You are currently viewing a new version of our website. To view the old version click .

Informatics, Volume 9, Issue 1

March 2022 - 29 articles

Cover Story: In this paper, we present a novel implementation of an ecosystem simulation. In the past, we implemented a 3D environment based on a predator–prey model, but we found that in most cases, regardless of the choice of starting parameters, the simulation quickly led to extinctions. We wanted to achieve system stabilization, long-term operation, and better simulation of reality by incorporating genetic evolution. Therefore, we applied the predator–prey model with an evolutional approach. Using the Unity game engine, we created and managed a closed 3D ecosystem environment defined by an artificial or real uploaded map. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
23 Citations
5,516 Views
18 Pages

Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection

  • Mário Antunes,
  • Luís Oliveira,
  • Afonso Seguro,
  • João Veríssimo,
  • Ruben Salgado and
  • Tiago Murteira

Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerab...

  • Article
  • Open Access
38 Citations
26,653 Views
24 Pages

Factors Affecting Reputational Damage to Organisations Due to Cyberattacks

  • Srinath Perera,
  • Xiaohua Jin,
  • Alana Maurushat and
  • De-Graft Joe Opoku

The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased c...

  • Article
  • Open Access
32 Citations
6,116 Views
19 Pages

The article considers the attitude of smart city residents towards the use of web applications in everyday life. It is very important for many stakeholders since it affects the involvement of people in all processes of urban life and contributes to t...

  • Article
  • Open Access
4 Citations
5,837 Views
15 Pages

Where Is My Mind (Looking at)? A Study of the EEG–Visual Attention Relationship

  • Victor Delvigne,
  • Noé Tits,
  • Luca La Fisca,
  • Nathan Hubens,
  • Antoine Maiorca,
  • Hazem Wannous,
  • Thierry Dutoit and
  • Jean-Philippe Vandeborre

Visual attention estimation is an active field of research at the crossroads of different disciplines: computer vision, deep learning, and medicine. One of the most common approaches to estimate a saliency map representing attention is based on the o...

  • Article
  • Open Access
39 Citations
13,224 Views
32 Pages

“Saving Precious Seconds”—A Novel Approach to Implementing a Low-Cost Earthquake Early Warning System with Node-Level Detection and Alert Generation

  • Raj Prasanna,
  • Chanthujan Chandrakumar,
  • Rasika Nandana,
  • Caroline Holden,
  • Amal Punchihewa,
  • Julia S. Becker,
  • Seokho Jeong,
  • Nandika Liyanage,
  • Danuka Ravishan and
  • Rangana Sampath
  • + 1 author

This paper presents findings from ongoing research that explores the ability to use Micro-Electromechanical Systems (MEMS)-based technologies and various digital communication protocols for earthquake early warning (EEW). The paper proposes a step-by...

  • Article
  • Open Access
17 Citations
17,838 Views
22 Pages

Despite the numerous advantages of microchip implants, their adoption remains low in the public sector. We conducted a cross-sectional survey to identify concerns and expectations about microchip implants among potential users. A total of 179 United...

  • Feature Paper
  • Article
  • Open Access
4 Citations
5,333 Views
14 Pages

Identifying Faked Responses in Questionnaires with Self-Attention-Based Autoencoders

  • Alberto Purpura,
  • Giuseppe Sartori,
  • Dora Giorgianni,
  • Graziella Orrú and
  • Gian Antonio Susto

Deception, also known as faking, is a critical issue when collecting data using questionnaires. As shown by previous studies, people have the tendency to fake their answers whenever they gain an advantage from doing so, e.g., when taking a test for a...

  • Feature Paper
  • Article
  • Open Access
8 Citations
10,361 Views
14 Pages

Social Media and Social Support: A Framework for Patient Satisfaction in Healthcare

  • Md Irfanuzzaman Khan,
  • Zoeb Ur Rahman,
  • M. Abu Saleh and
  • Saeed Uz Zaman Khan

Social media has been a powerful source of social support for health consumers. In the healthcare sector, social media has thrived, building on various dynamic platforms supporting the connection between social relationships, health, and wellbeing. W...

  • Article
  • Open Access
3 Citations
3,945 Views
14 Pages

Identification of Bots and Cyborgs in the #FeesMustFall Campaign

  • Yaseen Khan,
  • Surendra Thakur,
  • Obiseye Obiyemi and
  • Emmanuel Adetiba

Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence o...

  • Article
  • Open Access
17 Citations
7,650 Views
14 Pages

Software engineering companies have progressively incorporated agile project management methodologies. Initially, this migration occurred mostly in the context of startups, but in recent years it has also sparked interest from other companies with la...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Informatics - ISSN 2227-9709