Skip to Content

Information, Volume 8, Issue 2

2017 June - 33 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (33)

  • Communication
  • Open Access
1 Citations
4,905 Views
16 Pages

Sensor replacement in the rechargeable wireless sensor network (R-WSN) is important to provide continuous sensing services once sensor node failure or damage occurs. However, satisfactory solutions have not been found yet in developing a sustainable...

  • Article
  • Open Access
24 Citations
5,172 Views
13 Pages

In nature, the mechanical properties of geological bodies are very complex, and its various mechanical parameters are vague, incomplete, imprecise, and indeterminate. In these cases, we cannot always compute or provide exact/crisp values for the join...

  • Article
  • Open Access
6 Citations
8,002 Views
12 Pages

Designers and artists often require reference images at authoring time. The emergence of computer technology has provided new conditions and possibilities for artistic creation and research. It has also expanded the forms of artistic expression and a...

  • Article
  • Open Access
13 Citations
6,457 Views
22 Pages

Taxi trajectories reflect human mobility over the urban roads’ network. Although taxi drivers cruise the same city streets, there is an observed variation in their daily profit. To reveal the reasons behind this issue, this study introduces a novel a...

  • Article
  • Open Access
2 Citations
4,356 Views
9 Pages

Compressed sensing (CS) has become a powerful tool to process data that is correlated in underwater sensor networks (USNs). Based on CS, certain signals can be recovered from a relatively small number of random linear projections. Since the battery-d...

  • Article
  • Open Access
10 Citations
6,981 Views
16 Pages

A turbo coded cooperative orthogonal frequency division multiplexing (OFDM) with multiple-input multiple-output (MIMO) antennas scheme is considered, and its performance over a fast Rayleigh fading channel is evaluated. The turbo coded OFDM incorpora...

  • Article
  • Open Access
18 Citations
6,741 Views
16 Pages

In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets. However, the existing hardware-based single security architecture can...

  • Article
  • Open Access
3 Citations
7,317 Views
20 Pages

Identifying High Quality Document–Summary Pairs through Text Matching

  • Yongshuai Hou,
  • Yang Xiang,
  • Buzhou Tang,
  • Qingcai Chen,
  • Xiaolong Wang and
  • Fangze Zhu

Text summarization namely, automatically generating a short summary of a given document, is a difficult task in natural language processing. Nowadays, deep learning as a new technique has gradually been deployed for text summarization, but there is s...

  • Article
  • Open Access
25 Citations
4,436 Views
11 Pages

As an extension of an intuitionistic fuzzy set, a single-valued neutrosophic set is described independently by the membership functions of its truth, indeterminacy, and falsity, which is a subclass of a neutrosophic set (NS). However, in existing exp...

  • Article
  • Open Access
25 Citations
11,630 Views
14 Pages

In order to detect outliers in temperature time series data for improving data quality and decision-making quality related to design and operation, we proposed an algorithm based on sliding window prediction. Firstly, the time series are segmented ba...

  • Article
  • Open Access
4,880 Views
22 Pages

The intensive construction of domain-specific knowledge bases (DSKB) has posed an urgent demand for researches about domain-specific entity detection and linking (DSEDL). Joint models are usually adopted in DSEDL tasks, but data imbalance and high co...

  • Article
  • Open Access
6 Citations
5,049 Views
10 Pages

Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure...

  • Article
  • Open Access
16 Citations
8,374 Views
19 Pages

In this paper, we propose a single image dehazing method aiming at addressing the inherent limitations of the extensively employed dark channel prior (DCP). More concretely, we introduce the Gaussian mixture model (GMM) to segment the input hazy imag...

  • Article
  • Open Access
4 Citations
6,673 Views
31 Pages

This paper investigates the extent to which a mobile data source can be utilised to generate new information intelligence for decision-making in smart city planning processes. In this regard, the Mobility Explorer framework is introduced and applied...

  • Article
  • Open Access
4 Citations
5,322 Views
15 Pages

In this report, we studied the sampling synchronization of a discrete signal in the receiver of a communication system and found that the frequency of the received signal usually exhibits some unpredictable deviations. We observed many harmonics caus...

  • Article
  • Open Access
2 Citations
5,350 Views
24 Pages

This research presents and studies an evaluation framework for tourism mobile commerce platforms based on tourists’ experience. Synthesizing from prior literature, relevant theories, and the results of online questionnaires, we select 24 evaluation i...

  • Article
  • Open Access
9 Citations
5,029 Views
19 Pages

This paper presents a new approach to solve the multi-criteria group decision making (MCGDM) problem where criteria values take the form of 2-tuple linguistic information. Firstly, a 2-tuple hybrid ordered weighted geometric (THOWG) operator is propo...

  • Article
  • Open Access
9 Citations
6,952 Views
23 Pages

Multi-Label Classification from Multiple Noisy Sources Using Topic Models

  • Divya Padmanabhan,
  • Satyanath Bhat,
  • Shirish Shevade and
  • Y. Narahari

Multi-label classification is a well-known supervised machine learning setting where each instance is associated with multiple classes. Examples include annotation of images with multiple labels, assigning multiple tags for a web page, etc. Since sev...

  • Article
  • Open Access
4 Citations
5,438 Views
9 Pages

In this paper, four kinds of block diffraction models were proposed on the basis of the uniform geometrical theory of diffraction, and these models were validated by experiments with 45 GHz millimeter wave in the laboratory. The results are in agreem...

  • Article
  • Open Access
58 Citations
9,964 Views
28 Pages

Automated Prostate Gland Segmentation Based on an Unsupervised Fuzzy C-Means Clustering Technique Using Multispectral T1w and T2w MR Imaging

  • Leonardo Rundo,
  • Carmelo Militello,
  • Giorgio Russo,
  • Antonio Garufi,
  • Salvatore Vitabile,
  • Maria Carla Gilardi and
  • Giancarlo Mauri

28 April 2017

Prostate imaging analysis is difficult in diagnosis, therapy, and staging of prostate cancer. In clinical practice, Magnetic Resonance Imaging (MRI) is increasingly used thanks to its morphologic and functional capabilities. However, manual detection...

  • Article
  • Open Access
55 Citations
10,760 Views
24 Pages

Developing Knowledge-Based Citizen Participation Platform to Support Smart City Decision Making: The Smarticipate Case Study

  • Zaheer Khan,
  • Jens Dambruch,
  • Jan Peters-Anders,
  • Andreas Sackl,
  • Anton Strasser,
  • Peter Fröhlich,
  • Simon Templer and
  • Kamran Soomro

21 April 2017

Citizen participation for social innovation and co-creating urban regeneration proposals can be greatly facilitated by innovative IT systems. Such systems can use Open Government Data, visualise urban proposals in 3D models and provide automated feed...

  • Article
  • Open Access
8 Citations
6,068 Views
11 Pages

Assembling Deep Neural Networks for Medical Compound Figure Detection

  • Yuhai Yu,
  • Hongfei Lin,
  • Jiana Meng,
  • Xiaocong Wei and
  • Zhehuan Zhao

21 April 2017

Compound figure detection on figures and associated captions is the first step to making medical figures from biomedical literature available for further analysis. The performance of traditional methods is limited to the choice of hand-engineering fe...

  • Article
  • Open Access
11 Citations
8,366 Views
22 Pages

20 April 2017

The trustworthiness of systems that support complex collaborative business processes is an emergent property. In order to address users’ trust concerns, trustworthiness requirements of software systems must be elicited and satisfied. The aim of this...

  • Article
  • Open Access
23 Citations
8,031 Views
13 Pages

A Shallow Network with Combined Pooling for Fast Traffic Sign Recognition

  • Jianming Zhang,
  • Qianqian Huang,
  • Honglin Wu and
  • Yukai Liu

17 April 2017

Traffic sign recognition plays an important role in intelligent transportation systems. Motivated by the recent success of deep learning in the application of traffic sign recognition, we present a shallow network architecture based on convolutional...

  • Article
  • Open Access
527 Citations
31,371 Views
16 Pages

BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments

  • Qi Xia,
  • Emmanuel Boateng Sifah,
  • Abla Smahi,
  • Sandro Amofa and
  • Xiaosong Zhang

17 April 2017

Disseminating medical data beyond the protected cloud of institutions poses severe risks to patients’ privacy, as breaches push them to the point where they abstain from full disclosure of their condition. This situation negatively impacts the patien...

  • Article
  • Open Access
2 Citations
5,717 Views
13 Pages

11 April 2017

Object tracking is a challenging task in many computer vision applications due to occlusion, scale variation and background clutter, etc. In this paper, we propose a tracking algorithm by combining discriminative global and generative multi-scale loc...

  • Article
  • Open Access
30 Citations
8,402 Views
13 Pages

Security Awareness of the Digital Natives

  • Vasileios Gkioulos,
  • Gaute Wangen,
  • Sokratis K. Katsikas,
  • George Kavallieratos and
  • Panayiotis Kotzanikolaou

Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. Furthermore, the number of secu...

  • Article
  • Open Access
27 Citations
4,520 Views
9 Pages

Based on dynamic information collected from different time intervals in some real situations, this paper firstly proposes a dynamic single valued neutrosophic multiset (DSVNM) to express dynamic information and operational relations of DSVNMs. Then,...

  • Article
  • Open Access
3 Citations
5,271 Views
15 Pages

27 March 2017

Wireless sensor networks (WSN) have become a significant technology in recent years. They can be widely used in many applications. WSNs consist of a large number of sensor nodes and each of them is energy-constrained and low-power dissipation. Most o...

  • Article
  • Open Access
5 Citations
4,742 Views
15 Pages

Continuous Leakage Resilient Lossy Trapdoor Functions

  • Sujuan Li,
  • Yi Mu,
  • Mingwu Zhang and
  • Futai Zhang

23 March 2017

Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489