Skip to Content

Information, Volume 14, Issue 5

2023 May - 47 articles

Cover Story: This study presents a novel image-based insect trap that overcomes the limitations of traditional camera insect-traps. Unlike existing traps, this device does not rely on manual image annotation for pest counting and incorporates self-disposal of captured insects, making it suitable for long-term deployment. The trap integrates an imaging sensor with Raspberry Pi microcontroller units and embedded deep learning algorithms. It utilizes a pheromone-based funnel trap to count agricultural pests. Additionally, the device receives instructions from a server for configuration, and a servomotor automatically rotates the trap's bottom to dispose of dehydrated captured insects. This design eliminates the challenge of overlap and occlusion caused by decaying insects during extended operation. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (47)

  • Article
  • Open Access
7 Citations
3,808 Views
13 Pages

The multi-objective optimization (MOO) of complex systems remains a challenging task in engineering domains. The methodological approach of applying MOO algorithms to simulation-enabled models has established itself as a standard. Despite increasing...

  • Article
  • Open Access
1 Citations
2,613 Views
11 Pages

Parallel sentences play a crucial role in various NLP tasks, particularly for cross-lingual tasks such as machine translation. However, due to the time-consuming and laborious nature of manual construction, many low-resource languages still suffer fr...

  • Article
  • Open Access
6 Citations
5,958 Views
18 Pages

Heart rate measurement employing photoplethysmography (PPG) is a prevalent technique for wearable devices. However, the acquired PPG signal is often contaminated with motion artifacts, which need to be accurately removed. In cases where the PPG and a...

  • Article
  • Open Access
1 Citations
4,442 Views
16 Pages

Lightweight Implicit Blur Kernel Estimation Network for Blind Image Super-Resolution

  • Asif Hussain Khan,
  • Christian Micheloni and
  • Niki Martinel

Blind image super-resolution (Blind-SR) is the process of leveraging a low-resolution (LR) image, with unknown degradation, to generate its high-resolution (HR) version. Most of the existing blind SR techniques use a degradation estimator network to...

  • Review
  • Open Access
30 Citations
14,603 Views
19 Pages

Blockchain is the foundation of all cryptocurrencies, while machine learning (ML) is one of the most popular technologies with a wide range of possibilities. Blockchain may be improved and made more effective by using ML. Even though blockchain techn...

  • Article
  • Open Access
7 Citations
3,660 Views
16 Pages

Virtual and Augmented Experience in Virtual Learning Tours

  • Fotios Bosmos,
  • Alexandros T. Tzallas,
  • Markos G. Tsipouras,
  • Evripidis Glavas and
  • Nikolaos Giannakeas

The aim of this work is to highlight the possibilities of using VR applications in the informal learning process. This is attempted through the development of virtual reality cultural applications for historical monuments. For this purpose, the theor...

  • Article
  • Open Access
8 Citations
2,427 Views
14 Pages

Semi-Supervised Model for Aspect Sentiment Detection

  • Zohreh Madhoushi,
  • Abdul Razak Hamdan and
  • Suhaila Zainudin

Advancements in text representation have produced many deep language models (LMs), such as Word2Vec and recurrent-based LMs. However, there are scarce works that focus on detecting implicit sentiments with a small amount of labelled data because ther...

  • Article
  • Open Access
7 Citations
3,363 Views
32 Pages

Online Task Scheduling of Big Data Applications in the Cloud Environment

  • Laila Bouhouch,
  • Mostapha Zbakh and
  • Claude Tadonki

The development of big data has generated data-intensive tasks that are usually time-consuming, with a high demand on cloud data centers for hosting big data applications. It becomes necessary to consider both data and task management to find the opt...

  • Article
  • Open Access
6 Citations
2,499 Views
22 Pages

Evaluation and selection of a third-party reverse logistics provider (3PRLP) is an important tool for enterprises to improve the level of reverse logistics management. The identification of critical indicators plays a crucial role in the evaluation p...

  • Article
  • Open Access
20 Citations
10,137 Views
22 Pages

Simulated Autonomous Driving Using Reinforcement Learning: A Comparative Study on Unity’s ML-Agents Framework

  • Yusef Savid,
  • Reza Mahmoudi,
  • Rytis Maskeliūnas and
  • Robertas Damaševičius

Advancements in artificial intelligence are leading researchers to find use cases that were not as straightforward to solve in the past. The use case of simulated autonomous driving has been known as a notoriously difficult task to automate, but adva...

  • Article
  • Open Access
6 Citations
2,998 Views
14 Pages

This research explored the influence of interoception and social frame on the coherence of inter-brain electrophysiological (EEG) and hemodynamic (collected by functional Near Infrared Spectroscopy, fNIRS) functional connectivity during a motor synch...

  • Article
  • Open Access
5 Citations
6,176 Views
20 Pages

Intent Classification by the Use of Automatically Generated Knowledge Graphs

  • Mihael Arcan,
  • Sampritha Manjunath,
  • Cécile Robin,
  • Ghanshyam Verma,
  • Devishree Pillai,
  • Simon Sarkar,
  • Sourav Dutta,
  • Haytham Assem,
  • John P. McCrae and
  • Paul Buitelaar

Intent classification is an essential task for goal-oriented dialogue systems for automatically identifying customers’ goals. Although intent classification performs well in general settings, domain-specific user goals can still present a chall...

  • Article
  • Open Access
4 Citations
3,647 Views
14 Pages

Engagement with Optional Formative Feedback in a Portfolio-Based Digital Design Module

  • Eirini Kalaitzopoulou,
  • Paul Matthews,
  • Stylianos Mystakidis and
  • Athanasios Christopoulos

Design skills are considered important in software engineering, and formative feedback may facilitate the learning process and help students master those skills. However, little is known about student usage of and reaction to the feedback and its imp...

  • Article
  • Open Access
3 Citations
2,411 Views
16 Pages

In this paper, we propose a new method of optimization based on genetic algorithms using the MATLAB toolbox “Global Optimization”. The algorithm finds layers moduli of a flexible pavement through the measurement of pavement surface deflec...

  • Review
  • Open Access
169 Citations
28,200 Views
28 Pages

In the realm of multi-criteria decision-making (MCDM) problems, the selection of a weighting method holds a critical role. Researchers from diverse fields have consistently employed MCDM techniques, utilizing both traditional and novel methods to enh...

  • Article
  • Open Access
3 Citations
2,866 Views
18 Pages

Intelligence Amplification-Based Smart Health Record Chain for Enterprise Management System

  • S. Velliangiri,
  • P. Karthikeyan,
  • Vinayakumar Ravi,
  • Meshari Almeshari and
  • Yasser Alzamil

Medical service providers generate many healthcare records containing sensitive and private information about a patient’s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcar...

  • Article
  • Open Access
3 Citations
2,292 Views
17 Pages

Uyghur–Kazakh–Kirghiz Text Keyword Extraction Based on Morpheme Segmentation

  • Sardar Parhat,
  • Mutallip Sattar,
  • Askar Hamdulla and
  • Abdurahman Kadir

In this study, based on a morpheme segmentation framework, we researched a text keyword extraction method for Uyghur, Kazakh and Kirghiz languages, which have similar grammatical and lexical structures. In these languages, affixes and a stem are join...

  • Article
  • Open Access
3 Citations
3,288 Views
16 Pages

A Double-Stage 3D U-Net for On-Cloud Brain Extraction and Multi-Structure Segmentation from 7T MR Volumes

  • Selene Tomassini,
  • Haidar Anbar,
  • Agnese Sbrollini,
  • MHD Jafar Mortada,
  • Laura Burattini and
  • Micaela Morettini

The brain is the organ most studied using Magnetic Resonance (MR). The emergence of 7T scanners has increased MR imaging resolution to a sub-millimeter level. However, there is a lack of automatic segmentation techniques for 7T MR volumes. This resea...

  • Article
  • Open Access
9 Citations
3,771 Views
18 Pages

When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables...

  • Article
  • Open Access
8 Citations
3,689 Views
18 Pages

Blockchain-Based Automated Market Makers for a Decentralized Stock Exchange

  • Radhakrishna Dodmane,
  • Raghunandan K. R.,
  • Krishnaraj Rao N. S.,
  • Bhavya Kallapu.,
  • Surendra Shetty,
  • Muhammad Aslam and
  • Syeda Fizzah Jilani

The advancements in communication speeds have enabled the centralized financial market to be faster and more complex than ever. The speed of the order execution has become exponentially faster when compared to the early days of electronic markets. Th...

  • Article
  • Open Access
8 Citations
11,985 Views
13 Pages

According to the American Humane Association, millions of cats and dogs are lost yearly. Only a few thousand of them are found and returned home. In this work, we use deep learning to help expedite the procedure of finding lost cats and dogs, for whi...

  • Systematic Review
  • Open Access
9 Citations
4,952 Views
17 Pages

This paper reviews the research on adaptive serious games for programming regarding the implementation of their support systems. Serious games are designed to educate players in an entertaining and engaging manner. A key element in terms of meeting t...

  • Article
  • Open Access
5 Citations
5,119 Views
20 Pages

To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize dat...

  • Article
  • Open Access
10 Citations
4,989 Views
23 Pages

Optimization using genetic algorithms (GA) is a well-known strategy in several scientific disciplines. The crossover is an essential operator of the genetic algorithm. It has been an active area of research to develop sustainable forms for this opera...

  • Article
  • Open Access
11 Citations
5,446 Views
22 Pages

Continuous User Authentication on Multiple Smart Devices

  • Yajie Wang,
  • Xiaomei Zhang and
  • Haomin Hu

Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have...

  • Article
  • Open Access
7 Citations
4,126 Views
13 Pages

Quadrilateral Mesh Generation Method Based on Convolutional Neural Network

  • Yuxiang Zhou,
  • Xiang Cai,
  • Qingfeng Zhao,
  • Zhoufang Xiao and
  • Gang Xu

The frame field distributed inside the model region characterizes the singular structure features inside the model. These singular structures can be used to decompose the model region into multiple quadrilateral structures, thereby generating a block...

  • Article
  • Open Access
18 Citations
4,541 Views
13 Pages

Improving Semantic Information Retrieval Using Multinomial Naive Bayes Classifier and Bayesian Networks

  • Wiem Chebil,
  • Mohammad Wedyan,
  • Moutaz Alazab,
  • Ryan Alturki and
  • Omar Elshaweesh

This research proposes a new approach to improve information retrieval systems based on a multinomial naive Bayes classifier (MNBC), Bayesian networks (BNs), and a multi-terminology which includes MeSH thesaurus (Medical Subject Headings) and SNOMED...

  • Article
  • Open Access
5 Citations
4,016 Views
20 Pages

Quantifying the Dissimilarity of Texts

  • Benjamin Shade and
  • Eduardo G. Altmann

Quantifying the dissimilarity of two texts is an important aspect of a number of natural language processing tasks, including semantic information retrieval, topic classification, and document clustering. In this paper, we compared the properties and...

  • Article
  • Open Access
4 Citations
3,504 Views
16 Pages

Enhancing Traceability Link Recovery with Fine-Grained Query Expansion Analysis

  • Tao Peng,
  • Kun She,
  • Yimin Shen,
  • Xiangliang Xu and
  • Yue Yu

Requirement traceability links are an essential part of requirement management software and are a basic prerequisite for software artifact changes. The manual establishment of requirement traceability links is time-consuming. When faced with large pr...

  • Article
  • Open Access
24 Citations
5,535 Views
19 Pages

A Hybrid Univariate Traffic Congestion Prediction Model for IoT-Enabled Smart City

  • Ayushi Chahal,
  • Preeti Gulia,
  • Nasib Singh Gill and
  • Ishaani Priyadarshini

30 April 2023

IoT devices collect time-series traffic data, which is stochastic and complex in nature. Traffic flow prediction is a thorny task using this kind of data. A smart traffic congestion prediction system is a need of sustainable and economical smart citi...

  • Article
  • Open Access
12 Citations
5,658 Views
21 Pages

Image-Based Insect Counting Embedded in E-Traps That Learn without Manual Image Annotation and Self-Dispose Captured Insects

  • Ioannis Saradopoulos,
  • Ilyas Potamitis,
  • Antonios I. Konstantaras,
  • Panagiotis Eliopoulos,
  • Stavros Ntalampiras and
  • Iraklis Rigakis

30 April 2023

This study describes the development of an image-based insect trap diverging from the plug-in camera insect trap paradigm in that (a) it does not require manual annotation of images to learn how to count targeted pests, and (b) it self-disposes the c...

  • Article
  • Open Access
2 Citations
2,689 Views
14 Pages

30 April 2023

During the deployment of practical applications, reservoir computing (RC) is highly susceptible to radiation effects, temperature changes, and other factors. Normal reservoirs are difficult to vouch for. To solve this problem, this paper proposed a r...

  • Article
  • Open Access
38 Citations
7,499 Views
18 Pages

Energy Usage Forecasting Model Based on Long Short-Term Memory (LSTM) and eXplainable Artificial Intelligence (XAI)

  • Muhammad Rifqi Maarif,
  • Arif Rahman Saleh,
  • Muhammad Habibi,
  • Norma Latif Fitriyani and
  • Muhammad Syafrudin

29 April 2023

The accurate forecasting of energy consumption is essential for companies, primarily for planning energy procurement. An overestimated or underestimated forecasting value may lead to inefficient energy usage. Inefficient energy usage could also lead...

  • Article
  • Open Access
2,407 Views
21 Pages

Conflict Resolution as a Combinatorial Optimization Problem

  • Ekaterina Antipova and
  • Sergey Rashkovskiy

29 April 2023

Within the framework of the mathematical theory of conflicts, we consider a multi-criterial conflict situation using the example of a child–parent conflict. A general method for constructing a conflict diagram is described and possible ways of...

  • Article
  • Open Access
33 Citations
5,770 Views
20 Pages

A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity

  • Saci Medileh,
  • Abdelkader Laouid,
  • Mohammad Hammoudeh,
  • Mostefa Kara,
  • Tarek Bejaoui,
  • Amna Eleyan and
  • Mohammed Al-Khalidi

28 April 2023

In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as r...

  • Article
  • Open Access
15 Citations
4,720 Views
20 Pages

Decomposed Two-Stage Prompt Learning for Few-Shot Named Entity Recognition

  • Feiyang Ye,
  • Liang Huang,
  • Senjie Liang and
  • KaiKai Chi

28 April 2023

Named entity recognition (NER) in a few-shot setting is an extremely challenging task, and most existing methods fail to account for the gap between NER tasks and pre-trained language models. Although prompt learning has been successfully applied in...

  • Article
  • Open Access
13 Citations
5,510 Views
15 Pages

Challenges in Agile Software Maintenance for Local and Global Development: An Empirical Assessment

  • Mohammed Almashhadani,
  • Alok Mishra,
  • Ali Yazici and
  • Muhammad Younas

27 April 2023

Agile methods have gained wide popularity recently due to their characteristics in software development. Despite the success of agile methods in the software maintenance process, several challenges have been reported. In this study, we investigate th...

  • Article
  • Open Access
7 Citations
3,927 Views
17 Pages

Is Users’ Trust during Automated Driving Different When Using an Ambient Light HMI, Compared to an Auditory HMI?

  • Rafael Cirino Gonçalves,
  • Tyron Louw,
  • Yee Mun Lee,
  • Ruth Madigan,
  • Jonny Kuo,
  • Mike Lenné and
  • Natasha Merat

27 April 2023

The aim of this study was to compare the success of two different Human Machine Interfaces (HMIs) in attracting drivers’ attention when they were engaged in a Non-Driving-Related Task (NDRT) during SAE Level 3 driving. We also assessed the valu...

  • Article
  • Open Access
20 Citations
3,107 Views
16 Pages

Generation of Nonlinear Substitutions by Simulated Annealing Algorithm

  • Alexandr Kuznetsov,
  • Mikolaj Karpinski,
  • Ruslana Ziubina,
  • Sergey Kandiy,
  • Emanuele Frontoni,
  • Oleksandr Peliukh,
  • Olga Veselska and
  • Ruslan Kozak

26 April 2023

The problem of nonlinear substitution generation (S-boxes) is investigated in many related works in symmetric key cryptography. In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substi...

  • Article
  • Open Access
5 Citations
2,544 Views
19 Pages

26 April 2023

With the increasing complexity of building structures and interior materials, the danger of indoor fires has become more severe. It is effective to improve the accuracy and timeliness of fire-sensing devices in order to reduce the harm caused by fire...

  • Article
  • Open Access
3 Citations
2,877 Views
14 Pages

25 April 2023

The increasing complexity of vehicle design, the use of new engine types and fuels, and the increasing intelligence of automobiles are making it increasingly difficult to ensure trouble-free operation. Finding faulty parts quickly and accurately is b...

  • Article
  • Open Access
24 Citations
5,427 Views
24 Pages

On the Soundness of XAI in Prognostics and Health Management (PHM)

  • David Solís-Martín,
  • Juan Galán-Páez and
  • Joaquín Borrego-Díaz

24 April 2023

The aim of predictive maintenance, within the field of prognostics and health management (PHM), is to identify and anticipate potential issues in the equipment before these become serious. The main challenge to be addressed is to assess the amount of...

  • Article
  • Open Access
3 Citations
2,417 Views
19 Pages

Distilling Knowledge with a Teacher’s Multitask Model for Biomedical Named Entity Recognition

  • Tahir Mehmood,
  • Alfonso E. Gerevini,
  • Alberto Lavelli,
  • Matteo Olivato and
  • Ivan Serina

24 April 2023

Single-task models (STMs) struggle to learn sophisticated representations from a finite set of annotated data. Multitask learning approaches overcome these constraints by simultaneously training various associated tasks, thereby learning generic repr...

  • Article
  • Open Access
5 Citations
5,964 Views
30 Pages

23 April 2023

In this paper, we analyzed a dataset of over 2000 crypto-assets to assess their credit risk by computing their probability of death using the daily range. Unlike conventional low-frequency volatility models that only utilize close-to-close prices, th...

  • Article
  • Open Access
11 Citations
5,196 Views
22 Pages

22 April 2023

In recent years, digital audio tampering detection methods by extracting audio electrical network frequency (ENF) features have been widely applied. However, most digital audio tampering detection methods based on ENF have the problems of focusing on...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489