Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
A positioning method of intelligent networked vehicle based on laser radar
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 361–371https://doi.org/10.1504/ijcat.2024.143308To effectively solve the problem of large positioning deviation and high positioning delay, an intelligent networked vehicle positioning method based on LiDAR is proposed. Based on a planar model, ground point cloud extraction is carried out and non-...
- research-articleDecember 2024
An access control of enterprise financial privacy information based on RBAC model
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 372–381https://doi.org/10.1504/ijcat.2024.143307It is essential to improve the Role-Based Access Control (RBAC) method for controlling access to enterprise financial privacy information. First, this study proposes to solve the problem of information leakage and distortion in the acquisition of ...
- research-articleDecember 2024
A fast retrieval method for legal judgment documents based on multi-granularity semantic interaction understanding
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 324–332https://doi.org/10.1504/ijcat.2024.143304In order to improve the normalised loss gain and recall rate of information retrieval results, the paper proposes a fast retrieval method based on multi-granularity semantic interaction understanding for legal judgment documents. After constructing a ...
- research-articleDecember 2024
Research on storage and encryption method for private electronic communication information based on fuzzy rules
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 342–350https://doi.org/10.1504/ijcat.2024.143296To improve the security of private electronic communication information, the paper proposes an information storage encryption method based on fuzzy rules. Firstly, after establishing a private electronic communication information set, fill in the missing ...
- research-articleDecember 2024
Virtual data generation method for simulation scenes based on scene flow prediction
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 351–360https://doi.org/10.1504/ijcat.2024.143295A virtual data generation method based on scene flow prediction is proposed to address the problem of high false positives and inability to ensure feature consistency after virtual data encoding in simulation scenarios. Firstly, a variational auto-...
-
- research-articleDecember 2024
A collaborative filtering-based network multimedia English teaching resource recommendation
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 291–297https://doi.org/10.1504/ijcat.2024.143293Owing to the problems of high recommendation error and low recommendation satisfaction in traditional network multimedia English teaching resources recommendation methods, a collaborative filtering-based network multimedia English teaching resource ...
- research-articleDecember 2024
Fast recognition method of pedestrian signs based on colour features and SVM
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 4Pages 307–315https://doi.org/10.1504/ijcat.2024.143291In order to overcome the problems of low recognition efficiency and poor recognition accuracy in traditional recognition methods of pedestrian signs, a fast recognition method of pedestrian signs based on colour features and SVM is proposed. Firstly, the ...
- research-articleOctober 2024
Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 3Pages 158–170https://doi.org/10.1504/ijcat.2024.141931Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, ...
- research-articleSeptember 2024
Research on personalised recommendation method for English online course resources based on hybrid differential evolution algorithm
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 1-2Pages 73–79https://doi.org/10.1504/ijcat.2024.141363In order to improve personalised satisfaction and recommendation accuracy of English resources, and effectively reduce recommendation time, this article proposes a personalised recommendation method for English online course resources based on hybrid ...
- research-articleSeptember 2024
Deep fusion method of IoT monitoring data based on extended Kalman filter
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 1-2Pages 19–25https://doi.org/10.1504/ijcat.2024.141356To overcome the problems of low fusion accuracy and high data loss rate in traditional IoT monitoring data fusion methods, the paper proposes a deep fusion method for IoT monitoring data based on extended Kalman filtering. Firstly, obtain monitoring data ...
- research-articleSeptember 2024
Study on online English learning resource push based on Bayesian inference
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 1-2Pages 90–98https://doi.org/10.1504/ijcat.2024.141354The current online English learning resource push methods have problems of poor customer satisfaction, low reliability of pushed resources and low recall rate of resource pushes. Therefore, this paper proposes an online English learning resource push ...
- research-articleSeptember 2024
Information scheduling method of big data platform based on ant colony algorithm
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 1-2Pages 1–9https://doi.org/10.1504/ijcat.2024.141353This paper proposes an information security scheduling method for big data platforms based on ant colony algorithm. First, collect big data platform information and conduct noise reduction and compression processing on the information. Then, determine ...
- research-articleJanuary 2023
Enhancing the accuracy of transformer-based embeddings for sentiment analysis in social big data
International Journal of Computer Applications in Technology (IJCAT), Volume 73, Issue 3Pages 169–177https://doi.org/10.1504/ijcat.2023.135525Social media have opened a venue for online users to post and share their opinions in different life aspects, which leads to big data. As a result, sentiment analysis has become a fast-growing field of research in Natural Language Processing (NLP) owing ...
- research-articleJanuary 2023
A hexagonal grid geometry system for applications in 3D graphics
International Journal of Computer Applications in Technology (IJCAT), Volume 73, Issue 3Pages 163–168https://doi.org/10.1504/ijcat.2023.135585The hexagonal grid arrangement structure has important application values in volume graphics. The choice of geometric model has a great influence on the effect of voxelisation. This paper proposes a new three-dimensional hexagonal grid geometry system ...
- research-articleJanuary 2022
Multi-objective enhanced imperialistic competitive method for multi-criteria engineering issues
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 4Pages 344–356https://doi.org/10.1504/ijcat.2022.129384Optimising multi-criteria engineering issues using a multi-objective evolutionary algorithm has received a lot of attention in recent years. In this work, a multi-objective enhanced version of the Imperialist Competitive Algorithm (ICA), named MOEICA, was ...
- research-articleJanuary 2022
The optimisation of travelling salesman problem based on parallel ant colony algorithm
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 4Pages 309–321https://doi.org/10.1504/ijcat.2022.129382General search algorithms offer some solutions to solve and avoid the constraints of the finding shortest path problem. Ant Colony Optimisation (ACO) is a meta-heuristic search-based and probabilistic searching technique for an optimal path. However, ACO ...
- research-articleJanuary 2022
Research on image to illustration translation method based on CycleGAN
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 3Pages 244–252https://doi.org/10.1504/ijcat.2022.127822Aiming at the problem that balance between abstract style and original painting content is not enough in traditional image style migration, this paper puts forward an improved method that based on the traditional Cyclic-Consistent Generation Adversarial ...
- research-articleJanuary 2022
A CNN approach for online metal can end rivet inspection
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 3Pages 282–290https://doi.org/10.1504/ijcat.2022.127821Can end rivet fracture is an important defect type that may arise during the manufacturing of metal cans used in the food industry. Thus, an inspection procedure must be performed to remove the defective can ends from the production line. Previous ...
- research-articleJanuary 2022
Hyper-chaos-based image encryption and cryptanalysis on a non-RGB channel
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 3Pages 206–218https://doi.org/10.1504/ijcat.2022.127818This paper proposes a novel hyper-chaos-based colour image encryption technique and uses cryptanalysis to examine its resistance to intruders. The encryption technique uses hyper-chaotic sequence-dependent diffusion, combined with multi-layered scrambling ...
- research-articleJanuary 2022
Multi-scale super-pixels-based passive forensics for copy-move forgery using local characteristics
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 2Pages 139–149https://doi.org/10.1504/ijcat.2022.126884Copy-move forgery is the most common kind of tampering technique for digital images. This paper presents a novel hybrid approach, which uses the Speeded-Up Robust Features (SURF) point and characteristics of Local Feature Regions (LFRs) matching. First, ...