Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 9, Issue 1

2018 January - 24 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (24)

  • Article
  • Open Access
21 Citations
5,968 Views
16 Pages

24 January 2018

Capacity uncertainty is a common issue in the transportation planning field. However, few studies discuss the intermodal routing problem with service capacity uncertainty. Based on our previous study on the intermodal routing under deterministic capa...

  • Article
  • Open Access
8 Citations
6,401 Views
11 Pages

Inspired from Ants Colony: Smart Routing Algorithm of Wireless Sensor Network

  • Saleh Bouarafa,
  • Rachid Saadane and
  • Moulay Driss Rahmani

22 January 2018

In brief, Wireless Sensor Networks (WSNs) are a set of limited power nodes, used for gathering the determined data of an area. Increasing the lifetime is the main challenge to optimize WSNs routing protocols, since the sensors’ energy in most cases i...

  • Article
  • Open Access
2 Citations
5,528 Views
18 Pages

18 January 2018

The demand for video traffic is increasing over mobile networks that are taking another shape by its heterogeneity. However, the wireless link capacity cannot cope with the traffic demand. This is due to the interference problem that can be considere...

  • Article
  • Open Access
15 Citations
5,357 Views
12 Pages

18 January 2018

This paper proposes algorithms for optimization of the Remote Core Locking (RCL) synchronization method in multithreaded programs. We propose an algorithm for the initialization of RCL-locks and an algorithm for thread affinity optimization. The algo...

  • Article
  • Open Access
5 Citations
6,302 Views
26 Pages

Usability as the Key Factor to the Design of a Web Server for the CReF Protein Structure Predictor: The wCReF

  • Vanessa Stangherlin Machado Paixão-Cortes,
  • Michele Dos Santos da Silva Tanus,
  • Walter Ritzel Paixão-Cortes,
  • Osmar Norberto De Souza,
  • Marcia De Borba Campos and
  • Milene Selbach Silveira

17 January 2018

Protein structure prediction servers use various computational methods to predict the three-dimensional structure of proteins from their amino acid sequence. Predicted models are used to infer protein function and guide experimental efforts. This can...

  • Article
  • Open Access
117 Citations
10,515 Views
26 Pages

16 January 2018

Identification of the malignancy of tissues from Histopathological images has always been an issue of concern to doctors and radiologists. This task is time-consuming, tedious and moreover very challenging. Success in finding malignancy from Histopat...

  • Review
  • Open Access
71 Citations
14,977 Views
21 Pages

13 January 2018

Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recen...

  • Article
  • Open Access
9 Citations
5,176 Views
9 Pages

12 January 2018

Because of the existence of uncertainty measurement in the process of bearings degradation, it is difficult to carry out the reliability analysis. The random performance degradation model is used to analyze the reliability life of high-speed train be...

  • Article
  • Open Access
17 Citations
5,303 Views
20 Pages

12 January 2018

Many optimization problems can be found in scientific and engineering fields. It is a challenge for researchers to design efficient algorithms to solve these optimization problems. The Particle swarm optimization (PSO) algorithm, which is inspired by...

  • Article
  • Open Access
24 Citations
8,617 Views
14 Pages

Lightweight S-Box Architecture for Secure Internet of Things

  • A. Prathiba and
  • V. S. Kanchana Bhaaskaran

8 January 2018

Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-b...

  • Article
  • Open Access
1 Citations
7,207 Views
24 Pages

Automata Approach to XML Data Indexing

  • Eliška Šestáková and
  • Jan Janoušek

6 January 2018

The internal structure of XML documents can be viewed as a tree. Trees are among the fundamental and well-studied data structures in computer science. They express a hierarchical structure and are widely used in many applications. This paper focuses...

  • Article
  • Open Access
4 Citations
5,019 Views
13 Pages

5 January 2018

This paper focuses on the network capacity maximization problem through joint cell association and user scheduling with multiple carrier aggregation (CA) in the heterogeneous networks (HetNets). For the downlink transmission, the proposed joint maxim...

  • Article
  • Open Access
6 Citations
7,017 Views
17 Pages

Image Super-Resolution Algorithm Based on an Improved Sparse Autoencoder

  • Detian Huang,
  • Weiqin Huang,
  • Zhenguo Yuan,
  • Yanming Lin,
  • Jian Zhang and
  • Lixin Zheng

5 January 2018

Due to the limitations of the resolution of the imaging system and the influence of scene changes and other factors, sometimes only low-resolution images can be acquired, which cannot satisfy the practical application’s requirements. To improve the q...

  • Article
  • Open Access
14 Citations
5,028 Views
19 Pages

5 January 2018

Single-valued neutrosophic hesitant fuzzy set (SVNHFS) is a combination of single-valued neutrosophic set and hesitant fuzzy set, and its aggregation tools play an important role in the multiple criteria decision-making (MCDM) process. This paper inv...

  • Feature Paper
  • Article
  • Open Access
4 Citations
6,127 Views
23 Pages

SeMiner: A Flexible Sequence Miner Method to Forecast Solar Time Series

  • Sérgio Luisir Díscola Junior,
  • José Roberto Cecatto,
  • Márcio Merino Fernandes and
  • Marcela Xavier Ribeiro

4 January 2018

X-rays emitted by the Sun can damage electronic devices of spaceships, satellites, positioning systems and electricity distribution grids. Thus, the forecasting of solar X-rays is needed to warn organizations and mitigate undesirable effects. Traditi...

  • Article
  • Open Access
2 Citations
6,650 Views
19 Pages

EmoSpell, a Morphological and Emotional Word Analyzer

  • Maria Inês Maia and
  • José Paulo Leal

3 January 2018

The analysis of sentiments, emotions, and opinions in texts is increasingly important in the current digital world. The existing lexicons with emotional annotations for the Portuguese language are oriented to polarities, classifying words as positive...

  • Article
  • Open Access
5 Citations
5,797 Views
19 Pages

3 January 2018

This paper aims to present a new way of understanding and elaborating the current state of reality which has a substantial dependency on technology. An example of such a relatively mature technology is the Internet. The discursive space (DS) is a pro...

  • Article
  • Open Access
164 Citations
13,314 Views
14 Pages

A Comparison Study of Kernel Functions in the Support Vector Machine and Its Application for Termite Detection

  • Muhammad Achirul Nanda,
  • Kudang Boro Seminar,
  • Dodi Nandika and
  • Akhiruddin Maddu

2 January 2018

Termites are the most destructive pests and their attacks significantly impact the quality of wooden buildings. Due to their cryptic behavior, it is rarely apparent from visual observation that a termite infestation is active and that wood damage is...

  • Article
  • Open Access
28 Citations
5,493 Views
15 Pages

2 January 2018

Due to the disproportionate difference between the number of genes and samples, microarray data analysis is considered an extremely difficult task in sample classification. Feature selection mitigates this problem by removing irrelevant and redundant...

  • Article
  • Open Access
8 Citations
9,188 Views
30 Pages

Entity Attribute Value Style Modeling Approach for Archetype Based Data

  • Shivani Batra,
  • Shelly Sachdeva and
  • Subhash Bhalla

29 December 2017

Entity Attribute Value (EAV) storage model is extensively used to manage healthcare data in existing systems, however it lacks search efficiency. This study examines an entity attribute value style modeling approach for standardized Electronic Health...

  • Article
  • Open Access
2 Citations
4,730 Views
15 Pages

An RTT-Aware Virtual Machine Placement Method

  • Li Quan,
  • Zhiliang Wang and
  • Fuji Ren

29 December 2017

Virtualization is a key technology for mobile cloud computing (MCC) and the virtual machine (VM) is a core component of virtualization. VM provides a relatively independent running environment for different applications. Therefore, the VM placement p...

  • Editorial
  • Open Access
3 Citations
4,768 Views
2 Pages

Special Issue on Fuzzy Logic for Image Processing

  • Laura Caponetti and
  • Giovanna Castellano

27 December 2017

The increasing availability of huge image collections in different application fields, such as medical diagnosis, remote sensing, transmission and encoding, machine/robot vision, and video processing, microscopic imaging has pressed the need, in the...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489