Skip to Content

Computers, Volume 14, Issue 4

2025 April - 43 articles

Cover Story: Organizations in production and logistics often face challenges in evaluating their data mining capabilities, especially during the cost-intensive data preparation phase. While maturity models exist for broader domains like data management and artificial intelligence, none is specifically addressing the data mining process. Due to the complexity of this process, the associated phases have to be evaluated in detail. This article reviews relevant maturity models, identifies key factors influencing data preparation, and introduces a prototype data preparation maturity model. This marks an initial step toward a framework for assessing and improving data mining maturity in industrial contexts. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (43)

  • Article
  • Open Access
1,888 Views
24 Pages

The emergent field of embedded computing presents a challenging scenario for ubiquitous music (ubimus) design. Available tools demand specific technical knowledge—as exemplified in the techniques involved in programming integrated circuits of c...

  • Article
  • Open Access
18 Citations
7,416 Views
18 Pages

Generative Artificial Intelligence (AI) has emerged as a transformative tool in art education, offering innovative avenues for creativity and learning. However, concerns persist among educators regarding the potential misuse of text-to-image generato...

  • Article
  • Open Access
1 Citations
1,466 Views
13 Pages

Design of an Emotional Facial Recognition Task in a 3D Environment

  • Gemma Quirantes-Gutierrez,
  • Ángeles F. Estévez,
  • Gabriel Artés Ordoño and
  • Ginesa López-Crespo

The recognition of emotional facial expressions is a key skill for social adaptation. Previous studies have shown that clinical and subclinical populations, such as those diagnosed with schizophrenia or autism spectrum disorder, have a significant de...

  • Article
  • Open Access
888 Views
18 Pages

Role of Roadside Units in Cluster Head Election and Coverage Maximization for Vehicle Emergency Services

  • Ravneet Kaur,
  • Robin Doss,
  • Lei Pan,
  • Chaitanya Singla and
  • Selvarajah Thuseethan

Efficient clustering algorithms are critical for enabling the timely dissemination of emergency messages across maximum coverage areas in vehicular networks. While existing clustering approaches demonstrate stability and scalability, there has been a...

  • Article
  • Open Access
2 Citations
2,047 Views
23 Pages

Kalman Filter-Enhanced Data Aggregation in LoRaWAN-Based IoT Framework for Aquaculture Monitoring in Sargassum sp. Cultivation

  • Misbahuddin Misbahuddin,
  • Nunik Cokrowati,
  • Muhamad Syamsu Iqbal,
  • Obie Farobie,
  • Apip Amrullah and
  • Lusi Ernawati

This study presents a LoRaWAN-based IoT framework for robust data aggregation in Sargassum sp. cultivation, integrating multi-sensor monitoring and Kalman filter-based data enhancement. The system employs water quality sensors—including tempera...

  • Systematic Review
  • Open Access
5 Citations
9,826 Views
55 Pages

A Systematic Literature Review of Machine Unlearning Techniques in Neural Networks

  • Ivanna Daniela Cevallos,
  • Marco E. Benalcázar,
  • Ángel Leonardo Valdivieso Caraguay,
  • Jonathan A. Zea and
  • Lorena Isabel Barona-López

This review examines the field of machine unlearning in neural networks, an area driven by data privacy regulations such as the General Data Protection Regulation and the California Consumer Privacy Act. By analyzing 37 primary studies of machine unl...

  • Article
  • Open Access
6 Citations
2,414 Views
31 Pages

Enhancing Smart Home Efficiency with Heuristic-Based Energy Optimization

  • Yasir Abbas Khan,
  • Faris Kateb,
  • Ateeq Ur Rehman,
  • Atif Sardar Khan,
  • Fazal Qudus Khan,
  • Sadeeq Jan and
  • Ali Naser Alkhathlan

In smart homes, heavy reliance on appliance automation has increased, along with the energy demand in developing urban areas, making efficient energy management an important factor. To address the scheduling of appliances under Demand-Side Management...

  • Review
  • Open Access
5 Citations
6,375 Views
28 Pages

This systematic study seeks to evaluate the use and impact of transformer models in the healthcare domain, with a particular emphasis on their usefulness in tackling key medical difficulties and performing critical natural language processing (NLP) f...

  • Article
  • Open Access
1 Citations
2,041 Views
13 Pages

The rise of 3D heterogeneous packaging holds promise for increased performance in applications such as AI by bringing compute and memory modules into close proximity. This increased performance comes with increased thermal management challenges. This...

  • Article
  • Open Access
1 Citations
2,767 Views
23 Pages

Companies face uncertainties evaluating their own capabilities when implementing data analytics or data mining. Data mining is a valuable process used to analyze data and support decisions based on the knowledge generated, creating a pipeline from th...

  • Review
  • Open Access
1 Citations
3,689 Views
25 Pages

Comparison of Bioelectric Signals and Their Applications in Artificial Intelligence: A Review

  • Juarez-Castro Flavio Alfonso,
  • Toledo-Rios Juan Salvador,
  • Aceves-Fernández Marco Antonio and
  • Tovar-Arriaga Saul

This review examines the role of various bioelectrical signals in conjunction with artificial intelligence (AI) and analyzes how these signals are utilized in AI applications. The applications of electroencephalography (EEG), electroretinography (ERG...

  • Article
  • Open Access
6 Citations
11,384 Views
35 Pages

This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile bank...

  • Review
  • Open Access
18 Citations
9,743 Views
37 Pages

A State-of-the-Art Review of Artificial Intelligence (AI) Applications in Healthcare: Advances in Diabetes, Cancer, Epidemiology, and Mortality Prediction

  • Mariano Vargas-Santiago,
  • Diana Assaely León-Velasco,
  • Christian Efraín Maldonado-Sifuentes and
  • Liliana Chanona-Hernandez

Artificial Intelligence (AI) methodologies have profoundly influenced healthcare research, particularly in chronic disease management and public health. This paper provides a comprehensive state-of-the-art review of AI’s applications across dia...

  • Article
  • Open Access
3 Citations
5,681 Views
15 Pages

An Innovative Approach to Topic Clustering for Social Media and Web Data Using AI

  • Ioannis Kapantaidakis,
  • Emmanouil Perakakis,
  • George Mastorakis and
  • Ioannis Kopanakis

The vast amount of social media and web data offers valuable insights for purposes such as brand reputation management, topic research, competitive analysis, product development, and public opinion surveys. However, analysing these data to identify p...

  • Review
  • Open Access
14 Citations
11,085 Views
36 Pages

Blockchain technology, originally introduced through Bitcoin cryptocurrency in 2008, has rapidly expanded beyond its financial roots, offering innovative solutions for secure data management across various sectors, including education. Higher educati...

  • Article
  • Open Access
5 Citations
2,195 Views
30 Pages

LAVID: A Lightweight and Autonomous Smart Camera System for Urban Violence Detection and Geolocation

  • Mohammed Azzakhnini,
  • Houda Saidi,
  • Ahmed Azough,
  • Hamid Tairi and
  • Hassan Qjidaa

With the rise of digital video technologies and the proliferation of processing methods and storage systems, video-surveillance systems have received increasing attention over the last decade. However, the spread of cameras installed in public and pr...

  • Article
  • Open Access
3,090 Views
27 Pages

Microhooks: A Novel Framework to Streamline the Development of Microservices

  • Omar Iraqi,
  • Mohamed El Kadiri El Hassani and
  • Anass Zouine

The microservices architectural style has gained widespread adoption in recent years thanks to its ability to deliver high scalability and maintainability. However, the development process for microservices-based applications can be complex and chall...

  • Article
  • Open Access
5 Citations
1,130 Views
14 Pages

Optimal Selection of Sampling Rates and Mother Wavelet for an Algorithm to Classify Power Quality Disturbances

  • Jonatan A. Medina-Molina,
  • Enrique Reyes-Archundia,
  • José A. Gutiérrez-Gnecchi,
  • Javier A. Rodríguez-Herrejón,
  • Marco V. Chávez-Báez,
  • Juan C. Olivares-Rojas and
  • Néstor F. Guerrero-Rodríguez

The introduction of renewable energy sources, distributed energy systems, and power electronics equipment has led to the emergence of the Smart Grid. However, these developments have also caused the worsening of power quality. Selecting the correct s...

  • Article
  • Open Access
4 Citations
1,867 Views
16 Pages

Quantum Testing of Recommender Algorithms on GPU-Based Quantum Simulators

  • Chenxi Liu,
  • W. Bernard Lee and
  • Anthony G. Constantinides

This study explores the application of quantum computing in asset management, focusing on the use of the Quantum Approximate Optimization Algorithm (QAOA) to solve specific classes of financial asset recommendation problems. While quantum computing h...

  • Article
  • Open Access
1 Citations
1,356 Views
19 Pages

Digital Twins and the Stendhal Syndrome

  • Franco Niccolucci and
  • Achille Felicetti

The “Stendhal Syndrome” mentioned in the title refers to the first (early 19th century) documented perception of the role of intangible aspects in characterising cultural heritage. This paper addresses the semantic organisation of data co...

  • Article
  • Open Access
1 Citations
1,018 Views
31 Pages

Radio Frequency Identification (RFID) assistive systems, which integrate RFID devices with IoT technologies, are vital for enhancing the independence, mobility, and safety of individuals with disabilities. These systems enable applications such as RF...

  • Article
  • Open Access
2 Citations
2,432 Views
17 Pages

Regular inspection of overhead power line (OPL) systems is required to detect damage early and ensure the efficient and uninterrupted transmission of high-voltage electric power. In the past, these checks were conducted utilizing line crawling, inspe...

  • Review
  • Open Access
3 Citations
1,888 Views
33 Pages

The Microservice Architecture Style (MSA) has emerged as a significant computing paradigm in software engineering, with companies increasingly restructuring their monolithic systems to enhance digital performance and competitiveness. However, the mig...

  • Article
  • Open Access
15 Citations
8,821 Views
23 Pages

Scalability and Efficiency Analysis of Hyperledger Fabric and Private Ethereum in Smart Contract Execution

  • Maaz Muhammad Khan,
  • Fahd Sikandar Khan,
  • Muhammad Nadeem,
  • Taimur Hayat Khan,
  • Shahab Haider and
  • Dani Daas

Blockchain technology has emerged as a transformative solution for secure, immutable, and decentralized data management across diverse domains, including economics, healthcare, and supply chain management. Given its soaring adoption, it is crucial to...

  • Review
  • Open Access
5 Citations
8,381 Views
36 Pages

In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive...

  • Article
  • Open Access
2 Citations
2,729 Views
23 Pages

This research investigates the aesthetic evaluation of AI-generated neoplasticist artworks, exploring how well artificial intelligence systems, specifically Midjourney, replicate the core principles of neoplasticism, such as geometric forms, balance,...

  • Article
  • Open Access
4 Citations
8,650 Views
35 Pages

The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging t...

  • Article
  • Open Access
1 Citations
1,886 Views
19 Pages

SMS3D: 3D Synthetic Mushroom Scenes Dataset for 3D Object Detection and Pose Estimation

  • Abdollah Zakeri,
  • Bikram Koirala,
  • Jiming Kang,
  • Venkatesh Balan,
  • Weihang Zhu,
  • Driss Benhaddou and
  • Fatima A. Merchant

The mushroom farming industry struggles to automate harvesting due to limited large-scale annotated datasets and the complex growth patterns of mushrooms, which complicate detection, segmentation, and pose estimation. To address this, we introduce a...

  • Article
  • Open Access
1 Citations
1,288 Views
23 Pages

Lossless compression of medical images allows for rapid image data exchange and faithful recovery of the compressed data for medical image assessment. There are many useful telemedicine applications, for example in diagnosing conditions such as malar...

  • Article
  • Open Access
2 Citations
5,517 Views
15 Pages

The rapid digitalization of political campaigns has reshaped electioneering strategies, enabling political entities to leverage social media for targeted outreach. This study investigates the impact of digital political campaigning during the 2024 EU...

  • Article
  • Open Access
1 Citations
1,086 Views
23 Pages

Artificial neural networks are widely established models used to solve a variety of real-world problems in the fields of physics, chemistry, etc. These machine learning models contain a series of parameters that must be appropriately tuned by various...

  • Review
  • Open Access
29 Citations
12,282 Views
44 Pages

Advances in Federated Learning: Applications and Challenges in Smart Building Environments and Beyond

  • Mohamed Rafik Aymene Berkani,
  • Ammar Chouchane,
  • Yassine Himeur,
  • Abdelmalik Ouamane,
  • Sami Miniaoui,
  • Shadi Atalla,
  • Wathiq Mansoor and
  • Hussain Al-Ahmad

Federated Learning (FL) is a transformative decentralized approach in machine learning and deep learning, offering enhanced privacy, scalability, and data security. This review paper explores the foundational concepts, and architectural variations of...

  • Article
  • Open Access
1 Citations
1,986 Views
20 Pages

Cross-Dataset Data Augmentation Using UMAP for Deep Learning-Based Wind Speed Prediction

  • Eder Arley Leon-Gomez,
  • Andrés Marino Álvarez-Meza and
  • German Castellanos-Dominguez

Wind energy has emerged as a cornerstone in global efforts to transition to renewable energy, driven by its low environmental impact and significant generation potential. However, the inherent intermittency of wind, influenced by complex and dynamic...

  • Article
  • Open Access
2 Citations
2,686 Views
25 Pages

Learning Analytics to Guide Serious Game Development: A Case Study Using Articoding

  • Antonio Calvo-Morata,
  • Cristina Alonso-Fernández,
  • Julio Santilario-Berthilier,
  • Iván Martínez-Ortiz and
  • Baltasar Fernández-Manjón

Serious games are powerful interactive environments that provide more authentic experiences for learning or training different skills. However, developing effective serious games is complex, and a more systematic approach is needed to create better e...

  • Article
  • Open Access
5 Citations
3,635 Views
25 Pages

Digital twin (DT) technology has become a key enabler for prognostics and health management (PHM) in complex industrial systems, yet scaling predictive models for multi-component degradation (MCD) scenarios remains challenging, particularly when tran...

  • Article
  • Open Access
13 Citations
8,182 Views
19 Pages

FraudX AI: An Interpretable Machine Learning Framework for Credit Card Fraud Detection on Imbalanced Datasets

  • Nazerke Baisholan,
  • J. Eric Dietz,
  • Sergiy Gnatyuk,
  • Mussa Turdalyuly,
  • Eric T. Matson and
  • Karlygash Baisholanova

Credit card fraud detection is a critical research area due to the significant financial losses and security risks associated with fraudulent activities. This study presents FraudX AI, an ensemble-based framework addressing the challenges in fraud de...

  • Review
  • Open Access
1 Citations
4,205 Views
35 Pages

AI-Powered Software Development: A Systematic Review of Recommender Systems for Programmers

  • Efthimia Mavridou,
  • Eleni Vrochidou,
  • Theofanis Kalampokas,
  • Venetis Kanakaris and
  • George A. Papakostas

Software engineering is a field that demands extensive knowledge and involves numerous challenges in managing information. The information landscapes in software engineering encompass source code and its revision history, a set of explicit instructio...

  • Article
  • Open Access
825 Views
22 Pages

Enhancing CuFP Library with Self-Alignment Technique

  • Fahimeh Hajizadeh,
  • Tarek Ould-Bachir and
  • Jean Pierre David

High-Level Synthesis (HLS) tools have transformed FPGA development by streamlining digital design and enhancing efficiency. Meanwhile, advancements in semiconductor technology now support the integration of hundreds of floating-point units on a singl...

  • Article
  • Open Access
6 Citations
2,541 Views
30 Pages

The fairness problem in the IOTA (Internet of Things Application) Tangle network has significant implications for transaction efficiency, scalability, and security, particularly concerning orphan transactions and lazy tips. Traditional tip selection...

  • Article
  • Open Access
1 Citations
958 Views
19 Pages

Computer-driven assessment has revolutionized the way educational and professional assessments are conducted. Using artificial intelligence for data analytics, computer-based assessment improves efficiency, accuracy, and optimization of learning acro...

  • Article
  • Open Access
2 Citations
1,958 Views
27 Pages

The Digital Twin (DT) technology shifts the monitoring and control of physical assets into cyberspace through IoT, network, and simulation technologies. However, new challenges have arisen regarding the admissibility of evidence collected from Digita...

  • Article
  • Open Access
7 Citations
3,123 Views
18 Pages

Efficient Orchestration of Distributed Workloads in Multi-Region Kubernetes Cluster

  • Radoslav Furnadzhiev,
  • Mitko Shopov and
  • Nikolay Kakanakov

Distributed Kubernetes clusters provide robust solutions for geo-redundancy and fault tolerance in modern cloud architectures. However, default scheduling mechanisms primarily optimize for resource availability, often neglecting network topology, int...

  • Article
  • Open Access
1 Citations
2,006 Views
16 Pages

Fine-Tuned RoBERTa Model for Bug Detection in Mobile Games: A Comprehensive Approach

  • Muhammad Usman,
  • Muhammad Ahmad,
  • Fida Ullah,
  • Muhammad Muzamil,
  • Ameer Hamza,
  • Muhammad Jalal and
  • Alexander Gelbukh

In the current digital era, the Google Play Store and the App Store are major platforms for the distribution of mobile applications and games. Billions of users regularly download mobile games and provide reviews, which serve as a valuable resource f...

XFacebookLinkedIn
Computers - ISSN 2073-431X