Pub Date : 2024-03-13DOI: 10.1080/1206212x.2024.2328499
Himani Trivedi, Mahesh Goyani
{"title":"Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset","authors":"Himani Trivedi, Mahesh Goyani","doi":"10.1080/1206212x.2024.2328499","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2328499","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2019 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140246109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.1080/1206212x.2024.2318821
Chun Huang, Shudan Liu
{"title":"Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things","authors":"Chun Huang, Shudan Liu","doi":"10.1080/1206212x.2024.2318821","DOIUrl":"https://doi.org/10.1080/1206212x.2024.2318821","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"221 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1080/1206212x.2023.2301266
Abhishek Goyal, Rakesh Garg, K. Bhatia
{"title":"An improved task scheduling algorithm for conflict resolution in cloud environment","authors":"Abhishek Goyal, Rakesh Garg, K. Bhatia","doi":"10.1080/1206212x.2023.2301266","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301266","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"29 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1080/1206212x.2023.2301183
Peraphon Sophatsathit
Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.
背景:软件架构由许多包含自身架构的人工制品组成。这些架构在软件生命周期中不断演变。有些会被新版本取代,有些则会被淘汰和废弃。无论如何,它们都存在复杂性和互操作性问题。与此相反,人体是一个自然奇观,可以无缝、智能地运行。通过模仿单细胞生命形式的生物学和人体的构建模块或 DNA,本说明书将提供一个独立于其工作环境的自主软件系统。方法在本文中,我们提出了一种仿生物架构的软件系统(BASS),它模仿了单细胞生命体的简单性。其基本结构由固定大小的组件组成,这些组件的属性和操作排列在类似 DNA 字符串的一维数组中。这样就可以在没有外部支持的情况下自行执行。由于单细胞生命体的生命周期较短,因此组件的生命周期也分为三个阶段,即创建、维持和终止,必须在预定的生命周期(TTL)限制内完成。在此期间,一个新的组件会被克隆,以替代原地停止运行的组件。由于没有可比的体系结构来对所提出的新型体系结构进行基准测试,因此我们对其进行了模拟,以衡量 BASS 的性能统计。结果:特意规划了固定大小、直接访问和线性排列(如 DNA 字符串)的组合,以倡导硬件实施。结果表明,凭借这种组织和原位替换方案,内存占用率仍然相对较低。结论:所提出的软件架构是一个自主系统,可作为一个高效的可移植环境,并能大大降低软件系统的资源利用率。
{"title":"A biological-like synthesis framework for software engineering environments","authors":"Peraphon Sophatsathit","doi":"10.1080/1206212x.2023.2301183","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2301183","url":null,"abstract":"Background: Software architecture consists of many artifacts that encompass their own architectures. These architectures evolve over the software lifetime. Some are replaced by new versions, others are obsolete and disposed of. At any rate, they suffer from complexities and interoperability. The human body, on the contrary, is a natural wonder that works seamlessly and intelligently. By imitating the biology of a uni-cellular life form and the body’s building blocks or DNA, this prospectus will furnish an autonomous software system that is independent of its working environment. Methods: In this paper, we propose a Biological-like Architecture for Software Systems (BASS) that mimic the simplicity of a uni-cellular life form. The basic construct consists of fixed size components holding their attributes and operations arranged in a one-dimension array akin to DNA strings. This permits self-execution without external support. Since uni-cellular life form is short-live, so are the components modeled to undergo a three-stage life cycle, namely, creation, sustainment, and cessation that must be completed within a predefined Time-To-Live (TTL) limit. In the meantime, a new component is cloned to replace the ceasing one in situ. Since there is no comparable architecture to benchmark the proposed novel architecture, it is simulated to gauge the performance statistics of BASS. Results: The combinations of fixed size, direct access, and linearly arranged like DNA string are purposely planned to advocate hardware implementation. The results show that memory occupation remains relatively low by virtue of this organization and replacement in situ scheme. Conclusions: The contribution of the proposed software architecture is an autonomous system that serves as an efficient portable environment and can lessen software systems resource utilization considerably.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"30 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-05DOI: 10.1080/1206212x.2023.2300221
Yang Xu, Yongjie Ma
{"title":"Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module","authors":"Yang Xu, Yongjie Ma","doi":"10.1080/1206212x.2023.2300221","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2300221","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-05DOI: 10.1080/1206212x.2023.2293348
Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian
{"title":"A review on recent driver safety systems and its emerging solutions","authors":"Akhil Nair, Varad Patil, Rohan Nair, Adithi Shetty, Mimi Cherian","doi":"10.1080/1206212x.2023.2293348","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2293348","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"18 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139382909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-30DOI: 10.1080/1206212x.2023.2299575
Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev
{"title":"A secure authenticated image encryption scheme based on elliptic curve cryptography","authors":"Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, P.P. Amritha, K. V. Lakshmy, Vasily Sachnev","doi":"10.1080/1206212x.2023.2299575","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2299575","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-23DOI: 10.1080/1206212x.2023.2297478
Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani
{"title":"An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems","authors":"Mohammad Mehdi Pourhashem Kallehbasti, Jamshid Pirgazi, Ali Ghanbari Sorkhi, Ali Kermani","doi":"10.1080/1206212x.2023.2297478","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2297478","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139161175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-21DOI: 10.1080/1206212x.2023.2296720
Neethu Subash, B. Nithya
{"title":"Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms","authors":"Neethu Subash, B. Nithya","doi":"10.1080/1206212x.2023.2296720","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2296720","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}