Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 8, Issue 1

2019 March - 27 articles

Cover Story: We investigated user satisfaction in AR applied to three practical use cases. User satisfaction can be divided into satisfaction with the interaction and with the delivery device. A total of 142 participants from the three different industrial sectors of aeronautics, medicine, and astronautics contributed to this study. In our analysis, we investigated the influence of different factors, such as age, gender, education level, Internet knowledge, and the participants’ roles in the different sectors. Our results showed that computer knowledge has a positive effect on user satisfaction. Further analysis using two-factor interactions showed that there is no significant interaction between the different factors and user satisfaction. The results affirm that the questionnaires developed for user satisfaction of smart glasses and AR application performed well, with recommendations for further improvement. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (27)

  • Article
  • Open Access
18 Citations
6,485 Views
15 Pages

This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are estab...

  • Article
  • Open Access
12 Citations
11,101 Views
16 Pages

Modern robots often use more than one processing unit to solve the requirements in robotics. Robots are frequently designed in a modular manner to fulfill the possibility to be extended for future tasks. The use of multiple processing units leads to...

  • Article
  • Open Access
10 Citations
6,586 Views
16 Pages

At the present time, spatial data are often acquired using varied remote sensing sensors and systems, which produce big data sets. One significant product from these data is a digital model of geographical surfaces, including the surface of the sea f...

  • Feature Paper
  • Article
  • Open Access
3 Citations
10,011 Views
21 Pages

Physically-based mouth models operate on the principle that a better mouth animation will be produced by simulating physically accurate behaviour of the mouth. In the development of these models, it is useful to have an evaluation approach which can...

  • Article
  • Open Access
8 Citations
6,914 Views
12 Pages

A minimal length addition chain for a positive integer m is a finite sequence of positive integers such that (1) the first and last elements in the sequence are 1 and m, respectively, (2) any element greater than 1 in the sequence is the addition of...

  • Article
  • Open Access
3 Citations
7,245 Views
14 Pages

The vision of On-the-Fly (OTF) Computing is to compose and provide software services ad hoc, based on requirement descriptions in natural language. Since non-technical users write their software requirements themselves and in unrestricted natural lan...

  • Article
  • Open Access
21 Citations
8,363 Views
28 Pages

J48SS: A Novel Decision Tree Approach for the Handling of Sequential and Time Series Data

  • Andrea Brunello,
  • Enrico Marzano,
  • Angelo Montanari and
  • Guido Sciavicco

Temporal information plays a very important role in many analysis tasks, and can be encoded in at least two different ways. It can be modeled by discrete sequences of events as, for example, in the business intelligence domain, with the aim of tracki...

  • Article
  • Open Access
5 Citations
8,957 Views
11 Pages

One of the most widely used models for specifying functional requirements is a use case model. The viewpoint of the use case model that views a system as a black box focuses on descriptions of external interactions between the system and related envi...

  • Article
  • Open Access
9 Citations
9,496 Views
19 Pages

Automatic Correction of Arabic Dyslexic Text

  • Maha M. Alamri and
  • William J. Teahan

21 February 2019

This paper proposes an automatic correction system that detects and corrects dyslexic errors in Arabic text. The system uses a language model based on the Prediction by Partial Matching (PPM) text compression scheme that generates possible alternativ...

  • Article
  • Open Access
41 Citations
9,242 Views
18 Pages

20 February 2019

Text visualization is a rapidly growing sub-field of information visualization and visual analytics. There are many approaches and techniques introduced every year to address a wide range of challenges and analysis tasks, enabling researchers from di...

  • Article
  • Open Access
14 Citations
7,050 Views
15 Pages

20 February 2019

The Sensing as a Service is emerging as a new Internet of Things (IoT) business model for sensors and data sharing in the cloud. Under this paradigm, a resource allocation model for the assignment of both sensors and cloud resources to clients/applic...

  • Article
  • Open Access
5 Citations
7,525 Views
22 Pages

18 February 2019

The Japanese government aims to introduce self-driven vehicles by 2020 to reduce the number of accidents and traffic jams. Various methods have been proposed for traffic control at accident-prone intersections to achieve safe and efficient self-drivi...

  • Article
  • Open Access
1 Citations
6,519 Views
17 Pages

9 February 2019

The generation of high dynamic range (HDR) images in the presence of moving objects results in the appearance of blurred objects. These blurred objects are called ghosts. Over the past decade, numerous deghosting techniques have been proposed for rem...

  • Article
  • Open Access
16 Citations
14,121 Views
16 Pages

8 February 2019

As we move towards improving the skill of computers to play games like chess against humans, the ability to accurately perceive real-world game boards and game states remains a challenge in many cases, hindering the development of game-playing robots...

  • Article
  • Open Access
7 Citations
9,593 Views
17 Pages

7 February 2019

This paper describes an approach introducing location intelligence using open-source software components as the solution for planning and construction of the airport infrastructure. As a case study, the spatial information system of the International...

  • Feature Paper
  • Article
  • Open Access
2 Citations
7,009 Views
21 Pages

Feature-Rich, GPU-Assisted Scatterplots for Millions of Call Events

  • Dylan Rees,
  • Richard C. Roberts,
  • Roberts S. Laramee,
  • Paul Brookes,
  • Tony D’Cruze and
  • Gary A. Smith

5 February 2019

The contact center industry represents a large proportion of many country’s economies. For example, 4% of the entire United States and UK’s working population is employed in this sector. As in most modern industries, contact centers gener...

  • Article
  • Open Access
11 Citations
7,950 Views
20 Pages

2 February 2019

Most source code plagiarism detection tools only rely on source code similarity to indicate plagiarism. This can be an issue since not all source code pairs with high similarity are plagiarism. Moreover, the culprits (i.e., the ones who plagiarise) c...

  • Article
  • Open Access
13 Citations
7,746 Views
17 Pages

Generalized Majority Voter Design Method for N-Modular Redundant Systems Used in Mission- and Safety-Critical Applications

  • Jaytrilok Choudhary,
  • Padmanabhan Balasubramanian,
  • Danny M. Varghese,
  • Dhirendra Pratap Singh and
  • Douglas Maskell

28 January 2019

Mission- and safety-critical circuits and systems employ redundancy in their designs to overcome any faults or failures of constituent circuits and systems during the normal operation. In this aspect, the N-modular redundancy (NMR) is widely used. An...

  • Article
  • Open Access
56 Citations
13,150 Views
23 Pages

With the recent developments in augmented reality (AR) technologies comes an increased interest in the use of smart glasses for hands-on training. Whether this interest is turned into market success depends at the least on whether the interaction wit...

  • Article
  • Open Access
88 Citations
8,929 Views
13 Pages

Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique

  • Marcus Lim,
  • Azween Abdullah,
  • NZ Jhanjhi and
  • Mahadevan Supramaniam

Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these networks tend...

  • Article
  • Open Access
5 Citations
5,859 Views
16 Pages

Position Certainty Propagation: A Localization Service for Ad-Hoc Networks

  • Abdallah Sobehy,
  • Eric Renault and
  • Paul Muhlethaler

Location services for ad-hoc networks are of indispensable value for a wide range of applications, such as the Internet of Things (IoT) and vehicular ad-hoc networks (VANETs). Each context requires a solution that addresses the specific needs of the...

  • Article
  • Open Access
65 Citations
10,655 Views
16 Pages

Sentiment Analysis of Lithuanian Texts Using Traditional and Deep Learning Approaches

  • Jurgita Kapočiūtė-Dzikienė,
  • Robertas Damaševičius and
  • Marcin Woźniak

We describe the sentiment analysis experiments that were performed on the Lithuanian Internet comment dataset using traditional machine learning (Naïve Bayes Multinomial—NBM and Support Vector Machine—SVM) and deep learning (Long Sho...

  • Article
  • Open Access
15 Citations
9,777 Views
11 Pages

Robust Cochlear-Model-Based Speech Recognition

  • Mladen Russo,
  • Maja Stella,
  • Marjan Sikora and
  • Vesna Pekić

Accurate speech recognition can provide a natural interface for human–computer interaction. Recognition rates of the modern speech recognition systems are highly dependent on background noise levels and a choice of acoustic feature extraction m...

  • Article
  • Open Access
45 Citations
10,311 Views
24 Pages

29 December 2018

Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iri...

  • Article
  • Open Access
75 Citations
11,664 Views
26 Pages

Neural Network-Based Formula for the Buckling Load Prediction of I-Section Cellular Steel Beams

  • Miguel Abambres,
  • Komal Rajana,
  • Konstantinos Daniel Tsavdaridis and
  • Tiago Pinto Ribeiro

26 December 2018

Cellular beams are an attractive option for the steel construction industry due to their versatility in terms of strength, size, and weight. Further benefits are the integration of services thereby reducing ceiling-to-floor depth (thus, building&rsqu...

  • Article
  • Open Access
10 Citations
7,343 Views
14 Pages

Prototypes of User Interfaces for Mobile Applications for Patients with Diabetes

  • Jan Pavlas,
  • Ondrej Krejcar,
  • Petra Maresova and
  • Ali Selamat

23 December 2018

We live in a heavily technologized global society. It is therefore not surprising that efforts are being made to integrate current information technology into the treatment of diabetes mellitus. This paper is dedicated to improving the treatment of t...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X