Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 9, Issue 2

2020 June - 32 articles

Cover Story: This article explores the enhanced mobile broadband (eMBB) service class, defined within the new 5G communication paradigm, and evaluates the impact of the transition from 4G to 5G access technology on the radio access network and transport network. Simulation results are obtained with ns3 and performance analyses are focused on 6 GHz radio scenarios for the radio access network, where a non-standalone 5G configuration has been assumed, and on SDN-based scenarios for the transport network. Inspired by the 5G Transformer model, we describe and simulate each single element of the three main functional plains of the proposed architecture to implement a preliminary evaluation of the end-to-end system performances. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
4 Citations
6,333 Views
11 Pages

Non-Fragmented Network Flow Design Analysis: Comparison IPv4 with IPv6 Using Path MTU Discovery

  • Thiago Lucas,
  • Maycon Ferreira,
  • Rychard Plachta,
  • Gabriel Ferreira and
  • Kelton Costa

With the expansion in the number of devices that connect to the Internet, a new area, known as the Internet of Things (IoT), appears. It was necessary to migrate the IPv4 protocol by the IPv6 protocol, due to the scarcity of IPv4 addresses. One of th...

  • Feature Paper
  • Article
  • Open Access
6 Citations
5,076 Views
24 Pages

Modern society is increasingly dependent on reliable performance of distributed systems. In this paper, we provide a precise definition of performance using the concept of quality attenuation; discuss its properties, measurement and decomposition; id...

  • Article
  • Open Access
14 Citations
10,030 Views
19 Pages

Cloud Computing for Climate Modelling: Evaluation, Challenges and Benefits

  • Diego Montes ,
  • Juan A. Añel ,
  • David C. H. Wallom ,
  • Peter Uhe ,
  • Pablo V. Caderno and
  • Tomás F. Pena

Cloud computing is a mature technology that has already shown benefits for a wide range of academic research domains that, in turn, utilize a wide range of application design models. In this paper, we discuss the use of cloud computing as a tool to i...

  • Article
  • Open Access
2 Citations
3,467 Views
13 Pages

This article is devoted to an approach to develop a safety system process according to functional safety standards. With the development of technologies and increasing the specific energy stored in the equipment, the issue of safety during operation...

  • Article
  • Open Access
6 Citations
3,903 Views
14 Pages

Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system ba...

  • Article
  • Open Access
4 Citations
3,524 Views
13 Pages

One of the important functions of cyberspace is to provide people and devices with access to global infocommunication resources, and as the network infrastructure develops, the number of access options increases, including those based on wireless tec...

  • Review
  • Open Access
6 Citations
9,801 Views
21 Pages

A Review of Memory Errors Exploitation in x86-64

  • Conor Pirry,
  • Hector Marco-Gisbert and
  • Carolyn Begg

Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5 million for one single vulnerability in Android and up to USD 2 million for Apple’s oper...

  • Article
  • Open Access
4 Citations
4,763 Views
26 Pages

Model Based Approach to Cyber–Physical Systems Status Monitoring

  • Alexander Vodyaho,
  • Saddam Abbas,
  • Nataly Zhukova and
  • Michael Chervoncev

The distinctive feature of new generation information systems is not only their complexity in terms of number of elements, number of connections and hierarchy levels, but also their constantly changing structure and behavior. In this situation the pr...

  • Article
  • Open Access
43 Citations
7,221 Views
14 Pages

Imagined speech is a relatively new electroencephalography (EEG) neuro-paradigm, which has seen little use in Brain-Computer Interface (BCI) applications. Imagined speech can be used to allow physically impaired patients to communicate and to use sma...

  • Article
  • Open Access
18 Citations
5,400 Views
20 Pages

GeoQoE-Vanet: QoE-Aware Geographic Routing Protocol for Video Streaming over Vehicular Ad-hoc Networks

  • Abdelkader Benmir,
  • Ahmed Korichi,
  • Abdelhabib Bourouis,
  • Mohammed Alreshoodi and
  • Laith Al-Jobouri

Video streaming is one of the challenging issues in vehicular ad-hoc networks (VANETs) due to their highly dynamic topology and frequent connectivity disruptions. Recent developments in the routing protocol methods used in VANETs have contributed to...

  • Article
  • Open Access
107 Citations
25,336 Views
43 Pages

The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive gr...

  • Article
  • Open Access
17 Citations
8,470 Views
18 Pages

Performance Evaluation of 5G Access Technologies and SDN Transport Network on an NS3 Simulator

  • Francesco G. Lavacca,
  • Pierpaolo Salvo,
  • Ludovico Ferranti,
  • Andrea Speranza and
  • Luca Costantini

In this article, we deal with the enhanced Mobile Broadband (eMBB) service class, defined within the new 5G communication paradigm, to evaluate the impact of the transition from 4G to 5G access technology on the Radio Access Network and on the Transp...

  • Article
  • Open Access
23 Citations
4,146 Views
10 Pages

The Markov model of reliability of a failover cluster performing calculations in a cyber-physical system is considered. The continuity of the cluster computing process in the event of a failure of the physical resources of the servers is provided on...

  • Article
  • Open Access
10 Citations
5,198 Views
20 Pages

A Unified Methodology for Heartbeats Detection in Seismocardiogram and Ballistocardiogram Signals

  • Niccolò Mora,
  • Federico Cocconcelli,
  • Guido Matrella and
  • Paolo Ciampolini

This work presents a methodology to analyze and segment both seismocardiogram (SCG) and ballistocardiogram (BCG) signals in a unified fashion. An unsupervised approach is followed to extract a template of SCG/BCG heartbeats, which is then used to fin...

  • Article
  • Open Access
21 Citations
7,394 Views
15 Pages

Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion

  • Wan Muhd Hazwan Azamuddin,
  • Rosilah Hassan,
  • Azana Hafizah Mohd Aman,
  • Mohammad Kamrul Hasan and
  • Ahmed Salih Al-Khaleefa

This study presents the proposed testbed implementation for the Advanced Technology Training Center (ADTEC) Batu Pahat, one of Malaysia’s industrial training institutes. The objectives of this study are to discover the issues regarding network...

  • Article
  • Open Access
6 Citations
5,342 Views
18 Pages

Inertial Sensor Based Solution for Finger Motion Tracking

  • Stepan Lemak,
  • Viktor Chertopolokhov,
  • Ivan Uvarov,
  • Anna Kruchinina,
  • Margarita Belousova,
  • Leonid Borodkin and
  • Maxim Mironenko

Hand motion tracking plays an important role in virtual reality systems for immersion and interaction purposes. This paper discusses the problem of finger tracking and proposes the application of the extension of the Madgwick filter and a simple swit...

  • Article
  • Open Access
14 Citations
6,883 Views
31 Pages

Complex Data Imputation by Auto-Encoders and Convolutional Neural Networks—A Case Study on Genome Gap-Filling

  • Luca Cappelletti,
  • Tommaso Fontana,
  • Guido Walter Di Donato,
  • Lorenzo Di Tucci,
  • Elena Casiraghi and
  • Giorgio Valentini

Missing data imputation has been a hot topic in the past decade, and many state-of-the-art works have been presented to propose novel, interesting solutions that have been applied in a variety of fields. In the past decade, the successful results ach...

  • Article
  • Open Access
4 Citations
5,183 Views
24 Pages

Indiscernibility Mask Key for Image Steganography

  • Piotr Artiemjew and
  • Aleksandra Kislak-Malinowska

Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means...

  • Article
  • Open Access
12 Citations
5,896 Views
30 Pages

Deep neural networks (DNNs) have shown a great achievement in acoustic modeling for speech recognition task. Of these networks, convolutional neural network (CNN) is an effective network for representing the local properties of the speech formants. H...

  • Article
  • Open Access
4,316 Views
17 Pages

Generating Trees for Comparison

  • Danijel Mlinarić,
  • Vedran Mornar and
  • Boris Milašinović

Tree comparisons are used in various areas with various statistical or dissimilarity measures. Given that data in various domains are diverse, and a particular comparison approach could be more appropriate for specific applications, there is a need t...

  • Article
  • Open Access
13 Citations
5,649 Views
11 Pages

There is a strong correlation between the like/dislike responses to audio–visual stimuli and the emotional arousal and valence reactions of a person. In the present work, our attention is focused on the automated detection of dislike responses...

  • Article
  • Open Access
2 Citations
5,403 Views
11 Pages

The high volume of user-generated content caused by the popular use of online social network services exposes users to different kinds of content that can be harmful or unwanted. Solutions to protect user privacy from such unwanted content cannot be...

  • Article
  • Open Access
3 Citations
6,031 Views
15 Pages

Design and Validation of a Minimal Complexity Algorithm for Stair Step Counting

  • Davide Coluzzi,
  • Massimo W. Rivolta,
  • Alfonso Mastropietro,
  • Simone Porcelli,
  • Marco L. Mauri,
  • Marta T. L. Civiello,
  • Enrico Denna,
  • Giovanna Rizzo and
  • Roberto Sassi

Wearable sensors play a significant role for monitoring the functional ability of the elderly and in general, promoting active ageing. One of the relevant variables to be tracked is the number of stair steps (single stair steps) performed daily, whic...

  • Article
  • Open Access
3 Citations
3,915 Views
20 Pages

In this paper, a new approach to solve Chance Constrained Problems (CCPs) using huge data sets is proposed. Specifically, instead of the conventional mathematical model, a huge data set is used to formulate CCP. This is because such a large data set...

  • Article
  • Open Access
108 Citations
9,290 Views
12 Pages

Deep Transfer Learning in Diagnosing Leukemia in Blood Cells

  • Mohamed Loey,
  • Mukdad Naman and
  • Hala Zayed

Leukemia is a fatal disease that threatens the lives of many patients. Early detection can effectively improve its rate of remission. This paper proposes two automated classification models based on blood microscopic images to detect leukemia by empl...

  • Article
  • Open Access
1 Citations
4,386 Views
16 Pages

In this work, the problem of eliminating a nonuniform rectilinear smearing of an image is considered, using a mathematical- and computer-based approach. An example of such a problem is a picture of several cars, moving with different speeds, taken wi...

  • Article
  • Open Access
49 Citations
8,715 Views
28 Pages

In the context of Industry 4.0, lot of effort is being put to achieve interoperability among industrial applications. As the definition and adoption of communication standards are of paramount importance for the realization of interoperability, durin...

  • Article
  • Open Access
5 Citations
7,200 Views
41 Pages

Program synthesis is defined as a software development step aims at achieving an automatic process of code generation that is satisfactory given high-level specifications. There are various program synthesis applications built on Machine Learning (ML...

  • Review
  • Open Access
17 Citations
6,790 Views
19 Pages

Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyrig...

  • Article
  • Open Access
14 Citations
5,026 Views
20 Pages

In vehicular networks, efficient multi-hop message dissemination can be used for various purposes, such a informing the driver about the recent emergency event or propagating the local dynamic map of a predefined region. Dissemination of warning info...

  • Article
  • Open Access
11 Citations
7,243 Views
21 Pages

Coupling metrics that count the number of inter-module connections in a software system are an established way to measure internal software quality with respect to modularity. In addition to static metrics, which are obtained from the source or compi...

  • Article
  • Open Access
12 Citations
5,694 Views
16 Pages

Accelerating Surface Tension Calculation in SPH via Particle Classification and Monte Carlo Integration

  • Fernando Zorilla,
  • Marcel Ritter,
  • Johannes Sappl,
  • Wolfgang Rauch and
  • Matthias Harders

Surface tension has a strong influence on the shape of fluid interfaces. We propose a method to calculate the corresponding forces efficiently. In contrast to several previous approaches, we discriminate to this end between surface and non-surface SP...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X