International Journal of Computers and Applications最新文献

筛选
英文 中文
DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks DNA 隐写术:使用玻璃栈方法嵌入秘密信息并检测不同攻击造成的错误
International Journal of Computers and Applications Pub Date : 2024-05-09 DOI: 10.1080/1206212x.2024.2347456
Mahbubun Nahar, A. H. M. Kamal
{"title":"DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks","authors":"Mahbubun Nahar, A. H. M. Kamal","doi":"10.1080/1206212x.2024.2347456","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2347456","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140997533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document retrieval using clustering-based Aquila hash-Q optimization with query expansion based on pseudo relevance feedback 利用基于聚类的 Aquila hash-Q 优化和基于伪相关性反馈的查询扩展进行文档检索
International Journal of Computers and Applications Pub Date : 2024-04-23 DOI: 10.1080/1206212x.2024.2342715
Bhushan Inje, K. Nagwanshi, Radhakrishna Rambola
{"title":"Document retrieval using clustering-based Aquila hash-Q optimization with query expansion based on pseudo relevance feedback","authors":"Bhushan Inje, K. Nagwanshi, Radhakrishna Rambola","doi":"10.1080/1206212x.2024.2342715","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2342715","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140668801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on fastDTW and isolation forest-based lightweight gesture authentication 基于 fastDTW 和隔离林的轻量级手势认证研究
International Journal of Computers and Applications Pub Date : 2024-04-19 DOI: 10.1080/1206212x.2024.2335717
HanFan Liu, Pei Tian, HaiFang Yao, Cong Shen, FengYang Hu
{"title":"Research on fastDTW and isolation forest-based lightweight gesture authentication","authors":"HanFan Liu, Pei Tian, HaiFang Yao, Cong Shen, FengYang Hu","doi":"10.1080/1206212x.2024.2335717","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2335717","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140685627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based phishing detection: URLGBM model driven by machine learning 基于图形的网络钓鱼检测:机器学习驱动的 URLGBM 模型
International Journal of Computers and Applications Pub Date : 2024-04-18 DOI: 10.1080/1206212x.2024.2342710
Abdelali Elkouay, Najem Moussa, Abdallah Madani
{"title":"Graph-based phishing detection: URLGBM model driven by machine learning","authors":"Abdelali Elkouay, Najem Moussa, Abdallah Madani","doi":"10.1080/1206212x.2024.2342710","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2342710","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140688765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adjustable patch and feature prior token-based transformer for weakly supervised semantic segmentation 用于弱监督语义分割的可调补丁和特征先验标记变换器
International Journal of Computers and Applications Pub Date : 2024-04-15 DOI: 10.1080/1206212x.2024.2333122
Linjuan Li, Haoxue Zhang, Gang Xie, Yanhong Bai
{"title":"Adjustable patch and feature prior token-based transformer for weakly supervised semantic segmentation","authors":"Linjuan Li, Haoxue Zhang, Gang Xie, Yanhong Bai","doi":"10.1080/1206212x.2024.2333122","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2333122","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140702036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system 利用循环混沌系统的哈达玛德变换盲数字水印技术加强版权保护
International Journal of Computers and Applications Pub Date : 2024-04-03 DOI: 10.1080/1206212x.2024.2336329
Alina Dash, K. Naik, Priyanka Priyadarshini
{"title":"Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system","authors":"Alina Dash, K. Naik, Priyanka Priyadarshini","doi":"10.1080/1206212x.2024.2336329","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2336329","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140749495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TOPSIS-ACO based feature selection for multi-label classification 基于 TOPSIS-ACO 的多标签分类特征选择
International Journal of Computers and Applications Pub Date : 2024-02-29 DOI: 10.1080/1206212x.2024.2321683
Gurudatta Verma, T. P. Sahu
{"title":"TOPSIS-ACO based feature selection for multi-label classification","authors":"Gurudatta Verma, T. P. Sahu","doi":"10.1080/1206212x.2024.2321683","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2321683","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing security: a taxonomy, threat detection and mitigation techniques 云计算安全:分类、威胁检测和缓解技术
International Journal of Computers and Applications Pub Date : 2024-02-26 DOI: 10.1080/1206212x.2024.2319937
Pinki Rani, Sukhdip Singh, Karanbir Singh
{"title":"Cloud computing security: a taxonomy, threat detection and mitigation techniques","authors":"Pinki Rani, Sukhdip Singh, Karanbir Singh","doi":"10.1080/1206212x.2024.2319937","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2319937","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems 关键任务系统的可靠性非功能性要求评估与未来系统的架构战略
International Journal of Computers and Applications Pub Date : 2024-02-09 DOI: 10.1080/1206212x.2024.2304385
Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar
{"title":"Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems","authors":"Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar","doi":"10.1080/1206212x.2024.2304385","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2304385","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139787738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems 关键任务系统的可靠性非功能性要求评估与未来系统的架构战略
International Journal of Computers and Applications Pub Date : 2024-02-09 DOI: 10.1080/1206212x.2024.2304385
Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar
{"title":"Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems","authors":"Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar","doi":"10.1080/1206212x.2024.2304385","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2304385","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139847625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信