科学与信息组织
期刊
会议
图书
作者:Youn Kyu Lee
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Event-based system (EBS) has become popular because of its high flexibility, scalability, and adaptability. These advantages are enabled by its communication mechanism—implicit invocation and implicit concurrency between components. The communication mechanism is based on no...
作者:Hassan Awad Hassan Al-Sukhni , Azuan Bin Ahmad , Madihah Mohd Saudi ...
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. Three new level of categorizations, including low, high, and interleave have been introduced in this paper to optimi...
作者:Thejaswini P , Srikantaswamy R S , Manjunatha A S
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Fingerprints are the most used biometric trait in applications where high level of security is required. Fingerprint image may vary due to various environmental conditions like temperature, humidity, weather etc. Hence, it is necessary to design a fingerprint recognition sys...
作者:Ridi Ferdiana , Wiliam Fajar , Desi Dwi Purwanti ...
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Sentiment analysis in non-English language can be more challenging than the English language because of the scarcity of publicly available resources to build the prediction model with high accuracy. To alleviate this under-resourced problem, this article introduces the leverage o...
作者:Anvita Gupta , Dilbag Singh , Manjit Kaur
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Under this paper, the primary conditions of a modified logistic chaotic map are created with the help of memetic differential expansion. In the beginning, the color image is broken down into different channels like red, blue and green. Then the modified logistic chaotic map essen...
作者:Najood Alghamdi , Wadee Alhalabi
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:This paper demonstrates the application of a proposed eye fixation detection algorithm to eye movement recorded during eye gaze input within immersive Virtual Reality and compares it with the standard frame-by-frame analysis for validation. Pearson correlations and a sample paire...
作者:Arwa Bashanfar , Eman Al-Zahrani , Maram Alutebei ...
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Mobile Crowdsourcing (MCS) surfaced as a new affluent method for data collection and processing as a result of the boom of sensor-rich mobile devices popularity. MCS still has room for improvement, particularly in protecting workers’ private information such as location. The...
作者:Belal Amin , Mona Gamal , A. A. Salama ...
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Cardiotocography is a medical device that monitors fetal heart rate and the uterine contraction during the period of pregnancy. It is used to diagnose and classify a fetus state by doctors who have challenges of uncertainty in data. The Rough Neural Network is one of the most com...
作者:Nur Liyana Law Mohd Firdaus Law , Moamin A. Mahmoud , Alicia Y.C. Tang ...
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Although it is widely recognized that ontology is the main approach towards semantic interoperability among information systems and services, the understanding of ontology aspects among researchers is limited. To provide a clear insight to this problem and support researchers, we...
作者:Arun Kulkarni , Leonard L. Brown III
来源:[J].International Journal of Advanced Computer Science and Applications (IJACSA), 2019, Vol.10SAI
摘要:Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are tricked into i...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×