Next Issue
Volume 12, January
Previous Issue
Volume 11, November
 
 

Computers, Volume 11, Issue 12 (December 2022) – 19 articles

Cover Story (view full-size image): In 1926, Schrödinger published the function that governs the wave function of a quantum system. However, solving the Schrödinger equation is not a simple task. Obtaining the solution means finding the wave function, which allows predicting the physical and chemical properties of the quantum system. During the last decade, the application of algorithms and principles of quantum computation in disciplines other than physics and chemistry, such as biology and artificial intelligence, has led to the search for alternative techniques with which to obtain approximate solutions of the Schrödinger equation. We review and illustrate the application of genetic algorithms, i.e., procedures inspired by Darwinian evolution, in elementary quantum systems and in quantum models of artificial intelligence. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
35 pages, 9144 KiB  
Article
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
by Abdelhak Hidouri, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded and Paul Muhlethaler
Computers 2022, 11(12), 186; https://doi.org/10.3390/computers11120186 - 14 Dec 2022
Cited by 12 | Viewed by 3100
Abstract
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more [...] Read more.
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more sophisticated and the foremost challenge is to identify unknown and obfuscated malware, as the malware authors use different evasion techniques for information concealing to prevent detection by an Intrusion Detection System (IDS). For the most part, NDN faces immense negative impacts from attacks such as Cache Pollution Attacks (CPA), Cache Privacy Attacks, Cache Poisoning Attacks, and Interest Flooding Attacks (IFA), that target different security components, including availability, integrity, and confidentiality. This poses a critical challenge to the design of IDS in NDN. This paper provides the latest taxonomy, together with a review of the significant research works on IDSs up to the present time, and a classification of the proposed systems according to the taxonomy. It provides a structured and comprehensive overview of the existing IDSs so that a researcher can create an even better mechanism for the previously mentioned attacks. This paper discusses the limits of the techniques applied to design IDSs with recent findings that can be further exploited in order to optimize those detection and mitigation mechanisms. Full article
(This article belongs to the Special Issue Computational Science and Its Applications 2022)
Show Figures

Figure 1

21 pages, 2041 KiB  
Article
Portuguese Teachers’ Conceptions of the Use of Microsoft 365 during the COVID-19 Pandemic
by Joaquim Escola, Natália Lopes, Paula Catarino and Ana Paula Aires
Computers 2022, 11(12), 185; https://doi.org/10.3390/computers11120185 - 14 Dec 2022
Viewed by 1907
Abstract
In 2020, education found itself involved in a whirlwind of metamorphosis, of transformations that required responses to the emergencies dictated by the pandemic. In Portugal, many schools opted for Microsoft 365 as the platform of choice for providing adequate resources for teaching and [...] Read more.
In 2020, education found itself involved in a whirlwind of metamorphosis, of transformations that required responses to the emergencies dictated by the pandemic. In Portugal, many schools opted for Microsoft 365 as the platform of choice for providing adequate resources for teaching and learning processes, while also ensuring remote teaching in an integrated and inclusive way. In this context, we carried out an investigation with the objectives of knowing the opinion of teachers about the use of Microsoft 365 in their classes and identify their degree of satisfaction with its use. The methodology adopted had a descriptive and exploratory nature, following a mixed paradigm. A total of 101 primary and secondary school teachers from schools in Northern Portugal participated in the study. A questionnaire and an interview were used as data collection instruments. The results showed that the most respondents revealed a high level of satisfaction with the use of Microsoft 365, and that its use was accompanied by the employment of active methodologies. Moreover, despite the lack of initial or ongoing training of teachers in the use of this technology and the students’ lack of digital competence, Microsoft 365 proved to be an adequate response to the confinement and ensured students’ learning in a safe environment. Full article
(This article belongs to the Special Issue Present and Future of E-Learning Technologies)
Show Figures

Figure 1

21 pages, 11516 KiB  
Article
Estimation of 5G Core and RAN End-to-End Delay through Gaussian Mixture Models
by Diyar Fadhil and Rodolfo Oliveira
Computers 2022, 11(12), 184; https://doi.org/10.3390/computers11120184 - 12 Dec 2022
Cited by 2 | Viewed by 2494
Abstract
Network analytics provide a comprehensive picture of the network’s Quality of Service (QoS), including the End-to-End (E2E) delay. In this paper, we characterize the Core and the Radio Access Network (RAN) E2E delay of 5G networks with the Standalone (SA) and Non-Standalone (NSA) [...] Read more.
Network analytics provide a comprehensive picture of the network’s Quality of Service (QoS), including the End-to-End (E2E) delay. In this paper, we characterize the Core and the Radio Access Network (RAN) E2E delay of 5G networks with the Standalone (SA) and Non-Standalone (NSA) topologies when a single known Probability Density Function (PDF) is not suitable to model its distribution. To this end, multiple PDFs, denominated as components, are combined in a Gaussian Mixture Model (GMM) to represent the distribution of the E2E delay. The accuracy and computation time of the GMM is evaluated for a different number of components and a number of samples. The results presented in the paper are based on a dataset of E2E delay values sampled from both SA and NSA 5G networks. Finally, we show that the GMM can be adopted to estimate a high diversity of E2E delay patterns found in 5G networks and its computation time can be adequate for a large range of applications. Full article
(This article belongs to the Special Issue Computing, Electrical and Industrial Systems 2022)
Show Figures

Figure 1

11 pages, 515 KiB  
Article
A Framework for a Seamless Transformation to Online Education
by Shanmugam Sivagurunathan and Sudhaman Parthasarathy
Computers 2022, 11(12), 183; https://doi.org/10.3390/computers11120183 - 12 Dec 2022
Viewed by 1974
Abstract
Online education is now widely used in schools and universities as a result of COVID-19. More than 1.6 billion children, or 80% of all school-aged children worldwide, have missed school as a result of the COVID-19 pandemic. The COVID-19 outbreak has been a [...] Read more.
Online education is now widely used in schools and universities as a result of COVID-19. More than 1.6 billion children, or 80% of all school-aged children worldwide, have missed school as a result of the COVID-19 pandemic. The COVID-19 outbreak has been a significant concern for educational institutions since 2020 and has interfered with regular academic and evaluation practices. Organizational preparedness for online education must be assessed by institutions. To assist them, we present a case study carried out at an Indian educational institution that highlights the drawbacks and advantages of online education and that outlines a framework for its change. Additionally, we assessed the system and offered suggestions to improve the online instruction provided by institutions. We think that the proposed methodology will assist organizations in identifying challenges prior to launching online learning. Full article
(This article belongs to the Special Issue Present and Future of E-Learning Technologies)
Show Figures

Figure 1

29 pages, 7324 KiB  
Article
Learning Explainable Disentangled Representations of E-Commerce Data by Aligning Their Visual and Textual Attributes
by Katrien Laenen and Marie-Francine Moens
Computers 2022, 11(12), 182; https://doi.org/10.3390/computers11120182 - 10 Dec 2022
Cited by 3 | Viewed by 2027
Abstract
Understanding multimedia content remains a challenging problem in e-commerce search and recommendation applications. It is difficult to obtain item representations that capture the relevant product attributes since these product attributes are fine-grained and scattered across product images with huge visual variations and product [...] Read more.
Understanding multimedia content remains a challenging problem in e-commerce search and recommendation applications. It is difficult to obtain item representations that capture the relevant product attributes since these product attributes are fine-grained and scattered across product images with huge visual variations and product descriptions that are noisy and incomplete. In addition, the interpretability and explainability of item representations have become more important in order to make e-commerce applications more intelligible to humans. Multimodal disentangled representation learning, where the independent generative factors of multimodal data are identified and encoded in separate subsets of features in the feature space, is an interesting research area to explore in an e-commerce context given the benefits of the resulting disentangled representations such as generalizability, robustness and interpretability. However, the characteristics of real-word e-commerce data, such as the extensive visual variation, noisy and incomplete product descriptions, and complex cross-modal relations of vision and language, together with the lack of an automatic interpretation method to explain the contents of disentangled representations, means that current approaches for multimodal disentangled representation learning do not suffice for e-commerce data. Therefore, in this work, we design an explainable variational autoencoder framework (E-VAE) which leverages visual and textual item data to obtain disentangled item representations by jointly learning to disentangle the visual item data and to infer a two-level alignment of the visual and textual item data in a multimodal disentangled space. As such, E-VAE tackles the main challenges in disentangling multimodal e-commerce data. Firstly, with the weak supervision of the two-level alignment our E-VAE learns to steer the disentanglement process towards discovering the relevant factors of variations in the multimodal data and to ignore irrelevant visual variations which are abundant in e-commerce data. Secondly, to the best of our knowledge our E-VAE is the first VAE-based framework that has an automatic interpretation mechanism that allows to explain the components of the disentangled item representations with text. With our textual explanations we provide insight in the quality of the disentanglement. Furthermore, we demonstrate that with our explainable disentangled item representations we achieve state-of-the-art outfit recommendation results on the Polyvore Outfits dataset and report new state-of-the-art cross-modal search results on the Amazon Dresses dataset. Full article
(This article belongs to the Special Issue Human Understandable Artificial Intelligence)
Show Figures

Figure 1

45 pages, 8792 KiB  
Review
A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface
by Samson O. Oruma, Mary Sánchez-Gordón, Ricardo Colomo-Palacios, Vasileios Gkioulos and Joakim K. Hansen
Computers 2022, 11(12), 181; https://doi.org/10.3390/computers11120181 - 8 Dec 2022
Cited by 15 | Viewed by 5783
Abstract
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identify and synthesize empirical research on [...] Read more.
There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identify and synthesize empirical research on the complete threat landscape of social robots in public spaces. Specifically, this paper identifies the potential threat actors, their motives for attacks, vulnerabilities, attack vectors, potential impacts of attacks, possible attack scenarios, and mitigations to these threats. Methods: This systematic literature review follows the guidelines by Kitchenham and Charters. The search was conducted in five digital databases, and 1469 studies were retrieved. This study analyzed 21 studies that satisfied the selection criteria. Results: Main findings reveal four threat categories: cybersecurity, social, physical, and public space. Conclusion: This study completely grasped the complexity of the transdisciplinary problem of social robot security and privacy while accommodating the diversity of stakeholders’ perspectives. Findings give researchers and other stakeholders a comprehensive view by highlighting current developments and new research directions in this field. This study also proposed a taxonomy for threat actors and the threat landscape of social robots in public spaces. Full article
(This article belongs to the Special Issue Computational Science and Its Applications 2022)
Show Figures

Figure 1

16 pages, 868 KiB  
Article
Macroscopic Spatial Analysis of the Impact of Socioeconomic, Land Use and Mobility Factors on the Frequency of Traffic Accidents in Bogotá
by Alejandro Sandoval-Pineda, Cesar Pedraza and Aquiles E. Darghan
Computers 2022, 11(12), 180; https://doi.org/10.3390/computers11120180 - 8 Dec 2022
Cited by 5 | Viewed by 2003
Abstract
The urban structure of a city, defined by its inhabitants, daily movements, and land use, has become an environmental factor of interest that is related to traffic accidents. Traditionally, macro modeling is usually implemented using spatial econometric methods; however, techniques such as support [...] Read more.
The urban structure of a city, defined by its inhabitants, daily movements, and land use, has become an environmental factor of interest that is related to traffic accidents. Traditionally, macro modeling is usually implemented using spatial econometric methods; however, techniques such as support vector regression have proven to be efficient in identifying the relationships between factors at the zonal level and the frequency associated with these events when considering the autocorrelation between spatial units. As a result of this, the main objective of this study was to evaluate the impact of socioeconomical, land use, and mobility variables on the frequency of traffic accidents through the analysis of area data using spatial and vector support regression models. The spatial weighting matrix term was incorporated into the support vector regression models to compare the results against those that ignore it. The urban land of Bogotá, disaggregated into the territorial units of mobility analysis, was delimited as a study area. Two response variables were used: the traffic accidents index on the road perimeter and the traffic accidents index with deaths on the road perimeter, to analyze the total number of traffic accidents and the deaths caused by them. The results indicated that the rate of trips per person by taxi and motorcycle had the greatest impact on the increase in total accidents and deaths caused by them. Support vector regression models that incorporate the spatial structure allowed the modeling of the spatial dependency between spatial units with a better fit than the spatial regression models. Full article
(This article belongs to the Special Issue Machine Learning for Traffic Modeling and Prediction)
Show Figures

Figure 1

22 pages, 762 KiB  
Review
Agile Development Methodologies and Natural Language Processing: A Mapping Review
by Manuel A. Quintana, Ramón R. Palacio, Gilberto Borrego Soto and Samuel González-López
Computers 2022, 11(12), 179; https://doi.org/10.3390/computers11120179 - 7 Dec 2022
Viewed by 3537
Abstract
Agile software development is one of the most important development paradigms these days. However, there are still some challenges to consider to reduce problems during the documentation process. Some assistive methods have been created to support developers in their documentation activities. In this [...] Read more.
Agile software development is one of the most important development paradigms these days. However, there are still some challenges to consider to reduce problems during the documentation process. Some assistive methods have been created to support developers in their documentation activities. In this regard, Natural Language Processing (NLP) can be used to create various related tools (such as assistants) to help with the documentation process. This paper presents the current state-of-the-art NLP techniques used in the agile development documentation process. A mapping review was done to complete the objective, the search strategy is used to obtain relevant studies from ScienceDirect, IEEE Xplore, ACM Digital Library, SpringerLink, and Willey. The search results after inclusion and exclusion criteria application left 47 relevant papers identified. These papers were analyzed to obtain the most used NLP techniques and NLP toolkits. The toolkits were also classified by the kind of techniques that are available in each of them. In addition, the behavior of the research area over time was analyzed using the relevant paper found by year. We found that performance measuring methods are not standardized, and, in consequence, the works are not easily comparable. In general, the number of related works and its distribution per year shows a growing trend of the works related to this topic in recent years; this indicates that the adoption of NLP techniques to improve agile methodologies is increasing. Full article
Show Figures

Figure 1

14 pages, 872 KiB  
Article
Challenges of IoT Identification and Multi-Level Protection in Integrated Data Transmission Networks Based on 5G/6G Technologies
by Gennady Dik, Alexander Bogdanov, Nadezhda Shchegoleva, Aleksandr Dik and Jasur Kiyamov
Computers 2022, 11(12), 178; https://doi.org/10.3390/computers11120178 - 7 Dec 2022
Cited by 3 | Viewed by 2215
Abstract
This paper illustrates the main problematic issues of minimizing technological risks in the construction of an integrated architecture for the protection of a “smart habitat” (SH). We analyze the use of the IoT to identify both object hazards and the categorization of switching [...] Read more.
This paper illustrates the main problematic issues of minimizing technological risks in the construction of an integrated architecture for the protection of a “smart habitat” (SH). We analyze the use of the IoT to identify both object hazards and the categorization of switching detection in information collection and processing centers. The article proposes wired and wireless data-transmission systems for the required level of efficiency as well as SH protection. Particular attention is paid to the organization of multi-level protection of promising 5G/6G cellular networks based on the analysis of the security threat landscape. Full article
(This article belongs to the Special Issue Computational Science and Its Applications 2022)
Show Figures

Figure 1

9 pages, 4155 KiB  
Article
On the Feasibility of Real-Time HRV Estimation Using Overly Noisy PPG Signals
by Filipa Esgalhado, Valentina Vassilenko, Arnaldo Batista and Manuel Ortigueira
Computers 2022, 11(12), 177; https://doi.org/10.3390/computers11120177 - 6 Dec 2022
Cited by 1 | Viewed by 1529
Abstract
Heart Rate Variability (HRV) is a biomarker that can be obtained non-invasively from the electrocardiogram (ECG) or the photoplethysmogram (PPG) fiducial points. However, the accuracy of HRV can be compromised by the presence of artifacts. In the herein presented work, a Simulink® [...] Read more.
Heart Rate Variability (HRV) is a biomarker that can be obtained non-invasively from the electrocardiogram (ECG) or the photoplethysmogram (PPG) fiducial points. However, the accuracy of HRV can be compromised by the presence of artifacts. In the herein presented work, a Simulink® model with a deep learning component was studied for overly noisy PPG signals. A subset with these noisy signals was selected for this study, with the purpose of testing a real-time machine learning based HRV estimation system in substandard artifact-ridden signals. Home-based and wearable HRV systems are prone to dealing with higher contaminated signals, given the less controlled environment where the acquisitions take place, namely daily activity movements. This was the motivation behind this work. The results for overly noisy signals show that the real-time PPG-based HRV estimation system produced RMSE and Pearson correlation coefficient mean and standard deviation of 0.178 ± 0.138 s and 0.401 ± 0.255, respectively. This RMSE value is roughly one order of magnitude above the closest comparative results for which the real-time system was also used. Full article
(This article belongs to the Special Issue Computing, Electrical and Industrial Systems 2022)
Show Figures

Figure 1

20 pages, 7779 KiB  
Article
Identification of Heart Arrhythmias by Utilizing a Deep Learning Approach of the ECG Signals on Edge Devices
by Panagiotis Seitanidis, John Gialelis, Georgia Papaconstantinou and Alexandros Moschovas
Computers 2022, 11(12), 176; https://doi.org/10.3390/computers11120176 - 4 Dec 2022
Cited by 3 | Viewed by 2665
Abstract
Accurate and timely detection of cardiac arrhythmias is crucial in reducing treatment times and, ultimately, preventing serious life-threatening complications, such as the incidence of a stroke. This becomes of major importance, especially during the diagnostic process, where there is limited access to cardiologists, [...] Read more.
Accurate and timely detection of cardiac arrhythmias is crucial in reducing treatment times and, ultimately, preventing serious life-threatening complications, such as the incidence of a stroke. This becomes of major importance, especially during the diagnostic process, where there is limited access to cardiologists, such as in hospital emergency departments. The proposed lightweight solution uses a novel classifier, consistently designed and implemented, based on a 2D convolutional neural network (CNN) and properly optimized in terms of storage and computational complexity, thus making it suitable for deployment on edge devices capable of operating in hospital emergency departments, providing privacy, portability, and constant operation. The experiments on the MIT-BIH arrhythmia database, show that the proposed 2D-CNN obtains an overall accuracy of 95.3%, mean sensitivity of 95.27%, mean specificity of 98.82%, and a One-vs-Rest ROC-AUC score of 0.9934. Moreover, the results and metrics based on the NVIDIA® Jetson Nano platform show that the proposed method achieved excellent performance and speed, and would be particularly useful in the clinical practice for continuous real-time (RT) monitoring scenarios. Full article
Show Figures

Figure 1

13 pages, 1410 KiB  
Article
Heuristic Evaluation of Microsoft Teams as an Online Teaching Platform: An Educators’ Perspective
by Lamis Al-Qora’n, Omar Al Sheik Salem and Neil Gordon
Computers 2022, 11(12), 175; https://doi.org/10.3390/computers11120175 - 4 Dec 2022
Cited by 3 | Viewed by 3167
Abstract
The way that education is delivered changed significantly during the COVID-19 pandemic to be completely online in many countries for many institutions. Despite the fact that they are not online teaching platforms, virtual meeting platforms were utilized to deal with this transformation. One [...] Read more.
The way that education is delivered changed significantly during the COVID-19 pandemic to be completely online in many countries for many institutions. Despite the fact that they are not online teaching platforms, virtual meeting platforms were utilized to deal with this transformation. One of the platforms Philadelphia University utilized for the unplanned shift to online teaching was Microsoft Teams. This paper examines how heuristic evaluation may be used to guide the evaluation of online meeting platforms for teaching and focuses on the use of heuristic evaluation to assess the level of usability of Microsoft Teams. The level of Zoom’s usability is also evaluated using heuristic evaluation in order to compare it to that of Microsoft Teams and to assess Microsoft Teams’ overall usability in comparison to other platforms being used for the same purpose. Microsoft Teams was identified as having a few issues that need to be addressed. Additionally, strengths, weaknesses, opportunities, and threats to Microsoft Teams’ usability were assessed. Full article
(This article belongs to the Special Issue Present and Future of E-Learning Technologies)
Show Figures

Figure 1

16 pages, 2425 KiB  
Article
Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime
by Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash
Computers 2022, 11(12), 174; https://doi.org/10.3390/computers11120174 - 3 Dec 2022
Cited by 9 | Viewed by 6335
Abstract
Intelligent software packages have become fast-growing in popularity for large businesses in both developed and developing countries, due to their higher availability in detecting and preventing cybercrime. However, small and medium enterprises (SMEs) are showing prominent gaps in this adoption due to their [...] Read more.
Intelligent software packages have become fast-growing in popularity for large businesses in both developed and developing countries, due to their higher availability in detecting and preventing cybercrime. However, small and medium enterprises (SMEs) are showing prominent gaps in this adoption due to their level of awareness and knowledge towards cyber security and the security mindset. This is due to their priority of running their businesses over requiring using the right technology in protecting their data. This study explored how SMEs in Wales are handling cybercrime and managing their daily online activities the best they can, in keeping their data safe in tackling cyber threats. The sample collected consisted of 122 Welsh SME respondents in a collection of data through a survey questionnaire. The results and findings showed that there were large gaps in the awareness and knowledge of using intelligent software, in particular the uses of machine learning integration within their technology to track and combat complex cybercrime that perhaps would have been missed by standard cyber security software packages. The study’s findings showed that only 30% of the sampled SMEs understood the terminology of cyber security. The awareness of machine learning and its algorithms was also questioned in the implementation of their cyber security software packages. The study further highlighted that Welsh SMEs were unaware of what this software could do to protect their data. The findings in this paper also showed that various elements such as education and the size of SME made an impact on their choices for the right software packages being implemented, compared to elements such as age, gender, role and being a decision maker, having no impact on these choices. The study finally shares the investigations of various SME strategies to help understand the risks, and to be able to plan for future contingencies and preparation in keeping data safe and secure for the future. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

19 pages, 458 KiB  
Article
An Improved Binary Owl Feature Selection in the Context of Android Malware Detection
by Hadeel Alazzam, Aryaf Al-Adwan, Orieb Abualghanam, Esra’a Alhenawi and Abdulsalam Alsmady
Computers 2022, 11(12), 173; https://doi.org/10.3390/computers11120173 - 30 Nov 2022
Cited by 9 | Viewed by 2273
Abstract
Recently, the proliferation of smartphones, tablets, and smartwatches has raised security concerns from researchers. Android-based mobile devices are considered a dominant operating system. The open-source nature of this platform makes it a good target for malware attacks that result in both data exfiltration [...] Read more.
Recently, the proliferation of smartphones, tablets, and smartwatches has raised security concerns from researchers. Android-based mobile devices are considered a dominant operating system. The open-source nature of this platform makes it a good target for malware attacks that result in both data exfiltration and property loss. To handle the security issues of mobile malware attacks, researchers proposed novel algorithms and detection approaches. However, there is no standard dataset used by researchers to make a fair evaluation. Most of the research datasets were collected from the Play Store or collected randomly from public datasets such as the DREBIN dataset. In this paper, a wrapper-based approach for Android malware detection has been proposed. The proposed wrapper consists of a newly modified binary Owl optimizer and a random forest classifier. The proposed approach was evaluated using standard data splits given by the DREBIN dataset in terms of accuracy, precision, recall, false-positive rate, and F1-score. The proposed approach reaches 98.84% and 86.34% for accuracy and F-score, respectively. Furthermore, it outperforms several related approaches from the literature in terms of accuracy, precision, and recall. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

12 pages, 2082 KiB  
Article
An Augmented Reality CBIR System Based on Multimedia Knowledge Graph and Deep Learning Techniques in Cultural Heritage
by Antonio M. Rinaldi, Cristiano Russo and Cristian Tommasino
Computers 2022, 11(12), 172; https://doi.org/10.3390/computers11120172 - 30 Nov 2022
Cited by 6 | Viewed by 2300
Abstract
In the last few years, the spreading of new technologies, such as augmented reality (AR), has been changing our way of life. Notably, AR technologies have different applications in the cultural heritage realm, improving available information for a user while visiting museums, art [...] Read more.
In the last few years, the spreading of new technologies, such as augmented reality (AR), has been changing our way of life. Notably, AR technologies have different applications in the cultural heritage realm, improving available information for a user while visiting museums, art exhibits, or generally a city. Moreover, the spread of new and more powerful mobile devices jointly with virtual reality (VR) visors contributes to the spread of AR in cultural heritage. This work presents an augmented reality mobile system based on content-based image analysis techniques and linked open data to improve user knowledge about cultural heritage. In particular, we explore the uses of traditional feature extraction methods and a new way to extract them employing deep learning techniques. Furthermore, we conduct a rigorous experimental analysis to recognize the best method to extract accurate multimedia features for cultural heritage analysis. Eventually, experiments show that our approach achieves good results with respect to different standard measures. Full article
(This article belongs to the Special Issue Computational Science and Its Applications 2022)
Show Figures

Figure 1

14 pages, 2310 KiB  
Article
Improving ERPs Integration in Organization: An EOS-Based GreneOS Implementation
by Joseph Rahme, Bharat Masimukku, Nicolas Daclin and Gregory Zacharewicz
Computers 2022, 11(12), 171; https://doi.org/10.3390/computers11120171 - 28 Nov 2022
Viewed by 1742
Abstract
Current ERPs are still limited by cost, customization, implementation time, and interoperability with other systems. Even if cloud-based ERPs attempt to overcome these limits, they do not completely answer all of them. Based on that postulate about recent ERPs, a conceptual architecture, technical [...] Read more.
Current ERPs are still limited by cost, customization, implementation time, and interoperability with other systems. Even if cloud-based ERPs attempt to overcome these limits, they do not completely answer all of them. Based on that postulate about recent ERPs, a conceptual architecture, technical architecture, and implementation architecture of an Enterprise Operating System (EOS) have been designed and proposed to address the services and functionality needed by Enterprise 4.0. This conceptual architecture describes the essential functions required in the EOS, while the technical architecture shows how these tasks cooperate to achieve the mission of the EOS. Among some implementation architectures proposed that benefited from the innovation and concept of the EOS, GreneOS has proposed a technical architecture motivated by EOS concepts. The purpose of this paper is to discuss the current interest, complementarity, and limitation of both the EOS conceptual architecture and its implementation into GreneOS to propose perspectives for the future developments of the EOS. Full article
(This article belongs to the Special Issue Computing, Electrical and Industrial Systems 2022)
Show Figures

Figure 1

37 pages, 5749 KiB  
Article
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System
by Kamal A. ElDahshan, AbdAllah A. AlHabshy and Bashar I. Hameed
Computers 2022, 11(12), 170; https://doi.org/10.3390/computers11120170 - 28 Nov 2022
Cited by 12 | Viewed by 2486
Abstract
Numerous network cyberattacks have been launched due to inherent weaknesses. Network intrusion detection is a crucial foundation of the cybersecurity field. Intrusion detection systems (IDSs) are a type of machine learning (ML) software proposed for making decisions without explicit programming and with little [...] Read more.
Numerous network cyberattacks have been launched due to inherent weaknesses. Network intrusion detection is a crucial foundation of the cybersecurity field. Intrusion detection systems (IDSs) are a type of machine learning (ML) software proposed for making decisions without explicit programming and with little human intervention. Although ML-based IDS advancements have surpassed earlier methods, they still struggle to identify attack types with high detection rates (DR) and low false alarm rates (FAR). This paper proposes a meta-heuristic optimization algorithm-based hierarchical IDS to identify several types of attack and to secure the computing environment. The proposed approach comprises three stages: The first stage includes data preprocessing, feature selection, and the splitting of the dataset into multiple binary balanced datasets. In the second stage, two novel meta-heuristic optimization algorithms are introduced to optimize the hyperparameters of the extreme learning machine during the construction of multiple binary models to detect different attack types. These are combined in the last stage using an aggregated anomaly detection engine in a hierarchical structure on account of the model’s accuracy. We propose a software machine learning IDS that enables multi-class classification. It achieved scores of 98.93, 99.63, 99.19, 99.78, and 0.01, with 0.51 for average accuracy, DR, and FAR in the UNSW-NB15 and CICIDS2017 datasets, respectively. Full article
Show Figures

Figure 1

25 pages, 5171 KiB  
Review
Solving the Schrödinger Equation with Genetic Algorithms: A Practical Approach
by Rafael Lahoz-Beltra
Computers 2022, 11(12), 169; https://doi.org/10.3390/computers11120169 - 27 Nov 2022
Viewed by 2918
Abstract
The Schrödinger equation is one of the most important equations in physics and chemistry and can be solved in the simplest cases by computer numerical methods. Since the beginning of the 1970s, the computer began to be used to solve this equation in [...] Read more.
The Schrödinger equation is one of the most important equations in physics and chemistry and can be solved in the simplest cases by computer numerical methods. Since the beginning of the 1970s, the computer began to be used to solve this equation in elementary quantum systems, and, in the most complex case, a ‘hydrogen-like’ system. Obtaining the solution means finding the wave function, which allows predicting the physical and chemical properties of the quantum system. However, when a quantum system is more complex than a ‘hydrogen-like’ system, we must be satisfied with an approximate solution of the equation. During the last decade, application of algorithms and principles of quantum computation in disciplines other than physics and chemistry, such as biology and artificial intelligence, has led to the search for alternative techniques with which to obtain approximate solutions of the Schrödinger equation. In this work, we review and illustrate the application of genetic algorithms, i.e., stochastic optimization procedures inspired by Darwinian evolution, in elementary quantum systems and in quantum models of artificial intelligence. In this last field, we illustrate with two ‘toy models’ how to solve the Schrödinger equation in an elementary model of a quantum neuron and in the synthesis of quantum circuits controlling the behavior of a Braitenberg vehicle. Full article
(This article belongs to the Special Issue Recent Advances in Quantum Computing)
Show Figures

Figure 1

1 pages, 154 KiB  
Correction
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147
by Ammar Mohammad, Hasan Al-Refai and Ali Ahmad Alawneh
Computers 2022, 11(12), 168; https://doi.org/10.3390/computers11120168 - 23 Nov 2022
Viewed by 930
Abstract
The authors wish to make corrections to change the authorship [...] Full article
Previous Issue
Next Issue
Back to TopTop