Skip to Content

Information, Volume 11, Issue 5

2020 May - 47 articles

Cover Story: We explore big data-driven artificial intelligence (AI) applied to social systems, i.e., social computing, the concept of artificial intelligence as an enabler of novel social solutions. Through a critical analysis of the literature, we elaborate on the social and human interaction aspects of technology that must be in place to achieve such enablement and address the limitations of the current state of the art in this regard. We review cultural, political, and other societal impacts of social computing, its impact on vulnerable groups, and the ethically aligned design of social computing systems. We show that this is not merely an engineering problem, but rather the intersection of engineering with health sciences, social sciences, psychology, policy, and law. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (47)

  • Article
  • Open Access
25 Citations
7,861 Views
16 Pages

Machine Learning Based Sentiment Text Classification for Evaluating Treatment Quality of Discharge Summary

  • Samer Abdulateef Waheeb,
  • Naseer Ahmed Khan,
  • Bolin Chen and
  • Xuequn Shang

Patients’ discharge summaries (documents) are health sensors that are used for measuring the quality of treatment in medical centers. However, extracting information automatically from discharge summaries with unstructured natural language is c...

  • Article
  • Open Access
24 Citations
6,570 Views
15 Pages

The sentiment analysis of microblog text has always been a challenging research field due to the limited and complex contextual information. However, most of the existing sentiment analysis methods for microblogs focus on classifying the polarity of...

  • Article
  • Open Access
30 Citations
6,774 Views
13 Pages

Mode Awareness and Automated Driving—What Is It and How Can It Be Measured?

  • Christina Kurpiers,
  • Bianca Biebl,
  • Julia Mejia Hernandez and
  • Florian Raisch

In SAE (Society of Automotive Engineers) Level 2, the driver has to monitor the traffic situation and system performance at all times, whereas the system assumes responsibility within a certain operational design domain in SAE Level 3. The different...

  • Feature Paper
  • Article
  • Open Access
23 Citations
7,342 Views
20 Pages

The availability and accessibility of digital data are increasingly significant in the creation of archaeological knowledge with, for example, multiple datasets being brought together to perform extensive analyses that would not otherwise be possible...

  • Article
  • Open Access
183 Citations
16,712 Views
11 Pages

The internet has become an inseparable part of human life, and the number of devices connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices have become a part of everyday human life. However, some challenges...

  • Article
  • Open Access
6 Citations
4,102 Views
18 Pages

Quantitative Evaluation of Dense Skeletons for Image Compression

  • Jieying Wang,
  • Maarten Terpstra,
  • Jiří Kosinka and
  • Alexandru Telea

Skeletons are well-known descriptors used for analysis and processing of 2D binary images. Recently, dense skeletons have been proposed as an extension of classical skeletons as a dual encoding for 2D grayscale and color images. Yet, their encoding p...

  • Article
  • Open Access
65 Citations
8,077 Views
19 Pages

With the advance of many image manipulation tools, carrying out image forgery and concealing the forgery is becoming easier. In this paper, the convolution neural network (CNN) innovation for image forgery detection and localization is discussed. A n...

  • Article
  • Open Access
38 Citations
10,540 Views
17 Pages

The era of information and communication technologies (ICTs) in which we live has transformed the foundations of education. This article starts from the premise that there is a convergence between technologies and media that makes ICTs adopt strategi...

  • Article
  • Open Access
15 Citations
5,173 Views
21 Pages

Multi-Vehicle Simulation in Urban Automated Driving: Technical Implementation and Added Benefit

  • Alexander Feierle,
  • Michael Rettenmaier,
  • Florian Zeitlmeir and
  • Klaus Bengler

This article investigates the simultaneous interaction between an automated vehicle (AV) and its passenger, and between the same AV and a human driver of another vehicle. For this purpose, we have implemented a multi-vehicle simulation consisting of...

  • Feature Paper
  • Article
  • Open Access
22 Citations
7,117 Views
22 Pages

In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environmen...

  • Article
  • Open Access
1 Citations
4,005 Views
13 Pages

Considering the problems of large error and high localization costs of current range-free localization algorithms, a MNCE algorithm based on error correction is proposed in this study. This algorithm decomposes the multi-hop distance between nodes in...

  • Article
  • Open Access
99 Citations
10,536 Views
23 Pages

To reduce the damage caused by road accidents, researchers have applied different techniques to explore correlated factors and develop efficient prediction models. The main purpose of this study is to use one statistical and two nonparametric data mi...

  • Article
  • Open Access
4 Citations
5,791 Views
21 Pages

Planning and distributed task allocation are considered challenging problems. To address them, autonomous agents called planning agents situated in a multi-agent system should cooperate to achieve planning and complete distributed tasks. We propose a...

  • Article
  • Open Access
13 Citations
3,797 Views
15 Pages

Travel time is one of the most critical indexes to describe urban traffic operating states. How to obtain accurate and robust travel time estimates, so as to facilitate to make traffic control decision-making for administrators and trip-planning for...

  • Article
  • Open Access
27 Citations
7,360 Views
19 Pages

Equipment condition monitoring and diagnosis is an important means to detect and eliminate mechanical faults in real time, thereby ensuring safe and reliable operation of equipment. This traditional method uses contact measurement vibration signals t...

  • Article
  • Open Access
19 Citations
29,192 Views
37 Pages

Modeling Popularity and Reliability of Sources in Multilingual Wikipedia

  • Włodzimierz Lewoniewski,
  • Krzysztof Węcel and
  • Witold Abramowicz

One of the most important factors impacting quality of content in Wikipedia is presence of reliable sources. By following references, readers can verify facts or find more details about described topic. A Wikipedia article can be edited independently...

  • Article
  • Open Access
2 Citations
6,235 Views
16 Pages

Variants of best-first search algorithms and their expansions have continuously been introduced to solve challenging problems. The probability-based proof number search (PPNS) is a best-first search algorithm that can be used to solve positions in AN...

  • Article
  • Open Access
38 Citations
8,894 Views
22 Pages

Methodological Considerations Concerning Motion Sickness Investigations during Automated Driving

  • Dominik Mühlbacher,
  • Markus Tomzig,
  • Katharina Reinmüller and
  • Lena Rittger

Automated driving vehicles will allow all occupants to spend their time with various non-driving related tasks like relaxing, working, or reading during the journey. However, a significant percentage of people is susceptible to motion sickness, which...

  • Article
  • Open Access
3 Citations
3,246 Views
21 Pages

The topic of this article is inspired by the problem faced by many people around the world: investment portfolio selection. Apart from the standardly used methods and approaches, non-traditional multiple objective programming methods can also be sign...

  • Article
  • Open Access
7 Citations
6,255 Views
27 Pages

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

  • Sebastian Pape,
  • Federica Paci,
  • Jan Jürjens and
  • Fabio Massacci

Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud. To this end, the Cloud Security Alliance (CSA) has provided the Consensus Assessm...

  • Article
  • Open Access
3,528 Views
13 Pages

In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can ve...

  • Article
  • Open Access
3 Citations
4,793 Views
14 Pages

Heuristic Analysis for In-Plane Non-Contact Calibration of Rulers Using Mask R-CNN

  • Michael Telahun,
  • Daniel Sierra-Sossa and
  • Adel S. Elmaghraby

Determining an object measurement is a challenging task without having a well-defined reference. When a ruler is placed in the same plane of an object being measured it can serve as metric reference, thus a measurement system can be defined and calib...

  • Article
  • Open Access
24 Citations
6,193 Views
20 Pages

The present paper discusses a comparative application of image processing techniques, i.e., Discrete Fourier Transform, K-Means clustering and Artificial Neural Network, for the detection of defects in the industrial context of assembled tires. The u...

  • Review
  • Open Access
12 Citations
7,867 Views
13 Pages

Small Satellites and in particular CubeSats are becoming extremely popular platforms with which to perform space research. They allow for rapid prototyping with considerable cost savings with respect to traditional missions. However, as small satelli...

  • Article
  • Open Access
6 Citations
5,462 Views
20 Pages

The intrinsic characteristics of humanities research require technological support and software assistance that also necessarily goes through the analysis of textual narratives. When these narratives become increasingly complex, pragmatics analysis (...

  • Article
  • Open Access
32 Citations
6,943 Views
12 Pages

One important issue that affects the performance of neural machine translation is the scale of available parallel data. For low-resource languages, the amount of parallel data is not sufficient, which results in poor translation quality. In this pape...

  • Feature Paper
  • Article
  • Open Access
10 Citations
6,281 Views
15 Pages

This article aims to present the results of pilot studies on the involvement of the four largest Information Communication Technology (ICT) companies in promoting the Sustainable Development Goals (SDGs) through social media. Studies examine which co...

  • Article
  • Open Access
4 Citations
6,744 Views
12 Pages

Hedonic Pricing on the Fine Art Market

  • Anna Zhukova,
  • Valeriya Lakshina and
  • Liudmila Leonova

In conditions of the stock market instability the art assets could be considered as an attractive investment. The fine art market is very heterogeneous which is featured by uniqueness of the goods, specific costs and risks, various peculiarities of f...

  • Article
  • Open Access
13 Citations
7,433 Views
15 Pages

Knowledge Graphs for Online Marketing and Sales of Touristic Services

  • Anna Fensel,
  • Zaenal Akbar,
  • Elias Kärle,
  • Christoph Blank,
  • Patrick Pixner and
  • Andreas Gruber

Direct online marketing and sales are nowadays an essential part of almost any business that addresses an end consumer, such as in tourism. On the downside, the data and content required for such marketing and sales are typically distributed, and dif...

  • Article
  • Open Access
47 Citations
7,583 Views
16 Pages

An Application of a Fuzzy TOPSIS Multi-Criteria Decision Analysis Algorithm for Dry Bulk Carrier Selection

  • Bekir Sahin,
  • Tsz Leung Yip,
  • Po-Hsing Tseng,
  • Mehmet Kabak and
  • Ahmet Soylu

Decision-making in ship investment is a complex and difficult process with trade-offs. The purpose of this study is to guide the decisions on the purchase of dry bulk carriers based on a Fuzzy Technique for Order Preference by Similarity to Ideal Sol...

  • Article
  • Open Access
4 Citations
3,447 Views
10 Pages

Entropy increases in the execution of linear physical processes. At equilibrium, all uncertainty about the future is removed and information about the past is lost. Complex systems, on the other hand, can lead to the emergence of order, sustain uncer...

  • Article
  • Open Access
1 Citations
2,904 Views
26 Pages

In generating invariants for hybrid systems, a main source of intractability is that transition relations are first-order assertions over current-state variables and next-state variables, which doubles the number of system variables and introduces ma...

  • Article
  • Open Access
4 Citations
5,517 Views
14 Pages

TwiFly: A Data Analysis Framework for Twitter

  • Panagiotis Chatziadam,
  • Aftantil Dimitriadis,
  • Stefanos Gikas,
  • Ilias Logothetis,
  • Manolis Michalodimitrakis,
  • Manolis Neratzoulakis,
  • Alexandros Papadakis,
  • Vasileios Kontoulis,
  • Nikolaos Siganos and
  • Haridimos Kondylakis
  • + 5 authors

Over the last decade, there have been many changes in the field of political analysis at a global level. Through social networking platforms, millions of people have the opportunity to express their opinion and capture their thoughts at any time, lea...

  • Article
  • Open Access
3,977 Views
17 Pages

Research on Uyghur Pattern Matching Based on Syllable Features

  • Wayit Abliz,
  • Maihemuti Maimaiti,
  • Hao Wu,
  • Jiamila Wushouer,
  • Kahaerjiang Abiderexiti,
  • Tuergen Yibulayin and
  • Aishan Wumaier

Pattern matching is widely used in various fields such as information retrieval, natural language processing (NLP), data mining and network security. In Uyghur (a typical agglutinative, low-resource language with complex morphology, spoken by the eth...

  • Article
  • Open Access
8 Citations
6,855 Views
16 Pages

A non-negligible proportion of seniors rarely uses new technology. Far too often, these rather tech unexperienced seniors struggle with new soft- or hard-ware, that do not provide easy access. As a result, some seniors avoid or completely desist to f...

  • Article
  • Open Access
2 Citations
3,667 Views
16 Pages

In recent years, the graph embedding approach has drawn a lot of attention in the field of network representation and analytics, the purpose of which is to automatically encode network elements into a low-dimensional vector space by preserving certai...

  • Article
  • Open Access
117 Citations
13,948 Views
21 Pages

Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks

  • Pramita Sree Muhuri,
  • Prosenjit Chatterjee,
  • Xiaohong Yuan,
  • Kaushik Roy and
  • Albert Esterline

An intrusion detection system (IDS) identifies whether the network traffic behavior is normal or abnormal or identifies the attack types. Recently, deep learning has emerged as a successful approach in IDSs, having a high accuracy rate with its disti...

  • Article
  • Open Access
3 Citations
4,527 Views
13 Pages

The main aim of the article was to estimate select aspects of knowledge management quality evaluations in contemporary enterprises from theoretical and practical perspectives. Measuring knowledge management is the biggest challenge for both theoretic...

  • Article
  • Open Access
22 Citations
15,637 Views
13 Pages

30 April 2020

Currently, almost every business entity has one or more social media accounts. This statement is true for companies operating in creative areas as well. Social media make it possible to perform widely understood marketing-oriented undertakings. They...

  • Review
  • Open Access
30 Citations
9,099 Views
25 Pages

29 April 2020

Paraphrase detection is important for a number of applications, including plagiarism detection, authorship attribution, question answering, text summarization, text mining in general, etc. In this paper, we give a performance overview of various type...

  • Article
  • Open Access
17 Citations
4,394 Views
14 Pages

Engagement in Non-Driving Related Tasks as a Non-Intrusive Measure for Mode Awareness: A Simulator Study

  • Yannick Forster,
  • Viktoria Geisel,
  • Sebastian Hergeth,
  • Frederik Naujoks and
  • Andreas Keinath

28 April 2020

Research on the role of non-driving related tasks (NDRT) in the area of automated driving is indispensable. At the same time, the construct mode awareness has received considerable interest in regard to human–machine interface (HMI) evaluation....

  • Review
  • Open Access
18 Citations
7,493 Views
15 Pages

Usability Evaluation—Advances in Experimental Design in the Context of Automated Driving Human–Machine Interfaces

  • Deike Albers,
  • Jonas Radlmayr,
  • Alexandra Loew,
  • Sebastian Hergeth,
  • Frederik Naujoks,
  • Andreas Keinath and
  • Klaus Bengler

28 April 2020

The projected introduction of conditional automated driving systems to the market has sparked multifaceted research on human–machine interfaces (HMIs) for such systems. By moderating the roles of the human driver and the driving automation syst...

  • Article
  • Open Access
20 Citations
18,297 Views
48 Pages

A Self-Operating Time Crystal Model of the Human Brain: Can We Replace Entire Brain Hardware with a 3D Fractal Architecture of Clocks Alone?

  • Pushpendra Singh,
  • Komal Saxena,
  • Anup Singhania,
  • Pathik Sahoo,
  • Subrata Ghosh,
  • Rutuja Chhajed,
  • Kanad Ray,
  • Daisuke Fujita and
  • Anirban Bandyopadhyay

27 April 2020

Time crystal was conceived in the 1970s as an autonomous engine made of only clocks to explain the life-like features of a virus. Later, time crystal was extended to living cells like neurons. The brain controls most biological clocks that regenerate...

  • Article
  • Open Access
7 Citations
5,522 Views
13 Pages

26 April 2020

The use of technological solutions to address the production of goods and offering of services is ubiquitous. Health and social issues, however, have only slowly been permeated by technological solutions. Whilst several advances have been made in hea...

  • Feature Paper
  • Article
  • Open Access
10 Citations
6,679 Views
23 Pages

Exploring West African Folk Narrative Texts Using Machine Learning

  • Gossa Lô,
  • Victor de Boer and
  • Chris J. van Aart

26 April 2020

This paper examines how machine learning (ML) and natural language processing (NLP) can be used to identify, analyze, and generate West African folk tales. Two corpora of West African and Western European folk tales are compiled and used in three exp...

  • Article
  • Open Access
1 Citations
3,408 Views
31 Pages

26 April 2020

This article presents the use of data processing to apprehend mathematical questions such as the Riemann Hypothesis (RH) by numerical calculation. Calculations are performed alongside graphs of the argument of the complex numbers ζ ( x + i...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489