You are currently viewing a new version of our website. To view the old version click .

Information, Volume 8, Issue 3

September 2017 - 43 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (43)

  • Article
  • Open Access
32 Citations
5,009 Views
12 Pages

Single-valued neutrosophic numbers (SVNNs) can express incomplete, indeterminate, and inconsistent information in the real world. Then, the common weighted aggregation operators of SVNNs may result in unreasonably aggregated results in some situation...

  • Article
  • Open Access
6 Citations
4,656 Views
17 Pages

In order to improve the performance of optimization, we apply a hybridization of adaptive biogeography-based optimization (BBO) algorithm and differential evolution (DE) to multi-objective optimization problems (MOPs). A model of multi-objective evol...

  • Article
  • Open Access
3 Citations
3,943 Views
7 Pages

Circulant matrices have attracted interest due to their rich algebraic structures and various applications. In this paper, the concept of vector-circulant matrices over finite fields is studied as a generalization of circulant matrices. The algebraic...

  • Article
  • Open Access
3 Citations
7,253 Views
18 Pages

Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags

  • Fernando Kaway Carvalho Ota,
  • Michael Roland,
  • Michael Hölzl,
  • René Mayrhofer and
  • Aleardo Manacero

Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range of smartphones enables the...

  • Article
  • Open Access
2 Citations
3,625 Views
8 Pages

Building-up construction is one of several methods for constructing self-dual codes. Recently, a new building-up construction method has been developed by S. Han, in which the existence of a square matrix U such that U U T = - I is essentia...

  • Article
  • Open Access
10 Citations
6,651 Views
18 Pages

Information Mining from Heterogeneous Data Sources: A Case Study on Drought Predictions

  • Getachew B. Demisse,
  • Tsegaye Tadesse,
  • Solomon Atnafu,
  • Shawndra Hill,
  • Brian D. Wardlow,
  • Yared Bayissa and
  • Andualem Shiferaw

The objective of this study was to develop information mining methodology for drought modeling and predictions using historical records of climate, satellite, environmental, and oceanic data. The classification and regression tree (CART) approach was...

  • Article
  • Open Access
12 Citations
10,142 Views
20 Pages

Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple secu...

  • Article
  • Open Access
34 Citations
11,326 Views
25 Pages

The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related...

  • Article
  • Open Access
5 Citations
5,807 Views
14 Pages

Adaptive coded and modulation (ACM) is an effective measure to resist rain attenuation in Ka-band satellite communications. The accuracy of the estimator for signal-to-noise ratio (SNR) is one of the main factors that affect ACM performance. This pap...

  • Article
  • Open Access
15 Citations
5,757 Views
20 Pages

Discovering and Understanding City Events with Big Data: The Case of Rome

  • Barbara Furletti,
  • Roberto Trasarti,
  • Paolo Cintia and
  • Lorenzo Gabrielli

The increasing availability of large amounts of data and digital footprints has given rise to ambitious research challenges in many fields, which spans from medical research, financial and commercial world, to people and environmental monitoring. Whe...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489Creative Common CC BY license