Pub Date : 2023-01-01DOI: 10.12677/sea.2023.123051
小双 杜
{"title":"Deep Learning-Based Semantic Feature Point Extraction and Matching Algorithm","authors":"小双 杜","doi":"10.12677/sea.2023.123051","DOIUrl":"https://doi.org/10.12677/sea.2023.123051","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79672703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.123053
惠敏 郑
SM9 is the first identity cryptographic algorithm in China whose whole system is included in the ISO/IEC standard, and FALCON is the winner of the NIST post-quantum competition. The protocol identifies the message sender by verifying the validity of the FALCON signature, guarantees the confidentiality of the shared 256-bit secret data string based on the SM9 public key encryption al-gorithm, and generates a fixed-length shared session key using the random data string generated by both parties and the identification information of both parties through a key derivation function. The security of the protocol is proved by combining BAN logic and non-formal analysis me-郑惠敏
{"title":"Design of Key Exchange Protocol Based on SM9 and FALCON","authors":"惠敏 郑","doi":"10.12677/sea.2023.123053","DOIUrl":"https://doi.org/10.12677/sea.2023.123053","url":null,"abstract":"SM9 is the first identity cryptographic algorithm in China whose whole system is included in the ISO/IEC standard, and FALCON is the winner of the NIST post-quantum competition. The protocol identifies the message sender by verifying the validity of the FALCON signature, guarantees the confidentiality of the shared 256-bit secret data string based on the SM9 public key encryption al-gorithm, and generates a fixed-length shared session key using the random data string generated by both parties and the identification information of both parties through a key derivation function. The security of the protocol is proved by combining BAN logic and non-formal analysis me-郑惠敏","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85984604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.121009
博娜 李
{"title":"A Review of ORB-SLAM Algorithm","authors":"博娜 李","doi":"10.12677/sea.2023.121009","DOIUrl":"https://doi.org/10.12677/sea.2023.121009","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"116 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89321870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.4236/jsea.2023.169023
Maria C. Gómez-Fuentes, Jorge Cervantes-Ojeda, Alan Badillo-Salas
The User Interface Transition Diagram (UITD) is a formal modeling notation that simplifies the specification and design of user-system interactions. It is a valuable communication tool for technical and non-technical stakeholders during the requirements elicitation phase, as it provides a simple yet technically complete notation that is easy to understand. In this paper, we investigated the efficiency of creating UITDs using draw.io, a widely used diagramming software, compared to a dedicated UITD editor. We conducted a study to compare the time required to use each tool to complete the task of creating a medium size UITD, as well as the subjective ease of use and satisfaction of participants with the dedicated Editor. Our results show that the UITD editor is more efficient and preferred by participants, highlighting the importance of using specialized tools for creating formal models such as UITDs. The findings of this study have implications for software developers, designers, and other stakeholders involved in the specification and design of user-system interactions.
{"title":"The User Interfaces Transition Diagram-Editor: A Tool to Simplify User-System Interaction Modeling","authors":"Maria C. Gómez-Fuentes, Jorge Cervantes-Ojeda, Alan Badillo-Salas","doi":"10.4236/jsea.2023.169023","DOIUrl":"https://doi.org/10.4236/jsea.2023.169023","url":null,"abstract":"The User Interface Transition Diagram (UITD) is a formal modeling notation that simplifies the specification and design of user-system interactions. It is a valuable communication tool for technical and non-technical stakeholders during the requirements elicitation phase, as it provides a simple yet technically complete notation that is easy to understand. In this paper, we investigated the efficiency of creating UITDs using draw.io, a widely used diagramming software, compared to a dedicated UITD editor. We conducted a study to compare the time required to use each tool to complete the task of creating a medium size UITD, as well as the subjective ease of use and satisfaction of participants with the dedicated Editor. Our results show that the UITD editor is more efficient and preferred by participants, highlighting the importance of using specialized tools for creating formal models such as UITDs. The findings of this study have implications for software developers, designers, and other stakeholders involved in the specification and design of user-system interactions.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"628 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.123044
新晨 蒯
{"title":"Super-Resolution Reconstruction of Face Images Based on GAN and Transformer","authors":"新晨 蒯","doi":"10.12677/sea.2023.123044","DOIUrl":"https://doi.org/10.12677/sea.2023.123044","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"13 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72631740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.124059
海勇 王
Deep face recognition greatly improves the performance of face recognition by training convolutional neural networks on large-scale data sets to obtain more robust face representation. This paper summarizes the development of depth face recognition methods. First, the existing depth face recognition methods are reviewed according to the different development stages of convolutional neural networks. Secondly, the loss functions based on Euclidean distance and angular co-sine margin are reviewed, and some task-specific face recognition methods are summarized. Then, the existing data sets and the evaluation indicators of face recognition performance are summarized, and the mainstream depth face recognition methods are compared. Finally, the current challenges and future trends of face recognition are summarized.
{"title":"A Survey of Deep Face Recognition","authors":"海勇 王","doi":"10.12677/sea.2023.124059","DOIUrl":"https://doi.org/10.12677/sea.2023.124059","url":null,"abstract":"Deep face recognition greatly improves the performance of face recognition by training convolutional neural networks on large-scale data sets to obtain more robust face representation. This paper summarizes the development of depth face recognition methods. First, the existing depth face recognition methods are reviewed according to the different development stages of convolutional neural networks. Secondly, the loss functions based on Euclidean distance and angular co-sine margin are reviewed, and some task-specific face recognition methods are summarized. Then, the existing data sets and the evaluation indicators of face recognition performance are summarized, and the mainstream depth face recognition methods are compared. Finally, the current challenges and future trends of face recognition are summarized.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78832257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122033
清波 邵
{"title":"Research on Community-Based Intelligent Recommendation Algorithm Based on Real Community Comprehensive Factors","authors":"清波 邵","doi":"10.12677/sea.2023.122033","DOIUrl":"https://doi.org/10.12677/sea.2023.122033","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82098551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.121011
子昇 王
{"title":"Vehicle Recognition Based on Deep Learning Fusion Panoramic Shooting Technology","authors":"子昇 王","doi":"10.12677/sea.2023.121011","DOIUrl":"https://doi.org/10.12677/sea.2023.121011","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87380552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.122031
智超 宋
{"title":"Remote Sensing Image Object Detection Algorithm Based on Multi-Scale Feature Enhancement","authors":"智超 宋","doi":"10.12677/sea.2023.122031","DOIUrl":"https://doi.org/10.12677/sea.2023.122031","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91115860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12677/sea.2023.123055
前齐 张
With the rapid development of the integrated network of sky and earth, traditional routing architectures can no longer meet the demands of modern multi-service transmission. Problems such as inter-satellite link congestion and uneven traffic distribution exist in the integrated network of sky and earth. In order to provide users with fast, efficient, and reliable path transmission services to meet the demands of multi-service transmission
{"title":"Design of Routing Architecture for Integrated Network of Sky and Earth","authors":"前齐 张","doi":"10.12677/sea.2023.123055","DOIUrl":"https://doi.org/10.12677/sea.2023.123055","url":null,"abstract":"With the rapid development of the integrated network of sky and earth, traditional routing architectures can no longer meet the demands of modern multi-service transmission. Problems such as inter-satellite link congestion and uneven traffic distribution exist in the integrated network of sky and earth. In order to provide users with fast, efficient, and reliable path transmission services to meet the demands of multi-service transmission","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81097842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}