Skip to Content

Information, Volume 10, Issue 4

2019 April - 34 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (34)

  • Article
  • Open Access
1 Citations
4,181 Views
15 Pages

24 April 2019

During the last years, recursive systematic convolutional (RSC) encoders have found application in modern telecommunication systems to reduce the bit error rate (BER). In view of the necessity of increasing the throughput of such applications, severa...

  • Article
  • Open Access
1 Citations
4,391 Views
19 Pages

24 April 2019

Current hand-held smart devices are supplied with powerful processors, high resolution screens, and sharp cameras that make them suitable for Augmented Reality (AR) applications. Such applications commonly use interaction techniques adapted for touch...

  • Review
  • Open Access
1,349 Citations
118,536 Views
68 Pages

Text Classification Algorithms: A Survey

  • Kamran Kowsari,
  • Kiana Jafari Meimandi,
  • Mojtaba Heidarysafa,
  • Sanjana Mendu,
  • Laura Barnes and
  • Donald Brown

23 April 2019

In recent years, there has been an exponential growth in the number of complex documents and texts that require a deeper understanding of machine learning methods to be able to accurately classify texts in many applications. Many machine learning app...

  • Article
  • Open Access
21 Citations
6,620 Views
27 Pages

22 April 2019

It took some time indeed, but the research evolution and transformations that occurred in the smart agriculture field over the recent years tend to constitute the latter as the main topic of interest in the so-called Internet of Things (IoT) domain....

  • Article
  • Open Access
108 Citations
16,655 Views
29 Pages

Survey and Classification of Automotive Security Attacks

  • Florian Sommer,
  • Jürgen Dürrwang and
  • Reiner Kriesten

19 April 2019

Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projec...

  • Article
  • Open Access
5 Citations
4,670 Views
19 Pages

18 April 2019

Finger-vein biometrics have been extensively investigated for person verification. One of the open issues in finger-vein verification is the lack of robustness against variations of vein patterns due to the changes in physiological and imaging condit...

  • Article
  • Open Access
15 Citations
5,138 Views
20 Pages

MFA-OSELM Algorithm for WiFi-Based Indoor Positioning System

  • Ahmed Salih AL-Khaleefa,
  • Mohd Riduan Ahmad,
  • Azmi Awang Md Isa,
  • Ahmed AL-Saffar,
  • Mona Riza Mohd Esa and
  • Reza Firsandaya Malik

18 April 2019

Indoor localization is a dynamic and exciting research area. WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint f...

  • Article
  • Open Access
21 Citations
6,868 Views
19 Pages

18 April 2019

Underground sensing and propagation of Signals in the Soil (SitS) medium is an electromagnetic issue. The path loss prediction with higher accuracy is an open research subject in digital agriculture monitoring applications for sensing and communicati...

  • Article
  • Open Access
73 Citations
9,274 Views
22 Pages

17 April 2019

Automated driving systems (ADS) and a combination of these with advanced driver assistance systems (ADAS) will soon be available to a large consumer population. Apart from testing automated driving features and human–machine interfaces (HMI), t...

  • Article
  • Open Access
9 Citations
4,080 Views
14 Pages

17 April 2019

Given the issues relating to big data and privacy-preserving challenges, distributed data mining (DDM) has received much attention recently. Here, we focus on the clustering problem of distributed environments. Several distributed clustering algorith...

  • Article
  • Open Access
6 Citations
4,557 Views
14 Pages

16 April 2019

In inverse synthetic aperture radar (ISAR) imaging system for targets with complex motion, such as ships fluctuating with oceanic waves and high maneuvering airplanes, the multi-component quadratic frequency modulation (QFM) signals are more suitable...

  • Review
  • Open Access
33 Citations
10,747 Views
24 Pages

16 April 2019

The inevitability of the relationship between big data and distributed systems is indicated by the fact that data characteristics cannot be easily handled by a standalone centric approach. Among the different concepts of distributed systems, the CAP...

  • Article
  • Open Access
7 Citations
4,786 Views
10 Pages

Learning Subword Embedding to Improve Uyghur Named-Entity Recognition

  • Alimu Saimaiti,
  • Lulu Wang and
  • Tuergen Yibulayin

15 April 2019

Uyghur is a morphologically rich and typical agglutinating language, and morphological segmentation affects the performance of Uyghur named-entity recognition (NER). Common Uyghur NER systems use the word sequence as input and rely heavily on feature...

  • Article
  • Open Access
21 Citations
11,040 Views
15 Pages

Data Consistency Theory and Case Study for Scientific Big Data

  • Peng Shi,
  • Yulin Cui,
  • Kangming Xu,
  • Mingmei Zhang and
  • Lianhong Ding

12 April 2019

Big data technique is a series of novel technologies to deal with large amounts of data from various sources. Unfortunately, it is inevitable that the data from different sources conflict with each other from the aspects of format, semantics, and val...

  • Article
  • Open Access
9 Citations
5,555 Views
16 Pages

12 April 2019

The evolution of a collaborative innovation network depends on the interrelationships among the innovation subjects. Every single small change affects the network topology, which leads to different evolution results. A logical relationship exists bet...

  • Article
  • Open Access
4 Citations
4,893 Views
14 Pages

Improved Massive MIMO RZF Precoding Algorithm Based on Truncated Kapteyn Series Expansion

  • Xiaomei Xue,
  • Zhengquan Li,
  • Yongqiang Man,
  • Song Xing,
  • Yang Liu,
  • Baolong Li and
  • Qiong Wu

11 April 2019

In order to reduce the computational complexity of the inverse matrix in the regularized zero-forcing (RZF) precoding algorithm, this paper expands and approximates the inverse matrix based on the truncated Kapteyn series expansion and the correspond...

  • Article
  • Open Access
11 Citations
6,318 Views
16 Pages

10 April 2019

Urban population has grown exponentially in recent years, leading to an increase of CO2 emissions and consequently contributing on a large scale to climate change. Urban trees are fundamental to mitigating CO2 emissions as they incorporate carbon in...

  • Article
  • Open Access
5 Citations
5,100 Views
14 Pages

Predict Electric Power Demand with Extended Goal Graph and Heterogeneous Mixture Modeling

  • Noriyuki Kushiro,
  • Ami Fukuda,
  • Masatada Kawatsu and
  • Toshihiro Mega

10 April 2019

In this study, methods for predicting energy demand on hourly consumption data are established for realizing an energy management system for buildings. The methods consist of an energy prediction algorithm that automatically separates the datasets to...

  • Article
  • Open Access
9 Citations
6,288 Views
29 Pages

End to End Delay and Energy Consumption in a Two Tier Cluster Hierarchical Wireless Sensor Networks

  • Vicente Casares-Giner,
  • Tatiana Inés Navas,
  • Dolly Smith Flórez and
  • Tito Raúl Vargas Hernández

10 April 2019

In this work it is considered a circular Wireless Sensor Networks (WSN) in a planar structure with uniform distribution of the sensors and with a two-level hierarchical topology. At the lower level, a cluster configuration is adopted in which the sen...

  • Article
  • Open Access
10 Citations
12,719 Views
13 Pages

9 April 2019

Text-to-speech synthesis is a computational technique for producing synthetic, human-like speech by a computer. In recent years, speech synthesis techniques have developed, and have been employed in many applications, such as automatic translation ap...

  • Article
  • Open Access
15 Citations
4,966 Views
13 Pages

9 April 2019

Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current res...

  • Article
  • Open Access
5 Citations
3,775 Views
11 Pages

A Privacy-Preserving Protocol for Utility-Based Routing in DTNs

  • Qingfeng Jiang,
  • Kun Deng,
  • Lei Zhang and
  • Chun Liu

8 April 2019

In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility. The privacy information of encounter time and...

  • Article
  • Open Access
15 Citations
7,054 Views
17 Pages

8 April 2019

Image similarity measurement is a fundamental problem in the field of computer vision. It is widely used in image classification, object detection, image retrieval, and other fields, mostly through Siamese or triplet networks. These networks consist...

  • Article
  • Open Access
28 Citations
7,421 Views
18 Pages

8 April 2019

The recommendation algorithm in e-commerce systems is faced with the problem of high sparsity of users’ score data and interest’s shift, which greatly affects the performance of recommendation. Hence, a combined recommendation algorithm b...

  • Article
  • Open Access
8 Citations
9,843 Views
15 Pages

The Design and Application of Game Rewards in Youth Addiction Care

  • Marierose M. M. van Dooren,
  • Valentijn T. Visch and
  • Renske Spijkerman

6 April 2019

Different types of rewards are applied in persuasive games to encourage play persistence of its users and facilitate the achievement of desired real-world goals, such as behavioral change. Persuasive games have successfully been applied in mental hea...

  • Article
  • Open Access
13 Citations
5,606 Views
20 Pages

6 April 2019

A hashtag is a type of metadata tag used on social networks, such as Twitter and other microblogging services. Hashtags indicate the core idea of a microblog post and can help people to search for specific themes or content. However, not everyone tag...

  • Article
  • Open Access
17 Citations
4,674 Views
9 Pages

5 April 2019

In the Threshold-Sensitive Stable Election Protocol, sensors are randomly deployed in the region without considering the balanced energy consumption of nodes. If a node that has been selected as a cluster head is located far away from the base statio...

  • Article
  • Open Access
1 Citations
3,889 Views
16 Pages

4 April 2019

In order to reduce power consumption and save storage capacity, we propose a high-resolution sub-Nyquist radar approach based on matrix completion (MC), termed as single-channel sub-Nyquist-MC radars. While providing the high-resolution joint angle-D...

  • Article
  • Open Access
25 Citations
7,498 Views
15 Pages

3 April 2019

In the era of the digital economy, data has become a new key production factor, and personal data represents the monetary value of a data-driven economy. Both the public and private sectors want to use these data for research and business. However, d...

  • Article
  • Open Access
2 Citations
3,319 Views
21 Pages

2 April 2019

The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-prese...

  • Review
  • Open Access
461 Citations
65,163 Views
35 Pages

A Survey of Deep Learning Methods for Cyber Security

  • Daniel S. Berman,
  • Anna L. Buczak,
  • Jeffrey S. Chavis and
  • Cherita L. Corbett

2 April 2019

This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neu...

  • Article
  • Open Access
3 Citations
4,016 Views
10 Pages

31 March 2019

We present a generalization of the Youla—Kučera parametrization to obtain all stabilizing controllers for single-input and single-output plants. This uses three parameters and can be applied to plants that may not admit coprime factorizations....

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489