Pub Date : 2023-01-01DOI: 10.12677/sea.2023.121006
晶晶 徐
{"title":"Research Progress in Gait Correction Rehabilitation Technology","authors":"晶晶 徐","doi":"10.12677/sea.2023.121006","DOIUrl":"https://doi.org/10.12677/sea.2023.121006","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73678983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.121014
伟 汪
{"title":"Dual-Channel Classification Model for Fine-Grained Sentiment Classification Task","authors":"伟 汪","doi":"10.12677/sea.2023.121014","DOIUrl":"https://doi.org/10.12677/sea.2023.121014","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74742873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122019
博 韩
{"title":"Facial Expression Recognition Algorithm Based on Convolutional Neural Network","authors":"博 韩","doi":"10.12677/sea.2023.122019","DOIUrl":"https://doi.org/10.12677/sea.2023.122019","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74747644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.124057
冬梅 王
Wireless Sensor Networks (WSNs) are usually powered by batteries
{"title":"Research on High-Precision Prediction Algorithm and Clustering Routing for WSN","authors":"冬梅 王","doi":"10.12677/sea.2023.124057","DOIUrl":"https://doi.org/10.12677/sea.2023.124057","url":null,"abstract":"Wireless Sensor Networks (WSNs) are usually powered by batteries","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75818187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.123052
轲 司
Reinforcement learning is applied as a model free control method to solve the problem of co channel interference in cellular networks. However, in value based reinforcement learning algorithms, error in function approximation leads to overestimation of the Q value, which leads to the algorithm converging to a suboptimal strategy and poor performance in suppressing channel interference, and the convergence speed is slow in high-frequency scenarios. This paper proposes a control method suitable for distributed deployment, which uses DDQN to learn discrete strategies, and adds a delay-depth deterministic strategy gradient algorithm with a triplet criticism mechan-司轲,李烨
{"title":"Research on Power Control Algorithm Based on Distributed Reinforcement Learning","authors":"轲 司","doi":"10.12677/sea.2023.123052","DOIUrl":"https://doi.org/10.12677/sea.2023.123052","url":null,"abstract":"Reinforcement learning is applied as a model free control method to solve the problem of co channel interference in cellular networks. However, in value based reinforcement learning algorithms, error in function approximation leads to overestimation of the Q value, which leads to the algorithm converging to a suboptimal strategy and poor performance in suppressing channel interference, and the convergence speed is slow in high-frequency scenarios. This paper proposes a control method suitable for distributed deployment, which uses DDQN to learn discrete strategies, and adds a delay-depth deterministic strategy gradient algorithm with a triplet criticism mechan-司轲,李烨","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"127 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75113483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.4236/jsea.2023.1610028
Robb Shawe, Ian R. McAndrew
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity.
{"title":"Cybersecurity and Domestic Terrorism: Purpose and Future","authors":"Robb Shawe, Ian R. McAndrew","doi":"10.4236/jsea.2023.1610028","DOIUrl":"https://doi.org/10.4236/jsea.2023.1610028","url":null,"abstract":"The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135260785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122036
坤 徐
{"title":"BP Decoding Algorithm Based on Ensemble Learning","authors":"坤 徐","doi":"10.12677/sea.2023.122036","DOIUrl":"https://doi.org/10.12677/sea.2023.122036","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83925164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.121012
学雷 黄
{"title":"Recognition of Illegal Pet Walking Based on YOLO Feature Detection Model","authors":"学雷 黄","doi":"10.12677/sea.2023.121012","DOIUrl":"https://doi.org/10.12677/sea.2023.121012","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76323827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122032
焱兵 胡
{"title":"An Early Warning Method for Resource Monitoring of Edge Service System","authors":"焱兵 胡","doi":"10.12677/sea.2023.122032","DOIUrl":"https://doi.org/10.12677/sea.2023.122032","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"309 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76092250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122021
杨 徐
{"title":"Two-Dimensional Imaging System Based on 77 GHz Inverse Synthetic Aperture Radar","authors":"杨 徐","doi":"10.12677/sea.2023.122021","DOIUrl":"https://doi.org/10.12677/sea.2023.122021","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"199 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75963044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}