You are currently viewing a new version of our website. To view the old version click .

Information, Volume 13, Issue 2

February 2022 - 59 articles

Cover Story: The use of adversarial attacks against authentication systems causes the accuracy of such systems to be substantially reduced, despite the complexity of generating a competitive example. As part of this study a white-box adversarial attack was carried out on an authentication system. The basis of the authentication system is a neural network perceptron, trained on a dataset of frequency signatures of sign. For an attack on an atypical dataset the following results were obtained: with an attack intensity of 25% the authentication system availability decreases to 50% for a particular user; with a further increase in the attack intensity the accuracy decreases to 5%. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (59)

  • Article
  • Open Access
7 Citations
6,034 Views
16 Pages

Automatic Hemiplegia Type Detection (Right or Left) Using the Levenberg-Marquardt Backpropagation Method

  • Vasileios Christou,
  • Alexandros Arjmand,
  • Dimitrios Dimopoulos,
  • Dimitrios Varvarousis,
  • Ioannis Tsoulos,
  • Alexandros T. Tzallas,
  • Christos Gogos,
  • Markos G. Tsipouras,
  • Evripidis Glavas and
  • Avraam Ploumis
  • + 1 author

21 February 2022

Hemiplegia affects a significant portion of the human population. It is a condition that causes motor impairment and severely reduces the patient’s quality of life. This paper presents an automatic system for identifying the hemiplegia type (ri...

  • Article
  • Open Access
7 Citations
3,277 Views
8 Pages

20 February 2022

This paper discusses the concept and practicality of internet-of-things (IoT) link security enhancements using multiple-input multiple-output (MIMO) and beamforming solutions at the physical layer of the wireless system. Large-scale MIMO and beamform...

  • Article
  • Open Access
23 Citations
10,422 Views
21 Pages

Data Quality Barriers for Transparency in Public Procurement

  • Ahmet Soylu,
  • Óscar Corcho,
  • Brian Elvesæter,
  • Carlos Badenes-Olmedo,
  • Francisco Yedro-Martínez,
  • Matej Kovacic,
  • Matej Posinkovic,
  • Mitja Medvešček,
  • Ian Makgill and
  • Chris Taggart
  • + 3 authors

20 February 2022

Governments need to be accountable and transparent for their public spending decisions in order to prevent losses through fraud and corruption as well as to build healthy and sustainable economies. Open data act as a major instrument in this respect...

  • Article
  • Open Access
5 Citations
2,774 Views
13 Pages

18 February 2022

The impressive progress on image segmentation has been witnessed recently. In this paper, an improved model introducing frequency-tuned salient region detection into Gaussian mixture model (GMM) is proposed, which is named FTGMM. Frequency-tuned sali...

  • Article
  • Open Access
1 Citations
2,713 Views
13 Pages

18 February 2022

The ongoing COVID-19 pandemic has brought science to the fore of public discourse and, considering the complexity of the issues involved, with it also the challenge of effective and informative science communication. This is a particularly contentiou...

  • Article
  • Open Access
22 Citations
8,148 Views
16 Pages

Tuberculosis Bacteria Detection and Counting in Fluorescence Microscopy Images Using a Multi-Stage Deep Learning Pipeline

  • Marios Zachariou,
  • Ognjen Arandjelović,
  • Wilber Sabiiti,
  • Bariki Mtafya and
  • Derek Sloan

18 February 2022

The manual observation of sputum smears by fluorescence microscopy for the diagnosis and treatment monitoring of patients with tuberculosis (TB) is a laborious and subjective task. In this work, we introduce an automatic pipeline which employs a nove...

  • Article
  • Open Access
1 Citations
2,969 Views
18 Pages

17 February 2022

To estimate the pose of satellites in space, the docking ring component has strong rigid body characteristics and can provide a fixed circular feature, which is an important object. However, due to the need for additional constraints to estimate a si...

  • Article
  • Open Access
8 Citations
4,860 Views
14 Pages

Detecting Learning Patterns in Tertiary Education Using K-Means Clustering

  • Emmanuel Tuyishimire,
  • Wadzanai Mabuto,
  • Paul Gatabazi and
  • Sylvie Bayisingize

17 February 2022

We are in the era where various processes need to be online. However, data from digital learning platforms are still underutilised in higher education, yet, they contain student learning patterns, whose awareness would contribute to educational devel...

  • Article
  • Open Access
9 Citations
5,768 Views
14 Pages

15 February 2022

Neural machine translation systems have revolutionized translation processes in terms of quantity and speed in recent years, and they have even been claimed to achieve human parity. However, the quality of their output has also raised serious doubts...

  • Article
  • Open Access
8 Citations
4,356 Views
23 Pages

Multi-Objective Optimization of a Task-Scheduling Algorithm for a Secure Cloud

  • Wei Li,
  • Qi Fan,
  • Fangfang Dang,
  • Yuan Jiang,
  • Haomin Wang,
  • Shuai Li and
  • Xiaoliang Zhang

15 February 2022

As more and more power information systems are gradually deployed to cloud servers, the task scheduling of a secure cloud is facing challenges. Optimizing the scheduling strategy only from a single aspect cannot meet the needs of power business. At t...

of 6

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489