Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 11, Issue 5

2020 May - 47 articles

Cover Story: We explore big data-driven artificial intelligence (AI) applied to social systems, i.e., social computing, the concept of artificial intelligence as an enabler of novel social solutions. Through a critical analysis of the literature, we elaborate on the social and human interaction aspects of technology that must be in place to achieve such enablement and address the limitations of the current state of the art in this regard. We review cultural, political, and other societal impacts of social computing, its impact on vulnerable groups, and the ethically aligned design of social computing systems. We show that this is not merely an engineering problem, but rather the intersection of engineering with health sciences, social sciences, psychology, policy, and law. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (47)

  • Article
  • Open Access
24 Citations
7,830 Views
16 Pages

Machine Learning Based Sentiment Text Classification for Evaluating Treatment Quality of Discharge Summary

  • Samer Abdulateef Waheeb,
  • Naseer Ahmed Khan,
  • Bolin Chen and
  • Xuequn Shang

Patients’ discharge summaries (documents) are health sensors that are used for measuring the quality of treatment in medical centers. However, extracting information automatically from discharge summaries with unstructured natural language is c...

  • Article
  • Open Access
24 Citations
6,549 Views
15 Pages

The sentiment analysis of microblog text has always been a challenging research field due to the limited and complex contextual information. However, most of the existing sentiment analysis methods for microblogs focus on classifying the polarity of...

  • Article
  • Open Access
30 Citations
6,720 Views
13 Pages

Mode Awareness and Automated Driving—What Is It and How Can It Be Measured?

  • Christina Kurpiers,
  • Bianca Biebl,
  • Julia Mejia Hernandez and
  • Florian Raisch

In SAE (Society of Automotive Engineers) Level 2, the driver has to monitor the traffic situation and system performance at all times, whereas the system assumes responsibility within a certain operational design domain in SAE Level 3. The different...

  • Feature Paper
  • Article
  • Open Access
23 Citations
7,291 Views
20 Pages

The availability and accessibility of digital data are increasingly significant in the creation of archaeological knowledge with, for example, multiple datasets being brought together to perform extensive analyses that would not otherwise be possible...

  • Article
  • Open Access
182 Citations
16,657 Views
11 Pages

The internet has become an inseparable part of human life, and the number of devices connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices have become a part of everyday human life. However, some challenges...

  • Article
  • Open Access
6 Citations
4,084 Views
18 Pages

Quantitative Evaluation of Dense Skeletons for Image Compression

  • Jieying Wang,
  • Maarten Terpstra,
  • Jiří Kosinka and
  • Alexandru Telea

Skeletons are well-known descriptors used for analysis and processing of 2D binary images. Recently, dense skeletons have been proposed as an extension of classical skeletons as a dual encoding for 2D grayscale and color images. Yet, their encoding p...

  • Article
  • Open Access
64 Citations
8,050 Views
19 Pages

With the advance of many image manipulation tools, carrying out image forgery and concealing the forgery is becoming easier. In this paper, the convolution neural network (CNN) innovation for image forgery detection and localization is discussed. A n...

  • Article
  • Open Access
38 Citations
10,455 Views
17 Pages

The era of information and communication technologies (ICTs) in which we live has transformed the foundations of education. This article starts from the premise that there is a convergence between technologies and media that makes ICTs adopt strategi...

  • Article
  • Open Access
15 Citations
5,128 Views
21 Pages

Multi-Vehicle Simulation in Urban Automated Driving: Technical Implementation and Added Benefit

  • Alexander Feierle,
  • Michael Rettenmaier,
  • Florian Zeitlmeir and
  • Klaus Bengler

This article investigates the simultaneous interaction between an automated vehicle (AV) and its passenger, and between the same AV and a human driver of another vehicle. For this purpose, we have implemented a multi-vehicle simulation consisting of...

  • Feature Paper
  • Article
  • Open Access
22 Citations
7,097 Views
22 Pages

In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environmen...

  • Article
  • Open Access
1 Citations
3,983 Views
13 Pages

Considering the problems of large error and high localization costs of current range-free localization algorithms, a MNCE algorithm based on error correction is proposed in this study. This algorithm decomposes the multi-hop distance between nodes in...

  • Article
  • Open Access
96 Citations
10,461 Views
23 Pages

To reduce the damage caused by road accidents, researchers have applied different techniques to explore correlated factors and develop efficient prediction models. The main purpose of this study is to use one statistical and two nonparametric data mi...

  • Article
  • Open Access
3 Citations
5,768 Views
21 Pages

Planning and distributed task allocation are considered challenging problems. To address them, autonomous agents called planning agents situated in a multi-agent system should cooperate to achieve planning and complete distributed tasks. We propose a...

  • Article
  • Open Access
13 Citations
3,783 Views
15 Pages

Travel time is one of the most critical indexes to describe urban traffic operating states. How to obtain accurate and robust travel time estimates, so as to facilitate to make traffic control decision-making for administrators and trip-planning for...

  • Article
  • Open Access
27 Citations
7,303 Views
19 Pages

Equipment condition monitoring and diagnosis is an important means to detect and eliminate mechanical faults in real time, thereby ensuring safe and reliable operation of equipment. This traditional method uses contact measurement vibration signals t...

  • Article
  • Open Access
19 Citations
28,930 Views
37 Pages

Modeling Popularity and Reliability of Sources in Multilingual Wikipedia

  • Włodzimierz Lewoniewski,
  • Krzysztof Węcel and
  • Witold Abramowicz

One of the most important factors impacting quality of content in Wikipedia is presence of reliable sources. By following references, readers can verify facts or find more details about described topic. A Wikipedia article can be edited independently...

  • Article
  • Open Access
1 Citations
6,190 Views
16 Pages

Variants of best-first search algorithms and their expansions have continuously been introduced to solve challenging problems. The probability-based proof number search (PPNS) is a best-first search algorithm that can be used to solve positions in AN...

  • Article
  • Open Access
38 Citations
8,842 Views
22 Pages

Methodological Considerations Concerning Motion Sickness Investigations during Automated Driving

  • Dominik Mühlbacher,
  • Markus Tomzig,
  • Katharina Reinmüller and
  • Lena Rittger

Automated driving vehicles will allow all occupants to spend their time with various non-driving related tasks like relaxing, working, or reading during the journey. However, a significant percentage of people is susceptible to motion sickness, which...

  • Article
  • Open Access
3 Citations
3,228 Views
21 Pages

The topic of this article is inspired by the problem faced by many people around the world: investment portfolio selection. Apart from the standardly used methods and approaches, non-traditional multiple objective programming methods can also be sign...

  • Article
  • Open Access
7 Citations
6,233 Views
27 Pages

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

  • Sebastian Pape,
  • Federica Paci,
  • Jan Jürjens and
  • Fabio Massacci

Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud. To this end, the Cloud Security Alliance (CSA) has provided the Consensus Assessm...

  • Article
  • Open Access
3,510 Views
13 Pages

In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can ve...

  • Article
  • Open Access
3 Citations
4,772 Views
14 Pages

Heuristic Analysis for In-Plane Non-Contact Calibration of Rulers Using Mask R-CNN

  • Michael Telahun,
  • Daniel Sierra-Sossa and
  • Adel S. Elmaghraby

Determining an object measurement is a challenging task without having a well-defined reference. When a ruler is placed in the same plane of an object being measured it can serve as metric reference, thus a measurement system can be defined and calib...

  • Article
  • Open Access
24 Citations
6,155 Views
20 Pages

The present paper discusses a comparative application of image processing techniques, i.e., Discrete Fourier Transform, K-Means clustering and Artificial Neural Network, for the detection of defects in the industrial context of assembled tires. The u...

  • Review
  • Open Access
12 Citations
7,802 Views
13 Pages

Small Satellites and in particular CubeSats are becoming extremely popular platforms with which to perform space research. They allow for rapid prototyping with considerable cost savings with respect to traditional missions. However, as small satelli...

  • Article
  • Open Access
6 Citations
5,438 Views
20 Pages

The intrinsic characteristics of humanities research require technological support and software assistance that also necessarily goes through the analysis of textual narratives. When these narratives become increasingly complex, pragmatics analysis (...

  • Article
  • Open Access
32 Citations
6,909 Views
12 Pages

One important issue that affects the performance of neural machine translation is the scale of available parallel data. For low-resource languages, the amount of parallel data is not sufficient, which results in poor translation quality. In this pape...

  • Feature Paper
  • Article
  • Open Access
10 Citations
6,248 Views
15 Pages

This article aims to present the results of pilot studies on the involvement of the four largest Information Communication Technology (ICT) companies in promoting the Sustainable Development Goals (SDGs) through social media. Studies examine which co...

  • Article
  • Open Access
4 Citations
6,704 Views
12 Pages

Hedonic Pricing on the Fine Art Market

  • Anna Zhukova,
  • Valeriya Lakshina and
  • Liudmila Leonova

In conditions of the stock market instability the art assets could be considered as an attractive investment. The fine art market is very heterogeneous which is featured by uniqueness of the goods, specific costs and risks, various peculiarities of f...

  • Article
  • Open Access
13 Citations
7,401 Views
15 Pages

Knowledge Graphs for Online Marketing and Sales of Touristic Services

  • Anna Fensel,
  • Zaenal Akbar,
  • Elias Kärle,
  • Christoph Blank,
  • Patrick Pixner and
  • Andreas Gruber

Direct online marketing and sales are nowadays an essential part of almost any business that addresses an end consumer, such as in tourism. On the downside, the data and content required for such marketing and sales are typically distributed, and dif...

  • Article
  • Open Access
46 Citations
7,527 Views
16 Pages

An Application of a Fuzzy TOPSIS Multi-Criteria Decision Analysis Algorithm for Dry Bulk Carrier Selection

  • Bekir Sahin,
  • Tsz Leung Yip,
  • Po-Hsing Tseng,
  • Mehmet Kabak and
  • Ahmet Soylu

Decision-making in ship investment is a complex and difficult process with trade-offs. The purpose of this study is to guide the decisions on the purchase of dry bulk carriers based on a Fuzzy Technique for Order Preference by Similarity to Ideal Sol...

  • Article
  • Open Access
1 Citations
2,892 Views
26 Pages

In generating invariants for hybrid systems, a main source of intractability is that transition relations are first-order assertions over current-state variables and next-state variables, which doubles the number of system variables and introduces ma...

  • Article
  • Open Access
4 Citations
5,486 Views
14 Pages

TwiFly: A Data Analysis Framework for Twitter

  • Panagiotis Chatziadam,
  • Aftantil Dimitriadis,
  • Stefanos Gikas,
  • Ilias Logothetis,
  • Manolis Michalodimitrakis,
  • Manolis Neratzoulakis,
  • Alexandros Papadakis,
  • Vasileios Kontoulis,
  • Nikolaos Siganos and
  • Haridimos Kondylakis
  • + 5 authors

Over the last decade, there have been many changes in the field of political analysis at a global level. Through social networking platforms, millions of people have the opportunity to express their opinion and capture their thoughts at any time, lea...

  • Article
  • Open Access
3,950 Views
17 Pages

Research on Uyghur Pattern Matching Based on Syllable Features

  • Wayit Abliz,
  • Maihemuti Maimaiti,
  • Hao Wu,
  • Jiamila Wushouer,
  • Kahaerjiang Abiderexiti,
  • Tuergen Yibulayin and
  • Aishan Wumaier

Pattern matching is widely used in various fields such as information retrieval, natural language processing (NLP), data mining and network security. In Uyghur (a typical agglutinative, low-resource language with complex morphology, spoken by the eth...

  • Article
  • Open Access
8 Citations
6,793 Views
16 Pages

A non-negligible proportion of seniors rarely uses new technology. Far too often, these rather tech unexperienced seniors struggle with new soft- or hard-ware, that do not provide easy access. As a result, some seniors avoid or completely desist to f...

  • Article
  • Open Access
2 Citations
3,653 Views
16 Pages

In recent years, the graph embedding approach has drawn a lot of attention in the field of network representation and analytics, the purpose of which is to automatically encode network elements into a low-dimensional vector space by preserving certai...

  • Article
  • Open Access
4 Citations
3,425 Views
10 Pages

Entropy increases in the execution of linear physical processes. At equilibrium, all uncertainty about the future is removed and information about the past is lost. Complex systems, on the other hand, can lead to the emergence of order, sustain uncer...

  • Article
  • Open Access
117 Citations
13,873 Views
21 Pages

Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks

  • Pramita Sree Muhuri,
  • Prosenjit Chatterjee,
  • Xiaohong Yuan,
  • Kaushik Roy and
  • Albert Esterline

An intrusion detection system (IDS) identifies whether the network traffic behavior is normal or abnormal or identifies the attack types. Recently, deep learning has emerged as a successful approach in IDSs, having a high accuracy rate with its disti...

  • Article
  • Open Access
3 Citations
4,511 Views
13 Pages

The main aim of the article was to estimate select aspects of knowledge management quality evaluations in contemporary enterprises from theoretical and practical perspectives. Measuring knowledge management is the biggest challenge for both theoretic...

  • Article
  • Open Access
22 Citations
15,549 Views
13 Pages

30 April 2020

Currently, almost every business entity has one or more social media accounts. This statement is true for companies operating in creative areas as well. Social media make it possible to perform widely understood marketing-oriented undertakings. They...

  • Review
  • Open Access
30 Citations
9,065 Views
25 Pages

29 April 2020

Paraphrase detection is important for a number of applications, including plagiarism detection, authorship attribution, question answering, text summarization, text mining in general, etc. In this paper, we give a performance overview of various type...

  • Article
  • Open Access
17 Citations
4,374 Views
14 Pages

Engagement in Non-Driving Related Tasks as a Non-Intrusive Measure for Mode Awareness: A Simulator Study

  • Yannick Forster,
  • Viktoria Geisel,
  • Sebastian Hergeth,
  • Frederik Naujoks and
  • Andreas Keinath

28 April 2020

Research on the role of non-driving related tasks (NDRT) in the area of automated driving is indispensable. At the same time, the construct mode awareness has received considerable interest in regard to human–machine interface (HMI) evaluation....

  • Review
  • Open Access
17 Citations
7,468 Views
15 Pages

Usability Evaluation—Advances in Experimental Design in the Context of Automated Driving Human–Machine Interfaces

  • Deike Albers,
  • Jonas Radlmayr,
  • Alexandra Loew,
  • Sebastian Hergeth,
  • Frederik Naujoks,
  • Andreas Keinath and
  • Klaus Bengler

28 April 2020

The projected introduction of conditional automated driving systems to the market has sparked multifaceted research on human–machine interfaces (HMIs) for such systems. By moderating the roles of the human driver and the driving automation syst...

  • Article
  • Open Access
20 Citations
18,123 Views
48 Pages

A Self-Operating Time Crystal Model of the Human Brain: Can We Replace Entire Brain Hardware with a 3D Fractal Architecture of Clocks Alone?

  • Pushpendra Singh,
  • Komal Saxena,
  • Anup Singhania,
  • Pathik Sahoo,
  • Subrata Ghosh,
  • Rutuja Chhajed,
  • Kanad Ray,
  • Daisuke Fujita and
  • Anirban Bandyopadhyay

27 April 2020

Time crystal was conceived in the 1970s as an autonomous engine made of only clocks to explain the life-like features of a virus. Later, time crystal was extended to living cells like neurons. The brain controls most biological clocks that regenerate...

  • Article
  • Open Access
7 Citations
5,491 Views
13 Pages

26 April 2020

The use of technological solutions to address the production of goods and offering of services is ubiquitous. Health and social issues, however, have only slowly been permeated by technological solutions. Whilst several advances have been made in hea...

  • Feature Paper
  • Article
  • Open Access
10 Citations
6,602 Views
23 Pages

Exploring West African Folk Narrative Texts Using Machine Learning

  • Gossa Lô,
  • Victor de Boer and
  • Chris J. van Aart

26 April 2020

This paper examines how machine learning (ML) and natural language processing (NLP) can be used to identify, analyze, and generate West African folk tales. Two corpora of West African and Western European folk tales are compiled and used in three exp...

  • Article
  • Open Access
1 Citations
3,379 Views
31 Pages

26 April 2020

This article presents the use of data processing to apprehend mathematical questions such as the Riemann Hypothesis (RH) by numerical calculation. Calculations are performed alongside graphs of the argument of the complex numbers ζ ( x + i...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489