[1] |
Shengyou ZHENG, Yanxiang CHEN, Zuxing ZHAO, Haiyang LIU.
Construction and benchmark detection of multimodal partial forgery dataset
[J]. Journal of Computer Applications, 2024, 44(10): 3134-3140.
|
[2] |
Zongzhe LYU, Hui XU, Xiao YANG, Yong WANG, Weijian WANG.
Small object detection algorithm of YOLOv5 for safety helmet
[J]. Journal of Computer Applications, 2023, 43(6): 1943-1949.
|
[3] |
Bo YANG, Zongtao DUAN, Pengfei ZUO, Yuanyuan XIAO, Yilin WANG.
Accident prediction model fusing heterogeneous traffic situations
[J]. Journal of Computer Applications, 2023, 43(11): 3625-3631.
|
[4] |
Jin ZHANG, Peiqi QU, Cheng SUN, Meng LUO.
Safety helmet wearing detection algorithm based on improved YOLOv5
[J]. Journal of Computer Applications, 2022, 42(4): 1292-1300.
|
[5] |
QIN Li, HAO Zhigang, LI Guoliang.
Construction and correlation analysis of national food safety standard graph
[J]. Journal of Computer Applications, 2021, 41(4): 1005-1011.
|
[6] |
QIN Nan, MA Liang, HUANG Rui.
Software safety requirement analysis and verification method based on system theoretic process analysis
[J]. Journal of Computer Applications, 2020, 40(11): 3261-3266.
|
[7] |
TONG Xinchi, ZHANG Huajun, GUO Hang.
Multi-directional path planning algorithm for unmanned surface vehicle
[J]. Journal of Computer Applications, 2020, 40(11): 3373-3378.
|
[8] |
XU Yansheng, ZHANG Youjie.
Order preserving encryption scheme of nonlinear mapping based on random function
[J]. Journal of Computer Applications, 2020, 40(10): 2986-2991.
|
[9] |
MA Qinglu, ZOU Zheng.
Cloud monitoring system of tunnel groups for traffic safety
[J]. Journal of Computer Applications, 2019, 39(5): 1490-1494.
|
[10] |
WANG Peng, WU Kang, YAN Fang, WANG Kenian, ZHANG Xiaochen.
Security verification method of safety critical software based on system theoretic process analysis
[J]. Journal of Computer Applications, 2019, 39(11): 3298-3303.
|
[11] |
CHEN Jingren, WU Yefu, WU Bing.
Driver behavior spectrum analysis method based on vehicle driving data
[J]. Journal of Computer Applications, 2018, 38(7): 1916-1922.
|
[12] |
SHEN Minjie, ZENG Zhenbing, LIN Wang, YANG Zhengfeng.
Safety verification of stochastic continuous system using stochastic barrier certificates
[J]. Journal of Computer Applications, 2018, 38(6): 1737-1744.
|
[13] |
REN Dongmei, ZHANG Yuyang, DONG Xinling.
Application of improved principal component analysis-Bayes discriminant analysis method to petroleum drilling safety evaluation
[J]. Journal of Computer Applications, 2017, 37(6): 1820-1824.
|
[14] |
LIANG Mingfu, FANG Shaomei, HUANG Zhongzhan, CAI Qinyi.
Bi-direction pedestrian flow by the spread of the influence of emergencies
[J]. Journal of Computer Applications, 2017, 37(5): 1496-1502.
|
[15] |
ZHAO Yongtao, CHEN Qingkui, FANG Yuling, ZHAO Deyu, JI Lina.
Early warning method for driving safety based on CUDA
[J]. Journal of Computer Applications, 2017, 37(1): 134-137.
|