Open AccessArticle
A Discriminative Framework for Action Recognition Using f-HOL Features
Information 2016, 7(4), 68; doi:10.3390/info7040068 -
Abstract
Inspired by the overwhelming success of Histogram of Oriented Gradients (HOG) features in many vision tasks, in this paper, we present an innovative compact feature descriptor called fuzzy Histogram of Oriented Lines (f-HOL) for action recognition, which is a distinct variant of the
[...] Read more.
Inspired by the overwhelming success of Histogram of Oriented Gradients (HOG) features in many vision tasks, in this paper, we present an innovative compact feature descriptor called fuzzy Histogram of Oriented Lines (f-HOL) for action recognition, which is a distinct variant of the HOG feature descriptor. The intuitive idea of these features is based on the observation that the slide area of the human body skeleton can be viewed as a spatiotemporal 3D surface, when observing a certain action being performed in a video. The f-HOL descriptor possesses an immense competitive advantage, not only of being quite robust to small geometric transformations where the small translation and rotations make no large fluctuations in histogram values, but also of not being very sensitive under varying illumination conditions. The extracted features are then fed into a discriminative conditional model based on Latent-Dynamic Conditional random fields (LDCRFs) to learn to recognize actions from video frames. When tested on the benchmark Weizmann dataset, the proposed framework substantially supersedes most existing state-of-the-art approaches, achieving an overall recognition rate of 98.2%. Furthermore, due to its low computational demands, the framework is properly amenable for integration into real-time applications. Full article
Figures

Figure 1

Open AccessArticle
Joint Modulation Classification and User Number Detection for Multiuser MIMO-STBC Systems
Information 2016, 7(4), 70; doi:10.3390/info7040070 -
Abstract
The research on non-cooperative multiuser multiple-input multiple-output with space-time block code (MIMO-STBC) communication systems is a challenging and important task. However, to our knowledge, there is little report of this topic. Being two key research issues in this area, modulation classification and user
[...] Read more.
The research on non-cooperative multiuser multiple-input multiple-output with space-time block code (MIMO-STBC) communication systems is a challenging and important task. However, to our knowledge, there is little report of this topic. Being two key research issues in this area, modulation classification and user number detection are studied in this paper. We consider both problems jointly as a multiple hypothesis testing problem. Based on this idea, we propose a joint modulation classification and user number detection algorithm for the multiuser MIMO-STBC systems. The proposed method does not require prior knowledge of the propagation channel or noise power, and thus might be suitable for the non-cooperative scenario. Simulations validate the effectiveness of the proposed method. Full article
Figures

Figure 1

Open AccessArticle
Digital Citizen Participation within Schools in the United Kingdom and Indonesia: An Actor–Network Theory (ANT) Perspective
Information 2016, 7(4), 69; doi:10.3390/info7040069 -
Abstract
Citizen engagement and participation are a key focus for government and government agencies, and with the advent of Internet technologies questions arise about the role and impact of technology on citizen participation. This paper aims to explore the role of technology in citizen
[...] Read more.
Citizen engagement and participation are a key focus for government and government agencies, and with the advent of Internet technologies questions arise about the role and impact of technology on citizen participation. This paper aims to explore the role of technology in citizen participation within schools. This research used in-depth comparative case studies using examples from two different schools and school systems, one in the United Kingdom and one in Indonesia. The wider school systems are complex and dynamic environments with multiple stakeholders, media, and supporting systems, and the schools operate under geopolitical and social influences. This paper provides a framework, based on Actor-Network Theory (ANT), for capturing e-participation in schools, particularly identifying the influence of technology as a conduit for enabling, engaging, and empowering stakeholders. Full article
Figures

Figure 1

Open AccessReview
Travel Mode Detection Based on GPS Raw Data Collected by Smartphones: A Systematic Review of the Existing Methodologies
Information 2016, 7(4), 67; doi:10.3390/info7040067 -
Abstract
Over the past couple of decades, global positioning system (GPS) technology has been utilized to collect large-scale data from travel surveys. As the precise spatiotemporal characteristics of travel could be provided by GPS devices, the issues of traditional travel survey, such as misreporting
[...] Read more.
Over the past couple of decades, global positioning system (GPS) technology has been utilized to collect large-scale data from travel surveys. As the precise spatiotemporal characteristics of travel could be provided by GPS devices, the issues of traditional travel survey, such as misreporting and non-response, could be addressed. Considering the defects of dedicated GPS devices (e.g., the need for a large sum of money to buy devices, forgetfulness in the taking of devices to collect data, limiting of the sample size because of the number of devices, etc.), and the fact that the smartphone is becoming one of the necessities of life, there is an opportunity for smartphones to replace dedicated GPS devices. Although several general reviews of GPS travel survey and GPS data-processing methods have been written, a systematic review of smartphone-based GPS data collection and travel mode detection has not be made.. The studies were collected from six databases. The purpose of this review is to critically evaluate the current literature on the existing methodologies of travel mode detection based on GPS raw data collected by smartphones. Meanwhile, according to a systematic comparison of the different methods of data preprocessing for travel mode detection, this paper details the strengths and weaknesses of the existing methods. Furthermore, it is a very important step towards developing methodologies and applications for GPS raw data collected by smartphones. Full article
Figures

Figure 1

Open AccessArticle
Who Leads Advocacy through Social Media in Japan? Evidence from the “Tsukuba Civic Activities Cyber-Square” Facebook Page
Information 2016, 7(4), 66; doi:10.3390/info7040066 -
Abstract
Although the importance of advocacy activities by civil society organizations (CSOs) in policy and decision-making procedures has been greatly emphasized in the literature of political science and social policy, we have relatively little understanding of the relevance and impact of the leading actors
[...] Read more.
Although the importance of advocacy activities by civil society organizations (CSOs) in policy and decision-making procedures has been greatly emphasized in the literature of political science and social policy, we have relatively little understanding of the relevance and impact of the leading actors who structure the diverse networks and discourses through social media; further recognition is needed in both fields. The purpose of this study is to analyze civil society organizations at the local government level involved in advocacy activities through the use of social media such as Facebook and Twitter. Our study focuses on a specific Japanese Facebook community page—the “Tsukuba Civic Activities Cyber-Square”—aimed at enhancing civil society activities in Japan. This page is operated by the municipal government of Tsukuba, in collaboration with the University of Tsukuba and Intel Corporation. Our findings indicate that social networking services such as Facebook can provide civil society organizations with: (1) more political opportunities to advocate; (2) more chances to connect with the local government; and (3) create opportunities to exert greater presence, despite their limited financial and political resources. Full article
Figures

Figure 1

Open AccessArticle
A New Prospect Projection Multi-Criteria Decision-Making Method for Interval-Valued Intuitionistic Fuzzy Numbers
Information 2016, 7(4), 64; doi:10.3390/info7040064 -
Abstract
To depict the influence of decision makers’ risk psychology on the interval-valued intuitionistic fuzzy multi-criteria decision-making process, this paper proposes a new method based on prospect theory. Considering the risk attitude of the decision maker, we transform interval-valued intuitionistic fuzzy numbers into real
[...] Read more.
To depict the influence of decision makers’ risk psychology on the interval-valued intuitionistic fuzzy multi-criteria decision-making process, this paper proposes a new method based on prospect theory. Considering the risk attitude of the decision maker, we transform interval-valued intuitionistic fuzzy numbers into real numbers via a prospect value function and consequently derive the prospect decision matrices. Regarding the criteria weights that are incompletely known or completely unknown, a new nonlinear optimization model is developed to determine the criteria weights by considering the subjective and objective factors. Furthermore, we calculate the prospect projection of each alternative for the ideal solution and rank all the alternatives according to the prospect projection values. Finally, an example is provided to illustrate the application of the developed approach. Full article
Figures

Figure 1

Open AccessArticle
Reaching Citizens’ Engagement by Services: Swiss Use Case
Information 2016, 7(4), 65; doi:10.3390/info7040065 -
Abstract
Collaboration with citizens and users plays an increasing role in the transformation of public services towards new forms of production and delivery. Thus there is a need to modernize the civil service to accelerate innovation in governments, as civil servants will also have
[...] Read more.
Collaboration with citizens and users plays an increasing role in the transformation of public services towards new forms of production and delivery. Thus there is a need to modernize the civil service to accelerate innovation in governments, as civil servants will also have an important role to play. Digital civic engagement platforms can provide a more attractive and accessible means for participation. We believe that neither an exclusive top-down approach nor a bottom-up approach can address the current needs. Instead a hybrid approach should be designed. This paper presents a novel approach to address the issue of current civic disengagement. This approach is illustrated through four different use cases in the Swiss context. Full article
Figures

Figure 1

Open AccessArticle
Lazy Management for Frequency Table on Hardware-Based Stream Lossless Data Compression
Information 2016, 7(4), 63; doi:10.3390/info7040063 -
Abstract
The demand for communicating large amounts of data in real-time has raised new challenges with implementing high-speed communication paths for high definition video and sensory data. It requires the implementation of high speed data paths based on hardware. Implementation difficulties have to be
[...] Read more.
The demand for communicating large amounts of data in real-time has raised new challenges with implementing high-speed communication paths for high definition video and sensory data. It requires the implementation of high speed data paths based on hardware. Implementation difficulties have to be addressed by applying new techniques based on data-oriented algorithms. This paper focuses on a solution for this problem by applying a lossless data compression mechanism on the communication data path. The new lossless data compression mechanism, called LCA-DLT, provides dynamic histogram management for symbol lookup tables used in the compression and the decompression operations. When the histogram memory is fully used, the management algorithm needs to find the least used entries and invalidate these entries. The invalidation operations cause the blocking of the compression and the decompression data stream. This paper proposes novel techniques to eliminate blocking by introducing a dynamic invalidation mechanism, which allows achievement of a high throughput data compression. Full article
Figures

Figure 1

Open AccessArticle
Retrocausality in Quantum Phenomena and Chemical Evolution
Information 2016, 7(4), 62; doi:10.3390/info7040062 -
Abstract
The interplay between retrocausality and the time-reversal symmetry of the dynamical law of quantum mechanics underscores the significance of the measurement dynamics with the use of indivisible and discrete quantum particles to be mediated. One example of empirical evidence demonstrating the significance of
[...] Read more.
The interplay between retrocausality and the time-reversal symmetry of the dynamical law of quantum mechanics underscores the significance of the measurement dynamics with the use of indivisible and discrete quantum particles to be mediated. One example of empirical evidence demonstrating the significance of retrocausality going along with time-reversal symmetry is seen in the operation of a reaction cycle to be expected in chemical evolution. A reaction cycle can hold itself when the causative operation of the cycle remains robust, even when facing frequent retrocausal interventions of a quantum-mechanical origin. Quantum mechanics in and of itself has potential in raising a reaction cycle in the prebiotic phase of chemical evolution, even without any help of artefactual scaffoldings of an external origin. Full article
Figures

Figure 1

Open AccessArticle
A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks
Information 2016, 7(4), 60; doi:10.3390/info7040060 -
Abstract
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This
[...] Read more.
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP) cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS) sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption. Full article
Figures

Figure 1

Open AccessArticle
NIRFaceNet: A Convolutional Neural Network for Near-Infrared Face Identification
Information 2016, 7(4), 61; doi:10.3390/info7040061 -
Abstract
Near-infrared (NIR) face recognition has attracted increasing attention because of its advantage of illumination invariance. However, traditional face recognition methods based on NIR are designed for and tested in cooperative-user applications. In this paper, we present a convolutional neural network (CNN) for NIR
[...] Read more.
Near-infrared (NIR) face recognition has attracted increasing attention because of its advantage of illumination invariance. However, traditional face recognition methods based on NIR are designed for and tested in cooperative-user applications. In this paper, we present a convolutional neural network (CNN) for NIR face recognition (specifically face identification) in non-cooperative-user applications. The proposed NIRFaceNet is modified from GoogLeNet, but has a more compact structure designed specifically for the Chinese Academy of Sciences Institute of Automation (CASIA) NIR database and can achieve higher identification rates with less training time and less processing time. The experimental results demonstrate that NIRFaceNet has an overall advantage compared to other methods in the NIR face recognition domain when image blur and noise are present. The performance suggests that the proposed NIRFaceNet method may be more suitable for non-cooperative-user applications. Full article
Figures

Figure 1

Open AccessArticle
Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures
Information 2016, 7(4), 59; doi:10.3390/info7040059 -
Abstract
The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the identities. When a user is authenticated
[...] Read more.
The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords) by means of the fuzzy extractors method based on signature parameters without storing templates in an open way. Full article
Figures

Figure 1

Open AccessArticle
Studying Organizations on Instagram
Information 2016, 7(4), 58; doi:10.3390/info7040058 -
Abstract
With the rise of social media platforms based on the sharing of pictures and videos, the question of how such platforms should be studied arises. Previous research on social media (content) has mainly focused on text (written words) and the rather text-based social
[...] Read more.
With the rise of social media platforms based on the sharing of pictures and videos, the question of how such platforms should be studied arises. Previous research on social media (content) has mainly focused on text (written words) and the rather text-based social media platforms Twitter and Facebook. Drawing on research in the fields of visual, political, and business communication, we introduce a methodological framework to study the fast-growing image-sharing service Instagram. This methodological framework was developed to study political parties’ Instagram accounts and tested by means of a study of Swedish political parties during the 2014 election campaign. In this article, we adapt the framework to also study other types of organizations active on Instagram by focusing on the following main questions: Do organizations only use Instagram to share one-way information, focusing on disseminating information and self-presentation? Or is Instagram used for two-way communication to establish and cultivate organization-public relationships? We introduce and discuss the coding of variables with respect to four clusters: the perception of the posting, image management, integration, and interactivity. Full article
Figures

Figure 1

Open AccessArticle
A Survey on Data Compression Methods for Biological Sequences
Information 2016, 7(4), 56; doi:10.3390/info7040056 -
Abstract
The ever increasing growth of the production of high-throughput sequencing data poses a serious challenge to the storage, processing and transmission of these data. As frequently stated, it is a data deluge. Compression is essential to address this challenge—it reduces storage space and
[...] Read more.
The ever increasing growth of the production of high-throughput sequencing data poses a serious challenge to the storage, processing and transmission of these data. As frequently stated, it is a data deluge. Compression is essential to address this challenge—it reduces storage space and processing costs, along with speeding up data transmission. In this paper, we provide a comprehensive survey of existing compression approaches, that are specialized for biological data, including protein and DNA sequences. Also, we devote an important part of the paper to the approaches proposed for the compression of different file formats, such as FASTA, as well as FASTQ and SAM/BAM, which contain quality scores and metadata, in addition to the biological sequences. Then, we present a comparison of the performance of several methods, in terms of compression ratio, memory usage and compression/decompression time. Finally, we present some suggestions for future research on biological data compression. Full article
Figures

Figure 1

Open AccessReview
A Benchmarking Analysis of Open-Source Business Intelligence Tools in Healthcare Environments
Information 2016, 7(4), 57; doi:10.3390/info7040057 -
Abstract
In recent years, a wide range of Business Intelligence (BI) technologies have been applied to different areas in order to support the decision-making process. BI enables the extraction of knowledge from the data stored. The healthcare industry is no exception, and so BI
[...] Read more.
In recent years, a wide range of Business Intelligence (BI) technologies have been applied to different areas in order to support the decision-making process. BI enables the extraction of knowledge from the data stored. The healthcare industry is no exception, and so BI applications have been under investigation across multiple units of different institutions. Thus, in this article, we intend to analyze some open-source/free BI tools on the market and their applicability in the clinical sphere, taking into consideration the general characteristics of the clinical environment. For this purpose, six BI tools were selected, analyzed, and tested in a practical environment. Then, a comparison metric and a ranking were defined for the tested applications in order to choose the one that best applies to the extraction of useful knowledge and clinical data in a healthcare environment. Finally, a pervasive BI platform was developed using a real case in order to prove the tool viability. Full article
Figures

Figure 1

Open AccessArticle
Government-Driven Participation and Collective Intelligence: A Case of the Government 3.0 Initiative in Korea
Information 2016, 7(4), 55; doi:10.3390/info7040055 -
Abstract
The Park Geun-hye Administration of Korea (2013–2017) aims to increase the level of transparency and citizen trust in government through the Government 3.0 initiative. This new initiative for public sector innovation encourages citizen-government collaboration and collective intelligence, thereby improving the quality of policy-making
[...] Read more.
The Park Geun-hye Administration of Korea (2013–2017) aims to increase the level of transparency and citizen trust in government through the Government 3.0 initiative. This new initiative for public sector innovation encourages citizen-government collaboration and collective intelligence, thereby improving the quality of policy-making and implementation and solving public problems in a new way. However, the national initiative that identifies collective intelligence and citizen-government collaboration alike fails to understand what the wisdom of crowds genuinely means. Collective intelligence is not a magic bullet to solve public problems, which are called “wicked problems”. Collective deliberation over public issues often brings pain and patience, rather than fun and joy. It is not so easy that the public finds the best solution for soothing public problems through collective deliberation. The Government 3.0 initiative does not pay much attention to difficulties in gathering scattered wisdom, but rather highlights uncertain opportunities created by collective interactions and communications. This study deeply discusses the weaknesses in the logic of, and approach to, collective intelligence underlying the Government 3.0 initiative in Korea and the overall influence of the national initiative on participatory democracy. Full article
Open AccessArticle
Access to Information for Learning by Using Assistive Technology for Undergraduate Students with Disabilities in Northern Thailand
Information 2016, 7(4), 54; doi:10.3390/info7040054 -
Abstract
The purpose of this study was to survey access to information for learning on the types of assistive technology used by undergraduate students with disabilities in Northern Thailand. The types of assistive technology in this study included assistive devices and educational services. Data
[...] Read more.
The purpose of this study was to survey access to information for learning on the types of assistive technology used by undergraduate students with disabilities in Northern Thailand. The types of assistive technology in this study included assistive devices and educational services. Data were collected from a questionnaire developed as a rating scale checklist that was completed by 140 undergraduate students with disabilities. Results of this study found that all types of educational services provided more to undergraduate students with disabilities than almost all kinds of assistive technology. Additionally, the students utilized assistive devices and accessed educational services for different reasons, and most students with visual disabilities were given either assistive devices or educational services. In terms of use, results found that students with hearing disabilities used assistive technology the most, whereas findings concerning needs showed that all of the students with disabilities demanded almost all types of assistive technology. Full article
Open AccessArticle
Efficient Software HEVC to AVS2 Transcoding
Information 2016, 7(3), 53; doi:10.3390/info7030053 -
Abstract
The second generation of Audio and Video coding Standard (AVS) is developed by the IEEE 1857 Working Group under project 1857.4 and was standardized in 2016 by the AVS Working Group of China as the new broadcasting standard AVS2. High Efficient Video Coding
[...] Read more.
The second generation of Audio and Video coding Standard (AVS) is developed by the IEEE 1857 Working Group under project 1857.4 and was standardized in 2016 by the AVS Working Group of China as the new broadcasting standard AVS2. High Efficient Video Coding (HEVC) is the newest global video coding standard announced in 2013. More and more codings are migrating from H.264/AVC to HEVC because of its higher compression performance. In this paper, we propose an efficient HEVC to AVS2 transcoding algorithm, which applies a multi-stage decoding information utilization framework to maximize the usage of the decoding information in the transcoding process. The proposed algorithm achieves 11×–17× speed gains over the AVS2 reference software RD 14.0 with a modest BD-rate loss of 9.6%–16.6%. Full article
Figures

Figure 1

Open AccessArticle
Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node
Information 2016, 7(3), 51; doi:10.3390/info7030051 -
Abstract
The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can
[...] Read more.
The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can receive the core node pheromone. We can set the distance of the edge node to the core to be less than five hops by establishing the appropriate spread coefficient ω. Packet forwarding is then converted into the process of tracing the pheromone of the destination node. A set of simulation results shows that the proposed initiative community model can effectively increase the delivery ratio and reduce delay when the community structure is relatively stable. Full article
Figures

Figure 1

Open AccessArticle
Optimal Threshold Determination for Discriminating Driving Anger Intensity Based on EEG Wavelet Features and ROC Curve Analysis
Information 2016, 7(3), 52; doi:10.3390/info7030052 -
Abstract
Driving anger, called “road rage”, has become increasingly common nowadays, affecting road safety. A few researches focused on how to identify driving anger, however, there is still a gap in driving anger grading, especially in real traffic environment, which is beneficial to take
[...] Read more.
Driving anger, called “road rage”, has become increasingly common nowadays, affecting road safety. A few researches focused on how to identify driving anger, however, there is still a gap in driving anger grading, especially in real traffic environment, which is beneficial to take corresponding intervening measures according to different anger intensity. This study proposes a method for discriminating driving anger states with different intensity based on Electroencephalogram (EEG) spectral features. First, thirty drivers were recruited to conduct on-road experiments on a busy route in Wuhan, China where anger could be inducted by various road events, e.g., vehicles weaving/cutting in line, jaywalking/cyclist crossing, traffic congestion and waiting red light if they want to complete the experiments ahead of basic time for extra paid. Subsequently, significance analysis was used to select relative energy spectrum of β band (β%) and relative energy spectrum of θ band (θ%) for discriminating the different driving anger states. Finally, according to receiver operating characteristic (ROC) curve analysis, the optimal thresholds (best cut-off points) of β% and θ% for identifying none anger state (i.e., neutral) were determined to be 0.2183 ≤ θ% < 1, 0 < β% < 0.2586; low anger state is 0.1539 ≤ θ% < 0.2183, 0.2586 ≤ β% < 0.3269; moderate anger state is 0.1216 ≤ θ% < 0.1539, 0.3269 ≤ β% < 0.3674; high anger state is 0 < θ% < 0.1216, 0.3674 ≤ β% < 1. Moreover, the discrimination performances of verification indicate that, the overall accuracy (Acc) of the optimal thresholds of β% for discriminating the four driving anger states is 80.21%, while 75.20% for that of θ%. The results can provide theoretical foundation for developing driving anger detection or warning devices based on the relevant optimal thresholds. Full article
Figures

Figure 1