Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 14, Issue 8

2025 August - 48 articles

Cover Story: This paper provides a comprehensive survey of the ENF as an environmental fingerprint for enhancing Metaverse security, reviewing its characteristics, sensing methods, limitations, and applications in threat modeling and the CIA triad (confidentiality, integrity, and availability). By capturing the ENF as having a unique signature that is timestamped, this method strengthens security by directly correlating physical grid behavior and virtual interactions, effectively combating threats such as deepfake manipulations. Building upon recent developments in signal processing, this strategy reinforces the integrity of digital environments, delivering robust protection against evolving cyber–physical risks and facilitating secure, scalable virtual infrastructures. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (48)

  • Review
  • Open Access
18 Citations
12,273 Views
54 Pages

A Comprehensive Review of Sensor Technologies in IoT: Technical Aspects, Challenges, and Future Directions

  • Sadiq H. Abdulhussain,
  • Basheera M. Mahmmod,
  • Almuntadher Alwhelat,
  • Dina Shehada,
  • Zainab I. Shihab,
  • Hala J. Mohammed,
  • Tuqa H. Abdulameer,
  • Muntadher Alsabah,
  • Maryam H. Fadel and
  • Abir Hussain
  • + 3 authors

21 August 2025

The rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes,...

  • Article
  • Open Access
889 Views
16 Pages

21 August 2025

Synthetic training data is often essential for neural-network-based segmentation when real datasets are difficult or impossible to obtain. Conventional synthetic data generation relies on manually selecting scene and material parameters. This can lea...

  • Article
  • Open Access
830 Views
16 Pages

Enhancement in Three-Dimensional Depth with Bionic Image Processing

  • Yuhe Chen,
  • Chao Ping Chen,
  • Baoen Han and
  • Yunfan Yang

20 August 2025

This study proposes an image processing framework based on bionic principles to optimize 3D visual perception in virtual reality (VR) systems. By simulating the physiological mechanisms of the human visual system, the framework significantly enhances...

  • Article
  • Open Access
1 Citations
2,289 Views
23 Pages

19 August 2025

Soulslike games are renowned for their challenging gameplay and distinctive design. To examine player reception of this genre, 993,932 user reviews of 21 Soulslike video games were collected from the Steam platform, of which 418,483 were tagged as En...

  • Article
  • Open Access
1,777 Views
19 Pages

Leveraging Contrastive Semantics and Language Adaptation for Robust Financial Text Classification Across Languages

  • Liman Zhang,
  • Qianye Lin,
  • Fanyu Meng,
  • Siyu Liang,
  • Jingxuan Lu,
  • Shen Liu,
  • Kehan Chen and
  • Yan Zhan

19 August 2025

With the growing demand for multilingual financial information, cross-lingual financial sentiment recognition faces significant challenges, including semantic misalignment, ambiguous sentiment expression, and insufficient transferability. To address...

  • Article
  • Open Access
1,706 Views
23 Pages

Assessing Burned Area Detection in Indonesia Using the Stacking Ensemble Neural Network (SENN): A Comparative Analysis of C- and L-Band Performance

  • Dodi Sudiana,
  • Anugrah Indah Lestari,
  • Mia Rizkinia,
  • Indra Riyanto,
  • Yenni Vetrita,
  • Athar Abdurrahman Bayanuddin,
  • Fanny Aditya Putri,
  • Tatik Kartika,
  • Argo Galih Suhadha and
  • Josaphat Tetuko Sri Sumantyo
  • + 3 authors

18 August 2025

Burned area detection plays a critical role in assessing the impact of forest and land fires, particularly in Indonesia, where both peatland and non-peatland areas are increasingly affected. Optical remote sensing has been widely used for this task,...

  • Article
  • Open Access
3 Citations
1,536 Views
19 Pages

CNN-Random Forest Hybrid Method for Phenology-Based Paddy Rice Mapping Using Sentinel-2 and Landsat-8 Satellite Images

  • Dodi Sudiana,
  • Sayyidah Hanifah Putri,
  • Dony Kushardono,
  • Anton Satria Prabuwono,
  • Josaphat Tetuko Sri Sumantyo and
  • Mia Rizkinia

18 August 2025

The agricultural sector plays a vital role in achieving the second Sustainable Development Goal: “Zero Hunger”. To ensure food security, agriculture must remain resilient and productive. In Indonesia, a major rice-producing country, the c...

  • Article
  • Open Access
2 Citations
1,117 Views
20 Pages

18 August 2025

In recent years, the increasing adoption of High-Performance Computing (HPC) clusters in scientific research and engineering has exposed challenges such as resource imbalance, node idleness, and overload, which hinder scheduling efficiency. Accurate...

  • Article
  • Open Access
1 Citations
849 Views
20 Pages

18 August 2025

Accurately distinguishing hemiplegic gait from healthy gait is significant for alleviating clinicians’ diagnostic workloads and enhancing rehabilitation efficiency. The center of pressure (CoP) trajectory extracted from pressure sensor arrays c...

  • Article
  • Open Access
2 Citations
1,712 Views
28 Pages

Comparison of Modern Convolution and Transformer Architectures: YOLO and RT-DETR in Meniscus Diagnosis

  • Aizhan Tlebaldinova,
  • Zbigniew Omiotek,
  • Markhaba Karmenova,
  • Saule Kumargazhanova,
  • Saule Smailova,
  • Akerke Tankibayeva,
  • Akbota Kumarkanova and
  • Ivan Glinskiy

17 August 2025

The aim of this study is a comparative evaluation of the effectiveness of YOLO and RT-DETR family models for the automatic recognition and localization of meniscus tears in knee joint MRI images. The experiments were conducted on a proprietary annota...

  • Tutorial
  • Open Access
5,925 Views
21 Pages

16 August 2025

Large language models (LLMs) now match or exceed human performance on many open-ended language tasks, yet they continue to produce fluent but incorrect statements, which is a failure mode widely referred to as hallucination. In low-stakes settings th...

  • Article
  • Open Access
2,430 Views
37 Pages

Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection

  • Steven Jabulani Nhlapo,
  • Elodie Ngoie Mutombo and
  • Mike Nkongolo Wa Nkongolo

15 August 2025

Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine le...

  • Article
  • Open Access
1,036 Views
20 Pages

Enhancing Cardiovascular Disease Detection Through Exploratory Predictive Modeling Using DenseNet-Based Deep Learning

  • Wael Hadi,
  • Tushar Jaware,
  • Tarek Khalifa,
  • Faisal Aburub,
  • Nawaf Ali and
  • Rashmi Saini

15 August 2025

Cardiovascular Disease (CVD) remains the number one cause of morbidity and mortality, accounting for 17.9 million deaths every year. Precise and early diagnosis is therefore critical to the betterment of the patient’s outcomes and the many burd...

  • Article
  • Open Access
3 Citations
6,754 Views
15 Pages

15 August 2025

Predictive maintenance (PdM) represents a significant evolution in maintenance strategies. However, challenges such as system integration complexity, data quality, and data availability are intricately intertwined, collectively impacting the successf...

  • Article
  • Open Access
2 Citations
4,582 Views
22 Pages

Drone Frame Optimization via Simulation and 3D Printing

  • Faris Kateb,
  • Abdul Haseeb,
  • Syed Misbah-Un-Noor,
  • Bandar M. Alghamdi,
  • Fazal Qudus Khan,
  • Bilal Khan,
  • Abdul Baseer,
  • Masood Iqbal Marwat and
  • Sadeeq Jan

13 August 2025

This study presents a simulation-driven methodology for the design and optimization of a lightweight drone frame. Starting with a CAD model developed in SolidWorks, finite element analysis (FEA) and computational fluid dynamics (CFD) which are used t...

  • Article
  • Open Access
1 Citations
1,437 Views
25 Pages

13 August 2025

The development of reliable visual inference models is often constrained by the burdensome and time-consuming processes involved in collecting and annotating high-quality datasets. This challenge becomes more acute in domains where key phenomena are...

  • Article
  • Open Access
2 Citations
9,704 Views
52 Pages

13 August 2025

With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware...

  • Article
  • Open Access
1 Citations
1,046 Views
14 Pages

An Integrated Intuitionistic Fuzzy-Clustering Approach for Missing Data Imputation

  • Charlène Béatrice Bridge-Nduwimana,
  • Aziza El Ouaazizi and
  • Majid Benyakhlef

12 August 2025

Missing data imputation is a critical preprocessing task that directly impacts the quality and reliability of data-driven analyses, yet many existing methods treat numerical and categorical data separately and lack the integration of advanced techniq...

  • Article
  • Open Access
3,551 Views
31 Pages

12 August 2025

As cyber threats such as phishing and ransomware continue to escalate, healthcare systems are facing significant challenges in protecting sensitive data and ensuring operational continuity. This study explores how email communication practices influe...

  • Article
  • Open Access
1,671 Views
20 Pages

Multilingual Named Entity Recognition in Arabic and Urdu Tweets Using Pretrained Transfer Learning Models

  • Fida Ullah,
  • Muhammad Ahmad,
  • Grigori Sidorov,
  • Ildar Batyrshin,
  • Edgardo Manuel Felipe Riverón and
  • Alexander Gelbukh

11 August 2025

The increasing use of Arabic and Urdu on social media platforms, particularly Twitter, has created a growing need for robust Named Entity Recognition (NER) systems capable of handling noisy, informal, and code-mixed content. However, both languages r...

  • Article
  • Open Access
1 Citations
2,639 Views
26 Pages

As an introductory core course in computer science and related fields, “Fundamentals of Programming” has always faced many challenges in stimulating students’ interest in learning and cultivating their practical coding abilities. Th...

  • Article
  • Open Access
1 Citations
1,862 Views
45 Pages

The rapid expansion of the Metaverse presents complex security challenges, particularly in verifying virtual objects and avatars within immersive environments. Conventional authentication methods, such as passwords and biometrics, often prove inadequ...

  • Article
  • Open Access
3,915 Views
23 Pages

Healthcare AI for Physician-Centered Decision-Making: Case Study of Applying Deep Learning to Aid Medical Professionals

  • Aleksandar Milenkovic,
  • Andjelija Djordjevic,
  • Dragan Jankovic,
  • Petar Rajkovic,
  • Kofi Edee and
  • Tatjana Gric

This paper aims to leverage artificial intelligence (AI) to assist physicians in utilizing advanced deep learning techniques integrated into developed models within electronic health records (EHRs) in medical information systems (MISes), which have b...

  • Article
  • Open Access
1 Citations
2,072 Views
24 Pages

This study evaluates the performance and energy trade-offs of three popular data processing libraries—Pandas, PySpark, and Polars—applied to GreenNav, a CO2 emission prediction pipeline for urban traffic. GreenNav is an eco-friendly navig...

  • Review
  • Open Access
5,949 Views
29 Pages

Industries 4.0 and 5.0 are based on technological advances, notably large language models (LLMs), which are making a significant contribution to the transition to smart factories. Although considerable research has explored this phenomenon, the liter...

  • Article
  • Open Access
2,219 Views
31 Pages

Ensuring Zero Trust in GDPR-Compliant Deep Federated Learning Architecture

  • Zahra Abbas,
  • Sunila Fatima Ahmad,
  • Adeel Anjum,
  • Madiha Haider Syed,
  • Saif Ur Rehman Malik and
  • Semeen Rehman

Deep Federated Learning (DFL) revolutionizes machine learning (ML) by enabling collaborative model training across diverse, decentralized data sources without direct data sharing, emphasizing user privacy and data sovereignty. Despite its potential,...

  • Review
  • Open Access
1,801 Views
22 Pages

Multi-objective evolutionary algorithms (MOEAs) have emerged as powerful optimization tools for addressing the complex, often conflicting goals present in modern waste disposal systems. This review explores recent advances and practical applications...

  • Article
  • Open Access
2 Citations
1,122 Views
28 Pages

Adversarial attacks in Natural Language Processing (NLP) present a critical challenge, particularly in sentiment analysis, where subtle input modifications can significantly alter model predictions. In search of more robust defenses against adversari...

  • Article
  • Open Access
2 Citations
2,317 Views
20 Pages

In distance learning environments, learner engagement directly impacts attention, motivation, and academic performance. Signs of fatigue, negative affect, or critical remarks can warn of growing disengagement and potential dropout. However, most exis...

  • Review
  • Open Access
1,053 Views
49 Pages

A Map of the Research About Lighting Systems in the 1995–2024 Time Frame

  • Gaetanino Paolone,
  • Andrea Piazza,
  • Francesco Pilotti,
  • Romolo Paesani,
  • Jacopo Camplone and
  • Paolino Di Felice

Lighting Systems (LSs) are a key component of modern cities. Across the years, thousands of articles have been published on this topic; nevertheless, a map of the state of the art of the extant literature is lacking. The present review reports on an...

  • Article
  • Open Access
1 Citations
2,915 Views
19 Pages

User-Centered Design of a Computer Vision System for Monitoring PPE Compliance in Manufacturing

  • Luis Alberto Trujillo-Lopez,
  • Rodrigo Alejandro Raymundo-Guevara and
  • Juan Carlos Morales-Arevalo

In manufacturing environments, the proper use of Personal Protective Equipment (PPE) is essential to prevent workplace accidents. Despite this need, existing PPE monitoring methods remain largely manual and suffer from limited coverage, significant e...

  • Article
  • Open Access
1,023 Views
15 Pages

Catalysis research is complex and interdisciplinary, involving diverse physical effects and challenging data practices. Research data often captures only selected aspects, such as specific reactants and products, limiting its utility for machine lear...

  • Article
  • Open Access
935 Views
20 Pages

Spectral Graph Compression in Deploying Recommender Algorithms on Quantum Simulators

  • Chenxi Liu,
  • W. Bernard Lee and
  • Anthony G. Constantinides

This follow-up scientific case study builds on prior research to explore the computational challenges of applying quantum algorithms to financial asset management, focusing specifically on solving the graph-cut problem for investment recommendation....

  • Review
  • Open Access
3 Citations
1,719 Views
25 Pages

The rapid evolution of deep learning (DL) has fundamentally transformed the paradigm for detecting special components in agricultural products, addressing critical challenges in food safety, quality control, and precision agriculture. This comprehens...

  • Article
  • Open Access
607 Views
24 Pages

Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response

  • Jesús M. López-Lezama,
  • Nicolás Muñoz-Galeano,
  • Sergio D. Saldarriaga-Zuluaga and
  • Santiago Bustamante-Mesa

Power system infrastructure is exposed to a range of threats, including both naturally occurring events and intentional attacks. Traditional vulnerability assessment models, typically based on the N-1 criterion, do not account for the intentionality...

  • Article
  • Open Access
3 Citations
2,567 Views
30 Pages

Real-time wildlife monitoring on edge devices poses significant challenges due to limited power, constrained bandwidth, and unreliable connectivity, especially in remote natural habitats. Conventional object detection systems often transmit redundant...

  • Article
  • Open Access
2 Citations
4,124 Views
24 Pages

This article investigates the revolutionary potential of AI-powered virtual assistants in augmented reality (AR) and virtual reality (VR) environments, concentrating primarily on their impact on special needs schooling. We investigate the complex cha...

  • Article
  • Open Access
1,083 Views
18 Pages

Assessment of Machine Learning-Driven Retrievals of Arctic Sea Ice Thickness from L-Band Radiometry Remote Sensing

  • Ferran Hernández-Macià,
  • Gemma Sanjuan Gomez,
  • Carolina Gabarró and
  • Maria José Escorihuela

This study evaluates machine learning-based methods for retrieving thin Arctic sea ice thickness (SIT) from L-band radiometry, using data from the European Space Agency’s (ESA) Soil Moisture and Ocean Salinity (SMOS) satellite. In addition to t...

  • Systematic Review
  • Open Access
1 Citations
2,174 Views
24 Pages

Artificial Intelligence Approach for Waste-Printed Circuit Board Recycling: A Systematic Review

  • Muhammad Mohsin,
  • Stefano Rovetta,
  • Francesco Masulli and
  • Alberto Cabri

The rapid advancement of technology has led to a substantial increase in Waste Electrical and Electronic Equipment (WEEE), which poses significant environmental threats and increases pressure on the planet’s limited natural resources. In respon...

  • Article
  • Open Access
1,102 Views
17 Pages

White Matter Microstructure Differences Between Congenital and Acquired Hearing Loss Patients Using Diffusion Tensor Imaging (DTI) and Machine Learning

  • Fatimah Kayla Kameela,
  • Fikri Mirza Putranto,
  • Prasandhya Astagiri Yusuf,
  • Arierta Pujitresnani,
  • Vanya Vabrina Valindria,
  • Dodi Sudiana and
  • Mia Rizkinia

Diffusion tensor imaging (DTI) metrics provide insights into neural pathways, which can be pivotal in differentiating congenital and acquired hearing loss to support diagnosis, especially for those diagnosed late. In this study, we analyzed DTI param...

  • Article
  • Open Access
1 Citations
1,324 Views
28 Pages

In the recommendation system (RS) literature, a distinction exists between studies dedicated to fully operational (known users/items) and cold-start (new users/items) RSs. The warm-up phase—the transition between the two—is not widely res...

  • Article
  • Open Access
2 Citations
3,607 Views
30 Pages

A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction

  • Yelizaveta Vitulyova,
  • Tetiana Babenko,
  • Kateryna Kolesnikova,
  • Nikolay Kiktev and
  • Olga Abramkina

The escalating complexity of cyberattacks necessitates advanced strategies for their detection and mitigation. This study presents a hybrid model that integrates Graph Neural Networks (GNNs) with Long Short-Term Memory (LSTM) networks to reconstruct...

  • Article
  • Open Access
1 Citations
984 Views
37 Pages

Integrating blockchain into healthcare devices offers the potential for improved data control but faces significant usability and acceptance challenges. This study addresses this gap by evaluating CipherPal, an improved blockchain-enabled Smart Fidge...

  • Review
  • Open Access
3 Citations
4,232 Views
25 Pages

EEG-Based Biometric Identification and Emotion Recognition: An Overview

  • Miguel A. Becerra,
  • Carolina Duque-Mejia,
  • Andres Castro-Ospina,
  • Leonardo Serna-Guarín,
  • Cristian Mejía and
  • Eduardo Duque-Grisales

This overview examines recent advancements in EEG-based biometric identification, focusing on integrating emotional recognition to enhance the robustness and accuracy of biometric systems. By leveraging the unique physiological properties of EEG sign...

  • Review
  • Open Access
5 Citations
3,249 Views
37 Pages

Deep Learning Techniques for Retinal Layer Segmentation to Aid Ocular Disease Diagnosis: A Review

  • Oliver Jonathan Quintana-Quintana,
  • Marco Antonio Aceves-Fernández,
  • Jesús Carlos Pedraza-Ortega,
  • Gendry Alfonso-Francia and
  • Saul Tovar-Arriaga

Age-related ocular conditions like macular degeneration (AMD), diabetic retinopathy (DR), and glaucoma are leading causes of irreversible vision loss globally. Optical coherence tomography (OCT) provides essential non-invasive visualization of retina...

  • Article
  • Open Access
2 Citations
2,305 Views
25 Pages

The increasing complexity of cybersecurity risks highlights the critical need for novel teaching techniques that provide students with the necessary skills and information. Traditional on-premises laboratory setups frequently lack the scalability, fl...

  • Article
  • Open Access
760 Views
14 Pages

This paper looks at and describes the potential of using artificial intelligence in smart environments. Various environments such as houses and residential and commercial buildings are becoming smarter through the use of various technologies, i.e., v...

  • Article
  • Open Access
1,364 Views
15 Pages

Dark web traffic classification is an important research direction in cybersecurity; however, traditional classification methods have many limitations. Although deep learning architectures like CNN and LSTM, as well as multi-structural fusion framewo...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X