All Stories

  1. Constraint-based high utility mobile trajectory pattern mining for security systems
  2. Multi-sensor data fusion method based on adaptive Kalman filtering
  3. Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model
  4. Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network