You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 8, Issue 4

December 2019 - 22 articles

Cover Story: In this paper, a robotic vision system is proposed that constantly uses a 3D camera, while actively switching to use a second RGB camera in cases where it is necessary. It detects objects in the view seen by the 3D camera, which is mounted on a PR2 humanoid robot’s head, and in the event of low confidence regarding the detection correctness, the secondary camera, which is installed on the robot’s arm, is moved toward the object to obtain another perspective of it. Detections in the two camera views are matched and their recognitions are fused through a novel approach based on the Dempster–Shafer evidence theory. Significant improvements in object detection performance are observed after employing the proposed active vision system. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
9 Citations
23,811 Views
17 Pages

IP Spoofing In and Out of the Public Cloud: From Policy to Practice

  • Natalija Vlajic,
  • Mashruf Chowdhury and
  • Marin Litoiu

9 November 2019

In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be t...

  • Article
  • Open Access
97 Citations
12,430 Views
15 Pages

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

  • S. H. Kok,
  • Azween Abdullah,
  • NZ Jhanjhi and
  • Mahadevan Supramaniam

1 November 2019

Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it ma...

  • Article
  • Open Access
2 Citations
7,358 Views
16 Pages

1 November 2019

Software security is a component of software development that should be integrated throughout its entire development lifecycle, and not simply as an afterthought. If security vulnerabilities are caught early in development, they can be fixed before t...

  • Article
  • Open Access
4,550 Views
13 Pages

31 October 2019

The possibility of emulating renewable energy sources by means of portable, low-cost embedded devices is a key factor for the design and validation of ultra low-power networked embedded systems. Full characterisation of hardware-software platforms us...

  • Review
  • Open Access
131 Citations
16,357 Views
22 Pages

Review on Techniques for Plant Leaf Classification and Recognition

  • Muhammad Azfar Firdaus Azlah,
  • Lee Suan Chua,
  • Fakhrul Razan Rahmad,
  • Farah Izana Abdullah and
  • Sharifah Rafidah Wan Alwi

21 October 2019

Plant systematics can be classified and recognized based on their reproductive system (flowers) and leaf morphology. Neural networks is one of the most popular machine learning algorithms for plant leaf classification. The commonly used neutral netwo...

  • Article
  • Open Access
12 Citations
6,958 Views
15 Pages

Lithuanian Speech Recognition Using Purely Phonetic Deep Learning

  • Laurynas Pipiras,
  • Rytis Maskeliūnas and
  • Robertas Damaševičius

18 October 2019

Automatic speech recognition (ASR) has been one of the biggest and hardest challenges in the field. A large majority of research in this area focuses on widely spoken languages such as English. The problems of automatic Lithuanian speech recognition...

  • Article
  • Open Access
5 Citations
5,326 Views
25 Pages

An Efficient Group-Based Control Signalling within Proxy Mobile IPv6 Protocol

  • Safwan M. Ghaleb,
  • Shamala Subramaniam,
  • Mukhtar Ghaleb and
  • Ali Mohamed E. Ejmaa

Providing a seamless handover in the Internet of Thing (IoT) applications with minimal efforts is a big challenge in mobility management protocols. Several research efforts have been attempted to maintain the connectivity of nodes while performing mo...

  • Article
  • Open Access
31 Citations
7,916 Views
14 Pages

27 September 2019

IT investment is a crucial issue as it does not only influence the performance in Small-Medium Enterprises (SMEs) but it also helps executives to align business strategy with organizational performance. Admittedly, though, there is ineffective use of...

  • Article
  • Open Access
68 Citations
8,360 Views
21 Pages

24 September 2019

Image segmentation is a crucial step of almost any Digital Rock workflow. In this paper, we propose an approach for generation of a labelled dataset and investigate an application of three popular convolutional neural networks (CNN) architectures for...

  • Communication
  • Open Access
3 Citations
5,650 Views
15 Pages

Big Data Use and Challenges: Insights from Two Internet-Mediated Surveys

  • Elisa Rossi,
  • Cinzia Rubattino and
  • Gianluigi Viscusi

24 September 2019

Big data and analytics have received great attention from practitioners and academics, nowadays representing a key resource for the renewed interest in artificial intelligence, especially for machine learning techniques. In this article we explore th...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X