Skip to Content

Information, Volume 7, Issue 4

2016 December - 20 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (20)

  • Review
  • Open Access
4 Citations
9,268 Views
14 Pages

21 December 2016

The Monster group, the biggest of the sporadic groups, is equipped with the highest known number of dimensions and symmetries. Taking into account variants of the Borsuk–Ulam theorem and a novel topological approach cast in a physical fashion that ha...

  • Article
  • Open Access
11 Citations
4,725 Views
21 Pages

A Credit-Based Congestion-Aware Incentive Scheme for DTNs

  • Qingfeng Jiang,
  • Chaoguang Men and
  • Zeyu Tian

15 December 2016

In Delay-Tolerant Networks (DTNs), nodes may be selfish and reluctant to expend their precious resources on forwarding messages for others. Therefore, an incentive scheme is necessary to motivate selfish nodes to cooperatively forward messages. Howev...

  • Article
  • Open Access
55 Citations
9,092 Views
18 Pages

15 December 2016

Human activity recognition has been a hot topic in recent years. With the advances in sensor technology, there has been a growing interest in using smartphones equipped with a set of built-in sensors to solve tasks of activity recognition. However, i...

  • Article
  • Open Access
13 Citations
5,920 Views
14 Pages

22 November 2016

Inspired by the overwhelming success of Histogram of Oriented Gradients (HOG) features in many vision tasks, in this paper, we present an innovative compact feature descriptor called fuzzy Histogram of Oriented Lines (f-HOL) for action recognition, w...

  • Article
  • Open Access
2 Citations
4,456 Views
8 Pages

22 November 2016

The research on non-cooperative multiuser multiple-input multiple-output with space-time block code (MIMO-STBC) communication systems is a challenging and important task. However, to our knowledge, there is little report of this topic. Being two key...

  • Article
  • Open Access
9 Citations
12,337 Views
27 Pages

16 November 2016

Citizen engagement and participation are a key focus for government and government agencies, and with the advent of Internet technologies questions arise about the role and impact of technology on citizen participation. This paper aims to explore the...

  • Review
  • Open Access
75 Citations
12,559 Views
19 Pages

10 November 2016

Over the past couple of decades, global positioning system (GPS) technology has been utilized to collect large-scale data from travel surveys. As the precise spatiotemporal characteristics of travel could be provided by GPS devices, the issues of tra...

  • Article
  • Open Access
6 Citations
7,540 Views
12 Pages

9 November 2016

Although the importance of advocacy activities by civil society organizations (CSOs) in policy and decision-making procedures has been greatly emphasized in the literature of political science and social policy, we have relatively little understandin...

  • Article
  • Open Access
7 Citations
5,911 Views
17 Pages

3 November 2016

To depict the influence of decision makers’ risk psychology on the interval-valued intuitionistic fuzzy multi-criteria decision-making process, this paper proposes a new method based on prospect theory. Considering the risk attitude of the decision m...

  • Article
  • Open Access
4 Citations
6,780 Views
13 Pages

Reaching Citizens’ Engagement by Services: Swiss Use Case

  • Maria Sokhn,
  • Florian Evequoz and
  • Arnaud Zufferey

3 November 2016

Collaboration with citizens and users plays an increasing role in the transformation of public services towards new forms of production and delivery. Thus there is a need to modernize the civil service to accelerate innovation in governments, as civi...

  • Article
  • Open Access
8 Citations
6,969 Views
16 Pages

Lazy Management for Frequency Table on Hardware-Based Stream Lossless Data Compression

  • Koichi Marumo,
  • Shinichi Yamagiwa,
  • Ryuta Morita and
  • Hiroshi Sakamoto

31 October 2016

The demand for communicating large amounts of data in real-time has raised new challenges with implementing high-speed communication paths for high definition video and sensory data. It requires the implementation of high speed data paths based on ha...

  • Article
  • Open Access
16 Citations
7,501 Views
9 Pages

29 October 2016

The interplay between retrocausality and the time-reversal symmetry of the dynamical law of quantum mechanics underscores the significance of the measurement dynamics with the use of indivisible and discrete quantum particles to be mediated. One exam...

  • Article
  • Open Access
2 Citations
5,134 Views
12 Pages

A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

  • Fabio Ciabini,
  • Simone Morosi,
  • Lorenzo Mucchi and
  • Luca Simone Ronga

27 October 2016

Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to th...

  • Article
  • Open Access
56 Citations
17,645 Views
14 Pages

27 October 2016

Near-infrared (NIR) face recognition has attracted increasing attention because of its advantage of illumination invariance. However, traditional face recognition methods based on NIR are designed for and tested in cooperative-user applications. In t...

  • Article
  • Open Access
8 Citations
5,311 Views
12 Pages

Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

  • Pavel Lozhnikov,
  • Alexey Sulavko,
  • Alexander Eremenko and
  • Danil Volkov

25 October 2016

The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the ident...

  • Article
  • Open Access
85 Citations
15,929 Views
23 Pages

A Survey on Data Compression Methods for Biological Sequences

  • Morteza Hosseini,
  • Diogo Pratas and
  • Armando J. Pinho

14 October 2016

The ever increasing growth of the production of high-throughput sequencing data poses a serious challenge to the storage, processing and transmission of these data. As frequently stated, it is a data deluge. Compression is essential to address this c...

  • Review
  • Open Access
33 Citations
11,906 Views
16 Pages

A Benchmarking Analysis of Open-Source Business Intelligence Tools in Healthcare Environments

  • Andreia Brandão,
  • Eliana Pereira,
  • Marisa Esteves,
  • Filipe Portela,
  • Manuel Filipe Santos,
  • António Abelha and
  • José Machado

13 October 2016

In recent years, a wide range of Business Intelligence (BI) technologies have been applied to different areas in order to support the decision-making process. BI enables the extraction of knowledge from the data stored. The healthcare industry is no...

  • Article
  • Open Access
18 Citations
8,126 Views
14 Pages

8 October 2016

The Park Geun-hye Administration of Korea (2013–2017) aims to increase the level of transparency and citizen trust in government through the Government 3.0 initiative. This new initiative for public sector innovation encourages citizen-government col...

  • Article
  • Open Access
6 Citations
6,340 Views
10 Pages

28 September 2016

The purpose of this study was to survey access to information for learning on the types of assistive technology used by undergraduate students with disabilities in Northern Thailand. The types of assistive technology in this study included assistive...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489