Skip to Content

Information, Volume 14, Issue 3

2023 March - 61 articles

Cover Story: The emergence of COVID-19 generated a need for accurate timely information related to its spread. We propose two methods for using Twitter to help model the spread of COVID-19: machine learning algorithms trained in five languages are used to identify symptomatic individuals; using the geo-location attached to each tweet, we also map where people have symptoms. We calibrated an epidemiological model and then evaluated the usefulness of the data when making predictions of deaths in 50 US States, 16 Latin American countries, 2 European countries and 7 regions in the UK. Using such tweets from symptomatic individuals results in improvements in accuracy when predicting COVID-19 deaths. We also show we can extract useful data describing movements between UK regions. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (61)

  • Article
  • Open Access
29 Citations
9,430 Views
11 Pages

22 March 2023

In classification, feature selection engineering helps in choosing the most relevant data attributes to learn from. It determines the set of features to be rejected, supposing their low contribution in discriminating the labels. The effectiveness of...

  • Article
  • Open Access
1 Citations
3,286 Views
20 Pages

22 March 2023

R&D strategies play a decisive role in the promotion of enterprise innovation output and innovation ability. In order to thoroughly investigate the R&D strategies of iron and steel enterprises, an R&D strategy analysis framework based on...

  • Article
  • Open Access
32 Citations
6,465 Views
10 Pages

Fundamental Research Challenges for Distributed Computing Continuum Systems

  • Victor Casamayor Pujol,
  • Andrea Morichetta,
  • Ilir Murturi,
  • Praveen Kumar Donta and
  • Schahram Dustdar

22 March 2023

This article discusses four fundamental topics for future Distributed Computing Continuum Systems: their representation, model, lifelong learning, and business model. Further, it presents techniques and concepts that can be useful to define these fou...

  • Article
  • Open Access
20 Citations
4,811 Views
24 Pages

A Reference Architecture for Enabling Interoperability and Data Sovereignty in the Agricultural Data Space

  • Rodrigo Falcão,
  • Raghad Matar,
  • Bernd Rauch,
  • Frank Elberzhager and
  • Matthias Koch

21 March 2023

Agriculture is one of the major sectors of the global economy and also a software-intensive domain. The digital landscape of agriculture is composed of multiple digital ecosystems, which together constitute an agricultural domain ecosystem, also refe...

  • Article
  • Open Access
11 Citations
3,429 Views
29 Pages

20 March 2023

Background: despite a broad consensus on their importance, applications of systems thinking in policymaking and practice have been limited. This is partly caused by the longstanding practice of developing systems maps and software in the intention of...

  • Article
  • Open Access
15 Citations
7,186 Views
23 Pages

20 March 2023

Over the past few years, word embeddings and bidirectional encoder representations from transformers (BERT) models have brought better solutions to learning text representations for natural language processing (NLP) and other tasks. Many NLP applicat...

  • Article
  • Open Access
14 Citations
6,217 Views
13 Pages

Efficient Dynamic Reconfigurable CNN Accelerator for Edge Intelligence Computing on FPGA

  • Kaisheng Shi,
  • Mingwei Wang,
  • Xin Tan,
  • Qianghua Li and
  • Tao Lei

20 March 2023

This paper proposes an efficient dynamic reconfigurable CNN accelerator (EDRCA) for FPGAs to tackle the issues of limited hardware resources and low energy efficiency in the deployment of convolutional neural networks on embedded edge computing devic...

  • Article
  • Open Access
7 Citations
3,445 Views
23 Pages

20 March 2023

Several supervised machine learning models have been proposed and used to detect Android ransomware. These models were trained using different datasets from different sources. However, the age of the ransomware datasets was not considered when traini...

  • Review
  • Open Access
17 Citations
7,181 Views
30 Pages

A Systematic Literature Review on Human Ear Biometrics: Approaches, Algorithms, and Trend in the Last Decade

  • Oyediran George Oyebiyi,
  • Adebayo Abayomi-Alli,
  • Oluwasefunmi ‘Tale Arogundade,
  • Atika Qazi,
  • Agbotiname Lucky Imoize and
  • Joseph Bamidele Awotunde

17 March 2023

Biometric technology is fast gaining pace as a veritable developmental tool. So far, biometric procedures have been predominantly used to ensure identity and ear recognition techniques continue to provide very robust research prospects. This paper pr...

  • Review
  • Open Access
68 Citations
8,050 Views
19 Pages

17 March 2023

Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can redu...

  • Article
  • Open Access
2 Citations
3,047 Views
24 Pages

17 March 2023

Semi-supervised learning is a technique that utilizes a limited set of labeled data and a large amount of unlabeled data to overcome the challenges of obtaining a perfect dataset in deep learning, especially in medical image segmentation. The accurac...

  • Article
  • Open Access
3 Citations
2,882 Views
18 Pages

17 March 2023

Helium speech, the language spoken by divers in the deep sea who breathe a high-pressure helium–oxygen mixture, is almost unintelligible. To accurately unscramble helium speech, a neural network based on deep learning is proposed. First, an iso...

  • Article
  • Open Access
3 Citations
2,981 Views
17 Pages

Ontology-Driven Knowledge Sharing in Alzheimer’s Disease Research

  • Sophia Lazarova,
  • Dessislava Petrova-Antonova and
  • Todor Kunchev

16 March 2023

Alzheimer’s disease is a debilitating neurodegenerative condition which is known to be the most common cause of dementia. Despite its rapidly growing prevalence, medicine still lacks a comprehensive definition of the disease. As a result, Alzhe...

  • Review
  • Open Access
64 Citations
16,883 Views
25 Pages

16 March 2023

Transfer learning is a technique utilized in deep learning applications to transmit learned inference to a different target domain. The approach is mainly to solve the problem of a few training datasets resulting in model overfitting, which affects m...

  • Article
  • Open Access
7 Citations
4,828 Views
19 Pages

A Quick Prototype for Assessing OpenIE Knowledge Graph-Based Question-Answering Systems

  • Giuseppina Di Paolo,
  • Diego Rincon-Yanez and
  • Sabrina Senatore

16 March 2023

Due to the rapid growth of knowledge graphs (KG) as representational learning methods in recent years, question-answering approaches have received increasing attention from academia and industry. Question-answering systems use knowledge graphs to org...

  • Article
  • Open Access
16 Citations
4,189 Views
15 Pages

16 March 2023

Aspect-based sentiment analysis is a fine-grained sentiment analysis that focuses on the sentiment polarity of different aspects of text, and most current research methods use a combination of dependent syntactic analysis and graphical neural network...

  • Article
  • Open Access
15 Citations
7,453 Views
21 Pages

15 March 2023

A tremendous amount of image and video data are being generated and shared in our daily lives. Image and video data are typically stored and transmitted in compressed form in order to reduce storage space and transmission time. The processing and ana...

  • Article
  • Open Access
8 Citations
2,669 Views
11 Pages

15 March 2023

The automatic recognition of CT (Computed Tomography) images of liver cancer is important for the diagnosis and treatment of early liver cancer. However, there are problems such as single model structure and loss of pooling layer information when usi...

  • Article
  • Open Access
5 Citations
3,646 Views
11 Pages

15 March 2023

As road mileage continues to expand, the number of disasters caused by expanding pavement cracks is increasing. Two main methods, image processing and deep learning, are used to detect these cracks to improve the efficiency and quality of pavement cr...

  • Article
  • Open Access
3 Citations
7,283 Views
17 Pages

Smart Machine Health Prediction Based on Machine Learning in Industry Environment

  • Sagar Yeruva,
  • Jeshmitha Gunuganti,
  • Sravani Kalva,
  • Surender Reddy Salkuti and
  • Seong-Cheol Kim

14 March 2023

In an industrial setting, consistent production and machine maintenance might help any company become successful. Machine health checking is a method of observing the status of a machine to predict mechanical mileage and predict the machine’s d...

  • Article
  • Open Access
14 Citations
3,222 Views
16 Pages

14 March 2023

In recent years, smart grids have integrated information and communication technologies into power networks, which brings new network security issues. Among the existing cyberattacks, the false data injection attack (FDIA) compromises state estimatio...

  • Article
  • Open Access
2 Citations
4,841 Views
12 Pages

Adapting Off-the-Shelf Speech Recognition Systems for Novel Words

  • Wiam Fadel,
  • Toumi Bouchentouf,
  • Pierre-André Buvet and
  • Omar Bourja

13 March 2023

Current speech recognition systems with fixed vocabularies have difficulties recognizing Out-of-Vocabulary words (OOVs) such as proper nouns and new words. This leads to misunderstandings or even failures in dialog systems. Ensuring effective speech...

  • Review
  • Open Access
16 Citations
5,504 Views
23 Pages

Quo Vadis Business Simulation Games in the 21st Century?

  • Mirjana Pejić Bach,
  • Tamara Ćurlin,
  • Ana Marija Stjepić and
  • Maja Meško

13 March 2023

Business simulation games have become popular in higher education and business environments. The paper aims to identify the primary research trends and topics of business simulation games research using a systematic and automated literature review wi...

  • Article
  • Open Access
4 Citations
3,289 Views
13 Pages

11 March 2023

Human resource data sharing is very important for the cooperation of human resource institutions. Since the human resource data-sharing service needs to take into account the needs of individuals and talent service institutions, it faces issues such...

  • Article
  • Open Access
10 Citations
4,618 Views
24 Pages

Ontology Learning Applications of Knowledge Base Construction for Microelectronic Systems Information

  • Frank Wawrzik,
  • Khushnood Adil Rafique,
  • Farin Rahman and
  • Christoph Grimm

9 March 2023

Knowledge base construction (KBC) using AI has been one of the key goals of this highly popular technology since its emergence, as it helps to comprehend everything, including relations, around us. The construction of knowledge bases can summarize a...

  • Article
  • Open Access
16 Citations
5,024 Views
18 Pages

QoS-Aware Resource Management in 5G and 6G Cloud-Based Architectures with Priorities

  • Spiros (Spyridon) Louvros,
  • Michael Paraskevas and
  • Theofilos Chrysikos

9 March 2023

Fifth-generation and more importantly the forthcoming sixth-generation networks have been given special care for latency and are designed to support low latency applications including a high flexibility New Radio (NR) interface that can be configured...

  • Article
  • Open Access
27 Citations
4,852 Views
13 Pages

9 March 2023

This study proposes the integration of attention modules, feature-fusion blocks, and baseline convolutional neural networks for developing a robust multi-path network that leverages its multiple feature-extraction blocks for non-hierarchical mining o...

  • Article
  • Open Access
17 Citations
8,253 Views
20 Pages

Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models

  • Lakshmi Priya Krishnan,
  • Iman Vakilinia,
  • Sandeep Reddivari and
  • Sanjay Ahuja

8 March 2023

With the emergence of cryptocurrencies and Blockchain technology, the financial sector is turning its gaze toward this latest wave. The use of cryptocurrencies is becoming very common for multiple services. Food chains, network service providers, tec...

  • Article
  • Open Access
7 Citations
3,775 Views
60 Pages

Quickening Data-Aware Conformance Checking through Temporal Algebras

  • Giacomo Bergami,
  • Samuel Appleby and
  • Graham Morgan

8 March 2023

A temporal model describes processes as a sequence of observable events characterised by distinguishable actions in time. Conformance checking allows these models to determine whether any sequence of temporally ordered and fully-observable events com...

  • Article
  • Open Access
5 Citations
3,255 Views
20 Pages

Architecture-Oriented Agent-Based Simulations and Machine Learning Solution: The Case of Tsunami Emergency Analysis for Local Decision Makers

  • Pavel Čech,
  • Martin Mattoš,
  • Viera Anderková,
  • František Babič,
  • Bilal Naji Alhasnawi,
  • Vladimír Bureš,
  • Milan Kořínek,
  • Kamila Štekerová,
  • Martina Husáková and
  • Ioanna Triantafyllou
  • + 2 authors

8 March 2023

Tsunamis are a perilous natural phenomenon endangering growing coastal populations and tourists in many seaside resorts. Failures in responding to recent tsunami events stresses the importance of further research in building a robust tsunami warning...

  • Article
  • Open Access
2 Citations
3,362 Views
21 Pages

Extracting Self-Reported COVID-19 Symptom Tweets and Twitter Movement Mobility Origin/Destination Matrices to Inform Disease Models

  • Conor Rosato,
  • Robert E. Moore,
  • Matthew Carter,
  • John Heap,
  • John Harris,
  • Jose Storopoli and
  • Simon Maskell

7 March 2023

The emergence of the novel coronavirus (COVID-19) generated a need to quickly and accurately assemble up-to-date information related to its spread. In this research article, we propose two methods in which Twitter is useful when modelling the spread...

  • Article
  • Open Access
3 Citations
2,668 Views
22 Pages

Elicitation of Key Factors to Support Information Technology Outsourcing in Technological Innovation Hubs: Applying a Multicriteria Analytical Framework

  • Thalles André Cabral Silva,
  • Victor Diogho Heuer de Carvalho,
  • Robério José Rogério dos Santos,
  • Thiago Poleto and
  • Thyago Celso Cavalcante Nepomuceno

7 March 2023

This work presents an analytical framework for eliciting key factors for successful relationships between parties in information technology outsourcing (ITO) projects. The proposal was based on a multicriteria analysis to identify key factors within...

  • Article
  • Open Access
6 Citations
5,000 Views
22 Pages

Enhanced Learning and Forgetting Behavior for Contextual Knowledge Tracing

  • Mingzhi Chen,
  • Kaiquan Bian,
  • Yizhou He,
  • Zhefu Li and
  • Hua Zheng

7 March 2023

Knowledge tracing (KT) is based on modeling students’ behavior sequences to obtain students’ knowledge state and predict students’ future performance. The KT task aims to model students’ knowledge state in real-time according...

  • Article
  • Open Access
10 Citations
4,545 Views
14 Pages

6 March 2023

Malware is becoming an effective support tool not only for professional hackers but also for amateur ones. Due to the support of free malware generators, anyone can easily create various types of malicious code. The increasing amount of novel malware...

  • Article
  • Open Access
11 Citations
4,162 Views
18 Pages

6 March 2023

Various software engineering paradigms and real-time projects have proved that software testing is the most critical and highly important phase in the SDLC. In general, software testing takes approximately 40–60% of the total effort and time in...

  • Perspective
  • Open Access
13 Citations
5,580 Views
13 Pages

5 March 2023

In today’s world where virtual interaction is becoming more and more important, remote collaborative problem solving has become a promising teaching strategy. The motivation to promote collaborative science learning and the depth of group discu...

  • Article
  • Open Access
5 Citations
4,086 Views
28 Pages

Intrinsically Interpretable Gaussian Mixture Model

  • Nourah Alangari,
  • Mohamed El Bachir Menai,
  • Hassan Mathkour and
  • Ibrahim Almosallam

3 March 2023

Understanding the reasoning behind a predictive model’s decision is an important and longstanding problem driven by ethical and legal considerations. Most recent research has focused on the interpretability of supervised models, whereas unsuper...

  • Article
  • Open Access
6 Citations
5,357 Views
25 Pages

A Modular Architecture of Command-and-Control Software in Multi-Sensor Systems Devoted to Public Security

  • Maria Luisa Villani,
  • Antonio De Nicola,
  • Henri Bouma,
  • Arthur van Rooijen,
  • Pauli Räsänen,
  • Johannes Peltola,
  • Sirra Toivonen,
  • Massimiliano Guarneri,
  • Cristiano Stifini and
  • Luigi De Dominicis

3 March 2023

Preventing terrorist attacks at soft targets has become a priority for our society. The realization of sensor systems for automatic threat detection in crowded spaces, such as airports and metro stations, is challenged by the limited sensing coverage...

  • Article
  • Open Access
20 Citations
4,835 Views
26 Pages

A Virtual Reality Lab for Automotive Service Specialists: A Knowledge Transfer System in the Digital Age

  • Irina Makarova,
  • Jamila Mustafina,
  • Aleksey Boyko,
  • Larisa Fatikhova,
  • Gleb Parsin,
  • Polina Buyvol and
  • Vladimir Shepelev

3 March 2023

Under the influence of the COVID-19 pandemic, there is an accelerated transition from the traditional form of knowledge transfer to online learning. Our study of 344 automotive students showed that the success of this transition depends on the readin...

  • Article
  • Open Access
29 Citations
6,507 Views
15 Pages

Prediction Machine Learning Models on Propensity Convicts to Criminal Recidivism

  • Olha Kovalchuk,
  • Mikolaj Karpinski,
  • Serhiy Banakh,
  • Mykhailo Kasianchuk,
  • Ruslan Shevchuk and
  • Nataliya Zagorodna

3 March 2023

Increasing internal state security requires an understanding of the factors that influence the commission of repetitive crimes (recidivism) since the crime is not caused by public danger but by the criminal person. Against the background of informati...

  • Article
  • Open Access
8 Citations
4,199 Views
27 Pages

A Lattice-Based Certificateless Traceable Ring Signature Scheme

  • Junbin Liang,
  • Jianye Huang,
  • Qiong Huang,
  • Liantao Lan and
  • Man Ho Allen Au

2 March 2023

A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring s...

  • Article
  • Open Access
6 Citations
6,841 Views
13 Pages

2 March 2023

Music plays a crucial role in our lives, with growing consumption and engagement through streaming services and social media platforms. However, caution is needed for children, who may be exposed to explicit content through songs. Initiatives such as...

  • Article
  • Open Access
16 Citations
5,063 Views
33 Pages

2 March 2023

The cultural heritage sector has often acted as catalyst in allowing groups to coexist harmonically by investing in intercultural dialogue. Nonetheless, the vast majority of cultural experiences offered by cultural institutions rarely take provisions...

  • Article
  • Open Access
6 Citations
3,119 Views
22 Pages

2 March 2023

With the rapid development of mobile positioning technologies, location-based services (LBSs) have become more widely used. The amount of user location information collected and applied has increased, and if these datasets are directly released, atta...

  • Article
  • Open Access
3 Citations
2,590 Views
17 Pages

2 March 2023

As the recent COVID-19 pandemic has aptly demonstrated, emergency scenarios concerning public health and safety may require citizens to remain at home even as patients, potentially in the context of a municipal or national lockdown. Homestay patients...

  • Article
  • Open Access
8 Citations
3,837 Views
17 Pages

TeCre: A Novel Temporal Conflict Resolution Method Based on Temporal Knowledge Graph Embedding

  • Jiangtao Ma,
  • Chenyu Zhou,
  • Yonggang Chen,
  • Yanjun Wang,
  • Guangwu Hu and
  • Yaqiong Qiao

1 March 2023

Since the facts in the knowledge graph (KG) cannot be updated automatically over time, some facts have temporal conflicts. To discover and eliminate the temporal conflicts in the KG, this paper proposes a novel temporal conflict resolution method bas...

  • Article
  • Open Access
16 Citations
7,896 Views
32 Pages

LPG-Based Knowledge Graphs: A Survey, a Proposal and Current Trends

  • Davide Di Pierro,
  • Stefano Ferilli and
  • Domenico Redavid

1 March 2023

A significant part of the current research in the field of Artificial Intelligence is devoted to knowledge bases. New techniques and methodologies are emerging every day for the storage, maintenance and reasoning over knowledge bases. Recently, the m...

  • Article
  • Open Access
25 Citations
5,588 Views
22 Pages

A Roadside and Cloud-Based Vehicular Communications Framework for the Provision of C-ITS Services

  • Emanuel Vieira,
  • João Almeida,
  • Joaquim Ferreira,
  • Tiago Dias,
  • Ana Vieira Silva and
  • Lara Moura

1 March 2023

Road infrastructure plays a critical role in the support and development of the Cooperative Intelligent Transport Systems (C-ITS) paradigm. Roadside Units (RSUs), equipped with vehicular communication capabilities, traffic radars, cameras, and other...

  • Article
  • Open Access
4 Citations
2,869 Views
15 Pages

1 March 2023

Network environments have recently emerged as a considerable research area. In addition to government supervision, platform supervision is also critical to improve network environments. So, we should improve the social network platform’s single...

  • Article
  • Open Access
18 Citations
9,411 Views
17 Pages

1 March 2023

This study explores how natural language processing (NLP) can supplement content analyses of political documents, particularly the manifestos of political parties. NLP is particularly useful for tasks such as: estimating the similarity between docume...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489