You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 14, Issue 8

August 2025 - 48 articles

Cover Story: This paper provides a comprehensive survey of the ENF as an environmental fingerprint for enhancing Metaverse security, reviewing its characteristics, sensing methods, limitations, and applications in threat modeling and the CIA triad (confidentiality, integrity, and availability). By capturing the ENF as having a unique signature that is timestamped, this method strengthens security by directly correlating physical grid behavior and virtual interactions, effectively combating threats such as deepfake manipulations. Building upon recent developments in signal processing, this strategy reinforces the integrity of digital environments, delivering robust protection against evolving cyber–physical risks and facilitating secure, scalable virtual infrastructures. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (48)

  • Tutorial
  • Open Access
4,625 Views
21 Pages

16 August 2025

Large language models (LLMs) now match or exceed human performance on many open-ended language tasks, yet they continue to produce fluent but incorrect statements, which is a failure mode widely referred to as hallucination. In low-stakes settings th...

  • Article
  • Open Access
1,976 Views
37 Pages

Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection

  • Steven Jabulani Nhlapo,
  • Elodie Ngoie Mutombo and
  • Mike Nkongolo Wa Nkongolo

15 August 2025

Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine le...

  • Article
  • Open Access
896 Views
20 Pages

Enhancing Cardiovascular Disease Detection Through Exploratory Predictive Modeling Using DenseNet-Based Deep Learning

  • Wael Hadi,
  • Tushar Jaware,
  • Tarek Khalifa,
  • Faisal Aburub,
  • Nawaf Ali and
  • Rashmi Saini

15 August 2025

Cardiovascular Disease (CVD) remains the number one cause of morbidity and mortality, accounting for 17.9 million deaths every year. Precise and early diagnosis is therefore critical to the betterment of the patient’s outcomes and the many burd...

  • Article
  • Open Access
3 Citations
5,597 Views
15 Pages

15 August 2025

Predictive maintenance (PdM) represents a significant evolution in maintenance strategies. However, challenges such as system integration complexity, data quality, and data availability are intricately intertwined, collectively impacting the successf...

  • Article
  • Open Access
2 Citations
3,738 Views
22 Pages

Drone Frame Optimization via Simulation and 3D Printing

  • Faris Kateb,
  • Abdul Haseeb,
  • Syed Misbah-Un-Noor,
  • Bandar M. Alghamdi,
  • Fazal Qudus Khan,
  • Bilal Khan,
  • Abdul Baseer,
  • Masood Iqbal Marwat and
  • Sadeeq Jan

13 August 2025

This study presents a simulation-driven methodology for the design and optimization of a lightweight drone frame. Starting with a CAD model developed in SolidWorks, finite element analysis (FEA) and computational fluid dynamics (CFD) which are used t...

  • Article
  • Open Access
1 Citations
1,160 Views
25 Pages

13 August 2025

The development of reliable visual inference models is often constrained by the burdensome and time-consuming processes involved in collecting and annotating high-quality datasets. This challenge becomes more acute in domains where key phenomena are...

  • Article
  • Open Access
8,140 Views
52 Pages

13 August 2025

With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware...

  • Article
  • Open Access
1 Citations
895 Views
14 Pages

An Integrated Intuitionistic Fuzzy-Clustering Approach for Missing Data Imputation

  • Charlène Béatrice Bridge-Nduwimana,
  • Aziza El Ouaazizi and
  • Majid Benyakhlef

12 August 2025

Missing data imputation is a critical preprocessing task that directly impacts the quality and reliability of data-driven analyses, yet many existing methods treat numerical and categorical data separately and lack the integration of advanced techniq...

  • Article
  • Open Access
3,049 Views
31 Pages

12 August 2025

As cyber threats such as phishing and ransomware continue to escalate, healthcare systems are facing significant challenges in protecting sensitive data and ensuring operational continuity. This study explores how email communication practices influe...

  • Article
  • Open Access
1,390 Views
20 Pages

Multilingual Named Entity Recognition in Arabic and Urdu Tweets Using Pretrained Transfer Learning Models

  • Fida Ullah,
  • Muhammad Ahmad,
  • Grigori Sidorov,
  • Ildar Batyrshin,
  • Edgardo Manuel Felipe Riverón and
  • Alexander Gelbukh

11 August 2025

The increasing use of Arabic and Urdu on social media platforms, particularly Twitter, has created a growing need for robust Named Entity Recognition (NER) systems capable of handling noisy, informal, and code-mixed content. However, both languages r...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X