首页 > 最新文献

International Journal of Computers and Applications最新文献

英文 中文
Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset 让人脸识别适应蒙面世界:利用定制数据集的深度注意力网络
Q2 Computer Science Pub Date : 2024-03-13 DOI: 10.1080/1206212x.2024.2328499
Himani Trivedi, Mahesh Goyani
{"title":"Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset","authors":"Himani Trivedi, Mahesh Goyani","doi":"10.1080/1206212x.2024.2328499","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328499","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2019 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140246109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel LDVP-based anomaly detection method for data streams 基于 LDVP 的新型数据流异常检测方法
Q2 Computer Science Pub Date : 2024-03-11 DOI: 10.1080/1206212x.2024.2323266
Xiaohan Yu, Haixia Wang, Keming Dong, Chao Chen
{"title":"A novel LDVP-based anomaly detection method for data streams","authors":"Xiaohan Yu, Haixia Wang, Keming Dong, Chao Chen","doi":"10.1080/1206212x.2024.2323266","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2323266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"4 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140252478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things 确保工业运营的未来:工业物联网数字双胞胎的区块链增强信任机制
Q2 Computer Science Pub Date : 2024-03-05 DOI: 10.1080/1206212x.2024.2318821
Chun Huang, Shudan Liu
{"title":"Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things","authors":"Chun Huang, Shudan Liu","doi":"10.1080/1206212x.2024.2318821","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2318821","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"221 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved task scheduling algorithm for conflict resolution in cloud environment 云环境中解决冲突的改进型任务调度算法
Q2 Computer Science Pub Date : 2024-01-09 DOI: 10.1080/1206212x.2023.2301266
Abhishek Goyal, Rakesh Garg, K. Bhatia
{"title":"An improved task scheduling algorithm for conflict resolution in cloud environment","authors":"Abhishek Goyal, Rakesh Garg, K. Bhatia","doi":"10.1080/1206212x.2023.2301266","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"29 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A biological-like synthesis framework for software engineering environments 软件工程环境的类生物合成框架
Q2 Computer Science Pub Date : 2024-01-09 DOI: 10.1080/1206212x.2023.2301183
Peraphon Sophatsathit
Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.
背景:软件架构由许多包含自身架构的人工制品组成。这些架构在软件生命周期中不断演变。有些会被新版本取代,有些则会被淘汰和废弃。无论如何,它们都存在复杂性和互操作性问题。与此相反,人体是一个自然奇观,可以无缝、智能地运行。通过模仿单细胞生命形式的生物学和人体的构建模块或 DNA,本说明书将提供一个独立于其工作环境的自主软件系统。方法在本文中,我们提出了一种仿生物架构的软件系统(BASS),它模仿了单细胞生命体的简单性。其基本结构由固定大小的组件组成,这些组件的属性和操作排列在类似 DNA 字符串的一维数组中。这样就可以在没有外部支持的情况下自行执行。由于单细胞生命体的生命周期较短,因此组件的生命周期也分为三个阶段,即创建、维持和终止,必须在预定的生命周期(TTL)限制内完成。在此期间,一个新的组件会被克隆,以替代原地停止运行的组件。由于没有可比的体系结构来对所提出的新型体系结构进行基准测试,因此我们对其进行了模拟,以衡量 BASS 的性能统计。结果:特意规划了固定大小、直接访问和线性排列(如 DNA 字符串)的组合,以倡导硬件实施。结果表明,凭借这种组织和原位替换方案,内存占用率仍然相对较低。结论:所提出的软件架构是一个自主系统,可作为一个高效的可移植环境,并能大大降低软件系统的资源利用率。
{"title":"A biological-like synthesis framework for software engineering environments","authors":"Peraphon Sophatsathit","doi":"10.1080/1206212x.2023.2301183","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301183","url":null,"abstract":"Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"30 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module 基于群白化残差 ConvNet 和大核子空间注意模块的进化神经架构搜索
Q2 Computer Science Pub Date : 2024-01-05 DOI: 10.1080/1206212x.2023.2300221
Yang Xu, Yongjie Ma
{"title":"Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module","authors":"Yang Xu, Yongjie Ma","doi":"10.1080/1206212x.2023.2300221","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2300221","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on recent driver safety systems and its emerging solutions 近期驾驶员安全系统及其新兴解决方案综述
Q2 Computer Science Pub Date : 2024-01-05 DOI: 10.1080/1206212x.2023.2293348
Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian
{"title":"A review on recent driver safety systems and its emerging solutions","authors":"Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian","doi":"10.1080/1206212x.2023.2293348","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2293348","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"18 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139382909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure authenticated image encryption scheme based on elliptic curve cryptography 基于椭圆曲线加密法的安全认证图像加密方案
Q2 Computer Science Pub Date : 2023-12-30 DOI: 10.1080/1206212x.2023.2299575
Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev
{"title":"A secure authenticated image encryption scheme based on elliptic curve cryptography","authors":"Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev","doi":"10.1080/1206212x.2023.2299575","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2299575","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems 用于超载实时系统调度的高效加权部分 MaxSAT 编码
Q2 Computer Science Pub Date : 2023-12-23 DOI: 10.1080/1206212x.2023.2297478
Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani
{"title":"An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems","authors":"Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani","doi":"10.1080/1206212x.2023.2297478","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2297478","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139161175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms 利用无人机群中的深度 Q 网络动态调整争用窗口边界
Q2 Computer Science Pub Date : 2023-12-21 DOI: 10.1080/1206212x.2023.2296720
Neethu Subash, B. Nithya
{"title":"Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms","authors":"Neethu Subash, B. Nithya","doi":"10.1080/1206212x.2023.2296720","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2296720","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computers and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1