Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 10, Issue 12

2019 December - 39 articles

Cover Story: The agent-based approach is a well-established methodology to model distributed intelligent systems. Multi-agent systems (MAS) are boosting applications dealing with safety and information-critical tasks. Therefore, the transparency and trustworthiness of the agents must be enforced. Employing reputation-based mechanisms helps to promote trust in the system. Nevertheless, to fully guarantee MAS with desired accountability and transparency are objectives that are still unmet. This paper elaborates on the notions of trust, the integration of blockchain technologies (BCT) and MAS, and discusses the ethical implications. In particular, we leverage MAS (based on the Java Agent DEvelopment Framework—JADE) and BCT (based on Hyperledger Fabric), tightly coupled to handle interactions, reputation computation, monitoring, and disagreement-management policies. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (39)

  • Article
  • Open Access
7 Citations
4,311 Views
9 Pages

17 December 2019

This bibliometric study presents the most influential cited references for papers published in the journal Information by using reference publication year spectroscopy (RPYS). A total of 30,960 references cited in 996 papers in the journal Informatio...

  • Article
  • Open Access
4,042 Views
8 Pages

Development of an Electrohydraulic Variable Buoyancy System

  • João Falcão Carneiro,
  • João Bravo Pinto,
  • Nuno A. Cruz and
  • Fernando Gomes de Almeida

17 December 2019

The growing needs in exploring ocean resources have been pushing the length and complexity of autonomous underwater vehicle (AUV) missions, leading to more stringent energy requirements. A promising approach to reduce the energy consumption of AUVs i...

  • Article
  • Open Access
56 Citations
13,270 Views
14 Pages

17 December 2019

Financial institutions use credit scoring to evaluate potential loan default risks. However, insufficient credit information limits the peer-to-peer (P2P) lending platform’s capacity to build effective credit scoring. In recent years, many type...

  • Article
  • Open Access
4 Citations
3,028 Views
16 Pages

17 December 2019

Manycast routing and spectrum assignment (RSA) in elastic optical networks (EONs) has become a hot research field. In this paper, the mathematical model and high efficient algorithm to solve this challenging problem in EONs is investigated. First, a...

  • Article
  • Open Access
10 Citations
5,489 Views
13 Pages

An LSTM Model for Predicting Cross-Platform Bursts of Social Media Activity

  • Neda Hajiakhoond Bidoki,
  • Alexander V. Mantzaris and
  • Gita Sukthankar

14 December 2019

Burst analysis and prediction is a fundamental problem in social network analysis, since user activities have been shown to have an intrinsically bursty nature. Bursts may also be a signal of topics that are of growing real-world interest. Since burs...

  • Article
  • Open Access
572 Citations
63,399 Views
36 Pages

Choosing Mutation and Crossover Ratios for Genetic Algorithms—A Review with a New Dynamic Approach

  • Ahmad Hassanat,
  • Khalid Almohammadi,
  • Esra’a Alkafaween,
  • Eman Abunawas,
  • Awni Hammouri and
  • V. B. Surya Prasath

10 December 2019

Genetic algorithm (GA) is an artificial intelligence search method that uses the process of evolution and natural selection theory and is under the umbrella of evolutionary computing algorithm. It is an efficient tool for solving optimization problem...

  • Article
  • Open Access
8 Citations
6,337 Views
14 Pages

Success Factors Importance Based on Software Project Organization Structure

  • Ahmed Fawzi Otoom,
  • Ghadeer AL Kateb,
  • Maen Hammad,
  • Rateb J. Sweis and
  • Haneen Hijazi

10 December 2019

The main aim of this paper is to identify critical success factors (CSFs) and investigate whether they are the same or not across different project organization structures. The organization structures under the study are: functional, project, and mat...

  • Article
  • Open Access
7 Citations
4,636 Views
15 Pages

10 December 2019

The test oracle problem exists widely in modern complex software testing, and metamorphic testing (MT) has become a promising testing technique to alleviate this problem. The inference of efficient metamorphic relations (MRs) is the core problem of m...

  • Article
  • Open Access
9 Citations
3,833 Views
18 Pages

A Comprehensive Evaluation of the Community Environment Adaptability for Elderly People Based on the Improved TOPSIS

  • Shen-Cheng Zhang,
  • Hui Wang,
  • Zhi Liu,
  • Shouzhen Zeng,
  • Yun Jin and
  • Tomas Baležentis

9 December 2019

As the main way of providing care for elderly people, home-based old-age care puts forward higher requirements for the environmental adaptability of the community. Five communities in Wuhu were selected for a comprehensive assessment of environmental...

  • Article
  • Open Access
7 Citations
3,709 Views
22 Pages

7 December 2019

Social media represent an inexhaustible source of information concerning public places (also called points of interest (POIs)), provided by users. Several social media own and publish huge and independently-built corpora of data about public places w...

  • Article
  • Open Access
50 Citations
14,585 Views
20 Pages

6 December 2019

With the rapid development of mobile technologies in contemporary society, China has seen increased usage of the Internet and mobile devices. Thus, mobile payment is constantly being innovated and is highly valued in China. Although there have been m...

  • Article
  • Open Access
2 Citations
3,389 Views
14 Pages

6 December 2019

Extracting road from high resolution remote sensing (HRRS) images is an economic and effective way to acquire road information, which has become an important research topic and has a wide range of applications. In this paper, we present a novel metho...

  • Article
  • Open Access
64 Citations
7,817 Views
18 Pages

6 December 2019

In future traffic, automated vehicles may be equipped with external human-machine interfaces (eHMIs) that can communicate with pedestrians. Previous research suggests that, during first encounters, pedestrians regard text-based eHMIs as clearer than...

  • Article
  • Open Access
10 Citations
4,178 Views
14 Pages

6 December 2019

In this paper, based on the multilingual morphological analyzer, we researched the similar low-resource languages, Uyghur and Kazakh, short text classification. Generally, the online linguistic resources of these languages are noisy. So a preprocessi...

  • Article
  • Open Access
5 Citations
4,559 Views
24 Pages

5 December 2019

Container terminals are the typical representatives of complex supply chain logistics hubs with multiple compound attributes and multiple coupling constraints, and their operations are provided with the strong characteristics of dynamicity, nonlinear...

  • Article
  • Open Access
2,865 Views
15 Pages

Distance-To-Mean Continuous Conditional Random Fields: Case Study in Traffic Congestion

  • Sumarsih C. Purbarani,
  • Hadaiq R. Sanabila,
  • Ari Wibisono,
  • Noverina Alfiany,
  • Hanif A. Wisesa and
  • Wisnu Jatmiko

4 December 2019

Traffic prediction techniques are classified as having parametric, non-parametric, and a combination of parametric and non-parametric characteristics. The extreme learning machine (ELM) is a non-parametric technique that is commonly used to enhance t...

  • Article
  • Open Access
62 Citations
16,669 Views
27 Pages

3 December 2019

The Customer trust, satisfaction and loyalty with regard to the provision of e-commerce services is expected to be critical factors for the assessment of the success of online businesses. Service quality and high-quality product settings are closely...

  • Article
  • Open Access
3,814 Views
20 Pages

3 December 2019

This paper presents a relay selection algorithm based on fair battery power utilization for extending mobile network coverage and capacity by using a cooperative communication strategy where mobile devices can be utilized as relays. Cooperation impro...

  • Article
  • Open Access
3 Citations
4,711 Views
15 Pages

2 December 2019

As the size of the domestic and international gaming industry gradually grows, various games are undergoing rapid development cycles to compete in the current market. However, selecting and recommending suitable games for users continues to be a chal...

  • Article
  • Open Access
14 Citations
6,222 Views
14 Pages

A Computational Study on Fairness of the Tendermint Blockchain Protocol

  • Nicolas Lagaillardie,
  • Mohamed Aimen Djari and
  • Önder Gürcan

30 November 2019

Fairness is a crucial property for blockchain systems since it affects the participation: the ones that find the system fair tend to stay or enter, the ones that find the system unfair tend to leave. While current literature mainly focuses on fairnes...

  • Article
  • Open Access
3 Citations
3,148 Views
19 Pages

29 November 2019

Establishing an accurate inverse model is a key problem in the design of adaptive inverse controllers. Most real objects have nonlinear characteristics, so mathematical expression of an inverse model cannot be obtained in most situation. A Takagi&nda...

  • Article
  • Open Access
47 Citations
14,182 Views
27 Pages

Design Thinking: Challenges for Software Requirements Elicitation

  • Hugo Ferreira Martins,
  • Antônio Carvalho de Oliveira Junior,
  • Edna Dias Canedo,
  • Ricardo Ajax Dias Kosloski,
  • Roberto Ávila Paldês and
  • Edgard Costa Oliveira

28 November 2019

Agile methods fit well for software development teams in the requirements elicitation activities. It has brought challenges to organizations in adopting the existing traditional methods, as well as new ones. Design Thinking has been used as a require...

  • Article
  • Open Access
16 Citations
5,238 Views
11 Pages

28 November 2019

University museums are powerful resource centres in higher education. In this context, the adoption of digital technologies can support personalised learning experience within the university museum. The aim of the present contribution is to present a...

  • Feature Paper
  • Article
  • Open Access
20 Citations
4,106 Views
17 Pages

The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases

  • Yi-Peng Wei,
  • Batuhan Arasli,
  • Karim Banawan and
  • Sennur Ulukus

28 November 2019

We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the K fi...

  • Article
  • Open Access
42 Citations
9,489 Views
16 Pages

28 November 2019

As an important part of emotion research, facial expression recognition is a necessary requirement in human–machine interface. Generally, a face expression recognition system includes face detection, feature extraction, and feature classificati...

  • Article
  • Open Access
2,947 Views
12 Pages

28 November 2019

This paper presents a novel method to extract local features, which instead of calculating local extrema computes global maxima in a discretized scale-space representation. To avoid interpolating scales on few data points and to achieve perfect rotat...

  • Article
  • Open Access
16 Citations
4,408 Views
16 Pages

26 November 2019

Ride-sharing (RS) plays an important role in saving energy and alleviating traffic pressure. The vehicles in the demand-responsive feeder transit services (DRT) are generally not ride-sharing cars. Therefore, we proposed an optimal DRT model based on...

  • Article
  • Open Access
23 Citations
7,890 Views
27 Pages

UXmood—A Sentiment Analysis and Information Visualization Tool to Support the Evaluation of Usability and User Experience

  • Roberto Yuri da Silva Franco,
  • Rodrigo Santos do Amor Divino Lima,
  • Rafael do Monte Paixão,
  • Carlos Gustavo Resque dos Santos and
  • Bianchi Serique Meiguins

25 November 2019

This paper presents UXmood, a tool that provides quantitative and qualitative information to assist researchers and practitioners in the evaluation of user experience and usability. The tool uses and combines data from video, audio, interaction logs...

  • Article
  • Open Access
17 Citations
5,007 Views
20 Pages

Identification of Insider Trading Using Extreme Gradient Boosting and Multi-Objective Optimization

  • Shangkun Deng,
  • Chenguang Wang,
  • Jie Li,
  • Haoran Yu,
  • Hongyu Tian,
  • Yu Zhang,
  • Yong Cui,
  • Fangjie Ma and
  • Tianxiang Yang

25 November 2019

Illegal insider trading identification presents a challenging task that attracts great interest from researchers due to the serious harm of insider trading activities to the investors’ confidence and the sustainable development of security mark...

  • Article
  • Open Access
10 Citations
4,022 Views
28 Pages

25 November 2019

In this article, we propose decision diagram algorithms to extract minimal cutsets of finite degradation models. Finite degradation models generalize and unify combinatorial models used to support probabilistic risk, reliability and safety analyses (...

  • Article
  • Open Access
52 Citations
5,093 Views
23 Pages

25 November 2019

Similarity measures, distance measures and entropy measures are some common tools considered to be applied to some interesting real-life phenomena including pattern recognition, decision making, medical diagnosis and clustering. Further, interval-val...

  • Article
  • Open Access
13 Citations
5,426 Views
19 Pages

A Novel Low Processing Time System for Criminal Activities Detection Applied to Command and Control Citizen Security Centers

  • Julio Suarez-Paez,
  • Mayra Salcedo-Gonzalez,
  • Alfonso Climente,
  • Manuel Esteve,
  • Jon Ander Gómez,
  • Carlos Enrique Palau and
  • Israel Pérez-Llopis

24 November 2019

This paper shows a Novel Low Processing Time System focused on criminal activities detection based on real-time video analysis applied to Command and Control Citizen Security Centers. This system was applied to the detection and classification of cri...

  • Article
  • Open Access
13 Citations
7,072 Views
12 Pages

23 November 2019

In recent times, with the development of science and technology, new technologies have been rapidly emerging, and innovators are making efforts to acquire intellectual property rights to preserve their competitive advantage as well as to enhance inno...

  • Article
  • Open Access
17 Citations
6,214 Views
21 Pages

The Good, the Bad, and the Ethical Implications of Bridging Blockchain and Multi-Agent Systems

  • Davide Calvaresi,
  • Jean-Paul Calbimonte,
  • Alevtina Dubovitskaya,
  • Valerio Mattioli,
  • Jean-Gabriel Piguet and
  • Michael Schumacher

22 November 2019

The agent based approach is a well established methodology to model distributed intelligent systems. Multi-Agent Systems (MAS) are increasingly employed in applications dealing with safety and information critical tasks (e.g., in eHealth, financial,...

  • Article
  • Open Access
10 Citations
4,698 Views
18 Pages

21 November 2019

Investigation into privacy preserving data publishing with multiple sensitive attributes is performed to reduce probability of adversaries to guess the sensitive values. Masking the sensitive values is usually performed by anonymizing data by using g...

  • Article
  • Open Access
9 Citations
3,924 Views
21 Pages

Configurable Distributed Data Management for the Internet of the Things

  • Nikos Kefalakis,
  • Aikaterini Roukounaki and
  • John Soldatos

20 November 2019

One of the main challenges in modern Internet of Things (IoT) systems is the efficient collection, routing and management of data streams from heterogeneous sources, including sources with high ingestion rates. Despite the existence of various IoT da...

  • Article
  • Open Access
1 Citations
7,800 Views
17 Pages

A Bit Torrent Traffic Optimization Method for Enhancing the Stability of Network Traffic

  • Deguang Li,
  • Yongxin Zhang,
  • Shijie Jia,
  • Dong Liu,
  • Yanling Jin and
  • Yuansheng Wu

20 November 2019

With the extensive use of peer-to-peer applications in recent years, the network traffic becomes more dynamic and less predictable, which leads to the decline of network resource utilization and the degradation of network performance. Aiming towards...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489