Author:
Zhao Bo,Yang Ming,Cai Yuxin,Tang Zhiwei
Reference6 articles.
1. Huang, W.T., and P.Y. Hsu. 2006. Application of computerized patrol management system of examining for the petrochemical plant. Journal of Kao Yuan University 12: 81–93.
2. Chen W.D., G.P. Hancke, K.E. Mayes, et al. 2010. Using 3G network components to enable NFC mobile transactions and authentication. IEEE International Conference on Progress in Informatics and Computing, Shanghai.
3. Fave, F.M.D., A.X. Jiang, Z. Yin, et al. 2014. Game-theoretic security patrolling with dynamic execution uncertainty and a case study on a real transit system. Journal of Artificial Intelligence Research 50 (1): 321–367.
4. Dehuai Z., X. Cunxi, and L. Xuemei. 2005. Design and implementation of a security and patrol robot system. Mechatronics & Automation, IEEE International Conference.
5. Guan, Z.H., F. Huang, and W. Guan. 2005. Chaos-based image encryption algorithm. Physics Letters A 346 (1–3): 153–157.