首页 > 最新文献

International Journal of Computers and Applications最新文献

英文 中文
Why do some IT freelancers in certain countries prefer digital payment with cryptocurrency despite it being illegal? 为什么某些国家的一些IT自由职业者更喜欢使用加密货币进行数字支付,尽管这是非法的?
Q2 Computer Science Pub Date : 2023-04-03 DOI: 10.1080/1206212X.2023.2193778
A. Pathan
The legal status of cryptocurrency varies from country to country. The intent of this article is to investigate the key reasons behind some IT Freelancers’ preference of getting their remuneration via digital transactions of cryptocurrency even though by law, it is illegal in their country. We also explore the unique characteristics of cryptocurrency that make it distinct from e-cash and other types of currencies.
加密货币的法律地位因国家而异。本文的目的是调查一些IT自由职业者倾向于通过加密货币的数字交易获得报酬的关键原因,尽管根据法律,这在他们的国家是非法的。我们还探讨了加密货币的独特特征,使其区别于电子现金和其他类型的货币。
{"title":"Why do some IT freelancers in certain countries prefer digital payment with cryptocurrency despite it being illegal?","authors":"A. Pathan","doi":"10.1080/1206212X.2023.2193778","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2193778","url":null,"abstract":"The legal status of cryptocurrency varies from country to country. The intent of this article is to investigate the key reasons behind some IT Freelancers’ preference of getting their remuneration via digital transactions of cryptocurrency even though by law, it is illegal in their country. We also explore the unique characteristics of cryptocurrency that make it distinct from e-cash and other types of currencies.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 1","pages":"285 - 287"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76242936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications 一种高效的基于完整性的多用户区块链框架,用于异构供应链管理应用
Q2 Computer Science Pub Date : 2023-04-03 DOI: 10.1080/1206212X.2023.2199966
Mani Deep Karumanchi, J. I. Sheeba, S. Devaneyan
Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.
传统的基于云的应用程序大多不安全,难以在异构供应链数据集上计算变量哈希大小的数据完整性。此外,由于结构化数据和计算内存,云存储系统独立于完整性计算和数据安全。随着云数据文件在公有云和私有云服务器上的规模越来越大,由于文件格式和高维,难以提供强大的数据安全性。在传统的区块链框架中,传统的基于属性的加解密模型在数据完整性验证过程中计算时间和存储空间都很高。本文在异构云供应链数据文件上实现了一种混合变大小数据完整性算法,用于强数据加解密过程。本工作使用先进的异构完整性计算方法和基于完整性策略的属性加解密方法实现了优化的区块链框架,以提高云数据的安全性。实验结果表明,在云异构数据类型上,本文提出的基于完整性的加密模型比传统的基于完整性的加密框架具有更高的效率。
{"title":"An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications","authors":"Mani Deep Karumanchi, J. I. Sheeba, S. Devaneyan","doi":"10.1080/1206212X.2023.2199966","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2199966","url":null,"abstract":"Most of the traditional cloud-based applications are insecure and difficult to compute the data integrity with variable hash size on heterogeneous supply chain datasets. Also, cloud storage systems are independent of integrity computational and data security due to structured data and computational memory. As the size of the cloud data files is increasing in the public and private cloud servers, it is difficult to provide strong data security due to file format and high dimensionality. The computational time and storage space of the conventional attribute-based encryption and decryption models are high during the data integrity verification in the traditional blockchain frameworks. This paper implements a hybrid variable size data integrity algorithm on the heterogeneous cloud supply chain data files for the strong data encryption and decryption process. This work implements an optimized blockchain framework using the advanced heterogeneous integrity computation approach and integrity policy-based attribute encryption and decryption approach for better cloud data security. Experimental results proved that the proposed integrity-based encryption model has better efficiency than the traditional integrity-based encryption frameworks on cloud heterogeneous data types.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"19 1","pages":"337 - 351"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82732058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient deep learning-based approach for human activity recognition using smartphone inertial sensors 一种基于深度学习的智能手机惯性传感器人体活动识别方法
Q2 Computer Science Pub Date : 2023-04-03 DOI: 10.1080/1206212X.2023.2198785
R. Djemili, Merouane Zamouche
Human activity recognition (HAR) has recently witnessed outstanding growth in health and entertainment applications. Owing to the availability of smartphones, many new methods and protocols for using the data from smartphones’ embedded sensors are emerging. Nonetheless, the methods carried out and published in the literature leave a wide area for improvement, in terms of accuracy, resource economy, and adaptation to real-world nuisances. On top of that, a novel classification method that is more economical and efficient is proposed in this paper using both 1D convolutional neural network (1D-CNN) parameters and handcrafted temporal and frequency features with the proficiency of a multilayer perceptron neural network (MLP) classifier. The method proposed requires only tri-axial accelerometer data, allowing it to be deployed even into lower equipment devices; it was tested within the two well-known benchmark datasets: UCI-HAR and Uni-MIB SHAR. Experimental results yield a classification accuracy exceeding 99%, outperforming many of the methods recently shown in the literature.
人类活动识别(HAR)最近在健康和娱乐应用中取得了显著的增长。由于智能手机的可用性,许多使用智能手机嵌入式传感器数据的新方法和协议正在出现。尽管如此,在准确性、资源经济性和对现实世界滋扰的适应性方面,文献中实施和发表的方法仍有很大的改进空间。在此基础上,利用一维卷积神经网络(1D- cnn)参数和多层感知器神经网络(MLP)分类器的熟练程度,手工制作时间和频率特征,提出了一种更经济高效的分类方法。所提出的方法只需要三轴加速度计数据,甚至可以部署到较低的设备设备中;它在两个著名的基准数据集中进行了测试:UCI-HAR和Uni-MIB SHAR。实验结果产生的分类精度超过99%,优于最近在文献中显示的许多方法。
{"title":"An efficient deep learning-based approach for human activity recognition using smartphone inertial sensors","authors":"R. Djemili, Merouane Zamouche","doi":"10.1080/1206212X.2023.2198785","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2198785","url":null,"abstract":"Human activity recognition (HAR) has recently witnessed outstanding growth in health and entertainment applications. Owing to the availability of smartphones, many new methods and protocols for using the data from smartphones’ embedded sensors are emerging. Nonetheless, the methods carried out and published in the literature leave a wide area for improvement, in terms of accuracy, resource economy, and adaptation to real-world nuisances. On top of that, a novel classification method that is more economical and efficient is proposed in this paper using both 1D convolutional neural network (1D-CNN) parameters and handcrafted temporal and frequency features with the proficiency of a multilayer perceptron neural network (MLP) classifier. The method proposed requires only tri-axial accelerometer data, allowing it to be deployed even into lower equipment devices; it was tested within the two well-known benchmark datasets: UCI-HAR and Uni-MIB SHAR. Experimental results yield a classification accuracy exceeding 99%, outperforming many of the methods recently shown in the literature.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"5 1","pages":"323 - 336"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89218452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain 基于多小波域Arnold变换和混沌理论的图像加密算法
Q2 Computer Science Pub Date : 2023-04-03 DOI: 10.1080/1206212X.2023.2196902
Ali Akram Abdul-Kareem, W. A. M. Al-Jawher
Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is designed in this paper. In the proposed algorithm, the primary color components of the input image undergo a multi-wave transform before the Arnold Transform confounds the sub-bands of each color component. Each color component is then divided into blocks shuffled in a predetermined order. Finally, the encrypted image is generated using secret keys derived from Nahrain’s and WAM’s chaotic systems. Notably, the initial conditions of the chaotic maps are generated using image data to increase the algorithm’s sensitivity to the input image. Security analyses conducted to validate the practicability of the new algorithm reveal that it possesses excellent encryption efficiency, high key sensitivity, and the ability to withstand a wide variety of attacks.
在开放的公共网络中,图像加密是保证数据传输安全的关键。利用多小波变换、阿诺德变换和两个混沌系统,设计了一种新的彩色图像加密技术。该算法首先对输入图像的原色分量进行多波变换,然后用阿诺德变换混淆每个颜色分量的子带。然后将每种颜色成分按预先确定的顺序分成不同的块。最后,使用从Nahrain和WAM的混沌系统中导出的密钥生成加密图像。值得注意的是,混沌映射的初始条件是使用图像数据生成的,以提高算法对输入图像的灵敏度。为验证新算法的实用性而进行的安全分析表明,它具有出色的加密效率、高密钥灵敏度和承受各种攻击的能力。
{"title":"Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain","authors":"Ali Akram Abdul-Kareem, W. A. M. Al-Jawher","doi":"10.1080/1206212X.2023.2196902","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2196902","url":null,"abstract":"Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is designed in this paper. In the proposed algorithm, the primary color components of the input image undergo a multi-wave transform before the Arnold Transform confounds the sub-bands of each color component. Each color component is then divided into blocks shuffled in a predetermined order. Finally, the encrypted image is generated using secret keys derived from Nahrain’s and WAM’s chaotic systems. Notably, the initial conditions of the chaotic maps are generated using image data to increase the algorithm’s sensitivity to the input image. Security analyses conducted to validate the practicability of the new algorithm reveal that it possesses excellent encryption efficiency, high key sensitivity, and the ability to withstand a wide variety of attacks.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"5 5 1","pages":"306 - 322"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81227166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generative adversarial networks for network traffic feature generation 网络流量特征生成的生成对抗网络
Q2 Computer Science Pub Date : 2023-03-28 DOI: 10.1080/1206212X.2023.2191072
T. J. Anande, Sami Al-Saadi, M. Leeson
Generative Adversarial Networks (GANs) have remained an active area of research, particularly due to their increased and advanced evolving application capabilities. In several domains such as images, facial synthesis, character generation, language processing and multimedia, they have been implemented for advanced tasks. However, there has been more limited progress in network traffic data generation due to the complexities associated with data formats and distributions. This research implements two GAN architectures that include data transforms to simultaneously train and generate categorical and continuous network traffic features. These architectures demonstrate superior performance to the original ‘Vanilla’ GAN approach, which is included as a baseline comparator. Close matches are obtained between logarithms of the means and standard deviations of the fake data and the corresponding quantities from the real data. Moreover, similar principal components are exhibited by the fake and real data streams. Furthermore, some 85% of the features from the fake data could replace those in the real data without detection.
生成对抗网络(GANs)一直是一个活跃的研究领域,特别是由于其不断增加和先进的应用能力。在图像、面部合成、字符生成、语言处理和多媒体等多个领域,它们已被用于高级任务。然而,由于数据格式和分布的复杂性,在网络流量数据生成方面的进展有限。本研究实现了两种GAN架构,其中包括数据转换,以同时训练和生成分类和连续的网络流量特征。这些体系结构比原始的“香草”GAN方法表现出优越的性能,后者被作为基准比较器。假数据的均值和标准差的对数与真实数据的相应数量之间得到了密切的匹配。此外,假数据流和真实数据流也表现出相似的主成分。此外,假数据中约85%的特征可以在不被检测的情况下取代真实数据中的特征。
{"title":"Generative adversarial networks for network traffic feature generation","authors":"T. J. Anande, Sami Al-Saadi, M. Leeson","doi":"10.1080/1206212X.2023.2191072","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2191072","url":null,"abstract":"Generative Adversarial Networks (GANs) have remained an active area of research, particularly due to their increased and advanced evolving application capabilities. In several domains such as images, facial synthesis, character generation, language processing and multimedia, they have been implemented for advanced tasks. However, there has been more limited progress in network traffic data generation due to the complexities associated with data formats and distributions. This research implements two GAN architectures that include data transforms to simultaneously train and generate categorical and continuous network traffic features. These architectures demonstrate superior performance to the original ‘Vanilla’ GAN approach, which is included as a baseline comparator. Close matches are obtained between logarithms of the means and standard deviations of the fake data and the corresponding quantities from the real data. Moreover, similar principal components are exhibited by the fake and real data streams. Furthermore, some 85% of the features from the fake data could replace those in the real data without detection.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"42 1","pages":"297 - 305"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84338647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
YOLOv5-based weapon detection systems with data augmentation 基于数据增强的yolov5武器探测系统
Q2 Computer Science Pub Date : 2023-03-05 DOI: 10.1080/1206212X.2023.2182966
Lucy Sumi, Shouvik Dey
Closed-Circuit Television (CCTV) cameras in public places have become more prominent with the rising firearm-related criminal activities, such as robberies, open firing, threats at gunpoint, etc. Early detection of firearms in surveillance systems is crucial for security and safety concerns. In this paper, we present a You Only Look Once (YOLOv5)-based weapon detection system that detects different types of weapons such as rifles, pistols, knives, etc. The main objective of this work is to show the impact of data augmentation on different types of datasets and make a detailed comparative examination with the existing baseline study and other similar works in the literature. The results give new insights to consider for weapon detection systems and object detection, in general. A crisp taxonomy of the existing state-of-the-art and object detection trends over the past decades is also presented in the paper.
随着抢劫、公开射击、持枪威胁等与枪支有关的犯罪活动的增加,公共场所的闭路电视(CCTV)摄像机变得越来越突出。在监视系统中及早发现枪支对于安保和安全问题至关重要。本文提出了一种基于YOLOv5 (You Only Look Once)的武器检测系统,该系统可以检测步枪、手枪、刀具等不同类型的武器。本工作的主要目的是展示数据增强对不同类型数据集的影响,并与现有基线研究和文献中其他类似工作进行详细的比较检查。总的来说,这些结果为武器探测系统和目标探测提供了新的见解。在过去的几十年里,现有的先进技术和目标检测趋势的一个清晰的分类也在论文中提出。
{"title":"YOLOv5-based weapon detection systems with data augmentation","authors":"Lucy Sumi, Shouvik Dey","doi":"10.1080/1206212X.2023.2182966","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2182966","url":null,"abstract":"Closed-Circuit Television (CCTV) cameras in public places have become more prominent with the rising firearm-related criminal activities, such as robberies, open firing, threats at gunpoint, etc. Early detection of firearms in surveillance systems is crucial for security and safety concerns. In this paper, we present a You Only Look Once (YOLOv5)-based weapon detection system that detects different types of weapons such as rifles, pistols, knives, etc. The main objective of this work is to show the impact of data augmentation on different types of datasets and make a detailed comparative examination with the existing baseline study and other similar works in the literature. The results give new insights to consider for weapon detection systems and object detection, in general. A crisp taxonomy of the existing state-of-the-art and object detection trends over the past decades is also presented in the paper.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"8 1","pages":"288 - 296"},"PeriodicalIF":0.0,"publicationDate":"2023-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88327287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Block SMRT and knapsack optimization-based sequency selector for robust, imperceptible, and payload-efficient color image watermarking for binary watermark 基于块SMRT和背包优化的序列选择器用于二值水印的鲁棒、不易察觉和有效负载高效彩色图像水印
Q2 Computer Science Pub Date : 2023-02-10 DOI: 10.1080/1206212X.2023.2175435
Febina Ikbal, R. Gopikakumari
Watermarking is a generic strategy for overcoming numerous issues associated with multimedia security. Performance of a watermarking system in terms of imperceptibility, robustness and payload is highly dependent on the positions used for embedding. The choice of sequency packets plays an important role in the performance when Sequency-based Mapped Real Transform (SMRT) is used for embedding. A novel sequency selector for robust, imperceptible and payload-efficient color image watermarking of binary watermark is proposed using SMRT and two-level optimization. SMRT of block partitioned Cb channel of cover image is input to sequency selector where results of first-level optimization, based on imperceptibility and robustness, along with payload is optimized using knapsack optimization in the second level. The binary watermark is LSB embedded in SMRT coefficients present in each packet of the optimal combination of sequencies chosen by the sequency selector. Simulation results show better performance compared to existing optimized and non-optimized embedding techniques.
水印是克服与多媒体安全相关的许多问题的通用策略。水印系统在不可感知性、鲁棒性和有效载荷方面的性能高度依赖于嵌入的位置。使用基于序列的映射实变换(SMRT)进行嵌入时,序列包的选择对嵌入的性能有重要影响。提出了一种基于SMRT和两级优化的二值水印鲁棒、不易察觉和有效负载高效的彩色图像水印序列选择器。将覆盖图像分块Cb通道的SMRT输入到序列选择器中,在基于不可感知性和鲁棒性的基础上,利用第二级背包优化对第一级优化结果和有效载荷进行优化。二进制水印是嵌入在SMRT系数中的LSB,该系数存在于由序列选择器选择的最优序列组合的每个数据包中。仿真结果表明,与现有的优化和非优化嵌入技术相比,该方法具有更好的性能。
{"title":"Block SMRT and knapsack optimization-based sequency selector for robust, imperceptible, and payload-efficient color image watermarking for binary watermark","authors":"Febina Ikbal, R. Gopikakumari","doi":"10.1080/1206212X.2023.2175435","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2175435","url":null,"abstract":"Watermarking is a generic strategy for overcoming numerous issues associated with multimedia security. Performance of a watermarking system in terms of imperceptibility, robustness and payload is highly dependent on the positions used for embedding. The choice of sequency packets plays an important role in the performance when Sequency-based Mapped Real Transform (SMRT) is used for embedding. A novel sequency selector for robust, imperceptible and payload-efficient color image watermarking of binary watermark is proposed using SMRT and two-level optimization. SMRT of block partitioned Cb channel of cover image is input to sequency selector where results of first-level optimization, based on imperceptibility and robustness, along with payload is optimized using knapsack optimization in the second level. The binary watermark is LSB embedded in SMRT coefficients present in each packet of the optimal combination of sequencies chosen by the sequency selector. Simulation results show better performance compared to existing optimized and non-optimized embedding techniques.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"49 1","pages":"269 - 283"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87588673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted Article: Based on deep learning in traffic remote sensing image processing to recognize target vehicle 基于深度学习的交通遥感图像处理识别目标车辆
Q2 Computer Science Pub Date : 2023-02-01 DOI: 10.1080/1206212X.2020.1735764
Dan Wang, Kaidi Zhao, Yi Wang
We, the Editor and Publisher of the International Journal of Computers and Applications, have retracted the following article which was part of the Special Issue on Advanced Security Techniques for Cloud Computing and Big Data - New Directions: Dan Wang, Kai Zhao & Yi Wang (2020) Based on deep learning in traffic remote sensing image processing to recognize target vehicle, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2020.1735764 Since publication, it came to our attention that the articles published in this Special Issue were not reviewed fully in line with the journal's peer review standards and policy. We did not find any evidence of misconduct by the authors. However, in order to ensure full assessment has been conducted, we sought expert advice on the validity and quality of the published articles from independent peer reviewers. Following this post publication peer review, the Editor has determined that the articles do not meet the required scholarly standards to remain published in the journal, and therefore has taken the decision to retract. The concerns raised have been shared with the authors and they have been given the opportunity to respond. The authors have been informed about the retraction of the article. We have been informed in our decision-making by our policy on publishing ethics and integrity and the COPE guidelines on retractions. The retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as ‘Retracted’.
作为国际计算机与应用杂志的编辑和出版商,我们撤回了以下文章,该文章是云计算和大数据高级安全技术特刊的一部分-新方向:王丹,赵凯和王毅(2020)基于交通遥感图像处理中的深度学习识别目标车辆,国际计算机与应用杂志,DOI:10.1080/1206212X.2020.1735764自出版以来,我们注意到本刊发表的文章没有完全按照期刊的同行评审标准和政策进行评审。我们没有发现作者行为不端的任何证据。然而,为了确保进行了全面的评估,我们从独立的同行评议人那里就已发表文章的有效性和质量征求了专家意见。经过发表后的同行评议,编辑认为这些文章不符合继续发表在期刊上所需的学术标准,因此决定撤回。所提出的关切已与作者分享,并给予他们作出回应的机会。作者已被告知这篇文章将被撤回。我们的出版道德和诚信政策以及COPE关于撤稿的指导方针已经通知了我们的决策。撤回的文章将保留在网上,以保持学术记录,但它们将在每页上打上数字水印,标记为“撤回”。
{"title":"Retracted Article: Based on deep learning in traffic remote sensing image processing to recognize target vehicle","authors":"Dan Wang, Kaidi Zhao, Yi Wang","doi":"10.1080/1206212X.2020.1735764","DOIUrl":"https://doi.org/10.1080/1206212X.2020.1735764","url":null,"abstract":"We, the Editor and Publisher of the International Journal of Computers and Applications, have retracted the following article which was part of the Special Issue on Advanced Security Techniques for Cloud Computing and Big Data - New Directions: Dan Wang, Kai Zhao & Yi Wang (2020) Based on deep learning in traffic remote sensing image processing to recognize target vehicle, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2020.1735764 Since publication, it came to our attention that the articles published in this Special Issue were not reviewed fully in line with the journal's peer review standards and policy. We did not find any evidence of misconduct by the authors. However, in order to ensure full assessment has been conducted, we sought expert advice on the validity and quality of the published articles from independent peer reviewers. Following this post publication peer review, the Editor has determined that the articles do not meet the required scholarly standards to remain published in the journal, and therefore has taken the decision to retract. The concerns raised have been shared with the authors and they have been given the opportunity to respond. The authors have been informed about the retraction of the article. We have been informed in our decision-making by our policy on publishing ethics and integrity and the COPE guidelines on retractions. The retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as ‘Retracted’.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"113 1","pages":"180 - 186"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73284098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Retracted Article: Collaborative correlation space big data clustering algorithm for abnormal flow monitoring 异常流量监测的协同关联空间大数据聚类算法
Q2 Computer Science Pub Date : 2023-02-01 DOI: 10.1080/1206212X.2020.1727659
Ting Fu, Hong Chen, Fei Wu, Yuxin Su, L. Zhuang
The big data clustering process is a random nonlinear process with high uncertainty. Because traditional methods require prior knowledge to learn, they cannot adapt well to the real-time changes of big data, and cannot effectively achieve big data clustering. A good clustering structure can reduce redundancy, optimize network resource configuration, and reduce node overhead and balance the network. The collaborative correlation space is a powerful tool that will simulate the model to form a spatial analysis and process simulation. Therefore, in order to improve the fast processing and recognition ability of big data, a collaborative correlation spatial big data oriented to clustering network is proposed. Simulation experiments show that using this algorithm for big data clustering can effectively improve the data clustering efficiency, reduce energy consumption, has better anti-interference and adaptability, and has higher clustering accuracy. In the flow anomalydetectionexperiment,resultsshowthatthemethodproposedinthispaperhashighertrafficanomaly identificationaccuracythank-meansanddecisiontreealgorithm,andtherecallrateandROCareaarethelargest.
大数据聚类过程是一个具有高度不确定性的随机非线性过程。由于传统方法需要先验知识来学习,不能很好地适应大数据的实时变化,不能有效地实现大数据聚类。良好的集群结构可以减少冗余,优化网络资源配置,减少节点开销,实现网络均衡。协同关联空间是模拟模型形成空间分析和过程仿真的有力工具。为此,为了提高大数据的快速处理和识别能力,提出了一种面向聚类网络的协同关联空间大数据。仿真实验表明,将该算法用于大数据聚类,可以有效提高数据聚类效率,降低能耗,具有较好的抗干扰性和适应性,具有较高的聚类精度。在流量异常检测实验中,结果表明本文提出的方法比均值和决策树算法具有更高的流量异常识别精度,且调用率最大。
{"title":"Retracted Article: Collaborative correlation space big data clustering algorithm for abnormal flow monitoring","authors":"Ting Fu, Hong Chen, Fei Wu, Yuxin Su, L. Zhuang","doi":"10.1080/1206212X.2020.1727659","DOIUrl":"https://doi.org/10.1080/1206212X.2020.1727659","url":null,"abstract":"The big data clustering process is a random nonlinear process with high uncertainty. Because traditional methods require prior knowledge to learn, they cannot adapt well to the real-time changes of big data, and cannot effectively achieve big data clustering. A good clustering structure can reduce redundancy, optimize network resource configuration, and reduce node overhead and balance the network. The collaborative correlation space is a powerful tool that will simulate the model to form a spatial analysis and process simulation. Therefore, in order to improve the fast processing and recognition ability of big data, a collaborative correlation spatial big data oriented to clustering network is proposed. Simulation experiments show that using this algorithm for big data clustering can effectively improve the data clustering efficiency, reduce energy consumption, has better anti-interference and adaptability, and has higher clustering accuracy. In the flow anomalydetectionexperiment,resultsshowthatthemethodproposedinthispaperhashighertrafficanomaly identificationaccuracythank-meansanddecisiontreealgorithm,andtherecallrateandROCareaarethelargest.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"50 1","pages":"136 - 143"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86345459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted Article: A wireless network remote monitoring method driven by artificial intelligence 一种由人工智能驱动的无线网络远程监控方法
Q2 Computer Science Pub Date : 2023-02-01 DOI: 10.1080/1206212X.2019.1710664
Lei Zhao, H. Yu
We, the Editor and Publisher of the International Journal of Computers and Applications, have retracted the following article which was part of the Special Issue on Advanced Security Techniques for Cloud Computing and Big Data - New Directions: Lei Zhao & Huang Yu (2020) A wireless network remote monitoring method driven by artificial intelligence, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2019.1710664 Since publication, it came to our attention that the articles published in this Special Issue were not reviewed fully in line with the journal's peer review standards and policy. We did not find any evidence of misconduct by the authors. However, in order to ensure full assessment has been conducted, we sought expert advice on the validity and quality of the published articles from independent peer reviewers. Following this post publication peer review, the Editor has determined that the articles do not meet the required scholarly standards to remain published in the journal, and therefore has taken the decision to retract. The concerns raised have been shared with the authors and they have been given the opportunity to respond. The authors have been informed about the retraction of the article.   We have been informed in our decision-making by our policy on publishing ethics and integrity and the COPE guidelines on retractions. The retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as ‘Retracted’.
我们,国际计算机与应用杂志的编辑和出版商,已经撤回了以下文章,这是云计算和大数据高级安全技术特刊的一部分-新方向:赵磊和黄宇(2020)人工智能驱动的无线网络远程监控方法,国际计算机与应用杂志,DOI:10.1080/1206212X.2019.1710664自出版以来,我们注意到本刊发表的文章没有完全按照期刊的同行评审标准和政策进行评审。我们没有发现作者行为不端的任何证据。然而,为了确保进行了全面的评估,我们从独立的同行评议人那里就已发表文章的有效性和质量征求了专家意见。经过发表后的同行评议,编辑认为这些文章不符合继续发表在期刊上所需的学术标准,因此决定撤回。所提出的关切已与作者分享,并给予他们作出回应的机会。作者已被告知这篇文章将被撤回。  我们的出版道德和诚信政策以及COPE关于撤稿的指导方针已经通知了我们的决策。撤回的文章将保留在网上,以保持学术记录,但它们将在每页上打上数字水印,标记为“撤回”。
{"title":"Retracted Article: A wireless network remote monitoring method driven by artificial intelligence","authors":"Lei Zhao, H. Yu","doi":"10.1080/1206212X.2019.1710664","DOIUrl":"https://doi.org/10.1080/1206212X.2019.1710664","url":null,"abstract":"We, the Editor and Publisher of the International Journal of Computers and Applications, have retracted the following article which was part of the Special Issue on Advanced Security Techniques for Cloud Computing and Big Data - New Directions: Lei Zhao & Huang Yu (2020) A wireless network remote monitoring method driven by artificial intelligence, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2019.1710664 Since publication, it came to our attention that the articles published in this Special Issue were not reviewed fully in line with the journal's peer review standards and policy. We did not find any evidence of misconduct by the authors. However, in order to ensure full assessment has been conducted, we sought expert advice on the validity and quality of the published articles from independent peer reviewers. Following this post publication peer review, the Editor has determined that the articles do not meet the required scholarly standards to remain published in the journal, and therefore has taken the decision to retract. The concerns raised have been shared with the authors and they have been given the opportunity to respond. The authors have been informed about the retraction of the article.   We have been informed in our decision-making by our policy on publishing ethics and integrity and the COPE guidelines on retractions. The retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as ‘Retracted’.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"30 1","pages":"115 - 123"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80738763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computers and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1