International Journal of Computer Applications in Technology (IJCAT)

International Journal of Computer Applications in Technology

2024 Vol.74 No.4

Special Issue on: Ai-Based Algorithms in IoT-Edge Computing

Guest Editor: Prof. W.J. Li


Pages Title and author(s)
247-257An outlier detection method for open-source software running data based on Bi-LSTM network
Jiehai Deng; Weihong Li
DOI: 10.1504/IJCAT.2024.143297
258-266Multi-source network attack tracing method based on traffic characteristics
Hui Hong; Wei Yang; Bocheng Sun; Ling Zhang
DOI: 10.1504/IJCAT.2024.143298
267-274Traceability method for multisource heterogeneous data of power grid business based on multidimensional feature clustering
Zhiguo Zhou; Hao Chen; Mengxiao Ni
DOI: 10.1504/IJCAT.2024.143299
275-281A deep fusion method for asynchronous data in the internet of things based on data feature mining
Yongyi Huang
DOI: 10.1504/IJCAT.2024.143300
282-290A distributed network data security and confidentiality system based on 5G networking
Han Ge; Shumin Ren; Jian Xie
DOI: 10.1504/IJCAT.2024.143302
291-297A collaborative filtering-based network multimedia English teaching resource recommendation
Huanxia Deng
DOI: 10.1504/IJCAT.2024.143293
298-306Extracting abnormal frequency signals from power grid based on spectrum analysis
Chuning Peng; Jun Zhang; Xiaodong Yin; Yi Cao; Quan Wang; Haibin Chen; Jiachuan Long
DOI: 10.1504/IJCAT.2024.143301
307-315Fast recognition method of pedestrian signs based on colour features and SVM
Lu Gan
DOI: 10.1504/IJCAT.2024.143291
316-323Multi-objective optimisation of traffic data transmission load based on improved machine learning in the edge computing framework
Zhichang Huang
DOI: 10.1504/IJCAT.2024.143292
324-332A fast retrieval method for legal judgment documents based on multi-granularity semantic interaction understanding
Jianhua Guo
DOI: 10.1504/IJCAT.2024.143304
333-341Malicious communication node location method of smart campus network considering multi-dimensional mapping relationship
Wenjing Ma; Ketong Liu; Lixia Hou
DOI: 10.1504/IJCAT.2024.143294
342-350Research on storage and encryption method for private electronic communication information based on fuzzy rules
Rui Sun; Zhenzhen Wang; Huanhuan Liu; Yu Ji
DOI: 10.1504/IJCAT.2024.143296
351-360Virtual data generation method for simulation scenes based on scene flow prediction
Lizhen Jiang; Xu Lan
DOI: 10.1504/IJCAT.2024.143295
361-371A positioning method of intelligent networked vehicle based on laser radar
Zhiting Liu; Fanxiu Shi
DOI: 10.1504/IJCAT.2024.143308
372-381An access control of enterprise financial privacy information based on RBAC model
Xuejiao Shi
DOI: 10.1504/IJCAT.2024.143307