Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 12, Issue 10

2023 October - 28 articles

Cover Story: Distributed Computing Continuum Systems (DCCSs) have unleashed a computing paradigm that unifies various computing resources into an integrated continuum, including cloud, fog/edge, IoT, and mobile devices. First, we discuss the evolution of computing paradigms up to DCCSs. The general architectures and the benefits and limitations of each computing paradigm are analyzed. After that, our discussion continues about various computing devices to be part of DCCSs to achieve computational goals in current and futuristic applications. In addition, we delve into the key features and benefits of DCCSs from the perspective of current computing needs. Finally, we provide a comprehensive overview of emerging applications that need DCCS architecture and open challenges for the upcoming research. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Review
  • Open Access
70 Citations
42,165 Views
26 Pages

Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions

  • Amal Naitali,
  • Mohammed Ridouani,
  • Fatima Salahdine and
  • Naima Kaabouch

23 October 2023

Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipul...

  • Systematic Review
  • Open Access
16 Citations
9,672 Views
23 Pages

Application of Augmented Reality Interventions for Children with Autism Spectrum Disorder (ASD): A Systematic Review

  • A. B. M. S. U. Doulah,
  • Mirza Rasheduzzaman,
  • Faed Ahmed Arnob,
  • Farhana Sarker,
  • Nipa Roy,
  • Md. Anwar Ullah and
  • Khondaker A. Mamun

23 October 2023

Over the past 10 years, the use of augmented reality (AR) applications to assist individuals with special needs such as intellectual disabilities, autism spectrum disorder (ASD), and physical disabilities has become more widespread. The beneficial fe...

  • Article
  • Open Access
5 Citations
4,195 Views
29 Pages

Dependability Patterns: A Survey

  • Ingrid A. Buckley and
  • Eduardo B. Fernandez

21 October 2023

Patterns embody the experience and knowledge of designers and are effective ways to improve nonfunctional aspects of software systems. Although there are several catalogs and surveys of security patterns, there is no catalog or general survey about d...

  • Article
  • Open Access
3 Citations
2,366 Views
21 Pages

The SARS-CoV-2 Virus Detection with the Help of Artificial Intelligence (AI) and Monitoring the Disease Using Fractal Analysis

  • Mihai-Virgil Nichita,
  • Maria-Alexandra Paun,
  • Vladimir-Alexandru Paun and
  • Viorel-Puiu Paun

21 October 2023

This paper introduces an AI model designed for the diagnosis and monitoring of the SARS-CoV-2 virus. The present artificial intelligence (AI) model founded on the machine learning concept was created for the identification/recognition, keeping under...

  • Article
  • Open Access
3,393 Views
14 Pages

20 October 2023

A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and...

  • Article
  • Open Access
3 Citations
3,066 Views
18 Pages

Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications

  • Konstantinos Charmanas,
  • Konstantinos Georgiou,
  • Nikolaos Mittas and
  • Lefteris Angelis

20 October 2023

Home automation technologies are a vital part of humanity, as they provide convenience in otherwise mundane and repetitive tasks. In recent years, given the development of the Internet of Things (IoT) and artificial intelligence (AI) sectors, these t...

  • Article
  • Open Access
3 Citations
3,167 Views
18 Pages

17 October 2023

Due to increasing digitization, the amount of data in the Internet of Things (IoT) is constantly increasing. In order to be able to process queries efficiently, strategies must, therefore, be found to reduce the transmitted data as much as possible....

  • Review
  • Open Access
15 Citations
6,649 Views
25 Pages

17 October 2023

Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats assoc...

  • Article
  • Open Access
14 Citations
6,024 Views
17 Pages

Augmented Reality in Primary Education: An Active Learning Approach in Mathematics

  • Christina Volioti,
  • Christos Orovas,
  • Theodosios Sapounidis,
  • George Trachanas and
  • Euclid Keramopoulos

16 October 2023

Active learning, a student-centered approach, engages students in the learning process and requires them to solve problems using educational activities that enhance their learning outcomes. Augmented Reality (AR) has revolutionized the field of educa...

  • Article
  • Open Access
24 Citations
5,982 Views
18 Pages

The Potential of Machine Learning for Wind Speed and Direction Short-Term Forecasting: A Systematic Review

  • Décio Alves,
  • Fábio Mendonça,
  • Sheikh Shanawaz Mostafa and
  • Fernando Morgado-Dias

13 October 2023

Wind forecasting, which is essential for numerous services and safety, has significantly improved in accuracy due to machine learning advancements. This study reviews 23 articles from 1983 to 2023 on machine learning for wind speed and direction nowc...

  • Article
  • Open Access
3 Citations
2,186 Views
18 Pages

Novel Optimized Strategy Based on Multi-Next-Hops Election to Reduce Video Transmission Delay for GPSR Protocol over VANETs

  • Imane Zaimi,
  • Abdelali Boushaba,
  • Mohammed Oumsis,
  • Brahim Jabir,
  • Moulay Hafid Aabidi and
  • Adil EL Makrani

12 October 2023

Reducing transmission traffic delay is one of the most important issues that need to be considered for routing protocols, especially in the case of multimedia applications over vehicular ad hoc networks (VANET). To this end, we propose an extension o...

  • Article
  • Open Access
17 Citations
3,613 Views
36 Pages

11 October 2023

Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training M...

  • Article
  • Open Access
2 Citations
2,141 Views
14 Pages

10 October 2023

Two crucial challenges in Industry 4.0 involve maintaining critical latency requirements for data access and ensuring efficient power consumption by field devices. Traditional centralized industrial networks that provide rudimentary data distribution...

  • Article
  • Open Access
15 Citations
5,166 Views
20 Pages

An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets

  • Jamal Khudair Madhloom,
  • Zainab Hammoodi Noori,
  • Sif K. Ebis,
  • Oday A. Hassen and
  • Saad M. Darwish

8 October 2023

Due to the Internet’s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive...

  • Article
  • Open Access
4 Citations
3,408 Views
20 Pages

MalFe—Malware Feature Engineering Generation Platform

  • Avinash Singh,
  • Richard Adeyemi Ikuesan and
  • Hein Venter

8 October 2023

The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to co...

  • Article
  • Open Access
25 Citations
4,714 Views
22 Pages

Cervical Cancer Diagnosis Using Stacked Ensemble Model and Optimized Feature Selection: An Explainable Artificial Intelligence Approach

  • Abdulaziz AlMohimeed,
  • Hager Saleh,
  • Sherif Mostafa,
  • Redhwan M. A. Saad and
  • Amira Samy Talaat

7 October 2023

Cervical cancer affects more than half a million women worldwide each year and causes over 300,000 deaths. The main goals of this paper are to study the effect of applying feature selection methods with stacking models for the prediction of cervical...

  • Article
  • Open Access
24 Citations
5,767 Views
19 Pages

4 October 2023

In the digital age, the personalization of learning has become a critical priority in education. This article delves into the cutting-edge of educational innovation by exploring the essential role of ontology-based knowledge representation in transfo...

  • Article
  • Open Access
43 Citations
9,770 Views
29 Pages

Exploring the Potential of Distributed Computing Continuum Systems

  • Praveen Kumar Donta,
  • Ilir Murturi,
  • Victor Casamayor Pujol,
  • Boris Sedlak and
  • Schahram Dustdar

2 October 2023

Computing paradigms have evolved significantly in recent decades, moving from large room-sized resources (processors and memory) to incredibly small computing nodes. Recently, the power of computing has attracted almost all current application fields...

  • Article
  • Open Access
12 Citations
4,165 Views
13 Pages

Comparison of Automated Machine Learning (AutoML) Tools for Epileptic Seizure Detection Using Electroencephalograms (EEG)

  • Swetha Lenkala,
  • Revathi Marry,
  • Susmitha Reddy Gopovaram,
  • Tahir Cetin Akinci and
  • Oguzhan Topsakal

29 September 2023

Epilepsy is a neurological disease characterized by recurrent seizures caused by abnormal electrical activity in the brain. One of the methods used to diagnose epilepsy is through electroencephalogram (EEG) analysis. EEG is a non-invasive medical tes...

  • Article
  • Open Access
9 Citations
3,623 Views
25 Pages

An Improved Dandelion Optimizer Algorithm for Spam Detection: Next-Generation Email Filtering System

  • Mohammad Tubishat,
  • Feras Al-Obeidat,
  • Ali Safaa Sadiq and
  • Seyedali Mirjalili

28 September 2023

Spam emails have become a pervasive issue in recent years, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and...

  • Article
  • Open Access
4 Citations
2,985 Views
16 Pages

Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection

  • Abishek Manikandaraja,
  • Peter Aaby and
  • Nikolaos Pitropakis

28 September 2023

Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional...

  • Article
  • Open Access
19 Citations
6,764 Views
17 Pages

Predictive Modeling of Student Dropout in MOOCs and Self-Regulated Learning

  • Georgios Psathas,
  • Theano K. Chatzidaki and
  • Stavros N. Demetriadis

27 September 2023

The primary objective of this study is to examine the factors that contribute to the early prediction of Massive Open Online Courses (MOOCs) dropouts in order to identify and support at-risk students. We utilize MOOC data of specific duration, with a...

  • Article
  • Open Access
3 Citations
2,077 Views
19 Pages

26 September 2023

Nowadays, young students spend a lot of time playing video games and browsing on the Internet. Using the Internet has become even more widespread for young students due to the COVID-19 pandemic lockdown, which resulted in transferring several educati...

  • Article
  • Open Access
1 Citations
2,908 Views
16 Pages

24 September 2023

Control-flow statements often cause misunderstandings among novice computer science students. To better address these problems, teachers need to know the misconceptions that are typical at this stage. In this paper, we present the results of studying...

  • Communication
  • Open Access
12 Citations
4,192 Views
27 Pages

23 September 2023

In the last decade and a half, the world has experienced outbreaks of a range of viruses such as COVID-19, H1N1, flu, Ebola, Zika virus, Middle East Respiratory Syndrome (MERS), measles, and West Nile virus, just to name a few. During these virus out...

  • Article
  • Open Access
3 Citations
2,523 Views
14 Pages

Model and Fuzzy Controller Design Approaches for Stability of Modern Robot Manipulators

  • Shabnom Mustary,
  • Mohammod Abul Kashem,
  • Mohammad Asaduzzaman Chowdhury and
  • Jia Uddin

23 September 2023

Robotics is a crucial technology of Industry 4.0 that offers a diverse array of applications in the industrial sector. However, the quality of a robot’s manipulator is contingent on its stability, which is a function of the manipulator’s...

  • Article
  • Open Access
1 Citations
2,681 Views
16 Pages

Implementing Tensor-Organized Memory for Message Retrieval Purposes in Neuromorphic Chips

  • Arash Khajooei Nejad,
  • Mohammad (Behdad) Jamshidi and
  • Shahriar B. Shokouhi

22 September 2023

This paper introduces Tensor-Organized Memory (TOM), a novel neuromorphic architecture inspired by the human brain’s structural and functional principles. Utilizing spike-timing-dependent plasticity (STDP) and Hebbian rules, TOM exhibits cognit...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X