美国科研出版社期刊
期刊
会议
图书
作者:Huangyi Qin , Toshiki Matsusaki , Yusuke Momoi ...
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (08), pp.754-763Scientific Research Publishing
摘要:Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that uses the interference color of high-order retarder films and e...
作者:Mohammed Abu Lamddi
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (02), pp.211-244Scientific Research Publishing
摘要:Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier than before. The rapid increase of technology adoption in the di...
作者:Tomohiro Hayashida , Ichiro Nishizaki , Shinya Sekizaki ...
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (02), pp.143-158Scientific Research Publishing
摘要:TCPSO (Two-swarm Cooperative Particle Swarm Optimization) has been proposed by Sun and Li in 2014. TCPSO divides the swarms into two groups with different migration rules, and it has higher performance for high-dimensional nonlinear optimization problems than traditional PSO and ...
作者:Thiago Rocha Silva , Jean-Luc Hak , Marco Winckler ...
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (06), pp.564-589Scientific Research Publishing
摘要:Prototyping is one of the core activities of User-Centered Design (UCD) processes and an integral component of Human-Computer Interaction (HCI) research. For many years, prototyping was synonym of paper-based mockups and only more recently we can say that dedicated tools for supp...
作者:Monika Singh , V. K. Jain
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (08), pp.721-733Scientific Research Publishing
摘要:This paper presents an augmented framework for analyzing Safety Critical Systems (SCSs) formally. Due to high risk of failure, development process of SCSs is required more attention. Model driven approaches are the one of ways to develop SCSs for accomplishing critical and comple...
作者:Ibrahim Moukouop Nguena , Amolo-Makama Ophélie Carmen Richeline
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (06), pp.529-545Scientific Research Publishing
摘要:Semantic duplicates in databases represent today an important data quality challenge which leads to bad decisions. In large databases, we sometimes find ourselves with tens of thousands of duplicates, which necessitates an automatic deduplication. For this, it is necessary to det...
作者:Raza Muhammad , Basheer Riskhan
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (04), pp.354-369Scientific Research Publishing
摘要:One of the most critical threats to the reliability and robustness for file system is harboring bug (silent data corruption). In this research we focus on checksum mismatch since it occurs not only in the user data but also in file system. Our proposed solution has the abili...
作者:Maria Csernoch
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (01), pp.11-40Scientific Research Publishing
摘要:Research in spreadsheet management proved that the overuse of slow thinking, rather than fast thinking, is the primary source of erroneous end-user computing. However, we found that the reality is not that simple. To view end-user computing in its full complexity, we launched a p...
作者:Ting Cao , Julian Scott Yeomans
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (02), pp.128-142Scientific Research Publishing
摘要:An evolutionary nature-inspired Firefly Algorithm (FA) is employed to set the optimal osmotic dehydration parameters in a case study of papaya. In the case, the functional form of the dehydration model is established via a response surface technique with the resulting optimi...
作者:Alex Tserkovny
来源:[J].Journal of Software Engineering and Applications, 2017, Vol.10 (07), pp.639-662Scientific Research Publishing
摘要:A t-norm fuzzy logic is presented, in which a triangular norm (t-norm) plays the role of a graduated conjunction operator. Based on this fuzzy logic we develop methods for fuzzy reasoning in which antecedents and consequents involve fuzzy conditional propositions of the form...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×