Advanced Research in Technology and Information Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 17 September 2024 | Viewed by 10231

Special Issue Editors


E-Mail Website
Guest Editor
Department of Accounting, Business Information Systems and Statistics, Alexandru Ioan Cuza University of Iasi, 700506 Iași, Romania
Interests: neural networks; machine learning; deep learning; sentiment analysis; IoT systems; information systems for management; enterprise resource planning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Management, Faculty of Education, Economics and Technology, University of Granada, 51001 Ceuta, Spain
Interests: IoT; information systems; smart cities; innovations in business; radical technological innovations in business and society; quantitative research
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Customer Intelligence Research Group, West Pomeranian University of Technology, 70-311 Szczecin, Poland
Interests: human-computer interaction; machine learning; customer relationship management; electronic commerce
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The domains of Information Systems and Technology are constantly growing, providing a plethora of research topics as well as multiple career opportunities. Information Systems serves as the nexus of technology, processes, and people, and fosters innovations in various domains throughout a wide variety of subjects for research such as Databases, Artificial intelligence (NLP, Deep Learning, Machine Learning) Programming, Information Systems Analysis and Design. The recent Technology advancements and Internet infrastructure bring benefits to worldwide communities throughout Smart cities, Smart Governance and Smart Education, and increase the emergence of IoT and “smart” capabilities of electronic sensors.

This Special Issue of Electronics Journal, entitled Advanced Research in Technology and Information Systems aims to reunite in a single volume the most recent discoveries "within Business and Public sector" in the form of original research manuscripts and also reviews on relevant subjects for this collection. The implications related to technology and Information systems in higher education curricula are also welcome in this SI. Therefore, the topics of interest for this Special Issue can include, but are not limited to:

  • Information Systems: analysis, design and developments
  • Information Systems - as a study discipline - higher education curricula challenges
  • Artificial Intelligence Applications
  • Natural Language Processing
  • Human-Computer Interaction
  • Electronic commerce
  • Machine learning techniques for intelligent software development
  • Artificial Neural Networks applications
  • BigData applications
  • Intelligent electronic solutions for the future applications
  • IoT implementations
  • Smart government, smart education, smart cities, smart electronics, smart offices
  • Advanced features of power systems

Prof. Dr. Vasile-Daniel Pavaloaia
Prof. Dr. Rodrigo Martin-Rojas
Prof. Dr. Piotr Sulikowski
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (9 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

26 pages, 4924 KiB  
Article
Advanced Analytics and Data Management in the Procurement Function: An Aviation Industry Case Study
by Andrea Altundag and Martin Wynn
Electronics 2024, 13(8), 1554; https://doi.org/10.3390/electronics13081554 - 19 Apr 2024
Viewed by 606
Abstract
The company’s strategic procurement function makes a significant contribution to overall corporate success, and yet remains under-researched in terms of digitalisation and digital maturity. This research adopts an inductive case study approach, using qualitative data from in-depth interviews with industry practitioners to develop [...] Read more.
The company’s strategic procurement function makes a significant contribution to overall corporate success, and yet remains under-researched in terms of digitalisation and digital maturity. This research adopts an inductive case study approach, using qualitative data from in-depth interviews with industry practitioners to develop and apply a digital maturity model for the deployment of strategic procurement analytics. The case study company is a multinational aerospace corporation with almost 150,000 employees worldwide. The research presents a snapshot of the digital maturity of the strategic procurement function of this global aircraft manufacturer and finds that the current exploitation of analytics remains constrained by a range of factors, including the need for close compliance with regulatory norms. Thematic analysis of the interview material provides the basis for the development of the maturity model, which—although geared to a specific industry context—is nevertheless of relevance in other business environments. The research thus contributes to the existing literature in this field, and will also be of interest to procurement professionals. However, the research clearly has its limitations, not least in that it is based on just one industry case, and cross-industry generalisations from the findings must therefore be treated with caution. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

19 pages, 1754 KiB  
Article
Intrusion Detection System for Autonomous Vehicles Using Non-Tree Based Machine Learning Algorithms
by Cynthia Anthony, Walid Elgenaidi and Muzaffar Rao
Electronics 2024, 13(5), 809; https://doi.org/10.3390/electronics13050809 - 20 Feb 2024
Cited by 1 | Viewed by 1794
Abstract
This research work highlights significant achievements in the domain of intrusion detection systems (IDSs) for autonomous vehicles, which are crucial in enhancing their safety, reliability, and cybersecurity. This study introduces an approach that leverages non-tree-based machine learning algorithms, such as K-nearest neighbors and [...] Read more.
This research work highlights significant achievements in the domain of intrusion detection systems (IDSs) for autonomous vehicles, which are crucial in enhancing their safety, reliability, and cybersecurity. This study introduces an approach that leverages non-tree-based machine learning algorithms, such as K-nearest neighbors and ensemble learning, to develop an IDS tailored for autonomous vehicles. These algorithms were employed because of their ability to process complex and large datasets with less likeliness for overfitting, their scalability, and their ability to adapt to changing conditions in real time. These algorithms effectively handle imbalanced data, enhancing the detection accuracy of both normal and intrusive instances. The IDS’s performance was validated through the utilization of three real-world datasets, CAN intrusion, CICIDS2017, and NSL-KDD, where the proposed non-tree-based IDS (NTB-MTH-IDS) was measured with the standard measurement metrics: accuracy, precision, F1-score, and recall, including specificity and sensitivity. Notably, the results indicate that K-nearest neighbors and stacking, as part of NTB-MTH-IDS, has an accuracy of 99.00%, 98.57%, and 97.57%, and F1-scores of 99.00%, 98.79%, and 97.54% in the CICIDS2017, NSL-KDD, and CAN datasets, respectively. The results of this research can lead to establishing a robust intrusion detection framework, thereby ensuring the safety and reliability of autonomous vehicles. Through this achievement, road users, passengers, and pedestrians are safeguarded against the consequences of potential cyber threats. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

27 pages, 2128 KiB  
Article
A Comprehensive and Privacy-Aware Approach for Remote Qualified Electronic Signatures
by Iulian Aciobăniței, Ștefan-Ciprian Arseni, Emil Bureacă and Mihai Togan
Electronics 2024, 13(4), 757; https://doi.org/10.3390/electronics13040757 - 14 Feb 2024
Viewed by 843
Abstract
The current shift towards digital transactions emphasizes the need for robust Qualified Electronic Signature (QES) frameworks that safeguard integrity and privacy. Having the potential to become the leading type of adopted QES, the main challenge that Remote QESs present to end users is [...] Read more.
The current shift towards digital transactions emphasizes the need for robust Qualified Electronic Signature (QES) frameworks that safeguard integrity and privacy. Having the potential to become the leading type of adopted QES, the main challenge that Remote QESs present to end users is choosing between transmitting the entire document or only its digest to the Trust Service Provider (TSP). The first option compromises the document’s confidentiality, while the second one requires the development of signature applications compliant with advanced signature formats, a task that often needs additional time and resources. In this paper, we introduce a comprehensive strategy for remote QESs, designed for seamless integration with current client applications, while simultaneously maintaining user privacy. The main topics approached in this paper are the following: a comprehensive architecture for privacy-aware remote QES systems, relevant standards and legislation, integration scenarios for clients, and remote QES standard protocols to assure communication between client and TSP environments. Furthermore, we also explore the integration of our proposed solution with an enhanced long-term preservation service that uses Ethereum smart contracts and methodologies to implement signature applications with advanced electronic signatures via open-source libraries while ensuring document privacy. The main result of this work is a flexible on-premise module that provides the ability to sign, validate, and preserve documents, with a minimal integration effort. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

13 pages, 2198 KiB  
Article
Optimizing Customer Retention in the Telecom Industry: A Fuzzy-Based Churn Modeling with Usage Data
by Tomasz Zdziebko, Piotr Sulikowski, Wojciech Sałabun, Małgorzata Przybyła-Kasperek and Iwona Bąk
Electronics 2024, 13(3), 469; https://doi.org/10.3390/electronics13030469 - 23 Jan 2024
Viewed by 933
Abstract
Churn is a serious challenge for the telecommunications industry because of the much higher costs of gaining new customers than maintaining existing ones. Therefore, efforts to increase loyalty and decrease customer churn are the focus of telecom’s retention departments. In order to direct [...] Read more.
Churn is a serious challenge for the telecommunications industry because of the much higher costs of gaining new customers than maintaining existing ones. Therefore, efforts to increase loyalty and decrease customer churn are the focus of telecom’s retention departments. In order to direct antichurn activities, profitable clients who have the highest probability of churning need to be identified. The data used to identify churners are often inaccurate and vague. In this paper, a fuzzy approach to modeling churn intent based on usage data in mobile telecommunications is presented. It appreciates the uncertainty of the data and provides insights into churn modeling. The goal of the study was to evaluate the applicability of the Mamdani and Sugeno models for building a churn model based on a limited but real-world dataset enriched with feature engineering. The additional goal was to find features most usable for churn modeling. Four metrics—accuracy, recall, precision, and F1-score—were used to estimate the performance of the models. The developed fuzzy rule-based systems show that to generalize possible churn identification factors with fuzzy rules, it is advisable to begin with features such as the change in the total amount of the invoice in the last period before the churning compared to the previous one, the total amount of the invoice in the period preceding the churning, the total amount of subscription in two months before the churning, the time of cooperation with the operator, and the number of calls out of the last quarter before leaving. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

31 pages, 5500 KiB  
Article
Tourism Hotel Accommodation Recommendation Algorithm Based on the Cellular Space-Improved Divisive Analysis (CS-IDIANA) Clustering Model
by Xiao Zhou, Jian Peng, Bowei Wen and Mingzhan Su
Electronics 2024, 13(1), 57; https://doi.org/10.3390/electronics13010057 - 21 Dec 2023
Viewed by 621
Abstract
On the basis of analyzing the problems concerning hotel accommodation recommendation (HAR), this paper constructs a tourism HAR algorithm based on the CS-IDIANA clustering model (cellular space-improved divisive analysis). The algorithm integrates the cellular space model with DIANA, and takes the tourist attractions [...] Read more.
On the basis of analyzing the problems concerning hotel accommodation recommendation (HAR), this paper constructs a tourism HAR algorithm based on the CS-IDIANA clustering model (cellular space-improved divisive analysis). The algorithm integrates the cellular space model with DIANA, and takes the tourist attractions and the travel route costs as the research background and constraint conditions. Considering the feature attributes and spatial attributes of the tourist attractions, the tourist attraction recommendation algorithm based on the CS-IDIANA clustering model is established, then the HAR algorithm based on the spatial accessibility and route cost is constructed, with the constraints of the spatial accessibility field strength (SAFS) between the hotels and attractions and the travel route costs between the hotels and attractions. The experiment selects the tourism city Zhengzhou as the research object, and the experimental results are analyzed in four dimensions: the clustering results, the recommendation field strength of the tourist attractions, the hotel SAFS and the HAR results. The experiment proves that the proposed algorithm can find the best matched tourist attractions for tourists and the hotels with the lowest tour route cost based on the constraint conditions. Compared to the suboptimal hotels, the route costs are reduced by 5.67% and 9.63%, respectively. Compared to the hotel with the highest route cost, it reduces the travel costs by 29.23%. Compared with the two commonly used recommendation methods, the UCFR (user-based collaborative filtering recommendation) and ICFR (item-based collaborative filtering recommendation), the proposed CSIDR (CS-IDIANA recommendation) has a higher accuracy and recall rate. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

20 pages, 3869 KiB  
Article
An Improved Particle Swarm Optimization Algorithm for the Urban Transit Routing Problem
by Vasileios Kourepinis, Christina Iliopoulou, Ioannis X. Tassopoulos, Chrysanthi Aroniadi and Grigorios N. Beligiannis
Electronics 2023, 12(15), 3358; https://doi.org/10.3390/electronics12153358 - 6 Aug 2023
Cited by 1 | Viewed by 1107
Abstract
The Urban Transit Routing Problem (UTRP) is a challenging discrete problem that revolves around designing efficient routes for public transport systems. It falls under the category of NP-hard problems, characterized by its complexity and numerous constraints. Evaluating potential route sets for feasibility is [...] Read more.
The Urban Transit Routing Problem (UTRP) is a challenging discrete problem that revolves around designing efficient routes for public transport systems. It falls under the category of NP-hard problems, characterized by its complexity and numerous constraints. Evaluating potential route sets for feasibility is a demanding and time-consuming task, often resulting in the rejection of many solutions. Given its difficulty, metaheuristic methods, such as swarm intelligence algorithms, are considered highly suitable for addressing the UTRP. However, the effectiveness of these methods depends heavily on appropriately adapting them to discrete problems, as well as employing suitable initialization procedures and solution-evaluation methods. In this study, a new variant of the particle swarm optimization algorithm is proposed as an efficient solution approach for the UTRP. We present an improved initialization function and improved modification operators, along with a post-optimization routine to further improve solutions. The algorithm’s performance is then compared to the state of the art using Mandl’s widely recognized benchmark, a standard for evaluating UTRP solutions. By comparing the generated solutions to published results from 10 studies on Mandl’s benchmark network, we demonstrate that the developed algorithm outperforms existing techniques, providing superior outcomes. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

18 pages, 428 KiB  
Article
On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT
by Sijia Tian and Vassilios G. Vassilakis
Electronics 2023, 12(14), 3085; https://doi.org/10.3390/electronics12143085 - 16 Jul 2023
Cited by 3 | Viewed by 1294
Abstract
The Internet of Things (IoT) deployment in emerging markets has increased dramatically, making security a prominent issue in IoT communication. Several protocols are available for IoT communication; among them, Message Queuing Telemetry Transport (MQTT) is pervasive in intelligent applications. However, MQTT is designed [...] Read more.
The Internet of Things (IoT) deployment in emerging markets has increased dramatically, making security a prominent issue in IoT communication. Several protocols are available for IoT communication; among them, Message Queuing Telemetry Transport (MQTT) is pervasive in intelligent applications. However, MQTT is designed for resource-constrained IoT devices and, by default, does not have a security scheme, necessitating an additional security scheme to overcome its weaknesses. The security vulnerabilities in MQTT inherently lead to overhead and poor communication performance. Adding a lightweight security framework for MQTT is essential to overcome these problems in a resource-constrained environment. The conventional MQTT security schemes present a single trusted scheme and perform attribute verification and key generation, which tend to be a bottleneck at the server and pave the way for various security attacks. In addition to that, using the same secret key for an extended period and a flawed key revocation system can affect the security of MQTT. To address these issues, we propose an Improved Ciphertext Policy-Attribute-Based Encryption (ICP-ABE) integrated with a lightweight symmetric encryption scheme, PRESENT, to improve the security of MQTT. In this work, the PRESENT algorithm enables the secure sharing of blind keys among clients. We evaluated a previously proposed ICP-ABE scheme from the perspective of energy consumption and communication overhead. Furthermore, we evaluated the efficiency of the scheme using provable security and formal methods. The simulation results showed that the proposed scheme consumes less energy in standard and attack scenarios than the simple PRESENT, Key Schedule Algorithm (KSA)-PRESENT Secure Message Queue Telemetry Transport (SMQTT), and ECC-RSA frameworks, with a topology of 30 nodes. In general, the proposed lightweight security framework for MQTT addresses the vulnerabilities of MQTT and ensures secure communication in a resource-constrained environment, making it a promising solution for IoT applications in emerging markets. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

Review

Jump to: Research

28 pages, 757 KiB  
Review
A Social Perspective on AI in the Higher Education System: A Semisystematic Literature Review
by Budur Turki Alshahrani, Salvatore Flavio Pileggi and Faezeh Karimi
Electronics 2024, 13(8), 1572; https://doi.org/10.3390/electronics13081572 - 19 Apr 2024
Viewed by 1180
Abstract
The application of Artificial Intelligence in Education (AIED) is experiencing widespread interest among students, educators, researchers, and policymakers. AIED is expected, among other things, to enhance learning environments in the higher education system. However, in line with the general trends, there are also [...] Read more.
The application of Artificial Intelligence in Education (AIED) is experiencing widespread interest among students, educators, researchers, and policymakers. AIED is expected, among other things, to enhance learning environments in the higher education system. However, in line with the general trends, there are also increasing concerns about possible negative and collateral effects. The consequent social impact cannot be currently assessed in depth. Balancing benefits with social considerations according to a socio-technical approach is essential for harnessing the true power of AI in a responsible and trustworthy context. This study proposes a semi-systematic literature review of the available knowledge on the adoption of artificial intelligence (AI) in the higher education system. It presents a stakeholder-centric analysis to explore multiple perspectives, including pedagogical, managerial, technological, governmental, external, and social ones. The main goal is to identify and discuss major gaps and challenges in context, looking at the existing body of knowledge and momentum. AIED should encompass pedagogical, ethical, and social dimensions to be properly addressed. This review highlights a not-always-explicit socio-technical perspective. Additionally, this study reveals a significant lack of empirical systematic evaluation of added value and institutional readiness. Because of the broad scope of the study and the intense ongoing debate on the topic, an exhaustive identification of the current body of knowledge is probably unrealistic, so this study aims mainly to identify the mainstream and major trends by looking at the most recent contributions. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

23 pages, 2674 KiB  
Review
Green Information Systems—A Bibliometric Analysis of the Literature from 2000 to 2023
by Laura-Diana Radu and Daniela Popescul
Electronics 2024, 13(7), 1329; https://doi.org/10.3390/electronics13071329 - 1 Apr 2024
Viewed by 581
Abstract
This review investigates the evolution of green information systems (ISs) based on an examination of the literature spanning the years 2000 to 2023. Using bibliographic analysis, a method that enables the study of a large volume of sources, this paper establishes connections among [...] Read more.
This review investigates the evolution of green information systems (ISs) based on an examination of the literature spanning the years 2000 to 2023. Using bibliographic analysis, a method that enables the study of a large volume of sources, this paper establishes connections among pertinent concepts in the green ISs field, outlining the authors’ interests in the analysed period. Based on the identification of key trends, primary directions, interdisciplinary initiatives, and emerging areas, the assessment reveals that the interest in minimizing the negative impact of information and communication technologies (ICTs) on the environment is a relevant research topic, with significant evolution in the analysed period. On this basis, this study emphasizes the need for the integration of environmental protection in all stages of the IS life cycle and in all industries, a holistic approach we consider essential for the sustainable growth of the ICT-based societal domains. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems)
Show Figures

Figure 1

Back to TopTop