You are currently viewing a new version of our website. To view the old version click .

Information, Volume 12, Issue 7

July 2021 - 29 articles

Cover Story: Recurrent Neural Networks are powerful machine learning frameworks that allow data to be saved and referenced in a temporal sequence. This opens many new research possibilities in fields such as biometric authentication and anomaly detection. A few examples of biometric authentication are mouse movement authentication, keystroke authentication, handwritten password authentication and even palm print authentication. Anomaly detection can range from detecting spam emails to malicious network, aviation or maritime vessel traffic. With continued research into these areas, computer scientists are making sure that user data and critical systems are secured with top-level biometric authentication and that people stay safe through novel anomaly detection techniques. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
8 Citations
3,670 Views
18 Pages

Deep Hash with Improved Dual Attention for Image Retrieval

  • Wenjing Yang,
  • Liejun Wang,
  • Shuli Cheng,
  • Yongming Li and
  • Anyu Du

20 July 2021

Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neura...

  • Article
  • Open Access
23 Citations
3,308 Views
14 Pages

17 July 2021

Based on the positive externalities of prefabricated buildings, this paper constructs an evolutionary game model between the government and material component vendors and analyzes the changes in the behavior of the government and component vendors in...

  • Article
  • Open Access
8 Citations
4,276 Views
11 Pages

16 July 2021

Continuous enhancements of the intelligence of electronic products can lead to the homogenization of products and innovation of offline experiential marketing modes. The diversified development of brand sales channels is inevitable, to fulfill the di...

  • Concept Paper
  • Open Access
9 Citations
4,584 Views
14 Pages

16 July 2021

Information sharing is a critical component of a distributed and multi-actor digital ecosystem (DE). DE actors, individuals and organisations, require seamless, effective, efficient, and secure architecture for exchanging information. Traditional poi...

  • Article
  • Open Access
18 Citations
3,864 Views
17 Pages

13 July 2021

This paper addresses the search for a run-based dynamic optimal travel strategy, to be supplied through mobile devices (apps) to travelers on a stochastic multiservice transit network, which includes a system forecasting of bus travel times and bus a...

  • Article
  • Open Access
10 Citations
3,670 Views
11 Pages

10 July 2021

Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-...

  • Article
  • Open Access
28 Citations
9,977 Views
13 Pages

10 July 2021

This study aims to analyze the moderating effect of gender on the relationship between technology readiness and willingness to continue using self-service kiosks in fast-food restaurants among middle-aged and older consumers. We conducted a survey fr...

  • Article
  • Open Access
3 Citations
3,155 Views
14 Pages

Research on Generation Method of Grasp Strategy Based on DeepLab V3+ for Three-Finger Gripper

  • Sanlong Jiang,
  • Shaobo Li,
  • Qiang Bai,
  • Jing Yang,
  • Yanming Miao and
  • Leiyu Chen

A reasonable grasping strategy is a prerequisite for the successful grasping of a target, and it is also a basic condition for the wide application of robots. Presently, mainstream grippers on the market are divided into two-finger grippers and three...

  • Article
  • Open Access
3 Citations
3,480 Views
24 Pages

Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), faci...

  • Article
  • Open Access
63 Citations
23,313 Views
30 Pages

Corporations play a major role in artificial intelligence (AI) research, development, and deployment, with profound consequences for society. This paper surveys opportunities to improve how corporations govern their AI activities so as to better adva...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489