{"title":"An Enhanced Digital Image Watermarking Technique using DWT-HD-SVD and Deep Convolutional Neural Network","authors":"Mahesh Pawar, Manish Rai, Sachin Goyal","doi":"10.1504/ijccbs.2022.10050956","DOIUrl":"https://doi.org/10.1504/ijccbs.2022.10050956","url":null,"abstract":"","PeriodicalId":38348,"journal":{"name":"International Journal of Critical Computer-Based Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of cyber-attacks for sensor measurement data using supervised machine learning models for modern power grid system","authors":"T. Das, Manikant Panthi","doi":"10.1504/ijccbs.2022.10054895","DOIUrl":"https://doi.org/10.1504/ijccbs.2022.10054895","url":null,"abstract":"","PeriodicalId":38348,"journal":{"name":"International Journal of Critical Computer-Based Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Raveendran, A. S. Nair, L. Colaco, S. Punnekkat
{"title":"Task Models for Mixed Criticality Systems - A Review","authors":"B. Raveendran, A. S. Nair, L. Colaco, S. Punnekkat","doi":"10.1504/ijccbs.2022.10053341","DOIUrl":"https://doi.org/10.1504/ijccbs.2022.10053341","url":null,"abstract":"","PeriodicalId":38348,"journal":{"name":"International Journal of Critical Computer-Based Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the consistency verification and the quality of multimedia presentations","authors":"A. Abdelli","doi":"10.1504/IJCCBS.2011.042327","DOIUrl":"https://doi.org/10.1504/IJCCBS.2011.042327","url":null,"abstract":"We propose in this paper a formal methodology that improves the temporal consistency verification of multimedia presentations. It extends the standard approaches to check over inconsistencies due to output resource conflicts. This goal is achieved thanks to the definition of a new model that extends time Petri net to preemptor hyperarcs. This specification framework called preemptive resource time Petri nets (PRTPN) makes it possible to model correctly and accurately output resource requirements. A special attention is given to the modelling of user interactions when resource constrained. In order to be able to derive the reachability graph of this specification, the syntax and the formal semantics of the model are provided. The obtained graph is used in the verification of inconsistencies due inter alia to resource conflicts; hence a new paradigm called 'qualitative consistency' is defined.","PeriodicalId":38348,"journal":{"name":"International Journal of Critical Computer-Based Systems","volume":"2 1","pages":"221-245"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJCCBS.2011.042327","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deterministic Approach with Markov Chain Algorithm to Impose Higher Order Security in Dynamic Wireless Sensor Networks (DWSN)","authors":"Narayanan A.E, M. Sasikumar","doi":"10.1504/ijccbs.2024.10058153","DOIUrl":"https://doi.org/10.1504/ijccbs.2024.10058153","url":null,"abstract":"","PeriodicalId":38348,"journal":{"name":"International Journal of Critical Computer-Based Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}