Journal Description
Information
Information
is a scientific, peer-reviewed, open access journal of information science and technology, data, knowledge, and communication, and is published monthly online by MDPI. The International Society for the Study of Information (IS4SI) is affiliated with Information and its members receive discounts on the article processing charges.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within Scopus, ESCI (Web of Science), Ei Compendex, dblp, and other databases.
- Journal Rank: JCR - Q2 (Computer Science, Information Systems) / CiteScore - Q2 (Information Systems)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 18.6 days after submission; acceptance to publication is undertaken in 3.6 days (median values for papers published in this journal in the first half of 2025).
- Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.
Impact Factor:
2.9 (2024);
5-Year Impact Factor:
3.0 (2024)
Latest Articles
Ambiguities, Built-In Biases, and Flaws in Big Data Insight Extraction
Information 2025, 16(8), 661; https://doi.org/10.3390/info16080661 (registering DOI) - 2 Aug 2025
Abstract
I address the challenge of extracting reliable insights from large datasets using a simplified model that illustrates how hierarchical classification can distort outcomes. The model consists of discrete pixels labeled red, blue, or white. Red and blue indicate distinct properties, while white represents
[...] Read more.
I address the challenge of extracting reliable insights from large datasets using a simplified model that illustrates how hierarchical classification can distort outcomes. The model consists of discrete pixels labeled red, blue, or white. Red and blue indicate distinct properties, while white represents unclassified or ambiguous data. A macro-color is assigned only if one color holds a strict majority among the pixels. Otherwise, the aggregate is labeled white, reflecting uncertainty. This setup mimics a percolation threshold at fifty percent. Assuming that directly accessing the various proportions from the data of colors is infeasible, I implement a hierarchical coarse-graining procedure. Elements (first pixels, then aggregates) are recursively grouped and reclassified via local majority rules, ultimately producing a single super-aggregate for which the color represents the inferred macro-property of the collection of pixels as a whole. Analytical results supported by simulations show that the process introduces additional white aggregates beyond white pixels, which could be present initially; these arise from groups lacking a clear majority, requiring arbitrary symmetry-breaking decisions to attribute a color to them. While each local resolution may appear minor and inconsequential, their repetitions introduce a growing systematic bias. Even with complete data, unavoidable asymmetries in local rules are shown to skew outcomes. This study highlights a critical limitation of recursive data reduction. Insight extraction is shaped not only by data quality but also by how local ambiguity is handled, resulting in built-in biases. Thus, the related flaws are not due to the data but to structural choices made during local aggregations. Although based on a simple model, these findings expose a high likelihood of inherent flaws in widely used hierarchical classification techniques.
Full article
(This article belongs to the Section Artificial Intelligence)
Open AccessArticle
Searching for the Best Artificial Neural Network Architecture to Estimate Column and Beam Element Dimensions
by
Ayla Ocak, Gebrail Bekdaş, Sinan Melih Nigdeli, Umit Işıkdağ and Zong Woo Geem
Information 2025, 16(8), 660; https://doi.org/10.3390/info16080660 (registering DOI) - 1 Aug 2025
Abstract
The cross-sectional dimensions of structural elements in a structure are design elements that need to be carefully designed and are related to the stiffness of the structure. Various optimization processes are applied to determine the optimum cross-sectional dimensions of beams or columns in
[...] Read more.
The cross-sectional dimensions of structural elements in a structure are design elements that need to be carefully designed and are related to the stiffness of the structure. Various optimization processes are applied to determine the optimum cross-sectional dimensions of beams or columns in structures. By repeating the optimization processes for multiple load scenarios, it is possible to create a data set that shows the optimum design section properties. However, this step means repeating the same processes to produce the optimum cross-sectional dimensions. Artificial intelligence technology offers a short-cut solution to this by providing the opportunity to train itself with previously generated optimum cross-sectional dimensions and infer new cross-sectional dimensions. By processing the data, the artificial neural network can generate models that predict the cross-section for a new structural element. In this study, an optimization process is applied to a simple tubular column and an I-section beam, and the results are compiled to create a data set that presents the optimum section dimensions as a class. The harmony search (HS) algorithm, which is a metaheuristic method, was used in optimization. An artificial neural network (ANN) was created to predict the cross-sectional dimensions of the sample structural elements. The neural architecture search (NAS) method, which incorporates many metaheuristic algorithms designed to search for the best artificial neural network architecture, was applied. In this method, the best values of various parameters of the neural network, such as activation function, number of layers, and neurons, are searched for in the model with a tool called HyperNetExplorer. Model metrics were calculated to evaluate the prediction success of the developed model. An effective neural network architecture for column and beam elements is obtained.
Full article
(This article belongs to the Special Issue Optimization Algorithms and Their Applications)
►▼
Show Figures

Figure 1
Open AccessArticle
A Knowledge–Data Dual-Driven Groundwater Condition Prediction Method for Tunnel Construction
by
Yong Huang, Wei Fu and Xiewen Hu
Information 2025, 16(8), 659; https://doi.org/10.3390/info16080659 (registering DOI) - 1 Aug 2025
Abstract
►▼
Show Figures
This paper introduces a knowledge–data dual-driven method for predicting groundwater conditions during tunnel construction. Unlike existing methods, our approach effectively integrates trend characteristics of apparent resistivity from detection results with geological distribution characteristics and expert insights. This dual-driven strategy significantly enhances the accuracy
[...] Read more.
This paper introduces a knowledge–data dual-driven method for predicting groundwater conditions during tunnel construction. Unlike existing methods, our approach effectively integrates trend characteristics of apparent resistivity from detection results with geological distribution characteristics and expert insights. This dual-driven strategy significantly enhances the accuracy of the prediction model. The intelligent prediction process for tunnel groundwater conditions proceeds in the following steps: First, the apparent resistivity data matrix is obtained from transient electromagnetic detection results and standardized. Second, to improve data quality, trend characteristics are extracted from the apparent resistivity data, and outliers are eliminated. Third, expert insights are systematically integrated to fully utilize prior information on groundwater conditions at the construction face, leading to the establishment of robust predictive models tailored to data from various construction surfaces. Finally, the relevant prediction segment is extracted to complete the groundwater condition forecast.
Full article

Figure 1
Open AccessReview
AI in Maritime Security: Applications, Challenges, Future Directions, and Key Data Sources
by
Kashif Talpur, Raza Hasan, Ismet Gocer, Shakeel Ahmad and Zakirul Bhuiyan
Information 2025, 16(8), 658; https://doi.org/10.3390/info16080658 (registering DOI) - 31 Jul 2025
Abstract
The growth and sustainability of today’s global economy heavily relies on smooth maritime operations. The increasing security concerns to marine environments pose complex security challenges, such as smuggling, illegal fishing, human trafficking, and environmental threats, for traditional surveillance methods due to their limitations.
[...] Read more.
The growth and sustainability of today’s global economy heavily relies on smooth maritime operations. The increasing security concerns to marine environments pose complex security challenges, such as smuggling, illegal fishing, human trafficking, and environmental threats, for traditional surveillance methods due to their limitations. Artificial intelligence (AI), particularly deep learning, has offered strong capabilities for automating object detection, anomaly identification, and situational awareness in maritime environments. In this paper, we have reviewed the state-of-the-art deep learning models mainly proposed in recent literature (2020–2025), including convolutional neural networks, recurrent neural networks, Transformers, and multimodal fusion architectures. We have highlighted their success in processing diverse data sources such as satellite imagery, AIS, SAR, radar, and sensor inputs from UxVs. Additionally, multimodal data fusion techniques enhance robustness by integrating complementary data, yielding more detection accuracy. There still exist challenges in detecting small or occluded objects, handling cluttered scenes, and interpreting unusual vessel behaviours, especially under adverse sea conditions. Additionally, explainability and real-time deployment of AI models in operational settings are open research areas. Overall, the review of existing maritime literature suggests that deep learning is rapidly transforming maritime domain awareness and response, with significant potential to improve global maritime security and operational efficiency. We have also provided key datasets for deep learning models in the maritime security domain.
Full article
(This article belongs to the Special Issue Advances in Machine Learning and Intelligent Information Systems)
►▼
Show Figures

Figure 1
Open AccessArticle
Generative AI in Education: Mapping the Research Landscape Through Bibliometric Analysis
by
Sai-Leung Ng and Chih-Chung Ho
Information 2025, 16(8), 657; https://doi.org/10.3390/info16080657 (registering DOI) - 31 Jul 2025
Abstract
The rapid emergence of generative AI technologies has sparked significant transformation across educational landscapes worldwide. This study presents a comprehensive bibliometric analysis of GAI in education, mapping scholarly trends from 2022 to 2025. Drawing on 3808 peer-reviewed journal articles indexed in Scopus, the
[...] Read more.
The rapid emergence of generative AI technologies has sparked significant transformation across educational landscapes worldwide. This study presents a comprehensive bibliometric analysis of GAI in education, mapping scholarly trends from 2022 to 2025. Drawing on 3808 peer-reviewed journal articles indexed in Scopus, the analysis reveals exponential growth in publications, with dominant contributions from the United States, China, and Hong Kong. Using VOSviewer, the study identifies six major thematic clusters, including GAI in higher education, ethics, technological foundations, writing support, and assessment. Prominent tools, especially ChatGPT, are shown to influence pedagogical design, academic integrity, and learner engagement. The study highlights interdisciplinary integration, regional research ecosystems, and evolving keyword patterns reflecting the field’s transition from tool-based inquiry to learner-centered concerns. This review offers strategic insights for educators, researchers, and policymakers navigating AI’s transformative role in education.
Full article
(This article belongs to the Special Issue Generative AI Technologies: Shaping the Future of Higher Education)
►▼
Show Figures

Figure 1
Open AccessReview
From Tools to Creators: A Review on the Development and Application of Artificial Intelligence Music Generation
by
Lijun Wei, Yuanyu Yu, Yuping Qin and Shuang Zhang
Information 2025, 16(8), 656; https://doi.org/10.3390/info16080656 (registering DOI) - 31 Jul 2025
Abstract
Artificial intelligence (AI) has emerged as a significant driving force in the development of technology and industry. It is also integrated with music as music AI in music generation and analysis. It originated from early algorithmic composition techniques in the mid-20th century. Recent
[...] Read more.
Artificial intelligence (AI) has emerged as a significant driving force in the development of technology and industry. It is also integrated with music as music AI in music generation and analysis. It originated from early algorithmic composition techniques in the mid-20th century. Recent advancements in machine learning and neural networks have enabled innovative music generation and exploration. This article surveys the development history and technical route of music AI, analyzes the current status and limitations of music artificial intelligence across various areas, including music generation and composition, rehabilitation and treatment, as well as education and learning. It reveals that music AI has become a promising creator in the field of music generation. The influence of music AI on the music industry and the challenges it encounters are explored. Additionally, an emotional music generation system driven by multimodal signals is proposed. Although music artificial intelligence technology still needs to be further improved, with the continuous breakthroughs in technology, it will have a more profound impact on all areas of music.
Full article
(This article belongs to the Special Issue Text-to-Speech and AI Music)
►▼
Show Figures

Figure 1
Open AccessArticle
Development of a Method for Determining Password Formation Rules Using Neural Networks
by
Leila Rzayeva, Alissa Ryzhova, Merei Zhaparkhanova, Ali Myrzatay, Olzhas Konakbayev, Abilkair Imanberdi, Yussuf Ahmed and Zhaksylyk Kozhakhmet
Information 2025, 16(8), 655; https://doi.org/10.3390/info16080655 (registering DOI) - 31 Jul 2025
Abstract
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory
[...] Read more.
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory password rotation policies inconvenient. These findings highlight the importance of combining technical solutions with user-focused education to strengthen password security. In this research, the “human factor in the creation of usernames and passwords” is considered a vulnerability, as identifying the patterns or rules used by users in password generation can significantly reduce the number of possible combinations that attackers need to try in order to gain access to personal data. The proposed method based on an LSTM model operates at a character level, detecting recurrent structures and generating generalized masks that reflect the most common components in password creation. Open datasets of 31,000 compromised passwords from real-world leaks were used to train the model and it achieved over 90% test accuracy without signs of overfitting. A new method of evaluating the individual password creation habits of users and automatically fetching context-rich keywords from a user’s public web and social media footprint via a keyword-extraction algorithm is developed, and this approach is incorporated into a web application that allows clients to locally fine-tune an LSTM model locally, run it through ONNX, and carry out all inference on-device, ensuring complete data confidentiality and adherence to privacy regulations.
Full article
(This article belongs to the Special Issue Security and Privacy Approaches Against Cyber Threats: Innovations, Challenges, and Practical Solutions)
►▼
Show Figures

Figure 1
Open AccessArticle
NeRF-RE: An Improved Neural Radiance Field Model Based on Object Removal and Efficient Reconstruction
by
Ziyang Li, Yongjian Huai, Qingkuo Meng and Shiquan Dong
Information 2025, 16(8), 654; https://doi.org/10.3390/info16080654 (registering DOI) - 31 Jul 2025
Abstract
High-quality green gardens can markedly enhance the quality of life and mental well-being of their users. However, health and lifestyle constraints make it difficult for people to enjoy urban gardens, and traditional methods struggle to offer the high-fidelity experiences they need. This study
[...] Read more.
High-quality green gardens can markedly enhance the quality of life and mental well-being of their users. However, health and lifestyle constraints make it difficult for people to enjoy urban gardens, and traditional methods struggle to offer the high-fidelity experiences they need. This study introduces a 3D scene reconstruction and rendering strategy based on implicit neural representation through the efficient and removable neural radiation fields model (NeRF-RE). Leveraging neural radiance fields (NeRF), the model incorporates a multi-resolution hash grid and proposal network to improve training efficiency and modeling accuracy, while integrating a segment-anything model to safeguard public privacy. Take the crabapple tree, extensively utilized in urban garden design across temperate regions of the Northern Hemisphere. A dataset comprising 660 images of crabapple trees exhibiting three distinct geometric forms is collected to assess the NeRF-RE model’s performance. The results demonstrated that the ‘harvest gold’ crabapple scene had the highest reconstruction accuracy, with PSNR, LPIPS and SSIM of 24.80 dB, 0.34 and 0.74, respectively. Compared to the Mip-NeRF 360 model, the NeRF-RE model not only showed an up to 21-fold increase in training efficiency for three types of crabapple trees, but also exhibited a less pronounced impact of dataset size on reconstruction accuracy. This study reconstructs real scenes with high fidelity using virtual reality technology. It not only facilitates people’s personal enjoyment of the beauty of natural gardens at home, but also makes certain contributions to the publicity and promotion of urban landscapes.
Full article
(This article belongs to the Special Issue Extended Reality and Its Applications)
►▼
Show Figures

Figure 1
Open AccessArticle
Using Large Language Models to Simulate History Taking: Implications for Symptom-Based Medical Education
by
Cheong Yoon Huh, Jongwon Lee, Gibaeg Kim, Yerin Jang, Hye-seung Ko, Min Jung Suh, Sumin Hwang, Ho Jin Son, Junha Song, Soo-Jeong Kim, Kwang Joon Kim, Sung Il Kim, Chang Oh Kim and Yeo Gyeong Ko
Information 2025, 16(8), 653; https://doi.org/10.3390/info16080653 (registering DOI) - 31 Jul 2025
Abstract
Medical education often emphasizes theoretical knowledge, limiting students’ opportunities to practice history taking, a structured interview that elicits relevant patient information before clinical decision making. Large language models (LLMs) offer novel solutions by generating simulated patient interviews. This study evaluated the educational potential
[...] Read more.
Medical education often emphasizes theoretical knowledge, limiting students’ opportunities to practice history taking, a structured interview that elicits relevant patient information before clinical decision making. Large language models (LLMs) offer novel solutions by generating simulated patient interviews. This study evaluated the educational potential of LLM-generated history-taking dialogues, focusing on clinical validity and diagnostic diversity. Chest pain was chosen as a representative case given its frequent presentation and importance for differential diagnosis. A fine-tuned Gemma-3-27B, specialized for medical interviews, was compared with GPT-4o-mini, a freely accessible LLM, in generating multi-branching history-taking dialogues, with Claude-3.5 Sonnet inferring diagnoses from these dialogues. The dialogues were assessed using a Chest Pain Checklist (CPC) and entropy-based metrics. Gemma-3-27B outperformed GPT-4o-mini, generating significantly more high-quality dialogues (90.7% vs. 76.5%). Gemma-3-27B produced diverse and focused diagnoses, whereas GPT-4o-mini generated broader but less specific patterns. For demographic information, such as age and sex, Gemma-3-27B showed significant shifts in dialogue patterns and diagnoses aligned with real-world epidemiological trends. These findings suggest that LLMs, particularly those fine-tuned for medical tasks, are promising educational tools for generating diverse, clinically valid interview scenarios that enhance clinical reasoning in history taking.
Full article
(This article belongs to the Special Issue Accessibility and Inclusion in Education: Enabling Digital Technologies)
►▼
Show Figures

Figure 1
Open AccessArticle
Diagnosing Bias and Instability in LLM Evaluation: A Scalable Pairwise Meta-Evaluator
by
Catalin Anghel, Andreea Alexandra Anghel, Emilia Pecheanu, Adina Cocu, Adrian Istrate and Constantin Adrian Andrei
Information 2025, 16(8), 652; https://doi.org/10.3390/info16080652 (registering DOI) - 31 Jul 2025
Abstract
The evaluation of large language models (LLMs) increasingly relies on other LLMs acting as automated judges. While this approach offers scalability and efficiency, it raises serious concerns regarding evaluator reliability, positional bias, and ranking stability. This paper presents a scalable framework for diagnosing
[...] Read more.
The evaluation of large language models (LLMs) increasingly relies on other LLMs acting as automated judges. While this approach offers scalability and efficiency, it raises serious concerns regarding evaluator reliability, positional bias, and ranking stability. This paper presents a scalable framework for diagnosing positional bias and instability in LLM-based evaluation by using controlled pairwise comparisons judged by multiple independent language models. The system supports mirrored comparisons with reversed response order, prompt injection, and surface-level perturbations (e.g., paraphrasing, lexical noise), enabling fine-grained analysis of evaluator consistency and verdict robustness. Over 3600 pairwise comparisons were conducted across five instruction-tuned open-weight models using ten open-ended prompts. The top-performing model (gemma:7b-instruct) achieved a 66.5% win rate. Evaluator agreement was uniformly high, with 100% consistency across judges, yet 48.4% of verdicts reversed under mirrored response order, indicating strong positional bias. Kendall’s Tau analysis further showed that local model rankings varied substantially across prompts, suggesting that semantic context influences evaluator judgment. All evaluation traces were stored in a graph database (Neo4j), enabling structured querying and longitudinal analysis. The proposed framework provides not only a diagnostic lens for benchmarking models but also a blueprint for fairer and more interpretable LLM-based evaluation. These findings underscore the need for structure-aware, perturbation-resilient evaluation pipelines when benchmarking LLMs. The proposed framework offers a reproducible path for diagnosing evaluator bias and ranking instability in open-ended language tasks. Future work will apply this methodology to educational assessment tasks, using rubric-based scoring and graph-based traceability to evaluate student responses in technical domains.
Full article
(This article belongs to the Special Issue Applications of Information Extraction, Knowledge Graphs, and Large Language Models)
►▼
Show Figures

Figure 1
Open AccessArticle
Personalized Constitutionally-Aligned Agentic Superego: Secure AI Behavior Aligned to Diverse Human Values
by
Nell Watson, Ahmed Amer, Evan Harris, Preeti Ravindra and Shujun Zhang
Information 2025, 16(8), 651; https://doi.org/10.3390/info16080651 - 30 Jul 2025
Abstract
Agentic AI systems, possessing capabilities for autonomous planning and action, show great potential across diverse domains. However, their practical deployment is hindered by challenges in aligning their behavior with varied human values, complex safety requirements, and specific compliance needs. Existing alignment methodologies often
[...] Read more.
Agentic AI systems, possessing capabilities for autonomous planning and action, show great potential across diverse domains. However, their practical deployment is hindered by challenges in aligning their behavior with varied human values, complex safety requirements, and specific compliance needs. Existing alignment methodologies often falter when faced with the complex task of providing personalized context without inducing confabulation or operational inefficiencies. This paper introduces a novel solution: a ‘superego’ agent, designed as a personalized oversight mechanism for agentic AI. This system dynamically steers AI planning by referencing user-selected ‘Creed Constitutions’—encapsulating diverse rule sets—with adjustable adherence levels to fit non-negotiable values. A real-time compliance enforcer validates plans against these constitutions and a universal ethical floor before execution. We present a functional system, including a demonstration interface with a prototypical constitution-sharing portal, and successful integration with third-party models via the Model Context Protocol (MCP). Comprehensive benchmark evaluations (HarmBench, AgentHarm) demonstrate that our Superego agent dramatically reduces harmful outputs—achieving up to a 98.3% harm score reduction and near-perfect refusal rates (e.g., 100% with Claude Sonnet 4 on AgentHarm’s harmful set) for leading LLMs like Gemini 2.5 Flash and GPT-4o. This approach substantially simplifies personalized AI alignment, rendering agentic systems more reliably attuned to individual and cultural contexts, while also enabling substantial safety improvements.
Full article
(This article belongs to the Special Issue New Information Communication Technologies in the Digital Era)
Open AccessArticle
Electronic Voting Worldwide: The State of the Art
by
Paolo Fantozzi, Marco Iecher, Luigi Laura, Maurizio Naldi and Valerio Rughetti
Information 2025, 16(8), 650; https://doi.org/10.3390/info16080650 - 30 Jul 2025
Abstract
Electronic voting allows people to participate more easily in their country’s electoral events. Nevertheless, its adoption is still far from widespread. In this paper, we provide a detailed survey of the state of adoption worldwide and investigate which socio-economic factors may influence such
[...] Read more.
Electronic voting allows people to participate more easily in their country’s electoral events. Nevertheless, its adoption is still far from widespread. In this paper, we provide a detailed survey of the state of adoption worldwide and investigate which socio-economic factors may influence such an adoption. Its usage is wider in North and South America, while remaining considerably lower in Europe and Asia and practically absent in Africa. We distinguish between e-voting, which maintains the traditional polling station structure while adding technological components, and i-voting, which enables remote participation from any location using personal devices. Five factors (country’s surface and population, Gross Domestic Product, Internet Usage, and Democracy Index) are investigated to predict adoption, and an accuracy of over 79% is achieved through a machine learning random forest model. Larger, wealthier, and more democratic countries are typically associated with a larger adoption of internet voting.
Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
►▼
Show Figures

Graphical abstract
Open AccessArticle
Development of Stacked Neural Networks for Application with OCT Data, to Improve Diabetic Retinal Health Care Management
by
Pedro Rebolo, Guilherme Barbosa, Eduardo Carvalho, Bruno Areias, Ana Guerra, Sónia Torres-Costa, Nilza Ramião, Manuel Falcão and Marco Parente
Information 2025, 16(8), 649; https://doi.org/10.3390/info16080649 - 30 Jul 2025
Abstract
Background: Retinal diseases are becoming an important public health issue, with early diagnosis and timely intervention playing a key role in preventing vision loss. Optical coherence tomography (OCT) remains the leading non-invasive imaging technique for identifying retinal conditions. However, distinguishing between diabetic macular
[...] Read more.
Background: Retinal diseases are becoming an important public health issue, with early diagnosis and timely intervention playing a key role in preventing vision loss. Optical coherence tomography (OCT) remains the leading non-invasive imaging technique for identifying retinal conditions. However, distinguishing between diabetic macular edema (DME) and macular edema resulting from retinal vein occlusion (RVO) can be particularly challenging, especially for clinicians without specialized training in retinal disorders, as both conditions manifest through increased retinal thickness. Due to the limited research exploring the application of deep learning methods, particularly for RVO detection using OCT scans, this study proposes a novel diagnostic approach based on stacked convolutional neural networks. This architecture aims to enhance classification accuracy by integrating multiple neural network layers, enabling more robust feature extraction and improved differentiation between retinal pathologies. Methods: The VGG-16, VGG-19, and ResNet50 models were fine-tuned using the Kermany dataset to classify the OCT images and afterwards were trained using a private OCT dataset. Four stacked models were then developed using these models: a model using the VGG-16 and VGG-19 networks, a model using the VGG-16 and ResNet50 networks, a model using the VGG-19 and ResNet50 models, and finally a model using all three networks. The performance metrics of the model includes accuracy, precision, recall, -score, and area under of the receiver operating characteristic curve (AUROC). Results: The stacked neural network using all three models achieved the best results, having an accuracy of 90.7%, precision of 99.2%, a recall of 90.7%, and an -score of 92.3%. Conclusions: This study presents a novel method for distinguishing retinal disease by using stacked neural networks. This research aims to provide a reliable tool for ophthalmologists to improve diagnosis accuracy and speed.
Full article
(This article belongs to the Special Issue AI-Based Biomedical Signal Processing)
►▼
Show Figures

Figure 1
Open AccessArticle
Explainable Machine Learning Model for Source Type Identification of Mine Inrush Water
by
Yong Yang, Jing Li, Huawei Tao, Yong Cheng and Li Zhao
Information 2025, 16(8), 648; https://doi.org/10.3390/info16080648 - 30 Jul 2025
Abstract
►▼
Show Figures
The prevention and control of mine inrush water has always been a major challenge for safety. By identifying the type of water source and analyzing the real-time changes in water composition, sudden water inrush accidents can be monitored in a timely manner to
[...] Read more.
The prevention and control of mine inrush water has always been a major challenge for safety. By identifying the type of water source and analyzing the real-time changes in water composition, sudden water inrush accidents can be monitored in a timely manner to avoid major accidents. This paper proposes a novel explainable machine learning model for source type identification of mine inrush water. The paper expands the original monitoring system into the XinJi No.2 Mine in Huainan Mining Area. Based on the online water composition data, using the Spearman coefficient formula, it analyzes the water chemical characteristics of different aquifers to extract key discriminant factors. Then, the Conv1D-GRU model was built to deeply connect factors for precise water source identification. The experimental results show an accuracy rate of 85.37%. In addition, focused on the interpretability, the experiment quantified the impact of different features on the model using SHAP (Shapley Additive Explanations). It provides new reference for the source type identification of mine inrush water in mine disaster prevention and control.
Full article

Figure 1
Open AccessArticle
Uniform Manifold Approximation and Projection Filtering and Explainable Artificial Intelligence to Detect Adversarial Machine Learning
by
Achmed Samuel Koroma, Sara Narteni, Enrico Cambiaso and Maurizio Mongelli
Information 2025, 16(8), 647; https://doi.org/10.3390/info16080647 - 29 Jul 2025
Abstract
Adversarial machine learning exploits the vulnerabilities of artificial intelligence (AI) models by inducing malicious distortion in input data. Starting with the effect of adversarial methods on well-known MNIST and CIFAR-10 open datasets, this paper investigates the ability of Uniform Manifold Approximation and Projection
[...] Read more.
Adversarial machine learning exploits the vulnerabilities of artificial intelligence (AI) models by inducing malicious distortion in input data. Starting with the effect of adversarial methods on well-known MNIST and CIFAR-10 open datasets, this paper investigates the ability of Uniform Manifold Approximation and Projection (UMAP) in providing useful representations of both legitimate and malicious images and analyzes the attacks’ behavior under various conditions. By enabling the extraction of decision rules and the ranking of important features from classifiers such as decision trees, eXplainable AI (XAI) achieves zero false positives and negatives in detection through very simple if-then rules over UMAP variables. Several examples are reported in order to highlight attacks behaviour. The data availability statement details all code and data which is publicly available to offer support to reproducibility.
Full article
(This article belongs to the Special Issue Application of Machine Learning in Data Science and Computational Intelligence)
►▼
Show Figures

Figure 1
Open AccessArticle
Trajectory Prediction and Decision Optimization for UAV-Assisted VEC Networks: An Integrated LSTM-TD3 Framework
by
Jiahao Xie and Hao Hao
Information 2025, 16(8), 646; https://doi.org/10.3390/info16080646 - 29 Jul 2025
Abstract
►▼
Show Figures
With the rapid development of intelligent transportation systems (ITSs) and Internet of Things (IoT), vehicle-mounted edge computing (VEC) networks are facing the challenge of handling increasingly growing computation-intensive and latency-sensitive tasks. In the UAV-assisted VEC network, by introducing mobile edge servers, the coverage
[...] Read more.
With the rapid development of intelligent transportation systems (ITSs) and Internet of Things (IoT), vehicle-mounted edge computing (VEC) networks are facing the challenge of handling increasingly growing computation-intensive and latency-sensitive tasks. In the UAV-assisted VEC network, by introducing mobile edge servers, the coverage of ground infrastructure is effectively supplemented. However, there is still the problem of decision-making lag in a highly dynamic environment. This paper proposes a deep reinforcement learning framework based on the long short-term memory (LSTM) network for trajectory prediction to optimize resource allocation in UAV-assisted VEC networks. Uniquely integrating vehicle trajectory prediction with the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm, this framework enables proactive computation offloading and UAV trajectory planning. Specifically, we design an LSTM network with an attention mechanism to predict the future trajectory of vehicles and integrate the prediction results into the optimization decision-making process. We propose state smoothing and data augmentation techniques to improve training stability and design a multi-objective optimization model that incorporates the Age of Information (AoI), energy consumption, and resource leasing costs. The simulation results show that compared with existing methods, the method proposed in this paper significantly reduces the total system cost, improves the information freshness, and exhibits better environmental adaptability and convergence performance under various network conditions.
Full article

Figure 1
Open AccessArticle
Research on China’s Innovative Cybersecurity Education System Oriented Toward Engineering Education Accreditation
by
Yimei Yang, Jinping Liu and Yujun Yang
Information 2025, 16(8), 645; https://doi.org/10.3390/info16080645 - 29 Jul 2025
Abstract
This study, based on engineering education accreditation standards, addresses the supply–demand imbalance in China’s cybersecurity talent cultivation by constructing a sustainable “education-industry-society” collaborative model. Through case studies at Huaihua University and other institutions, employing methods such as literature analysis, field research, and empirical
[...] Read more.
This study, based on engineering education accreditation standards, addresses the supply–demand imbalance in China’s cybersecurity talent cultivation by constructing a sustainable “education-industry-society” collaborative model. Through case studies at Huaihua University and other institutions, employing methods such as literature analysis, field research, and empirical investigation, we systematically explore reform pathways for an innovative cybersecurity talent development system. The research proposes a “three-platform, four-module” practical teaching framework, where the coordinated operation of the basic skills training platform, comprehensive ability development platform, and innovation enhancement platform significantly improves students’ engineering competencies (practical courses account for 41.6% of the curriculum). Findings demonstrate that eight industry-academia practice bases established through deep collaboration effectively align teaching content with industry needs, substantially enhancing students’ innovative and practical abilities (172 national awards, 649 provincial awards). Additionally, the multi-dimensional evaluation mechanism developed in this study enables a comprehensive assessment of students’ professional skills, practical capabilities, and innovative thinking. These reforms have increased the employment rate of cybersecurity graduates to over 90%, providing a replicable solution to China’s talent shortage. The research outcomes offer valuable insights for discipline development under engineering education accreditation and contribute to implementing sustainable development concepts in higher education.
Full article
(This article belongs to the Topic Explainable AI in Education)
►▼
Show Figures

Figure 1
Open AccessArticle
Automated Classification of Public Transport Complaints via Text Mining Using LLMs and Embeddings
by
Daniyar Rakhimzhanov, Saule Belginova and Didar Yedilkhan
Information 2025, 16(8), 644; https://doi.org/10.3390/info16080644 - 29 Jul 2025
Abstract
The proliferation of digital public service platforms and the expansion of e-government initiatives have significantly increased the volume and diversity of citizen-generated feedback. This trend emphasizes the need for classification systems that are not only tailored to specific administrative domains but also robust
[...] Read more.
The proliferation of digital public service platforms and the expansion of e-government initiatives have significantly increased the volume and diversity of citizen-generated feedback. This trend emphasizes the need for classification systems that are not only tailored to specific administrative domains but also robust to the linguistic, contextual, and structural variability inherent in user-submitted content. This study investigates the comparative effectiveness of large language models (LLMs) alongside instruction-tuned embedding models in the task of categorizing public transportation complaints. LLMs were tested using a few-shot inference, where classification is guided by a small set of in-context examples. Embedding models were assessed under three paradigms: label-only zero-shot classification, instruction-based classification, and supervised fine-tuning. Results indicate that fine-tuned embeddings can achieve or exceed the accuracy of LLMs, reaching up to 90 percent, while offering significant reductions in inference latency and computational overhead. E5 embeddings showed consistent generalization across unseen categories and input shifts, whereas BGE-M3 demonstrated measurable gains when adapted to task-specific distributions. Instruction-based classification produced lower accuracy for both models, highlighting the limitations of prompt conditioning in isolation. These findings position multilingual embedding models as a viable alternative to LLMs for classification at scale in data-intensive public sector environments.
Full article
(This article belongs to the Special Issue Text Mining: Challenges, Algorithms, Tools and Applications)
►▼
Show Figures

Graphical abstract
Open AccessArticle
Adaptive Multi-Hop P2P Video Communication: A Super Node-Based Architecture for Conversation-Aware Streaming
by
Jiajing Chen and Satoshi Fujita
Information 2025, 16(8), 643; https://doi.org/10.3390/info16080643 - 28 Jul 2025
Abstract
This paper proposes a multi-hop peer-to-peer (P2P) video streaming architecture designed to support dynamic, conversation-aware communication. The primary contribution is a decentralized system built on WebRTC that eliminates reliance on a central media server by employing super node aggregation. In this architecture, video
[...] Read more.
This paper proposes a multi-hop peer-to-peer (P2P) video streaming architecture designed to support dynamic, conversation-aware communication. The primary contribution is a decentralized system built on WebRTC that eliminates reliance on a central media server by employing super node aggregation. In this architecture, video streams from multiple peer nodes are dynamically routed through a group of super nodes, enabling real-time reconfiguration of the network topology in response to conversational changes. To support this dynamic behavior, the system leverages WebRTC data channels for control signaling and overlay restructuring, allowing efficient dissemination of topology updates and coordination messages among peers. A key focus of this study is the rapid and efficient reallocation of network resources immediately following conversational events, ensuring that the streaming overlay remains aligned with ongoing interaction patterns. While the automatic detection of such events is beyond the scope of this work, we assume that external triggers are available to initiate topology updates. To validate the effectiveness of the proposed system, we construct a simulation environment using Docker containers and evaluate its streaming performance under dynamic network conditions. The results demonstrate the system’s applicability to adaptive, naturalistic communication scenarios. Finally, we discuss future directions, including the seamless integration of external trigger sources and enhanced support for flexible, context-sensitive interaction frameworks.
Full article
(This article belongs to the Special Issue Second Edition of Advances in Wireless Communications Systems)
►▼
Show Figures

Figure 1
Open AccessArticle
Strategic Information Patterns in Advertising: A Computational Analysis of Industry-Specific Message Strategies Using the FCB Grid Framework
by
Seung Chul Yoo
Information 2025, 16(8), 642; https://doi.org/10.3390/info16080642 - 28 Jul 2025
Abstract
This study presents a computational analysis of industry-specific advertising message strategies through the theoretical lens of the FCB (Foote, Cone & Belding) grid framework. Leveraging the AiSAC (AI Analysis System for Ad Creation) system developed by the Korea Broadcast Advertising Corporation (KOBACO), we
[...] Read more.
This study presents a computational analysis of industry-specific advertising message strategies through the theoretical lens of the FCB (Foote, Cone & Belding) grid framework. Leveraging the AiSAC (AI Analysis System for Ad Creation) system developed by the Korea Broadcast Advertising Corporation (KOBACO), we analyzed 27,000 Korean advertisements across five major industries using advanced machine learning techniques. Through Latent Dirichlet Allocation topic modeling with a coherence score of 0.78, we identified five distinct message strategies: emotional appeal, product features, visual techniques, setting and objects, and entertainment and promotion. Our computational analysis revealed that each industry exhibits a unique “message strategy fingerprint” that significantly discriminates between categories, with discriminant analysis achieving 62.7% classification accuracy. Time-series analysis using recurrent neural networks demonstrated a significant evolution in strategy preferences, with emotional appeal increasing by 44.3% over the study period (2015–2024). By mapping these empirical findings onto the FCB grid, the present study validated that industry positioning within the grid’s quadrants aligns with theoretical expectations: high-involvement/think (IT and Telecom), high-involvement/feel (Public Institutions), low-involvement/think (Food and Household Goods), and low-involvement/feel (Services). This study contributes to media science by demonstrating how computational methods can empirically validate the established theoretical frameworks in advertising, providing a data-driven approach to understanding message strategy patterns across industries.
Full article
(This article belongs to the Special Issue AI Tools for Business and Economics)
►▼
Show Figures

Figure 1

Journal Menu
► ▼ Journal Menu-
- Information Home
- Aims & Scope
- Editorial Board
- Reviewer Board
- Topical Advisory Panel
- Instructions for Authors
- Special Issues
- Topics
- Sections & Collections
- Article Processing Charge
- Indexing & Archiving
- Editor’s Choice Articles
- Most Cited & Viewed
- Journal Statistics
- Journal History
- Journal Awards
- Society Collaborations
- Conferences
- Editorial Office
Journal Browser
► ▼ Journal BrowserHighly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Algorithms, BDCC, BioMedInformatics, Information, Mathematics
Machine Learning Empowered Drug Screen
Topic Editors: Teng Zhou, Jiaqi Wang, Youyi SongDeadline: 31 August 2025
Topic in
Information, Mathematics, MTI, Symmetry
Youth Engagement in Social Media in the Post COVID-19 Era
Topic Editors: Naseer Abbas Khan, Shahid Kalim Khan, Abdul QayyumDeadline: 30 September 2025
Topic in
Electronics, Information, Mathematics, Sensors
Extended Reality: Models and Applications
Topic Editors: Moldoveanu Alin, Anca Morar, Robert Gabriel LupuDeadline: 31 October 2025
Topic in
Education Sciences, Future Internet, Information, Sustainability
Advances in Online and Distance Learning
Topic Editors: Neil Gordon, Han ReichgeltDeadline: 31 December 2025

Conferences
Special Issues
Special Issue in
Information
Emerging Research in Optimization Algorithms in the Era of Big Data
Guest Editors: Marko Gulić, Heming Jia, Antonio Jiménez-MartínDeadline: 20 August 2025
Special Issue in
Information
Signal Processing and Machine Learning, 2nd Edition
Guest Editors: Zoran H. Perić, Tomas Skovranek, Vlado Delić, Vladimir Despotovic, Stefan PanicDeadline: 31 August 2025
Special Issue in
Information
Blockchain, Technology and Its Application
Guest Editor: Tieling ZhangDeadline: 31 August 2025
Special Issue in
Information
Next-Generation Programming Education: Integrating Generative AI and Collaborative Tools for Cutting-Edge Learning Experiences
Guest Editors: Ricardo Queirós, Mário PintoDeadline: 31 August 2025
Topical Collections
Topical Collection in
Information
Knowledge Graphs for Search and Recommendation
Collection Editors: Pierpaolo Basile, Annalina Caputo
Topical Collection in
Information
Augmented Reality Technologies, Systems and Applications
Collection Editors: Ramon Fabregat, Jorge Bacca-Acosta, N.D. Duque-Mendez
Topical Collection in
Information
Natural Language Processing and Applications: Challenges and Perspectives
Collection Editor: Diego Reforgiato Recupero