Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 10, Issue 2

2019 February - 48 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (48)

  • Article
  • Open Access
7 Citations
5,126 Views
12 Pages

A New Rapid Incremental Algorithm for Constructing Concept Lattices

  • Jingpu Zhang,
  • Ronghui Liu,
  • Ligeng Zou and
  • Licheng Zeng

25 February 2019

Formal concept analysis has proven to be a very effective method for data analysis and rule extraction, but how to build formal concept lattices is a difficult and hot topic. In this paper, an efficient and rapid incremental concept lattice construct...

  • Article
  • Open Access
19 Citations
5,234 Views
17 Pages

Readiness and Success of Ubiquitous Learning in Indonesia: Perspectives from the Implementation of a Pilot Project

  • A’ang Subiyakto,
  • Nur Aeni Hidayah,
  • Gregoryo Gusti and
  • Muhammad Ariful Hikami

25 February 2019

The implementation of ubiquitous learning (u-learning) is a good opportunity to address the affordability, accessibility, and quality issues of the higher education sector that are present in many countries. However, its broad application is still li...

  • Article
  • Open Access
10 Citations
4,427 Views
18 Pages

25 February 2019

Interval Pythagorean fuzzy set (IPFS), which can handle imprecise and ambiguous information, has attracted considerable attention in both theory and practice. However, one of the main difficulties under IPFSs is the comparison between interval number...

  • Article
  • Open Access
4 Citations
5,171 Views
35 Pages

25 February 2019

At present, the identification of haze levels mostly relies on traditional measurement methods, the real-time operation and convenience of these methods are poor. This paper aims to realize the identification of haze levels based on the method of haz...

  • Article
  • Open Access
2 Citations
3,376 Views
14 Pages

24 February 2019

Parametric granular computing classification algorithms lead to difficulties in terms of parameter selection, the multiple performance times of algorithms, and increased algorithm complexity in comparison with nonparametric algorithms. We present non...

  • Article
  • Open Access
8 Citations
5,883 Views
24 Pages

24 February 2019

In recent years positioning sensors have become ubiquitous, and there has been tremendous growth in the amount of trajectory data. It is a huge challenge to efficiently store and query massive trajectory data. Among the typical operation over traject...

  • Editorial
  • Open Access
7 Citations
8,510 Views
4 Pages

21 February 2019

We address the question of whether AI, and in particular the Singularity—the notion that AI-based computers can exceed human intelligence—is a fallacy or a great opportunity. We have invited a group of scholars to address this question, w...

  • Article
  • Open Access
20 Citations
5,046 Views
15 Pages

21 February 2019

In brain magnetic resonance (MR) images, image quality is often degraded due to the influence of noise and outliers, which brings some difficulties for doctors to segment and extract brain tissue accurately. In this paper, a modified robust fuzzy c-m...

  • Article
  • Open Access
4 Citations
3,757 Views
27 Pages

PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density

  • Yuan Ping,
  • Baocang Wang,
  • Shengli Tian,
  • Jingxian Zhou and
  • Hui Ma

21 February 2019

By introducing an easy knapsack-type problem, a probabilistic knapsack-type public key cryptosystem (PKCHD) is proposed. It uses a Chinese remainder theorem to disguise the easy knapsack sequence. Thence, to recover the trapdoor information, the impl...

  • Feature Paper
  • Article
  • Open Access
5 Citations
5,002 Views
16 Pages

20 February 2019

One of the most desired features of autonomous robotic systems is their ability to accomplish complex tasks with a minimum amount of sensory information. Often, however, the limited amount of information (simplicity of sensors) should be compensated...

  • Article
  • Open Access
3 Citations
4,665 Views
16 Pages

19 February 2019

With the large-scale growth of mobile terminal users, exploring their continuance use behavior attracts wide attention. However, there is insufficient research on user psychological states in different hierarchy models towards continuance use of a mo...

  • Article
  • Open Access
2 Citations
3,743 Views
13 Pages

19 February 2019

Based on comparative studies on correlation coefficient theory and utility theory, a series of rules that utility functions on dual hesitant fuzzy rough sets (DHFRSs) should satisfy, and a kind of novel utility function on DHFRSs are proposed. The ch...

  • Editorial
  • Open Access
6 Citations
3,344 Views
3 Pages

18 February 2019

In recent years, a great deal of interest has been shown toward big data. Much of the work on big data has focused on volume and velocity in order to consider dataset size. Indeed, the problems of variety, velocity, and veracity are equally important...

  • Article
  • Open Access
52 Citations
5,591 Views
21 Pages

Blind Robust 3D Mesh Watermarking Based on Mesh Saliency and Wavelet Transform for Copyright Protection

  • Mohamed Hamidi,
  • Aladine Chetouani,
  • Mohamed El Haziti,
  • Mohammed El Hassouni and
  • Hocine Cherifi

18 February 2019

Three-dimensional models have been extensively used in several applications including computer-aided design (CAD), video games, medical imaging due to the processing capability improvement of computers, and the development of network bandwidth. There...

  • Article
  • Open Access
12 Citations
9,957 Views
19 Pages

18 February 2019

The use of computers to simulate facial aging or rejuvenation has long been a hot research topic in the field of computer vision, and this technology can be applied in many fields, such as customs security, public places, and business entertainment....

  • Article
  • Open Access
2 Citations
6,130 Views
16 Pages

17 February 2019

Open software repositories make large amounts of source code publicly available. Potentially, this source code could be used as training data to develop new, machine learning-based programming tools. For many applications, however, raw code scraped f...

  • Article
  • Open Access
9 Citations
3,444 Views
9 Pages

16 February 2019

The blind recognition of the frame parameter plays a crucial role in frame synchronization in the background of a non-cooperation communication system. This paper proposes an algorithm based on self-correlation on the foundation of existed cumulative...

  • Article
  • Open Access
56 Citations
11,788 Views
14 Pages

16 February 2019

This paper investigates the performance of two different adaptive control schemes for controlling the angular position of an electronic throttle (ET) plate. The adaptive backstepping controller and adaptive sliding mode backstepping controller are th...

  • Article
  • Open Access
18 Citations
8,257 Views
15 Pages

Cloud Based Virtual Reality Exposure Therapy Service for Public Speaking Anxiety

  • Justas Šalkevičius,
  • Audronė Miškinytė and
  • Lukas Navickas

15 February 2019

Public speaking anxiety is commonly treated using cognitive behavioral therapy. During the therapy session, the patient is either asked to vividly imagine and describe the feared stimulus or is confronted with it in the real world. Sometimes, however...

  • Article
  • Open Access
14 Citations
8,528 Views
14 Pages

MOLI: Smart Conversation Agent for Mobile Customer Service

  • Guoguang Zhao,
  • Jianyu Zhao,
  • Yang Li,
  • Christoph Alt,
  • Robert Schwarzenberg,
  • Leonhard Hennig,
  • Stefan Schaffer,
  • Sven Schmeier,
  • Changjian Hu and
  • Feiyu Xu

15 February 2019

Human agents in technical customer support provide users with instructional answers to solve a task that would otherwise require a lot of time, money, energy, physical costs. Developing a dialogue system in this domain is challenging due to the broad...

  • Article
  • Open Access
12 Citations
4,819 Views
13 Pages

14 February 2019

Three-way decision is a class of effective ways and heuristics commonly used in human problem solving and information processing. As an application of three-way decision in clustering, three-way clustering uses core region and fringe region to repres...

  • Article
  • Open Access
16 Citations
5,309 Views
13 Pages

14 February 2019

The ever-increasing complexity in manufacturing environments has caused delay and uncertainty for on-site personnel when retrieving critical information. Currently, information associated with manufacturing environments is created and stored in centr...

  • Article
  • Open Access
6 Citations
4,948 Views
22 Pages

Dynamic Top-K Interesting Subgraph Query on Large-Scale Labeled Graphs

  • Xiaohuan Shan,
  • Chunjie Jia,
  • Linlin Ding,
  • Xingyan Ding and
  • Baoyan Song

14 February 2019

A labeled graph is a special structure with node identification capability, which is often used in information networks, biological networks, and other fields. The subgraph query is widely used as an important means of graph data analysis. As the siz...

  • Communication
  • Open Access
16 Citations
10,515 Views
7 Pages

ONYA—The Wellbeing Game: How to Use Gamification to Promote Wellbeing

  • Daniel Tolks,
  • Michael Sailer,
  • Kevin Dadaczynski,
  • Claudia Lampert,
  • Julia Huberty,
  • Peter Paulus and
  • David Horstmann

12 February 2019

The Wellbeing Game uses game design elements to promote wellbeing. Players document their daily activities in the game and categorize them to one or more of five wellbeing-related factors. The users join teams and can create team events to work toget...

  • Article
  • Open Access
2 Citations
4,122 Views
17 Pages

11 February 2019

The adaptability of an in-progress business process is an essential requirement for any business process management system in dynamic business process environments. Over the last two decades, the artifact-centric approach for business process managem...

  • Article
  • Open Access
5 Citations
4,911 Views
13 Pages

Implementing Mobile Games into Care Services—Service Models for Finnish and Chinese Elderly Care

  • Sari Merilampi,
  • Antti Koivisto,
  • Mirka Leino,
  • Nuno Pombo,
  • Virginie Felizardo,
  • Jue Lu,
  • Anja Poberznik and
  • Johanna Virkki

8 February 2019

The purpose of this paper was to create service models for cognitively stimulating mobile games and incorporate them into Finnish and Chinese elderly care. The implementation involved the use of two different mobile games as part of the everyday live...

  • Article
  • Open Access
16 Citations
5,889 Views
14 Pages

7 February 2019

Solving programming exercises is the best way to promote practice in computer programming courses and, hence, to learn a programming language. Meanwhile, programming courses continue to have an high rate of failures and dropouts. The main reasons are...

  • Editorial
  • Open Access
2 Citations
3,379 Views
3 Pages

Special Issue on Selected Papers from e-Health Pervasive Wireless Applications and Services 2017

  • Tayeb Lemlouma,
  • Sébastien Laborie,
  • Abderrezak Rachedi,
  • António Santos and
  • Athanasios V. Vasilakos

5 February 2019

Providing adapted e-health services, applications, and platforms responds to a growing need for medical institutions like hospitals or even homes [...]

  • Article
  • Open Access
7 Citations
4,472 Views
15 Pages

4 February 2019

Due to the dynamic change of the opportunistic network topology and the lack of stable information transmission paths between nodes, the traditional topology-based routing algorithm cannot achieve the desired routing performance. To address of this p...

  • Article
  • Open Access
5 Citations
3,280 Views
12 Pages

4 February 2019

Simultaneous wireless information and power transfer is a practicable solution to encourage energy-constrained relay nodes to cooperate with the source to transmit information to the destination. In this paper, we study the outage performance of hybr...

  • Article
  • Open Access
1 Citations
3,672 Views
14 Pages

2 February 2019

Incorporating obstacle information into maneuvering target-tracking algorithms may lead to a better performance when the target when the target maneuver is caused by avoiding collision with obstacles. In this paper, we propose a fuzzy-logic-based met...

  • Article
  • Open Access
18 Citations
4,852 Views
15 Pages

CaACBIM: A Context-aware Access Control Model for BIM

  • Rongyue Zheng,
  • Jianlin Jiang,
  • Xiaohan Hao,
  • Wei Ren,
  • Feng Xiong and
  • Tianqing Zhu

1 February 2019

A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently,...

  • Article
  • Open Access
10 Citations
5,832 Views
17 Pages

Attention-Based Joint Entity Linking with Entity Embedding

  • Chen Liu,
  • Feng Li,
  • Xian Sun and
  • Hongzhe Han

1 February 2019

Entity linking (also called entity disambiguation) aims to map the mentions in a given document to their corresponding entities in a target knowledge base. In order to build a high-quality entity linking system, efforts are made in three parts: Encod...

  • Article
  • Open Access
18 Citations
4,578 Views
15 Pages

30 January 2019

Given a query shoeprint image, shoeprint retrieval aims to retrieve the most similar shoeprints available from a large set of shoeprint images. Most of the existing approaches focus on designing single low-level features to highlight the most similar...

  • Article
  • Open Access
54 Citations
6,110 Views
22 Pages

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks

  • Asmaa Abdallah,
  • M. Zulfiker Ali,
  • Jelena Mišić and
  • Vojislav B. Mišić

29 January 2019

The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and t...

  • Article
  • Open Access
2 Citations
4,127 Views
21 Pages

29 January 2019

A power-down system has an on-state, an off-state, and a finite or infinite number of intermediate states. In the off-state, the system uses no energy and in the on-state energy it is used fully. Intermediate states consume only some fraction of ener...

  • Review
  • Open Access
29 Citations
9,254 Views
45 Pages

Using Opinion Mining in Context-Aware Recommender Systems: A Systematic Review

  • Camila Vaccari Sundermann,
  • Marcos Aurélio Domingues,
  • Roberta Akemi Sinoara,
  • Ricardo Marcondes Marcacini and
  • Solange Oliveira Rezende

28 January 2019

Recommender systems help users by recommending items, such as products and services, that can be of interest to these users. Context-aware recommender systems have been widely investigated in both academia and industry because they can make recommend...

  • Article
  • Open Access
16 Citations
5,642 Views
17 Pages

27 January 2019

Internet of Things comprises an increasing number of interconnected smart devices, where communication happens anytime, anywhere, reducing hardware costs and the complexity of the architectures. Reading Radio Frequency Identification tags using ultra...

  • Article
  • Open Access
2 Citations
4,462 Views
16 Pages

Exploring the Importance of Entities in Semantic Ranking

  • Zhenyang Li,
  • Guangluan Xu,
  • Xiao Liang,
  • Feng Li,
  • Lei Wang and
  • Daobing Zhang

24 January 2019

In recent years, entity-based ranking models have led to exciting breakthroughs in the research of information retrieval. Compared with traditional retrieval models, entity-based representation enables a better understanding of queries and documents....

  • Article
  • Open Access
3 Citations
3,210 Views
14 Pages

24 January 2019

This paper focuses on the channel state estimation (CSE) problem in parametrized Hierarchical MAC (H-MAC) stage in Wireless Physical Layer Network Coding (WPNC) networks with Hierarchical Decode and Forward (HDF) relay strategy. We derive a non-pilot...

  • Article
  • Open Access
24 Citations
7,519 Views
20 Pages

HOLMeS: eHealth in the Big Data and Deep Learning Era

  • Flora Amato,
  • Stefano Marrone,
  • Vincenzo Moscato,
  • Gabriele Piantadosi,
  • Antonio Picariello and
  • Carlo Sansone

22 January 2019

Now, data collection and analysis are becoming more and more important in a variety of application domains, as long as novel technologies advance. At the same time, we are experiencing a growing need for human–machine interaction with expert sy...

  • Article
  • Open Access
73 Citations
30,075 Views
12 Pages

Noisy ECG Signal Analysis for Automatic Peak Detection

  • Matteo D’Aloia,
  • Annalisa Longo and
  • Maria Rizzi

22 January 2019

Cardiac signal processing is usually a computationally demanding task as signals are heavily contaminated by noise and other artifacts. In this paper, an effective approach for peak point detection and localization in noisy electrocardiogram (ECG) si...

  • Article
  • Open Access
29 Citations
4,823 Views
14 Pages

22 January 2019

To create alternative complex patterns, a novel design method is introduced in this study based on the error back propagation (BP) neural network user cognitive surrogate model of an interactive genetic algorithm with individual fuzzy interval fitnes...

  • Article
  • Open Access
9 Citations
3,993 Views
17 Pages

Object Recognition Using Non-Negative Matrix Factorization with Sparseness Constraint and Neural Network

  • Songze Lei,
  • Boxing Zhang,
  • Yanhong Wang,
  • Baihua Dong,
  • Xiaoping Li and
  • Feng Xiao

22 January 2019

UAVs (unmanned aerial vehicles) have been widely used in many fields, where they need to be detected and controlled. Small-sample UAV recognition requires an effective detecting and recognition method. When identifying a UAV target using the backward...

  • Article
  • Open Access
47 Citations
5,623 Views
17 Pages

22 January 2019

In this work, a new adaptive block-backstepping control design algorithm was developed for an under-actuated model (represented by a ball–arc system) to enhance the transient and steady-state behaviors and to improve the robustness characterist...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489