Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 14, Issue 3

2025 March - 36 articles

Cover Story: This paper presents a comprehensive overview of Intrusion Detection Systems (IDSs) for computer networking security, addressing the following topics: IDS architectures and types, key detection techniques, datasets, test environments, implementations in modern network environments, current challenges, limitations, and emerging trends. It also discusses the major components of computer networks, common models and their characteristics, and vulnerabilities. This paper differentiates itself from prior reviews by considering a broad scope of IDS technologies, including advanced technologies like AI and blockchain, providing comprehensive dataset analysis. Key challenges in this field highlighted in the overview include reducing false positives, handling encrypted traffic, improving energy efficiency, and enhancing resilience against adversarial attacks to meet evolving cybersecurity demands. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access
1 Citations
669 Views
35 Pages

Hellenic Open University has developed Onlabs, a virtual biology laboratory designed to safely and effectively prepare its students for hands-on work in the university’s on-site labs. This platform simulates key experimental processes, such as...

  • Article
  • Open Access
2 Citations
991 Views
23 Pages

The smart-pixel-based optical convolutional neural network was proposed to improve kernel refresh rates in scalable optical convolutional neural networks (CNNs) by replacing the spatial light modulator with a smart pixel light modulator while preserv...

  • Article
  • Open Access
1,873 Views
40 Pages

A Novel Approach to Efficiently Verify Sequential Consistency in Concurrent Programs

  • Mohammed H. Abdulwahhab,
  • Parosh Aziz Abdulla and
  • Karwan Jacksi

Verifying sequential consistency (SC) in concurrent programs is computationally challenging due to the exponential growth of possible interleavings among read and write operations. Many of these interleavings produce identical outcomes, rendering exh...

  • Article
  • Open Access
2 Citations
3,185 Views
15 Pages

Transformer-Based Student Engagement Recognition Using Few-Shot Learning

  • Wejdan Alarefah,
  • Salma Kammoun Jarraya and
  • Nihal Abuzinadah

Improving the recognition of online learning engagement is a critical issue in educational information technology, due to the complexities of student behavior and varying assessment standards. Additionally, the scarcity of publicly available datasets...

  • Article
  • Open Access
7 Citations
2,613 Views
19 Pages

Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection

  • Mohammad Almseidin,
  • Amjad Gawanmeh,
  • Maen Alzubi,
  • Jamil Al-Sawwa,
  • Ashraf S. Mashaleh and
  • Mouhammd Alkasassbeh

Deep Neural Networks (DNNs) have been widely used to solve complex problems in natural language processing, image classification, and autonomous systems. The strength of DNNs is derived from their ability to model complex functions and to improve det...

  • Article
  • Open Access
2,031 Views
22 Pages

The present study discusses the design and development of a digital repository for the preservation and dissemination of the cultural and natural heritage of Zakynthos Island (Greece). Following a crowdsourcing approach, the platform allows users to...

  • Article
  • Open Access
2 Citations
2,562 Views
23 Pages

Coordination among multiple interdependent processes and stakeholders and the allocation of optimal resources make enterprise systems management a challenging process. Even for experienced professionals, it is not uncommon to cause inefficiencies and...

  • Article
  • Open Access
3 Citations
1,366 Views
27 Pages

Evaluating Optimal Deep Learning Models for Freshness Assessment of Silver Barb Through Technique for Order Preference by Similarity to Ideal Solution with Linear Programming

  • Atchara Choompol,
  • Sarayut Gonwirat,
  • Narong Wichapa,
  • Anucha Sriburum,
  • Sarayut Thitapars,
  • Thanakorn Yarnguy,
  • Noppakun Thongmual,
  • Waraporn Warorot,
  • Kiatipong Charoenjit and
  • Ronnachai Sangmuenmao

Automating fish freshness assessment is crucial for ensuring quality control and operational efficiency in large-scale fish processing. This study evaluates deep learning models for classifying the freshness of Barbonymus gonionotus (Silver Barb) and...

  • Article
  • Open Access
5 Citations
2,133 Views
25 Pages

Nowadays, quantum computing is developing at an unprecedented speed. This will pose a serious threat to the security of widely used public-key cryptosystems in the near future. Scientists are actively looking for ways to protect against quantum attac...

  • Article
  • Open Access
1 Citations
3,564 Views
16 Pages

In recent years, the advances in deep neural networks (DNNs) and large language models (LLMs) have led to major breakthroughs and new levels of performance in Natural Language Processing (NLP), including tasks related to speech processing. Based on t...

  • Article
  • Open Access
2 Citations
4,697 Views
23 Pages

This research explores opportunities for generative artificial intelligence (GenAI) in higher education constituent (customer) relationship management (CRM) to address the industry’s need for digital transformation driven by demographic shifts,...

  • Article
  • Open Access
4 Citations
4,754 Views
12 Pages

Multifaceted Assessment of Responsible Use and Bias in Language Models for Education

  • Ishrat Ahmed,
  • Wenxing Liu,
  • Rod D. Roscoe,
  • Elizabeth Reilley and
  • Danielle S. McNamara

Large language models (LLMs) are increasingly being utilized to develop tools and services in various domains, including education. However, due to the nature of the training data, these models are susceptible to inherent social or cognitive biases,...

  • Review
  • Open Access
7 Citations
3,297 Views
31 Pages

Fog Service Placement Optimization: A Survey of State-of-the-Art Strategies and Techniques

  • Hemant Kumar Apat,
  • Veena Goswami,
  • Bibhudatta Sahoo,
  • Rabindra K. Barik and
  • Manob Jyoti Saikia

The rapid development of Internet of Things (IoT) devices in various smart city-based applications such as healthcare, traffic management systems, environment sensing systems, and public safety systems produce large volumes of data. To process these...

  • Article
  • Open Access
1 Citations
2,067 Views
23 Pages

This paper presents MultiGLICE (Multi class Graph Neural Network with Program Slice), a model for static code analysis to detect security vulnerabilities. MultiGLICE extends our previous GLICE model with multiclass detection for a large number of vul...

  • Article
  • Open Access
2 Citations
1,207 Views
21 Pages

Optimization algorithms for solving technological and scientific problems often face long convergence times and high computational costs due to numerous input/output parameters and complex calculations. This study focuses on proposing a method for mi...

  • Article
  • Open Access
3 Citations
5,173 Views
17 Pages

A Chatbot Student Support System in Open and Distance Learning Institutions

  • Juliana Ngozi Ndunagu,
  • Christiana Uchenna Ezeanya,
  • Benjamin Osondu Onuorah,
  • Jude Chukwuma Onyeakazi and
  • Elochukwu Ukwandu

The disruptive innovation of artificial intelligence (AI) chatbots is affecting educational dominance, which must be considered by higher educational institutions. Open and Distance Learning (ODL) becomes imperative for the effective and interactive...

  • Article
  • Open Access
6 Citations
4,892 Views
21 Pages

Sarcasm detection is a crucial task in natural language processing (NLP), particularly in sentiment analysis and opinion mining, where sarcasm can distort sentiment interpretation. Accurately identifying sarcasm remains challenging due to its context...

  • Article
  • Open Access
1 Citations
4,966 Views
25 Pages

Recent AI-assisted coding tools, such as GitHub Copilot and Cursor, have enhanced developer productivity through real-time snippet suggestions. However, these tools primarily assist with isolated coding tasks and lack a structured approach to automat...

  • Review
  • Open Access
35 Citations
13,366 Views
27 Pages

Machine learning (ML) and deep learning (DL), subsets of artificial intelligence (AI), are the core technologies that lead significant transformation and innovation in various industries by integrating AI-driven solutions. Understanding ML and DL is...

  • Article
  • Open Access
2,674 Views
15 Pages

The rapid development of technology sets its own rules for adults and children. For younger schoolchildren, acquiring digital skills from primary school will give them the confidence to apply them correctly in school, at university, and in their live...

  • Article
  • Open Access
1 Citations
3,801 Views
19 Pages

Improving Road Safety with AI: Automated Detection of Signs and Surface Damage

  • Davide Merolla,
  • Vittorio Latorre,
  • Antonio Salis and
  • Gianluca Boanelli

Public transportation plays a crucial role in our lives, and the road network is a vital component in the implementation of smart cities. Recent advancements in AI have enabled the development of advanced monitoring systems capable of detecting anoma...

  • Article
  • Open Access
4 Citations
2,736 Views
26 Pages

There is an ongoing need to evaluate whether commonly used educational software effectively supports inquiry-based learning and computational thinking skills development, which are key objectives in secondary STEM curricula. This research establishes...

  • Article
  • Open Access
4 Citations
2,858 Views
24 Pages

Fuzzy Memory Networks and Contextual Schemas: Enhancing ChatGPT Responses in a Personalized Educational System

  • Christos Troussas,
  • Akrivi Krouska,
  • Phivos Mylonas,
  • Cleo Sgouropoulou and
  • Ioannis Voyiatzis

Educational AI systems often do not employ proper sophistication techniques to enhance learner interactions, organize their contextual knowledge or even deliver personalized feedback. To address this gap, this paper seeks to reform the way ChatGPT su...

  • Article
  • Open Access
3 Citations
5,062 Views
21 Pages

This paper presents a traffic sign recognition (TSR) system based on the deep convolutional neural network (CNN) architecture, which proves to be extremely accurate in recognizing traffic signs under challenging conditions such as bad weather, low-re...

  • Review
  • Open Access
46 Citations
27,458 Views
44 Pages

The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risk...

  • Article
  • Open Access
2 Citations
1,976 Views
24 Pages

An Empirical Evaluation of Neural Network Architectures for 3D Spheroid Segmentation

  • Fadoua Oudouar,
  • Ahmed Bir-Jmel,
  • Hanane Grissette,
  • Sidi Mohamed Douiri,
  • Yassine Himeur,
  • Sami Miniaoui,
  • Shadi Atalla and
  • Wathiq Mansoor

28 February 2025

The accurate segmentation of 3D spheroids is crucial in advancing biomedical research, particularly in understanding tumor development and testing therapeutic responses. As 3D spheroids emulate in vivo conditions more closely than traditional 2D cult...

  • Article
  • Open Access
4 Citations
2,688 Views
21 Pages

FungiLT: A Deep Learning Approach for Species-Level Taxonomic Classification of Fungal ITS Sequences

  • Kai Liu,
  • Hongyuan Zhao,
  • Dongliang Ren,
  • Dongna Ma,
  • Shuangping Liu and
  • Jian Mao

28 February 2025

With the explosive growth of sequencing data, rapidly and accurately classifying and identifying species has become a critical challenge in amplicon analysis research. The internal transcribed spacer (ITS) region is widely used for fungal species cla...

  • Article
  • Open Access
1,500 Views
19 Pages

27 February 2025

The combination of connectivity and automation allows connected and autonomous vehicles (CAVs) to operate autonomously using advanced on-board sensors while communicating with each other via vehicle-to-vehicle (V2V) technology to enhance safety, effi...

  • Article
  • Open Access
19 Citations
9,427 Views
21 Pages

Predicting Student Performance and Enhancing Learning Outcomes: A Data-Driven Approach Using Educational Data Mining Techniques

  • Athanasios Angeioplastis,
  • John Aliprantis,
  • Markos Konstantakis and
  • Alkiviadis Tsimpiris

27 February 2025

This study investigates the use of educational data mining (EDM) techniques to predict student performance and enhance learning outcomes in higher education. Leveraging data from Moodle, a widely used learning management system (LMS), we analyzed 450...

  • Article
  • Open Access
18 Citations
6,642 Views
23 Pages

25 February 2025

Recent advancements across various sectors have resulted in a significant increase in the utilization of smart gadgets. This augmentation has resulted in an expansion of the network and the devices linked to it. Nevertheless, the development of the n...

  • Article
  • Open Access
2 Citations
893 Views
26 Pages

24 February 2025

Priority in task scheduling and resource allocation for cloud computing has attracted significant attention from the research community. However, traditional scheduling algorithms often lack the ability to differentiate between tasks with varying lev...

  • Article
  • Open Access
2 Citations
3,186 Views
23 Pages

SDKU-Net: A Novel Architecture with Dynamic Kernels and Optimizer Switching for Enhanced Shadow Detection in Remote Sensing

  • Gilberto Alvarado-Robles,
  • Isac Andres Espinosa-Vizcaino,
  • Carlos Gustavo Manriquez-Padilla and
  • Juan Jose Saucedo-Dorantes

23 February 2025

Shadows in remote sensing images often introduce challenges in accurate segmentation due to their variability in shape, size, and texture. To address these issues, this study proposes the Supervised Dynamic Kernel U-Net (SDKU-Net), a novel architectu...

  • Article
  • Open Access
1 Citations
2,617 Views
32 Pages

Latent Outlier Exposure in Real-Time Anomaly Detection at the Large Hadron Collider

  • Thomas Dartnall Stern,
  • Amit Kumar Mishra and
  • James Michael Keaveney

20 February 2025

We propose a novel approach to real-time anomaly detection at the Large Hadron Collider, aimed at enhancing the discovery potential for new fundamental phenomena in particle physics. Our method leverages the Latent Outlier Exposure technique and is e...

  • Article
  • Open Access
2 Citations
1,763 Views
19 Pages

20 February 2025

Patent keyword analysis involves extracting and examining keywords from patent documents. Since patents contain detailed information about technologies, analyzing them can provide valuable insights for efficient technology management. This paper prop...

  • Article
  • Open Access
3 Citations
2,402 Views
14 Pages

CONNECT: An AI-Powered Solution for Student Authentication and Engagement in Cross-Cultural Digital Learning Environments

  • Bilal Hassan,
  • Muhammad Omer Raza,
  • Yusra Siddiqi,
  • Muhammad Farooq Wasiq and
  • Rabiya Ayesha Siddiqui

20 February 2025

The COVID-19 pandemic accelerated the shift to digital education as universities across the world rapidly adopted virtual classrooms for remote learning. Ensuring continuous student engagement in virtual environments remains one of the key challenges...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X