Zhang, Yajuan Jing, Ru Ji, Xiang Hu, Nan
Published in
Open Computer Science
The safety monitoring system has been used to monitor and manage engineering safety operation. The application scope of the safety monitoring system is very wide. It has a wide range of applications in the fields of pipeline safety monitoring, electrical safety monitoring and household safety monitoring. This article studied the application process...
Xu, Lin
Published in
Open Computer Science
Blockchain technology is a widely used emerging technology. It can integrate cloud computing technology and big data to form a distributed cloud computing system, providing efficient services for local enterprises and governments. In addition, local cloud computing is also widely used, and there are many big data in these applications. Blockchain a...
Liu, Li
Published in
Open Computer Science
Mobile phones are the most commonly used electronic devices in people’s daily life. The image, voice, and other information in these devices need to be processed through signal transmission. The role of signal processing is to process the acquired information in a certain way to get the final result. In order to ensure that the whole processing pro...
Lu, Yinglun Wang, Xiang Xie, Taotao Xie, Tian
Published in
Open Computer Science
With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more security risks. Therefore, how to ensure the security of big data, prevent network attacks, and...
Amato, Alberto Di Lecce, Vincenzo
Published in
Open Computer Science
The popularity of artificial intelligence applications is on the rise, and they are producing better outcomes in numerous fields of research. However, the effectiveness of these applications relies heavily on the quantity and quality of data used. While the volume of data available has increased significantly in recent years, this does not always l...
Chen, Xu
Published in
Open Computer Science
With the rapid development of unmanned aerial vehicle (UAV) technology, there are more and more fields of UAV application. This research mainly discusses the UAV patrol path planning based on machine vision and multi-sensor fusion. This article studies how to apply ultrasonic, a classic ranging sensor, to obstacle avoidance of UAVs. The designed ul...
Jiang, Tao
Published in
Open Computer Science
Due to the popularity of high-performance cameras and the development of computer video pattern recognition technology, intelligent video monitoring technology is widely used in all aspects of social life. It mainly includes the following: industrial control system uses video monitoring technology for remote monitoring and comprehensive monitoring;...
Tang, Donglin Li, Long
Published in
Open Computer Science
The twenty-first century is the century of marine resources. The ocean is a treasure of biological resources, energy, water resources and mineral resources, and it would gradually become the “second space” of mankind. In the next few years, it would be more and more relevant to human life. Many scholars have realized the importance of the ocean and...
Zhao, Hang
Published in
Open Computer Science
With the development of urbanization, urban public safety is becoming more and more important. Urban public safety is not only the foundation of urban development, but also the basic guarantee for the stability of citizens’ lives. In the context of today’s artificial intelligence (AI), the concept of smart cities is constantly being practiced. Urba...
Wang, Yanzhao
Published in
Open Computer Science
As the rapid advancement of information security company is developing quickly and the technology including big information, big computer, large cloud, and artificial intelligence are being widely used, network security has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network security is a major i...