Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same image to hide the important information. In this paper we propose an algorithm to spot the copy-move forgery based on exact match block based technique. The algorithm works by matching the regions in image that are equivalent by matching the small blocks of size b b. The program is tested for 45 images of mixed image file formats by considering block sizes 2, 4, 6, 8, 10, 12, 14, and 16. It is observed from the experimental results that the proposed algorithm can detect copy-move image forgery in TIF, BMP and PNG image formats only. Results reveal that as the block size increases, execution time (time taken by CPU to display output) also increases but the number of detected forged images increases till block size 10 and attains saturation thereafter. Consequently block size should be set to 10 for getting good results in terms of less execution time.
{"title":"Copy Move Image Forgery Detection with Exact Match Block Based Technique","authors":"Priyanka Arora, Derminder Singh","doi":"10.13005/ojcst12.03.07","DOIUrl":"https://doi.org/10.13005/ojcst12.03.07","url":null,"abstract":"Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same image to hide the important information. In this paper we propose an algorithm to spot the copy-move forgery based on exact match block based technique. The algorithm works by matching the regions in image that are equivalent by matching the small blocks of size b b. The program is tested for 45 images of mixed image file formats by considering block sizes 2, 4, 6, 8, 10, 12, 14, and 16. It is observed from the experimental results that the proposed algorithm can detect copy-move image forgery in TIF, BMP and PNG image formats only. Results reveal that as the block size increases, execution time (time taken by CPU to display output) also increases but the number of detected forged images increases till block size 10 and attains saturation thereafter. Consequently block size should be set to 10 for getting good results in terms of less execution time.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the biggest problems in using artificial neural networks is to determine the best architecture. This is a crucial problem since there are no general rules to select the best architecture structure. Selection of the best architecture is to determine how many neurons should be used in the layers of a network. It is a well-known fact that using a proper architecture structure directly affect the performance of the method. Therefore, various approaches ranging from trial and error method to heuristic optimization algorithms have been suggested to solve this problem in the literature. Although there have been systematical approaches in the literature, trial and error method has been widely used in various applications to find a good architecture. This study propose a new architecture selection method based on statistical and machine learning. The proposed method utilizes regression analysis that is a supervised learning technique in machine learning. In this new architecture selection approach, it is aimed to combine statistical and machine learning to reach good architectures which has high performance. The proposed approach brings a new perspective since it is possible to perform statistical hypothesis tests and to statistically evaluate the obtained results when artificial neural networks are used. The best architecture structure can be statistically determined in the proposed approach. In addition to this, the proposed approach provides some important advantages. This is the first study using a statistical method to utilize statistical hypothesis tests in artificial neural networks. Using regression analysis is easy to use so applying the proposed method is also easy. And, the proposed approach saves time since the best architecture is determined by regression analysis. Furthermore, it is possible to make inference for architectures which is not examined. The proposed approach is applied to three real data sets to show the applicability of the approach. The obtained results show that the proposed method gives very satisfactory results for real data sets.
{"title":"Architecture Selection in Neural Networks by Statistical and Machine Learning","authors":"Ç. Aladag","doi":"10.13005/ojcst12.03.02","DOIUrl":"https://doi.org/10.13005/ojcst12.03.02","url":null,"abstract":"One of the biggest problems in using artificial neural networks is to determine the best architecture. This is a crucial problem since there are no general rules to select the best architecture structure. Selection of the best architecture is to determine how many neurons should be used in the layers of a network. It is a well-known fact that using a proper architecture structure directly affect the performance of the method. Therefore, various approaches ranging from trial and error method to heuristic optimization algorithms have been suggested to solve this problem in the literature. Although there have been systematical approaches in the literature, trial and error method has been widely used in various applications to find a good architecture. This study propose a new architecture selection method based on statistical and machine learning. The proposed method utilizes regression analysis that is a supervised learning technique in machine learning. In this new architecture selection approach, it is aimed to combine statistical and machine learning to reach good architectures which has high performance. The proposed approach brings a new perspective since it is possible to perform statistical hypothesis tests and to statistically evaluate the obtained results when artificial neural networks are used. The best architecture structure can be statistically determined in the proposed approach. In addition to this, the proposed approach provides some important advantages. This is the first study using a statistical method to utilize statistical hypothesis tests in artificial neural networks. Using regression analysis is easy to use so applying the proposed method is also easy. And, the proposed approach saves time since the best architecture is determined by regression analysis. Furthermore, it is possible to make inference for architectures which is not examined. The proposed approach is applied to three real data sets to show the applicability of the approach. The obtained results show that the proposed method gives very satisfactory results for real data sets.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Systematic pursuits are being developed to set forth the framework for the Fifth Generation (5G) wireless standards. This paper emphases on the most extensively deployed technology - Orthogonal Frequency Division Multiplexing (OFDM) that has outpaced other waveform aspirants for Fourth Generation (4G) communication standards. Irrespective of the beneficial features, it does possess a number of significant limitations that mark it as an incompatible candidate for the upcoming 5G standard. This paper highlights on its major drawback i.e high Peak-to-Average Power Ratio (PAPR). Results state that PAPR does cause sudden upsurge to the output signal envelope causing further other damages. There exists a need for more flexible waveforms to replace the conventional OFDM in order to address the unprecedented challenges. The future research directions in the domain are presented.
{"title":"Suitability of OFDM in 5G Waveform – A Review","authors":"P. Lavanya, P. Satyanarayana, Afaq Ahmad","doi":"10.13005/ojcst12.03.01","DOIUrl":"https://doi.org/10.13005/ojcst12.03.01","url":null,"abstract":"Systematic pursuits are being developed to set forth the framework for the Fifth Generation (5G) wireless standards. This paper emphases on the most extensively deployed technology - Orthogonal Frequency Division Multiplexing (OFDM) that has outpaced other waveform aspirants for Fourth Generation (4G) communication standards. Irrespective of the beneficial features, it does possess a number of significant limitations that mark it as an incompatible candidate for the upcoming 5G standard. This paper highlights on its major drawback i.e high Peak-to-Average Power Ratio (PAPR). Results state that PAPR does cause sudden upsurge to the output signal envelope causing further other damages. There exists a need for more flexible waveforms to replace the conventional OFDM in order to address the unprecedented challenges. The future research directions in the domain are presented.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 1943 Machculloch and Pitts create the formal neuron where many input signals are linearly composed with different weights on the neuron soma. When the soma electrical signal goes over a specific threshold an output is produced. The main topic in this model is that the response is the same response as in a Boolean function used a lot for the digital computer. Logic functions can be simplified with the formal neuron. But there is the big problem for which not all logic functions, as XOR , cannot be designed in the formal neuron. After a long time the back propagation and many other neural models overcame the big problem in some cases but not in all cases creating a lot of uncertainty. The model proposed does not consider the formal neuron but the natural network controlled by a set of differential equations for neural channels that model the current and voltage on the neuron surface. The steady state of the probabilities is the activation state continuous function whose maximum and minimum are the values of the Boolean function associated with the activation time of spikes of the neuron. With this method the activation function can be designed when the Boolean functions are known. Moreover the neuron differential equation can be designed in order to realize the wanted Boolean function in the neuron itself. The activation function theory permits to compute the neural parameters in agreement with the intention.
{"title":"Boolean Models Guide Intentionally Continuous Information and Computation Inside the Brain","authors":"G. Resconi","doi":"10.13005/ojcst12.03.03","DOIUrl":"https://doi.org/10.13005/ojcst12.03.03","url":null,"abstract":"In 1943 Machculloch and Pitts create the formal neuron where many input signals are linearly composed with different weights on the neuron soma. When the soma electrical signal goes over a specific threshold an output is produced. The main topic in this model is that the response is the same response as in a Boolean function used a lot for the digital computer. Logic functions can be simplified with the formal neuron. But there is the big problem for which not all logic functions, as XOR , cannot be designed in the formal neuron. After a long time the back propagation and many other neural models overcame the big problem in some cases but not in all cases creating a lot of uncertainty. The model proposed does not consider the formal neuron but the natural network controlled by a set of differential equations for neural channels that model the current and voltage on the neuron surface. The steady state of the probabilities is the activation state continuous function whose maximum and minimum are the values of the Boolean function associated with the activation time of spikes of the neuron. With this method the activation function can be designed when the Boolean functions are known. Moreover the neuron differential equation can be designed in order to realize the wanted Boolean function in the neuron itself. The activation function theory permits to compute the neural parameters in agreement with the intention.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122985517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kapil S. Raviya, V. Dwivedi, A. Kothari, Gunvantsinh Gohil
The researcher have suggested real time depth based on frequency domain hole filling. It get better quality of depth sequence generated by sensor. This method is capable to produce high feature depth video which can be quite useful in improving the performance of various applications of Microsoft Kinect such as obstacle detection and avoidance, facial tracking, gesture recognition, pose estimation and skeletal. For stereo matching approach images depth extraction is the hybrid (Combination of Morphological Operation) mathematical algorithm. There are few step like color conversion, block matching, guided filtering, minimum disparity assignment design, mathematical perimeter, zero depth assignment, combination of hole filling and permutation of morphological operator and last nonlinear spatial filtering. Our algorithm is produce smooth, reliable, noise less and efficient depth map. The evaluation parameter such as Structure Similarity Index Map (SSIM), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) measure the results for proportional analysis.
{"title":"Real Time Depth Hole Filling using Kinect Sensor and Depth Extract from Stereo Images","authors":"Kapil S. Raviya, V. Dwivedi, A. Kothari, Gunvantsinh Gohil","doi":"10.13005/ojcst12.03.06","DOIUrl":"https://doi.org/10.13005/ojcst12.03.06","url":null,"abstract":"The researcher have suggested real time depth based on frequency domain hole filling. It get better quality of depth sequence generated by sensor. This method is capable to produce high feature depth video which can be quite useful in improving the performance of various applications of Microsoft Kinect such as obstacle detection and avoidance, facial tracking, gesture recognition, pose estimation and skeletal. For stereo matching approach images depth extraction is the hybrid (Combination of Morphological Operation) mathematical algorithm. There are few step like color conversion, block matching, guided filtering, minimum disparity assignment design, mathematical perimeter, zero depth assignment, combination of hole filling and permutation of morphological operator and last nonlinear spatial filtering. Our algorithm is produce smooth, reliable, noise less and efficient depth map. The evaluation parameter such as Structure Similarity Index Map (SSIM), Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) measure the results for proportional analysis.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123053186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-learning system is designed to aid students build their comprehension towards their respected academic subjects to make their experience in learning more nourishing and engaging. The researchers decided to conduct this study to be au fait the benefits of online education and how the students accept the change this innovation gave. A survey questionnaire was distributed to the enrolled college students of AMA Computer College Year 2018-2019 to make the research more reliable, accurate and at the same time tackle the benefits of the said innovated education system. The said research was a success in defining what helps the students in their education as well as the improvement it can do in terms of catering different subjects and assessing the learners’ competency. The researchers recommend the future researchers to further expand and elaborate the topic in order to enhance the study. To further extend the scope and distribute further information regarding the tackled study.
{"title":"An Assessment of the Effectiveness of E-Learning in AMA Olongapo Campus","authors":"F. Mobo, Gesswein O. Sabado","doi":"10.13005/ojcst12.03.04","DOIUrl":"https://doi.org/10.13005/ojcst12.03.04","url":null,"abstract":"E-learning system is designed to aid students build their comprehension towards their respected academic subjects to make their experience in learning more nourishing and engaging. The researchers decided to conduct this study to be au fait the benefits of online education and how the students accept the change this innovation gave. A survey questionnaire was distributed to the enrolled college students of AMA Computer College Year 2018-2019 to make the research more reliable, accurate and at the same time tackle the benefits of the said innovated education system. The said research was a success in defining what helps the students in their education as well as the improvement it can do in terms of catering different subjects and assessing the learners’ competency. The researchers recommend the future researchers to further expand and elaborate the topic in order to enhance the study. To further extend the scope and distribute further information regarding the tackled study.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyber attacks have become quite common in this internet era. The cybercrimes are getting increased every year and the intensity of damage is also increasing. providing security against cyber-attacks becomes the most significant in this digital world. However, ensuring cyber security is an extremely intricate task as requires domain knowledge about the attacks and capability of analysing the possibility of threats. The main challenge of cybersecurity is the evolving nature of the attacks. This paper presents the significance of cyber security along with the various risks that are in the current digital era. The analysis made for cyber-attacks and their statistics shows the intensity of the attacks. Various cybersecurity threats are presented along with the machine learning algorithms that can be applied to cyber attacks detection. The need for the fifth generation cybersecurity architecture is discussed.
{"title":"A Review on Cyber Security and the Fifth Generation Cyberattacks","authors":"A. Saravanan, S. Bama","doi":"10.13005/OJCST12.02.04","DOIUrl":"https://doi.org/10.13005/OJCST12.02.04","url":null,"abstract":"Cyber attacks have become quite common in this internet era. The cybercrimes are getting increased every year and the intensity of damage is also increasing. providing security against cyber-attacks becomes the most significant in this digital world. However, ensuring cyber security is an extremely intricate task as requires domain knowledge about the attacks and capability of analysing the possibility of threats. The main challenge of cybersecurity is the evolving nature of the attacks. This paper presents the significance of cyber security along with the various risks that are in the current digital era. The analysis made for cyber-attacks and their statistics shows the intensity of the attacks. Various cybersecurity threats are presented along with the machine learning algorithms that can be applied to cyber attacks detection. The need for the fifth generation cybersecurity architecture is discussed.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117201555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edge Computing (EC) is an emerging technology that has made it possible to process the large volume of data generated by devices connected to the Internet, through the Internet of objects (IO). The article provides an introduction to EC and its definition. The integration of EC in those contexts would imply an optimisation of the processes that are normally executed in a cloud computing environment, bringing considerable advantages. The main contribution of EC is a better pre-processing of the data collected through devices before they are sent to a central server or the cloud.
{"title":"An Edge Computing Tutorial","authors":"Inés Sittón-Candanedo, J. Corchado","doi":"10.13005/OJCST12.02.02","DOIUrl":"https://doi.org/10.13005/OJCST12.02.02","url":null,"abstract":"Edge Computing (EC) is an emerging technology that has made it possible to process the large volume of data generated by devices connected to the Internet, through the Internet of objects (IO). The article provides an introduction to EC and its definition. The integration of EC in those contexts would imply an optimisation of the processes that are normally executed in a cloud computing environment, bringing considerable advantages. The main contribution of EC is a better pre-processing of the data collected through devices before they are sent to a central server or the cloud.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In food processing industry, there arises a need to control a conveyor belt. currently industries are very necessary to use material handling system for to move materials from one place to another place continuously and to minimize operations time. Stepper Motor is suitable for controlling conveyor because of its high accuracy positioning over a short distance and provide high torque even at low speeds and it is also offer very low vibration and a wide range of features. This paper is focused on controlling the speed of the conveyor belt through the speed of stepper motor using the micro processor namely, Raspberry Pi 3B+’s (RP 3B+) GPIOs (General Purpose Input Output) and it can be generate sequence of control signals on the GPIO pins of RP 3B+. Interfacing the stepper motor with RP 3B+ using python programming language. The method is explained with the results of changing the weights the speed level is reduced through time variation on the conveyor belt and the model of working Conveyor belt with Stepper motor controlled by python and RP 3B+ with Easy Driver(A3967).
{"title":"Controlling the Speed of Conveyor Belt using Python – Raspberry Pi 3B+","authors":"M. Kamalakannan, K. Devadharshini","doi":"10.13005/OJCST12.02.05","DOIUrl":"https://doi.org/10.13005/OJCST12.02.05","url":null,"abstract":"In food processing industry, there arises a need to control a conveyor belt. currently industries are very necessary to use material handling system for to move materials from one place to another place continuously and to minimize operations time. Stepper Motor is suitable for controlling conveyor because of its high accuracy positioning over a short distance and provide high torque even at low speeds and it is also offer very low vibration and a wide range of features. This paper is focused on controlling the speed of the conveyor belt through the speed of stepper motor using the micro processor namely, Raspberry Pi 3B+’s (RP 3B+) GPIOs (General Purpose Input Output) and it can be generate sequence of control signals on the GPIO pins of RP 3B+. Interfacing the stepper motor with RP 3B+ using python programming language. The method is explained with the results of changing the weights the speed level is reduced through time variation on the conveyor belt and the model of working Conveyor belt with Stepper motor controlled by python and RP 3B+ with Easy Driver(A3967).","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"50 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Investing in information technology is a requirement for enterprises to sustain their competitive advantage in a market that is described as changing and global. IT is a very important resource for enterprises to improve their organizational performance, but requires some justification for its costs and burdens. This study utilized an existing model and applied it on a case in Jordan by analyzing and exploring the implications of investing in IT projects. The case used is the Japan Tobacco International, where a survey was used to collect response from JTI personnel and the documents available on their portal. Two models are proposed to improve our understanding of topic and set the stage for future research. The detailed results of this study are reported with conclusions at the end.
{"title":"Justifying IT Investment: Extension of a Model using a Case Study from Jordan","authors":"E. Abu-Shanab, Qais Hammouri, Mai Al-Sebae","doi":"10.13005/OJCST12.02.03","DOIUrl":"https://doi.org/10.13005/OJCST12.02.03","url":null,"abstract":"Investing in information technology is a requirement for enterprises to sustain their competitive advantage in a market that is described as changing and global. IT is a very important resource for enterprises to improve their organizational performance, but requires some justification for its costs and burdens. This study utilized an existing model and applied it on a case in Jordan by analyzing and exploring the implications of investing in IT projects. The case used is the Japan Tobacco International, where a survey was used to collect response from JTI personnel and the documents available on their portal. Two models are proposed to improve our understanding of topic and set the stage for future research. The detailed results of this study are reported with conclusions at the end.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}