Skip to Content

Information, Volume 12, Issue 10

2021 October - 48 articles

Cover Story: In information retrieval (IR), the semantic gap represents the mismatch between users’ queries and how retrieval models answer these queries. In this paper, we explore how to use external knowledge resources to enhance bag-of-words representations and reduce the effect of the semantic gap between queries and documents. In this regard, we propose several simple but effective knowledge-based query expansion and reduction techniques, and evaluate them in relation to the medical domain. The experimental analyses on different test collections for precision medicine IR show the effectiveness of the developed techniques. In particular, a specific subset of query reformulations allows retrieval models to achieve top-performing results in all the considered test collections. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (48)

  • Article
  • Open Access
22 Citations
4,999 Views
14 Pages

Towards Edge Computing Using Early-Exit Convolutional Neural Networks

  • Roberto G. Pacheco,
  • Kaylani Bochie,
  • Mateus S. Gilbert,
  • Rodrigo S. Couto and
  • Miguel Elias M. Campista

19 October 2021

In computer vision applications, mobile devices can transfer the inference of Convolutional Neural Networks (CNNs) to the cloud due to their computational restrictions. Nevertheless, besides introducing more network load concerning the cloud, this ap...

  • Article
  • Open Access
25 Citations
4,674 Views
32 Pages

An Ontological Approach to Enhancing Information Sharing in Disaster Response

  • Linda Elmhadhbi,
  • Mohamed-Hedi Karray,
  • Bernard Archimède,
  • J. Neil Otte and
  • Barry Smith

19 October 2021

Managing complex disaster situations is a challenging task because of the large number of actors involved and the critical nature of the events themselves. In particular, the different terminologies and technical vocabularies that are being exchanged...

  • Communication
  • Open Access
6 Citations
7,720 Views
9 Pages

19 October 2021

Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an im...

  • Article
  • Open Access
2,295 Views
14 Pages

Robust and Precise Matching Algorithm Combining Absent Color Indexing and Correlation Filter

  • Ying Tian,
  • Shun’ichi Kaneko,
  • So Sasatani,
  • Masaya Itoh and
  • Ming Fang

18 October 2021

This paper presents a novel method that absorbs the strong discriminative ability from absent color indexing (ABC) to enhance sensitivity and combines it with a correlation filter (CF) for obtaining a higher precision; this method is named ABC-CF. Fi...

  • Article
  • Open Access
5 Citations
2,656 Views
22 Pages

18 October 2021

Instantaneous mega-traffic flow has long been one of the major challenges in the management of mega-cities. It is difficult for the public transportation system to cope directly with transient mega-capacity flows, and the uneven spatiotemporal distri...

  • Article
  • Open Access
9 Citations
3,617 Views
19 Pages

File System Support for Privacy-Preserving Analysis and Forensics in Low-Bandwidth Edge Environments

  • Aril Bernhard Ovesen,
  • Tor-Arne Schmidt Nordmo,
  • Håvard Dagenborg Johansen,
  • Michael Alexander Riegler,
  • Pål Halvorsen and
  • Dag Johansen

18 October 2021

In this paper, we present initial results from our distributed edge systems research in the domain of sustainable harvesting of common good resources in the Arctic Ocean. Specifically, we are developing a digital platform for real-time privacy-preser...

  • Article
  • Open Access
23 Citations
4,287 Views
22 Pages

Missing Data Imputation in Internet of Things Gateways

  • Cinthya M. França,
  • Rodrigo S. Couto and
  • Pedro B. Velloso

17 October 2021

In an Internet of Things (IoT) environment, sensors collect and send data to application servers through IoT gateways. However, these data may be missing values due to networking problems or sensor malfunction, which reduces applications’ reliability...

  • Article
  • Open Access
50 Citations
7,389 Views
14 Pages

17 October 2021

Digital museums that use modern technology are gradually replacing traditional museums to stimulate personal growth and promote cultural exchange and social enrichment. With the development and popularization of the mobile Internet, user experience h...

  • Review
  • Open Access
10 Citations
5,647 Views
40 Pages

16 October 2021

Digitalization increasingly enforces organizations to accommodate changes and gain resilience. Emerging technologies, changing organizational structures and dynamic work environments bring opportunities and pose new challenges to organizations. Such...

  • Article
  • Open Access
4 Citations
4,870 Views
14 Pages

16 October 2021

A role-based teaching approach was proposed in order to decrease the cognitive load placed by the case-based teaching method in the undergraduate novice programmer comprehension. The results are evaluated by using the SOLO (Structure of Observed Lear...

  • Article
  • Open Access
8 Citations
4,300 Views
30 Pages

Industrial Networks Driven by SDN Technology for Dynamic Fast Resilience

  • Nteziriza Nkerabahizi Josbert,
  • Wang Ping,
  • Min Wei and
  • Yong Li

15 October 2021

Software-Defined Networking (SDN) provides the prospect of logically centralized management in industrial networks and simplified programming among devices. It also facilitates the reconfiguration of connectivity when there is a network element failu...

  • Article
  • Open Access
3 Citations
4,408 Views
17 Pages

15 October 2021

This paper explores the ways in which technologies reshape everyday activities, adopting a mobility perspective of the digital environment, which is reframed in terms of the constitutive/substitutive element of corporeal mobility. We propose the cons...

  • Article
  • Open Access
6 Citations
4,936 Views
13 Pages

Relativistic Effects on Satellite–Ground Two–Way Precise Time Synchronization

  • Yanming Guo,
  • Yan Bai,
  • Shuaihe Gao,
  • Zhibing Pan,
  • Zibin Han,
  • Decai Zou,
  • Xiaochun Lu and
  • Shougang Zhang

15 October 2021

An ultrahigh precise clock (space optical clock) will be installed onboard a low-orbit spacecraft (a usual expression for a low-orbit satellite operating on an orbit at an altitude of less than 1000 km) in the future, which will be expected to obtain...

  • Article
  • Open Access
11 Citations
5,477 Views
18 Pages

14 October 2021

Accurately predicting the volatility of financial asset prices and exploring its laws of movement have profound theoretical and practical guiding significance for financial market risk early warning, asset pricing, and investment portfolio design. Th...

  • Article
  • Open Access
65 Citations
25,136 Views
20 Pages

Cybersecurity Awareness Framework for Academia

  • Mohammed Khader,
  • Marcel Karam and
  • Hanna Fares

12 October 2021

Cybersecurity is a multifaceted global phenomenon representing complex socio-technical challenges for governments and private sectors. With technology constantly evolving, the types and numbers of cyberattacks affect different users in different ways...

  • Article
  • Open Access
12 Citations
14,006 Views
28 Pages

Could a Conversational AI Identify Offensive Language?

  • Daniela America da Silva,
  • Henrique Duarte Borges Louro,
  • Gildarcio Sousa Goncalves,
  • Johnny Cardoso Marques,
  • Luiz Alberto Vieira Dias,
  • Adilson Marques da Cunha and
  • Paulo Marcelo Tasinaffo

12 October 2021

In recent years, we have seen a wide use of Artificial Intelligence (AI) applications in the Internet and everywhere. Natural Language Processing and Machine Learning are important sub-fields of AI that have made Chatbots and Conversational AI applic...

  • Article
  • Open Access
2 Citations
3,083 Views
15 Pages

11 October 2021

The problem of countering the spread of destructive content in social networks is currently relevant for most countries of the world. Basically, automatic monitoring systems are used to detect the sources of the spread of malicious information, and a...

  • Article
  • Open Access
1 Citations
2,414 Views
20 Pages

11 October 2021

This work combines compressive sensing and short word-length techniques to achieve localization and target tracking in wireless sensor networks with energy-efficient communication between the network anchors and the fusion center. Gradient descent lo...

  • Article
  • Open Access
34 Citations
18,088 Views
15 Pages

Text Mining and Sentiment Analysis of Newspaper Headlines

  • Arafat Hossain,
  • Md. Karimuzzaman,
  • Md. Moyazzem Hossain and
  • Azizur Rahman

9 October 2021

Text analytics are well-known in the modern era for extracting information and patterns from text. However, no study has attempted to illustrate the pattern and priorities of newspaper headlines in Bangladesh using a combination of text analytics tec...

  • Article
  • Open Access
9 Citations
3,057 Views
13 Pages

GPR Investigation at the Archaeological Site of Le Cesine, Lecce, Italy

  • Emanuele Colica,
  • Antonella Antonazzo,
  • Rita Auriemma,
  • Luigi Coluccia,
  • Ilaria Catapano,
  • Giovanni Ludeno,
  • Sebastiano D’Amico and
  • Raffaele Persico

8 October 2021

In this contribution, we present some results achieved in the archaeological site of Le Cesine, close to Lecce, in southern Italy. The investigations have been performed in a site close to the Adriatic Sea, only slightly explored up to now, and where...

  • Article
  • Open Access
18 Citations
6,924 Views
16 Pages

8 October 2021

Human online activities leave digital traces that provide a perfect opportunity to understand their behavior better. Social media is an excellent place to spark conversations or state opinions. Thus, it generates large-scale textual data. In this pap...

  • Article
  • Open Access
35 Citations
12,992 Views
14 Pages

Big-Data Management: A Driver for Digital Transformation?

  • Panagiotis Kostakis and
  • Antonios Kargas

7 October 2021

The rapid evolution of technology has led to a global increase in data. Due to the large volume of data, a new characterization occurred in order to better describe the new situation, namel. big data. Living in the Era of Information, businesses are...

  • Article
  • Open Access
3 Citations
2,829 Views
9 Pages

6 October 2021

Empirical validation and verification procedures require the sophisticated development of research methodology. Therefore, researchers and practitioners in human–machine interaction and the automotive domain have developed standardized test protocols...

  • Article
  • Open Access
22 Citations
4,966 Views
13 Pages

3 October 2021

The widespread use of social networks has brought to the foreground a very important issue, the veracity of the information circulating within them. Many natural language processing methods have been proposed in the past to assess a post’s content wi...

  • Article
  • Open Access
5 Citations
2,582 Views
12 Pages

30 September 2021

Biological tissue damage monitoring is an indispensable part of high-intensity focused ultrasound (HIFU) treatment. As a nonlinear method, multi-scale permutation entropy (MPE) is widely used in the monitoring of biological tissue. However, the tradi...

  • Article
  • Open Access
28 Citations
8,845 Views
34 Pages

UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats

  • Mike Nkongolo,
  • Jacobus Philippus van Deventer and
  • Sydney Mambwe Kasongo

30 September 2021

This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traff...

  • Article
  • Open Access
2 Citations
3,170 Views
16 Pages

PFMNet: Few-Shot Segmentation with Query Feature Enhancement and Multi-Scale Feature Matching

  • Jingyao Li,
  • Lianglun Cheng,
  • Zewen Zheng,
  • Jiahong Chen,
  • Genping Zhao and
  • Zeng Lu

30 September 2021

The datasets in the latest semantic segmentation model often need to be manually labeled for each pixel, which is time-consuming and requires much effort. General models are unable to make better predictions, for new categories of information that ha...

  • Article
  • Open Access
10 Citations
4,805 Views
16 Pages

30 September 2021

Websites in the post COVID-19 era play a very important role as the Internet gains more visitors. A website may significantly contribute to the electronic presence of a cultural organization, such as a museum, but its success should be confirmed by a...

  • Article
  • Open Access
14 Citations
6,297 Views
23 Pages

VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems

  • Bradley Northern,
  • Trey Burks,
  • Marlana Hatcher,
  • Michael Rogers and
  • Denis Ulybyshev

30 September 2021

Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, prevent failure developments, and minimize losse...

  • Article
  • Open Access
1 Citations
3,371 Views
21 Pages

Topic Modeling for Amharic User Generated Texts

  • Girma Neshir,
  • Andreas Rauber and
  • Solomon Atnafu

29 September 2021

Topic Modeling is a statistical process, which derives the latent themes from extensive collections of text. Three approaches to topic modeling exist, namely, unsupervised, semi-supervised and supervised. In this work, we develop a supervised topic m...

  • Article
  • Open Access
5 Citations
3,605 Views
27 Pages

Simple but Effective Knowledge-Based Query Reformulations for Precision Medicine Retrieval

  • Stefano Marchesin,
  • Giorgio Maria Di Nunzio and
  • Maristella Agosti

29 September 2021

In Information Retrieval (IR), the semantic gap represents the mismatch between users’ queries and how retrieval models answer to these queries. In this paper, we explore how to use external knowledge resources to enhance bag-of-words representations...

  • Communication
  • Open Access
28 Citations
8,098 Views
11 Pages

Fall Detection with CNN-Casual LSTM Network

  • Jiang Wu,
  • Jiale Wang,
  • Ao Zhan and
  • Chengyu Wu

29 September 2021

Falls are one of the main causes of elderly injuries. If the faller can be found in time, further injury can be effectively avoided. In order to protect personal privacy and improve the accuracy of fall detection, this paper proposes a fall detection...

  • Article
  • Open Access
15 Citations
8,950 Views
16 Pages

28 September 2021

Information explosion and pressures are leading organizations to invest heavily in information security to ensure that information technology decisions align with business goals and manage risks. Limited studies have been done using small- and-medium...

  • Article
  • Open Access
41 Citations
4,431 Views
15 Pages

Pear Defect Detection Method Based on ResNet and DCGAN

  • Yan Zhang,
  • Shiyun Wa,
  • Pengshuo Sun and
  • Yaojun Wang

28 September 2021

To address the current situation, in which pear defect detection is still based on a workforce with low efficiency, we propose the use of the CNN model to detect pear defects. Since it is challenging to obtain defect images in the implementation proc...

  • Article
  • Open Access
24 Citations
6,438 Views
19 Pages

28 September 2021

The COVID-19 pandemic caused a transition to online services in almost all aspects of life. Today, online access is an important aspect of child well-being more than ever. The aim of the study was to investigate online activities and gender differenc...

  • Article
  • Open Access
3 Citations
2,831 Views
15 Pages

28 September 2021

Limited-stop service is useful to increase operation efficiency where the demand is unbalanced at different stops and unidirectional. A mixed scheduling model for limited-stop buses and normal buses is proposed considering the fleet size constraint....

  • Article
  • Open Access
3 Citations
7,040 Views
27 Pages

Tool for Measuring Productivity in Software Development Teams

  • Jhemeson Silva Mota,
  • Heloise Acco Tives and
  • Edna Dias Canedo

27 September 2021

Despite efforts to define productivity, there is no consensus in the software industry regarding what the term productivity means and, instead of having only one metric or factor that describes productivity, it is defined by a set of aspects. Our obj...

  • Article
  • Open Access
10 Citations
3,487 Views
16 Pages

Detecting and Mitigating Adversarial Examples in Regression Tasks: A Photovoltaic Power Generation Forecasting Case Study

  • Everton Jose Santana,
  • Ricardo Petri Silva,
  • Bruno Bogaz Zarpelão and
  • Sylvio Barbon Junior

26 September 2021

With data collected by Internet of Things sensors, deep learning (DL) models can forecast the generation capacity of photovoltaic (PV) power plants. This functionality is especially relevant for PV power operators and users as PV plants exhibit irreg...

  • Article
  • Open Access
38 Citations
19,466 Views
19 Pages

26 September 2021

In computer science, an ontology is a way of showing the properties of a subject area and how they are related by defining a set of concepts and categories that represent the subject. There have been many attempts to create a widely accepted ontology...

  • Article
  • Open Access
5 Citations
3,618 Views
26 Pages

23 September 2021

Understanding how two datasets differ can help us determine whether one dataset under-represents certain sub-populations, and provides insights into how well models will generalize across datasets. Representative points selected by a maximum mean dis...

  • Article
  • Open Access
2 Citations
4,013 Views
20 Pages

23 September 2021

Existing implementations of game design patterns have largely been confined to theoretical or research settings. Weaknesses in these implementations have prevented game design patterns from being properly evaluated as an educational and practical dev...

  • Article
  • Open Access
10 Citations
5,554 Views
16 Pages

23 September 2021

We conducted a singular and sectoral vulnerability assessment of ESG factors of Dow-30-listed companies by applying the entropy weight method and analyzing each ESG factor’s information contribution to the overall ESG disclosure score. By reducing in...

  • Article
  • Open Access
3 Citations
4,199 Views
17 Pages

Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks

  • Jonathan Ebert,
  • Ohad Newton,
  • Jeffery O’Rear,
  • Scott Riley,
  • Jaehong Park and
  • Maanak Gupta

23 September 2021

The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) networks, which all vehicles will operate under, drives...

  • Article
  • Open Access
12 Citations
7,239 Views
14 Pages

A Workflow for Synthetic Data Generation and Predictive Maintenance for Vibration Data

  • Şahan Yoruç Selçuk,
  • Perin Ünal,
  • Özlem Albayrak and
  • Moez Jomâa

22 September 2021

Digital twins, virtual representations of real-life physical objects or processes, are becoming widely used in many different industrial sectors. One of the main uses of digital twins is predictive maintenance, and these technologies are being adapte...

  • Article
  • Open Access
19 Citations
3,913 Views
17 Pages

Analyzing Natural Digital Information in the Context of Market Research

  • Evgenii Konnikov,
  • Olga Konnikova,
  • Dmitriy Rodionov and
  • Oksana Yuldasheva

22 September 2021

The dynamics of irreversible multidimensional digitalization of production and consumption processes can be described today with a linear-positive or even exponential function. A significant part of the information background of a product, enterprise...

  • Article
  • Open Access
9 Citations
10,511 Views
18 Pages

22 September 2021

Stock movement prediction is important in the financial world because investors want to observe trends in stock prices before making investment decisions. However, given the non-linear non-stationary financial time series characteristics of stock pri...

  • Article
  • Open Access
5 Citations
3,526 Views
22 Pages

22 September 2021

Hashtags are considered important in various real-world applications, including tweet mining, query expansion, and sentiment analysis. Hence, recommending hashtags from tagged tweets has been considered significant by the research community. However,...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489