Skip to Content

Information, Volume 17, Issue 2

2026 February - 106 articles

Cover Story: Technical diagrams are the “silent” language of engineering. Today’s AI models still stumble over arrows, boxes, and timing traces. This survey peels back the black box of diagram comprehension, tracking the shift from classic OCR to CNN/RNN/transformer-era multimodal models across five families of technical diagrams (flowcharts, block diagrams, UML, schematics, and timing), revealing surprising gaps: most models still hallucinate or miss structural intent, and a lack of shared benchmarks makes progress difficult to measure. What will it take for AI to read the diagrams that run our world or to power trustworthy RAG and agentic systems? View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (106)

  • Article
  • Open Access
304 Views
17 Pages

20 February 2026

The digital carbon footprint denotes the environmental impact generated by digital technologies throughout their lifecycle. Industry 4.0 manufacturing environments rely extensively on data processing, information storage, and artificial intelligence,...

  • Article
  • Open Access
306 Views
22 Pages

AI for All: Adaptive, Accessible, and Inclusive Learning Experiences in the Age of Intelligent LMSs

  • Athanasios Angeioplastis,
  • Markos Konstantakis,
  • John Aliprantis,
  • Konstantinos Ordoumpozanis,
  • Dimitrios Varsamis and
  • Alkiviadis Tsimpiris

19 February 2026

Learning Management Systems (LMSs) remain largely static and administrative, often failing to support personalization and inclusive access to learning resources. This paper presents AI for All, a practical approach to building an adaptive, accessible...

  • Article
  • Open Access
261 Views
16 Pages

19 February 2026

Understanding how patients engage with digital health technologies is critical for improving the reach and equity of telehealth services. While prior research has largely focused on demographic predictors of telehealth use, this study applies a hybri...

  • Article
  • Open Access
201 Views
20 Pages

Wild Yak Behavior Recognition Method Based on an Improved Yolov11

  • Jun Tie,
  • Basang Dunzhu,
  • Lu Zheng,
  • Jin Xie,
  • Shasha Tian and
  • Shuangyang Li

19 February 2026

Yak daily behaviors, including feeding, standing, lying down, and walking, are closely related to their health status, making accurate behavior recognition essential for intelligent monitoring and management in yak husbandry. However, real-world graz...

  • Article
  • Open Access
249 Views
34 Pages

LightGuardAgents: Secure and Robust Embedded Agents for Internet of Things Devices

  • José Caicedo-Ortiz,
  • Juan A. Holgado-Terriza,
  • Pablo Pico-Valencia and
  • Deiber Olivares-Olivares

19 February 2026

This paper presents a novel architecture for creating light agents embedded on Internet of Things (IoT) devices, specifically addressing challenges such as security, scalability, and adaptability. Despite the increasing adoption of agent-based approa...

  • Article
  • Open Access
357 Views
30 Pages

19 February 2026

This study advances understanding of public trust in artificial intelligence (AI) by distinguishing between overall trust in AI as a system and trust in specific AI components, and by disentangling the roles of perceived capacity, risk, and personhoo...

  • Article
  • Open Access
333 Views
23 Pages

The Human Factor: Assessing Ransomware Vulnerability in Developing Nations’ Governments

  • Paúl B. Vásquez-Méndez,
  • Diana Carolina Arce Cuesta and
  • Jorge Luis Zambrano-Martinez

19 February 2026

Ransomware represents a critical and escalating threat to public institutions in developing nations, where cybersecurity is often underprioritized. While technical vulnerabilities are significant, this study investigates the under-explored socio-orga...

  • Article
  • Open Access
326 Views
20 Pages

Improving Construction Site Safety with Large Language Models: A Performance Analysis

  • Concetta Manuela La Fata,
  • Gianfranco Barone and
  • Marco Cammarata

17 February 2026

Hazard recognition on construction sites is crucial for ensuring worker safety. Traditional methods widely rely on expert assessments, on-site inspections, and checklists, which can be time-consuming and susceptible to human error. The integration of...

  • Systematic Review
  • Open Access
380 Views
25 Pages

Enhancing IIoT Security Using Digital Twins in Industry 5.0: A Systematic Literature Review

  • Md Whaiduzzaman,
  • Natasha Tanzila Monalisa,
  • Shinthi Tasnim Himi,
  • Shirin Sultana,
  • Tony Jan and
  • Alistair Barros

17 February 2026

The rapid advancement of Industry 5.0 and the concurrent growth of the Industrial Internet of Things (IIoT) present significant cybersecurity challenges necessitating advanced solutions. Digital Twin technology, which enables the creation of near-per...

  • Article
  • Open Access
365 Views
18 Pages

17 February 2026

Employee turnover presents a significant challenge to modern organizations, often resulting in operational disruptions, substantial hiring costs, and a loss of institutional knowledge. While traditional human resource practices have historically been...

  • Article
  • Open Access
351 Views
19 Pages

Mitigating Hallucinations in Knowledge Graph Completion via Embedding-Guided Instruction Tuning

  • Pengfei Zhang,
  • Xing Xu,
  • Junying Wu,
  • Xin Lu,
  • Jiahao Shi,
  • Xiaodong Zhang,
  • Dezhi Cui,
  • Xiuxian Peng,
  • Sihao He and
  • Yifan Zhu
  • + 4 authors

16 February 2026

Real-world Knowledge Graphs (KGs) are inherently incomplete, which hinders effective downstream reasoning. While Large Language Models (LLMs) possess powerful semantic capabilities, directly applying them to Knowledge Graph Completion (KGC) often lea...

  • Article
  • Open Access
276 Views
9 Pages

Adolescents’ Experience with a Conversational Agent for Depression

  • Alanna Testerman,
  • Arjun Roshik Bharat,
  • Tyrique Patterson and
  • Eduardo Bunge

16 February 2026

Conversational Agents have been showing promise for depression in adults in the short-term. Although, there has been little research done for conversational agents (CAs) with depression in adolescents. This study aimed to determine adolescents’...

  • Article
  • Open Access
357 Views
34 Pages

Safety, Acceptability, and Usability of Immersive Gamification System for Use in Rehabilitation Management of Pediatric Patients with Cerebral Palsy and with Mobility Limitations (Phase 1 Trial)

  • Maria Eliza R. Aguila,
  • Cherica A. Tee,
  • Josiah Cyrus R. Boque,
  • Juan Raphael M. Gonzales,
  • Isabel Teresa O. Salido,
  • Bryan Andrei C. Galecio,
  • Ben Anthony A. Lopez,
  • Christian Alfredo K. Cruz,
  • Michael L. Tee and
  • Jaime D. L. Caro
  • + 2 authors

16 February 2026

Virtual reality (VR) is increasingly integrated into the rehabilitation of children with cerebral palsy (CP). However, evidence to substantiate its potential as part of standard care remains limited. This Phase 1 study aimed to evaluate a VR-based im...

  • Article
  • Open Access
296 Views
21 Pages

Cyberbullying Detection Based on Hybrid Neural Networks and Multi-Feature Fusion

  • Junkuo Cao,
  • Yunpeng Xiong,
  • Weiquan Wang and
  • Guolian Chen

16 February 2026

Cyberbullying demonstrates notable metaphorical and contextual traits, characterized by a high-dimensional sparse semantic space and dynamic evolution. Pre-trained models utilize extensive textual data for learning and employ transformer-based word v...

  • Article
  • Open Access
542 Views
23 Pages

Generative AI Recommendations for Environmental Sustainability: A Hybrid SEM–ANN Analysis of Gen Z Users in the Philippines

  • Victor James C. Escolano,
  • Yann-Mey Yee,
  • Wei-Jung Shiang,
  • Alexander A. Hernandez and
  • Do Van Nang

15 February 2026

Generative AI offers promising potential to promote environmental sustainability through personalized recommendations that influence individual behavior. This study examines the factors influencing the adoption and actual use of generative AI recomme...

  • Article
  • Open Access
460 Views
31 Pages

DK-PRACTICE: An Intelligent Platform for Knowledge Tracing and Educational Content Recommendation: A Case Study in Higher Education

  • Marina Delianidi,
  • Konstantinos Diamantaras,
  • Georgios Kokkonis,
  • Antonis Sidiropoulos,
  • Georgios Evangelidis and
  • Dimitrios Karapiperis

15 February 2026

This paper introduces DK-PRACTICE, an intelligent educational platform that combines Knowledge Tracing (KT) and recommendation systems to support personalized learning in higher education. The platform utilizes a novel Paired Bipolar Bag-of-Words (PB...

  • Article
  • Open Access
366 Views
19 Pages

Vox2Face: Speech-Driven Face Generation via Identity-Space Alignment and Diffusion Self-Consistency

  • Qiming Ma,
  • Yizhen Wang,
  • Xiang Sun,
  • Jiadi Liu,
  • Gang Cheng,
  • Jia Feng,
  • Rong Wang and
  • Fanliang Bu

14 February 2026

Speech-driven face generation aims to synthesize a face image that matches a speaker’s identity from speech alone. However, existing methods typically trade identity fidelity for visual quality and rely on large end-to-end generators that are d...

  • Article
  • Open Access
383 Views
23 Pages

14 February 2026

This paper presents a framework that integrates blockchain-enabled Federated Learning (FL) with consensus mechanisms to mitigate poisoning attacks in healthcare environments. The framework incorporates blockchain consensus mechanisms, with Proof-of-W...

  • Article
  • Open Access
245 Views
18 Pages

Design and Assessment of an Immersive Hydraulic Transmission Teaching Laboratory

  • Chunxue Wei,
  • Zhuoxian Chen,
  • Anran Leng,
  • Jiuxiang Song and
  • Baowei Zhang

14 February 2026

Traditional hydraulic transmission education is often hindered by the subject’s theoretical complexity and abstract nature. To address these challenges, this study introduces the Immersive Hydraulic Transmission Laboratory (IHTL), a virtual tea...

  • Article
  • Open Access
266 Views
22 Pages

14 February 2026

Neural machine translation (NMT) performance is strongly influenced by tokenization strategies, particularly for morphologically rich languages such as Arabic. Despite the importance of tokenization, there is a lack of controlled, reproducible studie...

  • Article
  • Open Access
289 Views
28 Pages

14 February 2026

Lesson preparation plays a crucial role in structuring and organizing the teaching process. However, traditional lesson design and presentation creation require teachers to spend a considerable amount of time reviewing the literature and organizing m...

  • Article
  • Open Access
471 Views
30 Pages

A Digital Twin Architecture for Integrating Lean Manufacturing with Industrial IoT and Predictive Analytics

  • Gulshat Amirkhanova,
  • Shyrailym Adilkyzy,
  • Bauyrzhan Amirkhanov,
  • Dina Baizhanova and
  • Siming Chen

13 February 2026

The convergence of Lean manufacturing and Industry 4.0 requires digital infrastructures capable of transforming high-frequency telemetry into actionable insights. However, architectures that integrate near real-time data with closed-loop process cont...

  • Article
  • Open Access
337 Views
28 Pages

Closed-Loop Digital Twin for Energy-Efficient Scheduling in Food Manufacturing Systems

  • Gulshat Amirkhanova,
  • Nazly Yusubova,
  • Bauyrzhan Amirkhanov,
  • Meruyert Sakypbekova and
  • Siming Chen

13 February 2026

Food manufacturing faces challenges in balancing efficiency, energy use, and quality. This paper presents a Hybrid Digital Twin Architecture (HDTA). It combines simulation, constraint programming, and Industrial IoT into a closed-loop system. The arc...

  • Article
  • Open Access
524 Views
44 Pages

13 February 2026

The world is constantly challenged by complex crises—from the COVID-19 pandemic and geopolitical tensions to economic uncertainty and severe environmental disasters. During these critical times, individuals need to reflect on ethical values and...

  • Article
  • Open Access
401 Views
21 Pages

Real-Time Ransomware Detection Using Reinforcement Learning Agents

  • Kutub Thakur,
  • Md Liakat Ali,
  • Suzanna Schmeelk,
  • Joan Debello and
  • Md Mustafizur Rahman

13 February 2026

Traditional signature-based anti-malware tools often fail to detect zero-day ransomware attacks due to their reliance on known patterns. This paper presents a real-time ransomware detection framework that models system behavior as a Reinforcement Lea...

  • Review
  • Open Access
270 Views
18 Pages

13 February 2026

Makerspaces in K-12 education are multidisciplinary and provide multiple points of intersection with different subjects, technologies, and pedagogies. At the forefront of the maker movement is an emphasis on positioning students as playing an active...

  • Article
  • Open Access
332 Views
20 Pages

13 February 2026

Intelligent Clinical Decision Support Systems (ICDSS) are increasingly integrated into healthcare settings to enhance clinical decision-making, efficiency, and patient safety. Despite advances in artificial intelligence-enabled decision support, ICDS...

  • Article
  • Open Access
242 Views
27 Pages

13 February 2026

The integration of Unmanned Aerial Vehicles (UAVs) with the Internet of Things (IoT) is revolutionizing a wide range of applications. However, collecting massive sensing data from large-scale fields efficiently remains challenging, constrained by the...

  • Article
  • Open Access
463 Views
21 Pages

13 February 2026

Higher education has undergone a profound transformation since the release of ChatGPT in November 2022. The introduction of this tool generated immediate interest among students while simultaneously provoking concern among faculty, who perceived it a...

  • Article
  • Open Access
337 Views
24 Pages

12 February 2026

Vignettes are brief, descriptive, hypothetical scenarios that have been used to extract attitudes, beliefs, or perceptions from participants across psychology, healthcare, and human–computer interaction. Traditional vignette development is ofte...

  • Article
  • Open Access
252 Views
22 Pages

12 February 2026

Achieving safe and efficient sequential decision-making in dynamic and uncertain environments is a core challenge in intelligent manufacturing and robotic systems. During operation, systems are often subject to coupled multi-source uncertainties&mdas...

  • Review
  • Open Access
313 Views
20 Pages

12 February 2026

Background: Attention deficit hyperactivity disorder (ADHD) is a neurodevelopmental disorder characterized by inattention, motor hyperactivity and verbal and cognitive impulsivity. Impairments in executive functions (EFs), in particular working memor...

  • Article
  • Open Access
212 Views
18 Pages

11 February 2026

The accurate detection of electricity theft is crucial for reducing non-technical losses in smart grids. However, many existing data-driven methods rely on a single data modality, such as either the raw 1D consumption sequence or its transformed 2D i...

  • Article
  • Open Access
313 Views
19 Pages

11 February 2026

To address fragile feature representation in sparse regions and detail loss in occluded scenes caused by uneven sampling density in 3D point cloud semantic segmentation on the SemanticKITTI dataset, this article proposes an innovative framework that...

  • Article
  • Open Access
452 Views
36 Pages

11 February 2026

The increasing scale and imbalance of modern network traffic pose significant challenges for multi-class intrusion detection systems (IDSs), particularly in identifying rare attack types. Traditional intrusion detection approaches based on supervised...

  • Article
  • Open Access
337 Views
21 Pages

Adversarial Example Generation Method Based on Wavelet Transform

  • Meng Bi,
  • Xiaoguo Liang,
  • Baiyu Wang,
  • Longxin Liu,
  • Xin Yin and
  • Jiafeng Liu

10 February 2026

Adversarial examples are crucial tools for assessing the robustness of deep neural networks (DNNs) and revealing potential security vulnerabilities. Adversarial example generation methods based on Generative Adversarial Networks (GANs) have made sign...

  • Article
  • Open Access
243 Views
32 Pages

10 February 2026

Local Differential Privacy (LDP) and its personalized variants (PLDP) have been widely used for privacy-preserving data analytics. However, existing schemes often enforce a uniform indistinguishability level among users, failing to accommodate the nu...

  • Article
  • Open Access
248 Views
19 Pages

Convex Hull-Based Topic Similarity Mapping in Multidimensional Data

  • Matúš Pohorenec,
  • Vladislav Vavrák,
  • Annamária Behúnová,
  • Marcel Behún and
  • Michal Ennert

10 February 2026

This research presents a large-scale thematic analysis of 66,002 Slovak university thesis abstracts, aimed at identifying, categorizing, and visualizing research trends across multiple academic disciplines. Using BERTopic for unsupervised topic model...

  • Article
  • Open Access
583 Views
22 Pages

Patterned Radicalization: User Behavior Analysis and Antisemitic Language in QAnon Subreddits

  • Noah D. Cohen,
  • Peter Antonaros,
  • Dana B. Weinberg,
  • Meyer Levy and
  • Jeffrey S. Kopstein

10 February 2026

This study investigates how people in certain online communities engage with and adopt hateful rhetoric, specifically examining the escalation of antisemitic language in two deplatformed QAnon-related subreddits. Utilizing a lexicon of implicit and e...

  • Article
  • Open Access
284 Views
14 Pages

An Intelligent Multi-Class XGBoost-Based Model for Optimizing DevOps Continuous Integration and Continuous Deployment Failure Prediction

  • Ibrahim Ahmed Al-Baltah,
  • Nagi Al-Shaibany,
  • Majdi Abdellatief,
  • Mohammed M. Al-Gawda and
  • Sultan Yahya Al-Sultan

10 February 2026

Modern software development fundamentally relies on agile methodologies and DevOps practices to facilitate accelerated software delivery. Continuous integration and continuous deployment CI/CD are among the most critical DevOps practices that require...

  • Article
  • Open Access
732 Views
28 Pages

10 February 2026

In an era where digital transformation shapes the backbone of global aviation infrastructure, the cybersecurity of air transport systems is of paramount importance. This article assesses the complex cybersecurity landscape within the civil aviation e...

  • Article
  • Open Access
233 Views
26 Pages

A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision

  • Meixia Miao,
  • Xueyi Yang,
  • Jianghong Wei,
  • Guohua Tian and
  • Willy Susilo

9 February 2026

As a promising decentralized paradigm, the verifiable and redactable blockchain offers a feasible solution for achieving authorized and controlled redaction of on-chain data. However, existing schemes suffer from rapidly expanding ledgers caused by a...

  • Article
  • Open Access
481 Views
26 Pages

Unveiling the Factors for MOOC Adoption: An Educational Data Mining Perspective

  • Muhammad Shaheen,
  • Rabiya Ghafoor,
  • Savita K. Sugathan,
  • Pradeep Isawasan and
  • Muhammad Akmal Hakim Ahmad Asmawi

9 February 2026

Massive Open Online Courses (MOOCs) have emerged as a popular choice for learners as accessible and flexible education across the globe. Micro -are short skill-focused certifications offered within MOOCs to online learners. The interplay between mult...

  • Article
  • Open Access
241 Views
26 Pages

9 February 2026

With the proliferation of 5G, wireless networks, and other infrastructure, 360° video streaming has experienced rapid development. Efficient scheduling of 360° video streams relies on accurate feedback of user-side Quality of Experience (QoE)...

  • Article
  • Open Access
337 Views
21 Pages

9 February 2026

With the rapid advancement of remote sensing technology, remote sensing images are increasingly being used in applications such as geographical monitoring, disaster warning, and urban planning. However, detecting small objects—such as vehicles...

  • Article
  • Open Access
232 Views
19 Pages

9 February 2026

Lung cancer can be discovered at an early stage to enhance patient survival. However, existing screening tools are both resource-intensive and inaccessible in low-resource countries. This paper introduces a machine learning model that uses an ensembl...

  • Article
  • Open Access
304 Views
18 Pages

7 February 2026

The Four-Leg Three-Phase Voltage Source Inverter (4LVSI) is a versatile solution for integrating renewable energy sources (RESs) into distribution networks, as it compensates unbalanced voltages and currents while providing a path for zero-sequence c...

  • Article
  • Open Access
294 Views
19 Pages

7 February 2026

One of the key artefacts of epigraphy in Southeast Asia is the Singapore Stone inscription, which is, unfortunately, in a poor condition. There are huge spaces that separate the readable characters, rendering the text incomplete. This renders a tradi...

  • Article
  • Open Access
441 Views
20 Pages

6 February 2026

We develop an informational extension of spacetime thermodynamics in which local entropy production is coupled to spacetime curvature within an effective covariant framework. Spacetime is modeled as a continuum limit of finite-capacity information re...

  • Systematic Review
  • Open Access
818 Views
28 Pages

6 February 2026

Digital Mental Health Interventions (DMHIs) offer a scalable solution to the global mental health crisis, yet their real-world impact is often hampered by low user engagement. Gamification has been widely adopted as a strategy to enhance adherence, b...

of 3

XFacebookLinkedIn
Information - ISSN 2078-2489