You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 12, Issue 9

September 2023 - 21 articles

Cover Story: We developed a novel Hierarchical VPLS (H-VPLS) architecture via Q-in-Q tunneling on a commodity router. Our work is based on utilizing and enhancing two well-known open-source packages: Vector Packet Processing (VPP) as the router’s fast data plane and FRRouting (FRR), a modular control plane protocol suite, to implement VPLS. Both VPP and FRR have active and dynamic communities, and they are the only open-source frameworks that support VPLS. FRR in the control plane implements control messages and relevant signaling, while VPP in the data-plane side provides the capability of forwarding VPLS packets and manually labeling them. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
8 Citations
4,901 Views
20 Pages

Evaluating Video Games as Tools for Education on Fake News and Misinformation

  • Ruth S. Contreras-Espinosa and
  • Jose Luis Eguia-Gomez

21 September 2023

Despite access to reliable information being essential for equal opportunities in our society, current school curricula only include some notions about media literacy in a limited context. Thus, it is necessary to create scenarios for reflection on a...

  • Article
  • Open Access
3 Citations
2,690 Views
17 Pages

Addressing Uncertainty in Tool Wear Prediction with Dropout-Based Neural Network

  • Arup Dey,
  • Nita Yodo,
  • Om P. Yadav,
  • Ragavanantham Shanmugam and
  • Monsuru Ramoni

19 September 2023

Data-driven algorithms have been widely applied in predicting tool wear because of the high prediction performance of the algorithms, availability of data sets, and advancements in computing capabilities in recent years. Although most algorithms are...

  • Article
  • Open Access
10 Citations
3,876 Views
14 Pages

15 September 2023

During the last few years, several technological advances have led to an increase in the creation and consumption of audiovisual multimedia content. Users are overexposed to videos via several social media or video sharing websites and mobile phone a...

  • Article
  • Open Access
3 Citations
2,335 Views
52 Pages

Specification Mining over Temporal Data

  • Giacomo Bergami,
  • Samuel Appleby and
  • Graham Morgan

14 September 2023

Current specification mining algorithms for temporal data rely on exhaustive search approaches, which become detrimental in real data settings where a plethora of distinct temporal behaviours are recorded over prolonged observations. This paper propo...

  • Article
  • Open Access
3 Citations
2,626 Views
17 Pages

Process-Oriented Requirements Definition and Analysis of Software Components in Critical Systems

  • Benedetto Intrigila,
  • Giuseppe Della Penna,
  • Andrea D’Ambrogio,
  • Dario Campagna and
  • Malina Grigore

14 September 2023

Requirements management is a key aspect in the development of software components, since complex systems are often subject to frequent updates due to continuously changing requirements. This is especially true in critical systems, i.e., systems whose...

  • Article
  • Open Access
3 Citations
2,541 Views
14 Pages

Enhancing Counterfeit Detection with Multi-Features on Secure 2D Grayscale Codes

  • Bimo Sunarfri Hantono,
  • Syukron Abu Ishaq Alfarozi,
  • Azkario Rizky Pratama,
  • Ahmad Ataka Awwalur Rizqi,
  • I Wayan Mustika,
  • Mardhani Riasetiawan and
  • Anna Maria Sri Asih

14 September 2023

Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically f...

  • Article
  • Open Access
6 Citations
2,767 Views
15 Pages

13 September 2023

Image processing techniques are based nearly exclusively on RGB (red–green–blue) representation, which is significantly influenced by technological issues. The RGB triplet represents a mixture of the wavelength, saturation, and lightness...

  • Article
  • Open Access
1 Citations
2,132 Views
19 Pages

Building an Expert System through Machine Learning for Predicting the Quality of a Website Based on Its Completion

  • Vishnu Priya Biyyapu,
  • Sastry Kodanda Rama Jammalamadaka,
  • Sasi Bhanu Jammalamadaka,
  • Bhupati Chokara,
  • Bala Krishna Kamesh Duvvuri and
  • Raja Rao Budaraju

11 September 2023

The main channel for disseminating information is now the Internet. Users have different expectations for the calibre of websites regarding the posted and presented content. The website’s quality is influenced by up to 120 factors, each represe...

  • Article
  • Open Access
1 Citations
3,031 Views
25 Pages

7 September 2023

Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability...

  • Article
  • Open Access
4 Citations
2,178 Views
22 Pages

Optimized Downlink Scheduling over LTE Network Based on Artificial Neural Network

  • Falah Y. H. Ahmed,
  • Amal Abulgasim Masli,
  • Bashar Khassawneh,
  • Jabar H. Yousif and
  • Dilovan Asaad Zebari

7 September 2023

Long-Term Evolution (LTE) technology is utilized efficiently for wireless broadband communication for mobile devices. It provides flexible bandwidth and frequency with high speed and peak data rates. Optimizing resource allocation is vital for improv...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431XCreative Common CC BY license