Skip to Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 12, Issue 6

2023 June - 17 articles

Cover Story: This paper addresses the complex task of introducing programming to secondary school students for the first time to improve the students’ computational thinking (CT) skills by using a visual execution environment (VEE). This introduced concepts that should be covered in any introductory course, namely: variables, input and output, conditionals, loops, arrays, functions, and files. This study explores two approaches to achieve this goal: visual programming (Scratch) and text programming (Java). Additionally, it proposes an AI recommendation model into the VEE to further improve the effectiveness of developing CT among secondary education students. This integrated model combines the capabilities of an AI learning system module and a personalized learning module. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
39 Citations
7,016 Views
21 Pages

Arabic Sentiment Analysis Based on Word Embeddings and Deep Learning

  • Nasrin Elhassan,
  • Giuseppe Varone,
  • Rami Ahmed,
  • Mandar Gogate,
  • Kia Dashtipour,
  • Hani Almoamari,
  • Mohammed A. El-Affendi,
  • Bassam Naji Al-Tamimi,
  • Faisal Albalwy and
  • Amir Hussain

Social media networks have grown exponentially over the last two decades, providing the opportunity for users of the internet to communicate and exchange ideas on a variety of topics. The outcome is that opinion mining plays a crucial role in analyzi...

  • Article
  • Open Access
3 Citations
9,900 Views
12 Pages

An Analysis of Neighbor Discovery Protocol Attacks

  • Firas Najjar,
  • Qusay Bsoul and
  • Hasan Al-Refai

Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices...

  • Article
  • Open Access
11 Citations
6,260 Views
22 Pages

Social media platforms have revolutionized information exchange and socialization in today’s world. Twitter, as one of the prominent platforms, enables users to connect with others and express their opinions. This study focuses on analyzing use...

  • Article
  • Open Access
22 Citations
4,319 Views
17 Pages

Optimizing Water Distribution through Explainable AI and Rule-Based Control

  • Enrico Ferrari,
  • Damiano Verda,
  • Nicolò Pinna and
  • Marco Muselli

Optimizing water distribution both from an energy-saving perspective and from a quality of service perspective is a challenging task since it involves a complex system with many nodes, many hidden variables and many operational constraints. For this...

  • Article
  • Open Access
7 Citations
4,315 Views
22 Pages

A Learning Framework for Supporting Digital Innovation Hubs

  • Joao Sarraipa,
  • Majid Zamiri,
  • Elsa Marcelino-Jesus,
  • Andreia Artifice,
  • Ricardo Jardim-Goncalves and
  • Néjib Moalla

With the increasing demand for digital transformation and (digital) technology transfer (TT), digital innovation hubs (DIHs) are the new piece of the puzzle of our economy and industries’ landscapes. Evidence shows that DIHs can provide good op...

  • Article
  • Open Access
11 Citations
3,827 Views
16 Pages

Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim’s machine or encrypts his person...

  • Article
  • Open Access
5 Citations
2,716 Views
22 Pages

In today’s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reve...

  • Article
  • Open Access
6 Citations
4,091 Views
17 Pages

A Query Expansion Benchmark on Social Media Information Retrieval: Which Methodology Performs Best and Aligns with Semantics?

  • Evangelos A. Stathopoulos,
  • Anastasios I. Karageorgiadis,
  • Alexandros Kokkalas,
  • Sotiris Diplaris,
  • Stefanos Vrochidis and
  • Ioannis Kompatsiaris

This paper presents a benchmarking survey on query expansion techniques for social media information retrieval, with a focus on comparing the performance of methods using semantic web technologies. The study evaluated query expansion techniques such...

  • Article
  • Open Access
30 Citations
5,070 Views
30 Pages

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

  • Antonio Maci,
  • Alessandro Santorsola,
  • Antonio Coscia and
  • Andrea Iannacone

Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are par...

  • Article
  • Open Access
2,079 Views
19 Pages

Combining MAS-GiG Model and Related Problems to Optimization in Emergency Evacuation

  • Dinh Thi Hong Huyen,
  • Hoang Thi Thanh Ha and
  • Michel Occello

Emergency evacuation is of paramount importance in protecting human lives and property while enhancing the effectiveness and preparedness of organizations and management agencies in responding to emergencies. In this paper, we propose a method for ev...

  • Article
  • Open Access
4 Citations
3,108 Views
19 Pages

The opinion dynamics literature argues that the way people perceive social influence depends not only on the opinions of interacting individuals, but also on the individuals’ non-opinion characteristics, such as age, education, gender, or place...

  • Article
  • Open Access
31 Citations
5,148 Views
17 Pages

Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks

  • Subhan Ullah,
  • Zahid Mahmood,
  • Nabeel Ali,
  • Tahir Ahmad and
  • Attaullah Buriro

The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In th...

  • Review
  • Open Access
9 Citations
4,257 Views
11 Pages

The concept of the health wallet, a digital platform that consolidates health-related information, has garnered significant attention in the past year. Electronic health data storage and transmission have become increasingly prevalent in the healthca...

  • Article
  • Open Access
5 Citations
4,439 Views
17 Pages

There is a growing interest in finding new ways to address the difficult task of introducing programming to secondary students for the first time to improve students’ computational thinking (CT) skills. Therefore, extensive research is required...

  • Article
  • Open Access
2 Citations
3,263 Views
26 Pages

Highly-skilled migrants and refugees finding employment in low-skill vocations, despite professional qualifications and educational backgrounds, has become a global tendency, mainly due to the language barrier. Employment prospects for displaced comm...

  • Article
  • Open Access
10 Citations
5,811 Views
16 Pages

Image Denoising by Deep Convolution Based on Sparse Representation

  • Shengqin Bian,
  • Xinyu He,
  • Zhengguang Xu and
  • Lixin Zhang

Noise filtering is a crucial task in digital image processing, performing the function of preprocessing. In this paper, we propose an algorithm that employs deep convolution and soft thresholding iterative algorithms to extract and learn the features...

  • Article
  • Open Access
1 Citations
2,944 Views
15 Pages

Persistence Landscapes—Implementing a Dataset Verification Method in Resource-Scarce Embedded Systems

  • Sérgio Branco,
  • Ertugrul Dogruluk,
  • João G. Carvalho,
  • Marco S. Reis and
  • Jorge Cabral

As more and more devices are being deployed across networks to gather data and use them to perform intelligent tasks, it is vital to have a tool to perform real-time data analysis. Data are the backbone of Machine Learning models, the core of intelli...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X