You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 12, Issue 8

August 2023 - 21 articles

Cover Story: Since the adoption of connected and automated vehicles is not expected to happen instantly, not all its elements are going to be connected at the early deployment stages. We consider a scenario where vehicles approaching a traffic light are connected to each other, but the traffic light itself is not cooperative. Information about indented trajectories such as decisions on how and when to accelerate, decelerate and stop, is communicated among the vehicles involved. We provide an optimization-based procedure for the efficient and safe passing of traffic lights or other temporary road blockages using vehicle-to-vehicle communication. We locally optimize objectives that promote efficiency such as less deceleration and larger minimum velocity, while maintaining safety. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
11 Citations
4,035 Views
13 Pages

Brain Pathology Classification of MR Images Using Machine Learning Techniques

  • Nehad T. A. Ramaha,
  • Ruaa M. Mahmood,
  • Alaa Ali Hameed,
  • Norma Latif Fitriyani,
  • Ganjar Alfian and
  • Muhammad Syafrudin

19 August 2023

A brain tumor is essentially a collection of aberrant tissues, so it is crucial to classify tumors of the brain using MRI before beginning therapy. Tumor segmentation and classification from brain MRI scans using machine learning techniques are widel...

  • Article
  • Open Access
11 Citations
3,284 Views
19 Pages

19 August 2023

Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer...

  • Article
  • Open Access
7 Citations
3,945 Views
19 Pages

Pm2.5 Time Series Imputation with Deep Learning and Interpolation

  • Anibal Flores,
  • Hugo Tito-Chura,
  • Deymor Centty-Villafuerte and
  • Alejandro Ecos-Espino

16 August 2023

Commonly, regression for time series imputation has been implemented directly through regression models, statistical, machine learning, and deep learning techniques. In this work, a novel approach is proposed based on a classification model that dete...

  • Article
  • Open Access
6 Citations
2,184 Views
17 Pages

Requirement Change Prediction Model for Small Software Systems

  • Rida Fatima,
  • Furkh Zeshan,
  • Adnan Ahmad,
  • Muhamamd Hamid,
  • Imen Filali,
  • Amel Ali Alhussan and
  • Hanaa A. Abdallah

14 August 2023

The software industry plays a vital role in driving technological advancements. Software projects are complex and consist of many components, so change is unavoidable in these projects. The change in software requirements must be predicted early to p...

  • Article
  • Open Access
1 Citations
1,814 Views
20 Pages

14 August 2023

Currently, single-board computers (SBCs) are sufficiently powerful to run real-time operating systems (RTOSs) and applications. The purpose of this research was to investigate the timing performance of an NXP TWR-K70F120M device with μClinux OS on...

  • Article
  • Open Access
3 Citations
2,679 Views
16 Pages

Face Detection Using a Capsule Network for Driver Monitoring Application

  • János Hollósi,
  • Áron Ballagi,
  • Gábor Kovács,
  • Szabolcs Fischer and
  • Viktor Nagy

12 August 2023

Bus driver distraction and cognitive load lead to higher accident risk. Driver distraction sources and complex physical and psychological effects must be recognized and analyzed in real-world driving conditions to reduce risk and enhance overall road...

  • Article
  • Open Access
14 Citations
4,087 Views
34 Pages

Stochastic Modeling for Intelligent Software-Defined Vehicular Networks: A Survey

  • Banoth Ravi,
  • Blesson Varghese,
  • Ilir Murturi,
  • Praveen Kumar Donta,
  • Schahram Dustdar,
  • Chinmaya Kumar Dehury and
  • Satish Narayana Srirama

12 August 2023

Digital twins and the Internet of Things (IoT) have gained significant research attention in recent years due to their potential advantages in various domains, and vehicular ad hoc networks (VANETs) are one such application. VANETs can provide a wide...

  • Review
  • Open Access
40 Citations
9,333 Views
45 Pages

Medical Image Encryption: A Comprehensive Review

  • Saja Theab Ahmed,
  • Dalal Abdulmohsin Hammood,
  • Raad Farhood Chisab,
  • Ali Al-Naji and
  • Javaan Chahl

11 August 2023

In medical information systems, image data can be considered crucial information. As imaging technology and methods for analyzing medical images advance, there will be a greater wealth of data available for study. Hence, protecting those images is es...

  • Article
  • Open Access
2 Citations
1,846 Views
14 Pages

Recently, balanced Boolean functions with an even number n of variables achieving very good autocorrelation properties have been obtained for 12≤n≤26. These functions attain the maximum absolute value in the autocorrelation spectra (without con...

  • Article
  • Open Access
17 Citations
2,241 Views
19 Pages

Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm

  • Nahla Nur Elmadina,
  • Rashid Saeed,
  • Elsadig Saeid,
  • Elmustafa Sayed Ali,
  • Maha Abdelhaq,
  • Raed Alsaqour and
  • Nawaf Alharbe

This paper focuses on downlink power allocation for a cognitive radio-based non-orthogonal multiple access (CR-NOMA) system in a femtocell environment involving device-to-device (D2D) communication. The proposed power allocation scheme employs the gr...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431XCreative Common CC BY license