Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 11, Issue 12

2020 December - 49 articles

Cover Story: This work presents a software system for the online provision and collection of questionnaires, which exploits a sentiment analysis-based approach to monitor patients’ adherence to telehomecare programs. The idea is that the sentiment, i.e., the degree of positiveness/negativeness expressed by patients through their responses to questionnaires, may be related to their adherence and be used to predict drop-out. The system was validated with a case study involving the home telemonitoring program provided by the Cystic Fibrosis Unit at the “Bambino Gesù” Children’s Hospital, Italy. Experimental results show that, under a Granger causality perspective, a predictive relationship exists between the polarity and adherence score, which may be used for the early detection of the poor adherence of patients to telehomecare programs. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (49)

  • Review
  • Open Access
21 Citations
4,289 Views
24 Pages

21 December 2020

The ever-increasing deployment of autonomous Cyber-Physical Systems (CPSs) (e.g., autonomous cars, UAV) exacerbates the need for efficient formal verification methods. In this setting, the main obstacle to overcome is the huge number of scenarios to...

  • Article
  • Open Access
11 Citations
5,721 Views
12 Pages

Determining the Age of the Author of the Text Based on Deep Neural Network Models

  • Aleksandr Sergeevich Romanov,
  • Anna Vladimirovna Kurtukova,
  • Artem Alexandrovich Sobolev,
  • Alexander Alexandrovich Shelupanov and
  • Anastasia Mikhailovna Fedotova

21 December 2020

This paper is devoted to solving the problem of determining the age of the author of the text based on models of deep neural networks. The article presents an analysis of methods for determining the age of the author of a text and approaches to deter...

  • Review
  • Open Access
202 Citations
73,084 Views
20 Pages

21 December 2020

Digital transformation creates challenges in all industries and business sectors. The development of digital transformation has also clearly triggered the emergence of fintech (financial technology) initiatives, which are recognized as some of the mo...

  • Article
  • Open Access
38 Citations
9,367 Views
14 Pages

18 December 2020

Today, many complex multiobjective problems are dealt with using genetic algorithms (GAs). They apply the evolution mechanism of a natural population to a “numerical” population of solutions to optimize a fitness function. GA implementati...

  • Article
  • Open Access
7 Citations
6,987 Views
19 Pages

Analysis of Cultural Meme Characteristics for Big Data of Cultural Relics

  • Haifeng Li,
  • Zuoqin Shi,
  • Li Chen,
  • Zhenqi Cui,
  • Sumin Li and
  • Ling Zhao

17 December 2020

The cultural meme is the smallest unit constituting a dynasty′s culture, which has the same inheritance and variability as biological genes. Here, based on the name of cultural relics, we extract cultural memes through semantic word segmentatio...

  • Article
  • Open Access
1 Citations
3,346 Views
23 Pages

A Different Look at Polynomials within Man-Machine Interaction

  • Beata Bajorska-Harapińska,
  • Mariusz Pleszczyński,
  • Michał Różański,
  • Barbara Smoleń-Duda,
  • Adrian Smuda  and
  • Roman Wituła 

17 December 2020

Undoubtedly, one of the most powerful applications that allow symbolic computations is Wolfram Mathematica. However, it turns out that sometimes Mathematica does not give the desired result despite its continuous improvement. Moreover, these gaps are...

  • Article
  • Open Access
13 Citations
7,297 Views
19 Pages

17 December 2020

Currently, there are several challenges that cloud-based healthcare systems around the world are facing. The most important issue is to ensure security and privacy, or in other words, to ensure the confidentiality, integrity, and availability of the...

  • Article
  • Open Access
10 Citations
3,374 Views
15 Pages

16 December 2020

Object detection for vehicles and pedestrians is extremely difficult to achieve in autopilot applications for the Internet of vehicles, and it is a task that requires the ability to locate and identify smaller targets even in complex environments. Th...

  • Article
  • Open Access
2,962 Views
23 Pages

S.O.V.O.R.A.: A Distributed Wireless Operating System

  • Henry Zárate Ceballos and
  • Jorge Eduardo Ortiz Triviño

14 December 2020

Due to the growth of users and linked devices in networks, there is an emerging need for dynamic solutions to control and manage computing and network resources. This document proposes a Distributed Wireless Operative System on a Mobile Ad-hoc Networ...

  • Article
  • Open Access
7 Citations
4,283 Views
19 Pages

Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids

  • Svetlana Boudko,
  • Peder Aursand and
  • Habtamu Abie

14 December 2020

We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a t...

  • Article
  • Open Access
3,134 Views
20 Pages

A Model for the Frequency Distribution of Multi-Scale Phenomena

  • Paola Favati,
  • Grazia Lotti,
  • Ornella Menchi and
  • Francesco Romani

13 December 2020

Frequency analysis is often used to investigate the structure of systems representing multi-scale real-world phenomena. In many different environments, functional relationships characterized by a power law have been recognized, but, in many cases thi...

  • Article
  • Open Access
5 Citations
8,253 Views
15 Pages

Release of the Fourth Season of Money Heist: Analysis of Its Social Audience on Twitter during Lockdown in Spain

  • Carmen Cristófol Rodríguez,
  • Paula Meliveo Nogués and
  • Francisco Javier Cristòfol

11 December 2020

Nowadays we are witnessing a significant change in content consumption. This, together with the global health situation, has caused some behaviors to accelerate. This research focuses on the specific case of the lockdown in Spain and the coincidence...

  • Review
  • Open Access
5 Citations
7,312 Views
27 Pages

International Strategic Management: A Conceptual Model with Top Managers’ Emotional Intelligence, Cultural Intelligence, and Networking

  • Ângelo Miguel R. Cabral,
  • Fernando Manuel P. O. Carvalho and
  • José António Vasconcelos Ferreira

10 December 2020

The conceptual approach in this article follows and analyzes the holistic model of Kuivalainen, Sundqvist, Saarenketo, and McNaughton in 2012, making it analytically fitting to the SMEs’ international strategic groups concerning their internati...

  • Article
  • Open Access
45 Citations
24,228 Views
19 Pages

Employer Branding Applied to SMEs: A Pioneering Model Proposal for Attracting and Retaining Talent

  • Beatriz Monteiro,
  • Vasco Santos,
  • Isabel Reis,
  • Marta Correia Sampaio,
  • Bruno Sousa,
  • Filipa Martinho,
  • Maria José Sousa and
  • Manuel Au-Yong-Oliveira

9 December 2020

Most business enterprises are small and medium-sized enterprises (SMEs), and many of them are without a human resource and recruitment department. Thus, one of the challenges that organizations currently face is to find a strategy to retain and attra...

  • Article
  • Open Access
3 Citations
3,131 Views
16 Pages

Hiding the Source Code of Stored Database Programs

  • Vitalii Yesin,
  • Mikolaj Karpinski,
  • Maryna Yesina,
  • Vladyslav Vilihura and
  • Kornel Warwas

9 December 2020

The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored progr...

  • Article
  • Open Access
1 Citations
4,661 Views
22 Pages

9 December 2020

Mass spectrometry imaging (MSI) is an imaging technique used in analytical chemistry to study the molecular distribution of various compounds at a micro-scale level. For each pixel, MSI stores a mass spectrum obtained by measuring signal intensities...

  • Article
  • Open Access
1 Citations
3,660 Views
20 Pages

8 December 2020

Practitioners and researchers have shown great interest in information-technology (IT)-enabled interactions across partnering firms and developed instruments for measuring it. However, those instruments might have been under criticism as they were de...

  • Article
  • Open Access
3 Citations
3,554 Views
19 Pages

7 December 2020

In this article a completely objective decoherence mechanism is hypothesized, operating at the level of the elementary particles of matter. The standard quantum mechanical description is complemented with a phenomenological evolution equation, involv...

  • Article
  • Open Access
5 Citations
5,658 Views
14 Pages

7 December 2020

Under the “Internet+” environment, the R&D intensity of products and services has increased; hence, organizations need to improve their ability to integrate knowledge and technology resources. Knowledge gaps will arise when an organiz...

  • Article
  • Open Access
27 Citations
4,944 Views
14 Pages

Application of Blockchain Technology in Dynamic Resource Management of Next Generation Networks

  • Michael Xevgenis,
  • Dimitrios G. Kogias,
  • Panagiotis Karkazis,
  • Helen C. Leligou and
  • Charalampos Patrikakis

6 December 2020

With the advent of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies, the networking infrastructures are becoming increasingly agile in their attempts to offer the quality of services needed by the users, maximi...

  • Article
  • Open Access
2 Citations
2,856 Views
10 Pages

Crowd Counting Guided by Attention Network

  • Pei Nie,
  • Cien Fan,
  • Lian Zou,
  • Liqiong Chen and
  • Xiaopeng Li

4 December 2020

Crowd Crowd counting is not simply a matter of counting the numbers of people, but also requires that one obtains people’s spatial distribution in a picture. It is still a challenging task for crowded scenes, occlusion, and scale variation. Thi...

  • Article
  • Open Access
46 Citations
7,274 Views
24 Pages

4 December 2020

Road pavements need adequate maintenance to ensure that their conditions are kept in a good state throughout their lifespans. For this to be possible, authorities need efficient and effective databases in place, which have up to date and relevant roa...

  • Article
  • Open Access
19 Citations
7,563 Views
24 Pages

A Big Data Reference Architecture for Emergency Management

  • Carlos A. Iglesias,
  • Alfredo Favenza and
  • Álvaro Carrera

4 December 2020

Nowadays, we are witnessing a shift in the way emergencies are being managed. On the one hand, the availability of big data and the evolution of geographical information systems make it possible to manage and process large quantities of information t...

  • Article
  • Open Access
3 Citations
4,424 Views
16 Pages

Openness and Security Thinking Characteristics for IoT Ecosystems

  • Bahtijar Vogel,
  • Miranda Kajtazi,
  • Joseph Bugeja and
  • Rimpu Varshney

2 December 2020

While security is often recognized as a top priority for organizations and a push for competitive advantage, repeatedly, Internet of Things (IoT) products have become a target of diverse security attacks. Thus, orchestrating smart services and device...

  • Article
  • Open Access
10 Citations
6,858 Views
19 Pages

A Flexible IoT Stream Processing Architecture Based on Microservices

  • Luca Bixio,
  • Giorgio Delzanno,
  • Stefano Rebora and
  • Matteo Rulli

2 December 2020

The Internet of Things (IoT) has created new and challenging opportunities for data analytics. The IoT represents an infinitive source of massive and heterogeneous data, whose real-time processing is an increasingly important issue. IoT applications...

  • Article
  • Open Access
6 Citations
3,132 Views
22 Pages

Strategy for the Appropriation of a DSS in Small Bovine Producers Using Simulation and a Serious Video Game

  • Urbano Gómez-Prada,
  • Martha Orellana-Hernández and
  • Jesús Salinas-Ibáñez

2 December 2020

There is low adoption of Information Technologies (IT) in the administration of small bovine production systems which causes that most decisions are made based on the experience of the administrators and not based on data. This study proposes a metho...

  • Article
  • Open Access
14 Citations
5,101 Views
24 Pages

SyrAgri: A Recommender System for Agriculture in Mali

  • Jacqueline Konaté,
  • Amadou G. Diarra,
  • Seydina O. Diarra and
  • Aminata Diallo

30 November 2020

This paper focuses on recommender system for agriculture in Mali called SyrAgri. The goal is to guide and improve the quality-of-experience of farmers by offering them good farming practices according to their needs. Two types of recommendations are...

  • Article
  • Open Access
8 Citations
8,548 Views
17 Pages

A Matrix Approach for Analyzing Signal Flow Graph

  • Shyr-Long Jeng,
  • Rohit Roy and
  • Wei-Hua Chieng

30 November 2020

Mason’s gain formula can grow factorially because of growth in the enumeration of paths in a directed graph. Each of the (n − 2)! permutation of the intermediate vertices includes a path between input and output nodes. This paper presents...

  • Article
  • Open Access
7 Citations
4,661 Views
24 Pages

GOTRIPLE: A User-Centric Process to Develop a Discovery Platform

  • Suzanne Dumouchel,
  • Emilie Blotière,
  • Gert Breitfuss,
  • Yin Chen,
  • Francesca Di Donato,
  • Maria Eskevich,
  • Paula Forbes,
  • Haris Georgiadis,
  • Arnaud Gingold and
  • Erzsebet Toth-Czifra
  • + 5 authors

30 November 2020

Social sciences and humanities (SSH) research is divided across a wide array of disciplines, sub-disciplines and languages. While this specialization makes it possible to investigate the extensive variety of SSH topics, it also leads to a fragmentati...

  • Article
  • Open Access
25 Citations
7,202 Views
22 Pages

Early-Stage Detection of Cyber Attacks

  • Martina Pivarníková,
  • Pavol Sokol and
  • Tomáš Bajtoš

29 November 2020

Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the att...

  • Article
  • Open Access
9 Citations
3,266 Views
16 Pages

28 November 2020

The proper evaluation of heart health requires professional medical experience. Therefore, in clinical diagnosis practice, the development direction is to reduce the high dependence of the diagnosis process on medical experience and to more effective...

  • Article
  • Open Access
15 Citations
4,140 Views
22 Pages

28 November 2020

One of the significant challenges in machine learning is the classification of imbalanced data. In many situations, standard classifiers cannot learn how to distinguish minority class examples from the others. Since many real problems are unbalanced,...

  • Article
  • Open Access
4 Citations
3,302 Views
19 Pages

28 November 2020

Accurately forecasting sales is a significant challenge faced by almost all companies. In particular, most products have short lifecycles without the accumulation of historical sales data. Existing methods either fail to capture the context-specific,...

  • Article
  • Open Access
3,465 Views
18 Pages

A Tool for Better Land Management

  • Bernardo Carvalhinho,
  • Rodrigo Rocha Silva and
  • Jorge Bernardino

27 November 2020

The ability of keeping a record of geospatial information, knowing how it changed over time, is crucial for landscape analysis and territorial government. Land management is still a problem. Many governmental databases are incomplete, and there is a...

  • Article
  • Open Access
20 Citations
4,412 Views
19 Pages

Convolutional Support Vector Models: Prediction of Coronavirus Disease Using Chest X-rays

  • Mateus Maia,
  • Jonatha S. Pimentel,
  • Ivalbert S. Pereira,
  • João Gondim,
  • Marcos E. Barreto and
  • Anderson Ara

26 November 2020

The disease caused by the new coronavirus (COVID-19) has been plaguing the world for months and the number of cases are growing more rapidly as the days go by. Therefore, finding a way to identify who has the causative virus is impressive, in order t...

  • Article
  • Open Access
57 Citations
8,924 Views
15 Pages

Detection of Atrial Fibrillation Using a Machine Learning Approach

  • Sidrah Liaqat,
  • Kia Dashtipour,
  • Adnan Zahid,
  • Khaled Assaleh,
  • Kamran Arshad and
  • Naeem Ramzan

26 November 2020

The atrial fibrillation (AF) is one of the most well-known cardiac arrhythmias in clinical practice, with a prevalence of 1–2% in the community, which can increase the risk of stroke and myocardial infarction. The detection of AF electrocardiog...

  • Article
  • Open Access
11 Citations
4,239 Views
15 Pages

Sentiment Analysis and Text Mining of Questionnaires to Support Telemonitoring Programs

  • Chiara Zucco,
  • Clarissa Paglia,
  • Sonia Graziano,
  • Sergio Bella and
  • Mario Cannataro

26 November 2020

While several studies have shown how telemedicine and, in particular, home telemonitoring programs lead to an improvement in the patient’s quality of life, a reduction in hospitalizations, and lower healthcare costs, different variables may aff...

  • Article
  • Open Access
4 Citations
3,154 Views
13 Pages

26 November 2020

Recommender systems have been successfully applied to assist decision making in multiple domains and applications. Multi-criteria recommender systems try to take the user preferences on multiple criteria into consideration, in order to further improv...

  • Article
  • Open Access
11 Citations
16,164 Views
13 Pages

A Blockchain Voting System Based on the Feedback Mechanism and Wilson Score

  • Xiaoyu Ma,
  • Jiting Zhou,
  • Xiumei Yang and
  • Guangyuan Liu

26 November 2020

A blockchain voting system based on the feedback mechanism and Wilson score is proposed to solve the problem of the malicious votes behavior. Firstly, the relatively accurate supporting rate and ranking for candidates are obtained using the Wilson sc...

  • Article
  • Open Access
3 Citations
4,044 Views
16 Pages

An Interdisciplinary Scientific and Mathematic Education, Addressing Relevant Social Problems Such as Sexist Hate Speech

  • M.ª Teresa Sánchez-Compaña,
  • Cristina Sánchez-Cruzado and
  • Carmen Rosa García-Ruiz

25 November 2020

The intention of this article is to share research taken from the initial training of secondary education pre-service teachers, in which college professors from mathematics and social sciences education participate. There are numerous studies regardi...

  • Article
  • Open Access
15 Citations
5,962 Views
18 Pages

SDToW: A Slowloris Detecting Tool for WMNs

  • Vinicius da Silva Faria,
  • Jéssica Alcântara Gonçalves,
  • Camilla Alves Mariano da Silva,
  • Gabriele de Brito Vieira and
  • Dalbert Matos Mascarenhas

25 November 2020

Denial of service (DoS) attacks play a significant role in contemporary cyberspace scenarios. A variety of different DoS attacks pollute networks by exploring various vulnerabilities. A group of DoS called application DoS attacks explore application...

  • Article
  • Open Access
44 Citations
21,426 Views
16 Pages

25 November 2020

Digital platforms have made Generation Z able to listen to the story from both sides, i.e., the brand’s promotional messages, and the consumers’ experiences. To capture an audience’s attention on endless entertainment and informatio...

  • Article
  • Open Access
7 Citations
3,054 Views
10 Pages

An Attempt to Identify Meaningful Descriptors of Handgrip Strength Using a Novel Prototype: Preliminary Study

  • Diana Urbano,
  • Maria Teresa Restivo,
  • Teresa F. Amaral,
  • Paulo Abreu and
  • Maria de Fátima Chousal

25 November 2020

Handgrip strength (HGS) is an indicator of muscle condition and general health wellbeing. Usually, instruments measuring handgrip strength only identify its maximum value. This preliminary study is focused on identifying force vs. time parameters whi...

  • Article
  • Open Access
31 Citations
8,612 Views
18 Pages

25 November 2020

Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised...

  • Article
  • Open Access
16 Citations
4,765 Views
15 Pages

Road Traffic Prediction Model Using Extreme Learning Machine: The Case Study of Tangier, Morocco

  • Mouna Jiber,
  • Abdelilah Mbarek,
  • Ali Yahyaouy,
  • My Abdelouahed Sabri and
  • Jaouad Boumhidi

24 November 2020

An efficient and credible approach to road traffic management and prediction is a crucial aspect in the Intelligent Transportation Systems (ITS). It can strongly influence the development of road structures and projects. It is also essential for rout...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489