Skip to Content

Computers, Volume 14, Issue 2

2025 February - 46 articles

Cover Story: Optical character recognition (OCR) has made remarkable progress with deep learning, yet challenges persist in scenarios involving color distortions, such as those experienced by individuals with color blindness. This paper investigates the robustness of convolutional neural networks (CNNs) against red–green distortions by leveraging the Ishihara-Like MNIST dataset. By training and evaluating six distinct architectures, including MNIST, LeNet5, VGG16, AlexNet, and two custom models, this work explores architectural changes and hyperparameter tuning to enhance model performance. Our findings demonstrate the significant improvements over prior benchmarks, offering insights into CNN adaptability in visually challenging environments. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (46)

  • Article
  • Open Access
1 Citations
2,366 Views
46 Pages

18 February 2025

Gamification has become a motivational technique for enhancing engagement and productivity, extending into agile software development. However, integrating gamification into agile frameworks such as the Scrum framework has led to the emergence of gam...

  • Article
  • Open Access
2 Citations
5,904 Views
19 Pages

Using Augmented Reality to Improve Touristic Efficacy

  • Miguel Cabeleira and
  • Carlos Vaz de Carvalho

18 February 2025

The tourism sector, a major economic contributor, seeks innovative approaches to enhance the user experience. In this evolving landscape of global tourism, using augmented reality (AR) technology can be a way to increase the engagement of tourists, b...

  • Article
  • Open Access
5 Citations
4,310 Views
21 Pages

Enhancing Cognitive Workload Classification Using Integrated LSTM Layers and CNNs for fNIRS Data Analysis

  • Mehshan Ahmed Khan,
  • Houshyar Asadi,
  • Mohammad Reza Chalak Qazani,
  • Adetokunbo Arogbonlo,
  • Siamak Pedrammehr,
  • Adnan Anwar,
  • Hailing Zhou,
  • Lei Wei,
  • Asim Bhatti and
  • Saeid Nahavandi
  • + 2 authors

17 February 2025

Functional near-infrared spectroscopy (fNIRS) is employed as a non-invasive method to monitor functional brain activation by capturing changes in the concentrations of oxygenated hemoglobin (HbO) and deoxygenated hemoglobin (HbR). Various machine lea...

  • Article
  • Open Access
8 Citations
1,664 Views
21 Pages

Modified Ant Colony Optimization to Improve Energy Consumption of Cruiser Boundary Tour with Internet of Underwater Things

  • Hadeel Mohammed,
  • Mustafa Ibrahim,
  • Ahmed Raoof,
  • Amjad Jaleel and
  • Ayad Q. Al-Dujaili

17 February 2025

The Internet of Underwater Things (IoUT) holds significant promise for developing a smart ocean. In recent years, there has been swift progress in data collection methods using autonomous underwater vehicles (AUVs) within underwater acoustic sensor n...

  • Article
  • Open Access
1 Citations
2,048 Views
37 Pages

Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction

  • Fahad Alqurashi,
  • Muhammad Al-Hashimi,
  • Mostafa Saleh and
  • Osama Abulnaja

16 February 2025

Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study pre...

  • Article
  • Open Access
4 Citations
2,202 Views
19 Pages

16 February 2025

Road classification, knowing whether we are driving in the city, in rural areas, or on the highway, can improve the performance of modern driver assistance systems and contribute to understanding driving habits. This study focuses on solving this pro...

  • Article
  • Open Access
1 Citations
2,619 Views
16 Pages

Detection of Surgical Instruments Based on Synthetic Training Data

  • Leon Wiese,
  • Lennart Hinz,
  • Eduard Reithmeier,
  • Philippe Korn and
  • Michael Neuhaus

15 February 2025

Due to a significant shortage of healthcare staff, medical facilities are increasingly challenged by the need to deploy current staff more intensively, which can lead to significant complications for patients and staff. Digital surgical assistance sy...

  • Article
  • Open Access
13 Citations
6,291 Views
26 Pages

Educational Data Mining and Predictive Modeling in the Age of Artificial Intelligence: An In-Depth Analysis of Research Dynamics

  • Eloy López-Meneses,
  • Pedro C. Mellado-Moreno,
  • Celia Gallardo Herrerías and
  • Noelia Pelícano-Piris

14 February 2025

This article provides a comprehensive analysis of the research dynamics on the use of Educational Data Mining (EDM) and predictive modeling (PM) in the era of Artificial Intelligence (AI) based on the review of 793 articles published between 2000 and...

  • Article
  • Open Access
11 Citations
7,789 Views
42 Pages

13 February 2025

Cyber timeline analysis or forensic timeline analysis is critical in digital forensics and incident response (DFIR) investigations. It involves examining artefacts and events—particularly their timestamps and associated metadata—to detect...

  • Review
  • Open Access
12 Citations
20,303 Views
24 Pages

13 February 2025

This article presents a systematic literature review exploring the integration of Artificial Intelligence (AI) methodologies in project management (PM). Key applications include cost estimation, duration forecasting, and risk assessment, which are cr...

  • Review
  • Open Access
8 Citations
2,507 Views
27 Pages

13 February 2025

The increasing adoption of renewable energy resources and the growing need for efficient and adaptable energy management have emphasized the importance of innovative solutions for energy sharing and storage. This study aims to analyze the application...

  • Systematic Review
  • Open Access
15 Citations
5,244 Views
39 Pages

12 February 2025

The integration of the Internet of Things (IoT) in education has fundamentally transformed personalized online learning (POL), enabling adaptive, context-aware environments that tailor learning based on real-time environmental data or device usage. T...

  • Article
  • Open Access
6 Citations
3,795 Views
18 Pages

Automated Disassembly of Waste Printed Circuit Boards: The Role of Edge Computing and IoT

  • Muhammad Mohsin,
  • Stefano Rovetta,
  • Francesco Masulli and
  • Alberto Cabri

11 February 2025

The ever-growing volume of global electronic waste (e-waste) poses significant environmental and health challenges. Printed circuit boards (PCBs), which form the core of most electronic devices, contain valuable metals as well as hazardous materials....

  • Review
  • Open Access
29 Citations
19,531 Views
45 Pages

11 February 2025

With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given the diversity of such systems, selecting the most appropriate solutions and technologies to address the challenges is a complex activit...

  • Article
  • Open Access
7 Citations
5,482 Views
21 Pages

10 February 2025

Generative adversarial networks (GANs) have revolutionised various fields by creating highly realistic images, videos, and audio, thus enhancing applications such as video game development and data augmentation. However, this technology has also give...

  • Article
  • Open Access
5 Citations
7,104 Views
26 Pages

Gen-Optimizer: A Generative AI Framework for Strategic Business Cost Optimization

  • Nuruzzaman Faruqui,
  • Nidadavolu Venkat Durga Sai Siva Vara Prasad Raju,
  • Shanmugasundaram Sivakumar,
  • Nikhil Patel,
  • Shinoy Vengaramkode Bhaskaran,
  • Shapla Khanam and
  • Touhid Bhuiyan

10 February 2025

Strategic cost optimization is a critical challenge for businesses aiming to maintain competitiveness in dynamic markets. This paper introduces Gen-Optimizer, a Generative AI-based framework designed to analyze and optimize business costs through int...

  • Article
  • Open Access
11 Citations
5,049 Views
27 Pages

Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks

  • Bright Agbor Agbor,
  • Bliss Utibe-Abasi Stephen,
  • Philip Asuquo,
  • Uduak Onofiok Luke and
  • Victor Anaga

10 February 2025

The Internet of Things (IoT) ecosystem is rapidly expanding. It is driven by continuous innovation but accompanied by increasingly sophisticated cybersecurity threats. Protecting IoT devices from these emerging vulnerabilities has become a critical p...

  • Article
  • Open Access
4 Citations
7,686 Views
27 Pages

10 February 2025

Gaze tracking and estimation are essential for understanding human behavior and enhancing human–computer interactions. This study introduces an innovative, cost-effective solution for real-time gaze tracking using a standard webcam, providing a...

  • Article
  • Open Access
2 Citations
2,028 Views
22 Pages

High-Performance Data Throughput Analysis in Wireless Ad Hoc Networks for Smart Vehicle Interconnection

  • Alaa Kamal Yousif Dafhalla,
  • Amira Elsir Tayfour Ahmed,
  • Nada Mohamed Osman Sid Ahmed,
  • Ameni Filali,
  • Lutfieh S. Alhomed,
  • Fawzia Awad Elhassan Ali,
  • Asma Ibrahim Gamar Eldeen,
  • Mohamed Elshaikh Elobaid and
  • Tijjani Adam

10 February 2025

Vehicular Ad Hoc Networks play a crucial role in enabling Smart City applications by facilitating seamless communication between vehicles and infrastructure. This study evaluates the throughput performance of different routing protocols, specifically...

  • Article
  • Open Access
12 Citations
5,540 Views
18 Pages

Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management

  • Geeta Sandeep Nadella,
  • Santosh Reddy Addula,
  • Akhila Reddy Yadulla,
  • Guna Sekhar Sajja,
  • Mohan Meesala,
  • Mohan Harish Maturi,
  • Karthik Meduri and
  • Hari Gonaygunta

8 February 2025

This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variationa...

  • Article
  • Open Access
1,723 Views
16 Pages

Practice and Research Optimization Environment in Python (PyPROE)

  • Christopher Jaus,
  • Kaelyn Haynie,
  • Michael Mulligan and
  • Howie Fang

8 February 2025

Practice and Research Optimization Environment in Python (PyPROE) is a GUI-based, integrated framework designed to improve the user experience in both learning and research on engineering design optimization. Traditional optimization programs require...

  • Review
  • Open Access
47 Citations
15,829 Views
31 Pages

7 February 2025

The emergence of ChatGPT in higher education has raised immense discussion due to its versatility in performing tasks, including coding, personalized learning, human-like conversations, and information retrieval. Despite the rapidly growing use of Ch...

  • Article
  • Open Access
2 Citations
2,777 Views
18 Pages

Can ChatGPT Solve Undergraduate Exams from Warehousing Studies? An Investigation

  • Sven Franke,
  • Christoph Pott,
  • Jérôme Rutinowski,
  • Markus Pauly,
  • Christopher Reining and
  • Alice Kirchheim

5 February 2025

The performance of Large Language Models, such as ChatGPT, generally increases with every new model release. In this study, we investigated to what degree different GPT models were able to solve the exams of three different undergraduate courses on w...

  • Review
  • Open Access
7 Citations
4,203 Views
28 Pages

Electromagnetic Field-Aware Radio Resource Management for 5G and Beyond: A Survey

  • Mohammed Ahmed Salem,
  • Heng Siong Lim,
  • Kah Seng Diong,
  • Khaled A. Alaghbari,
  • Charilaos C. Zarakovitis and
  • Su Fong Chien

5 February 2025

The expansion of 5G infrastructure and the deployment of large antenna arrays are set to substantially influence electromagnetic field (EMF) exposure levels within mobile networks. As a result, the accurate measurement of EMF exposure and the integra...

  • Article
  • Open Access
2 Citations
1,790 Views
22 Pages

Modeling Mobile Applications for Proximity-Based Promotion Delivery to Shopping Centers Using Petri Nets

  • Julian Velazquez,
  • Ruben Machucho,
  • Jose F. Lopez,
  • Hiram Herrera and
  • Jorge-Arturo Hernandez-Almazan

5 February 2025

This article presents the design and implementation of an API that delivers real-time promotional notifications to mobile devices based on their proximity to shopping centers, calculated using the Haversine formula. Developed in Laravel, the API dete...

  • Article
  • Open Access
19 Citations
18,502 Views
28 Pages

Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector

  • Harjinder Singh Lallie,
  • Andrew Thompson,
  • Elzbieta Titis and
  • Paul Stephens

4 February 2025

Universities hold and process vast amounts of financial, user, and research data, which makes them prime targets for cybercriminals. In addition to the usual external threat actors, universities face a unique insider threat from students, who—a...

  • Article
  • Open Access
1 Citations
1,679 Views
13 Pages

4 February 2025

Villa Cicogna Mozzoni, located in Bisuschio near Varese and Lake Lugano, on the border between Lombardy and Switzerland, has origins dating back to the 1540s as a hunting lodge owned by the Mozzoni family. In the 16th century, significant renovations...

  • Article
  • Open Access
1,252 Views
20 Pages

4 February 2025

The study of the process of laser action on powder materials requires the construction of mathematical models of the interaction of laser radiation with powder particles that take into account the features of energy supply and are applicable in a wid...

  • Article
  • Open Access
5 Citations
3,003 Views
42 Pages

1 February 2025

The design of Web3 applications presents unique challenges due to their complex technical requirements. Despite the increasing spread of this technology, there is a notable lack of comprehensive, empirically grounded design guidelines for developing...

  • Article
  • Open Access
3 Citations
1,691 Views
17 Pages

30 January 2025

Japan faces a significant labor shortage due to an aging population, particularly in the agricultural sector. The rising average age of farmers and the declining participation of younger individuals threaten the sustainability of farming practices. T...

  • Article
  • Open Access
5 Citations
8,321 Views
21 Pages

30 January 2025

Impaired balance and mental stress are significant health concerns, particularly among older adults. This study investigated the relationship between the heart rate variability and fall risk during daily activities among individuals over 40 years old...

  • Article
  • Open Access
4 Citations
1,738 Views
16 Pages

Mitigation of Risks Associated with Distrustful Routers in OSPF Networks—An Enhanced Method

  • Kvitoslava Obelovska,
  • Yaromyr Snaichuk,
  • Oleh Liskevych,
  • Stergios-Aristoteles Mitoulis and
  • Rostyslav Liskevych

29 January 2025

Packet routing in computer networks provides complex challenges in environments with distrustful routers due to security vulnerabilities or potential malicious behaviors. The literature offers solutions to the problem designed for different types of...

  • Review
  • Open Access
1 Citations
3,962 Views
19 Pages

28 January 2025

X (formerly known as Twitter), Reddit, and other social media forums have dramatically changed the way society interacts with live events in this day and age. The huge amount of data generated by these platforms presents challenges, especially in ter...

  • Review
  • Open Access
5 Citations
5,072 Views
28 Pages

28 January 2025

With the vast majority of global trade volume and value reliant on maritime transport, accurate prediction of vessel estimated time of arrival (ETA) is crucial for optimizing supply chain efficiency and managing logistical complexities in port operat...

  • Review
  • Open Access
9 Citations
2,632 Views
20 Pages

Model Transformations Used in IT Project Initial Phases: Systematic Literature Review

  • Oksana Nikiforova,
  • Kristaps Babris,
  • Uldis Karlovs-Karlovskis,
  • Marta Narigina,
  • Andrejs Romanovs,
  • Anita Jansone,
  • Janis Grabis and
  • Oscar Pastor

27 January 2025

The paper emphasizes the critical importance of the initial phase in IT project development to avoid implementation errors. It argues that minimizing these errors can be achieved by developing project artifacts at the early stage using a model-driven...

  • Article
  • Open Access
1,222 Views
16 Pages

Identification of Greek Orthodox Church Chants Using Fuzzy Entropy

  • Lazaros Moysis,
  • Konstantinos Karasavvidis,
  • Dimitris Kampelopoulos,
  • Achilles D. Boursianis,
  • Sotirios Sotiroudis,
  • Spiridon Nikolaidis,
  • Christos Volos,
  • Panagiotis Sarigiannidis,
  • Mohammad Abdul Matin and
  • Sotirios K. Goudos

27 January 2025

In this work, a comparison of Greek Orthodox religious chants is performed using fuzzy entropy. Using a dataset of chant performances, each recitation is segmented into overlapping time windows, and the fuzzy entropy of each window in the frequency d...

  • Article
  • Open Access
6 Citations
3,788 Views
15 Pages

27 January 2025

Technological advancements have helped all sectors to evolve. This advancement has widened the cyberspace and attack surface, which has led to a drastic increase in cyberattacks. Cybersecurity solutions have also evolved. The advancement is relativel...

  • Article
  • Open Access
1,564 Views
26 Pages

26 January 2025

In this paper, we describe the associative and commutative algebra or the (2,2)-model of quaternions with application in color image enhancement. The method of alpha-rooting, which is based on the 2D quaternion discrete Fourier transform (QDFT) is co...

  • Review
  • Open Access
3 Citations
8,700 Views
34 Pages

24 January 2025

Alzheimer’s disease (AD) is a progressive neurodegenerative disorder that significantly impairs cognitive functions, leading to memory loss and other behavioral changes. It is the seventh leading cause of death worldwide, with millions of peopl...

  • Article
  • Open Access
2 Citations
2,981 Views
29 Pages

23 January 2025

Timely, region-based geo-maps like choropleths are essential for smart city applications like traffic monitoring and urban planning because they can reveal statistical patterns in geotagged data. However, because data overloading is brought on by the...

  • Article
  • Open Access
3 Citations
2,874 Views
31 Pages

Number Recognition Through Color Distortion Using Convolutional Neural Networks

  • Christopher Henshaw,
  • Jacob Dennis,
  • Jonathan Nadzam and
  • Alan J. Michaels

22 January 2025

Machine learning applied to image-based number recognition has made significant strides in recent years. Recent use of Large Language Models (LLMs) in natural language search and generation of text have improved performance for general images, yet pe...

  • Article
  • Open Access
5 Citations
3,324 Views
21 Pages

Use of IoT with Deep Learning for Classification of Environment Sounds and Detection of Gases

  • Priya Mishra,
  • Naveen Mishra,
  • Dilip Kumar Choudhary,
  • Prakash Pareek and
  • Manuel J. C. S. Reis

22 January 2025

The need for safe and healthy air quality has become critical as urbanization and industrialization increase, leading to health risks and environmental concerns. Gas leaks, particularly of gases like carbon monoxide, methane, and liquefied petroleum...

  • Article
  • Open Access
1 Citations
2,079 Views
14 Pages

22 January 2025

The importance of measuring service quality for business performance has been widely recognized in service marketing literature due to its pivotal influence on customer satisfaction and its long-term impact on customer loyalty. The SERVQUAL model, co...

  • Article
  • Open Access
1 Citations
1,805 Views
20 Pages

21 January 2025

Standing long jump (SLJ) power is recognized as informative of the ability of lower limbs to exert power. The study aims to provide athletes/coaches with a simple and low-cost estimate of selected SLJ power features. A group of 150 trained young part...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X