Author of the publication

Violence Detection Method Based on Convolution Neural Network and Trajectory.

, , , , , , , , and . J. Inf. Sci. Eng., 39 (4): 777-796 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of the mining algorithm based on distributed database., , and . FSKD, page 1252-1256. IEEE, (2011)Using Naïve Bayes Method to Classify Text-Based Email., , , and . PAAP, page 94-98. IEEE, (2018)Fault Diagnosis Approach Based on Qualitative Model of Signed Directed Graph and Reasoning Rules., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 339-343. Springer, (2005)An optimized image watermarking algorithm based on SVD and IWT., , and . J. Supercomput., 78 (1): 222-237 (2022)A modified multi-objective particle swarm optimisation with entropy adaptive strategy and Levy mutation in the internet of things environment., , , and . Int. J. Grid Util. Comput., 14 (2/3): 169-181 (2023)Many-objective particle swarm optimisation algorithm based on multi-elite opposition mutation mechanism in the internet of things environment., , , and . Int. J. Grid Util. Comput., 14 (2/3): 107-121 (2023)Classify Text-based Email Using Naive Bayes Method With Small Sample., , , , , , and . J. Inf. Sci. Eng., 39 (4): 855-868 (2023)IT talent demand forecast and research in Dongguan based on Grey System Theory., , and . EMEIT, page 1219-1222. IEEE, (2011)Mobile visual search algorithm based on improved VGG-F and hash with application in IoT., , , , , , and . Int. J. Grid Util. Comput., 14 (2/3): 94-106 (2023)Non-inertial opposition-based particle swarm optimization and its theoretical analysis for deep learning applications., , , and . Appl. Soft Comput., (2020)