{"title":"DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks","authors":"Mahbubun Nahar, A. H. M. Kamal","doi":"10.1080/1206212x.2024.2347456","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2347456","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140997533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Document retrieval using clustering-based Aquila hash-Q optimization with query expansion based on pseudo relevance feedback","authors":"Bhushan Inje, K. Nagwanshi, Radhakrishna Rambola","doi":"10.1080/1206212x.2024.2342715","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2342715","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140668801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph-based phishing detection: URLGBM model driven by machine learning","authors":"Abdelali Elkouay, Najem Moussa, Abdallah Madani","doi":"10.1080/1206212x.2024.2342710","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2342710","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140688765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adjustable patch and feature prior token-based transformer for weakly supervised semantic segmentation","authors":"Linjuan Li, Haoxue Zhang, Gang Xie, Yanhong Bai","doi":"10.1080/1206212x.2024.2333122","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2333122","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140702036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system","authors":"Alina Dash, K. Naik, Priyanka Priyadarshini","doi":"10.1080/1206212x.2024.2336329","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2336329","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140749495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TOPSIS-ACO based feature selection for multi-label classification","authors":"Gurudatta Verma, T. P. Sahu","doi":"10.1080/1206212x.2024.2321683","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2321683","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar
{"title":"Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems","authors":"Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar","doi":"10.1080/1206212x.2024.2304385","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2304385","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139787738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar
{"title":"Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems","authors":"Mirsaeid Hosseini Shirvani, Amir Akbarifar, Amir Salar Nazokkar","doi":"10.1080/1206212x.2024.2304385","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2304385","url":null,"abstract":"","PeriodicalId":509621,"journal":{"name":"International Journal of Computers and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139847625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}