{"title":"Research Progress in Gait Correction Rehabilitation Technology","authors":"晶晶 徐","doi":"10.12677/sea.2023.121006","DOIUrl":"https://doi.org/10.12677/sea.2023.121006","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73678983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-Channel Classification Model for Fine-Grained Sentiment Classification Task","authors":"伟 汪","doi":"10.12677/sea.2023.121014","DOIUrl":"https://doi.org/10.12677/sea.2023.121014","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74742873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Expression Recognition Algorithm Based on Convolutional Neural Network","authors":"博 韩","doi":"10.12677/sea.2023.122019","DOIUrl":"https://doi.org/10.12677/sea.2023.122019","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74747644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on High-Precision Prediction Algorithm and Clustering Routing for WSN","authors":"冬梅 王","doi":"10.12677/sea.2023.124057","DOIUrl":"https://doi.org/10.12677/sea.2023.124057","url":null,"abstract":"Wireless Sensor Networks (WSNs) are usually powered by batteries","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75818187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Power Control Algorithm Based on Distributed Reinforcement Learning","authors":"轲 司","doi":"10.12677/sea.2023.123052","DOIUrl":"https://doi.org/10.12677/sea.2023.123052","url":null,"abstract":"Reinforcement learning is applied as a model free control method to solve the problem of co channel interference in cellular networks. However, in value based reinforcement learning algorithms, error in function approximation leads to overestimation of the Q value, which leads to the algorithm converging to a suboptimal strategy and poor performance in suppressing channel interference, and the convergence speed is slow in high-frequency scenarios. This paper proposes a control method suitable for distributed deployment, which uses DDQN to learn discrete strategies, and adds a delay-depth deterministic strategy gradient algorithm with a triplet criticism mechan-司轲,李烨","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"127 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75113483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity and Domestic Terrorism: Purpose and Future","authors":"Robb Shawe, Ian R. McAndrew","doi":"10.4236/jsea.2023.1610028","DOIUrl":"https://doi.org/10.4236/jsea.2023.1610028","url":null,"abstract":"The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135260785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BP Decoding Algorithm Based on Ensemble Learning","authors":"坤 徐","doi":"10.12677/sea.2023.122036","DOIUrl":"https://doi.org/10.12677/sea.2023.122036","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83925164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of Illegal Pet Walking Based on YOLO Feature Detection Model","authors":"学雷 黄","doi":"10.12677/sea.2023.121012","DOIUrl":"https://doi.org/10.12677/sea.2023.121012","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76323827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Early Warning Method for Resource Monitoring of Edge Service System","authors":"焱兵 胡","doi":"10.12677/sea.2023.122032","DOIUrl":"https://doi.org/10.12677/sea.2023.122032","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"309 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76092250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Dimensional Imaging System Based on 77 GHz Inverse Synthetic Aperture Radar","authors":"杨 徐","doi":"10.12677/sea.2023.122021","DOIUrl":"https://doi.org/10.12677/sea.2023.122021","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"199 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75963044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}