Skip to Content

Information, Volume 12, Issue 7

2021 July - 29 articles

Cover Story: Recurrent Neural Networks are powerful machine learning frameworks that allow data to be saved and referenced in a temporal sequence. This opens many new research possibilities in fields such as biometric authentication and anomaly detection. A few examples of biometric authentication are mouse movement authentication, keystroke authentication, handwritten password authentication and even palm print authentication. Anomaly detection can range from detecting spam emails to malicious network, aviation or maritime vessel traffic. With continued research into these areas, computer scientists are making sure that user data and critical systems are secured with top-level biometric authentication and that people stay safe through novel anomaly detection techniques. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
9 Citations
3,820 Views
18 Pages

Deep Hash with Improved Dual Attention for Image Retrieval

  • Wenjing Yang,
  • Liejun Wang,
  • Shuli Cheng,
  • Yongming Li and
  • Anyu Du

20 July 2021

Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neura...

  • Article
  • Open Access
23 Citations
3,425 Views
14 Pages

17 July 2021

Based on the positive externalities of prefabricated buildings, this paper constructs an evolutionary game model between the government and material component vendors and analyzes the changes in the behavior of the government and component vendors in...

  • Article
  • Open Access
8 Citations
4,572 Views
11 Pages

16 July 2021

Continuous enhancements of the intelligence of electronic products can lead to the homogenization of products and innovation of offline experiential marketing modes. The diversified development of brand sales channels is inevitable, to fulfill the di...

  • Concept Paper
  • Open Access
9 Citations
4,804 Views
14 Pages

16 July 2021

Information sharing is a critical component of a distributed and multi-actor digital ecosystem (DE). DE actors, individuals and organisations, require seamless, effective, efficient, and secure architecture for exchanging information. Traditional poi...

  • Article
  • Open Access
19 Citations
3,990 Views
17 Pages

13 July 2021

This paper addresses the search for a run-based dynamic optimal travel strategy, to be supplied through mobile devices (apps) to travelers on a stochastic multiservice transit network, which includes a system forecasting of bus travel times and bus a...

  • Article
  • Open Access
10 Citations
3,827 Views
11 Pages

10 July 2021

Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-...

  • Article
  • Open Access
31 Citations
10,419 Views
13 Pages

10 July 2021

This study aims to analyze the moderating effect of gender on the relationship between technology readiness and willingness to continue using self-service kiosks in fast-food restaurants among middle-aged and older consumers. We conducted a survey fr...

  • Article
  • Open Access
3 Citations
3,285 Views
14 Pages

Research on Generation Method of Grasp Strategy Based on DeepLab V3+ for Three-Finger Gripper

  • Sanlong Jiang,
  • Shaobo Li,
  • Qiang Bai,
  • Jing Yang,
  • Yanming Miao and
  • Leiyu Chen

A reasonable grasping strategy is a prerequisite for the successful grasping of a target, and it is also a basic condition for the wide application of robots. Presently, mainstream grippers on the market are divided into two-finger grippers and three...

  • Article
  • Open Access
3 Citations
3,611 Views
24 Pages

Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), faci...

  • Article
  • Open Access
69 Citations
24,203 Views
30 Pages

Corporations play a major role in artificial intelligence (AI) research, development, and deployment, with profound consequences for society. This paper surveys opportunities to improve how corporations govern their AI activities so as to better adva...

  • Article
  • Open Access
3 Citations
4,675 Views
20 Pages

A Simple Approach to Relating the Optimal Learning and the Meaningful Learning Experience in Students Age 14–16

  • Ma. Guadalupe Díaz de León-López,
  • María de Lourdes Velázquez-Sánchez,
  • Silvia Sánchez-Madrid and
  • José Manuel Olais-Govea

Using a questionnaire applied in real time to students in stages 14–16 during a distance class, the authors appraise whether they experience feelings that lead to a central experience of flow, according to the flow theory of positive psychology. Stud...

  • Article
  • Open Access
20 Citations
5,259 Views
15 Pages

Change Point Detection in Terrorism-Related Online Content Using Deep Learning Derived Indicators

  • Ourania Theodosiadou,
  • Kyriaki Pantelidou,
  • Nikolaos Bastas,
  • Despoina Chatzakou,
  • Theodora Tsikrika,
  • Stefanos Vrochidis and
  • Ioannis Kompatsiaris

Given the increasing occurrence of deviant activities in online platforms, it is of paramount importance to develop methods and tools that allow in-depth analysis and understanding to then develop effective countermeasures. This work proposes a frame...

  • Review
  • Open Access
74 Citations
11,137 Views
20 Pages

Recurrent Neural Networks are powerful machine learning frameworks that allow for data to be saved and referenced in a temporal sequence. This opens many new possibilities in fields such as handwriting analysis and speech recognition. This paper seek...

  • Article
  • Open Access
7 Citations
4,225 Views
11 Pages

Aiming at the difficulty in obtaining environmental parameters in dairy cattle breeding, this paper proposes and implements a dairy cattle breeding environment monitoring system based on Bluetooth and B/S architecture. In order to reduce the cost of...

  • Review
  • Open Access
51 Citations
11,298 Views
31 Pages

30 June 2021

Simple questions are the most common type of questions used for evaluating a knowledge graph question answering (KGQA). A simple question is a question whose answer can be captured by a factoid statement with one relation or predicate. Knowledge grap...

  • Article
  • Open Access
22 Citations
6,873 Views
17 Pages

30 June 2021

The present article includes descriptive research about how water resources in Romanian medical spas could be better promoted to increase their visibility. Romania is one of the European countries with impressive potential in terms of balneology, hav...

  • Article
  • Open Access
5 Citations
4,569 Views
18 Pages

Combine-Net: An Improved Filter Pruning Algorithm

  • Jinghan Wang,
  • Guangyue Li and
  • Wenzhao Zhang

29 June 2021

The powerful performance of deep learning is evident to all. With the deepening of research, neural networks have become more complex and not easily generalized to resource-constrained devices. The emergence of a series of model compression algorithm...

  • Article
  • Open Access
7 Citations
3,328 Views
17 Pages

Visual Active Learning for Labeling: A Case for Soundscape Ecology Data

  • Liz Huancapaza Hilasaca,
  • Milton Cezar Ribeiro and
  • Rosane Minghim

29 June 2021

Labeling of samples is a recurrent and time-consuming task in data analysis and machine learning and yet generally overlooked in terms of visual analytics approaches to improve the process. As the number of tailored applications of learning models in...

  • Article
  • Open Access
44 Citations
6,769 Views
20 Pages

29 June 2021

Land cover maps are a critical tool to support informed policy development, planning, and resource management decisions. With significant upsides, the automatic production of Land Use/Land Cover maps has been a topic of interest for the remote sensin...

  • Article
  • Open Access
16 Citations
10,140 Views
12 Pages

29 June 2021

The ongoing COVID-19 pandemic has enhanced the impact of digitalisation as a driver of transformation and advancements across almost every aspect of human life. With the majority actively embracing smart technologies and their benefits, the journey o...

  • Article
  • Open Access
3 Citations
2,753 Views
18 Pages

29 June 2021

This paper studies binary hypothesis testing with a single sensor that communicates with two decision centers over a memoryless broadcast channel. The main focus lies on the tradeoff between the two type-II error exponents achievable at the two decis...

  • Article
  • Open Access
3 Citations
3,191 Views
11 Pages

29 June 2021

When discussing future concerns within socio-technical systems in work contexts, we often find descriptions of missed technology development and integration. The experience of technology that fails whilst being integrated is often rooted in dysfuncti...

  • Article
  • Open Access
39 Citations
6,022 Views
15 Pages

Identification of Fake Stereo Audio Using SVM and CNN

  • Tianyun Liu,
  • Diqun Yan,
  • Rangding Wang,
  • Nan Yan and
  • Gang Chen

28 June 2021

The number of channels is one of the important criteria in regard to digital audio quality. Generally, stereo audio with two channels can provide better perceptual quality than mono audio. To seek illegal commercial benefit, one might convert a mono...

  • Article
  • Open Access
3,358 Views
12 Pages

Creative Intervention for Acrophobia Sufferers through AIVE Concept

  • Al Hamidy Hazidar,
  • Riza Sulaiman,
  • Shalisah Sharip,
  • Meutia Wardhanie Ganie,
  • Azlin Baharudin,
  • Hamzaini Abdul Hamid and
  • Norshita Mat Nayan

26 June 2021

This research applies exposure to the visual appearance technology of virtual reality (VR). The motivation for this research is to generate a creative intervention by using regular smartphone devices and implementing them in VR using Google Cardboard...

  • Article
  • Open Access
3 Citations
2,917 Views
11 Pages

An Online Iterative Linear Quadratic Approach for a Satisfactory Working Point Attainment at FERMI

  • Niky Bruchon,
  • Gianfranco Fenu,
  • Giulio Gaio,
  • Simon Hirlander,
  • Marco Lonza,
  • Felice Andrea Pellegrino and
  • Erica Salvato

26 June 2021

The attainment of a satisfactory operating point is one of the main problems in the tuning of particle accelerators. These are extremely complex facilities, characterized by the absence of a model that accurately describes their dynamics, and by an o...

  • Article
  • Open Access
11 Citations
8,248 Views
18 Pages

24 June 2021

While digitalization of cultural organizations is in full swing and growth, it is common knowledge that websites can be used as a beacon to expand the awareness and consideration of their services on the Web. Nevertheless, recent research results ind...

  • Article
  • Open Access
2,940 Views
17 Pages

24 June 2021

Prior studies have extensively discussed firms’ propensity of licensing under different levels of competition. This study clarifies the differences between potential technology competition (PTC) and actual licensing competition (ALC). We investigate...

  • Article
  • Open Access
17 Citations
4,682 Views
41 Pages

22 June 2021

How to exploit the incredible variety of JSON data sets currently available on the Internet, for example, on Open Data portals? The traditional approach would require getting them from the portals, then storing them into some JSON document store and...

  • Review
  • Open Access
42 Citations
7,248 Views
10 Pages

Survey of Smart Contract Framework and Its Application

  • Edi Surya Negara,
  • Achmad Nizar Hidayanto,
  • Ria Andryani and
  • Rezki Syaputra

22 June 2021

This article is a literature review on smart contract applications in various domains. The aim is to investigate technological developments and implementation of smart contracts in various domains. For this purpose, the theoretical basis of various p...

XFacebookLinkedIn
Information - ISSN 2078-2489