Algorithm Based on Improved YOLOv7-tiny
[J]. Computer and Modernization, 2024, 0(11): 99-105.
|
[3] |
LI Wei1, HE Haobo1, LI Guang2, KUANG Lidan1, ZHANG Jin1.
A Review of Bionic Olfactory Model Construction Methods and Applications
[J]. Computer and Modernization, 2024, 0(10): 100-106.
|
[4] |
XU Xiaowei, CHENG Yu, QIAN Feng, ZHU Neng, DENG Mingxing.
Cryptographic Algorithm of IoV Communication Based on AES
[J]. Computer and Modernization, 2024, 0(09): 45-51.
|
[5] |
MA Yong, WANG Jun, ZHANG Zijian, ZHAO Yuyang, ZHANG Jing, ZHOU Ming.
Improved YOLOv8 Behavior Detection Algorithm for Intelligent Operation and#br#
Maintenance System
[J]. Computer and Modernization, 2024, 0(08): 43-48.
|
[6] |
LIU Yang1, HUANG Zhi2, XU Juan1, GAO Peng1, CHEN Xuhui1.
Hardware Monitoring and Warning System of Provincial Meteorological Data Center Based on Distributed
[J]. Computer and Modernization, 2024, 0(07): 41-46.
|
[7] |
MA Huiping1, LI Peng1, 2, HU Sujun1.
Security Game Analysis Model of RFID System Based on Bayesian Attack Graph
[J]. Computer and Modernization, 2024, 0(07): 93-99.
|
[8] |
ZHANG Gaoyi1, XU Yang1, 2, CAO Bin1, 3, LI Yifei3.
3D Visualization Monitoring System of Aluminum Reduction Cell Based on Digital Twin
[J]. Computer and Modernization, 2024, 0(05): 104-109.
|
[9] |
YU Lihui, HU Shaowen, HUANG Langxin, LUO Shuhuan.
A Source Code Security Vulnerability Detection Method Using ChatGPT
[J]. Computer and Modernization, 2024, 0(04): 88-91.
|
[10] |
YUAN Li1, 2, LIU Dun-long1, 2, SANG Xue-jia1, 2, ZHANG Shao-jie3, CHEN Qiao4.
Debris Flow Infrasound Signal Recognition Approach Based on Improved AlexNet
[J]. Computer and Modernization, 2024, 0(03): 1-6.
|
[11] |
WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling.
Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology
[J]. Computer and Modernization, 2024, 0(01): 1-5.
|
[12] |
CAI Si-mu, WANG Li-bin.
A Universally-composable Secure Non-interactive Commitment Scheme
[J]. Computer and Modernization, 2024, 0(01): 6-12.
|
[13] |
HAN Kun, WANG Zheng, DUAN Jun-yong, YANG Hua-lin.
Overview of Data Processing Techniques for MIoT Based on Fog Computing
[J]. Computer and Modernization, 2024, 0(01): 13-20.
|
[14] |
FENG Xin-xin, BU Lei, ZHANG Xiao-yu, SHI Yu-feng.
Analyzing to Shield Tunnel Segments Deformation Data Based on ICEEMDAN-LSTM
[J]. Computer and Modernization, 2023, 0(11): 57-61.
|
[15] |
LI Yan-man, WANG Bi-heng, ZHAO Ling-yan.
Safety Helmet Detection Based on Lightweight YOLOv5
[J]. Computer and Modernization, 2023, 0(10): 59-64.
|