Volume 10 Number 3 September 2019


Virtual Reality Applications in Physical Education Management

Lei Chen

https://doi.org/10.6025/jic/2019/10/3/87-90

Abstract Virtual Reality as a technology has tremendous potential for application in many fields which help to find, create and innovate. We have identified sports and human health management as one potential area of application. Virtual reality enables the participants in sports to know the techniques in sports and help to update in the domain. This paper presents the current scenario... Read More


Information Technology-Infused Physical Ground Management

Xi-ying ZUO

https://doi.org/10.6025/jic/2019/10/3/91-96

Abstract Currently there are many technological developments in the design and construction of sports grounds. One such growth is the use of computational intelligence for design and construction. From the venue selection till the completion, the use of intelligent techniques is visible and the system can able to help the information exchange. The computer control system helps for the design and... Read More


Study on the Application of Neural Network in the Computer Network Security Evaluation

Xue-rui WANG, Yan ZHOU

https://doi.org/10.6025/jic/2019/10/3/97-101

Abstract Research computer network security problem. There were nonlinear relations among the evaluation indexes, and it was difficult for an accurate mathematical model to describe the nonlinear relationship. In order to improve the evaluation accuracy of computer network security, this study put forward a combination model to evaluate the computer network security. The combination model used particle swarm optimization (PSO) to... Read More


A Credential Data Privacy Preserving in web Environment using Secure Data Contribution Retrieval Algorithm

Kumaran U, Neelu Khare

https://doi.org/10.6025/jic/2019/10/3/102-110

Abstract Preservation of privacy is a significant aspect of data mining and as the secrecy of sensitive information must be maintained while sharing the data among different untrusted parties. There are much application is suffering from vulnerable, data leakage, data misuse, and sensitive data disclosure issues. To protect the privacy of sensitive data without losing the usability of data, various techniques... Read More