Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 9, Issue 4

2018 April - 33 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (33)

  • Article
  • Open Access
14 Citations
5,922 Views
22 Pages

21 April 2018

K-means clustering is an important and popular technique in data mining. Unfortunately, for any given dataset (not knowledge-base), it is very difficult for a user to estimate the proper number of clusters in advance, and it also has the tendency of...

  • Article
  • Open Access
36 Citations
7,557 Views
13 Pages

Analysis of Document Pre-Processing Effects in Text and Opinion Mining

  • Danilo Medeiros Eler,
  • Denilson Grosa,
  • Ives Pola,
  • Rogério Garcia,
  • Ronaldo Correia and
  • Jaqueline Teixeira

20 April 2018

Typically, textual information is available as unstructured data, which require processing so that data mining algorithms can handle such data; this processing is known as the pre-processing step in the overall text mining process. This paper aims at...

  • Article
  • Open Access
8 Citations
4,975 Views
13 Pages

19 April 2018

In recent years, scene semantic recognition has become the most exciting and fastest growing research topic. Lots of scene semantic analysis methods thus have been proposed for better scene content interpretation. By using latent Dirichlet allocation...

  • Article
  • Open Access
12 Citations
6,470 Views
20 Pages

19 April 2018

Chinese knowledge base question answering (KBQA) is designed to answer the questions with the facts contained in a knowledge base. This task can be divided into two subtasks: topic entity extraction and relation selection. During the topic entity ext...

  • Essay
  • Open Access
3 Citations
12,334 Views
18 Pages

19 April 2018

It seems to be accepted that intelligenceartificial or otherwise—and ‘the singularity’ are inseparable concepts: ‘The singularity’ will apparently arise from AI reaching a, supposedly particular, but actually poor...

  • Article
  • Open Access
1 Citations
4,684 Views
13 Pages

Hierarchical Guidance Strategy and Exemplar-Based Image Inpainting

  • Huaming Liu,
  • Guanming Lu,
  • Xuehui Bi and
  • Weilan Wang

18 April 2018

To solve the issue that it is difficult to maintain the consistency of linear structures when filling large regions by the exemplar-based technique, a hierarchical guidance strategy and exemplar-based image inpainting technique is proposed. The inpai...

  • Article
  • Open Access
13 Citations
5,520 Views
14 Pages

CSI Frequency Domain Fingerprint-Based Passive Indoor Human Detection

  • Chong Han,
  • Qingqing Tan,
  • Lijuan Sun,
  • Hai Zhu and
  • Jian Guo

17 April 2018

Passive indoor personnel detection technology is now a hot topic. Existing methods have been greatly influenced by environmental changes, and there are problems with the accuracy and robustness of detection. Passive personnel detection based on Wi-Fi...

  • Article
  • Open Access
36 Citations
7,502 Views
22 Pages

An Ensemble of Condition Based Classifiers for Device Independent Detailed Human Activity Recognition Using Smartphones

  • Jayita Saha,
  • Chandreyee Chowdhury,
  • Ishan Roy Chowdhury,
  • Suparna Biswas and
  • Nauman Aslam

16 April 2018

Human activity recognition is increasingly used for medical, surveillance and entertainment applications. For better monitoring, these applications require identification of detailed activity like sitting on chair/floor, brisk/slow walking, running,...

  • Article
  • Open Access
47 Citations
11,786 Views
11 Pages

15 April 2018

A new technique to detect eye blinks is proposed based on automatic tracking of facial landmarks to localise the eyes and eyelid contours. Automatic facial landmarks detectors are trained on an in-the-wild dataset and shows an outstanding robustness...

  • Article
  • Open Access
3 Citations
7,873 Views
23 Pages

14 April 2018

The Border Gateway Protocol (BGP) is the current state-of-the-art inter-domain routing between Autonomous Systems (ASes). Although BGP has different mechanisms to manage outbound traffic in an AS domain, it lacks an efficient tool for inbound traffic...

  • Article
  • Open Access
9 Citations
4,884 Views
29 Pages

13 April 2018

Useful inheritances from scientific experience open perspective ways for increasing the degree of success in designing of systems with software. One such way is a search and build applied theory that takes into account the nature of design and the sp...

  • Article
  • Open Access
11 Citations
5,123 Views
14 Pages

12 April 2018

The healthcare ambit is usually perceived as “information rich” yet “knowledge poor”. Nowadays, an unprecedented effort is underway to increase the use of business intelligence techniques to solve this problem. Heart disease (HD) is a major cause of...

  • Article
  • Open Access
14 Citations
5,485 Views
13 Pages

11 April 2018

This paper proposes an improved two-way security authentication protocol to improve the security level of Radio Frequency Identification (RFID) system. In the proposed protocol, tags calculate hash value, which is divided into two parts. The left hal...

  • Article
  • Open Access
2 Citations
4,236 Views
15 Pages

11 April 2018

Availability is one of the main concerns of cloud users, and cloud providers always try to provide higher availability to improve user satisfaction. However, higher availability results in higher provider costs and lower social welfare. In this paper...

  • Article
  • Open Access
3 Citations
4,127 Views
20 Pages

11 April 2018

In this paper, the hesitant neutrosophic linguistic set is first defined by extending a hesitant fuzzy set to accommodate linguistic terms and neutrosophic fuzzy values. Some operational laws are defined for hesitant neutrosophic linguistic fuzzy inf...

  • Article
  • Open Access
4,306 Views
20 Pages

In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a source communication with N ( N 1 ) destinations via an untrusted variable gains relay. To exploit multiuser diversity while protecting source’...

  • Article
  • Open Access
9 Citations
5,305 Views
18 Pages

POI (point-of-interest) recommendation as one of the efficient information filtering techniques has been widely utilized in helping people find places they are likely to visit, and many related methods have been proposed. Although the methods that ex...

  • Feature Paper
  • Article
  • Open Access
13 Citations
16,629 Views
15 Pages

We propose that the ability of humans to identify and create patterns led to the unique aspects of human cognition and culture as a complex emergent dynamic system consisting of the following human traits: patterning, social organization beyond that...

  • Article
  • Open Access
18 Citations
10,400 Views
18 Pages

Real-Time Location Systems for Asset Management in Nursing Homes: An Explorative Study of Ethical Aspects

  • J. Van Hoof,
  • J. Verboor,
  • C.E. Oude Weernink,
  • A.A.G. Sponselee,
  • J.A. Sturm,
  • J.K. Kazak,
  • G.M.J. Govers and
  • Y. Van Zaalen

Real-time location systems (RTLS) can be implemented in aged care for monitoring persons with wandering behaviour and asset management. RTLS can help retrieve personal items and assistive technologies that when lost or misplaced may have serious fina...

  • Article
  • Open Access
20 Citations
19,823 Views
15 Pages

Conceptions of Artificial Intelligence and Singularity

  • Pei Wang,
  • Kai Liu and
  • Quinn Dougherty

In the current discussions about “artificial intelligence” (AI) and “singularity”, both labels are used with several very different senses, and the confusion among these senses is the root of many disagreements. Similarly, although “artificial genera...

  • Article
  • Open Access
2 Citations
5,841 Views
18 Pages

Online novel recommendation recommends attractive novels according to the preferences and characteristics of users or novels and is increasingly touted as an indispensable service of many online stores and websites. The interests of the majority of u...

  • Article
  • Open Access
8 Citations
12,951 Views
28 Pages

The anticipated next stage of human organization is often described by futurists as a global technological singularity. This next stage of complex organization is hypothesized to be actualized by scientific-technic knowledge networks. However, the ge...

  • Feature Paper
  • Article
  • Open Access
42 Citations
17,377 Views
16 Pages

29 March 2018

A controversial question that has been hotly debated in the emerging field of robot ethics is whether robots should be granted rights. Yet, a review of the recent literature in that field suggests that this seemingly straightforward question is far f...

  • Article
  • Open Access
4 Citations
4,345 Views
16 Pages

Robust Aircraft Detection with a Simple and Efficient Model

  • Jiandan Zhong,
  • Tao Lei,
  • Guangle Yao and
  • Ping Jiang

29 March 2018

Aircraft detection is the main task of the optoelectronic guiding and monitoring system in airports. In practical applications, we demand not only detection accuracy, but also efficiency. Existing detection approaches always train a set of holistic t...

  • Feature Paper
  • Article
  • Open Access
15 Citations
8,968 Views
22 Pages

Language-Agnostic Relation Extraction from Abstracts in Wikis

  • Nicolas Heist,
  • Sven Hertling and
  • Heiko Paulheim

29 March 2018

Large-scale knowledge graphs, such as DBpedia, Wikidata, or YAGO, can be enhanced by relation extraction from text, using the data in the knowledge graph as training data, i.e., using distant supervision. While most existing approaches use language-s...

  • Article
  • Open Access
18 Citations
9,093 Views
19 Pages

29 March 2018

Recognizing textual entailment comprises the task of determining semantic entailment relations between text fragments. A text fragment entails another text fragment if, from the meaning of the former, one can infer the meaning of the latter. If such...

  • Article
  • Open Access
21 Citations
9,619 Views
20 Pages

Random Linear Network Coding for 5G Mobile Video Delivery

  • Dejan Vukobratovic,
  • Andrea Tassi,
  • Savo Delic and
  • Chadi Khirallah

28 March 2018

An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a number of new opportuniti...

  • Feature Paper
  • Article
  • Open Access
8 Citations
8,167 Views
22 Pages

27 March 2018

We describe the evolution of the IoT towards a heterogeneous multitopology network subject to dynamic change and volatility yet still capable of secure and dependable operation. As part of this evolution, we outline the key changes in wireless commun...

  • Article
  • Open Access
5 Citations
4,634 Views
10 Pages

Characteristics and Classification of Topological Spatial Relations in 3-D Cadasters

  • Lili Fu,
  • Pengcheng Yin,
  • Gang Li,
  • Zhifeng Shi,
  • Youzhi Liu and
  • Jiyi Zhang

27 March 2018

The application of a 3-D topology to cadasters is becoming increasingly important as 3-D cadasters continue to develop and cadastral data applications increase. This study discusses spatial topological relations related to 3-D cadasters, the geometri...

  • Feature Paper
  • Article
  • Open Access
3 Citations
6,278 Views
10 Pages

24 March 2018

In this paper, we propose a design for a personalized medication management system model MyMediMan that provides medication information for different stakeholders. The focus of the paper is on the system’s features and personalized information provid...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489