Skip to Content

Computers, Volume 8, Issue 3

2019 September - 19 articles

Cover Story: In this paper, an intrusion detection system (IDS) and Blockchain-based delivery framework, entitled DeliveryCoin, is introduced. The proposed Blockchain-based delivery framework facilitates package delivery among self-driving nodes. In order to achieve privacy preservation, the proposed scheme employs hash functions and short signatures without random oracles and the strong Diffie–Hellman (SDH) assumption in bilinear groups. The article also introduces a novel UAV-aided forwarding mechanism, named pBFTF, that UAVs use in order to achieve consensus inside the Blockchain-based delivery platform. Finally, the article proposes an IDS system in each macro-eNB (5G) for detecting self-driving network attacks as well as false transactions between self-driving nodes. This is the first study that combines Blockchain technology with an IDS system into one architecturally-secure framework for a UAV-based delivery system. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
6 Citations
8,168 Views
15 Pages

Value Modeling for Ecosystem Analysis

  • Alejandro Arreola González,
  • Matthias Pfaff and
  • Helmut Krcmar

13 September 2019

Scholars have proposed many approaches to represent and analyze value creation. Value creation in ecosystems such as platform ecosystems often relies on a specific structure of partner alignment. Value modeling techniques can improve the understandin...

  • Article
  • Open Access
3 Citations
7,497 Views
21 Pages

Towards a Framework for Assessing IT Strategy Execution

  • José-Ramón Rodríguez,
  • Robert Clarisó and
  • Josep Maria Marco-Simó

13 September 2019

In this paper, we explore a framework for assessing the implementation of IT Strategic planning, grounded in the combination and iteration of different methods. It is a part of an Action Design Research exercise being made up at a leading online Euro...

  • Article
  • Open Access
6 Citations
7,331 Views
24 Pages

Process-Aware Enactment of Clinical Guidelines through Multimodal Interfaces

  • Tiziana Catarci,
  • Francesco Leotta,
  • Andrea Marrella,
  • Massimo Mecella and
  • Mahmoud Sharf

11 September 2019

Healthcare is one of the largest business segments in the world and is a critical area for future growth. In order to ensure efficient access to medical and patient-related information, hospitals have invested heavily in improving clinical mobile tec...

  • Article
  • Open Access
21 Citations
8,569 Views
17 Pages

8 September 2019

Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set...

  • Article
  • Open Access
7 Citations
7,742 Views
18 Pages

Parliamentary Open Data in Scandinavia

  • Lasse Berntzen,
  • Marius Rohde Johannessen,
  • Kim Normann Andersen and
  • Jonathan Crusoe

6 September 2019

This article presents a case study on the use of open data in the Scandinavian parliaments (Norway, Sweden, and Denmark). While the three countries have all opened the gates and provided access to data—for example, on the voting in parliament, debate...

  • Article
  • Open Access
1 Citations
6,805 Views
22 Pages

4 September 2019

This paper presents an online calculator for bank charges, motivated by information asymmetry in the market for payment accounts. The calculator provides users with a personalized list of the most suitable bank accounts based on required services and...

  • Article
  • Open Access
6 Citations
5,442 Views
18 Pages

2 September 2019

Localization has been regarded as one of the most fundamental problems to enable a mobile robot with autonomous capabilities. Probabilistic techniques such as Kalman or Particle filtering have long been used to solve robotic localization and mapping...

  • Article
  • Open Access
49 Citations
7,667 Views
12 Pages

An Intelligent Computer-Aided Scheme for Classifying Multiple Skin Lesions

  • Nazia Hameed,
  • Fozia Hameed,
  • Antesar Shabut,
  • Sehresh Khan,
  • Silvia Cirstea and
  • Alamgir Hossain

Skin diseases cases are increasing on a daily basis and are difficult to handle due to the global imbalance between skin disease patients and dermatologists. Skin diseases are among the top 5 leading cause of the worldwide disease burden. To reduce t...

  • Article
  • Open Access
5 Citations
7,395 Views
14 Pages

Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information store...

  • Article
  • Open Access
49 Citations
7,895 Views
16 Pages

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection

  • Ayyaz-Ul-Haq Qureshi,
  • Hadi Larijani,
  • Nhamoinesu Mtetwa,
  • Abbas Javed and
  • Jawad Ahmad

The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should...

  • Article
  • Open Access
28 Citations
38,571 Views
31 Pages

On Wikipedia, articles about various topics can be created and edited independently in each language version. Therefore, the quality of information about the same topic depends on the language. Any interested user can improve an article and that impr...

  • Article
  • Open Access
78 Citations
10,038 Views
15 Pages

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creat...

  • Article
  • Open Access
51 Citations
11,375 Views
19 Pages

The growing adoption of Radio-frequency Identification (RFID) systems, particularly in the healthcare field, demonstrates that RFID is a positive asset for healthcare institutions. RFID offers the ability to save organizations time and costs by enabl...

  • Review
  • Open Access
33 Citations
11,066 Views
16 Pages

Maintenance, which is critical for safe, reliable, quality, and cost-effective service, plays a dominant role in the railway industry. Therefore, this paper examines the importance and applications of Robotic and Autonomous Systems (RAS) in railway m...

  • Article
  • Open Access
19 Citations
6,593 Views
16 Pages

The growth of ecommerce has triggered online reviews as a rich source of product information. Revealing consumer sentiment from the reviews through Sentiment Analysis (SA) is an important task of online product review analysis. Two popular approaches...

  • Article
  • Open Access
2 Citations
6,235 Views
18 Pages

A Complexity Metrics Suite for Cascading Style Sheets

  • Adewole Adewumi,
  • Sanjay Misra and
  • Robertas Damaševičius

We perform a theoretical and empirical analysis of a set of Cascading Style Sheets (CSS) document complexity metrics. The metrics are validated using a practical framework that demonstrates their viability. The theoretical analysis is performed using...

  • Article
  • Open Access
2 Citations
6,590 Views
18 Pages

In 1947, N. Herlofson proposed a modification to the 1884 Heinrich Hertz’s Emagram with the goal of getting more precise hand-made weather forecasts providing larger angles between isotherms and adiabats. Since then, the Herlofson’s nomog...

  • Article
  • Open Access
101 Citations
12,596 Views
11 Pages

MRI Breast Tumor Segmentation Using Different Encoder and Decoder CNN Architectures

  • Mohammed El Adoui,
  • Sidi Ahmed Mahmoudi,
  • Mohamed Amine Larhmam and
  • Mohammed Benjelloun

Breast tumor segmentation in medical images is a decisive step for diagnosis and treatment follow-up. Automating this challenging task helps radiologists to reduce the high manual workload of breast cancer analysis. In this paper, we propose two deep...

  • Article
  • Open Access
6 Citations
6,536 Views
21 Pages

Several countries have invested in building their identity management systems to equip citizens with infrastructures and tools to benefit from e-services. However, current systems still lack the interoperability requirement, which is the core issue t...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X