Computer Science, Software Engineering

Article Computer Science, Interdisciplinary Applications

Modeling the effect of non-pharmaceutical measures and vaccination on the spread of two variants of COVID-19 in India

Anil K. Vashishth, Komal Basaiti

Summary: This article proposes a deterministic model of two COVID-19 strains that incorporates non-pharmaceutical preventive strategies and an imperfect vaccine. The model is rigorously analyzed and calibrated, showing that the Omicron variant has the ability to competitively exclude other variants. The impact of vaccine and infection-induced immunities on the pandemic is studied, with vaccine-derived immunity exerting a greater influence on the current wave. The article also estimates the minimum percentage of vaccinated people required to reach community-wide herd immunity.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Software Engineering

Fuzzing-based grammar learning from a minimal set of seed inputs

Hannes Sochor, Flavio Ferrarotti, Daniela Kaufmann

Summary: To be effective, a fuzzer needs to generate well-formed inputs that can detect meaningful bugs. Grammar based fuzzers require a known grammar of the input language, which is often unknown. Our proposed algorithm can learn grammars from recursive descent parsers with high levels of recall and precision without requiring complex program analysis techniques.

JOURNAL OF COMPUTER LANGUAGES (2024)

Article Computer Science, Interdisciplinary Applications

A well-balanced and positivity-preserving numerical model for overland flow under vegetation effects

Hasan Karjoun, Abdelaziz Beljadid

Summary: In this study, we developed a numerical model based on the depth-averaged shallow water equations to simulate flows through vegetation field. The model takes into account the drag and inertia forces induced by vegetation, using different formulations for the stem drag coefficient. Turbulence induced by vegetation is also considered through the addition of diffusion terms in the momentum equations. The proposed numerical model is validated through numerical simulations and shows good accuracy in simulating overland flows under vegetation effects.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Hardware & Architecture

Post-quantum secure group signature with verifier local revocation and backward unlinkability

Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang

Summary: This paper proposes a new lattice-based group signature scheme that combines the timestamp with Verifier Local Revocation (VLR) using the complete tree technique. The scheme achieves post-quantum security, almost full anonymity, and traceability, as well as backward unlinkability and effectively reduces the size of the revocation list.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Interdisciplinary Applications

A computational approach to solving some applied rigid second-order problems

Joshua Sunday, Ali Shokri, Nathaniel Mahwash Kamoh, Bwebum Cleofas Dang, Nazim Idrisoglu Mahmudov

Summary: A new computational approach called TPHBM was proposed in this research to solve rigid second order problems, and the analysis of its basic properties showed that it outperformed other existing methods.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Interdisciplinary Applications

Efficient pricing of options in jump-diffusion models: Novel implicit-explicit methods for numerical valuation

Vikas Maurya, Ankit Singh, Vivek S. Yadav, Manoj K. Rajpoot

Summary: This paper presents a novel approach for numerically simulating partial integro-differential equations that arise in option pricing under jump-diffusion models. The method avoids the need for numerical or analytical inversion of the coefficient matrix by using implicit-explicit Runge-Kutta type methods. The approach combines these methods with an operator splitting technique to efficiently solve the linear complementarity problem.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Interdisciplinary Applications

Qualitative behavior in a fractional order IS-LM-AS macroeconomic model with stability analysis

Ciro Eduardo Bazan Navarro, Renato Mario Benazic Tome

Summary: In this article, the conditions for the structural stability of a fractional order IS-LM-AS dynamic model with adaptive expectations are analyzed. The paper presents the conditions for the economic system to exhibit periodic movement and highlights the essential role of all structural parameters in determining its global stability and bifurcation.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Software Engineering

Reasoning about logical systems in the Coq proof assistant

Conor Reynolds, Rosemary Monahan

Summary: This paper provides a detailed approach to formalize a fragment of the theory of institutions in the Coq proof assistant. The approach is illustrated and evaluated by instantiating the framework with specific institution examples.

SCIENCE OF COMPUTER PROGRAMMING (2024)

Article Computer Science, Software Engineering

IBGR: Influence-Based Group Recommendation system

Reza Barzegar Nozari, Hamidreza Koohi, Ziad Kobti

Summary: In the era of personalized digital experiences, recommendation systems are crucial. Influence-Based Group Recommender (IBGR) combines fuzzy clustering, leader identification, trust metrics, and influence calculations to offer comprehensive group recommendations. Experiments show IBGR outperforms alternatives, emphasizing the importance of leader influence and group compatibility.

SOFTWARE IMPACTS (2024)

Article Computer Science, Software Engineering

Automated bibliometric data generation in Python from a bibliographic database

Bladimir Toaza, Domokos Esztergar-Kiss

Summary: This article introduces a method that uses a Python script to automatically extract bibliometric data from scientific databases, aiming to address the challenge of searching and downloading bibliographic information in a large volume of publications.

SOFTWARE IMPACTS (2024)

Article Computer Science, Information Systems

Vulnerability detection based on federated learning

Chunyong Zhang, Tianxiang Yu, Bin Liu, Yang Xin

Summary: This paper proposes a vulnerability detection framework based on federated learning (VDBFL), which combines code property graph, graph neural networks, and convolutional neural networks to detect vulnerability code. The experimental results show that this method outperforms other vulnerability detection methods.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Software Engineering

The Generation of 3D Surface Meshes for NURBS-Enhanced FEM

Xi Zou, Sui Bun Lo, Ruben Sevilla, Oubay Hassan, Kenneth Morgan

Summary: This work presents a new method for generating triangular surface meshes in three dimensions for the NURBS-enhanced finite element method. The method allows for triangular elements that span across multiple NURBS surfaces, while maintaining the exact representation of the CAD geometry. This eliminates the need for de-featuring complex watertight CAD models and ensures compliance with user-specified spacing function requirements.

COMPUTER-AIDED DESIGN (2024)

Article Computer Science, Hardware & Architecture

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang

Summary: This paper discusses the use of electronic medical systems for remote diagnosis and treatment services, addressing concerns about privacy and proposing an efficient and novel identity authentication protocol with revocation and tracking. The protocol is based on a linear secret sharing scheme and provides security properties such as data integrity, confidentiality, non-repudiation, and data freshness.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Interdisciplinary Applications

A Branch and Bound algorithm for multidimensional Holder optimization: Estimation of the age-dependent viral hepatitis A infection force

Bechir Naffeti, Hamadi Ammar, Walid Ben Aribi

Summary: This paper proposes a branch and bound multidimensional Holder optimization method, which converts a multivariate objective function into a single variable function and minimizes it using an iterative optimization method. The method is applied to solve a parameters identification problem resulting from the increase in infections, providing information about the prevalence and infection force.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Interdisciplinary Applications

Autonomous bonobo optimization algorithm for power allocation in wireless networks

Heba F. Eid, Erik Cuevas, Romany F. Mansour

Summary: The proposed modified Bonobo optimizer algorithm dynamically adjusts the trajectory of each search agent to overcome the flaw of the original algorithm and improve the performance and solution quality by exploring and exploiting different regions of the solution space.

MATHEMATICS AND COMPUTERS IN SIMULATION (2024)

Article Computer Science, Hardware & Architecture

Web service discovery: Rationale, challenges, and solution directions

Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal

Summary: Service Oriented Architecture (SOA) is a methodology for promoting cooperation between services with diverse functions. Web service technology has paved the way for microservice architecture, but the increasing number of services has made it challenging to find the most suitable one. Various approaches have been proposed to improve the effectiveness and quality of service discovery, but there is a lack of comprehensive overview of web service discovery techniques. Therefore, a systematic literature review was conducted to analyze and classify existing methodologies and tools for discovering web services.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Self-tallying e-voting with public traceability based on blockchain

Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su

Summary: In the post-epidemic era, the importance of e-voting in facilitating distributed decision-making is highlighted. This paper proposes a blockchain-based self-tallying e-voting system to address the limitations of existing systems and improve fairness and accountability.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An extension of iStar for Machine Learning requirements by following the PRISE methodology

Jose M. Barrera, Alejandro Reina-Reina, Ana Lavalle, Alejandro Mate, Juan Trujillo

Summary: The rise of AI and Deep Learning has made ML a common practice, but successful ML projects require domain knowledge and expertise in algorithms and data processing. This paper presents an approach to capture ML requirements and applies it to real-world projects, showing improved algorithm selection and data preprocessing, and adaptability to different domains.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Software Engineering

An industrial experience report on model-based, AI-enabled proposal development for an RFP/RFI

Padmalata Nistala, Asha Rajbhoj, Vinay Kulkarni, Sapphire Noronha, Ankit Joshi

Summary: This paper presents an automated proposal development approach using a combination of model-based and AI-enabled techniques, and discusses the successful deployment and user feedback of the system.

SCIENCE OF COMPUTER PROGRAMMING (2024)

Article Computer Science, Hardware & Architecture

Over-threshold multi-party private set operation protocols for lightweight clients

Liju Ma, Hao Wang, Ziyu Niu, Zhi Li, Lei Wu, Xiaochao Wei, Ye Su

Summary: The problem of private set operation (PSO) has attracted wide attention from researchers in academia and industry as it enables data set analysis while preserving privacy. Over-threshold multi-party private set operation (OT-MP-PSO), a special class of PSO, finds applications in various scenarios such as voting systems and network operations centers. However, existing protocols have exponential computational costs with respect to the threshold t, limiting the range of t for efficient protocols. In this paper, we propose an efficient OT-MP-PSO protocol in the dual cloud setting without any limitation on the range of t. We also design a series of private set fine-grained computation protocols incorporating threshold conditions. Formal security proofs are provided for these protocols, and experimental results demonstrate their efficiency. Our protocol shows significant improvement over the state-of-the-art approach when applied to small data sets ranging from 101 to 103. A typical voting application scenario is also introduced to showcase the practicality of our protocols.

COMPUTER STANDARDS & INTERFACES (2024)