You are currently viewing a new version of our website. To view the old version click .

Information, Volume 12, Issue 7

July 2021 - 29 articles

Cover Story: Recurrent Neural Networks are powerful machine learning frameworks that allow data to be saved and referenced in a temporal sequence. This opens many new research possibilities in fields such as biometric authentication and anomaly detection. A few examples of biometric authentication are mouse movement authentication, keystroke authentication, handwritten password authentication and even palm print authentication. Anomaly detection can range from detecting spam emails to malicious network, aviation or maritime vessel traffic. With continued research into these areas, computer scientists are making sure that user data and critical systems are secured with top-level biometric authentication and that people stay safe through novel anomaly detection techniques. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
3 Citations
2,629 Views
18 Pages

29 June 2021

This paper studies binary hypothesis testing with a single sensor that communicates with two decision centers over a memoryless broadcast channel. The main focus lies on the tradeoff between the two type-II error exponents achievable at the two decis...

  • Article
  • Open Access
3 Citations
2,921 Views
11 Pages

29 June 2021

When discussing future concerns within socio-technical systems in work contexts, we often find descriptions of missed technology development and integration. The experience of technology that fails whilst being integrated is often rooted in dysfuncti...

  • Article
  • Open Access
37 Citations
5,660 Views
15 Pages

Identification of Fake Stereo Audio Using SVM and CNN

  • Tianyun Liu,
  • Diqun Yan,
  • Rangding Wang,
  • Nan Yan and
  • Gang Chen

28 June 2021

The number of channels is one of the important criteria in regard to digital audio quality. Generally, stereo audio with two channels can provide better perceptual quality than mono audio. To seek illegal commercial benefit, one might convert a mono...

  • Article
  • Open Access
3,118 Views
12 Pages

Creative Intervention for Acrophobia Sufferers through AIVE Concept

  • Al Hamidy Hazidar,
  • Riza Sulaiman,
  • Shalisah Sharip,
  • Meutia Wardhanie Ganie,
  • Azlin Baharudin,
  • Hamzaini Abdul Hamid and
  • Norshita Mat Nayan

26 June 2021

This research applies exposure to the visual appearance technology of virtual reality (VR). The motivation for this research is to generate a creative intervention by using regular smartphone devices and implementing them in VR using Google Cardboard...

  • Article
  • Open Access
3 Citations
2,797 Views
11 Pages

An Online Iterative Linear Quadratic Approach for a Satisfactory Working Point Attainment at FERMI

  • Niky Bruchon,
  • Gianfranco Fenu,
  • Giulio Gaio,
  • Simon Hirlander,
  • Marco Lonza,
  • Felice Andrea Pellegrino and
  • Erica Salvato

26 June 2021

The attainment of a satisfactory operating point is one of the main problems in the tuning of particle accelerators. These are extremely complex facilities, characterized by the absence of a model that accurately describes their dynamics, and by an o...

  • Article
  • Open Access
8 Citations
7,838 Views
18 Pages

24 June 2021

While digitalization of cultural organizations is in full swing and growth, it is common knowledge that websites can be used as a beacon to expand the awareness and consideration of their services on the Web. Nevertheless, recent research results ind...

  • Article
  • Open Access
2,734 Views
17 Pages

24 June 2021

Prior studies have extensively discussed firms’ propensity of licensing under different levels of competition. This study clarifies the differences between potential technology competition (PTC) and actual licensing competition (ALC). We investigate...

  • Review
  • Open Access
41 Citations
7,012 Views
10 Pages

Survey of Smart Contract Framework and Its Application

  • Edi Surya Negara,
  • Achmad Nizar Hidayanto,
  • Ria Andryani and
  • Rezki Syaputra

22 June 2021

This article is a literature review on smart contract applications in various domains. The aim is to investigate technological developments and implementation of smart contracts in various domains. For this purpose, the theoretical basis of various p...

  • Article
  • Open Access
17 Citations
4,148 Views
41 Pages

22 June 2021

How to exploit the incredible variety of JSON data sets currently available on the Internet, for example, on Open Data portals? The traditional approach would require getting them from the portals, then storing them into some JSON document store and...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489