International Journal of Computers and Applications最新文献

筛选
英文 中文
Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset 让人脸识别适应蒙面世界:利用定制数据集的深度注意力网络
International Journal of Computers and Applications Pub Date : 2024-03-13 DOI: 10.1080/1206212x.2024.2328499
Himani Trivedi, Mahesh Goyani
{"title":"Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset","authors":"Himani Trivedi, Mahesh Goyani","doi":"10.1080/1206212x.2024.2328499","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328499","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2019 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140246109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel LDVP-based anomaly detection method for data streams 基于 LDVP 的新型数据流异常检测方法
International Journal of Computers and Applications Pub Date : 2024-03-11 DOI: 10.1080/1206212x.2024.2323266
Xiaohan Yu, Haixia Wang, Keming Dong, Chao Chen
{"title":"A novel LDVP-based anomaly detection method for data streams","authors":"Xiaohan Yu, Haixia Wang, Keming Dong, Chao Chen","doi":"10.1080/1206212x.2024.2323266","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2323266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"4 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140252478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things 确保工业运营的未来:工业物联网数字双胞胎的区块链增强信任机制
International Journal of Computers and Applications Pub Date : 2024-03-05 DOI: 10.1080/1206212x.2024.2318821
Chun Huang, Shudan Liu
{"title":"Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things","authors":"Chun Huang, Shudan Liu","doi":"10.1080/1206212x.2024.2318821","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2318821","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"221 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved task scheduling algorithm for conflict resolution in cloud environment 云环境中解决冲突的改进型任务调度算法
International Journal of Computers and Applications Pub Date : 2024-01-09 DOI: 10.1080/1206212x.2023.2301266
Abhishek Goyal, Rakesh Garg, K. Bhatia
{"title":"An improved task scheduling algorithm for conflict resolution in cloud environment","authors":"Abhishek Goyal, Rakesh Garg, K. Bhatia","doi":"10.1080/1206212x.2023.2301266","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"29 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A biological-like synthesis framework for software engineering environments 软件工程环境的类生物合成框架
International Journal of Computers and Applications Pub Date : 2024-01-09 DOI: 10.1080/1206212x.2023.2301183
Peraphon Sophatsathit
{"title":"A biological-like synthesis framework for software engineering environments","authors":"Peraphon Sophatsathit","doi":"10.1080/1206212x.2023.2301183","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301183","url":null,"abstract":"Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"30 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module 基于群白化残差 ConvNet 和大核子空间注意模块的进化神经架构搜索
International Journal of Computers and Applications Pub Date : 2024-01-05 DOI: 10.1080/1206212x.2023.2300221
Yang Xu, Yongjie Ma
{"title":"Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module","authors":"Yang Xu, Yongjie Ma","doi":"10.1080/1206212x.2023.2300221","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2300221","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on recent driver safety systems and its emerging solutions 近期驾驶员安全系统及其新兴解决方案综述
International Journal of Computers and Applications Pub Date : 2024-01-05 DOI: 10.1080/1206212x.2023.2293348
Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian
{"title":"A review on recent driver safety systems and its emerging solutions","authors":"Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian","doi":"10.1080/1206212x.2023.2293348","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2293348","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"18 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139382909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure authenticated image encryption scheme based on elliptic curve cryptography 基于椭圆曲线加密法的安全认证图像加密方案
International Journal of Computers and Applications Pub Date : 2023-12-30 DOI: 10.1080/1206212x.2023.2299575
Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev
{"title":"A secure authenticated image encryption scheme based on elliptic curve cryptography","authors":"Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev","doi":"10.1080/1206212x.2023.2299575","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2299575","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems 用于超载实时系统调度的高效加权部分 MaxSAT 编码
International Journal of Computers and Applications Pub Date : 2023-12-23 DOI: 10.1080/1206212x.2023.2297478
Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani
{"title":"An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems","authors":"Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani","doi":"10.1080/1206212x.2023.2297478","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2297478","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139161175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms 利用无人机群中的深度 Q 网络动态调整争用窗口边界
International Journal of Computers and Applications Pub Date : 2023-12-21 DOI: 10.1080/1206212x.2023.2296720
Neethu Subash, B. Nithya
{"title":"Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms","authors":"Neethu Subash, B. Nithya","doi":"10.1080/1206212x.2023.2296720","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2296720","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信