You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 11, Issue 3

March 2022 - 18 articles

Cover Story: Optimizing traffic signal control is a challenging problem, particularly when scaled to large networks. Several solutions exist for traffic signal control for small networks. However, adopting these solutions for large networks is often inefficient due to the complexity of interactions between intersections. An approach using empirical data and deep reinforcement learning can facilitate the development of intelligent solutions for large network traffic signal control. This paper presents a scalable model that relies on smart infrastructure to facilitate local data sharing and uses graph attention networks as the neural network for deep reinforcement learning. The model is expected to significantly enhance large network traffic signal performance while reducing the computational load. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Article
  • Open Access
14 Citations
3,929 Views
15 Pages

Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform

  • Mikhail Svetlakov,
  • Ilya Kovalev,
  • Anton Konev,
  • Evgeny Kostyuchenko and
  • Artur Mitsel

A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data. In this paper, we propose a subject-independent learning method for EEG-ba...

  • Article
  • Open Access
3 Citations
3,015 Views
17 Pages

Given the grid features of digital images, a direct relation with cellular automata can be established with transition rules based on information of the cells in the grid. This document presents the modeling of an algorithm based on cellular automata...

  • Article
  • Open Access
5 Citations
7,271 Views
38 Pages

Mind Your Outcomes: The ΔQSD Paradigm for Quality-Centric Systems Development and Its Application to a Blockchain Case Study

  • Seyed Hossein Haeri,
  • Peter Thompson,
  • Neil Davies,
  • Peter Van Roy,
  • Kevin Hammond and
  • James Chapman

This paper directly addresses a long-standing issue that affects the development of many complex distributed software systems: how to establish quickly, cheaply, and reliably whether they can deliver their intended performance before expending signif...

  • Article
  • Open Access
10 Citations
3,631 Views
15 Pages

Deep learning models yield remarkable results in skin lesions analysis. However, these models require considerable amounts of data, while accessibility to the images with annotated skin lesions is often limited, and the classes are often imbalanced....

  • Article
  • Open Access
7 Citations
3,055 Views
25 Pages

This article addresses the problem of optimal phase-swapping in asymmetric distribution grids through the application of hurricane-based optimization algorithm (HOA). The exact mixed-integer nonlinear programming (MINLP) model is solved by using a ma...

  • Article
  • Open Access
2 Citations
6,241 Views
11 Pages

A Secure Blockchain Framework for Storing Historical Text: A Case Study of the Holy Hadith

  • Khaled M. Awad,
  • Mustafa ElNainay,
  • Mohammad Abdeen,
  • Marwan Torki,
  • Omar Saif and
  • Emad Nabil

Historical texts are one of the main pillars for understanding current civilization and are used to reference different aspects. Hadiths are an example of one of the historical texts that should be securely preserved. Due to the expansion of the onli...

  • Article
  • Open Access
170 Citations
15,258 Views
19 Pages

Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection

  • Hooman Alavizadeh,
  • Hootan Alavizadeh and
  • Julian Jang-Jaccard

The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of learning to make decisions without the knowledge of human experts. Several reinforcement lea...

  • Article
  • Open Access
7 Citations
6,913 Views
14 Pages

One of the great challenges for football coaches is to choose the football line-up that gives more guarantees of success. Even though there are several dimensions to analyse the problem, such as the opposing team characteristics. The objective of thi...

  • Article
  • Open Access
27 Citations
12,131 Views
16 Pages

A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication

  • Noor Sattar Noor,
  • Dalal Abdulmohsin Hammood,
  • Ali Al-Naji and
  • Javaan Chahl

Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorit...

  • Article
  • Open Access
9 Citations
3,521 Views
11 Pages

Scalable Traffic Signal Controls Using Fog-Cloud Based Multiagent Reinforcement Learning

  • Paul (Young Joun) Ha,
  • Sikai Chen,
  • Runjia Du and
  • Samuel Labi

Optimizing traffic signal control (TSC) at intersections continues to pose a challenging problem, particularly for large-scale traffic networks. It has been shown in past research that it is feasible to optimize the operations of individual TSC syste...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X