Skip to Content

Information, Volume 15, Issue 4

2024 April - 70 articles

Cover Story: The costs of deploying and expanding a 5G network are not negligible. Neutral hosts play a central role in providing cost-effective 5G services. This paper presents a new infrastructure-sharing 5G neutral host solution based on roaming and network slicing. Its flexible architecture supports both mobile network operators (MNOs) and non-MNO tenants. The proposed solution selects a set of 5G network functions (NFs) to provide all the necessary services to the tenants, improving the scalability and resource management, while ensuring traffic isolation and policy control over the end users. Another contribution of this work is the implementation of the proposed architecture in a simulation environment using open-source tools, as well as its functional requirement and performance analyses. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (70)

  • Article
  • Open Access
25 Citations
19,676 Views
24 Pages

21 April 2024

In the intersecting fields of data mining (DM) and sports analytics, the impact of socioeconomic, demographic, and injury-related factors on sports performance and economics has been extensively explored. A novel methodology is proposed and evaluated...

  • Article
  • Open Access
4 Citations
4,151 Views
16 Pages

Automated Trace Clustering Pipeline Synthesis in Process Mining

  • Iuliana Malina Grigore,
  • Gabriel Marques Tavares,
  • Matheus Camilo da Silva,
  • Paolo Ceravolo and
  • Sylvio Barbon Junior

20 April 2024

Business processes have undergone a significant transformation with the advent of the process-oriented view in organizations. The increasing complexity of business processes and the abundance of event data have driven the development and widespread a...

  • Article
  • Open Access
1 Citations
2,028 Views
12 Pages

20 April 2024

Spatial and temporal uncertainties are found in data for many critical applications. This paper describes the use of interval-based representations of some spatial and temporal information. Uncertainties in the information can arise from multiple sou...

  • Article
  • Open Access
10 Citations
4,921 Views
22 Pages

Deep Learning-Based Road Pavement Inspection by Integrating Visual Information and IMU

  • Chen-Chiung Hsieh,
  • Han-Wen Jia,
  • Wei-Hsin Huang and
  • Mei-Hua Hsih

20 April 2024

This study proposes a deep learning method for pavement defect detection, focusing on identifying potholes and cracks. A dataset comprising 10,828 images is collected, with 8662 allocated for training, 1083 for validation, and 1083 for testing. Vehic...

  • Article
  • Open Access
2 Citations
2,600 Views
16 Pages

Constructing Semantic Summaries Using Embeddings

  • Georgia Eirini Trouli,
  • Nikos Papadakis and
  • Haridimos Kondylakis

20 April 2024

The increase in the size and complexity of large knowledge graphs now available online has resulted in the emergence of many approaches focusing on enabling the quick exploration of the content of those data sources. Structural non-quotient semantic...

  • Article
  • Open Access
3 Citations
2,515 Views
18 Pages

19 April 2024

While new technologies are expected to revolutionise and become game-changers in improving the efficiency and practices of our daily lives, it is also critical to investigate and understand the barriers and opportunities faced by their adopters. Such...

  • Article
  • Open Access
204 Citations
39,117 Views
36 Pages

19 April 2024

Support vector machines (SVMs) are well-known machine learning algorithms for classification and regression applications. In the healthcare domain, they have been used for a variety of tasks including diagnosis, prognosis, and prediction of disease o...

  • Article
  • Open Access
4 Citations
2,866 Views
19 Pages

A Fuzzy Synthetic Evaluation Approach to Assess Usefulness of Tourism Reviews by Considering Bias Identified in Sentiments and Articulacy

  • Dimitrios K. Kardaras,
  • Christos Troussas,
  • Stavroula G. Barbounaki,
  • Panagiota Tselenti and
  • Konstantinos Armyras

19 April 2024

Assessing the usefulness of reviews has been the aim of several research studies. However, results regarding the significance of usefulness determinants are often contradictory, thus decreasing the accuracy of reviews’ helpfulness estimation. A...

  • Article
  • Open Access
3 Citations
2,477 Views
30 Pages

Exploiting Properties of Student Networks to Enhance Learning in Distance Education

  • Rozita Tsoni,
  • Evgenia Paxinou,
  • Aris Gkoulalas-Divanis,
  • Dimitrios Karapiperis,
  • Dimitrios Kalles and
  • Vassilios S. Verykios

19 April 2024

Distance Learning has become the “new normal”, especially during the pandemic and due to the technological advances that are incorporated into the teaching procedure. At the same time, the augmented use of the internet has blurred the bor...

  • Article
  • Open Access
7 Citations
4,704 Views
24 Pages

Enhancing Child Safety in Online Gaming: The Development and Application of Protectbot, an AI-Powered Chatbot Framework

  • Anum Faraz,
  • Fardin Ahsan,
  • Jinane Mounsef,
  • Ioannis Karamitsos and
  • Andreas Kanavos

19 April 2024

This study introduces Protectbot, an innovative chatbot framework designed to improve safety in children’s online gaming environments. At its core, Protectbot incorporates DialoGPT, a conversational Artificial Intelligence (AI) model rooted in...

  • Article
  • Open Access
1 Citations
3,153 Views
17 Pages

Cloud Broker: Customizing Services for Cloud Market Requirements

  • Evangelia Filiopoulou,
  • Georgios Chatzithanasis,
  • Christos Michalakelis and
  • Mara Nikolaidou

19 April 2024

Cloud providers offer various purchasing options to enable users to tailor their costs according to their specific requirements, including on-demand, reserved instances, and spot instances. On-demand and spot instances satisfy short-term workloads, w...

  • Article
  • Open Access
5 Citations
2,413 Views
17 Pages

Two-Stage Convolutional Neural Network for Classification of Movement Patterns in Tremor Patients

  • Patricia Weede,
  • Piotr Dariusz Smietana,
  • Gregor Kuhlenbäumer,
  • Günther Deuschl and
  • Gerhard Schmidt

18 April 2024

Accurate tremor classification is crucial for effective patient management and treatment. However, clinical diagnoses are often hindered by misdiagnoses, necessitating the development of robust technical methods. Here, we present a two-stage convolut...

  • Article
  • Open Access
9 Citations
4,011 Views
20 Pages

18 April 2024

Ground objects in satellite images pose unique challenges due to their low resolution, small pixel size, lack of texture features, and dense distribution. Detecting small objects in satellite remote-sensing images is a difficult task. We propose a ne...

  • Article
  • Open Access
3 Citations
3,471 Views
33 Pages

A User Study on Modeling IoT-Aware Processes with BPMN 2.0

  • Yusuf Kirikkayis,
  • Michael Winter and
  • Manfred Reichert

18 April 2024

Integrating the Internet of Things (IoT) into business process management (BPM) aims to increase the automation level, efficiency, transparency, and comprehensibility of the business processes taking place in the physical world. The IoT enables the s...

  • Article
  • Open Access
9 Citations
3,918 Views
14 Pages

18 April 2024

Uncertainty presents unfamiliar circumstances or incomplete information that may be difficult to handle with a single model of a traditional machine learning algorithm. They are possibly limited by inadequate data, an ambiguous model, and learning pe...

  • Article
  • Open Access
15 Citations
7,724 Views
25 Pages

An Optimized Deep Learning Approach for Detecting Fraudulent Transactions

  • Said El Kafhali,
  • Mohammed Tayebi and
  • Hamza Sulimani

18 April 2024

The proliferation of new technologies and advancements in existing ones are altering our perspective of the world. So, continuous improvements are needed. A connected world filled with a vast amount of data was created as a result of the integration...

  • Article
  • Open Access
12 Citations
10,025 Views
28 Pages

17 April 2024

The recent past has witnessed a growing interest in technologies for creating chatbots. Advances in Large Language Models for natural language processing are underpinning rapid progress in chatbot development, and experts predict revolutionary change...

  • Article
  • Open Access
6 Citations
2,476 Views
21 Pages

Economic Scheduling Model of an Active Distribution Network Based on Chaotic Particle Swarm Optimization

  • Yaxuan Xu,
  • Jianuo Liu,
  • Zhongqi Cui,
  • Ziying Liu,
  • Chenxu Dai,
  • Xiangzhen Zang and
  • Zhanlin Ji

17 April 2024

With the continuous increase in global energy demand and growing environmental awareness, the utilization of renewable energy has become a worldwide consensus. In order to address the challenges posed by the intermittent and unpredictable nature of r...

  • Article
  • Open Access
5 Citations
2,811 Views
16 Pages

16 April 2024

Music emotion recognition has garnered significant interest in recent years, as the emotions expressed through music can profoundly enhance our understanding of its deeper meanings. The violin, with its distinctive emotional expressiveness, has becom...

  • Article
  • Open Access
5 Citations
4,066 Views
20 Pages

An Extensive Performance Comparison between Feature Reduction and Feature Selection Preprocessing Algorithms on Imbalanced Wide Data

  • Ismael Ramos-Pérez,
  • José Antonio Barbero-Aparicio,
  • Antonio Canepa-Oneto,
  • Álvar Arnaiz-González and
  • Jesús Maudes-Raedo

16 April 2024

The most common preprocessing techniques used to deal with datasets having high dimensionality and a low number of instances—or wide data—are feature reduction (FR), feature selection (FS), and resampling. This study explores the use of F...

  • Article
  • Open Access
1 Citations
6,878 Views
17 Pages

15 April 2024

This paper tackles the challenge of time series forecasting in the presence of missing data. Traditional methods often struggle with such data, which leads to inaccurate predictions. We propose a novel framework that combines the strengths of Generat...

  • Article
  • Open Access
3,451 Views
19 Pages

14 April 2024

Orthogonal frequency-division multiplexing (OFDM) chirp waveforms are an attractive candidate to be a dual-function signal scheme for the joint radar and communication systems. OFDM chirp signals can not only be employed to transmit communication dat...

  • Article
  • Open Access
22 Citations
9,251 Views
12 Pages

Early Parkinson’s Disease Diagnosis through Hand-Drawn Spiral and Wave Analysis Using Deep Learning Techniques

  • Yingcong Huang,
  • Kunal Chaturvedi,
  • Al-Akhir Nayan,
  • Mohammad Hesam Hesamian,
  • Ali Braytee and
  • Mukesh Prasad

13 April 2024

Parkinson’s disease (PD) is a chronic brain disorder affecting millions worldwide. It occurs when brain cells that produce dopamine, a chemical controlling movement, die or become damaged. This leads to PD, which causes problems with movement,...

  • Article
  • Open Access
5 Citations
2,166 Views
13 Pages

13 April 2024

Railway infrastructure is generally classified as either fixed or movable infrastructure assets. Failure in any of the assets could lead to the complete shutdown and disruption of the entire system, economic loss, inconvenience to passengers and the...

  • Article
  • Open Access
6 Citations
3,668 Views
23 Pages

12 April 2024

Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users’...

  • Article
  • Open Access
2 Citations
2,693 Views
21 Pages

Predicting Individual Well-Being in Teamwork Contexts Based on Speech Features

  • Tobias Zeulner,
  • Gerhard Johann Hagerer,
  • Moritz Müller,
  • Ignacio Vazquez and
  • Peter A. Gloor

12 April 2024

Current methods for assessing individual well-being in team collaboration at the workplace often rely on manually collected surveys. This limits continuous real-world data collection and proactive measures to improve team member workplace satisfactio...

  • Article
  • Open Access
1 Citations
2,124 Views
15 Pages

11 April 2024

Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent way...

  • Article
  • Open Access
9 Citations
5,600 Views
16 Pages

LighterFace Model for Community Face Detection and Recognition

  • Yuntao Shi,
  • Hongfei Zhang,
  • Wei Guo,
  • Meng Zhou,
  • Shuqin Li,
  • Jie Li and
  • Yu Ding

11 April 2024

This research proposes a face detection algorithm named LighterFace, which is aimed at enhancing detection speed to meet the demands of real-time community applications. Two pre-trained convolutional neural networks are combined, namely Cross Stage P...

  • Article
  • Open Access
20 Citations
10,880 Views
19 Pages

10 April 2024

Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the siz...

  • Article
  • Open Access
6 Citations
4,344 Views
15 Pages

A Flexible Infrastructure-Sharing 5G Network Architecture Based on Network Slicing and Roaming

  • João P. Ferreira,
  • Vinicius C. Ferreira,
  • Sérgio L. Nogueira,
  • João M. Faria and
  • José A. Afonso

10 April 2024

The sharing of mobile network infrastructure has become a key topic with the introduction of 5G due to the high costs of deploying such infrastructures, with neutral host models coupled with features such as network function virtualization (NFV) and...

  • Article
  • Open Access
39 Citations
2,956 Views
21 Pages

Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions

  • Burhan Ul Islam Khan,
  • Khang Wen Goh,
  • Mohammad Shuaib Mir,
  • Nur Fatin Liyana Mohd Rosely,
  • Aabid Ahmad Mir and
  • Mesith Chaimanee

10 April 2024

As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural l...

  • Article
  • Open Access
2,106 Views
15 Pages

Automated Social Media Text Clustering Based on Financial Ontologies

  • Andrea Calvagna,
  • Emiliano Tramontana and
  • Gabriella Verga

9 April 2024

Social media networks provide an aggregation of news and content, allowing users to share and discuss topics of greatest interest to them. Users can enrich the news by providing context and opinions that are useful to other users. Understanding topic...

  • Article
  • Open Access
5 Citations
2,859 Views
23 Pages

Towards a Supervised Remote Laboratory Platform for Teaching Microcontroller Programming

  • Manos Garefalakis,
  • Zacharias Kamarianakis and
  • Spyros Panagiotakis

8 April 2024

As it concerns remote laboratories (RLs) for teaching microcontroller programming, the related literature reveals several common characteristics and a common architecture. Our search of the literature was constrained to papers published in the period...

  • Systematic Review
  • Open Access
8 Citations
8,805 Views
20 Pages

7 April 2024

Higher education institutions (HEIs) make decisions in several domains, namely strategic and internal management, without using systematized data that support these decisions, which may jeopardize the success of their actions or even their efficiency...

  • Article
  • Open Access
3 Citations
2,787 Views
22 Pages

6 April 2024

In the dynamic landscape of digital information, the rise of misinformation and fake news presents a pressing challenge. This paper takes a completely new approach to verifying news, inspired by how quantum actors can reach agreement even when they a...

  • Article
  • Open Access
16 Citations
4,308 Views
15 Pages

Insulator Defect Detection Based on YOLOv8s-SwinT

  • Zhendong He,
  • Wenbin Yang,
  • Yanjie Liu,
  • Anping Zheng,
  • Jie Liu,
  • Taishan Lou and
  • Jie Zhang

6 April 2024

Ensuring the safety of transmission lines necessitates effective insulator defect detection. Traditional methods often need more efficiency and accuracy, particularly for tiny defects. This paper proposes an innovative insulator defect recognition me...

  • Article
  • Open Access
54 Citations
11,355 Views
14 Pages

5 April 2024

The growing impact of artificial intelligence (AI) on Humanity is unavoidable, and therefore, “AI literacy” is extremely important. In the field of education—AI in education (AIED)—this technology is having a huge impact on th...

  • Article
  • Open Access
9 Citations
2,658 Views
21 Pages

5 April 2024

Collaborative filtering (CF), a fundamental technique in personalized Recommender Systems, operates by leveraging user–item preference interactions. Matrix factorization remains one of the most prevalent CF-based methods. However, recent advanc...

  • Article
  • Open Access
2 Citations
2,478 Views
14 Pages

Explainable Machine Learning Method for Aesthetic Prediction of Doors and Home Designs

  • Jean-Sébastien Dessureault,
  • Félix Clément,
  • Seydou Ba,
  • François Meunier and
  • Daniel Massicotte

5 April 2024

The field of interior home design has witnessed a growing utilization of machine learning. However, the subjective nature of aesthetics poses a significant challenge due to its variability among individuals and cultures. This paper proposes an applie...

  • Article
  • Open Access
11 Citations
6,535 Views
18 Pages

4 April 2024

This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assista...

  • Article
  • Open Access
1 Citations
1,906 Views
25 Pages

Flying Projectile Attitude Determination from Ground-Based Monocular Imagery with a Priori Knowledge

  • Huamei Chen,
  • Zhigang Zhu,
  • Hao Tang,
  • Erik Blasch,
  • Khanh D. Pham and
  • Genshe Chen

4 April 2024

This paper discusses using ground-based imagery to determine the attitude of a flying projectile assuming prior knowledge of its external geometry. It presents a segmentation-based approach to follow the object and evaluates it quantitatively with si...

  • Article
  • Open Access
14 Citations
6,501 Views
20 Pages

4 April 2024

With the vast amount of social media posts available online, topic modeling and sentiment analysis have become central methods to better understand and analyze online behavior and opinion. However, semantic and sentiment analysis have rarely been com...

  • Article
  • Open Access
6 Citations
9,079 Views
20 Pages

4 April 2024

In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from Oct...

  • Article
  • Open Access
4 Citations
3,698 Views
13 Pages

3 April 2024

Over the past several decades, deep neural networks have been extensively applied to medical image segmentation tasks, achieving significant success. However, the effectiveness of traditional deep segmentation networks is substantially limited by the...

  • Article
  • Open Access
2,960 Views
23 Pages

A Techno-Economic Analysis of New Market Models for 5G+ Spectrum Management

  • Luis A. Fletscher,
  • Alejandra Zuleta,
  • Alexander Galvis,
  • David Quintero,
  • Juan Felipe Botero and
  • Natalia Gaviria

3 April 2024

While 5G has become a reality in several places around the world, some countries are still in the process of assigning frequency bands and deploying networks. In this context, there is a significant opportunity to explore new market models for the ma...

  • Article
  • Open Access
16 Citations
7,090 Views
19 Pages

2 April 2024

In the ever-expanding online fashion market, businesses in the clothing sales sector are presented with substantial growth opportunities. To utilize this potential, it is crucial to implement effective methods for accurately identifying clothing item...

  • Article
  • Open Access
11 Citations
2,653 Views
17 Pages

31 March 2024

Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber–Physical Systems. This study addresses the need to detect early ransomware behavior when only l...

  • Article
  • Open Access
26 Citations
7,191 Views
27 Pages

31 March 2024

The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead...

  • Article
  • Open Access
1 Citations
1,756 Views
19 Pages

31 March 2024

We analyzed a special class of graph traversal problems, where the distances are stochastic, and the agent is restricted to take a limited range in one go. We showed that both constrained shortest Hamiltonian pathfinding problems and disassembly line...

of 2

XFacebookLinkedIn
Information - ISSN 2078-2489