Current Trends in Computer Sciences & Applications最新文献

筛选
英文 中文
Retrofitting Mobile First Design, Responsive Design: Driving Factors, Approach, Best Practices and Design Considerations 改进移动优先设计,响应式设计:驱动因素,方法,最佳实践和设计考虑
Current Trends in Computer Sciences & Applications Pub Date : 2020-12-02 DOI: 10.32474/ctcsa.2020.02.000131
Bhanu Prakash
{"title":"Retrofitting Mobile First Design, Responsive Design: Driving Factors, Approach, Best Practices and Design Considerations","authors":"Bhanu Prakash","doi":"10.32474/ctcsa.2020.02.000131","DOIUrl":"https://doi.org/10.32474/ctcsa.2020.02.000131","url":null,"abstract":"For any business going online, mobile apps or websites are\u0000mandatory. Excluding internet sites with large and complex...","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124032910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random Graph Models with Non-Independent Edges 非独立边随机图模型
Current Trends in Computer Sciences & Applications Pub Date : 2020-11-30 DOI: 10.32474/ctcsa.2020.02.000130
Zohre R. Mojaveri, A. Faragó
{"title":"Random Graph Models with Non-Independent Edges","authors":"Zohre R. Mojaveri, A. Faragó","doi":"10.32474/ctcsa.2020.02.000130","DOIUrl":"https://doi.org/10.32474/ctcsa.2020.02.000130","url":null,"abstract":"A random graph on n vertices is called p-robust, if every edge is\u0000present with probability at least p, regardless of the status...","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and Review of Average Fuzzy Inference Technique and Other AI Techniques Used for Robot Control and Navigation 平均模糊推理技术及其他人工智能技术在机器人控制与导航中的应用分析与综述
Current Trends in Computer Sciences & Applications Pub Date : 2020-11-23 DOI: 10.32474/ctcsa.2020.02.000129
R. ParhiDayal
{"title":"Analysis and Review of Average Fuzzy Inference Technique and Other AI Techniques Used for Robot Control and Navigation","authors":"R. ParhiDayal","doi":"10.32474/ctcsa.2020.02.000129","DOIUrl":"https://doi.org/10.32474/ctcsa.2020.02.000129","url":null,"abstract":"Finite element analysis [34-37] can be utilized for evaluating the mechanical properties of various structures used for fabricating bodies and frames of the robots. Nature driven Fire Fly algorithm is one of the promising AI technique to address many optimization problems. Engineers have used Fire Fly algorithm [38-40] for path planning of robotic agents in uncertain environments. Abstract In this paper application of average fuzzy inference technique has been analysed for navigation control of robotic agent. Also, the reviews of other AI techniques for control of robots are carried out. The robotic agent uses sensors to map the surroundings and take the decision with the help of Fuzzy AI technique to avoid obstacles. In this paper a novel averaging method has been deployed to optimize the results obtained from various fuzzy membership functions. Using the Average Fuzzy Inference technique robot navigates from start position to goal position avoiding obstacles while reaching the target. The simulation results agree with experimental results. The methodology can be used for various applications by the scientific communities to address various engineering problems.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126100194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Mechanism for Generating an Ipv6 Address in IoT Context 在物联网环境下生成Ipv6地址的新机制
Current Trends in Computer Sciences & Applications Pub Date : 2020-11-16 DOI: 10.32474/ctcsa.2020.02.000128
Ali El Ksimi
{"title":"A New Mechanism for Generating an Ipv6 Address in IoT Context","authors":"Ali El Ksimi","doi":"10.32474/ctcsa.2020.02.000128","DOIUrl":"https://doi.org/10.32474/ctcsa.2020.02.000128","url":null,"abstract":"As objects connected to the Internet multiply, it is likely that the stateless IPv6 autoconfiguration service will finally be used on a large scale...","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tendency of Educational Data Mining in Digital Learning Platform 数字化学习平台中教育数据挖掘的发展趋势
Current Trends in Computer Sciences & Applications Pub Date : 2020-11-02 DOI: 10.32474/ctcsa.2020.02.000127
G. Sharma
{"title":"Tendency of Educational Data Mining in Digital Learning Platform","authors":"G. Sharma","doi":"10.32474/ctcsa.2020.02.000127","DOIUrl":"https://doi.org/10.32474/ctcsa.2020.02.000127","url":null,"abstract":"With the advancement of technology learning process have been more reachable and interactive like never before...","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Analysis of LTE Downlink System-3GPP LTE下行链路系统3gpp的建模与分析
Current Trends in Computer Sciences & Applications Pub Date : 2020-03-04 DOI: 10.32474/CTCSA.2020.01.000125
F. FarhanAlta, M. HaseebZafar
{"title":"Modeling and Analysis of LTE Downlink System-3GPP","authors":"F. FarhanAlta, M. HaseebZafar","doi":"10.32474/CTCSA.2020.01.000125","DOIUrl":"https://doi.org/10.32474/CTCSA.2020.01.000125","url":null,"abstract":"The rapid increase in demand for data packet based mobile\u0000systems and to meet the requirements of future communications...","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Smart Military Fatigue 智能军用疲劳系统设计
Current Trends in Computer Sciences & Applications Pub Date : 2019-12-19 DOI: 10.32474/ctcsa.2019.01.000124
Ogboru Or
{"title":"Design of a Smart Military Fatigue","authors":"Ogboru Or","doi":"10.32474/ctcsa.2019.01.000124","DOIUrl":"https://doi.org/10.32474/ctcsa.2019.01.000124","url":null,"abstract":"an","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Duplicate Detection Models for Bug Reports of Software Triage Systems: A Survey 软件分类系统Bug报告的重复检测模型:综述
Current Trends in Computer Sciences & Applications Pub Date : 2019-12-17 DOI: 10.32474/ctcsa.2019.01.000123
Behzad Soleimani Neysiani
{"title":"Duplicate Detection Models for Bug Reports of Software Triage Systems: A Survey","authors":"Behzad Soleimani Neysiani","doi":"10.32474/ctcsa.2019.01.000123","DOIUrl":"https://doi.org/10.32474/ctcsa.2019.01.000123","url":null,"abstract":"Nowadays, software triage systems (STS) like Bugzilla are an impartible tool for huge projects -especially open sourcelike Open Office, Mozilla Firefox, Eclipse, Android, and so on. The main task of STS is to help the development team for the maintenance phase and get end-user requests like bug reports and suggestions and deal with them. There exist many important tasks for software triage systems like prioritizing bug reports, detecting duplicates, assigning bug reports to developers, track the status of bug reports until they can be fixed [1]. Every bug report consists of various data fields (DF) which can be categorized as follows:","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"48 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stock Market Trend Prediction Model Using Data Mining Techniques 基于数据挖掘技术的股票市场趋势预测模型
Current Trends in Computer Sciences & Applications Pub Date : 2019-12-12 DOI: 10.32474/ctcsa.2019.01.000122
Oyelade Iyinoluwa
{"title":"Stock Market Trend Prediction Model Using Data Mining Techniques","authors":"Oyelade Iyinoluwa","doi":"10.32474/ctcsa.2019.01.000122","DOIUrl":"https://doi.org/10.32474/ctcsa.2019.01.000122","url":null,"abstract":"Stock market prediction is essential and of great interest because successful prediction of stock prices may promise smart benefits. These tasks are highly complicated and very difficult. Many researchers have made valiant attempts in data mining to devise an efficient system for stock market movement analysis. This research has developed an efficient approach to stock market trend prediction by employing Frequent Pattern growth and Fuzzy C-means clustering algorithms. This research has been encouraged by the need of predicting the stock market to facilitate investors about when to buy, sell or hold a stock in order to make profit. Firstly, the original stock market data were converted into interpreted historical (financial) data via technical indicators. Based on these technical indicators, datasets that are required for analysis was created. Subsequently, Frequent Pattern Growth algorithm was used to generate frequent patterns. Based on these frequent patterns, Fuzzy C-means clustering technique was used to formulate the prediction model. Finally, a classification technique, K-Nearest Neighbor classifier was employed to predict the stock market trends. The results from the stock market trend prediction were validated through Hit ratio evaluation metric to estimate the prediction accuracy. Comparative analysis was carried out for the proposed model and a neural network model was used to benchmark the proposed model. The obtained results showed that proposed model produced better results than the neural network model in terms of accuracy. This paper has provided a novel approach which combines FP-Growth, Fuzzy C-means and K-Nearest Neighbor algorithms for stock market trend prediction.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123433158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multidimensional: User with File Content and Server’s Status Based Authentication for Secure File Operations in Cloud 多维:具有文件内容的用户和基于服务器状态的云端安全文件操作认证
Current Trends in Computer Sciences & Applications Pub Date : 2019-11-22 DOI: 10.32474/CTCSA.2019.01.000121
Jims Marchang, Jing Wang, Abayomi Otebolaku, Timibloudi S. Enamamu, Daniel Porter, Benjamin Sanders
{"title":"Multidimensional: User with File Content and Server’s Status Based Authentication for Secure File Operations in Cloud","authors":"Jims Marchang, Jing Wang, Abayomi Otebolaku, Timibloudi S. Enamamu, Daniel Porter, Benjamin Sanders","doi":"10.32474/CTCSA.2019.01.000121","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000121","url":null,"abstract":"The popularity of data storage in cloud servers is getting more and more favoured in recent times. Its ease of storage, availability and synchronization of personalized cloud file storage using client applications made cloud storage more popular than ever. In cloud storage system, using a basic authentication method like username and password are still one of the most popular forms of authentication. However, the security ensure by such traditional authentication method is weak and vulnerable because the user name and password can be compromised by intruders or the user account can be left open by forgetting to logoff in public computers, leading to exposure of information to unauthorised users and hackers. In recent years, using a two-factor authentication has become a trend throughout network-based cloud services, online banking system and any form of services that requires user authentication. Here, in this paper a second layer authentication in the form of session key is used to ensure the authenticity of the activities of the user after user’s web-based account is logged-in successfully. The interesting and the critical contribution in this paper is the way the session key is generated and delivers to the authentic user. The key is generated by using the hash value of the file content, file size, file last modified, pseudo-random generated by the server using CPU temperature, clock speed, system time, and network packet timings, and user based 8 digit random position selection from a 32 digit Hex to mitigate against the attacker while performing vital file activities which may lead to data lost or data destruction or when user’s credentials are compromised.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信