Skip to Content

Information, Volume 12, Issue 9

2021 September - 46 articles

Cover Story: A common problem in underwater side-scan sonar images is the acoustic shadow generated by the beam. In addition to this, there are a number of causes impairing image quality. In this work, an innovative algorithm based on histogram processing is presented. The algorithm automatically calculates the optimal threshold for converting the original gray scale images into binary images. Experimental results indicate that the proposed algorithm produces superior results compared to popular thresholding methods, as well as common edge detection filters, even after corrosion expansion. The proposed algorithm is simple, robust and adaptive, and facilitates man-made object recognition on the seafloor; hence, it can be used in maritime archaeology, shipwreck detection, underwater development and military applications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (46)

  • Article
  • Open Access
13 Citations
6,036 Views
13 Pages

21 September 2021

Accountability is a value often mentioned in the debate on intelligent systems and their increased pervasiveness in our society. When focusing specifically on autonomous systems, a critical gap emerges: although there is much work on governance and a...

  • Article
  • Open Access
4 Citations
3,023 Views
12 Pages

19 September 2021

The traditional 10 kV distribution network grounding system has some disadvantages, such as small grounding current and poor arc extinguishing effect, thus, hindering the detection of high-resistance grounding fault. Therefore, this paper studied the...

  • Article
  • Open Access
4 Citations
3,756 Views
13 Pages

18 September 2021

This paper studies outward foreign direct investment (OFDI) enterprises in the Yangtze River Economic Belt. Using geographical information system (GIS) spatial analysis and SPSS correlation analysis methods, it analyzes the change in the spatial dist...

  • Article
  • Open Access
5 Citations
4,090 Views
15 Pages

Dual-Channel Heterogeneous Graph Network for Author Name Disambiguation

  • Xin Zheng,
  • Pengyu Zhang,
  • Yanjie Cui,
  • Rong Du and
  • Yong Zhang

18 September 2021

Name disambiguation has long been a significant issue in many fields, such as literature management and social analysis. In recent years, methods based on graph networks have performed well in name disambiguation, but these works have rarely used het...

  • Article
  • Open Access
27 Citations
7,255 Views
10 Pages

Working in the 21st Century. The Coronavirus Crisis: A Driver of Digitalisation, Teleworking, and Innovation, with Unintended Social Consequences

  • Antonio López Peláez,
  • Amaya Erro-Garcés,
  • Francisco Javier Pinilla García and
  • Dimitrios Kiriakou

17 September 2021

(1) Background: This article seeks to shed a light on the innovation, digitalisation, and teleworking processes that have occurred because of the coronavirus crisis. (2) Methods: To this end, we analyse data from Eurostat (2020), the European Compani...

  • Article
  • Open Access
7 Citations
4,043 Views
15 Pages

A Guided Scratch Visual Execution Environment to Introduce Programming Concepts to CS1 Students

  • Raquel Hijón-Neira,
  • Cornelia Connolly,
  • Daniel Palacios-Alonso and
  • Oriol Borrás-Gené

17 September 2021

First-year computer science (CS1) university students traditionally have difficulties understanding how to program. This paper describes research introducing CS1 students to programming concepts using a Scratch programming language guided visual exec...

  • Article
  • Open Access
13 Citations
7,362 Views
15 Pages

Multinomial Logistic Regression to Estimate the Financial Education and Financial Knowledge of University Students in Chile

  • Hanns de la Fuente-Mella,
  • Benito Umaña-Hermosilla,
  • Marisela Fonseca-Fuentes and
  • Claudio Elórtegui-Gómez

17 September 2021

All individuals face decisions during their lifetime that directly influence the economic well-being of their families. Therefore, financial education can be a fundamental tool to maximize our economic resources and use them wisely. A virtual survey...

  • Article
  • Open Access
12 Citations
6,462 Views
12 Pages

17 September 2021

Globally, 95% of enterprises are small and medium sized enterprises (SMEs). Social media has recently become a powerful marketing tool due to characteristics such as the ability to share digital information and interact with consumers instantly. In S...

  • Article
  • Open Access
15 Citations
4,227 Views
21 Pages

CNMF: A Community-Based Fake News Mitigation Framework

  • Shaimaa Galal,
  • Noha Nagy and
  • Mohamed. E. El-Sharkawi

16 September 2021

Fake news propagation in online social networks (OSN) is one of the critical societal threats nowadays directing attention to fake news mitigation and intervention techniques. One of the typical mitigation techniques focus on initiating news mitigati...

  • Article
  • Open Access
15 Citations
11,208 Views
17 Pages

14 September 2021

On YouTube, skippable in-stream advertisements (ads) are critical income for both YouTube and content creators. However, ads inevitably irritate viewers, and as a result, they tend to avoid ads. Thus, this study attempts to identify potential mitigat...

  • Article
  • Open Access
59 Citations
10,248 Views
20 Pages

14 September 2021

With the extensive availability of social media platforms, Twitter has become a significant tool for the acquisition of peoples’ views, opinions, attitudes, and emotions towards certain entities. Within this frame of reference, sentiment analysis of...

  • Article
  • Open Access
121 Citations
15,633 Views
14 Pages

A Review of Tabular Data Synthesis Using GANs on an IDS Dataset

  • Stavroula Bourou,
  • Andreas El Saer,
  • Terpsichori-Helen Velivassaki,
  • Artemis Voulkidis and
  • Theodore Zahariadis

14 September 2021

Recent technological innovations along with the vast amount of available data worldwide have led to the rise of cyberattacks against network systems. Intrusion Detection Systems (IDS) play a crucial role as a defense mechanism in networks against adv...

  • Article
  • Open Access
5 Citations
3,625 Views
11 Pages

A Novel Joint TDOA/FDOA Passive Localization Scheme Using Interval Intersection Algorithm

  • Lingyu Ai,
  • Min Pang,
  • Changxu Shan,
  • Chao Sun,
  • Youngok Kim and
  • Biao Zhou

13 September 2021

Due to the large measurement error in the practical non-cooperative scene, the passive localization algorithms based on traditional numerical calculation using time difference of arrival (TDOA) and frequency difference of arrival (FDOA) often have no...

  • Article
  • Open Access
9 Citations
3,041 Views
29 Pages

13 September 2021

This paper aims to propose a novel multi-attribute group decision-making (MAGDM) method based on interval-valued q-rung orthopair fuzzy sets (IVq-ROFSs). The IVq-ROFSs have been proved to be effective in handling MAGDM problems, and several novel dec...

  • Article
  • Open Access
2 Citations
4,032 Views
21 Pages

13 September 2021

The modeling of the graphical representation of business processes (BP) or workflows in enterprise information systems (IS) is often to represent various activities, entities, relations, functions, and communicate between them in an enterprise to ach...

  • Article
  • Open Access
2 Citations
3,864 Views
19 Pages

12 September 2021

The data center has become the infrastructure of most Internet services, and its network carries different types of business flow, such as query, data backup, control information, etc. At the same time, the throughput-sensitive large flows occupy a l...

  • Article
  • Open Access
8 Citations
3,967 Views
20 Pages

11 September 2021

Breathing Rate (BR), an important deterioration indicator, has been widely neglected in hospitals due to the requirement of invasive procedures and the need for skilled nurses to be measured. On the other hand, biomedical signals such as Seismocardio...

  • Article
  • Open Access
7 Citations
6,771 Views
21 Pages

Game Design as an Autonomous Research Subject

  • Pedro Pinto Neves and
  • Nelson Zagalo

10 September 2021

This paper examines the methods and systems of game design from the standpoint of existing method proposals failing to establish a common basis for systematizing design knowledge, which this paper aims to help resolve. Game design has often been subs...

  • Article
  • Open Access
3,531 Views
21 Pages

The Geranium Platform: A KG-Based System for Academic Publications

  • Giovanni Garifo,
  • Giuseppe Futia,
  • Antonio Vetrò and
  • Juan Carlos De Martin

8 September 2021

Knowledge Graphs (KGs) have emerged as a core technology for incorporating human knowledge because of their capability to capture the relational dimension of information and of its semantic properties. The nature of KGs meets one of the vocational pu...

  • Article
  • Open Access
10 Citations
3,600 Views
17 Pages

CANet: A Combined Attention Network for Remote Sensing Image Change Detection

  • Di Lu,
  • Liejun Wang,
  • Shuli Cheng,
  • Yongming Li and
  • Anyu Du

7 September 2021

Change detection (CD) is one of the essential tasks in remote sensing image processing and analysis. Remote sensing CD is a process of determining and evaluating changes in various surface objects over time. The impressive achievements of deep learni...

  • Article
  • Open Access
17 Citations
8,709 Views
24 Pages

7 September 2021

Research shows that a well-designed user interface is more likely to be persuasive than a poorly designed one. However, there is a limited understanding of the relationship between user-experience (UX) design attributes and users’ receptiveness to th...

  • Article
  • Open Access
6 Citations
4,423 Views
21 Pages

6 September 2021

This article explores how the meaning of information related to things, people, events, and processes in the past is discerned and interpreted to satisfy some current purpose. Starting from the premise that Information about the Past results from a c...

  • Article
  • Open Access
5 Citations
4,934 Views
19 Pages

5 September 2021

With the continuous complexity and frequent changes in business application scenarios, companies urgently need to establish a flexible business process management mechanism that includes dynamic rules, in which dynamic adaptation methods of business...

  • Article
  • Open Access
9 Citations
4,094 Views
10 Pages

Cow Rump Identification Based on Lightweight Convolutional Neural Networks

  • Handan Hou,
  • Wei Shi,
  • Jinyan Guo,
  • Zhe Zhang,
  • Weizheng Shen and
  • Shengli Kou

2 September 2021

Individual identification of dairy cows based on computer vision technology shows strong performance and practicality. Accurate identification of each dairy cow is the prerequisite of artificial intelligence technology applied in smart animal husband...

  • Article
  • Open Access
6 Citations
4,471 Views
17 Pages

Topic Models Ensembles for AD-HOC Information Retrieval

  • Pablo Ormeño,
  • Marcelo Mendoza and
  • Carlos Valle

1 September 2021

Ad hoc information retrieval (ad hoc IR) is a challenging task consisting of ranking text documents for bag-of-words (BOW) queries. Classic approaches based on query and document text vectors use term-weighting functions to rank the documents. Some o...

  • Article
  • Open Access
5 Citations
8,347 Views
10 Pages

31 August 2021

In Chile there is a growing interest from society in improving the access of people with disabilities to the labor market. However, applied research on this topic is not abundant. The purpose of this research is to estimate the job opportunities of p...

  • Article
  • Open Access
51 Citations
19,201 Views
17 Pages

31 August 2021

Transparency and accountability are important aspects to any technological endeavor and are popular topics of research as many everyday items have become ‘smart’ and interact with user data on a regular basis. Recent technologies such as blockchain t...

  • Article
  • Open Access
18 Citations
5,981 Views
19 Pages

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

  • Antonio Muñoz,
  • Aristeidis Farao,
  • Jordy Ryan Casas Correia and
  • Christos Xenakis

31 August 2021

During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely...

  • Article
  • Open Access
3 Citations
2,929 Views
11 Pages

Topic Modeling for Analyzing Topic Manipulation Skills

  • Seok-Ju Hwang,
  • Yoon-Kyoung Lee,
  • Jong-Dae Kim,
  • Chan-Young Park and
  • Yu-Seop Kim

31 August 2021

There are many ways to communicate with people, the most representative of which is a conversation. A smooth conversation should not only be written in a grammatically appropriate manner, but also deal with the subject of conversation; this is known...

  • Article
  • Open Access
4 Citations
5,582 Views
18 Pages

What Constitutes Fairness in Games? A Case Study with Scrabble

  • Htun Pa Pa Aung,
  • Mohd Nor Akmal Khalid and
  • Hiroyuki Iida

30 August 2021

The compensation system called komi has been used in scoring games such as Go. In Go, White (the second player) is at a disadvantage because Black gets to move first, giving that player an advantage; indeed, the winning percentage for Black is higher...

  • Article
  • Open Access
5 Citations
4,349 Views
16 Pages

30 August 2021

This research proposes a new feature extraction algorithm using aggregated user engagements on social media in order to achieve demographics and personality discovery tasks. Our proposed framework can discover seven essential attributes, including ge...

  • Article
  • Open Access
3 Citations
3,807 Views
24 Pages

30 August 2021

A common problem in underwater side-scan sonar images is the acoustic shadow generated by the beam. Apart from that, there are a number of reasons impairing image quality. In this paper, an innovative algorithm with two alternative histogram approxim...

  • Article
  • Open Access
23 Citations
14,754 Views
39 Pages

Decoding Methods in Neural Language Generation: A Survey

  • Sina Zarrieß,
  • Henrik Voigt and
  • Simeon Schüz

30 August 2021

Neural encoder-decoder models for language generation can be trained to predict words directly from linguistic or non-linguistic inputs. When generating with these so-called end-to-end models, however, the NLG system needs an additional decoding proc...

  • Article
  • Open Access
7 Citations
8,782 Views
18 Pages

28 August 2021

People respond to different types of health messages in persuasive health communication aimed at motivating behavior change. Hence, in human factors design, there is a need to tailor health applications to different user groups rather than change the...

  • Article
  • Open Access
9 Citations
3,887 Views
21 Pages

28 August 2021

Particle accelerators are enabling tools for scientific exploration and discovery in various disciplines. However, finding optimised operation points for these complex machines is a challenging task due to the large number of parameters involved and...

  • Article
  • Open Access
10 Citations
3,784 Views
12 Pages

27 August 2021

The automated enrichment of mass-digitised document collections using techniques such as text mining is becoming increasingly popular. Enriched collections offer new opportunities for interface design to allow data-driven and visualisation-based sear...

  • Article
  • Open Access
4 Citations
6,470 Views
36 Pages

27 August 2021

Cyberattacks make the news daily. Systems must be appropriately secured. Cybersecurity risk analyses are more than ever necessary, but… traveling and gathering in a room to discuss the topic has become difficult due to the COVID, whilst having a cybe...

  • Article
  • Open Access
8 Citations
4,639 Views
26 Pages

VERONICA: Visual Analytics for Identifying Feature Groups in Disease Classification

  • Neda Rostamzadeh,
  • Sheikh S. Abdullah,
  • Kamran Sedig,
  • Amit X. Garg and
  • Eric McArthur

26 August 2021

The use of data analysis techniques in electronic health records (EHRs) offers great promise in improving predictive risk modeling. Although useful, these analysis techniques often suffer from a lack of interpretability and transparency, especially w...

  • Article
  • Open Access
26 Citations
4,931 Views
25 Pages

26 August 2021

The public’s acceptance of independent autonomous vehicles and cooperative vehicle-highway autonomous vehicles is studied by combining the structural equation model and an artificial neural network. The structural equation model’s output variables ar...

  • Systematic Review
  • Open Access
42 Citations
15,187 Views
18 Pages

Gamification for Brand Value Co-Creation: A Systematic Literature Review

  • Mohamad Amir Merhabi,
  • Panagiotis Petridis and
  • Rushana Khusainova

26 August 2021

Gamification, commonly defined as the use of game elements in non-game contexts, is a relatively novel term, yet it has been gaining popularity across a wide range of academic and industrial disciplines. In the marketing field, companies are increasi...

  • Article
  • Open Access
3 Citations
2,560 Views
9 Pages

25 August 2021

Using reinforcement learning technologies to learn offloading strategies for multi-access edge computing systems has been developed by researchers. However, large-scale systems are unsuitable for reinforcement learning, due to their huge state spaces...

  • Article
  • Open Access
5 Citations
2,854 Views
14 Pages

Data Security Protocol with Blind Factor in Cloud Environment

  • Ping Zhang,
  • Huanhuan Chi,
  • Jiechang Wang and
  • Youlin Shang

24 August 2021

Compared with the traditional system, cloud storage users have no direct control over their data, so users are most concerned about security for their data stored in the cloud. One security requirement is to resolve any threats from semi-trusted key...

  • Article
  • Open Access
7 Citations
3,383 Views
21 Pages

24 August 2021

With the expansion of advanced metering infrastructure (AMI) installations, various additional services using AMI data have emerged. However, some data is lost in the communication process of data collection. Hence, to address this challenge, the est...

  • Article
  • Open Access
14 Citations
4,466 Views
14 Pages

24 August 2021

Multimodal sentiment analysis and emotion recognition represent a major research direction in natural language processing (NLP). With the rapid development of online media, people often express their emotions on a topic in the form of video, and the...

XFacebookLinkedIn
Information - ISSN 2078-2489