Influence of AIGC on Research Activity in Higher Education
Yao Yao, Yizhen Zhou*, Jiangping Zhu
Abstract | References | PDF | HTML | Pub. Date: Jan 16, 2026
DOI: 10.23977/jaip.2026.090102 | Downloads: 0 | Views: 8
Exploring an Effective Machine Learning Method for Dengue Fever Prediction
Weifeng Wang*
Abstract | References | PDF | HTML | Pub. Date: Jan 9, 2026
DOI: 10.23977/jaip.2026.090101 | Downloads: 1 | Views: 107
Application of Artificial Intelligence Technology in Network Security Protection of Power Enterprise
Yong Fu*
Abstract | References | PDF | HTML | Pub. Date: Dec 30, 2025
DOI: 10.23977/jaip.2025.080407 | Downloads: 3 | Views: 180
A Four-Layer Security Governance Framework for LLM-Based AI Agents
Yiang Gao*, Shanshan Wu
Abstract | References | PDF | HTML | Pub. Date: Dec 29, 2025
DOI: 10.23977/jaip.2025.080406 | Downloads: 16 | Views: 466
AI-Driven Reverse Engineering of Biomimetic Structures via GNN-GAN Synergy
Baixin Pan*
Abstract | References | PDF | HTML | Pub. Date: Dec 26, 2025
DOI: 10.23977/jaip.2025.080405 | Downloads: 7 | Views: 231
NF-Net: Crowd Counting Based on Near-Far Network and Dynamic Dual Attention Mechanism
Zhang Dongming, Tian Xueqing*, Zhao Wenhui, Guo Yihan, Chen Lijia
Abstract | References | PDF | HTML | Pub. Date: Dec 2, 2025
DOI: 10.23977/jaip.2025.080404 | Downloads: 10 | Views: 332
Cloud Computing Environment: Research on Big Data Security and Privacy Protection Strategies
Shenpeiyilin*
Abstract | References | PDF | HTML | Pub. Date: Dec 1, 2025
DOI: 10.23977/jaip.2025.080403 | Downloads: 14 | Views: 330
Adaptive Inspection Path Planning Algorithm for Oil Pipeline Robots Driven by Fluid Kinetic Energy
Xiaomin Shan*, Hongyue Peng
Abstract | References | PDF | HTML | Pub. Date: Nov 28, 2025
DOI: 10.23977/jaip.2025.080402 | Downloads: 6 | Views: 297
Hybrid Detection Method for Concrete Cracks Based on Maskr-CNN and Swin Transformer
Hongbo Luo*, Xiangyuan Ma, Fan Yu
Abstract | References | PDF | HTML | Pub. Date: Nov 27, 2025
DOI: 10.23977/jaip.2025.080401 | Downloads: 14 | Views: 318
Empowering Security Surveillance with Machine Vision: A Survey of Anomaly Detection Technologies
Peng Yin*
Abstract | References | PDF | HTML | Pub. Date: Nov 25, 2025
DOI: 10.23977/jaip.2025.080320 | Downloads: 13 | Views: 365
















































