Skip to Content

Information, Volume 8, Issue 3

2017 September - 43 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (43)

  • Article
  • Open Access
14 Citations
6,916 Views
21 Pages

Comparison of T-Norms and S-Norms for Interval Type-2 Fuzzy Numbers in Weight Adjustment for Neural Networks

  • Fernando Gaxiola,
  • Patricia Melin,
  • Fevrier Valdez,
  • Oscar Castillo and
  • Juan R. Castro

20 September 2017

A comparison of different T-norms and S-norms for interval type-2 fuzzy number weights is proposed in this work. The interval type-2 fuzzy number weights are used in a neural network with an interval backpropagation learning enhanced method for weigh...

  • Article
  • Open Access
10 Citations
6,011 Views
15 Pages

14 September 2017

In this paper, we analyze the outage probability of an amplify-and-forward (AF) cooperative non-orthogonal multiple access (NOMA) model in multi-relay multiuser networks. In contrast to conventional cooperative networks, relays in the considered netw...

  • Article
  • Open Access
2 Citations
6,168 Views
17 Pages

14 September 2017

The Second Board Market is typical stock market for high tech companies in China. This paper discusses the relationship between trading volume and price changes in the case of high-tech listed companies in the Chinese Second-Board Stock Market. By us...

  • Feature Paper
  • Article
  • Open Access
45 Citations
5,192 Views
11 Pages

8 September 2017

To describe both certain linguistic neutrosophic information and uncertain linguistic neutrosophic information simultaneously in the real world, this paper originally proposes the concept of a linguistic neutrosophic cubic number (LNCN), including an...

  • Review
  • Open Access
5 Citations
7,247 Views
18 Pages

Frequent Releases in Open Source Software: A Systematic Review

  • Antonio Cesar Brandão Gomes da Silva,
  • Glauco De Figueiredo Carneiro,
  • Fernando Brito e Abreu and
  • Miguel Pessoa Monteiro

5 September 2017

Context: The need to accelerate software delivery, supporting faster time-to-market and frequent community developer/user feedback are issues that have led to relevant changes in software development practices. One example is the adoption of Rapid Re...

  • Article
  • Open Access
3 Citations
32,577 Views
32 Pages

Collecting Sensed Data with Opportunistic Networks: The Case of Contact Information Overhead

  • Tekenate E. Amah,
  • Maznah Kamat,
  • Kamalrulnizam Abu Bakar,
  • Syed Othmawi Abd Rahman,
  • Muhammad Hafiz Mohammed,
  • Aliyu M. Abali,
  • Waldir Moreira and
  • Antonio Oliveira

5 September 2017

The rising human population in urban environments drives the mission towards smart cities, which envisions a wide deployment of sensors in order to improve the quality of living. In this regard, opportunistic networks (OppNets) present an economical...

  • Article
  • Open Access
45 Citations
6,075 Views
11 Pages

1 September 2017

Linguistic neutrosophic numbers (LNN) is presented by Fang and Ye in 2017, which can describe the truth, falsity, and indeterminacy linguistic information independently. In this paper, the LNN and the Bonferroni mean operator are merged together to p...

  • Article
  • Open Access
55 Citations
10,907 Views
14 Pages

31 August 2017

The traditional algorithms for recognizing handwritten alphanumeric characters are dependent on hand-designed features. In recent days, deep learning techniques have brought about new breakthrough technology for pattern recognition applications, espe...

  • Article
  • Open Access
42 Citations
6,658 Views
19 Pages

30 August 2017

The selection of a desirable site for constructing a pumped hydro energy storage plant (PHESP) plays a vital important role in the whole life cycle. However, little research has been done on the site selection of PHESP, which affects the rapid develo...

  • Article
  • Open Access
38 Citations
7,161 Views
15 Pages

Edge Detection Method Based on General Type-2 Fuzzy Logic Applied to Color Images

  • Claudia I. Gonzalez,
  • Patricia Melin and
  • Oscar Castillo

28 August 2017

This paper presents a new general type-2 fuzzy logic method for edge detection applied to color format images. The proposed algorithm combines the methodology based on the image gradients and general type-2 fuzzy logic theory to provide a powerful ed...

  • Article
  • Open Access
9 Citations
5,290 Views
14 Pages

A Novel STDM Watermarking Using Visual Saliency-Based JND Model

  • Chunxing Wang,
  • Teng Zhang,
  • Wenbo Wan,
  • Xiaoyue Han and
  • Meiling Xu

25 August 2017

The just noticeable distortion (JND) model plays an important role in measuring the visual visibility for spread transform dither modulation (STDM) watermarking. However, the existing JND model characterizes the suprathreshold distortions with an equ...

  • Article
  • Open Access
6 Citations
6,032 Views
20 Pages

25 August 2017

Timetable design is crucial to the reliability of a metro service. In terms of the delays caused by passengers’ boarding and alighting behaviors during rush hours, the planned timetable for a metro line with high-frequency service tends to be difficu...

  • Review
  • Open Access
67 Citations
18,627 Views
24 Pages

24 August 2017

In the last few years, traffic congestion has become a growing concern due to increasing vehicle ownerships in urban areas. Intersections are one of the major bottlenecks that contribute to urban traffic congestion. Traditional traffic signal control...

  • Article
  • Open Access
1 Citations
5,203 Views
11 Pages

16 August 2017

In this paper, a new approach is proposed to solve the constrained optimization problem of saving grid energy and increasing safety in a simultaneous wireless information and power transfer (SWIPT) system. The traditional grid energy is combined with...

  • Article
  • Open Access
20 Citations
7,588 Views
17 Pages

14 August 2017

Triangular intuitionistic fuzzy number (TIFN) is a more generalized platform for expressing imprecise, incomplete, and inconsistent information when solving multi-criteria decision-making problems, as well as for expressing and reflecting the evaluat...

  • Article
  • Open Access
1 Citations
5,897 Views
9 Pages

11 August 2017

The study of information as proposed in information theory provides a useful tool for studying many aspects of information systems, libraries, and archives. How does a calculator that computes information-theoretic functions contribute to students le...

  • Review
  • Open Access
66 Citations
10,189 Views
18 Pages

Review of Recent Type-2 Fuzzy Image Processing Applications

  • Oscar Castillo,
  • Mauricio A. Sanchez,
  • Claudia I. Gonzalez and
  • Gabriela E. Martinez

10 August 2017

This paper presents a literature review of applications using type-2 fuzzy systems in the area of image processing. Over the last years, there has been a significant increase in research on higher-order forms of fuzzy logic; in particular, the use of...

  • Article
  • Open Access
29 Citations
6,341 Views
13 Pages

7 August 2017

Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big proble...

  • Article
  • Open Access
11 Citations
4,605 Views
13 Pages

3 August 2017

In order to estimate traffic densities in a large-scale urban freeway network in an accurate and timely fashion when traffic sensors do not cover the freeway network completely and thus only local measurement data can be utilized, this paper proposes...

  • Article
  • Open Access
2 Citations
5,391 Views
22 Pages

2 August 2017

Wireless sensor technologies can be used by intelligent transportation systems to provide innovative services that lead to improvements in road safety and congestion, increasing end-user satisfaction. In this article, we address vehicle routing with...

  • Article
  • Open Access
86 Citations
10,454 Views
16 Pages

Learners in a massive open online course often express feelings, exchange ideas and seek help by posting questions in discussion forums. Due to the very high learner-to-instructor ratios, it is unrealistic to expect instructors to adequately track th...

  • Article
  • Open Access
32 Citations
9,321 Views
24 Pages

A Practical Point Cloud Based Road Curb Detection Method for Autonomous Vehicle

  • Rulin Huang,
  • Jiajia Chen,
  • Jian Liu,
  • Lu Liu,
  • Biao Yu and
  • Yihua Wu

Robust and quick road curb detection under various situations is critical in developing intelligent vehicles. However, the road curb detection is easily affected by the obstacles in the road area when Lidar based method is applied. A practical road c...

  • Article
  • Open Access
138 Citations
13,668 Views
13 Pages

Deep Transfer Learning for Modality Classification of Medical Images

  • Yuhai Yu,
  • Hongfei Lin,
  • Jiana Meng,
  • Xiaocong Wei,
  • Hai Guo and
  • Zhehuan Zhao

Medical images are valuable for clinical diagnosis and decision making. Image modality is an important primary step, as it is capable of aiding clinicians to access required medical image in retrieval systems. Traditional methods of modality classifi...

  • Article
  • Open Access
18 Citations
10,642 Views
17 Pages

Fuzzy Color Clustering for Melanoma Diagnosis in Dermoscopy Images

  • Haidar A. Almubarak,
  • R. Joe Stanley,
  • William V. Stoecker and
  • Randy H. Moss

A fuzzy logic-based color histogram analysis technique is presented for discriminating benign skin lesions from malignant melanomas in dermoscopy images. The approach extends previous research for utilizing a fuzzy set for skin lesion color for a spe...

  • Article
  • Open Access
5,344 Views
15 Pages

In this paper, a kind of fault-tolerant controller is proposed to study the stabilization problem of discrete-time Markovian jump systems, whose operation modes are not only partially-available but also unmatched. Here, such general properties of con...

  • Article
  • Open Access
4 Citations
7,408 Views
26 Pages

Evaluation of VoIP QoS Performance in Wireless Mesh Networks

  • Mohammad Tariq Meeran,
  • Paul Annus,
  • Muhammad Mahtab Alam and
  • Yannick Le Moullec

The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP) solutions in wireless mesh network (WMN) scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose c...

  • Article
  • Open Access
3 Citations
4,856 Views
13 Pages

In opportunistic mobile networks (OppNets), nodes should be in listening state to discover the neighbors for opportunistic message forwarding. While in OppNets, contacts between nodes are sparse, most of the node’s energy is consumed in idle listenin...

  • Article
  • Open Access
8 Citations
4,862 Views
13 Pages

A Radio Frequency Identification (RFID) grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some...

  • Article
  • Open Access
5 Citations
4,336 Views
20 Pages

In this paper, we introduce an analytical framework for the performance evaluation of the VDSL2-based access systems. It allows for the obtaining of approximations of the achievable bit rate per user, taking into account several factors, such as the...

  • Article
  • Open Access
33 Citations
5,231 Views
12 Pages

Single-valued neutrosophic numbers (SVNNs) can express incomplete, indeterminate, and inconsistent information in the real world. Then, the common weighted aggregation operators of SVNNs may result in unreasonably aggregated results in some situation...

  • Article
  • Open Access
6 Citations
4,790 Views
17 Pages

In order to improve the performance of optimization, we apply a hybridization of adaptive biogeography-based optimization (BBO) algorithm and differential evolution (DE) to multi-objective optimization problems (MOPs). A model of multi-objective evol...

  • Article
  • Open Access
3 Citations
4,057 Views
7 Pages

Circulant matrices have attracted interest due to their rich algebraic structures and various applications. In this paper, the concept of vector-circulant matrices over finite fields is studied as a generalization of circulant matrices. The algebraic...

  • Article
  • Open Access
3 Citations
7,646 Views
18 Pages

Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags

  • Fernando Kaway Carvalho Ota,
  • Michael Roland,
  • Michael Hölzl,
  • René Mayrhofer and
  • Aleardo Manacero

Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range of smartphones enables the...

  • Article
  • Open Access
2 Citations
3,739 Views
8 Pages

Building-up construction is one of several methods for constructing self-dual codes. Recently, a new building-up construction method has been developed by S. Han, in which the existence of a square matrix U such that U U T = - I is essentia...

  • Article
  • Open Access
10 Citations
6,777 Views
18 Pages

Information Mining from Heterogeneous Data Sources: A Case Study on Drought Predictions

  • Getachew B. Demisse,
  • Tsegaye Tadesse,
  • Solomon Atnafu,
  • Shawndra Hill,
  • Brian D. Wardlow,
  • Yared Bayissa and
  • Andualem Shiferaw

The objective of this study was to develop information mining methodology for drought modeling and predictions using historical records of climate, satellite, environmental, and oceanic data. The classification and regression tree (CART) approach was...

  • Article
  • Open Access
13 Citations
10,500 Views
20 Pages

Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple secu...

  • Article
  • Open Access
37 Citations
11,795 Views
25 Pages

The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related...

  • Article
  • Open Access
5 Citations
5,982 Views
14 Pages

Adaptive coded and modulation (ACM) is an effective measure to resist rain attenuation in Ka-band satellite communications. The accuracy of the estimator for signal-to-noise ratio (SNR) is one of the main factors that affect ACM performance. This pap...

  • Article
  • Open Access
15 Citations
5,912 Views
20 Pages

Discovering and Understanding City Events with Big Data: The Case of Rome

  • Barbara Furletti,
  • Roberto Trasarti,
  • Paolo Cintia and
  • Lorenzo Gabrielli

The increasing availability of large amounts of data and digital footprints has given rise to ambitious research challenges in many fields, which spans from medical research, financial and commercial world, to people and environmental monitoring. Whe...

  • Article
  • Open Access
53 Citations
18,346 Views
14 Pages

An Overview on Evaluating and Predicting Scholarly Article Impact

  • Xiaomei Bai,
  • Hui Liu,
  • Fuli Zhang,
  • Zhaolong Ning,
  • Xiangjie Kong,
  • Ivan Lee and
  • Feng Xia

Scholarly article impact reflects the significance of academic output recognised by academic peers, and it often plays a crucial role in assessing the scientific achievements of researchers, teams, institutions and countries. It is also used for addr...

  • Article
  • Open Access
7 Citations
6,632 Views
13 Pages

Deployment and Field Evaluation of In-Vehicle Traffic Signal Advisory System (ITSAS)

  • Joyoung Lee,
  • Slobodan Gutesa,
  • Branislav Dimitrijevic,
  • Yuchuan Zhang,
  • Lazar Spasovic and
  • Jeevanjot Singh

This research evaluates the impact of In-vehicle Signal Advisory System (ITSAS) on signalized arterial. ITSAS provides individual drivers equipped with a mobile communication device with advisory speed information enabling to minimize the time delay...

  • Article
  • Open Access
7 Citations
12,744 Views
23 Pages

As the geolocation capabilities of smartphones continue to improve, developers have continued to create more innovative applications that rely on this location information for their primary function. This can be seen with Niantic’s release of Pokémon...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489