[go: up one dir, main page]

Next Issue
Volume 10, November
Previous Issue
Volume 10, September
 
 

Computers, Volume 10, Issue 10 (October 2021) – 16 articles

Cover Story (view full-size image): Increased consumer requirements for quality, safety, and traceability of goods, especially in food supply chains, has accelerated the implementation of blockchain during the COVID-19 pandemic. The right choice of blockchain software in agriculture is a complicated task and an important prerequisite for successful deployment. In this study, we propose a conceptual framework for group multicriteria selection of blockchain software in a fuzzy environment according to organization needs and experts’ judgements. The applicability of the new framework has been verified through an illustrative example for ranking blockchain systems. The evaluations of compared alternatives were calculated by using a fuzzy measurement of alternatives and ranking according to the compromise solution (MARCOS) model with different sets of weight coefficients. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
16 pages, 20460 KiB  
Article
Ready Teacher One: Virtual and Augmented Reality Online Professional Development for K-12 School Teachers
by Stylianos Mystakidis, Maria Fragkaki and Giorgos Filippousis
Computers 2021, 10(10), 134; https://doi.org/10.3390/computers10100134 - 17 Oct 2021
Cited by 48 | Viewed by 10262
Abstract
Augmented reality (AR) and virtual reality (VR) are two technologies with the potential to enhance learning quality by activating episodic student memory. In this manuscript we outline the pedagogical benefits of AR and VR as well as the rationale, design, development, and pilot [...] Read more.
Augmented reality (AR) and virtual reality (VR) are two technologies with the potential to enhance learning quality by activating episodic student memory. In this manuscript we outline the pedagogical benefits of AR and VR as well as the rationale, design, development, and pilot evaluation results from an in-service teacher online professional development program (OPD) on AR and VR linked with research activities. More specifically, we examined the “Augmented and Virtual Reality in Teaching and Learning” OPD course aimed at K-12 educators in a European country combining pedagogically informed methods such as inquiry-based learning and digital storytelling. Findings from a mixed-method research using questionnaires and focus groups indicate that AR- and VR-based pedagogical scenarios can be integrated effectively into everyday school teaching practice. The study also outlines implications and limitations that policy makers, education leaders, and educators need to consider for efficient institution-wide deployment of AR and VR technologies. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Participants’ evaluation of the educational content and activities (SQ).</p>
Full article ">Figure 2
<p>Screenshots from two collaborative activities in web-based environments.</p>
Full article ">Figure 3
<p>Participants’ evaluation of the effectiveness of the program’s components (SQ).</p>
Full article ">Figure 4
<p>Participants’ evaluation of the program’s pedagogical orientation (SQ).</p>
Full article ">Figure 5
<p>Snapshots from AR projects with digital storytelling: actual application (<b>left</b>), storyboard (<b>right</b>).</p>
Full article ">Figure 6
<p>Participants’ user experience evaluation (SQ).</p>
Full article ">Figure 7
<p>Overall participants’ experience evaluation (SQ).</p>
Full article ">
17 pages, 2532 KiB  
Article
Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case
by Georgios Palaiokrassas, Petros Skoufis, Orfefs Voutyras, Takafumi Kawasaki, Mathieu Gallissot, Radhouene Azzabi, Akira Tsuge, Antonios Litke, Tadashi Okoshi, Jin Nakazawa and Theodora Varvarigou
Computers 2021, 10(10), 133; https://doi.org/10.3390/computers10100133 - 16 Oct 2021
Cited by 14 | Viewed by 4948
Abstract
In this paper, we demonstrate the multiple points of innovation when combining blockchain technology with Internet of Things (IoT) and security frameworks. The deployment and use of IoT device networks in smart city environments has produced an enormous amount of data. The fact [...] Read more.
In this paper, we demonstrate the multiple points of innovation when combining blockchain technology with Internet of Things (IoT) and security frameworks. The deployment and use of IoT device networks in smart city environments has produced an enormous amount of data. The fact that those data are possessed by multiple sources that use independent systems for data collection, storage, and use impedes the exploitation of their value. Blockchains, as distributed ledgers, can be used for addressing the development of a universal system for data collection and distribution. Smart contracts can be used to automate all the processes of such a network, while at the same time, blockchain and the InterPlanetary File System (IPFS) protect sensitive data through anonymity and distributed storage. An innovative and open IoT blockchain market of applications, data, and services is proposed that: (i) provides the framework upon which objects and people can exchange value in form of virtual currencies, for assets (data and services) received; (ii) defines the motivation incentives according to social and business context for humans and smart objects to interact. The specific marketplace is piloted through a cross-border trial between Santander and Fujisawa, in the context of the M-Sec project, validating thus the interoperability, efficiency, and data protection principles. Full article
(This article belongs to the Special Issue Edge and Cloud Computing in IoT)
Show Figures

Figure 1

Figure 1
<p>System Architecture of a Bridge System.</p>
Full article ">Figure 2
<p>Overview of the Blockchain Marketplace allowing the monetization of data and the exchange of information and services.</p>
Full article ">Figure 3
<p>Graphical User Interface enabling searching of sensors in the smart contracts running on blockchain.</p>
Full article ">Figure 4
<p>User browsing all purchased data from sensors.</p>
Full article ">Figure 5
<p>Overview of Security Manager.</p>
Full article ">
24 pages, 33634 KiB  
Article
Gamification as a Strategy to Increase Motivation and Engagement in Higher Education Chemistry Students
by Guillermo M. Chans and May Portuguez Castro
Computers 2021, 10(10), 132; https://doi.org/10.3390/computers10100132 - 16 Oct 2021
Cited by 91 | Viewed by 25921
Abstract
In the last year, educational experiences have become increasingly challenging due to teaching classes remotely. For this reason, it has been necessary to develop educational strategies that accompany the use of new technologies to maintain student interest. One of these methodologies is gamification, [...] Read more.
In the last year, educational experiences have become increasingly challenging due to teaching classes remotely. For this reason, it has been necessary to develop educational strategies that accompany the use of new technologies to maintain student interest. One of these methodologies is gamification, implemented in school environments more frequently due to the pandemic and whose impact on student motivation and engagement needs to be explored. The literature shows that student participation in these contexts should be increased when applying this methodology, where teachers can also provide greater support. This research proposes improving these aspects by developing a gamification strategy that can be easily replicated in other environments. This study was carried out for a chemistry course at a university in central Mexico. This proposal details the short-, medium-, and long-term bonuses which stimulated and motivated students and achieved specific objectives. We also present the quantitative results of a questionnaire applied to 48 engineering students to identify their perceptions of how gamification could increase motivation and engagement in learning the subject of chemistry. In addition, pre- and post-knowledge tests were applied to determine whether there were changes in the learning outcomes. The results indicated that gamification increased student motivation and engagement, improved attitudes, promoted actions such as keeping the camera on during lectures and regular attendance, and improved student grades. This study fills the need for planning strategies to help improve student motivation in online classes and proposes an instrument to measure the results. It can be helpful to those interested in applying or adapting it in other disciplines. Full article
(This article belongs to the Special Issue Interactive Technology and Smart Education)
Show Figures

Figure 1

Figure 1
<p>Diagram with the different sections and their respective weightings of courses Q1028 and Q1029.</p>
Full article ">Figure 2
<p>Calendar of subjects Q1028 and Q1029 with due dates for all assigned activities.</p>
Full article ">Figure 3
<p>Long-term achievement based on (<b>a</b>) attending class, (<b>b</b>); keeping the camera on, and (<b>c</b>) collaborating with the research study conducted.</p>
Full article ">Figure 4
<p>Mid-term achievement creating mind maps to earn points on the final exam.</p>
Full article ">Figure 5
<p>Medium-term achievement based on the grades of the MC assignments.</p>
Full article ">Figure 6
<p>Medium-term achievement for the problem situation section.</p>
Full article ">Figure 7
<p>(<b>a</b>) Short-term achievement: How to obtain tickets through participation. (<b>b</b>) Two different ways to use tickets.</p>
Full article ">Figure 8
<p>Diagram with achievements in the short, medium, and long term.</p>
Full article ">Figure 9
<p>Final Q1028 grades excluding achievements (nominal points, blue) along with additional points earned through achievements (additional points, orange).</p>
Full article ">Figure 10
<p>Final Q1029 grades excluding achievements (nominal points, blue) along with additional points earned through achievements (additional points, orange).</p>
Full article ">Figure 11
<p>Difference between the overall pre-test and post-test results (Q1028 + Q1029).</p>
Full article ">Figure 12
<p>Word cloud of Q1028 students’ experience with gamification.</p>
Full article ">
18 pages, 1168 KiB  
Article
A Methodology for Generating Systems Architectural Glimpse Statements Using the 5W1H Maxim
by Orfefs Voutyras, Aamir H. Bokhari, Akira Tsuge, Georgios Palaiokrassas, Takafumi Kawasaki, Xavier Cases-Camats, Jin Nakazawa, Antonios Litke, Tadashi Okoshi and Theodora Varvarigou
Computers 2021, 10(10), 131; https://doi.org/10.3390/computers10100131 - 15 Oct 2021
Cited by 1 | Viewed by 4167
Abstract
Attempts to facilitate and streamline systems architecting have resulted in a great number of reusable principles, practices, mechanisms, frameworks, and tools. Such a practice is the use of architectural viewpoints and views. However, as systems change, these practices should also evolve. The increasing [...] Read more.
Attempts to facilitate and streamline systems architecting have resulted in a great number of reusable principles, practices, mechanisms, frameworks, and tools. Such a practice is the use of architectural viewpoints and views. However, as systems change, these practices should also evolve. The increasing scale and complexity of systems resulting from an ever-growing pool of human needs and breakthroughs may lead, in some cases, to an increased gap between the abstraction activities attempting to capture the whole of a system, and the instantiation activities that produce concrete and detailed descriptions of a system’s architecture. To address this issue, this article introduces a new notion, that of architectural glimpse statements, fundamental questions acting as the building blocks for architectural views and products. This notion can help architects ask the right questions in the right manner to create fundamental statements, the elaboration on which can lead directly to concrete architectural products. Working on top of standardized and common approaches, the article introduces a language for the creation of architectural glimpse statements using the 5W1H maxim. Based on this language, a tool and guidelines are also provided to facilitate the usage of glimpses. Finally, the overall methodology is demonstrated in two case studies. Full article
(This article belongs to the Special Issue Edge and Cloud Computing in IoT)
Show Figures

Figure 1

Figure 1
<p>Conceptual model of the architectural description, views, and glimpses.</p>
Full article ">Figure 2
<p>A composite glimpse inside the functional and technical architecture of the M-Sec system.</p>
Full article ">
21 pages, 746 KiB  
Review
IoT Serverless Computing at the Edge: A Systematic Mapping Review
by Vojdan Kjorveziroski, Sonja Filiposka and Vladimir Trajkovik
Computers 2021, 10(10), 130; https://doi.org/10.3390/computers10100130 - 15 Oct 2021
Cited by 29 | Viewed by 5125
Abstract
Serverless computing is a new concept allowing developers to focus on the core functionality of their code, while abstracting away the underlying infrastructure. Even though there are existing commercial serverless cloud providers and open-source solutions, dealing with the explosive growth of new Internet [...] Read more.
Serverless computing is a new concept allowing developers to focus on the core functionality of their code, while abstracting away the underlying infrastructure. Even though there are existing commercial serverless cloud providers and open-source solutions, dealing with the explosive growth of new Internet of Things (IoT) devices requires more efficient bandwidth utilization, reduced latency, and data preprocessing closer to the source, thus reducing the overall data volume and meeting privacy regulations. Moving serverless computing to the edge of the network is a topic that is actively being researched with the aim of solving these issues. This study presents a systematic mapping review of current progress made to this effect, analyzing work published between 1 January 2015 and 1 September 2021. Using a document selection methodology which emphasizes the quality of the papers obtained through querying several popular databases with relevant search terms, we have included 64 entries, which we then further categorized into eight main categories. Results show that there is an increasing interest in this area with rapid progress being made to solve the remaining open issues, which have also been summarized in this paper. Special attention is paid to open-source efforts, as well as open-access contributions. Full article
(This article belongs to the Special Issue Edge Computing for the IoT)
Show Figures

Figure 1

Figure 1
<p>Number of included and excluded records during study selection.</p>
Full article ">Figure 2
<p>Publication medium for the selected papers.</p>
Full article ">Figure 3
<p>Number of publications per year.</p>
Full article ">Figure 4
<p>Availability of open-access papers.</p>
Full article ">Figure 5
<p>Derived IoT serverless categories and related subcategories.</p>
Full article ">Figure 6
<p>Primary category distribution per year and open-access classification.</p>
Full article ">
27 pages, 9723 KiB  
Article
A Novel Multi-Modality Image Simultaneous Denoising and Fusion Method Based on Sparse Representation
by Guanqiu Qi, Gang Hu, Neal Mazur, Huahua Liang and Matthew Haner
Computers 2021, 10(10), 129; https://doi.org/10.3390/computers10100129 - 13 Oct 2021
Cited by 9 | Viewed by 2488
Abstract
Multi-modality image fusion applied to improve image quality has drawn great attention from researchers in recent years. However, noise is actually generated in images captured by different types of imaging sensors, which can seriously affect the performance of multi-modality image fusion. As the [...] Read more.
Multi-modality image fusion applied to improve image quality has drawn great attention from researchers in recent years. However, noise is actually generated in images captured by different types of imaging sensors, which can seriously affect the performance of multi-modality image fusion. As the fundamental method of noisy image fusion, source images are denoised first, and then the denoised images are fused. However, image denoising can decrease the sharpness of source images to affect the fusion performance. Additionally, denoising and fusion are processed in separate processing modes, which causes an increase in computation cost. To fuse noisy multi-modality image pairs accurately and efficiently, a multi-modality image simultaneous fusion and denoising method is proposed. In the proposed method, noisy source images are decomposed into cartoon and texture components. Cartoon-texture decomposition not only decomposes source images into detail and structure components for different image fusion schemes, but also isolates image noise from texture components. A Gaussian scale mixture (GSM) based sparse representation model is presented for the denoising and fusion of texture components. A spatial domain fusion rule is applied to cartoon components. The comparative experimental results confirm the proposed simultaneous image denoising and fusion method is superior to the state-of-the-art methods in terms of visual and quantitative evaluations. Full article
(This article belongs to the Special Issue Feature Paper in Computers)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The Proposed Fusion Framework.</p>
Full article ">Figure 2
<p>The Proposed Fusion Framework. (<b>a</b>) a noisy image, (<b>b</b>) cartoon components, and (<b>c</b>) texture components.</p>
Full article ">Figure 3
<p>Parts of Used Representative source images. (<b>a</b>–<b>l</b>) are selected source images.</p>
Full article ">Figure 4
<p>Simultaneous denoising and fusion results of noisy multi-focus image pairs -1. (<b>a</b>–<b>h</b>) are source multi-focus images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 5
<p>Simultaneous denoising and fusion results of noisy multi-focus image pairs -2. (<b>a</b>–<b>h</b>) are source multi-focus images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 6
<p>Simultaneous denoising and fusion results of FDESD, FDS and the proposed method for noisy multi-modality medical image pairs -1. (<b>a</b>–<b>h</b>) are source multi-modality medical images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 7
<p>Simultaneous denoising and fusion results of FDESD, FDS and the proposed method for noisy multi-modality medical image pairs -2. (<b>a</b>–<b>h</b>) are source multi-modality medical images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 8
<p>Simultaneous denoising and fusion results of FDESD, FDS and the proposed method for noisy infrared-visible image pairs. (<b>a</b>–<b>h</b>) are source infrared-visible images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 9
<p>Simultaneous denoising and fusion results of FDESD, FDS and the proposed method for noisy infrared-visible image pairs -2. (<b>a</b>–<b>h</b>) are source infrared-visible images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> respectively; (<b>i</b>–<b>t</b>) are simultaneous denoising and fusion results of source images with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by FDESD, FDS and proposed method respectively.</p>
Full article ">Figure 10
<p>Comparison of separate and simultaneous image denoising and fusion results. (<b>a</b>–<b>d</b>) and (<b>m</b>–<b>p</b>) are denoising and fusion results of multi-focus image with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by SDF and proposed method respectively. (<b>e</b>–<b>h</b>) and (<b>q</b>–<b>t</b>) are denoising and fusion results of malti-modality medical image with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by SDF and proposed method respectively. (<b>i</b>–<b>l</b>) and (<b>u</b>–<b>x</b>) are denoising and fusion results of infrared-visible image with additional noise <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>10</mn> <mo>,</mo> <mn>20</mn> <mo>,</mo> <mn>50</mn> </mrow> </semantics></math> by SDF and proposed method respectively.</p>
Full article ">
23 pages, 2789 KiB  
Article
Ontology-Based Reasoning for Educational Assistance in Noncommunicable Chronic Diseases
by Andrêsa Vargas Larentis, Eduardo Gonçalves de Azevedo Neto, Jorge Luis Victória Barbosa, Débora Nice Ferrari Barbosa, Valderi Reis Quietinho Leithardt and Sérgio Duarte Correia
Computers 2021, 10(10), 128; https://doi.org/10.3390/computers10100128 - 12 Oct 2021
Cited by 5 | Viewed by 2793
Abstract
Noncommunicable chronic diseases (NCDs) affect a large part of the population. With the emergence of COVID-19, its most severe cases impact people with NCDs, increasing the mortality rate. For this reason, it is necessary to develop personalized solutions to support healthcare considering the [...] Read more.
Noncommunicable chronic diseases (NCDs) affect a large part of the population. With the emergence of COVID-19, its most severe cases impact people with NCDs, increasing the mortality rate. For this reason, it is necessary to develop personalized solutions to support healthcare considering the specific characteristics of individuals. This paper proposes an ontology to represent the knowledge of educational assistance in NCDs. The purpose of ontology is to support educational practices and systems oriented towards preventing and monitoring these diseases. The ontology is implemented under Protégé 5.5.0 in Ontology Web Language (OWL) format, and defined competency questions, SWRL rules, and SPARQL queries. The current version of ontology includes 138 classes, 31 relations, 6 semantic rules, and 575 axioms. The ontology serves as a NCDs knowledge base and supports automatic reasoning. Evaluations performed through a demo dataset demonstrated the effectiveness of the ontology. SWRL rules were used to define accurate axioms, improving the correct classification and inference of six instantiated individuals. As a scientific contribution, this study presents the first ontology for educational assistance in NCDs. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual map on educational assistance in NCDs.</p>
Full article ">Figure 2
<p>Hierarchical view of ontology classes.</p>
Full article ">Figure 3
<p>Hierarchy of classes, relationships, and attributes.</p>
Full article ">Figure 4
<p>Hierarchical view of ontology classes and relationships.</p>
Full article ">Figure 5
<p>Logical expression describing the axiom of equivalence for (1) low, (2) moderate, and (3) high risk level for cardiovascular disease.</p>
Full article ">Figure 6
<p>Instances created in Protégé.</p>
Full article ">Figure 7
<p>Execution of Pellet plugin reasoning tasks.</p>
Full article ">Figure 8
<p>Outcome of the NCD risk inference process.</p>
Full article ">Figure 9
<p>Result of the content inference process for instances “Person2Profile” and “Person5Profile”.</p>
Full article ">Figure 10
<p>SPARQL query for profile, clinical, and sociodemographic data.</p>
Full article ">Figure 11
<p>Result of the SPARQL query.</p>
Full article ">Figure 12
<p>Result of the SPARQL queries for CQ1 and CQ2.</p>
Full article ">Figure 13
<p>Result of the SPARQL queries for CQ3 and CQ4.</p>
Full article ">Figure 14
<p>Results of the SPARQL queries for CQ5, CQ6, and CQ7.</p>
Full article ">
24 pages, 12397 KiB  
Article
IoTSAS: An Integrated System for Real-Time Semantic Annotation and Interpretation of IoT Sensor Stream Data
by Besmir Sejdiu, Florije Ismaili and Lule Ahmedi
Computers 2021, 10(10), 127; https://doi.org/10.3390/computers10100127 - 11 Oct 2021
Cited by 8 | Viewed by 3448
Abstract
Sensors and other Internet of Things (IoT) technologies are increasingly finding application in various fields, such as air quality monitoring, weather alerts monitoring, water quality monitoring, healthcare monitoring, etc. IoT sensors continuously generate large volumes of observed stream data; therefore, processing requires a [...] Read more.
Sensors and other Internet of Things (IoT) technologies are increasingly finding application in various fields, such as air quality monitoring, weather alerts monitoring, water quality monitoring, healthcare monitoring, etc. IoT sensors continuously generate large volumes of observed stream data; therefore, processing requires a special approach. Extracting the contextual information essential for situational knowledge from sensor stream data is very difficult, especially when processing and interpretation of these data are required in real time. This paper focuses on processing and interpreting sensor stream data in real time by integrating different semantic annotations. In this context, a system named IoT Semantic Annotations System (IoTSAS) is developed. Furthermore, the performance of the IoTSAS System is presented by testing air quality and weather alerts monitoring IoT domains by extending the Open Geospatial Consortium (OGC) standards and the Sensor Observations Service (SOS) standards, respectively. The developed system provides information in real time to citizens about the health implications from air pollution and weather conditions, e.g., blizzard, flurry, etc. Full article
(This article belongs to the Special Issue Real-Time Systems in Emerging IoT-Embedded Applications)
Show Figures

Figure 1

Figure 1
<p>An overview of the system architecture.</p>
Full article ">Figure 2
<p>IoTSAS (IoT Semantic Annotations System) modules.</p>
Full article ">Figure 3
<p>IoTSAS Solution workspaces: (<b>a</b>) Java packages of core module; and (<b>b</b>) .Net C# projects of other modules.</p>
Full article ">Figure 4
<p>Real-time processing of integration and interpretation of semantics into sensor stream data.</p>
Full article ">Figure 5
<p>Complex observation SOS O&amp;M standard document (with semantic annotations and interpretations).</p>
Full article ">Figure 6
<p>Diagram of data modeling implementation.</p>
Full article ">Figure 7
<p>Data of the Archival Data Streams, Archival Data Stream Annotations, and Process Data Streams.</p>
Full article ">Figure 8
<p>IoTSAS Metadata Management module—adding new device.</p>
Full article ">Figure 9
<p>IoTSAS Metadata Management module—adding new sensing node.</p>
Full article ">Figure 10
<p>Input sensor stream data—<span class="html-italic">JSON</span> format.</p>
Full article ">Figure 11
<p>IoT semantic annotations ontology for the following: (<b>a</b>) air quality monitoring and (<b>b</b>) weather alerts monitoring.</p>
Full article ">Figure 12
<p>System outputs: (<b>a</b>) monitoring air quality pollution; (<b>b</b>) map view.</p>
Full article ">Figure 13
<p>System outputs: Real-time integration and interpretation of semantic annotations.</p>
Full article ">Figure 14
<p>Network architecture of IoTSAS.</p>
Full article ">Figure 15
<p>Sensor stream data simulator.</p>
Full article ">Figure 16
<p>Test performance of (<b>a</b>) 100–10,000 sensors observations data and (<b>b</b>) 20,000–1,000,000 sensors observations data.</p>
Full article ">
14 pages, 4395 KiB  
Article
Developing Physics Experiments Using Augmented Reality Game-Based Learning Approach: A Pilot Study in Primary School
by Maria Zafeiropoulou, Christina Volioti, Euclid Keramopoulos and Theodosios Sapounidis
Computers 2021, 10(10), 126; https://doi.org/10.3390/computers10100126 - 11 Oct 2021
Cited by 18 | Viewed by 4698
Abstract
The augmented reality game-based learning (ARGBL) approach is an advantageous pathway for the development and enhancement of teaching and learning processes. To this end, this paper presents the design and development of an ARGBL application for the implementation of physics experiments in the [...] Read more.
The augmented reality game-based learning (ARGBL) approach is an advantageous pathway for the development and enhancement of teaching and learning processes. To this end, this paper presents the design and development of an ARGBL application for the implementation of physics experiments in the fifth grade of a Greek primary school. The purpose of the ARGBL system is twofold: to educate and entertain. For this reason, a treasure hunt game was implemented, which allows students to interact with a digital world and to manipulate virtual objects with the use of an augmented reality (AR) device. Then, according to the instructions, students have to collect all the materials to conduct the AR educational experiment. Overall, the evaluation of the system’s usability by 17 users (both students and teachers) was very promising, indicating that the ARGBL application has the potential to be an easy-to-use educational tool for improving not only the teaching of physics experiments in primary school but also the learning process, by positively affecting the students’ motivation and engagement. Full article
(This article belongs to the Special Issue Game-Based Learning, Gamification in Education and Serious Games)
Show Figures

Figure 1

Figure 1
<p>Application components.</p>
Full article ">Figure 2
<p>Application sub-components.</p>
Full article ">
19 pages, 673 KiB  
Article
Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique
by Vyacheslav Kharchenko, Oleg Illiashenko and Vladimir Sklyar
Computers 2021, 10(10), 125; https://doi.org/10.3390/computers10100125 - 10 Oct 2021
Cited by 3 | Viewed by 2771
Abstract
This paper describes a proposed method and technology of safety assessment of projects based on field programmable gate arrays (FPGA). Safety assessment is based on special invariants, e.g., properties which remain unchanged when a specified transformation is applied. A classification and examples of [...] Read more.
This paper describes a proposed method and technology of safety assessment of projects based on field programmable gate arrays (FPGA). Safety assessment is based on special invariants, e.g., properties which remain unchanged when a specified transformation is applied. A classification and examples of FPGA project invariants are provided. In the paper, two types of invariants are described. The first type of invariants used for such assessment are those which are versatile since they reflect the unchanged properties of FPGA projects, hardware description languages, etc. These invariants can be replenished as experience gained in project implementation accumulates. The second type of invariants is formed based on an analysis of the specifics of a particular FPGA project and reflects the features of the tasks to be solved, the algorithms that are implemented, the hardware FPGA chips used, and the computer-aided design tools, etc. The paper contains a description of the overall conception and particular stages of FPGA projects invariant-based safety assessment. As examples for solving some tasks (using of invariants and defect injections), the paper contains several algorithms written in the VHSIC hardware description language (VHDL). The paper summarizes the results obtained during several years of practical and theoretical research. It can be of practical use for engineers and researchers in the field of quality, reliability, and security of embedded systems, software and information management systems for critical and business applications. Full article
(This article belongs to the Special Issue Real-Time Systems in Emerging IoT-Embedded Applications)
Show Figures

Figure 1

Figure 1
<p>Overall scheme of invariant-oriented evaluation of FPGA projects and relationships between the stages.</p>
Full article ">Figure 2
<p>Classification scheme of invariants for FPGA projects.</p>
Full article ">
17 pages, 667 KiB  
Article
Black-Hole Optimization Applied to the Parametric Estimation in Distribution Transformers Considering Voltage and Current Measures
by Camilo Andres Arenas-Acuña, Jonathan Andres Rodriguez-Contreras, Oscar Danilo Montoya and Edwin Rivas-Trujillo
Computers 2021, 10(10), 124; https://doi.org/10.3390/computers10100124 - 9 Oct 2021
Cited by 13 | Viewed by 2680
Abstract
The problem of parametric estimation in single-phase transformers is addressed in this research from the point of view of metaheuristic optimization. The parameters of interest are the series resistance and reactance as well as the magnetization resistance and reactance. To obtain these parameters [...] Read more.
The problem of parametric estimation in single-phase transformers is addressed in this research from the point of view of metaheuristic optimization. The parameters of interest are the series resistance and reactance as well as the magnetization resistance and reactance. To obtain these parameters considering only the voltage and the currents measured in the terminals of the transformer, a nonlinear optimization model that deals with the minimization of the mean square error among the measured and calculated voltage and current variables is formulated. The nonlinear programming model is solved through the implementation of a simple but efficient metaheuristic optimization technique known as the black-hole optimizer. Numerical simulations demonstrate that the proposed optimization method allows for the reduction in the estimation error among the measured and calculated variables when compared with methods that are well established in the literature such as particle swarm optimization and genetic algorithms, among others. All the simulations were carried out in the MATLAB programming environment. Full article
(This article belongs to the Special Issue Computing, Electrical and Industrial Systems 2021)
Show Figures

Figure 1

Figure 1
<p>Transformer equivalent circuit referred to the primary side.</p>
Full article ">Figure 2
<p>Interaction between stars and a black hole.</p>
Full article ">Figure 3
<p>Behavior of the input power for the first test system.</p>
Full article ">Figure 4
<p>Behavior of the input power for the second test system.</p>
Full article ">Figure 5
<p>Behavior of the input power for the third test system.</p>
Full article ">Figure 6
<p>Behaviour of the objective function when BHO is applied to the third test system.</p>
Full article ">Figure 7
<p>Behavior of the calculated currents <math display="inline"><semantics> <msub> <mi>I</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>I</mi> <mn>2</mn> </msub> </semantics></math> with respect to the variations in the parameter <math display="inline"><semantics> <msub> <mi>X</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 8
<p>Behavior of the calculated output voltage <math display="inline"><semantics> <msub> <mi>V</mi> <mn>2</mn> </msub> </semantics></math> with respect to the variations in the parameter <math display="inline"><semantics> <msub> <mi>X</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">
17 pages, 1305 KiB  
Article
Recommendation Algorithm Using Clustering-Based UPCSim (CB-UPCSim)
by Triyanna Widiyaningtyas, Indriana Hidayah and Teguh Bharata Adji
Computers 2021, 10(10), 123; https://doi.org/10.3390/computers10100123 - 6 Oct 2021
Cited by 13 | Viewed by 3376
Abstract
One of the well-known recommendation systems is memory-based collaborative filtering that utilizes similarity metrics. Recently, the similarity metrics have taken into account the user rating and user behavior scores. The user behavior score indicates the user preference in each product type (genre). The [...] Read more.
One of the well-known recommendation systems is memory-based collaborative filtering that utilizes similarity metrics. Recently, the similarity metrics have taken into account the user rating and user behavior scores. The user behavior score indicates the user preference in each product type (genre). The added user behavior score to the similarity metric results in more complex computation. To reduce the complex computation, we combined the clustering method and user behavior score-based similarity. The clustering method applies k-means clustering by determination of the number of clusters using the Silhouette Coefficient. Whereas the user behavior score-based similarity utilizes User Profile Correlation-based Similarity (UPCSim). The experimental results with the MovieLens 100k dataset showed a faster computation time of 4.16 s. In addition, the Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) values decreased by 1.88% and 1.46% compared to the baseline algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>Research stages.</p>
Full article ">Figure 2
<p>Result of Silhouette Coefficient.</p>
Full article ">Figure 3
<p>Result of <span class="html-italic">k</span>-means clustering for 943 users in MovieLens 100k.</p>
Full article ">Figure 4
<p>Comparison of the average MAE values in the UPCSim algorithm and the three clusters with the Movielens 100k dataset.</p>
Full article ">Figure 5
<p>Comparison of the average RMSE values in the UPCSim algorithm and the three clusters with the Movielens 100k dataset.</p>
Full article ">
23 pages, 464 KiB  
Article
Analytical and Numerical Evaluation of Co-Scheduling Strategies and Their Application
by Ruslan Kuchumov and Vladimir Korkhov
Computers 2021, 10(10), 122; https://doi.org/10.3390/computers10100122 - 2 Oct 2021
Cited by 2 | Viewed by 2144
Abstract
Applications in high-performance computing (HPC) may not use all available computational resources, leaving some of them underutilized. By co-scheduling, i.e., running more than one application on the same computational node, it is possible to improve resource utilization and overall throughput. Some applications may [...] Read more.
Applications in high-performance computing (HPC) may not use all available computational resources, leaving some of them underutilized. By co-scheduling, i.e., running more than one application on the same computational node, it is possible to improve resource utilization and overall throughput. Some applications may have conflicting requirements on resources and co-scheduling may cause performance degradation, so it is important to take it into account in scheduling decisions. In this paper, we formalize the co-scheduling problem and propose multiple scheduling strategies to solve it: an optimal strategy, an online strategy and heuristic strategies. These strategies vary in terms of the optimality of the solution they produce and a priori information about the system they require. We show theoretically that the online strategy provides schedules with a competitive ratio that has a constant upper limit. This allows us to solve the co-scheduling problem using heuristic strategies that approximate this online strategy. Numerical simulations show how heuristic strategies compare to the optimal strategy for different input systems. We propose a method for measuring input parameters of the model in practice and evaluate this method on HPC benchmark applications. We show the high accuracy of the measurement method, which allows us to apply the proposed scheduling strategies in the scheduler implementation. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>General forms of schedules produced by FCS (<b>left</b>) and OPT (<b>right</b>) strategies.</p>
Full article ">Figure 2
<p>Box with whiskers plots of task speed as a function of combination size measured on benchmark applications.</p>
Full article ">Figure 3
<p>An example of ambiguity in the interpolation of task speed values. Speed of <math display="inline"><semantics> <msub> <mi>T</mi> <mn>1</mn> </msub> </semantics></math> in <math display="inline"><semantics> <mrow> <msub> <mi>S</mi> <mi>j</mi> </msub> <mo>=</mo> <mrow> <mo>{</mo> <msub> <mi>T</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>2</mn> </msub> <mo>}</mo> </mrow> </mrow> </semantics></math> can be obtained from <math display="inline"><semantics> <mrow> <mo>{</mo> <msub> <mi>T</mi> <mn>1</mn> </msub> <mo>}</mo> </mrow> </semantics></math> and either <math display="inline"><semantics> <mrow> <mo>{</mo> <msub> <mi>T</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>3</mn> </msub> <mo>}</mo> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <mo>{</mo> <msub> <mi>T</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>4</mn> </msub> <mo>}</mo> </mrow> </semantics></math>. Combination of <math display="inline"><semantics> <mrow> <mo>{</mo> <msub> <mi>T</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>2</mn> </msub> <mo>,</mo> <msub> <mi>T</mi> <mn>4</mn> </msub> <mo>}</mo> </mrow> </semantics></math> tasks will be used for interpolation of the mean value as it produces a smaller boundary interval.</p>
Full article ">Figure 4
<p>Scatter plots of processing time ratio versus processing speed ratio for some benchmark tasks. Each point corresponds to task measurement in a combination with other tasks. Red line is region where ratios are equal.</p>
Full article ">Figure 5
<p>Generated task speedup values and corresponding combination speedup values for different speedup rate (alpha) parameters. Averaged values across all combinations with the same size shown as a single data point.</p>
Full article ">Figure 6
<p>Competitive ratio of search algorithms with different acquisition functions. Values are presented for each range of alpha values and confidence intervals’ tuning parameters.</p>
Full article ">Figure 7
<p>Comparison of the lowest competitive ratio values for each slowdown rate range.</p>
Full article ">
22 pages, 1818 KiB  
Review
Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review
by Marco Sánchez-Aguayo, Luis Urquiza-Aguiar and José Estrada-Jiménez
Computers 2021, 10(10), 121; https://doi.org/10.3390/computers10100121 - 30 Sep 2021
Cited by 26 | Viewed by 21715
Abstract
Fraud entails deception in order to obtain illegal gains; thus, it is mainly evidenced within financial institutions and is a matter of general interest. The problem is particularly complex, since perpetrators of fraud could belong to any position, from top managers to payroll [...] Read more.
Fraud entails deception in order to obtain illegal gains; thus, it is mainly evidenced within financial institutions and is a matter of general interest. The problem is particularly complex, since perpetrators of fraud could belong to any position, from top managers to payroll employees. Fraud detection has traditionally been performed by auditors, who mainly employ manual techniques. These could take too long to process fraud-related evidence. Data mining, machine learning, and, as of recently, deep learning strategies are being used to automate this type of processing. Many related techniques have been developed to analyze, detect, and prevent fraud-related behavior, with the fraud triangle associated with the classic auditing model being one of the most important of these. This work aims to review current work related to fraud detection that uses the fraud triangle in addition to machine learning and deep learning techniques. We used the Kitchenham methodology to analyze the research works related to fraud detection from the last decade. This review provides evidence that fraud is an area of active investigation. Several works related to fraud detection using machine learning techniques were identified without the evidence that they incorporated the fraud triangle as a method for more efficient analysis. Full article
(This article belongs to the Special Issue Artificial Intelligence for Digital Humanities (AI4DH))
Show Figures

Figure 1

Figure 1
<p>Methodology applied in the systematic literature review (SLR).</p>
Full article ">Figure 2
<p>Process of the selection of studies.</p>
Full article ">Figure 3
<p>Studies retrieved through search engines.</p>
Full article ">Figure 4
<p>Steps followed to narrow the search results.</p>
Full article ">Figure 5
<p>Number of articles by year of publication.</p>
Full article ">
24 pages, 557 KiB  
Article
Blockchain Software Selection as a Fuzzy Multi-Criteria Problem
by Galina Ilieva, Tania Yankova, Irina Radeva and Ivan Popchev
Computers 2021, 10(10), 120; https://doi.org/10.3390/computers10100120 - 24 Sep 2021
Cited by 23 | Viewed by 4738
Abstract
Increased consumer requirements for quality, safety and traceability of goods in supply chains has accelerated the implementation of blockchain during the COVID-19 pandemic. The right choice of blockchain software is a complicated task and an important prerequisite for successful deployment. In this study, [...] Read more.
Increased consumer requirements for quality, safety and traceability of goods in supply chains has accelerated the implementation of blockchain during the COVID-19 pandemic. The right choice of blockchain software is a complicated task and an important prerequisite for successful deployment. In this study, we propose a conceptual framework for group multi-criteria selection of blockchain software in fuzzy environment according to organization needs and experts’ judgements. The applicability of the new framework has been verified through an illustrative example for ranking blockchain systems. The evaluations of compared alternatives were calculated by using measurement of alternatives and ranking according to the compromise solution (MARCOS) method. The robustness of the new framework was proven by sensitivity analysis in which two (crisp and fuzzy) MARCOS models with two different sets of weighting coefficients were compared. Full article
(This article belongs to the Special Issue Cloud Computing Security and Blockchain Technology)
Show Figures

Figure 1

Figure 1
<p>Blockchain in agriculture and food value chain.</p>
Full article ">Figure 2
<p>The flowchart of the proposed framework for blockchain software selection.</p>
Full article ">
22 pages, 26301 KiB  
Article
A Novel Simulation Platform for Underwater Data Muling Communications Using Autonomous Underwater Vehicles
by Filipe B. Teixeira, Bruno M. Ferreira, Nuno Moreira, Nuno Abreu, Murillo Villa, João P. Loureiro, Nuno A. Cruz, José C. Alves, Manuel Ricardo and Rui Campos
Computers 2021, 10(10), 119; https://doi.org/10.3390/computers10100119 - 22 Sep 2021
Cited by 5 | Viewed by 3573
Abstract
Autonomous Underwater Vehicles (AUVs) are seen as a safe and cost-effective platforms for performing a myriad of underwater missions. These vehicles are equipped with multiple sensors which, combined with their long endurance, can produce large amounts of data, especially when used for video [...] Read more.
Autonomous Underwater Vehicles (AUVs) are seen as a safe and cost-effective platforms for performing a myriad of underwater missions. These vehicles are equipped with multiple sensors which, combined with their long endurance, can produce large amounts of data, especially when used for video capturing. These data need to be transferred to the surface to be processed and analyzed. When considering deep sea operations, where surfacing before the end of the mission may be unpractical, the communication is limited to low bitrate acoustic communications, which make unfeasible the timely transmission of large amounts of data unfeasible. The usage of AUVs as data mules is an alternative communications solution. Data mules can be used to establish a broadband data link by combining short-range, high bitrate communications (e.g., RF and wireless optical) with a Delay Tolerant Network approach. This paper presents an enhanced version of UDMSim, a novel simulation platform for data muling communications. UDMSim is built upon a new realistic AUV Motion and Localization (AML) simulator and Network Simulator 3 (ns-3). It can simulate the position of the data mules, including localization errors, realistic position control adjustments, the received signal, the realistic throughput adjustments, and connection losses due to the fast SNR change observed underwater. The enhanced version includes a more realistic AML simulator and the antenna radiation patterns to help evaluating the design and relative placement of underwater antennas. The results obtained using UDMSim show a good match with the experimental results achieved using an underwater testbed. UDMSim is made available to the community to support easy and faster evaluation of underwater data muling oriented communications solutions and to enable offline replication of real world experiments. Full article
Show Figures

Figure 1

Figure 1
<p>EGIM observatory deployed in July 2017 and recovered in August 2018 at the Lucky Strike hydrothermal vent site [<a href="#B1-computers-10-00119" class="html-bibr">1</a>,<a href="#B2-computers-10-00119" class="html-bibr">2</a>].</p>
Full article ">Figure 2
<p>The GROW concept, which consists of Data Mule Units that operate between a Survey Unit and a Central Station Unit.</p>
Full article ">Figure 3
<p>Bit rate over range for different underwater acoustic, optical and RF systems and the area filled by the GROW solution (based on [<a href="#B31-computers-10-00119" class="html-bibr">31</a>]).</p>
Full article ">Figure 4
<p>The UDMP protocol stack.</p>
Full article ">Figure 5
<p>Block diagram of the iterative Extended Kalman Filter: prediction step and update step upon sensor measurement.</p>
Full article ">Figure 6
<p>UDMSim block diagram.</p>
Full article ">Figure 7
<p>AML simulator block diagram.</p>
Full article ">Figure 8
<p>Block diagram of sensors in the AUV simulator. The real state and known external quantities (left-hand side) are used to simulate the sensors. The sensors feed the state estimator at different rates.</p>
Full article ">Figure 9
<p>Message sequence diagram for two Data Mule Units.</p>
Full article ">Figure 10
<p>3Three-dimensional simulation of a DMU approaching an SU.</p>
Full article ">Figure 11
<p>Distance and SNR of a DMU travelling 1000 m from the CSU to the SU using <span class="html-italic">PerfectNav</span> and <span class="html-italic">RealisticNav</span>.</p>
Full article ">Figure 12
<p>A closer look on DMU approaching the SU for a 1000 m distance using <span class="html-italic">PerfectNav</span> and <span class="html-italic">RealisticNav</span>.</p>
Full article ">Figure 13
<p>The SNR effect on antenna alignment on DMU approaching the SU for a 1000 m distance using <span class="html-italic">RealisticNav</span>.</p>
Full article ">Figure 14
<p>Testbed used to evaluate the GROW solution.</p>
Full article ">Figure 15
<p>Equivalent throughput for one DMU on the <span class="html-italic">docked</span> scenario.</p>
Full article ">Figure 16
<p>Equivalent throughput for two DMUs in the <span class="html-italic">docked</span> scenario.</p>
Full article ">Figure 17
<p>Equivalent throughput for one DMU in the <span class="html-italic">1 m apart</span> scenario.</p>
Full article ">Figure 18
<p>Equivalent throughput for two DMUs in the <span class="html-italic">1 m apart</span> scenario.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop