Yazhuo Li

Orcid: 0000-0002-6334-5618

According to our database1, Yazhuo Li authored at least 12 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Convergence of Symmetric Discretization Models for Nonlinear Schrödinger Equation in Dark Solitons' Motion.
Symmetry, 2023

Calibration of upper limb joint angle based on Azure Kinect depth camera.
Proceedings of the 6th International Conference on Data Science and Information Technology, 2023

2022
Evaluation System of Push-up Action Based on Kinect.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Teaching Reform and Achievement Analysis of Course of Digital Electronic Technology under the Background of Engineering Education Certification.
Proceedings of the 2022 5th International Conference on Education Technology Management, 2022

Distributed subway station safety detection system based on Raspberry Pi.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

2021
Path Planning of UAV Based on Error Correction.
Proceedings of the ICMLC 2021: 13th International Conference on Machine Learning and Computing, 2021

2020
Study of Passenger Evacuation Capability in Metro Vehicle Using Simulation Methods.
Proceedings of the 5th IEEE International Conference on Intelligent Transportation Engineering, 2020

2018
Agricultural research recommendation algorithm based on consumer preference model of e-commerce.
Future Gener. Comput. Syst., 2018

2015
Modeling, conflict detection, and verification of a new virtualization role-based access control framework.
Secur. Commun. Networks, 2015

2013
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach.
Proceedings of the Frontiers in Internet Technologies, 2013

A Conflict-Related Rules Detection Tool for Access Control Policy.
Proceedings of the Frontiers in Internet Technologies, 2013

A Verification Method of Enterprise Network Reachability Based on Topology Path.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013


  Loading...