{"title":"BEFF-SIGS: blockchain-enhanced fog framework- securing IoT data integrity and green sustainability through scalable authentication-authorization","authors":"N. S. Khan, R. N. Mir, M. Chishti","doi":"10.1080/1206212x.2024.2380654","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380654","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"117 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing routing and quality of service using AI-driven technique for internet of vehicles contexts","authors":"Oussama Senouci","doi":"10.1080/1206212x.2024.2380653","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380653","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"122 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thermal-energy-efficient-secured-link reliable and delay-aware routing protocol (TESLDAR) for wireless body area networks","authors":"R. Mohanty, S. Sahoo, M. R. Kabat","doi":"10.1080/1206212x.2024.2380675","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2380675","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 39","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141825505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobilenet V3-transformer, a lightweight model for image caption","authors":"Xuan Zhang, Mengqi Fan, Mo Hou","doi":"10.1080/1206212x.2024.2328498","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328498","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140218372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated learning with blockchain-based model aggregation and incentives","authors":"Raghavendra Varma Cherukuri, Golagani Lavanya Devi, Neelapu Ramesh","doi":"10.1080/1206212x.2024.2328492","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328492","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"5 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical study of just-in-time-defect prediction using various machine learning techniques","authors":"Rohit Vashisht, Abhinav Juneja, Gagan Thakral, Sonam Gupta","doi":"10.1080/1206212x.2024.2328489","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328489","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"36 S149","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140224721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain","authors":"Ali Akram Abdul-Kareem, W. A. Al-Jawher","doi":"10.1080/1206212x.2024.2313300","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2313300","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"32 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140238936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of geographically restricted flooding for emergency alert applications","authors":"Shahzad Ali","doi":"10.1080/1206212x.2024.2328488","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328488","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"67 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140238204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mangalagowri Gorbal, Ramesh D. Shelke, Manuj Joshi
{"title":"An image watermarking scheme: combining the transform domain and deep learning modality with an improved scrambling process","authors":"Mangalagowri Gorbal, Ramesh D. Shelke, Manuj Joshi","doi":"10.1080/1206212x.2024.2313301","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2313301","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"21 17‐18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140244204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}