You are currently viewing a new version of our website. To view the old version click .

Information, Volume 9, Issue 4

April 2018 - 33 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (33)

  • Article
  • Open Access
9 Citations
4,850 Views
29 Pages

13 April 2018

Useful inheritances from scientific experience open perspective ways for increasing the degree of success in designing of systems with software. One such way is a search and build applied theory that takes into account the nature of design and the sp...

  • Article
  • Open Access
11 Citations
5,083 Views
14 Pages

12 April 2018

The healthcare ambit is usually perceived as “information rich” yet “knowledge poor”. Nowadays, an unprecedented effort is underway to increase the use of business intelligence techniques to solve this problem. Heart disease (HD) is a major cause of...

  • Article
  • Open Access
14 Citations
5,400 Views
13 Pages

11 April 2018

This paper proposes an improved two-way security authentication protocol to improve the security level of Radio Frequency Identification (RFID) system. In the proposed protocol, tags calculate hash value, which is divided into two parts. The left hal...

  • Article
  • Open Access
2 Citations
4,177 Views
15 Pages

11 April 2018

Availability is one of the main concerns of cloud users, and cloud providers always try to provide higher availability to improve user satisfaction. However, higher availability results in higher provider costs and lower social welfare. In this paper...

  • Article
  • Open Access
2 Citations
4,036 Views
20 Pages

11 April 2018

In this paper, the hesitant neutrosophic linguistic set is first defined by extending a hesitant fuzzy set to accommodate linguistic terms and neutrosophic fuzzy values. Some operational laws are defined for hesitant neutrosophic linguistic fuzzy inf...

  • Article
  • Open Access
4,277 Views
20 Pages

In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a source communication with N ( N ≥ 1 ) destinations via an untrusted variable gains relay. To exploit multiuser diversity while protecting source’...

  • Article
  • Open Access
9 Citations
5,258 Views
18 Pages

POI (point-of-interest) recommendation as one of the efficient information filtering techniques has been widely utilized in helping people find places they are likely to visit, and many related methods have been proposed. Although the methods that ex...

  • Feature Paper
  • Article
  • Open Access
13 Citations
16,166 Views
15 Pages

We propose that the ability of humans to identify and create patterns led to the unique aspects of human cognition and culture as a complex emergent dynamic system consisting of the following human traits: patterning, social organization beyond that...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489