CN112288177A
|
|
Intelligent recommendation method based on TRIZ innovation theory
|
CN112148602A
|
|
Source code security analysis method based on history optimization feature intelligent learning
|
CN112002043A
|
|
Intelligent lock control method and system based on NB-IOT
|
CN112017336A
|
|
Method and device for automatic authorization and safe anti-misoperation locking of intelligent lock
|
CN111950286A
|
|
Development method of artificial intelligent legal review engine system
|
CN111950891A
|
|
Contract legal risk management and control method based on artificial intelligence NLP technology
|
CN111786460A
|
|
Power grid information operation and maintenance active early warning method based on big data
|
CN111753541A
|
|
Method and system for performing Natural Language Processing (NLP) on contract text data
|
CN111753540A
|
|
Method and system for collecting text data to perform Natural Language Processing (NLP)
|
CN111935070A
|
|
Data security exchange system and method based on automatic arrangement
|
CN111800395A
|
|
Threat information defense method and system
|
CN111917714A
|
|
Zero trust architecture system and use method thereof
|
CN111857569A
|
|
Electric power information system virtualization storage method
|
CN111814017A
|
|
Method for automatically publishing data by unified coordinate system and computer program product
|
CN111815016A
|
|
Power transmission line path optimization method and computer program product
|
CN111818008A
|
|
Network data safety exchange method based on Webservice
|
CN111626590A
|
|
Power supply enterprise employee information system application capacity online real operation examination method
|
CN111666981A
|
|
System data anomaly detection method based on genetic fuzzy clustering
|
CN111666169A
|
|
Improved isolated forest algorithm and Gaussian distribution-based combined data anomaly detection method
|
CN111694822A
|
|
Low-voltage distribution network operation state data acquisition system and acquisition method thereof
|