Title
- Title
- Author
- DOI
- Journal
Title
The definition, property, judgement equation, necessary and sufficient condition for solution and demonstration of judgement equation AX-YB=C to have solution that is represented by quaternion ma...
DetailsThis paper aims to explore and implement the innovative design and development of smart tourism information systems leveraging cloud computing technology. Through in-depth analysis of the actual...
DetailsWe discuss the eigenvalues of real symmetric matrices, especially focus on the eigenvalues of matrix BBT where B expresses the adjacency relation between two parts of a semiregular bipartite grap...
DetailsThe application and innovation of digital design technology in animated films is redefining the boundaries of animation creation and pushing the industry towards a higher fusion of art and techno...
DetailsWith the continuous improvement of people’s material living standards, the functional requirements for living environments have become more stringent. Against the backdrop of rapid advancements...
DetailsTo explore the application effects of microcontroller (MCU) and artificial intelligence (AI) control across various fields, this paper first analyzes the fundamentals of MCU and AI control. It furt...
DetailsWith the rapid development of the transportation industry, many highway constructions have been gradually extended to arid and semi-arid areas, and the roadbed works on unsaturated soils have grad...
DetailsThis paper aims to explore the synergistic mechanism of artificial intelligence and legal escort in the protection of ethnic minority villages in Guizhou province. By analyzing the current situat...
DetailsOrthogonal Frequency Division Multiplexing (OFDM) is a kind of MCM Multi-CarrierModulation, the main idea is to divide the channel into a number of orthogonal sub-channels, and convert the high-spee...
DetailsThe development of electric power network security system has been a very important research field in China, because the development of electric power network security is not only related to the d...
Details