Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 14, Issue 7

2023 July - 73 articles

Cover Story: Health monitoring is crucial in hospitals and rehabilitation centres, as it plays a vital role in patient care. However, challenges affecting the reliability and accuracy of health data need to be addressed. To overcome these obstacles, we propose a non-intrusive smart sensing system that integrates the use of a SensFloor smart carpet, and an Inertial Measurement Unit (IMU) wearable sensor placed on the user's back to monitor position and gait characteristics. By employing Machine Learning (ML) algorithms, the system analyses data collected from the SensFloor and IMU sensors, generating real-time data stored in the cloud. These real-time data are readily accessible to both physical therapists and patients, providing comprehensive analysis of the user's gait and balance. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (73)

  • Article
  • Open Access
15 Citations
5,391 Views
18 Pages

Employee Productivity Assessment Using Fuzzy Inference System

  • Mohammad Nikmanesh,
  • Ardalan Feili and
  • Shahryar Sorooshian

22 July 2023

The success of an organization hinges upon the effective utilization of its human resources, which serves as a crucial developmental factor and competitive advantage, and sets the organization apart from others. Evaluating staff productivity involves...

  • Article
  • Open Access
5 Citations
2,497 Views
12 Pages

Correction of Threshold Determination in Rapid-Guessing Behaviour Detection

  • Muhammad Alfian,
  • Umi Laili Yuhana,
  • Eric Pardede and
  • Akbar Noto Ponco Bimantoro

21 July 2023

Assessment is one benchmark in measuring students’ abilities. However, assessment results cannot necessarily be trusted, because students sometimes cheat or even guess in answering the questions. Therefore, to obtain valid results, it is necess...

  • Article
  • Open Access
3 Citations
2,886 Views
17 Pages

Combining Classifiers for Deep Learning Mask Face Recognition

  • Wen-Chang Cheng,
  • Hung-Chou Hsiao,
  • Yung-Fa Huang and
  • Li-Hua Li

21 July 2023

This research proposes a single network model architecture for mask face recognition using the FaceNet training method. Three pre-trained convolutional neural networks of different sizes are combined, namely InceptionResNetV2, InceptionV3, and Mobile...

  • Article
  • Open Access
8 Citations
4,215 Views
16 Pages

Revisiting Softmax for Uncertainty Approximation in Text Classification

  • Andreas Nugaard Holm,
  • Dustin Wright and
  • Isabelle Augenstein

20 July 2023

Uncertainty approximation in text classification is an important area with applications in domain adaptation and interpretability. One of the most widely used uncertainty approximation methods is Monte Carlo (MC) dropout, which is computationally exp...

  • Article
  • Open Access
1 Citations
2,777 Views
16 Pages

20 July 2023

Image captioning is a challenging task, which generates a sentence for a given image. The earlier captioning methods mainly decode the visual features to generate caption sentences for the image. However, the visual features lack the context semantic...

  • Article
  • Open Access
7 Citations
5,681 Views
10 Pages

20 July 2023

In recent work, various scholars have suggested that large language models can be construed as input-driven theories of language acquisition. In this paper, we propose a way to test this idea. As we will document, there is good reason to think that p...

  • Article
  • Open Access
10 Citations
3,004 Views
16 Pages

NARX Technique to Predict Torque in Internal Combustion Engines

  • Federico Ricci,
  • Luca Petrucci,
  • Francesco Mariani and
  • Carlo Nazareno Grimaldi

20 July 2023

To carry out increasingly sophisticated checks, which comply with international regulations and stringent constraints, on-board computational systems are called upon to manipulate a growing number of variables, provided by an ever-increasing number o...

  • Article
  • Open Access
7 Citations
2,565 Views
11 Pages

MSGAT-Based Sentiment Analysis for E-Commerce

  • Tingyao Jiang,
  • Wei Sun and
  • Min Wang

19 July 2023

Sentence-level sentiment analysis, as a research direction in natural language processing, has been widely used in various fields. In order to address the problem that syntactic features were neglected in previous studies on sentence-level sentiment...

  • Article
  • Open Access
73 Citations
10,029 Views
14 Pages

Multi-Class Skin Cancer Classification Using Vision Transformer Networks and Convolutional Neural Network-Based Pre-Trained Models

  • Muhammad Asad Arshed,
  • Shahzad Mumtaz,
  • Muhammad Ibrahim,
  • Saeed Ahmed,
  • Muhammad Tahir and
  • Muhammad Shafi

18 July 2023

Skin cancer, particularly melanoma, has been recognized as one of the most lethal forms of cancer. Detecting and diagnosing skin lesions accurately can be challenging due to the striking similarities between the various types of skin lesions, such as...

  • Article
  • Open Access
18 Citations
6,311 Views
32 Pages

Federated Edge Intelligence and Edge Caching Mechanisms

  • Aristeidis Karras,
  • Christos Karras,
  • Konstantinos C. Giotopoulos,
  • Dimitrios Tsolis,
  • Konstantinos Oikonomou and
  • Spyros Sioutas

18 July 2023

Federated learning (FL) has emerged as a promising technique for preserving user privacy and ensuring data security in distributed machine learning contexts, particularly in edge intelligence and edge caching applications. Recognizing the prevalent c...

  • Article
  • Open Access
12 Citations
3,218 Views
20 Pages

Arabic Mispronunciation Recognition System Using LSTM Network

  • Abdelfatah Ahmed,
  • Mohamed Bader,
  • Ismail Shahin,
  • Ali Bou Nassif,
  • Naoufel Werghi and
  • Mohammad Basel

16 July 2023

The Arabic language has always been an immense source of attraction to various people from different ethnicities by virtue of the significant linguistic legacy that it possesses. Consequently, a multitude of people from all over the world are yearnin...

  • Article
  • Open Access
4 Citations
7,492 Views
18 Pages

Health Monitoring Apps: An Evaluation of the Persuasive System Design Model for Human Wellbeing

  • Asif Hussian,
  • Abdul Mateen,
  • Farhan Amin,
  • Muhammad Ali Abid and
  • Saeed Ullah

16 July 2023

In the current era of ubiquitous computing and mobile technology, almost all human beings use various self-monitoring applications. Mobile applications could be the best health assistant for safety and adopting a healthy lifestyle. Therefore, persuas...

  • Article
  • Open Access
12 Citations
6,844 Views
36 Pages

Assessing the Solid Protocol in Relation to Security and Privacy Obligations

  • Christian Esposito,
  • Ross Horne,
  • Livio Robaldo,
  • Bart Buelens and
  • Elfi Goesaert

16 July 2023

The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services...

  • Article
  • Open Access
82 Citations
19,890 Views
14 Pages

16 July 2023

The prompt and accurate diagnosis of breast lesions, including the distinction between cancer, non-cancer, and suspicious cancer, plays a crucial role in the prognosis of breast cancer. In this paper, we introduce a novel method based on feature extr...

  • Article
  • Open Access
40 Citations
9,426 Views
14 Pages

16 July 2023

In recent years, artificial intelligence (AI) has emerged as a valuable resource for teaching and learning, and it has also shown promise as a tool to help solve problems. A tool that has gained attention in education is ChatGPT, which supports teach...

  • Article
  • Open Access
3 Citations
7,289 Views
20 Pages

16 July 2023

In this work we combine sentiment analysis with graph theory to analyze user posts, likes/dislikes on a variety of social media to provide recommendations for YouTube videos. We focus on the topic of climate change/global warming, which has caused mu...

  • Article
  • Open Access
2 Citations
2,329 Views
21 Pages

Improved Spacecraft Authentication Method for Satellite Internet System Using Residue Codes

  • Alexandr Anatolyevich Olenev,
  • Igor Anatolyevich Kalmykov,
  • Vladimir Petrovich Pashintsev,
  • Nikita Konstantinovich Chistousov,
  • Daniil Vyacheslavovich Dukhovnyj and
  • Natalya Igorevna Kalmykova

15 July 2023

Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threat...

  • Article
  • Open Access
10 Citations
9,487 Views
20 Pages

Virtual Restaurants: Customer Experience Keeps Their Businesses Alive

  • Maria I. Klouvidaki,
  • Nikos Antonopoulos,
  • Georgios D. Styliaras and
  • Andreas Kanavos

15 July 2023

Due to COVID-19 restrictions, many restaurants were forced to discontinue in-person service, either by locking down or finding alternative methods of operation. Despite the fact that, in the United States of America, digital restaurants have already...

  • Article
  • Open Access
4 Citations
2,437 Views
28 Pages

14 July 2023

We studied two fundamental linguistic channels—the sentences and the interpunctions channels—and showed they can reveal deeper connections between texts. The applied theory does not follow the actual paradigm of linguistic studies. As a s...

  • Article
  • Open Access
18 Citations
4,668 Views
15 Pages

Enhancing CSI-Based Human Activity Recognition by Edge Detection Techniques

  • Hossein Shahverdi,
  • Mohammad Nabati,
  • Parisa Fard Moshiri,
  • Reza Asvadi and
  • Seyed Ali Ghorashi

14 July 2023

Human Activity Recognition (HAR) has been a popular area of research in the Internet of Things (IoT) and Human–Computer Interaction (HCI) over the past decade. The objective of this field is to detect human activities through numeric or visual...

  • Article
  • Open Access
7 Citations
5,537 Views
26 Pages

14 July 2023

Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impact...

  • Article
  • Open Access
5 Citations
3,033 Views
12 Pages

Smart Wearable to Prevent Injuries in Amateur Athletes in Squats Exercise by Using Lightweight Machine Learning Model

  • Ricardo P. Arciniega-Rocha,
  • Vanessa C. Erazo-Chamorro,
  • Paúl D. Rosero-Montalvo and
  • Gyula Szabó

14 July 2023

An erroneous squat movement might cause different injuries in amateur athletes who are not experts in workout exercises. Even when personal trainers watch out for the athletes’ workout performance, light variations in ankles, knees, and lower b...

  • Article
  • Open Access
12 Citations
5,713 Views
22 Pages

Justification vs. Transparency: Why and How Visual Explanations in a Scientific Literature Recommender System

  • Mouadh Guesmi,
  • Mohamed Amine Chatti,
  • Shoeb Joarder,
  • Qurat Ul Ain,
  • Clara Siepmann,
  • Hoda Ghanbarzadeh and
  • Rawaa Alatrash

14 July 2023

Significant attention has been paid to enhancing recommender systems (RS) with explanation facilities to help users make informed decisions and increase trust in and satisfaction with an RS. Justification and transparency represent two crucial goals...

  • Review
  • Open Access
35 Citations
6,782 Views
24 Pages

The Application of Z-Numbers in Fuzzy Decision Making: The State of the Art

  • Nik Muhammad Farhan Hakim Nik Badrul Alam,
  • Ku Muhammad Naim Ku Khalif,
  • Nor Izzati Jaini and
  • Alexander Gegov

13 July 2023

A Z-number is very powerful in describing imperfect information, in which fuzzy numbers are paired such that the partially reliable information is properly processed. During a decision-making process, human beings always use natural language to descr...

  • Article
  • Open Access
9 Citations
66,879 Views
19 Pages

Addiction and Spending in Gacha Games

  • Nikola Lakić,
  • Andrija Bernik and
  • Andrej Čep

13 July 2023

Gacha games are the most dominant games on the mobile market. These are free-to-play games with a lottery-like system, where the user pays with in-game currency to enter a draw in order to obtain the character or item they want. If a player does not...

  • Article
  • Open Access
5 Citations
3,805 Views
13 Pages

12 July 2023

The origin of the trademark similarity analysis problem lies within the legal area, specifically the protection of intellectual property. One of the possible technical solutions for this issue is the trademark similarity evaluation pipeline based on...

  • Article
  • Open Access
10 Citations
3,382 Views
17 Pages

12 July 2023

Interest in machine learning and neural networks has increased significantly in recent years. However, their applications are limited in safety-critical domains due to the lack of formal guarantees on their reliability and behavior. This paper shows...

  • Article
  • Open Access
12 Citations
4,570 Views
19 Pages

Theme Mapping and Bibliometric Analysis of Two Decades of Smart Farming

  • Tri Kushartadi,
  • Aditya Eka Mulyono,
  • Azhari Haris Al Hamdi,
  • Muhammad Afif Rizki,
  • Muhammad Anwar Sadat Faidar,
  • Wirawan Dwi Harsanto,
  • Muhammad Suryanegara and
  • Muhamad Asvial

11 July 2023

The estimated global population for 2050 is 9 billion, which implies an increase in food demand. Agriculture is the primary source of food production worldwide, and improving its efficiency and productivity through an integration with information and...

  • Article
  • Open Access
2 Citations
3,007 Views
19 Pages

11 July 2023

This study examined the Security and Exchange Commission (SEC) annual reports of selected logistics firms over the period from 2006 through 2021 for risk management terms. The purpose was to identify which risks are considered most important in suppl...

  • Article
  • Open Access
2,003 Views
23 Pages

Measuring and Understanding Crowdturfing in the App Store

  • Qinyu Hu,
  • Xiaomei Zhang,
  • Fangqi Li,
  • Zhushou Tang and
  • Shilin Wang

11 July 2023

Application marketplaces collect ratings and reviews from users to provide references for other consumers. Many crowdturfing activities abuse user reviews to manipulate the reputation of an app and mislead other consumers. To understand and improve t...

  • Article
  • Open Access
11 Citations
7,130 Views
25 Pages

11 July 2023

This research is primarily focused on utilizing available airborne LiDAR data and spatial data from the OpenStreetMap (OSM) database to generate 3D models of buildings for a large-scale urban area. The city center of Ljubljana, Slovenia, was selected...

  • Article
  • Open Access
6 Citations
8,166 Views
17 Pages

On Isotropy of Multimodal Embeddings

  • Kirill Tyshchuk,
  • Polina Karpikova,
  • Andrew Spiridonov,
  • Anastasiia Prutianova,
  • Anton Razzhigaev and
  • Alexander Panchenko

10 July 2023

Embeddings, i.e., vector representations of objects, such as texts, images, or graphs, play a key role in deep learning methodologies nowadays. Prior research has shown the importance of analyzing the isotropy of textual embeddings for transformer-ba...

  • Article
  • Open Access
6 Citations
5,771 Views
17 Pages

This paper examines the disinformation and fact-checking activity of ten Ibero-American countries during the outbreak of monkeypox in 2022. Using a mixed-methods approach based on content analysis, the debunkings published by these organizations on t...

  • Article
  • Open Access
12 Citations
7,732 Views
17 Pages

Object classification is a crucial task in deep learning, which involves the identification and categorization of objects in images or videos. Although humans can easily recognize common objects, such as cars, animals, or plants, performing this task...

  • Review
  • Open Access
44 Citations
11,468 Views
20 Pages

A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions

  • Kwok Tai Chui,
  • Brij B. Gupta,
  • Jiaqi Liu,
  • Varsha Arya,
  • Nadia Nedjah,
  • Ammar Almomani and
  • Priyanka Chaurasia

The smart city vision has driven the rapid development and advancement of interconnected technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this paper, various aspects of IoT and CPS in recent years (from 2013 to May...

  • Article
  • Open Access
5 Citations
5,590 Views
25 Pages

Faceted Search Systems (FSSs) have gained prominence as one of the dominant search approaches in vertical search systems. They provide facets to educate users about the information space and allow them to refine their search query and navigate back a...

  • Article
  • Open Access
11 Citations
7,774 Views
24 Pages

A Novel Authentication Method That Combines Honeytokens and Google Authenticator

  • Vassilis Papaspirou,
  • Maria Papathanasaki,
  • Leandros Maglaras,
  • Ioanna Kantzavelou,
  • Christos Douligeris,
  • Mohamed Amine Ferrag and
  • Helge Janicke

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attac...

  • Article
  • Open Access
5 Citations
3,093 Views
23 Pages

Effectively harnessing the power of social media data for disaster management requires sophisticated analysis methods and frameworks. This research focuses on understanding the contextual information present in social media posts during disasters and...

  • Article
  • Open Access
2 Citations
1,844 Views
14 Pages

A Layered and Parallelized Method of Eventual Model Checking

  • Yati Phyo,
  • Moe Nandi Aung,
  • Canh Minh Do and
  • Kazuhiro Ogata

Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce th...

  • Article
  • Open Access
5 Citations
2,104 Views
18 Pages

Most current non-intrusive load monitoring methods focus on traditional load characteristic analysis and algorithm optimization, lack knowledge of users’ electricity consumption behavior habits, and have poor accuracy. We propose a novel attent...

  • Article
  • Open Access
4 Citations
4,987 Views
19 Pages

Online Professional Development on Educational Neuroscience in Higher Education Based on Design Thinking

  • Stylianos Mystakidis,
  • Athanasios Christopoulos,
  • Maria Fragkaki and
  • Konstantinos Dimitropoulos

Higher education teaching staff members need to build a scientifically accurate and comprehensive understanding of the function of the brain in learning as neuroscience evidence can constitute a way to optimize teaching and achieve learning excellenc...

  • Article
  • Open Access
1 Citations
2,592 Views
13 Pages

Develop a Lightweight Convolutional Neural Network to Recognize Palms Using 3D Point Clouds

  • Yu-Ming Zhang,
  • Chia-Yuan Cheng,
  • Chih-Lung Lin,
  • Chun-Chieh Lee and
  • Kuo-Chin Fan

Biometrics has become an important research issue in recent years, and the use of deep learning neural networks has made it possible to develop more reliable and efficient recognition systems. Palms have been identified as one of the most promising c...

  • Article
  • Open Access
8 Citations
4,048 Views
22 Pages

Enabling Multi-Part Plant Segmentation with Instance-Level Augmentation Using Weak Annotations

  • Semen Mukhamadiev,
  • Sergey Nesteruk,
  • Svetlana Illarionova and
  • Andrey Somov

Plant segmentation is a challenging computer vision task due to plant images complexity. For many practical problems, we have to solve even more difficult tasks. We need to distinguish plant parts rather than the whole plant. The major complication o...

  • Article
  • Open Access
11 Citations
4,049 Views
12 Pages

A Practical Hybrid IoT Architecture with Deep Learning Technique for Healthcare and Security Applications

  • Viet Q. Vu,
  • Minh-Quang Tran,
  • Mohammed Amer,
  • Mahesh Khatiwada,
  • Sherif S. M. Ghoneim and
  • Mahmoud Elsisi

Facial mask detection technology has become increasingly important even beyond the context of the COVID-19 pandemic. Along with the advancement in facial recognition technology, face mask detection has become a crucial feature for various application...

  • Article
  • Open Access
12 Citations
8,664 Views
19 Pages

In the context of an increasingly digitized global marketplace, this study seeks to shed light on its adoption in developing countries, focusing on Morocco. Applying logit, probit, and conditional mixed-process probit models to a sample of 807 Morocc...

  • Article
  • Open Access
9 Citations
4,822 Views
20 Pages

Subject-Independent per Beat PPG to Single-Lead ECG Mapping

  • Khaled M. Abdelgaber,
  • Mostafa Salah,
  • Osama A. Omer,
  • Ahmed E. A. Farghal and
  • Ahmed S. Mubarak

In this paper, a beat-based autoencoder is proposed for mapping photoplethysmography (PPG) to a single-lead electrocardiogram (single-lead ECG) signal. The main limiting factors represented in uncleaned data, subject dependency, and erroneous beat se...

  • Article
  • Open Access
30 Citations
7,908 Views
19 Pages

A Comparison of Machine Learning Techniques for the Detection of Type-2 Diabetes Mellitus: Experiences from Bangladesh

  • Md. Jamal Uddin,
  • Md. Martuza Ahamad,
  • Md. Nesarul Hoque,
  • Md. Abul Ala Walid,
  • Sakifa Aktar,
  • Naif Alotaibi,
  • Salem A. Alyami,
  • Muhammad Ashad Kabir and
  • Mohammad Ali Moni

Diabetes is a chronic disease caused by a persistently high blood sugar level, causing other chronic diseases, including cardiovascular, kidney, eye, and nerve damage. Prompt detection plays a vital role in reducing the risk and severity associated w...

  • Article
  • Open Access
1 Citations
3,304 Views
12 Pages

Generation of Synthetic Images of Trabecular Bone Based on Micro-CT Scans

  • Jonas Grande-Barreto,
  • Eduardo Polanco-Castro,
  • Hayde Peregrina-Barreto,
  • Eduardo Rosas-Mialma and
  • Carmina Puig-Mar

Creating synthetic images of trabecular tissue provides an alternative for researchers to validate algorithms designed to study trabecular bone. Developing synthetic images requires baseline data, such as datasets of digital biological samples or tem...

  • Review
  • Open Access
29 Citations
10,492 Views
38 Pages

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

  • Parvez Faruki,
  • Rati Bhan,
  • Vinesh Jain,
  • Sajal Bhatia,
  • Nour El Madhoun and
  • Rajendra Pamula

30 June 2023

Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employ...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489