Skip to Content

Information, Volume 14, Issue 2

2023 February - 83 articles

Cover Story: The manuscript proposes a novel system that analyzes visual data on social media during extreme events to improve situational awareness and support emergency management. By considering the event type and GPS coordinates of the affected area, the system selects relevant user-generated image posts and applies a Single-Shot Multibox Detector (SSD) network to refine the selection. Advanced image processing is then used to verify the correlation between images and the affected area. The system has been extensively tested in various emergency situations to assess its performance and reliability. It has the potential to be a valuable tool for emergency managers to gather information quickly and effectively. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (83)

  • Article
  • Open Access
55 Citations
4,305 Views
14 Pages

Co-Channel Interference Management for Heterogeneous Networks Using Deep Learning Approach

  • Ishtiaq Ahmad,
  • Sajjad Hussain,
  • Sarmad Nozad Mahmood,
  • Hala Mostafa,
  • Ahmed Alkhayyat,
  • Mohamed Marey,
  • Ali Hashim Abbas and
  • Zainab Abdulateef Rashed

20 February 2023

The co-channel interference for mobile users (MUs) of a public safety network (PSN) in the co-existence of heterogeneous networks such as unmanned aerial vehicles (UAVs) and LTE-based railway networks (LRNs) needs a thorough investigation, where UAVs...

  • Article
  • Open Access
4 Citations
3,821 Views
23 Pages

20 February 2023

The aim of this research is to study the specifics of the road accident rate formation processes in regions of the Russian Federation (2021) using information-entropic analysis. The typical research approaches (correlation-regression, factorial analy...

  • Review
  • Open Access
16 Citations
6,708 Views
21 Pages

19 February 2023

Superficially, read and spontaneous speech—the two main kinds of training data for automatic speech recognition—appear as complementary, but are equal: pairs of texts and acoustic signals. Yet, spontaneous speech is typically harder for r...

  • Article
  • Open Access
6 Citations
4,249 Views
24 Pages

GATUGU: Six Perspectives of Evaluation of Gamified Systems

  • Jakub Swacha,
  • Ricardo Queirós and
  • José Carlos Paiva

19 February 2023

As gamification spreads to new areas, new applications are being developed and the interest in evaluating gamified systems continues to grow. To date, however, no one has comprehensively approached this topic: multiple evaluation dimensions and measu...

  • Article
  • Open Access
1 Citations
3,023 Views
18 Pages

18 February 2023

The vast majority of compressed digital data that flows nowadays on modern high-speed networks is directly related to human activity. It describes what we do, what we see and photograph, where we go, whom we meet, and specifically every moment of our...

  • Concept Paper
  • Open Access
5 Citations
2,558 Views
17 Pages

18 February 2023

This paper discusses challenges for M&S if it is to be increasingly important to decision aiding and policy analysis. It suggests an approach that—from the outset of a policy analysis project—incorporates M&S of a varied resolutio...

  • Article
  • Open Access
12 Citations
4,407 Views
13 Pages

17 February 2023

Named entity recognition can deeply explore semantic features and enhance the ability of vector representation of text data. This paper proposes a named entity recognition method based on multi-head attention to aim at the problem of fuzzy lexical bo...

  • Article
  • Open Access
13 Citations
7,967 Views
21 Pages

Conceptual Approach to the Pedagogy of Serious Games

  • María Rosa Fernández-Sánchez,
  • Alberto González-Fernández and
  • Jesús Acevedo-Borrega

17 February 2023

The transformation of educational processes, derived from the technological disruption that has taken place in the educational field, has allowed for the development of certain methodologies and techniques that place emphasis on the students as an ac...

  • Article
  • Open Access
11 Citations
5,628 Views
37 Pages

17 February 2023

In today’s technology-driven society, many decisions are made based on the results provided by machine learning algorithms. It is widely known that the models generated by such algorithms may present biases that lead to unfair decisions for som...

  • Article
  • Open Access
21 Citations
4,238 Views
17 Pages

16 February 2023

In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good...

  • Article
  • Open Access
58 Citations
9,546 Views
26 Pages

A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT

  • Samia Masood Awan,
  • Muhammad Ajmal Azad,
  • Junaid Arshad,
  • Urooj Waheed and
  • Tahir Sharif

16 February 2023

The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes...

  • Article
  • Open Access
11 Citations
5,718 Views
21 Pages

Adaptive Savitzky–Golay Filters for Analysis of Copy Number Variation Peaks from Whole-Exome Sequencing Data

  • Peter Juma Ochieng,
  • Zoltán Maróti,
  • József Dombi,
  • Miklós Krész,
  • József Békési and
  • Tibor Kalmár

16 February 2023

Copy number variation (CNV) is a form of structural variation in the human genome that provides medical insight into complex human diseases; while whole-genome sequencing is becoming more affordable, whole-exome sequencing (WES) remains an important...

  • Review
  • Open Access
8 Citations
2,924 Views
13 Pages

16 February 2023

The Timed Up and Go test (TUG) and L Test are functional mobility tests that allow healthcare providers to assess a person’s balance and fall risk. Segmenting these mobility tests into their respective subtasks, using sensors, can provide furth...

  • Article
  • Open Access
1 Citations
2,720 Views
13 Pages

15 February 2023

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain...

  • Article
  • Open Access
1 Citations
2,655 Views
15 Pages

15 February 2023

Road intelligence monitoring is an inevitable trend of urban intelligence, and clothing information is the main factor to identify pedestrians. Therefore, this paper establishes a multi-information clothing recognition model and proposes a data augme...

  • Article
  • Open Access
1 Citations
3,002 Views
17 Pages

Modeling and Moderation of COVID-19 Social Network Chat

  • Félix Gélinas-Gascon and
  • Richard Khoury

15 February 2023

Negative social media usage during the COVID-19 pandemic has highlighted the importance of understanding the spread of misinformation and toxicity in public online discussions. In this paper, we propose a novel unsupervised method to discover the str...

  • Article
  • Open Access
9 Citations
4,119 Views
14 Pages

14 February 2023

Pedestrian detection represents one of the critical tasks of computer vision; however, detecting pedestrians can be compromised by problems such as the various scale of pedestrian features and cluttered background, which can easily cause a loss of ac...

  • Systematic Review
  • Open Access
14 Citations
15,491 Views
33 Pages

14 February 2023

Robotic process automation and intelligent process automation have gained a foothold in the automation of business processes, using blocks of software (bots). These agents interact with systems through interfaces, replacing human intervention with th...

  • Article
  • Open Access
4 Citations
2,039 Views
18 Pages

Modeling Sociodynamic Processes Based on the Use of the Differential Diffusion Equation with Fractional Derivatives

  • Liliya A. Demidova,
  • Dmitry O. Zhukov,
  • Elena G. Andrianova and
  • Alexander S. Sigov

13 February 2023

This paper explores the social dynamics of processes in complex systems involving humans by focusing on user activity in online media outlets. The R/S analysis showed that the time series of the processes under consideration are fractal and anti-pers...

  • Article
  • Open Access
2,249 Views
9 Pages

Structure Fault Tolerance of Bubble-Sort Star Graphs

  • Lantao You,
  • Jianfeng Jiang and
  • Yuejuan Han

13 February 2023

As two significant performance indicators, structure connectivity and substructure connectivity have been widely studied, and they are used to judge a network’s fault tolerance properties from the perspective of the structure becoming faulty. A...

  • Article
  • Open Access
5 Citations
2,513 Views
11 Pages

FuseLGNet: Fusion of Local and Global Information for Detection of Parkinson’s Disease

  • Ming Chen,
  • Tao Ren,
  • Pihai Sun,
  • Jianfei Wu,
  • Jinfeng Zhang and
  • Aite Zhao

13 February 2023

In the past few years, the assessment of Parkinson’s disease (PD) has mainly been based on the clinician’s examination, the patient’s medical history, and self-report. Parkinson’s disease may be misdiagnosed due to a lack of c...

  • Article
  • Open Access
5 Citations
3,520 Views
20 Pages

How a Rubric Score Application Empowers Teachers’ Attitudes over Computational Thinking Leverage

  • Ioannis Dimos,
  • Chrysoula Velaora,
  • Konstantinos Louvaris,
  • Athanasios Kakarountas and
  • Assimina Antonarakou

13 February 2023

Computational Thinking (CT) has emerged as an umbrella term that refers to a broad set of problem-solving skills. New generations must conquer these skills in order to thrive in a computer-based world. Teachers, as agents of change, must also be fami...

  • Review
  • Open Access
258 Citations
68,400 Views
19 Pages

13 February 2023

By utilizing smart contracts, which are essentially scripts that are anchored in a decentralized manner on blockchains or other similar infrastructures, it is possible to make the execution of predetermined procedures visible to the outside world. Th...

  • Article
  • Open Access
6 Citations
11,139 Views
16 Pages

Market Analysis with Business Intelligence System for Marketing Planning

  • Treerak Kongthanasuwan,
  • Nakarin Sriwiboon,
  • Banpot Horbanluekit,
  • Wasakorn Laesanklang and
  • Tipaluck Krityakierne

13 February 2023

The automotive and auto parts industries are important economic sectors in Thailand. With rapidly changing technology, every organization should understand what needs to be improved clearly, and shift their strategies to meet evolving consumer demand...

  • Article
  • Open Access
4 Citations
3,803 Views
11 Pages

12 February 2023

Video object detection is an important research direction of computer vision. The task of video object detection is to detect and classify moving objects in a sequence of images. Based on the static image object detector, most of the existing video o...

  • Article
  • Open Access
19 Citations
5,969 Views
40 Pages

12 February 2023

Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the u...

  • Article
  • Open Access
15 Citations
4,237 Views
12 Pages

10 February 2023

This paper aims to leverage Twitter data to understand travel mode choices during the pandemic. Tweets related to different travel modes in New York City (NYC) are fetched from Twitter in the two most recent years (January 2020–January 2022). B...

  • Article
  • Open Access
7 Citations
3,795 Views
11 Pages

10 February 2023

Most of the existing estimation methods of spreading code sequence are not suitable for the QPSK-DSSS. We propose a spreading code sequence estimation method based on fast independent component analysis (Fast-ICA). It mainly includes signal preproces...

  • Review
  • Open Access
4 Citations
4,066 Views
32 Pages

10 February 2023

Applying prediction models to software engineering is an interesting research area. There have been many related studies which leverage prediction models to achieve good performance in various software engineering tasks. With more and more researches...

  • Article
  • Open Access
7 Citations
11,313 Views
24 Pages

9 February 2023

The digital marketplace has rapidly grown, transitioning the market of video games from physical localized experiences to more networked, expanded, virtual spaces. With a highly competitive business market, platform governance policy allows for the e...

  • Article
  • Open Access
5 Citations
2,896 Views
17 Pages

9 February 2023

As a promising paradigm, the Industrial Internet of Things (IIoT) provides a wide range of intelligent services through the interconnection and interaction of heterogeneous networks. The quality of these services depends on how the bandwidth is share...

  • Article
  • Open Access
17 Citations
7,081 Views
13 Pages

9 February 2023

In recent years, the rapid economic development of China, the increase of the urban population, the continuous growth of private car ownership, the uneven distribution of traffic flow, and the local congestion of the road network have caused traffic...

  • Article
  • Open Access
2 Citations
3,777 Views
13 Pages

8 February 2023

The COVID-19 pandemic led to changes in business communication. As face-to-face communication was no longer possible, many businesses shifted to Zoom because of its ease of use and user-friendly functionality. One unique context in which users were f...

  • Article
  • Open Access
3 Citations
4,831 Views
15 Pages

Challenges Encountered and Lessons Learned when Using a Novel Anonymised Linked Dataset of Health and Social Care Records for Public Health Intelligence: The Sussex Integrated Dataset

  • Elizabeth Ford,
  • Richard Tyler,
  • Natalie Johnston,
  • Vicki Spencer-Hughes,
  • Graham Evans,
  • Jon Elsom,
  • Anotida Madzvamuse,
  • Jacqueline Clay,
  • Kate Gilchrist and
  • Melanie Rees-Roberts

8 February 2023

Background: In the United Kingdom National Health Service (NHS), digital transformation programmes have resulted in the creation of pseudonymised linked datasets of patient-level medical records across all NHS and social care services. In the Southea...

  • Review
  • Open Access
203 Citations
34,437 Views
31 Pages

Serious Games and Gamification in Healthcare: A Meta-Review

  • Robertas Damaševičius,
  • Rytis Maskeliūnas and
  • Tomas Blažauskas

7 February 2023

A serious game is a type of game that is designed for a primary purpose other than entertainment. Instead, serious games are intended to achieve specific goals, such as education, training, or health promotion. The goal of serious games is to engage...

  • Article
  • Open Access
11 Citations
4,098 Views
20 Pages

7 February 2023

Problems of preeclampsia sign diagnosis are mostly based on symptom data with the characteristics of data collected periodically in uncertain, ambiguous, and obstetrician opinions. To reduce the effects of preeclampsia, many studies have investigated...

  • Article
  • Open Access
53 Citations
11,135 Views
14 Pages

7 February 2023

Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect the...

  • Article
  • Open Access
8 Citations
4,286 Views
10 Pages

7 February 2023

Android operating system (OS) has been recently featured as the most commonly used and ingratiated OS for smartphone ecosystems. This is due to its high interoperability as an open-source platform and its compatibility with all the major browsers wit...

  • Article
  • Open Access
3 Citations
3,435 Views
18 Pages

6 February 2023

Bus bunching is a severe problem that affects the service levels of public transport systems. Most of the previous studies in the field of Bus Signal Priority (BSP) and Transit Signal Priority (TSP) focus on reducing a bus delay at signalised interse...

  • Article
  • Open Access
3 Citations
4,958 Views
52 Pages

General Software Platform and Content Description Format for Assembly and Maintenance Task Based on Augmented Reality

  • Yiming Shen,
  • Shuntaro Ueda,
  • Yuichiro Fujimoto,
  • Taishi Sawabe,
  • Masayuki Kanbara and
  • Hirokazu Kato

6 February 2023

Augmented reality (AR) support systems have proven to be effective in supporting various tasks, but are not yet widely used in real-world applications due to their high development costs. Although several AR authoring tools have been proposed for con...

  • Article
  • Open Access
7 Citations
6,631 Views
16 Pages

Efficacy of the 4F Feedback Model: A Game-Based Assessment in University Education

  • Sara de Freitas,
  • Victoria Uren,
  • Kristian Kiili,
  • Manuel Ninaus,
  • Panagiotis Petridis,
  • Petros Lameras,
  • Ian Dunwell,
  • Sylvester Arnab,
  • Stephen Jarvis and
  • Kam Star

6 February 2023

Feedback is a critical aspect of optimised learning design, but there are few, if any, feedback models that map different types of feedback and how they may assist students to increase performance and enhance their learning experience. This research...

  • Article
  • Open Access
11 Citations
6,723 Views
13 Pages

Deep-Learning-Based Carrier Frequency Offset Estimation and Its Cross-Evaluation in Multiple-Channel Models

  • Zhenyi Wang,
  • Shengyun Wei,
  • Li Zou,
  • Feifan Liao,
  • Weimin Lang and
  • Yuanzhuo Li

6 February 2023

The most widely used Wi-Fi wireless communication system, which is based on OFDM, is currently developing quickly. The receiver must, however, accurately estimate the carrier frequency offset between the transmitter and the receiver due to the charac...

  • Article
  • Open Access
3 Citations
2,370 Views
14 Pages

6 February 2023

The summary of case–public opinion refers to the generation of case-related sentences from public opinion information related to judicial cases. Case–public opinion news refers to the judicial cases (intentional homicide, rape, etc.) that...

  • Article
  • Open Access
6 Citations
3,096 Views
14 Pages

Educational Breakout Based on Star Wars for Learning the History of Spanish Sign Language

  • Ricardo Moreno-Rodriguez,
  • José Luis Lopez-Bastias,
  • Miriam Diaz-Vega and
  • Rosa Espada-Chavarria

6 February 2023

Although educational breakout has been implemented in pre-university stages, there is little evidence in subjects related to history in postsecondary levels. The aim of this paper was to present the results obtained after implementing an educational...

  • Article
  • Open Access
37 Citations
7,707 Views
20 Pages

4 February 2023

Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a threatening security posture in organizations. Security analytics is a coll...

  • Article
  • Open Access
3,534 Views
29 Pages

Trends of Top IS Research by Region, Outlet, and Emergence: A Semi-Automated Literature Review

  • Nadine Guhr,
  • Oliver Werth,
  • Jens Passlick and
  • Michael H. Breitner

3 February 2023

Global trends towards the rapidly increasing use of information systems (IS) apply to the IS research domain and related publications. Nonetheless, investigations of trends in publication behavior and emergence as well as changes in IS research are u...

  • Article
  • Open Access
8 Citations
3,126 Views
34 Pages

EverAnalyzer: A Self-Adjustable Big Data Management Platform Exploiting the Hadoop Ecosystem

  • Panagiotis Karamolegkos,
  • Argyro Mavrogiorgou,
  • Athanasios Kiourtis and
  • Dimosthenis Kyriazis

3 February 2023

Big Data is a phenomenon that affects today’s world, with new data being generated every second. Today’s enterprises face major challenges from the increasingly diverse data, as well as from indexing, searching, and analyzing such enormou...

  • Article
  • Open Access
56 Citations
12,979 Views
15 Pages

3 February 2023

The existence of missing values reduces the amount of knowledge learned by the machine learning models in the training stage thus affecting the classification accuracy negatively. To address this challenge, we introduce the use of Support Vector Mach...

  • Article
  • Open Access
3 Citations
3,394 Views
14 Pages

A Tissue-Specific and Toxicology-Focused Knowledge Graph

  • Ignacio J. Tripodi,
  • Lena Schmidt,
  • Brian E. Howard,
  • Deepak Mav and
  • Ruchir Shah

3 February 2023

Molecular biology-focused knowledge graphs (KGs) are directed graphs that integrate information from heterogeneous sources of biological and biomedical data, such as ontologies and public databases. They provide a holistic view of biology, chemistry,...

  • Article
  • Open Access
10 Citations
3,087 Views
14 Pages

3 February 2023

Microblog is an important platform for mining public opinion, and it is of great value to conduct emotional analysis of microblog texts during the current epidemic. Aiming at the problem that most current emotional classification methods cannot effec...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489