Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 12, Issue 9

2023 September - 21 articles

Cover Story: We developed a novel Hierarchical VPLS (H-VPLS) architecture via Q-in-Q tunneling on a commodity router. Our work is based on utilizing and enhancing two well-known open-source packages: Vector Packet Processing (VPP) as the router’s fast data plane and FRRouting (FRR), a modular control plane protocol suite, to implement VPLS. Both VPP and FRR have active and dynamic communities, and they are the only open-source frameworks that support VPLS. FRR in the control plane implements control messages and relevant signaling, while VPP in the data-plane side provides the capability of forwarding VPLS packets and manually labeling them. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
10 Citations
5,407 Views
20 Pages

Evaluating Video Games as Tools for Education on Fake News and Misinformation

  • Ruth S. Contreras-Espinosa and
  • Jose Luis Eguia-Gomez

21 September 2023

Despite access to reliable information being essential for equal opportunities in our society, current school curricula only include some notions about media literacy in a limited context. Thus, it is necessary to create scenarios for reflection on a...

  • Article
  • Open Access
3 Citations
3,030 Views
17 Pages

Addressing Uncertainty in Tool Wear Prediction with Dropout-Based Neural Network

  • Arup Dey,
  • Nita Yodo,
  • Om P. Yadav,
  • Ragavanantham Shanmugam and
  • Monsuru Ramoni

19 September 2023

Data-driven algorithms have been widely applied in predicting tool wear because of the high prediction performance of the algorithms, availability of data sets, and advancements in computing capabilities in recent years. Although most algorithms are...

  • Article
  • Open Access
12 Citations
4,559 Views
14 Pages

15 September 2023

During the last few years, several technological advances have led to an increase in the creation and consumption of audiovisual multimedia content. Users are overexposed to videos via several social media or video sharing websites and mobile phone a...

  • Article
  • Open Access
3 Citations
2,633 Views
52 Pages

Specification Mining over Temporal Data

  • Giacomo Bergami,
  • Samuel Appleby and
  • Graham Morgan

14 September 2023

Current specification mining algorithms for temporal data rely on exhaustive search approaches, which become detrimental in real data settings where a plethora of distinct temporal behaviours are recorded over prolonged observations. This paper propo...

  • Article
  • Open Access
3 Citations
2,894 Views
17 Pages

Process-Oriented Requirements Definition and Analysis of Software Components in Critical Systems

  • Benedetto Intrigila,
  • Giuseppe Della Penna,
  • Andrea D’Ambrogio,
  • Dario Campagna and
  • Malina Grigore

14 September 2023

Requirements management is a key aspect in the development of software components, since complex systems are often subject to frequent updates due to continuously changing requirements. This is especially true in critical systems, i.e., systems whose...

  • Article
  • Open Access
3 Citations
2,914 Views
14 Pages

Enhancing Counterfeit Detection with Multi-Features on Secure 2D Grayscale Codes

  • Bimo Sunarfri Hantono,
  • Syukron Abu Ishaq Alfarozi,
  • Azkario Rizky Pratama,
  • Ahmad Ataka Awwalur Rizqi,
  • I Wayan Mustika,
  • Mardhani Riasetiawan and
  • Anna Maria Sri Asih

14 September 2023

Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically f...

  • Article
  • Open Access
7 Citations
3,080 Views
15 Pages

13 September 2023

Image processing techniques are based nearly exclusively on RGB (red–green–blue) representation, which is significantly influenced by technological issues. The RGB triplet represents a mixture of the wavelength, saturation, and lightness...

  • Article
  • Open Access
2 Citations
2,290 Views
19 Pages

Building an Expert System through Machine Learning for Predicting the Quality of a Website Based on Its Completion

  • Vishnu Priya Biyyapu,
  • Sastry Kodanda Rama Jammalamadaka,
  • Sasi Bhanu Jammalamadaka,
  • Bhupati Chokara,
  • Bala Krishna Kamesh Duvvuri and
  • Raja Rao Budaraju

11 September 2023

The main channel for disseminating information is now the Internet. Users have different expectations for the calibre of websites regarding the posted and presented content. The website’s quality is influenced by up to 120 factors, each represe...

  • Article
  • Open Access
1 Citations
3,384 Views
25 Pages

7 September 2023

Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability...

  • Article
  • Open Access
6 Citations
2,354 Views
22 Pages

Optimized Downlink Scheduling over LTE Network Based on Artificial Neural Network

  • Falah Y. H. Ahmed,
  • Amal Abulgasim Masli,
  • Bashar Khassawneh,
  • Jabar H. Yousif and
  • Dilovan Asaad Zebari

7 September 2023

Long-Term Evolution (LTE) technology is utilized efficiently for wireless broadband communication for mobile devices. It provides flexible bandwidth and frequency with high speed and peak data rates. Optimizing resource allocation is vital for improv...

  • Article
  • Open Access
4 Citations
2,498 Views
17 Pages

7 September 2023

Online information cascades (tree-like structures formed by posts, comments, likes, replies, etc.) constitute the spine of the public online information environment, reflecting its various trends, evolving with it and, importantly, affecting its deve...

  • Article
  • Open Access
88 Citations
63,698 Views
23 Pages

Effect of Digital Game-Based Learning on Student Engagement and Motivation

  • Muhammad Nadeem,
  • Melinda Oroszlanyova and
  • Wael Farag

6 September 2023

Currently, academia is grappling with a significant problem—a lack of engagement. Humankind has gone too far into exploring entertainment options, while the education system has not really kept up. Millennials love playing games, and this addic...

  • Article
  • Open Access
2 Citations
4,878 Views
16 Pages

Attitudes towards Digital Educational Technologies Scale for University Students: Development and Validation

  • Irina A. Novikova,
  • Polina A. Bychkova,
  • Dmitriy A. Shlyakhta and
  • Alexey L. Novikov

5 September 2023

Numerous studies of the digitalization of higher education show that university students’ attitudes toward digital educational technologies (DETs) are one of the important psychological factors that can hinder or facilitate the optimal implemen...

  • Article
  • Open Access
30 Citations
3,241 Views
22 Pages

Novel Deep Feature Fusion Framework for Multi-Scenario Violence Detection

  • Sabah Abdulazeez Jebur,
  • Khalid A. Hussein,
  • Haider Kadhim Hoomod and
  • Laith Alzubaidi

5 September 2023

Detecting violence in various scenarios is a difficult task that requires a high degree of generalisation. This includes fights in different environments such as schools, streets, and football stadiums. However, most current research on violence dete...

  • Article
  • Open Access
5 Citations
3,862 Views
18 Pages

Automated Optimization-Based Deep Learning Models for Image Classification Tasks

  • Daudi Mashauri Migayo,
  • Shubi Kaijage,
  • Stephen Swetala and
  • Devotha G. Nyambo

1 September 2023

Applying deep learning models requires design and optimization when solving multifaceted artificial intelligence tasks. Optimization relies on human expertise and is achieved only with great exertion. The current literature concentrates on automating...

  • Article
  • Open Access
3 Citations
4,445 Views
18 Pages

29 August 2023

Recent supercomputers embody hundreds of thousands of compute nodes, and sometimes millions; as such, they are massively parallel systems. Node interconnection is thus critical to maximise the computing performance, and the torus topology has come ou...

  • Article
  • Open Access
1 Citations
2,110 Views
16 Pages

28 August 2023

Wireless mesh networks (WMNs) offer a pragmatic solution with a cost-effective ratio when provisioning ubiquitous broadband internet access and diverse telecommunication systems. The conceptual underpinning of mesh networks finds application not only...

  • Article
  • Open Access
7 Citations
2,838 Views
17 Pages

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

  • Hasan Hashim,
  • Ahmad Reda Alzighaibi,
  • Amaal Farag Elessawy,
  • Ibrahim Gad,
  • Hatem Abdul-Kader and
  • Asmaa Elsaid

28 August 2023

A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending...

  • Article
  • Open Access
10 Citations
5,685 Views
24 Pages

26 August 2023

Social media has become common as a means to convey opinions and express the extent of satisfaction and dissatisfaction with a service or product. In the Kingdom of Saudi Arabia specifically, most social media users share positive and negative opinio...

  • Article
  • Open Access
11 Citations
3,565 Views
20 Pages

24 August 2023

The Digital Education Action Plan (2021–2027) launched by the European Commission aims to revolutionize education systems, prioritizing the development of a robust digital education ecosystem and the enhancement of teachers’ digital trans...

  • Article
  • Open Access
2 Citations
3,019 Views
13 Pages

Kids Surfing the Web: A Comparative Study in Portugal

  • Angélica Monteiro,
  • Cláudia Sousa and
  • Rita Barros

23 August 2023

The conditions for safe Internet access and the development of skills enabling full participation in online environments are recognized in the Council of Europe’s strategy for child rights, from 2022. The guarantee of this right has implication...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X