Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 12, Issue 8

2023 August - 21 articles

Cover Story: Since the adoption of connected and automated vehicles is not expected to happen instantly, not all its elements are going to be connected at the early deployment stages. We consider a scenario where vehicles approaching a traffic light are connected to each other, but the traffic light itself is not cooperative. Information about indented trajectories such as decisions on how and when to accelerate, decelerate and stop, is communicated among the vehicles involved. We provide an optimization-based procedure for the efficient and safe passing of traffic lights or other temporary road blockages using vehicle-to-vehicle communication. We locally optimize objectives that promote efficiency such as less deceleration and larger minimum velocity, while maintaining safety. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
12 Citations
4,379 Views
13 Pages

Brain Pathology Classification of MR Images Using Machine Learning Techniques

  • Nehad T. A. Ramaha,
  • Ruaa M. Mahmood,
  • Alaa Ali Hameed,
  • Norma Latif Fitriyani,
  • Ganjar Alfian and
  • Muhammad Syafrudin

19 August 2023

A brain tumor is essentially a collection of aberrant tissues, so it is crucial to classify tumors of the brain using MRI before beginning therapy. Tumor segmentation and classification from brain MRI scans using machine learning techniques are widel...

  • Article
  • Open Access
11 Citations
3,559 Views
19 Pages

19 August 2023

Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer...

  • Article
  • Open Access
7 Citations
4,309 Views
19 Pages

Pm2.5 Time Series Imputation with Deep Learning and Interpolation

  • Anibal Flores,
  • Hugo Tito-Chura,
  • Deymor Centty-Villafuerte and
  • Alejandro Ecos-Espino

16 August 2023

Commonly, regression for time series imputation has been implemented directly through regression models, statistical, machine learning, and deep learning techniques. In this work, a novel approach is proposed based on a classification model that dete...

  • Article
  • Open Access
8 Citations
2,490 Views
17 Pages

Requirement Change Prediction Model for Small Software Systems

  • Rida Fatima,
  • Furkh Zeshan,
  • Adnan Ahmad,
  • Muhamamd Hamid,
  • Imen Filali,
  • Amel Ali Alhussan and
  • Hanaa A. Abdallah

14 August 2023

The software industry plays a vital role in driving technological advancements. Software projects are complex and consist of many components, so change is unavoidable in these projects. The change in software requirements must be predicted early to p...

  • Article
  • Open Access
1 Citations
1,987 Views
20 Pages

14 August 2023

Currently, single-board computers (SBCs) are sufficiently powerful to run real-time operating systems (RTOSs) and applications. The purpose of this research was to investigate the timing performance of an NXP TWR-K70F120M device with μClinux OS on...

  • Article
  • Open Access
4 Citations
2,874 Views
16 Pages

Face Detection Using a Capsule Network for Driver Monitoring Application

  • János Hollósi,
  • Áron Ballagi,
  • Gábor Kovács,
  • Szabolcs Fischer and
  • Viktor Nagy

12 August 2023

Bus driver distraction and cognitive load lead to higher accident risk. Driver distraction sources and complex physical and psychological effects must be recognized and analyzed in real-world driving conditions to reduce risk and enhance overall road...

  • Article
  • Open Access
15 Citations
4,603 Views
34 Pages

Stochastic Modeling for Intelligent Software-Defined Vehicular Networks: A Survey

  • Banoth Ravi,
  • Blesson Varghese,
  • Ilir Murturi,
  • Praveen Kumar Donta,
  • Schahram Dustdar,
  • Chinmaya Kumar Dehury and
  • Satish Narayana Srirama

12 August 2023

Digital twins and the Internet of Things (IoT) have gained significant research attention in recent years due to their potential advantages in various domains, and vehicular ad hoc networks (VANETs) are one such application. VANETs can provide a wide...

  • Review
  • Open Access
54 Citations
10,470 Views
45 Pages

Medical Image Encryption: A Comprehensive Review

  • Saja Theab Ahmed,
  • Dalal Abdulmohsin Hammood,
  • Raad Farhood Chisab,
  • Ali Al-Naji and
  • Javaan Chahl

11 August 2023

In medical information systems, image data can be considered crucial information. As imaging technology and methods for analyzing medical images advance, there will be a greater wealth of data available for study. Hence, protecting those images is es...

  • Article
  • Open Access
2 Citations
2,024 Views
14 Pages

Recently, balanced Boolean functions with an even number n of variables achieving very good autocorrelation properties have been obtained for 12n26. These functions attain the maximum absolute value in the autocorrelation spectra (without con...

  • Article
  • Open Access
18 Citations
2,510 Views
19 Pages

Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm

  • Nahla Nur Elmadina,
  • Rashid Saeed,
  • Elsadig Saeid,
  • Elmustafa Sayed Ali,
  • Maha Abdelhaq,
  • Raed Alsaqour and
  • Nawaf Alharbe

This paper focuses on downlink power allocation for a cognitive radio-based non-orthogonal multiple access (CR-NOMA) system in a femtocell environment involving device-to-device (D2D) communication. The proposed power allocation scheme employs the gr...

  • Article
  • Open Access
12 Citations
3,577 Views
16 Pages

In present times, the Internet of Things (IoT) is becoming the new era in technology by including smart devices in every aspect of our lives. Smart devices in IoT environments are increasing and storing large amounts of sensitive data, which attracts...

  • Article
  • Open Access
4 Citations
2,588 Views
15 Pages

A Comprehensive Approach to Image Protection in Digital Environments

  • William Villegas-Ch,
  • Joselin García-Ortiz and
  • Jaime Govea

Protecting the integrity of images has become a growing concern due to the ease of manipulation and unauthorized dissemination of visual content. This article presents a comprehensive approach to safeguarding images’ authenticity and reliabilit...

  • Article
  • Open Access
2 Citations
2,202 Views
16 Pages

Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing

  • Johan Thunberg,
  • Taqwa Saeed,
  • Galina Sidorenko,
  • Felipe Valle and
  • Alexey Vinel

Connected and automated vehicles (CAVs) will be a key component of future cooperative intelligent transportation systems (C-ITS). Since the adoption of C-ITS is not foreseen to happen instantly, not all of its elements are going to be connected at th...

  • Review
  • Open Access
346 Citations
152,726 Views
13 Pages

Impact of the Implementation of ChatGPT in Education: A Systematic Review

  • Marta Montenegro-Rueda,
  • José Fernández-Cerero,
  • José María Fernández-Batanero and
  • Eloy López-Meneses

The aim of this study is to present, based on a systematic review of the literature, an analysis of the impact of the application of the ChatGPT tool in education. The data were obtained by reviewing the results of studies published since the launch...

  • Article
  • Open Access
20 Citations
4,058 Views
13 Pages

Automated Diagnosis of Prostate Cancer Using mpMRI Images: A Deep Learning Approach for Clinical Decision Support

  • Anil B. Gavade,
  • Rajendra Nerli,
  • Neel Kanwal,
  • Priyanka A. Gavade,
  • Shridhar Sunilkumar Pol and
  • Syed Tahir Hussain Rizvi

Prostate cancer (PCa) is a significant health concern for men worldwide, where early detection and effective diagnosis can be crucial for successful treatment. Multiparametric magnetic resonance imaging (mpMRI) has evolved into a significant imaging...

  • Article
  • Open Access
1 Citations
2,308 Views
12 Pages

Knowing the correct positioning of the tongue and mouth for pronunciation is crucial for learning English pronunciation correctly. Articulatory animation is an effective way to address the above task and helpful to English learners. However, articula...

  • Article
  • Open Access
3 Citations
3,505 Views
19 Pages

In contemporary software development, it is crucial to adhere to design patterns because well-organized and readily maintainable source code facilitates bug fixes and the development of new features. A carefully selected set of design patterns can ha...

  • Article
  • Open Access
24 Citations
5,042 Views
27 Pages

The rapid development of Internet of Things (IoT) networks has revealed multiple security issues. On the other hand, machine learning (ML) has proven its efficiency in building intrusion detection systems (IDSs) intended to reinforce the security of...

  • Article
  • Open Access
9 Citations
3,354 Views
10 Pages

Feature selection is a crucial step in machine learning, aiming to identify the most relevant features in high-dimensional data in order to reduce the computational complexity of model development and improve generalization performance. Ensemble feat...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X