Sign in to use this feature.

Years

Between: -

Article Types

Countries / Regions

Search Results (52)

Search Parameters:
Journal = Information
Section = Review

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 2404 KiB  
Review
Bio-Inspired Metaheuristics in Deep Learning for Brain Tumor Segmentation: A Decade of Advances and Future Directions
by Shoffan Saifullah, Rafał Dreżewski, Anton Yudhana, Wahyu Caesarendra and Nurul Huda
Information 2025, 16(6), 456; https://doi.org/10.3390/info16060456 - 29 May 2025
Cited by 1 | Viewed by 900
Abstract
Accurate segmentation of brain tumors in magnetic resonance imaging (MRI) remains a challenging task due to heterogeneous tumor structures, varying intensities across modalities, and limited annotated data. Deep learning has significantly advanced segmentation accuracy; however, it often suffers from sensitivity to hyperparameter settings [...] Read more.
Accurate segmentation of brain tumors in magnetic resonance imaging (MRI) remains a challenging task due to heterogeneous tumor structures, varying intensities across modalities, and limited annotated data. Deep learning has significantly advanced segmentation accuracy; however, it often suffers from sensitivity to hyperparameter settings and limited generalization. To overcome these challenges, bio-inspired metaheuristic algorithms have been increasingly employed to optimize various stages of the deep learning pipeline—including hyperparameter tuning, preprocessing, architectural design, and attention modulation. This review systematically examines developments from 2015 to 2025, focusing on the integration of nature-inspired optimization methods such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), Grey Wolf Optimizer (GWO), Whale Optimization Algorithm (WOA), and novel hybrids including CJHBA and BioSwarmNet into deep learning-based brain tumor segmentation frameworks. A structured multi-query search strategy was executed using Publish or Perish across Google Scholar and Scopus databases. Following PRISMA guidelines, 3895 records were screened through automated filtering and manual eligibility checks, yielding a curated set of 106 primary studies. Through bibliometric mapping, methodological synthesis, and performance analysis, we highlight trends in algorithm usage, application domains (e.g., preprocessing, architecture search), and segmentation outcomes measured by metrics such as Dice Similarity Coefficient (DSC), Jaccard Index (JI), Hausdorff Distance (HD), and ASSD. Our findings demonstrate that bio-inspired optimization significantly enhances segmentation accuracy and robustness, particularly in multimodal settings involving FLAIR and T1CE modalities. The review concludes by identifying emerging research directions in hybrid optimization, real-time clinical applicability, and explainable AI, providing a roadmap for future exploration in this interdisciplinary domain. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

35 pages, 1866 KiB  
Systematic Review
A Systematic Literature Review on Serious Games Methodologies for Training in the Mining Sector
by Claudia Gómez, Paola Vallejo and Jose Aguilar
Information 2025, 16(5), 389; https://doi.org/10.3390/info16050389 - 8 May 2025
Viewed by 638
Abstract
High-risk industries like mining must address occupational safety to reduce accidents and fatalities. Training through role-playing, simulations, and Serious Games (SGs) can reduce occupational risks. This study aims to conduct a systematic literature review (SLR) on SG methodologies for the mining sector. This [...] Read more.
High-risk industries like mining must address occupational safety to reduce accidents and fatalities. Training through role-playing, simulations, and Serious Games (SGs) can reduce occupational risks. This study aims to conduct a systematic literature review (SLR) on SG methodologies for the mining sector. This review was based on a methodology inspired by the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines. Three research questions were formulated to explore how SGs contribute to immediate feedback, brain stimulation, and training for high-risk scenarios. The review initially identified 1987 studies, which were reduced to 30 relevant publications following a three-phase process: (1) A search string based on three research questions was defined and applied to databases. (2) Publications were filtered by title and abstract. (3) A full-text reading was conducted to select relevant publications. The SLR showed SG development methodologies with structured processes that are adaptable to any case study. Additionally, it was found that Virtual Reality, despite its implementation costs, is the most used technology for safety training, inspection, and operation of heavy machinery. The first conclusion of this SLR indicates the lack of methodologies for the development of SG for training in the mining field, and the relevance of carrying out specific methodological studies in this field. Additionally, the main findings obtained from this SLR are the following: (1) Modeling languages (e.g., GML and UML) and metamodeling are important in SG development. (2) SG is a significant mechanism for cooperative and participative learning strategies. (3) Virtual Reality technology is widely used in safe virtual environments for mining training. (4) There is a need for methodologies that integrate the specification of cognitive functions with the affective part of the users for SGs suitable for learning environments. Finally, this review highlights critical gaps in current research and underscores the need for more integrative approaches to SG development. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

32 pages, 414 KiB  
Review
A Survey of Open-Source Autonomous Driving Systems and Their Impact on Research
by Nourdine Aliane
Information 2025, 16(4), 317; https://doi.org/10.3390/info16040317 - 17 Apr 2025
Viewed by 4225
Abstract
Open-source autonomous driving systems (ADS) have become a cornerstone of autonomous vehicle development. By providing access to cutting-edge technology, fostering global collaboration, and accelerating innovation, these platforms are transforming the automated vehicle landscape. This survey conducts a comprehensive analysis of leading open-source ADS [...] Read more.
Open-source autonomous driving systems (ADS) have become a cornerstone of autonomous vehicle development. By providing access to cutting-edge technology, fostering global collaboration, and accelerating innovation, these platforms are transforming the automated vehicle landscape. This survey conducts a comprehensive analysis of leading open-source ADS platforms, evaluating their functionalities, strengths, and limitations. Through an extensive literature review, the survey explores their adoption and utilization across key research domains. Additionally, it identifies emerging trends shaping the field. The main contributions of this survey include (1) a detailed overview of leading open-source platforms, highlighting their strengths and weaknesses; (2) an examination of their impact on research; and (3) a synthesis of current trends, particularly in interoperability with emerging technologies such as AI/ML solutions and edge computing. This study aims to provide researchers and practitioners with a holistic understanding of open-source ADS platforms, guiding them in selecting the right platforms for future innovation. Full article
(This article belongs to the Special Issue Surveys in Information Systems and Applications)
Show Figures

Graphical abstract

63 pages, 22670 KiB  
Review
Style Transfer Review: Traditional Machine Learning to Deep Learning
by Yao Xu, Min Xia, Kai Hu, Siyi Zhou and Liguo Weng
Information 2025, 16(2), 157; https://doi.org/10.3390/info16020157 - 19 Feb 2025
Cited by 1 | Viewed by 12414
Abstract
Style transfer is a technique that learns style features from different domains and applies these features to other images. It can not only play a role in the field of artistic creation but also has important significance in image processing, video processing, and [...] Read more.
Style transfer is a technique that learns style features from different domains and applies these features to other images. It can not only play a role in the field of artistic creation but also has important significance in image processing, video processing, and other fields. However, at present, style transfer still faces some challenges, such as the balance between style and content, the model generalization ability, and diversity. This article first introduces the origin and development process of style transfer and provides a brief overview of existing methods. Next, this article explores research work related to style transfer, introduces some metrics used to evaluate the effect of style transfer, and summarizes datasets. Subsequently, this article focuses on the application of the currently popular deep learning technology for style transfer and also mentions the application of style transfer in video. Finally, the article discusses possible future directions for this field. Full article
(This article belongs to the Special Issue Surveys in Information Systems and Applications)
Show Figures

Figure 1

33 pages, 754 KiB  
Review
Review of Modern Forest Fire Detection Techniques: Innovations in Image Processing and Deep Learning
by Berk Özel, Muhammad Shahab Alam and Muhammad Umer Khan
Information 2024, 15(9), 538; https://doi.org/10.3390/info15090538 - 3 Sep 2024
Cited by 13 | Viewed by 7445
Abstract
Fire detection and extinguishing systems are critical for safeguarding lives and minimizing property damage. These systems are especially vital in combating forest fires. In recent years, several forest fires have set records for their size, duration, and level of destruction. Traditional fire detection [...] Read more.
Fire detection and extinguishing systems are critical for safeguarding lives and minimizing property damage. These systems are especially vital in combating forest fires. In recent years, several forest fires have set records for their size, duration, and level of destruction. Traditional fire detection methods, such as smoke and heat sensors, have limitations, prompting the development of innovative approaches using advanced technologies. Utilizing image processing, computer vision, and deep learning algorithms, we can now detect fires with exceptional accuracy and respond promptly to mitigate their impact. In this article, we conduct a comprehensive review of articles from 2013 to 2023, exploring how these technologies are applied in fire detection and extinguishing. We delve into modern techniques enabling real-time analysis of the visual data captured by cameras or satellites, facilitating the detection of smoke, flames, and other fire-related cues. Furthermore, we explore the utilization of deep learning and machine learning in training intelligent algorithms to recognize fire patterns and features. Through a comprehensive examination of current research and development, this review aims to provide insights into the potential and future directions of fire detection and extinguishing using image processing, computer vision, and deep learning. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

25 pages, 10486 KiB  
Review
Digital Twins in Critical Infrastructure
by Georgios Lampropoulos, Xabier Larrucea and Ricardo Colomo-Palacios
Information 2024, 15(8), 454; https://doi.org/10.3390/info15080454 - 1 Aug 2024
Cited by 5 | Viewed by 3145
Abstract
This study aims to examine the use of digital twins in critical infrastructure through a literature review as well as a bibliometric and scientific mapping analysis. A total of 3414 documents from Scopus and Web of Science (WoS) are examined. According to the [...] Read more.
This study aims to examine the use of digital twins in critical infrastructure through a literature review as well as a bibliometric and scientific mapping analysis. A total of 3414 documents from Scopus and Web of Science (WoS) are examined. According to the findings, digital twins play an important role in critical infrastructure as they can improve the security, resilience, reliability, maintenance, continuity, and functioning of critical infrastructure in all sectors. Intelligent and autonomous decision-making, process optimization, advanced traceability, interactive visualization, and real-time monitoring, analysis, and prediction emerged as some of the benefits that digital twins can yield. Finally, the findings revealed the ability of digital twins to bridge the gap between physical and virtual environments, to be used in conjunction with other technologies, and to be integrated into various settings and domains. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

29 pages, 2401 KiB  
Review
A Review of Power System False Data Attack Detection Technology Based on Big Data
by Zhengwei Chang, Jie Wu, Huihui Liang, Yong Wang, Yanfeng Wang and Xingzhong Xiong
Information 2024, 15(8), 439; https://doi.org/10.3390/info15080439 - 28 Jul 2024
Cited by 6 | Viewed by 3464
Abstract
As power big data plays an increasingly important role in the operation, maintenance, and management of power systems, complex and covert false data attacks pose a serious threat to the safe and stable operation of the power system. This article first explores the [...] Read more.
As power big data plays an increasingly important role in the operation, maintenance, and management of power systems, complex and covert false data attacks pose a serious threat to the safe and stable operation of the power system. This article first explores the characteristics of new power systems, and the challenges posed by false data attacks. The application of big data technology in power production optimization, energy consumption analysis, and user service improvement is then investigated. The article classifies typical attacks against the four stages of power big data systems in detail and analyzes the characteristics of the attack types. It comprehensively summarizes the attack detection technologies used in the four key stages of power big data, including state estimation, machine learning, and data-driven attack detection methods in the data collection stage; clock synchronization monitoring and defense strategies in the data transmission stage; data processing and analysis, data integrity verification and protection measures of blockchain technology in the third stage; and traffic supervision, statistics and elastic computing measures in the control and response stage. Finally, the limitations of attack detection mechanisms are proposed and discussed from three dimensions: research problems, existing solutions, and future research directions. It aims to provide useful references and inspiration for researchers in power big data security to promote technological progress in the safe and stable operation of power systems. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

25 pages, 2333 KiB  
Review
A Comprehensive Bibliometric Analysis of Business Process Management and Knowledge Management Integration: Bridging the Scholarly Gap
by Justyna Berniak-Woźny and Marek Szelągowski
Information 2024, 15(8), 436; https://doi.org/10.3390/info15080436 - 27 Jul 2024
Cited by 2 | Viewed by 3356
Abstract
In the ever-evolving landscape of organisational optimisation, the integration of business process management (BPM) and knowledge management (KM) emerges as a critical challenge. Beyond the opportunity to expedite the improvement of the organisation’s operations, this integration serves as a gateway to unlocking the [...] Read more.
In the ever-evolving landscape of organisational optimisation, the integration of business process management (BPM) and knowledge management (KM) emerges as a critical challenge. Beyond the opportunity to expedite the improvement of the organisation’s operations, this integration serves as a gateway to unlocking the full potential of organisational knowledge and digital transformation. With its comprehensive evaluation of the dimensions of research on BPM and KM, this article aims to unveil predominant topics and evolving trends within this intersection. By doing so, it seeks to catalyse meaningful advancements in organisational management practices, underscoring the relevance and importance of this topic to the audience. The authors conducted a rigorous research process. Using bibliographic analysis, they selected 359 publications from the Scopus database. They employed performance analysis and scientific mapping methods to extract meaningful insights facilitated by MS Excel and VOSviewer applications. Additionally, they conducted an in-depth analysis of 37 publications chosen through bibliographic coupling analysis. The findings highlight a significant gap in the scholarly discourse on BPM and KM, which is evident in the limited research outcomes and minimal influence on decision-making processes. This study reiterates the need for increased dedication to this research realm, particularly in areas identified in the future research agenda recommendations, to stimulate significant advancements in organisational management practices. This paper stands out from the up-to-date reviews by offering a unique contribution to the BPM and KM integration field. While these reviews often focus on specific niches within the broader domain, this study takes a holistic approach. It provides a comprehensive overview of the existing literature on integrating BPM and KM, delving into the quantity and quality of existing research. It also identifies emerging themes and potential directions for future scholarship, ensuring a robust understanding of the integrative landscape of BPM and KM. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

15 pages, 393 KiB  
Review
An Analytical Review of the Source Code Models for Exploit Analysis
by Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin
Information 2023, 14(9), 497; https://doi.org/10.3390/info14090497 - 8 Sep 2023
Cited by 2 | Viewed by 3183
Abstract
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses based on an analysis of exploit source [...] Read more.
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses based on an analysis of exploit source codes and real-time detection of features of their implementation. The key element of this approach is an exploit source code model. In this paper, to specify the model, we systematically analyze existing source code models, approaches to source code analysis in general, and exploits in particular in order to examine their advantages, applications, and challenges. Finally, we provide an initial specification of the proposed source code model. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

17 pages, 628 KiB  
Review
Metadata Standard for Continuous Preservation, Discovery, and Reuse of Research Data in Repositories by Higher Education Institutions: A Systematic Review
by Neema Florence Mosha and Patrick Ngulube
Information 2023, 14(8), 427; https://doi.org/10.3390/info14080427 - 28 Jul 2023
Cited by 3 | Viewed by 8282
Abstract
This systematic review synthesised existing research papers that explore the available metadata standards to enable researchers to preserve, discover, and reuse research data in repositories. This review provides a broad overview of certain aspects that must be taken into consideration when creating and [...] Read more.
This systematic review synthesised existing research papers that explore the available metadata standards to enable researchers to preserve, discover, and reuse research data in repositories. This review provides a broad overview of certain aspects that must be taken into consideration when creating and assessing metadata standards to enhance research data preservation discoverability and reusability strategies. Research papers on metadata standards, research data preservation, discovery and reuse, and repositories published between January 2003 and April 2023 were reviewed from a total of five databases. The review retrieved 1597 papers, and 13 papers were selected in this review. We revealed 13 research articles that explained the creation and application of metadata standards to enhance preservation, discovery, and reuse of research data in repositories. Among them, eight presented the three main types of metadata, descriptive, structural, and administrative, to enable the preservation of research data in data repositories. We noted limited evidence on how these metadata standards can be used to enhance the discovery and reuse of research data in repositories to enable the preservation, discovery, and reuse of research data in repositories. No reviews indicated specific higher education institutions employing metadata standards for the research data created by their researchers. Repository designs and a lack of expertise and technology know-how were among the challenges identified from the reviewed papers. The review has the potential to influence professional practice and decision-making by stakeholders, including researchers, students, librarians, information communication technologists, data managers, private and public organisations, intermediaries, research institutions, and non-profit organizations. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

20 pages, 3143 KiB  
Review
A Systematic Literature Review and Meta-Analysis of Studies on Online Fake News Detection
by Robyn C. Thompson, Seena Joseph and Timothy T. Adeliyi
Information 2022, 13(11), 527; https://doi.org/10.3390/info13110527 - 4 Nov 2022
Cited by 17 | Viewed by 12975
Abstract
The ubiquitous access and exponential growth of information available on social media networks have facilitated the spread of fake news, complicating the task of distinguishing between this and real news. Fake news is a significant social barrier that has a profoundly negative impact [...] Read more.
The ubiquitous access and exponential growth of information available on social media networks have facilitated the spread of fake news, complicating the task of distinguishing between this and real news. Fake news is a significant social barrier that has a profoundly negative impact on society. Despite the large number of studies on fake news detection, they have not yet been combined to offer coherent insight on trends and advancements in this domain. Hence, the primary objective of this study was to fill this knowledge gap. The method for selecting the pertinent articles for extraction was created using the preferred reporting items for systematic reviews and meta-analyses (PRISMA). This study reviewed deep learning, machine learning, and ensemble-based fake news detection methods by a meta-analysis of 125 studies to aggregate their results quantitatively. The meta-analysis primarily focused on statistics and the quantitative analysis of data from numerous separate primary investigations to identify overall trends. The results of the meta-analysis were reported by the spatial distribution, the approaches adopted, the sample size, and the performance of methods in terms of accuracy. According to the statistics of between-study variance high heterogeneity was found with τ2 = 3.441; the ratio of true heterogeneity to total observed variation was I2 = 75.27% with the heterogeneity chi-square (Q) = 501.34, the degree of freedom = 124, and p ≤ 0.001. A p-value of 0.912 from the Egger statistical test confirmed the absence of a publication bias. The findings of the meta-analysis demonstrated satisfaction with the effectiveness of the recommended approaches from the primary studies on fake news detection that were included. Furthermore, the findings can inform researchers about various approaches they can use to detect online fake news. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

18 pages, 3244 KiB  
Review
Quantum Randomness in Cryptography—A Survey of Cryptosystems, RNG-Based Ciphers, and QRNGs
by Anish Saini, Athanasios Tsokanos and Raimund Kirner
Information 2022, 13(8), 358; https://doi.org/10.3390/info13080358 - 27 Jul 2022
Cited by 12 | Viewed by 4561
Abstract
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic algorithms are public and their strength depends on the keys, [...] Read more.
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers can significantly contribute to the unveiling of the cipher’s key. Therefore, to ensure high data security over a network, researchers need to improve the randomness of keys as they develop cryptosystems. Quantum particles have a leading edge in advancing RNG technology as they can provide true randomness, unlike pseudo-random numbers generators (PRNGs). In order to increase the level of the security of cryptographic systems based on random numbers, this survey focuses on three objectives: Cryptosystems with related cryptographic attacks, RNG-based cryptosystems, and the design of quantum random number generators (QRNGs). This survey aims to provide researchers with information about the importance of RNG-based ciphers and various research techniques for QRNGs that can incorporate quantum-based true randomness in cryptosystems. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

22 pages, 2211 KiB  
Review
A Literature Review of Textual Hate Speech Detection Methods and Datasets
by Fatimah Alkomah and Xiaogang Ma
Information 2022, 13(6), 273; https://doi.org/10.3390/info13060273 - 26 May 2022
Cited by 114 | Viewed by 29461
Abstract
Online toxic discourses could result in conflicts between groups or harm to online communities. Hate speech is complex and multifaceted harmful or offensive content targeting individuals or groups. Existing literature reviews have generally focused on a particular category of hate speech, and to [...] Read more.
Online toxic discourses could result in conflicts between groups or harm to online communities. Hate speech is complex and multifaceted harmful or offensive content targeting individuals or groups. Existing literature reviews have generally focused on a particular category of hate speech, and to the best of our knowledge, no review has been dedicated to hate speech datasets. This paper systematically reviews textual hate speech detection systems and highlights their primary datasets, textual features, and machine learning models. The results of this literature review are integrated with content analysis, resulting in several themes for 138 relevant papers. This study shows several approaches that do not provide consistent results in various hate speech categories. The most dominant sets of methods combine more than one deep learning model. Moreover, the analysis of several hate speech datasets shows that many datasets are small in size and are not reliable for various tasks of hate speech detection. Therefore, this study provides the research community with insights and empirical evidence on the intrinsic properties of hate speech and helps communities identify topics for future work. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

27 pages, 2242 KiB  
Review
Serious Gaming for Behaviour Change: A Systematic Review
by Ramy Hammady and Sylvester Arnab
Information 2022, 13(3), 142; https://doi.org/10.3390/info13030142 - 8 Mar 2022
Cited by 49 | Viewed by 16398
Abstract
Over the years, there has been a significant increase in the adoption of game-based interventions for behaviour change associated with many fields such as health, education, and psychology. This is due to the significance of the players’ intrinsic motivation that is naturally generated [...] Read more.
Over the years, there has been a significant increase in the adoption of game-based interventions for behaviour change associated with many fields such as health, education, and psychology. This is due to the significance of the players’ intrinsic motivation that is naturally generated to play games and the substantial impact they can have on players. Many review papers measure the effectiveness of the use of gaming on changing behaviours; however, these studies neglect the game features involved in the game design process, which have an impact of stimulating behaviour change. Therefore, this paper aimed to identify game design mechanics and features that are reported to commonly influence behaviour change during and/or after the interventions. This paper identified key theories of behaviour change that inform the game design process, providing insights that can be adopted by game designers for informing considerations on the use of game features for moderating behaviour in their own games. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

13 pages, 1658 KiB  
Review
Measurement in the Age of Information
by Forrest Webler and Marilyne Andersen
Information 2022, 13(3), 111; https://doi.org/10.3390/info13030111 - 25 Feb 2022
Cited by 5 | Viewed by 4873
Abstract
Information is the resolution of uncertainty and manifests itself as patterns. Although complex, most observable phenomena are not random and instead are associated with deterministic, chaotic systems. The underlying patterns and symmetries expressed from these phenomena determine their information content and compressibility. While [...] Read more.
Information is the resolution of uncertainty and manifests itself as patterns. Although complex, most observable phenomena are not random and instead are associated with deterministic, chaotic systems. The underlying patterns and symmetries expressed from these phenomena determine their information content and compressibility. While some patterns, such as the existence of Fourier modes, are easy to extract, advances in machine learning have enabled more comprehensive methods in feature extraction, most notably in their ability to elicit non-linear relationships. Herein we review methods concerned with the encoding and reconstruction of natural signals and how they might inform the discovery of useful transform bases. Additionally, we illustrate the efficacy of data-driven bases over generic ones in encoding information whilst discussing these developments in the context of “fourth paradigm” metrology. Toward this end, we propose that existing metrological standards and norms may need to be redefined within the context of a data-rich world. Full article
(This article belongs to the Section Review)
Show Figures

Figure 1

Back to TopTop