Author of the publication

Research on recognition of ice and snow athletes based on feature extraction and cloud computing platform.

, , , , and . Microprocess. Microsystems, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Literature review on the creativity of CBR applications., , , and . Artif. Intell. Rev., 40 (4): 379-390 (2013)虚拟化环境中基于神经网络专家系统的Rootkit检测方法研究 (Research on Rootkit Detection Method Based on Neural Network Expert System in Virtualized Environment)., , , and . 计算机科学, 42 (8): 175-179 (2015)A Quality Model for Evaluating Encryption-as-a-Service., , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 557-569. Springer, (2017)Research on Violence Detection Algorithm based on Multi-UAV., , and . ICARM, page 67-72. IEEE, (2023)Research on recognition of ice and snow athletes based on feature extraction and cloud computing platform., , , , and . Microprocess. Microsystems, (2021)Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel., , , and . KSII Trans. Internet Inf. Syst., 13 (5): 2718-2731 (2019)The analysis and synthesis of PID controller based on closed loop response characteristics., , , , and . ROBIO, page 1930-1936. IEEE, (2012)Blind Estimation Methods for BPSK Signal Based on Duffing Oscillator., , , , , and . Sensors, 20 (22): 6412 (2020)虚拟化环境下基于职能分离的Rootkit检测系统架构研究 (Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment)., , , and . 计算机科学, 43 (Z6): 348-352 (2016)Xen混合多策略模型的设计与形式化验证 (Design and Formal Verification of Xen Hybrid Multi-police Model)., , and . 计算机科学, 44 (10): 134-141 (2017)