International Journal of Computers and Applications最新文献

筛选
英文 中文
Weight assignment in cloud service selection based on FAHP and rough sets 基于 FAHP 和粗糙集的云服务选择中的权重分配
International Journal of Computers and Applications Pub Date : 2024-08-09 DOI: 10.1080/1206212x.2024.2387658
Hela Malouche
{"title":"Weight assignment in cloud service selection based on FAHP and rough sets","authors":"Hela Malouche","doi":"10.1080/1206212x.2024.2387658","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2387658","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"6 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141921536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The social force model: a behavioral modeling approach for information propagation during significant events 社会力量模型:重大事件期间信息传播的行为建模方法
International Journal of Computers and Applications Pub Date : 2024-07-26 DOI: 10.1080/1206212x.2024.2380645
A. Saleema, Sabu M. Thampi
{"title":"The social force model: a behavioral modeling approach for information propagation during significant events","authors":"A. Saleema, Sabu M. Thampi","doi":"10.1080/1206212x.2024.2380645","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380645","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"36 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141800140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive study on social networks analysis and mining to detect opinion leaders 关于社交网络分析和挖掘以发现意见领袖的综合研究
International Journal of Computers and Applications Pub Date : 2024-07-26 DOI: 10.1080/1206212x.2024.2380655
W. Oueslati, Siwar Mejri, J. Akaichi
{"title":"A comprehensive study on social networks analysis and mining to detect opinion leaders","authors":"W. Oueslati, Siwar Mejri, J. Akaichi","doi":"10.1080/1206212x.2024.2380655","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380655","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"11 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141801885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC 利用 SPIHT 和 LDPC 自嵌入水印进行鲁棒图像篡改检测和恢复
International Journal of Computers and Applications Pub Date : 2024-07-24 DOI: 10.1080/1206212x.2024.2380650
Priyanka Priyadarshini, K. Naik
{"title":"Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC","authors":"Priyanka Priyadarshini, K. Naik","doi":"10.1080/1206212x.2024.2380650","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380650","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"64 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141808325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ReLeC-based clustering and multi-objective optimization for efficient energy optimization in IoT networks 基于 ReLeC 的聚类和多目标优化,实现物联网网络的高效能源优化
International Journal of Computers and Applications Pub Date : 2024-07-24 DOI: 10.1080/1206212x.2024.2380646
S. Regilan, L. K. Hema, J. Jenitha
{"title":"ReLeC-based clustering and multi-objective optimization for efficient energy optimization in IoT networks","authors":"S. Regilan, L. K. Hema, J. Jenitha","doi":"10.1080/1206212x.2024.2380646","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380646","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"40 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML 用于 iOS 皮肤病变分类的机器学习方法:利用 Create ML 实现并优化卷积传递学习模型
International Journal of Computers and Applications Pub Date : 2024-07-24 DOI: 10.1080/1206212x.2024.2380664
Aron Benedek Szabo, Jozsef Katona
{"title":"A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML","authors":"Aron Benedek Szabo, Jozsef Katona","doi":"10.1080/1206212x.2024.2380664","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380664","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"64 34","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users 通过辅助用户的人工噪声辅助实现 5G 下层认知无线电系统中主用户的物理层安全
International Journal of Computers and Applications Pub Date : 2024-07-24 DOI: 10.1080/1206212x.2024.2380666
Ayat M. Al-Rjoob, Ahmad A. Ababnah, M. Al-Mistarihi, Khalid A. Darabkh
{"title":"Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users","authors":"Ayat M. Al-Rjoob, Ahmad A. Ababnah, M. Al-Mistarihi, Khalid A. Darabkh","doi":"10.1080/1206212x.2024.2380666","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380666","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"58 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-sparse fuzzy clustering with automatic region merging approach for image segmentation 自稀疏模糊聚类与自动区域合并方法用于图像分割
International Journal of Computers and Applications Pub Date : 2024-07-24 DOI: 10.1080/1206212x.2024.2380975
Tunirani Nayak, N. Bhoi
{"title":"Self-sparse fuzzy clustering with automatic region merging approach for image segmentation","authors":"Tunirani Nayak, N. Bhoi","doi":"10.1080/1206212x.2024.2380975","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380975","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"48 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel binary quantizer for variational autoencoder-based image compressor 基于变异自动编码器的图像压缩器的新型二进制量化器
International Journal of Computers and Applications Pub Date : 2024-07-23 DOI: 10.1080/1206212x.2024.2380651
Pillai Praveen Thulasidharan, Keshab Nath
{"title":"A novel binary quantizer for variational autoencoder-based image compressor","authors":"Pillai Praveen Thulasidharan, Keshab Nath","doi":"10.1080/1206212x.2024.2380651","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380651","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"112 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141812083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online aggression detection using ensemble techniques on fine-tuned transformer-based language models 使用基于微调转换器语言模型的集合技术在线检测侵犯行为
International Journal of Computers and Applications Pub Date : 2024-07-23 DOI: 10.1080/1206212x.2024.2380649
Sneha Chinivar, M. S. Roopa, J. Arunalatha, K. R. Venugopal
{"title":"Online aggression detection using ensemble techniques on fine-tuned transformer-based language models","authors":"Sneha Chinivar, M. S. Roopa, J. Arunalatha, K. R. Venugopal","doi":"10.1080/1206212x.2024.2380649","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380649","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"135 27","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141811058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信