You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 13, Issue 1

January 2024 - 31 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: Automatic data fusion is an important field of machine learning that has been increasingly studied. The objective is to improve the classification performance from several individual classifiers in terms of result accuracy and stability. The fusion step can be applied at early and/or late stages of the classification procedure. Early fusion consists of combining features from different sources or domains before training the individual classifiers. In turn, late fusion combines the results from the individual classifiers after testing. Late fusion has two setups, combination of posterior probabilities (soft fusion) and combination of decisions (hard fusion). A theoretical analysis of the conditions for applying early and late fusion and a study on recent data fusion methods are provided. View this paper

Articles (31)

  • Article
  • Open Access
34 Citations
12,959 Views
18 Pages

Multiclass AI-Generated Deepfake Face Detection Using Patch-Wise Deep Learning Model

  • Muhammad Asad Arshed,
  • Shahzad Mumtaz,
  • Muhammad Ibrahim,
  • Christine Dewi,
  • Muhammad Tanveer and
  • Saeed Ahmed

21 January 2024

In response to the rapid advancements in facial manipulation technologies, particularly facilitated by Generative Adversarial Networks (GANs) and Stable Diffusion-based methods, this paper explores the critical issue of deepfake content creation. The...

  • Article
  • Open Access
3 Citations
2,318 Views
18 Pages

21 January 2024

This study introduces a novel approach to address challenges in workpiece surface defect identification. It presents an enhanced Single Shot MultiBox Detector model, incorporating attention mechanisms and multi-feature fusion. The research methodolog...

  • Article
  • Open Access
5 Citations
2,311 Views
15 Pages

21 January 2024

Electromyography-based wearable biosensors are used for prosthetic control. Machine learning prosthetic controllers are based on classification and regression models. The advantage of the regression approach is that it permits us to obtain a smoother...

  • Article
  • Open Access
6 Citations
5,643 Views
29 Pages

18 January 2024

The requirement to develop a smart education system is critical in the era of ubiquitous technology. In the smart education environment, intelligent pedagogies are constructed to take advantage of technological devices and foster learners’ comp...

  • Review
  • Open Access
67 Citations
35,192 Views
42 Pages

17 January 2024

The Internet’s expansion has changed how the services accessed and businesses operate. Blockchain is an innovative technology that emerged after the rise of the Internet. In addition, it maintains transactions on encrypted databases that are distribu...

  • Article
  • Open Access
5 Citations
3,760 Views
14 Pages

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

  • Kunbolat Algazy,
  • Kairat Sakan,
  • Ardabek Khompysh and
  • Dilmukhanbet Dyusenbayev

16 January 2024

The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the...

  • Review
  • Open Access
27 Citations
4,080 Views
19 Pages

Securing Mobile Edge Computing Using Hybrid Deep Learning Method

  • Olusola Adeniyi,
  • Ali Safaa Sadiq,
  • Prashant Pillai,
  • Mohammad Aljaidi and
  • Omprakash Kaiwartya

16 January 2024

In recent years, Mobile Edge Computing (MEC) has revolutionized the landscape of the telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range of security challenges, the m...

  • Article
  • Open Access
15 Citations
5,042 Views
23 Pages

Augmented Reality Escape Classroom Game for Deep and Meaningful English Language Learning

  • Angeliki Voreopoulou,
  • Stylianos Mystakidis and
  • Avgoustos Tsinakos

16 January 2024

A significant volume of literature has extensively reported on and presented the benefits of employing escape classroom games (ECGs), on one hand, and on augmented reality (AR) in English language learning, on the other. However, there is little evid...

  • Article
  • Open Access
6 Citations
2,787 Views
12 Pages

Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings

  • Kaleb Horvath,
  • Mohamed Riduan Abid,
  • Thomas Merino,
  • Ryan Zimmerman,
  • Yesem Peker and
  • Shamim Khan

16 January 2024

We have designed a real-world smart building energy fault detection (SBFD) system on a cloud-based Databricks workspace, a high-performance computing (HPC) environment for big-data-intensive applications powered by Apache Spark. By avoiding a Smart B...

  • Article
  • Open Access
2,616 Views
14 Pages

11 January 2024

With the evolution of software systems, their size and complexity are rising rapidly. Identifying vulnerabilities as early as possible is crucial for ensuring high software quality and security. Just-in-time (JIT) vulnerability prediction, which aims...

of 4