Current Trends in Computer Sciences & Applications最新文献

筛选
英文 中文
A British Multi-Access System on an IBM System/360 Computer 在IBM System/360计算机上的英国多址系统
Current Trends in Computer Sciences & Applications Pub Date : 2019-11-05 DOI: 10.32474/ctcsa.2019.01.000120
I. Pyle
{"title":"A British Multi-Access System on an IBM System/360 Computer","authors":"I. Pyle","doi":"10.32474/ctcsa.2019.01.000120","DOIUrl":"https://doi.org/10.32474/ctcsa.2019.01.000120","url":null,"abstract":"Following the success of the Compatible Time-Sharing System [1], and its brilliant exploitation in Project MAC at MIT (now the MIT Computer Science and Artificial Intelligence Laboratory, CSAIL), many institutions began making similar systems. Among the British ones were a multi-access extension for the supervisor for the Titan computer at Cambridge [2], COTAN [3-4] at Culham on an English Electric KDF-9, KOS [5] at the University of Kent at Canterbury on an Elliott 4130, and HUW at Harwell on an IBM System/360 computer, the subject of this paper. Harwell Users’ Workshop HUW was set up to provide interactive facilities for computer users at A.E.R.E Harwell. HUW was designed in 1965, following the author’s sabbatical visit to Project MAC.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum Intelligence 量子智能
Current Trends in Computer Sciences & Applications Pub Date : 2019-09-13 DOI: 10.1007/978-3-540-69121-1_13
Chi Tran
{"title":"Quantum Intelligence","authors":"Chi Tran","doi":"10.1007/978-3-540-69121-1_13","DOIUrl":"https://doi.org/10.1007/978-3-540-69121-1_13","url":null,"abstract":"","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128814033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an Economic Model for Protectively Sharing Biomedical Data 生物医学数据保护性共享的经济模型设计
Current Trends in Computer Sciences & Applications Pub Date : 2019-08-27 DOI: 10.32474/ctcsa.2019.01.000117
Adebayo Ot
{"title":"Design of an Economic Model for Protectively Sharing Biomedical Data","authors":"Adebayo Ot","doi":"10.32474/ctcsa.2019.01.000117","DOIUrl":"https://doi.org/10.32474/ctcsa.2019.01.000117","url":null,"abstract":"Frequency (MAF) and regression coefficients can lead to privacy concerns [5]. This understanding has led various groups removing statistical data from public databases into access-controlled format. Though such protections help preserve privacy, they also have adverse effects on access to useful dataset for medical research. The medical community is at a crossroad; how can researchers access medical data to data to save lives and still ensure the privacy of the individuals involved in the datasets. An effective model for genomic data dissemination can be achieved through an approach based on game theory to account for adversarial behaviors and capabilities. The proposed approach has already been used to analyze the reidentification risk and proven effective in some risk inherent domains, such as airport security and coast guard patrols [6]. Methodologies are borrowed from game theory to develop an effective, measurable protections for genomic data sharing. This method accounts for adversarial behavior to balance risks against utility more effectively compared with traditional approaches. Abstract Sharing medical data (such as genomic) can lead to important discoveries in healthcare, but researches have shown that links between de-identified data and named persons are sometimes reestablished by users with malicious intents. Traditional approaches to curb this menace rely data use agreements, suppression and noise adding to protect the privacy of individual in the dataset, but this reduces utility of the data. Therefore, this paper proposed an economic game theoretic model design for quantifiable protections of genomic data. The model can be developed to find solution for sharing summary statistics under an economically motivated recipient’s (adversary) inference attack. The framework incorporates four main participants: Data Owners, Certified Institution (CI), Sharer and Researchers (Recipients). The data Sharer and Researcher (who are the players) are economically motivated.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Path Planning in Reinforcement Learning by Backtracking 基于回溯的强化学习优化路径规划
Current Trends in Computer Sciences & Applications Pub Date : 2019-07-26 DOI: 10.32474/CTCSA.2019.01.000116
Morteza Kiadi, Qing Tan, J. Villar
{"title":"Optimized Path Planning in Reinforcement Learning by Backtracking","authors":"Morteza Kiadi, Qing Tan, J. Villar","doi":"10.32474/CTCSA.2019.01.000116","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000116","url":null,"abstract":"There exist many solutions to the maze pathfinding problem\u0000for more than three decays. The problem is referred to as maze\u0000pathfinding, maze navigation, micro mouse and indoor robot\u0000pathfinding","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Complex Neural Fuzzy Prediction Using Multi-Swarm Continuous Ant Colony Optimization 基于多群连续蚁群优化的复杂神经模糊预测
Current Trends in Computer Sciences & Applications Pub Date : 2019-07-02 DOI: 10.32474/CTCSA.2019.01.000115
Chunshien Li, W. Weng
{"title":"Complex Neural Fuzzy Prediction Using Multi-Swarm Continuous Ant Colony Optimization","authors":"Chunshien Li, W. Weng","doi":"10.32474/CTCSA.2019.01.000115","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000115","url":null,"abstract":"Prediction of time series is one of major research subjects in data science. This paper proposes a novel approach to the problem of multiple-target prediction. The proposed approach is mainly composed of three parts: the complex neuro-fuzzy system (CNFS) built by using complex fuzzy sets, the two-stage feature selection method for multiple targets, and the hybrid machine learning method that uses the multi-swarm continuous ant colony optimization (MCACO) and the recursive least squares estimation (RLSE). The CNFS predictive model is responsible for prediction after training. During the training of the model, the parameters are updated by the MCACO method and the RLSE method where the two methods work cooperatively to become one machine learning procedure. For the predictive model, complex fuzzy sets (CFSs) are with complex-valued membership degrees within the unit disk of the complex plane, useful to the non-linear mapping ability of the CNFS model for multiple target prediction. This CFS property is contrast to real-valued membership degrees in the unit interval [0,1] of traditional fuzzy sets. The two-stage feature selection applies to select significant features to be the inputs to the model for multiple target prediction. Experiments using real world data sets obtained from stock markets for the prediction of multiple targets have been conducted. With the results and performance comparison, the proposed approach has shown outstanding performance over other compared methods.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About the new internal symmetries of the Lattice ZN 关于晶格ZN的新的内部对称性
Current Trends in Computer Sciences & Applications Pub Date : 2019-05-23 DOI: 10.32474/CTCSA.2019.01.000114
A. Kornyushkin
{"title":"About the new internal symmetries of the Lattice ZN","authors":"A. Kornyushkin","doi":"10.32474/CTCSA.2019.01.000114","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000114","url":null,"abstract":"A large (apparently, infinite!) number of internal symmetries of\u0000the lattice ZN is identified.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Canonically Open, Quasi-Desargues Paths 典型开放,准desargue路径
Current Trends in Computer Sciences & Applications Pub Date : 2019-05-15 DOI: 10.32474/CTCSA.2019.01.000113
O. Akman, U. Steiner, O. Taylor, B Heaviside
{"title":"Canonically Open, Quasi-Desargues Paths","authors":"O. Akman, U. Steiner, O. Taylor, B Heaviside","doi":"10.32474/CTCSA.2019.01.000113","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000113","url":null,"abstract":"We wish to extend the results of [5-6] to right-Eratosthenes,\u0000partially ultra-Sylvester, ultra-stable lines. A useful survey of the\u0000subject can be found in [7].","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Multilevel Architecture of Secured Supercomputers
Current Trends in Computer Sciences & Applications Pub Date : 2019-04-10 DOI: 10.32474/CTCSA.2019.01.000112
As Molyakov
{"title":"New Multilevel Architecture of Secured Supercomputers","authors":"As Molyakov","doi":"10.32474/CTCSA.2019.01.000112","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000112","url":null,"abstract":"The priority task is to provide mechanisms for fast backup,\u0000“mirroring” of critical processes. Otherwise, a deliberate attack\u0000or an unintentional failure will lead to the loss of huge arrays\u0000of important data necessary for solving engineering and\u0000information and analytical tasks.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Data Collection and Visualization System for Smart Buildings 智能建筑数据采集与可视化系统
Current Trends in Computer Sciences & Applications Pub Date : 2019-02-20 DOI: 10.32474/CTCSA.2019.01.000111
Xinzhou Wei, Astrid Frank
{"title":"A Data Collection and Visualization System for Smart Buildings","authors":"Xinzhou Wei, Astrid Frank","doi":"10.32474/CTCSA.2019.01.000111","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000111","url":null,"abstract":"Wireless sensor network (WSN) is a very important part of the\u0000Internet of Things (IoT) [1]. It is composed of several thousands of\u0000sensor nodes which are capable of sensing, actuating and relaying\u0000the collected information.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mini Overview of Key Issues in Routing for OSPF MANETs OSPF manet路由关键问题概述
Current Trends in Computer Sciences & Applications Pub Date : 2019-02-04 DOI: 10.32474/CTCSA.2019.01.000109
Alamgir Naushad, Muhammad Tanveer, A. Khan
{"title":"Mini Overview of Key Issues in Routing for OSPF MANETs","authors":"Alamgir Naushad, Muhammad Tanveer, A. Khan","doi":"10.32474/CTCSA.2019.01.000109","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000109","url":null,"abstract":"Open Shortest Path First (OSPF) is a well known and prominent Internet Protocol (IP) for network routing. By deploying a link state routing (LSR) algorithm OSPF comes under the category of interior gateway routing protocols. In today’s wireless ad hoc Internet, the current routing domain needs to maintain a peak level of service accessibility and availability, thus OSPF must be extended to the wireless ad hoc network for maximizing routing performance in the network by taking into account key routing issues, i.e., optimal Hello Interval, efficient flooding schemes, optimizing the traffic engineering related issues, optimum adjacency creations, connectivity factors, reducing control overhead, and QoS and security challenges. In addition, OSPF is very effective in its adoption of handling the network bandwidth utilization, therefore, wireless capacity planning is of utmost importance for today’s Internet with the possible presence of wireless infrastructure. Improving routing stability in OSPF MANET under topology change(s) due to variation in link connectivity becomes a very demanding challenge for the research community. Given a fascinating volume of review for literature and unavoidable importance relating to OSPF extension to MANETs, there has still persist a need to highlight key issues related with routing in OSPF MANET.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信