Nov. 2024
Survey
Survey of attacks and defenses techniques for LoRa network
Technology of Blockchain
Cross-chain node reputation assessment methodology in block-chain based on multi-dimensional trustworthy model
Dynamic sharding adaptive model for blockchain
Improved over-collateralized high-throughput multi-path payments scheme
Algorithm Research & Explore
Solving capacitated vehicle routing problems based on end to end deep reinforcement learning
Improved JPS algorithm fused with DWA for multi robot path planning
Optimization method of AGV picking efficiency considering order splitting strategy
Algorithm Research & Explore
Exercise embeddings and learning-forgetting features boosted knowledge tracing
MDKT: adaptive knowledge tracing model incorporating multidimensional problem difficulty
Knowledge distillation in federated learning based on latent space generator
Distant supervision relation extraction based on multi-level attention mechanism and dynamic threshold
Multi-feature multiple fusion sentiment classification model based on syntactic dependency and attention mechanism
Fusion of distance threshold and Bi-TCN for spatio-temporal attention pedestrian trajectory prediction model
Edge computing offloading method based on data compression and improved grey wolf optimizer on smart building
Rough set attribute reduction algorithm based on differential teaching-learning optimization
Optimizing ontology matching through hybrid genetic algorithm based on partial reference alignment
ICD coding classification based on data augmentation and dilated convolution
Active learning semantic segmentation model based on improved double deep Q network
Structured graph embedding for unsupervised feature extraction
Control method of transit signal priority based on coalitional bargaining games and reinforcement learning
Multi-view clustering with self-supervised learning guided by multi-angle semantic labels
Improved distribution estimation whale algorithm for block chain DAG task scheduling
Spoken term detection and fine-grained localization method based on multi-scale distance matrices
System Development & Application
End-to-end SAT assignment model based on instance related characteristics of SAT
Multi-coding next point of interest recommendation model based on GT model
Adaptive rank constrained inverse matrix approximation decomposition method and its application in speech enhancement
Large-scale graph layout algorithm based on multi-level stochastic gradient descent
Pseudo random coupled image lattice system based on two dimensional dynamic cellular automata and its dynamic characteristics
Saturation flow prediction method for UAV in fusion airspace based on wavelet reconstruction-Autoformer
Autonomous exploration algorithm based on uniform scanning and attentive guidance explorer
Using knowledge replay for just-in-time software defect prediction incremental model
Technology of Network & Communication
Attention-based multi-agent cooperation with limited communication
Priority-based multitasking offloading policy in NOMA-MEC network
Computing offloading strategy for multi-type tasks in satellite Internet of Things
Technology of Information Security
Vulnerability classification method based on double-attention mechanism and adversarial training
Directional fuzzing based on multi-objective domination analysis and path dynamic pruning optimization
Network telemetry scheduling method for detecting flow table overflow attacks in SDN
Privacy-preserving intrusion detection scheme based on hierarchical K-asynchronous federated learning
Technology of Graphic & Image
Deep hashing method based on cross-scale Vision Transformer
TRNet: triple-channel region-enhancement network for change detection based on remote sensing image
Physics informed learning model for multi-material simulation
Regional temporal changes learning for action recognition
Medical image segmentation network based on self-partitioning lightweight Transformer
Dual U-shaped network with non-local prior fusion for image compressed sensing
Rate-distortion optimization algorithm based on temporal impact of reference unit coding distortion
Accept Paper
Tumor segmentation based on multi-scale visual information and non-local target mining
Spatiotemporal path-reusing reservoir algorithm based on deferred resampling
Pre-training model for video moment retrieval based on clip
3d multi-object tracking with multi-modal embedding and trajectory correction
Review of research on volume rendering surface reconstruction based on signed distance function
About the Journal
- Application Research of Computers Monthly Journal
-
Journal ID
ISSN 1001-3695
CN 51-1196/TP
Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.
Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.
Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.
Indexed & Evaluation
- The Second National Periodical Award 100 Key Journals
- Double Effect Journal of China Journal Formation
- the Core Journal of China (Peking University 2023 Edition)
- the Core Journal for Science
- Chinese Science Citation Database (CSCD) Source Journals
- RCCSE Chinese Core Academic Journals
- Journal of China Computer Federation
- 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
- Full-text Source Journal of China Science and Technology Periodicals Database
- Source Journal of China Academic Journals Comprehensive Evaluation Database
- Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
- 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
- Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
- Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
- Source Journal of British Science Digest (INSPEC)
- Japan Science and Technology Agency (JST) Source Journal
- Russian Journal of Abstracts (AJ, VINITI) Source Journals
- Full-text Journal of EBSCO, USA
- Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
- Poland Copernicus Index (IC)
- Ulrichsweb (USA)