Skip to Content

Information, Volume 10, Issue 3

2019 March - 38 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (38)

  • Article
  • Open Access
18 Citations
4,627 Views
20 Pages

Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases

  • Mahboob Qaosar,
  • Asif Zaman,
  • Md. Anisuzzaman Siddique,
  • Annisa and
  • Yasuhiko Morimoto

25 March 2019

Selecting representative objects from a large-scale database is an essential task to understand the database. A skyline query is one of the popular methods for selecting representative objects. It retrieves a set of non-dominated objects. In this pap...

  • Article
  • Open Access
3 Citations
6,406 Views
21 Pages

Tangled String for Multi-Timescale Explanation of Changes in Stock Market

  • Yukio Ohsawa,
  • Teruaki Hayashi and
  • Takaaki Yoshino

22 March 2019

This work addresses the question of explaining changes in the desired timescales of the stock market. Tangled string is a sequence visualization tool wherein a sequence is compared to a string and trends in the sequence are compared to the appearance...

  • Editorial
  • Open Access
6 Citations
6,008 Views
4 Pages

eHealth and Artificial Intelligence

  • Donato Impedovo and
  • Giuseppe Pirlo

19 March 2019

Artificial intelligence is changing the healthcare industry from many perspectives: diagnosis, treatment, and follow-up. A wide range of techniques has been proposed in the literature. In this special issue, 13 selected and peer-reviewed original res...

  • Article
  • Open Access
15 Citations
4,892 Views
13 Pages

A Self-Learning Fault Diagnosis Strategy Based on Multi-Model Fusion

  • Tianzhen Wang,
  • Jingjing Dong,
  • Tao Xie,
  • Demba Diallo and
  • Mohamed Benbouzid

17 March 2019

This paper presents an approach to detect and classify the faults in complex systems with small amounts of available data history. The methodology is based on the model fusion for fault detection and classification. Moreover, the database is enriched...

  • Article
  • Open Access
8 Citations
5,600 Views
21 Pages

16 March 2019

The total variation (TV) regularization-based methods are proven to be effective in removing random noise. However, these solutions usually have staircase effects. This paper proposes a new image reconstruction method based on TV regularization with...

  • Article
  • Open Access
6 Citations
4,570 Views
14 Pages

Estimating Spatiotemporal Information from Behavioral Sensing Data of Wheelchair Users by Machine Learning Technologies

  • Ikuko Eguchi Yairi,
  • Hiroki Takahashi,
  • Takumi Watanabe,
  • Kouya Nagamine,
  • Yusuke Fukushima,
  • Yutaka Matsuo and
  • Yusuke Iwasawa

15 March 2019

Recent expansion of intelligent gadgets, such as smartphones and smart watches, familiarizes humans with sensing their activities. We have been developing a road accessibility evaluation system inspired by human sensing technologies. This paper intro...

  • Article
  • Open Access
19 Citations
7,427 Views
20 Pages

An Artificial Neural Network Approach to Forecast the Environmental Impact of Data Centers

  • Joao Ferreira,
  • Gustavo Callou,
  • Albert Josua,
  • Dietmar Tutsch and
  • Paulo Maciel

14 March 2019

Due to the high demands of new technologies such as social networks, e-commerce and cloud computing, more energy is being consumed in order to store all the data produced and provide the high availability required. Over the years, this increase in en...

  • Article
  • Open Access
7 Citations
4,402 Views
13 Pages

Content-Aware Retargeted Image Quality Assessment

  • Tingting Zhang,
  • Ming Yu,
  • Yingchun Guo and
  • Yi Liu

12 March 2019

In targeting the low correlation between existing image scaling quality assessment methods and subjective awareness, a content-aware retargeted image quality assessment algorithm is proposed, which is based on the structural similarity index. In this...

  • Article
  • Open Access
19 Citations
5,486 Views
20 Pages

12 March 2019

Data fragmentation and allocation has for long proven to be an efficient technique for improving the performance of distributed database systems’ (DDBSs). A crucial feature of any successful DDBS design revolves around placing an intrinsic emph...

  • Article
  • Open Access
5 Citations
4,257 Views
16 Pages

11 March 2019

Metagenomics studies, as well as genomics studies of polyploid species such as wheat, deal with the analysis of high variation data. Such data contain sequences from similar, but distinct genetic chains. This fact presents an obstacle to analysis and...

  • Article
  • Open Access
44 Citations
5,448 Views
13 Pages

An Experimental Comparison of Feature-Selection and Classification Methods for Microarray Datasets

  • Nicole Dalia Cilia,
  • Claudio De Stefano,
  • Francesco Fontanella,
  • Stefano Raimondo and
  • Alessandra Scotto di Freca

10 March 2019

In the last decade, there has been a growing scientific interest in the analysis of DNA microarray datasets, which have been widely used in basic and translational cancer research. The application fields include both the identification of oncological...

  • Article
  • Open Access
63 Citations
8,439 Views
22 Pages

8 March 2019

The existing short-term traffic flow prediction models fail to provide precise prediction results and consider the impact of different traffic conditions on the prediction results in an actual traffic network. To solve these problems, a hybrid Long S...

  • Article
  • Open Access
124 Citations
14,647 Views
17 Pages

8 March 2019

The current paper addresses relevant network security vulnerabilities introduced by network devices within the emerging paradigm of Internet of Things (IoT) as well as the urgent need to mitigate the negative effects of some types of Distributed Deni...

  • Article
  • Open Access
2 Citations
4,349 Views
12 Pages

8 March 2019

This article addresses the task of inferring elements in the attributes of data. Extracting data related to our interests is a challenging task. Although data on the web can be accessed through free text queries, it is difficult to obtain results tha...

  • Review
  • Open Access
150 Citations
17,602 Views
34 Pages

A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments

  • Abdul Salam Shah,
  • Haidawati Nasir,
  • Muhammad Fayaz,
  • Adidah Lajis and
  • Asadullah Shah

8 March 2019

In recent years, due to the unnecessary wastage of electrical energy in residential buildings, the requirement of energy optimization and user comfort has gained vital importance. In the literature, various techniques have been proposed addressing th...

  • Article
  • Open Access
2 Citations
4,165 Views
8 Pages

7 March 2019

We will sketch the debate on testimony in social epistemology by reference to the contemporary debate on reductionism/anti-reductionism, communitarian epistemology and inferentialism. Testimony is a fundamental source of knowledge we share and it is...

  • Article
  • Open Access
7 Citations
5,777 Views
17 Pages

Related Stocks Selection with Data Collaboration Using Text Mining

  • Masanori Hirano,
  • Hiroki Sakaji,
  • Shoko Kimura,
  • Kiyoshi Izumi,
  • Hiroyasu Matsushima,
  • Shintaro Nagao and
  • Atsuo Kato

7 March 2019

We propose an extended scheme for selecting related stocks for themed mutual funds. This scheme was designed to support fund managers who are building themed mutual funds. In our preliminary experiments, building a themed mutual fund was found to be...

  • Article
  • Open Access
19 Citations
5,763 Views
21 Pages

7 March 2019

Financial prediction is an important research field in financial data time series mining. There has always been a problem of clustering massive financial time series data. Conventional clustering algorithms are not practical for time series data beca...

  • Article
  • Open Access
17 Citations
5,402 Views
17 Pages

Discrete Wavelet Packet Transform-Based Industrial Digital Wireless Communication Systems

  • Safa Saadaoui,
  • Mohamed Tabaa,
  • Fabrice Monteiro,
  • Mouhamad Chehaitly and
  • Abbas Dandache

7 March 2019

The industrial internet of things (IIoT) known as industry 4.0, is the use of internet of things technologies, via the Wireless Sensor Network (WSN), to enhance manufacturing and industrial processes. It incorporates machine learning and big data tec...

  • Article
  • Open Access
10 Citations
5,366 Views
20 Pages

Detecting Emotions in English and Arabic Tweets

  • Tariq Ahmad,
  • Allan Ramsay and
  • Hanady Ahmed

Assigning sentiment labels to documents is, at first sight, a standard multi-label classification task. Many approaches have been used for this task, but the current state-of-the-art solutions use deep neural networks (DNNs). As such, it seems likely...

  • Article
  • Open Access
19 Citations
5,694 Views
18 Pages

Path planning, as the core of navigation control for mobile robots, has become the focus of research in the field of mobile robots. Various path planning algorithms have been recently proposed. In this paper, in view of the advantages and disadvantag...

  • Feature Paper
  • Article
  • Open Access
7 Citations
5,478 Views
23 Pages

6 March 2019

Statistical bivariate numerical modeling is a method to infer an empirical relationship between unpaired sets of data based on statistical distributions matching. In the present paper, a novel efficient numerical algorithm is proposed to perform biva...

  • Article
  • Open Access
11 Citations
4,516 Views
21 Pages

ByNowLife: A Novel Framework for OWL and Bayesian Network Integration

  • Foni A. Setiawan,
  • Eko K. Budiardjo and
  • Wahyu C. Wibowo

An ontology-based system can currently logically reason through the Web Ontology Language Description Logic (OWL DL). To perform probabilistic reasoning, the system must use a separate knowledge base, separate processing, or third-party applications....

  • Article
  • Open Access
1 Citations
4,443 Views
26 Pages

Recently, the skyline query has attracted interest in a wide range of applications from recommendation systems to computer networks. The skyline query is useful to obtain the dominant data points from the given dataset. In the low-dimensional dataset...

  • Article
  • Open Access
1 Citations
8,076 Views
14 Pages

The paper presents a flexible system for extracting features and creating training and test examples for solving the all-words sense disambiguation (WSD) task. The system allows integrating word and sense embeddings as part of an example description....

  • Article
  • Open Access
46 Citations
8,919 Views
13 Pages

The application of machine learning models for prediction and prognosis of disease development has become an irrevocable part of cancer studies aimed at improving the subsequent therapy and management of patients. The application of machine learning...

  • Article
  • Open Access
14 Citations
4,815 Views
19 Pages

Automatic dialog act recognition is an important step for dialog systems since it reveals the intention behind the words uttered by its conversational partners. Although most approaches on the task use word-level tokenization, there is information at...

  • Article
  • Open Access
10 Citations
5,496 Views
13 Pages

An Implementation of Parallel Buck Converters for Common Load Sharing in DC Microgrid

  • Sikander Ali,
  • Tang Shengxue,
  • Zhang Jianyu,
  • Ahmad Ali and
  • Arshad Nawaz

The increase in demand for clean, safe, and environmentally friendly renewable energy sources faces several challenges such as system design and reliable operations. DC microgrid (MG) is a promising system due to higher efficiency and natural interfa...

  • Article
  • Open Access
3 Citations
5,362 Views
25 Pages

Information systems support and ensure the practical running of the most critical business processes. There exists (or can be reconstructed) a record (log) of the process running in the information system. Computer methods of data mining can be used...

  • Article
  • Open Access
3 Citations
5,100 Views
17 Pages

Visual Analysis Scenarios for Understanding Evolutionary Computational Techniques’ Behavior

  • Aruanda Meiguins,
  • Yuri Santos,
  • Diego Santos,
  • Bianchi Meiguins and
  • Jefferson Morais

28 February 2019

Machine learning algorithms are used in many applications nowadays. Sometimes, we need to describe how the decision models created output, and this may not be an easy task. Information visualization (InfoVis) techniques (e.g., TreeMap, parallel coord...

  • Article
  • Open Access
89 Citations
8,415 Views
13 Pages

28 February 2019

This article analyzes the available readiness indexes and maturity models applied for trends designated as “4.0”, with a focus on Industry 4.0, primarily within the countries of Europe. Based upon it, the available indexes and maturity mo...

  • Article
  • Open Access
5 Citations
4,488 Views
11 Pages

28 February 2019

The accurate analysis of periodic surface acoustic wave (SAW) structures by combined finite element method and boundary element method (FEM/BEM) is important for SAW design, especially in the extraction of couple-of-mode (COM) parameters. However, th...

  • Article
  • Open Access
2 Citations
4,011 Views
15 Pages

A Novel Method for Router-to-AS Mapping Based on Graph Community Discovery

  • Hangyu Hu,
  • Weiyi Liu,
  • Gaolei Fei,
  • Song Yang and
  • Guangmin Hu

27 February 2019

The last decades have witnessed the progressive development of research on Internet topology at the router or autonomous systems (AS) level. Routers are essential components of ASes, which dominate their behaviors. It is important to identify the aff...

  • Article
  • Open Access
13 Citations
5,823 Views
13 Pages

26 February 2019

Recent advances in deep neural networks, language modeling and language generation have introduced new ideas to the field of conversational agents. As a result, deep neural models such as sequence-to-sequence, memory networks, and the Transformer hav...

  • Article
  • Open Access
22 Citations
8,054 Views
15 Pages

26 February 2019

The existing traffic light system fails to deal with the increase in vehicular traffic requirements due to fixed time programming. Traffic flow suffers from vehicle delay and congestion. A new networking technology called vehicular ad hoc networking...

  • Article
  • Open Access
19 Citations
8,592 Views
24 Pages

26 February 2019

The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service” and “code injection”. A review and an analysis of various attack dete...

  • Review
  • Open Access
15 Citations
7,610 Views
24 Pages

Name Lookup in Named Data Networking: A Review

  • Al-qutwani Majed,
  • Xingwei Wang and
  • Bo Yi

26 February 2019

Named data networking (NDN) is an alternative model to the current traditional IP-based Internet by improving content distribution in a network with content name. In NDN, content is sent/received based on its name rather than its address. Forwarding...

  • Article
  • Open Access
14 Citations
4,549 Views
17 Pages

26 February 2019

With self-provisioning of resources as premise, dew computing aims at providing computing services by minimizing the dependency over existing internetwork back-haul. Mobile devices have a huge potential to contribute to this emerging paradigm, not on...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489