Skip to Content

Information, Volume 15, Issue 10

2024 October - 78 articles

Cover Story: This study evaluates several cutting-edge avatar creation platforms within the metaverse, including VRChat, Ready Player Me, VRoid, and MetaHuman. By comparing these tools' customization, integration, and user experiences, the research identifies the best solutions for creating immersive digital identities. Moreover, it delves into the significant privacy and security concerns these virtual environments pose to users. The findings reveal that, while these platforms offer innovative solutions for creating immersive avatars, there is a pressing need for robust privacy protections. Understanding avatar creations’ technical aspects and privacy implications enables more secure and personalized metaverse interactions, shaping the future of virtual socialization and digital identity management. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (78)

  • Systematic Review
  • Open Access
12 Citations
25,743 Views
25 Pages

21 October 2024

In recent years, there has been growing interest in recommendation systems, which is matched by their widespread adoption across various sectors. This can be attributed to their effectiveness in reducing an avalanche of data into individualized infor...

  • Article
  • Open Access
3,071 Views
16 Pages

Sentence Embeddings and Semantic Entity Extraction for Identification of Topics of Short Fact-Checked Claims

  • Krzysztof Węcel,
  • Marcin Sawiński,
  • Włodzimierz Lewoniewski,
  • Milena Stróżyna,
  • Ewelina Księżniak and
  • Witold Abramowicz

21 October 2024

The objective of this research was to design a method to assign topics to claims debunked by fact-checking agencies. During the fact-checking process, access to more structured knowledge is necessary; therefore, we aim to describe topics with semanti...

  • Article
  • Open Access
20 Citations
4,628 Views
23 Pages

19 October 2024

Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analy...

  • Article
  • Open Access
2 Citations
3,119 Views
37 Pages

An Intelligent Approach to Automated Operating Systems Log Analysis for Enhanced Security

  • Obinna Johnphill,
  • Ali Safaa Sadiq,
  • Omprakash Kaiwartya and
  • Mohammad Aljaidi

19 October 2024

Self-healing systems have become essential in modern computing for ensuring continuous and secure operations while minimising downtime and maintenance costs. These systems autonomously detect, diagnose, and correct anomalies, with effective self-heal...

  • Article
  • Open Access
5 Citations
5,057 Views
22 Pages

19 October 2024

This paper presents a novel MRI super-resolution analysis model, MRISR. Through the utilization of generative adversarial networks for the estimation of degradation kernels and the injection of noise, we have constructed a comprehensive dataset of hi...

  • Article
  • Open Access
43 Citations
18,985 Views
24 Pages

19 October 2024

Over the past few decades, the field of fuzzy logic has evolved significantly, leading to the development of diverse techniques and applications. Fuzzy logic has been successfully combined with other artificial intelligence techniques such as artific...

  • Article
  • Open Access
1,251 Views
13 Pages

18 October 2024

Traffic sensors are vital to the development and operation of Intelligent Transportation Systems, providing essential data for traffic monitoring, management, and transportation infrastructure planning. However, optimizing the placement of these sens...

  • Article
  • Open Access
11 Citations
4,610 Views
32 Pages

Enhancing Brain Tumor Detection Through Custom Convolutional Neural Networks and Interpretability-Driven Analysis

  • Kavinda Ashan Kulasinghe Wasalamuni Dewage,
  • Raza Hasan,
  • Bacha Rehman and
  • Salman Mahmood

18 October 2024

Brain tumor detection is crucial for effective treatment planning and improved patient outcomes. However, existing methods often face challenges, such as limited interpretability and class imbalance in medical-imaging data. This study presents a nove...

  • Article
  • Open Access
3 Citations
2,290 Views
15 Pages

Image Stitching of Low-Resolution Retinography Using Fundus Blur Filter and Homography Convolutional Neural Network

  • Levi Santos,
  • Maurício Almeida,
  • João Almeida,
  • Geraldo Braz,
  • José Camara and
  • António Cunha

17 October 2024

Great advances in stitching high-quality retinal images have been made in recent years. On the other hand, very few studies have been carried out on low-resolution retinal imaging. This work investigates the challenges of low-resolution retinal image...

  • Article
  • Open Access
1 Citations
1,725 Views
25 Pages

17 October 2024

The growing volume of information available to decision-makers makes it increasingly challenging to process all data during decision-making. As a result, a method for selecting only relevant information is highly desirable. Moreover, since the meanin...

  • Article
  • Open Access
5 Citations
1,531 Views
21 Pages

17 October 2024

When single-phase ground faults occur in distribution systems, the fault characteristics of zero-sequence current signals are not prominent. They are quickly submerged in noise, leading to difficulties in fault section location. This paper proposes a...

  • Article
  • Open Access
2 Citations
1,434 Views
31 Pages

17 October 2024

In modern industrial applications, production quality, system performance, process reliability, and safety have received considerable attention. This article proposes a dynamic event-triggered attack estimator for Markovian jump stochastic systems su...

  • Article
  • Open Access
6 Citations
11,533 Views
20 Pages

17 October 2024

The study of linguistics applied to computer science is a much-discussed topic today. In this area, particularly relevant is the software localization process describing the linguistic and cultural adaptation of software products to a specific market...

  • Article
  • Open Access
6 Citations
2,345 Views
15 Pages

Machine Learning Ensemble Methodologies for the Prediction of the Failure Mode of Reinforced Concrete Beam–Column Joints

  • Martha Karabini,
  • Ioannis Karampinis,
  • Theodoros Rousakis,
  • Lazaros Iliadis and
  • Athanasios Karabinis

16 October 2024

One of the most critical aspects in the seismic behavior or reinforced concrete (RC) structures pertains to beam–column joints. Modern seismic design codes dictate that, if failure is to occur, then this should be the ductile yielding of the be...

  • Article
  • Open Access
2 Citations
4,911 Views
19 Pages

16 October 2024

Four types of archaeogenetic data mining are used to investigate the origin of the Minoans and the Uralic peoples: (1) six SNP mutations related to eye, hair, and skin phenotypes; (2) whole-genome admixture analysis using the G25 system; (3) an analy...

  • Review
  • Open Access
6 Citations
6,475 Views
26 Pages

16 October 2024

Autonomous vehicles (AVs) represent a transformative innovation in transportation, promising enhanced safety, efficiency, and sustainability. Despite these promises, achieving robustness, reliability, and adherence to ethical standards in AV systems...

  • Review
  • Open Access
16 Citations
11,462 Views
29 Pages

16 October 2024

Blockchain consensus mechanisms play a critical role in ensuring the security, decentralization, and integrity of distributed networks. As blockchain technology expands beyond cryptocurrencies into broader applications such as supply chain management...

  • Article
  • Open Access
4 Citations
7,693 Views
27 Pages

Phishing and the Human Factor: Insights from a Bibliometric Analysis

  • Meltem Mutlutürk,
  • Martin Wynn and
  • Bilgin Metin

15 October 2024

Academic research on the human element in phishing attacks is essential for developing effective prevention and detection strategies and guiding policymakers to protect individuals and organizations from cyber threats. This bibliometric study offers...

  • Article
  • Open Access
1 Citations
2,181 Views
21 Pages

15 October 2024

This study addresses the prevalent gap between structured models and informal architectural methodologies in software engineering. Recognizing the potential of informal architecture artifacts in analytical processes, we introduce a methodology that e...

  • Article
  • Open Access
9 Citations
3,587 Views
19 Pages

An Efficient Ensemble Approach for Brain Tumors Classification Using Magnetic Resonance Imaging

  • Zubair Saeed,
  • Tarraf Torfeh,
  • Souha Aouadi,
  • (Jim) Xiuquan Ji and
  • Othmane Bouhali

15 October 2024

Tumors in the brain can be life-threatening, making early and precise detection crucial for effective treatment and improved patient outcomes. Deep learning (DL) techniques have shown significant potential in automating the early diagnosis of brain t...

  • Article
  • Open Access
3 Citations
2,563 Views
20 Pages

15 October 2024

Human–robot collaboration (HRC) has become increasingly prevalent due to innovative advancements in the automation industry, especially in manufacturing setups. Although HRC increases productivity and efficacy, it exposes human workers to psych...

  • Article
  • Open Access
2 Citations
2,297 Views
15 Pages

15 October 2024

Support vector regression (SVR) is a powerful kernel-based regression prediction algorithm that performs excellently in various application scenarios. However, for real-world data, the general SVR often fails to achieve good predictive performance du...

  • Article
  • Open Access
12 Citations
6,470 Views
10 Pages

Promptology: Enhancing Human–AI Interaction in Large Language Models

  • Phillip Olla,
  • Lauren Elliott,
  • Mustafa Abumeeiz,
  • Karen Mihelich and
  • Joshua Olson

14 October 2024

This study investigates the integration of generative AI in higher education and the development of the SPARRO framework, a structured approach to improving human–AI interaction in academic settings. This ethnographic study explores the integra...

  • Article
  • Open Access
5 Citations
1,987 Views
19 Pages

14 October 2024

In recent decades, with the expansion of distributed energy generation technologies and the increasing need for more flexibility and efficiency in energy distribution systems, microgrids have been considered a promising innovative solution for local...

  • Article
  • Open Access
8 Citations
3,968 Views
21 Pages

14 October 2024

City planners are facing an emergency to develop, promote, and implement actions that allow the mobility needs of people and businesses in cities (and their surroundings) to be satisfied to assure a better quality of life. Among the different actions...

  • Article
  • Open Access
2 Citations
5,325 Views
19 Pages

14 October 2024

eHealth literacy (eHL) is directly linked to disease prevention, health promotion, and improved healthcare outcomes. The objectives of this study are to assess undergraduate university students’ knowledge and perceived skills of finding, apprai...

  • Article
  • Open Access
4 Citations
2,066 Views
18 Pages

14 October 2024

Agriculture stands as the cornerstone of Africa’s economy, supporting over 60% of the continent’s labor force. Despite its significance, the quality assessment of agricultural products remains a challenging task, particularly at a large s...

  • Article
  • Open Access
4 Citations
4,509 Views
15 Pages

14 October 2024

Interactive segmentation methods utilize user-provided positive and negative clicks to guide the model in accurately segmenting target objects. Compared to fully automatic medical image segmentation, these methods can achieve higher segmentation accu...

  • Article
  • Open Access
17 Citations
5,687 Views
15 Pages

13 October 2024

This study aims to develop a new theoretical framework from the perspective of the Technology Acceptance Model (TAM), incorporating flow theory, to explore the factors influencing behavioral intentions to participate in metaverse tourism. Using data...

  • Review
  • Open Access
13 Citations
10,520 Views
17 Pages

13 October 2024

The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack susceptibilities. This systematic literature review investigates machine learn...

  • Article
  • Open Access
4 Citations
2,720 Views
16 Pages

12 October 2024

The real-time data collected by wearable devices enables personalized health management and supports public health monitoring. However, sharing these data with third-party organizations introduces significant privacy risks. As a result, protecting an...

  • Article
  • Open Access
2 Citations
3,064 Views
21 Pages

Using 3D Hand Pose Data in Recognizing Human–Object Interaction and User Identification for Extended Reality Systems

  • Danish Hamid,
  • Muhammad Ehatisham Ul Haq,
  • Amanullah Yasin,
  • Fiza Murtaza and
  • Muhammad Awais Azam

12 October 2024

Object detection and action/gesture recognition have become imperative in security and surveillance fields, finding extensive applications in everyday life. Advancement in such technologies will help in furthering cybersecurity and extended reality s...

  • Article
  • Open Access
1 Citations
1,959 Views
14 Pages

Participatory Renewal of Historic Districts Based on Bayesian Network

  • Yang Yang,
  • Yanliang Xia,
  • Jilong Zhao and
  • Chunlu Liu

11 October 2024

Public participation is a requirement for contemporary urban governance in China, especially in the protection planning of historic districts. In the rapid development stage, many historic districts have lost their functional positioning in cities an...

  • Review
  • Open Access
7 Citations
5,978 Views
23 Pages

Machine Learning Approaches in Multi-Cancer Early Detection

  • Maryam Hajjar,
  • Somayah Albaradei and
  • Ghadah Aldabbagh

11 October 2024

Cancer is a prominent global cause of mortality, primarily due to delayed detection leading to limited treatment options. Current screening methods are mostly invasive and involve complex lengthy processes with high costs. Moreover, each screening ty...

  • Article
  • Open Access
6 Citations
6,965 Views
17 Pages

Graph Neural Networks: A Bibliometric Mapping of the Research Landscape and Applications

  • Annielle Mendes Brito da Silva,
  • Natiele Carla da Silva Ferreira,
  • Luiza Amara Maciel Braga,
  • Fabio Batista Mota,
  • Victor Maricato and
  • Luiz Anastacio Alves

11 October 2024

Graph neural networks (GNNs) are deep learning algorithms that process graph-structured data and are suitable for applications such as social networks, physical models, financial markets, and molecular predictions. Bibliometrics, a tool for tracking...

  • Article
  • Open Access
7 Citations
2,509 Views
17 Pages

11 October 2024

Automated Machine Learning (AutoML) enhances productivity and efficiency by automating the entire process of machine learning model development, from data preprocessing to model deployment. These tools are accessible to users with varying levels of e...

  • Article
  • Open Access
14 Citations
9,783 Views
25 Pages

10 October 2024

This study explores the process of creating avatars for Virtual Reality and metaverse environments using a variety of specialized applications, including VRChat, Ready Player Me, VRoidStudio, Mixamo, Convai, and MetaHuman. By evaluating these platfor...

  • Article
  • Open Access
2 Citations
2,334 Views
20 Pages

A Study of Exergame System Using Hand Gestures for Wrist Flexibility Improvement for Tenosynovitis Prevention

  • Yanqi Xiao,
  • Nobuo Funabiki,
  • Irin Tri Anggraini,
  • Cheng-Liang Shih and
  • Chih-Peng Fan

10 October 2024

Currently, as an increasing number of people have been addicted to using cellular phones, smartphone tenosynovitis has become common from long-term use of fingers for their operations. Hand exercise while playing video games, which is called exergame...

  • Article
  • Open Access
2,827 Views
16 Pages

AI-Enhanced Personality Identification of Websites

  • Shafquat Ali Chishti,
  • Iman Ardekani and
  • Soheil Varastehpour

10 October 2024

This paper addresses the challenge of objectively determining a website’s personality by developing a methodology based on automated quantitative analysis, thus avoiding the biases inherent in human surveys. Utilizing a database of 3000 website...

  • Article
  • Open Access
2 Citations
2,970 Views
22 Pages

Sensitivity Analysis of Traffic Sign Recognition to Image Alteration and Training Data Size

  • Arthur Rubio,
  • Guillaume Demoor,
  • Simon Chalmé,
  • Nicolas Sutton-Charani and
  • Baptiste Magnier

10 October 2024

Accurately classifying road signs is crucial for autonomous driving due to the high stakes involved in ensuring safety and compliance. As Convolutional Neural Networks (CNNs) have largely replaced traditional Machine Learning models in this domain, t...

  • Article
  • Open Access
6 Citations
5,735 Views
17 Pages

10 October 2024

This study focuses on the development and evaluation of an AI-based digital therapeutic prototype for adolescent mental health management and disaster response. The system integrates real-time monitoring, AI-driven conversation analysis, personalized...

  • Review
  • Open Access
5 Citations
3,907 Views
24 Pages

10 October 2024

This review addresses the fragmented literature on administrative interventions for cybercrime mitigation within e-government services, which often prioritise technological aspects over a unified theoretical framework. By analysing 32 peer-reviewed a...

  • Article
  • Open Access
4 Citations
1,682 Views
14 Pages

Real-Time Nonlinear Image Reconstruction in Electrical Capacitance Tomography Using the Generative Adversarial Network

  • Damian Wanta,
  • Mikhail Ivanenko,
  • Waldemar T. Smolik,
  • Przemysław Wróblewski and
  • Mateusz Midura

9 October 2024

This study investigated the potential of the generative adversarial neural network (cGAN) image reconstruction in industrial electrical capacitance tomography. The image reconstruction quality was examined using image patterns typical for a two-phase...

  • Article
  • Open Access
3 Citations
1,856 Views
17 Pages

Gaussian Kernel Approximations Require Only Bit-Shifts

  • R. J. Cintra,
  • Paulo Martinez,
  • André Leite,
  • Vítor A. Coutinho,
  • Fábio M. Bayer,
  • Arjuna Madanayake and
  • Diego F. G. Coelho

9 October 2024

An approach to approximate the 2D Gaussian filter for all possible kernel sizes based on the binary optimization technique is introduced. The approximate filter coefficients are designed as negative powers of two, allowing hardware implementation wit...

  • Review
  • Open Access
3 Citations
3,688 Views
33 Pages

Smart Supervision of Public Expenditure: A Review on Data Capture, Storage, Processing, and Interoperability with a Case Study from Colombia

  • Jaime A. Restrepo-Carmona,
  • Juan C. Zuluaga,
  • Manuela Velásquez,
  • Carolina Zuluaga,
  • Rosse M. Villamil,
  • Olguer Morales,
  • Ángela M. Hurtado,
  • Carlos A. Escobar,
  • Julián Sierra-Pérez and
  • Rafael E. Vásquez

9 October 2024

Effective fiscal control and monitoring of public management are critical for preventing and mitigating corruption, which in turn, enhances government performance and benefits citizens. Given the vast amounts of data involved in government operations...

  • Article
  • Open Access
2,122 Views
15 Pages

7 October 2024

Analyzing the uncertainty of outcomes based on estimates of the data’s membership degrees to fuzzy sets is essential for making decisions. These fuzzy sets are often designated by experts as strong fuzzy partitions of the data domain with trape...

  • Article
  • Open Access
7 Citations
4,899 Views
20 Pages

An Independent Learning System for Flutter Cross-Platform Mobile Programming with Code Modification Problems

  • Safira Adine Kinari,
  • Nobuo Funabiki,
  • Soe Thandar Aung,
  • Khaing Hsu Wai,
  • Mustika Mentari and
  • Pradini Puspitaningayu

7 October 2024

Nowadays, with the common use of smartphones in daily lives, mobile applications have become popular around the world, which will lead to a rise in Flutter framework. Developed by Google, Flutter with Dart programming provides a cross-platform develo...

  • Article
  • Open Access
2 Citations
3,423 Views
17 Pages

Design and Development Model of a Web Accessibility Ecosystem

  • Galina Bogdanova,
  • Todor Todorov,
  • Juliana Dochkova-Todorova,
  • Nikolay Noev and
  • Negoslav Sabev

7 October 2024

The article examines issues of web accessibility ecosystems for people with special needs. Methods, models, accessibility standards, and technologies related to the structure, design, and functionality of the web accessibility ecosystem are studied....

  • Article
  • Open Access
5 Citations
2,630 Views
29 Pages

6 October 2024

Detecting Traumatic Brain Injuries (TBI) through imaging remains challenging due to limited sensitivity in current methods. This study addresses the gap by proposing a novel approach integrating deep-learning algorithms and advanced image-fusion tech...

  • Article
  • Open Access
11 Citations
6,562 Views
15 Pages

6 October 2024

Pulmonary diseases, including pneumonia, represent a significant health challenge and are often diagnosed using X-rays. This study investigates the effectiveness of artificial intelligence (AI) in enhancing the diagnostic capabilities of X-ray imagin...

of 2

XFacebookLinkedIn
Information - ISSN 2078-2489