{"title":"Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset","authors":"Himani Trivedi, Mahesh Goyani","doi":"10.1080/1206212x.2024.2328499","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328499","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2019 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140246109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things","authors":"Chun Huang, Shudan Liu","doi":"10.1080/1206212x.2024.2318821","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2318821","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"221 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved task scheduling algorithm for conflict resolution in cloud environment","authors":"Abhishek Goyal, Rakesh Garg, K. Bhatia","doi":"10.1080/1206212x.2023.2301266","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"29 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A biological-like synthesis framework for software engineering environments","authors":"Peraphon Sophatsathit","doi":"10.1080/1206212x.2023.2301183","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301183","url":null,"abstract":"Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"30 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module","authors":"Yang Xu, Yongjie Ma","doi":"10.1080/1206212x.2023.2300221","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2300221","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian
{"title":"A review on recent driver safety systems and its emerging solutions","authors":"Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian","doi":"10.1080/1206212x.2023.2293348","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2293348","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"18 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139382909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev
{"title":"A secure authenticated image encryption scheme based on elliptic curve cryptography","authors":"Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev","doi":"10.1080/1206212x.2023.2299575","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2299575","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani
{"title":"An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems","authors":"Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani","doi":"10.1080/1206212x.2023.2297478","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2297478","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139161175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms","authors":"Neethu Subash, B. Nithya","doi":"10.1080/1206212x.2023.2296720","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2296720","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}