Journal Description
Information
Information
is a scientific, peer-reviewed, open access journal of information science and technology, data, knowledge, and communication, and is published monthly online by MDPI. The International Society for Information Studies (IS4SI) is affiliated with Information and its members receive discounts on the article processing charges.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within Scopus, ESCI (Web of Science), Ei Compendex, dblp, and other databases.
- Journal Rank: CiteScore - Q2 (Information Systems)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 18 days after submission; acceptance to publication is undertaken in 2.9 days (median values for papers published in this journal in the second half of 2023).
- Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.
Impact Factor:
3.1 (2022);
5-Year Impact Factor:
2.9 (2022)
Latest Articles
Technoeconomic Analysis for Deployment of Gait-Oriented Wearable Medical Internet-of-Things Platform in Catalonia
Information 2024, 15(5), 288; https://doi.org/10.3390/info15050288 (registering DOI) - 18 May 2024
Abstract
The Internet of Medical Things (IoMT) extends the concept of eHealth and mHealth for patients with continuous monitoring requirements. This research concentrates on the use of wearable devices based on the use of inertial measurement units (IMUs) that account for a gait analysis
[...] Read more.
The Internet of Medical Things (IoMT) extends the concept of eHealth and mHealth for patients with continuous monitoring requirements. This research concentrates on the use of wearable devices based on the use of inertial measurement units (IMUs) that account for a gait analysis for its use in three health cases, equilibrium evaluation, fall prevention and surgery recovery, that impact a large elderly population. We also analyze two different scenarios for data capture: supervised by clinicians and unsupervised during activities of daily life (ADLs). The continuous monitoring of patients produces large amounts of data that are analyzed in specific IoMT platforms that must be connected to the health system platforms containing the health records of the patients. The aim of this study is to evaluate the factors that impact the cost of the deployment of such an IoMT solution. We use population data from Catalonia together with an IoMT deployment model for costs from the current deployment of connected devices for monitoring diabetic patients. Our study reveals the critical dependencies of the proposed IoMT platforms: from the devices and cloud cost, the size of the population using these services and the savings from the current model under key parameters such as fall reduction or rehabilitation duration. Future research should investigate the benefit of continuous monitoring in improving the quality of life of patients.
Full article
(This article belongs to the Special Issue Technoeconomics of the Internet of Things)
►
Show Figures
Open AccessArticle
Principle of Information Increase: An Operational Perspective on Information Gain in the Foundations of Quantum Theory
by
Yang Yu and Philip Goyal
Information 2024, 15(5), 287; https://doi.org/10.3390/info15050287 - 17 May 2024
Abstract
►▼
Show Figures
A measurement performed on a quantum system is an act of gaining information about its state. However, in the foundations of quantum theory, the concept of information is multiply defined, particularly in the area of quantum reconstruction, and its conceptual foundations remain surprisingly
[...] Read more.
A measurement performed on a quantum system is an act of gaining information about its state. However, in the foundations of quantum theory, the concept of information is multiply defined, particularly in the area of quantum reconstruction, and its conceptual foundations remain surprisingly under-explored. In this paper, we investigate the gain of information in quantum measurements from an operational viewpoint in the special case of a two-outcome probabilistic source. We show that the continuous extension of the Shannon entropy naturally admits two distinct measures of information gain, differential information gain and relative information gain, and that these have radically different characteristics. In particular, while differential information gain can increase or decrease as additional data are acquired, relative information gain consistently grows and, moreover, exhibits asymptotic indifference to the data or choice of Bayesian prior. In order to make a principled choice between these measures, we articulate a Principle of Information Increase, which incorporates a proposal due to Summhammer that more data from measurements leads to more knowledge about the system, and also takes into consideration black swan events. This principle favours differential information gain as the more relevant metric and guides the selection of priors for these information measures. Finally, we show that, of the symmetric beta distribution priors, the Jeffreys binomial prior is the prior that ensures maximal robustness of information gain for the particular data sequence obtained in a run of experiments.
Full article
Figure 1
Open AccessArticle
Telehealth-Based Information Retrieval and Extraction for Analysis of Clinical Characteristics and Symptom Patterns in Mild COVID-19 Patients
by
Edison Jahaj, Parisis Gallos, Melina Tziomaka, Athanasios Kallipolitis, Apostolos Pasias, Christos Panagopoulos, Andreas Menychtas, Ioanna Dimopoulou, Anastasia Kotanidou, Ilias Maglogiannis and Alice Georgia Vassiliou
Information 2024, 15(5), 286; https://doi.org/10.3390/info15050286 - 17 May 2024
Abstract
Clinical characteristics of COVID-19 patients have been mostly described in hospitalised patients, yet most are managed in an outpatient setting. The COVID-19 pandemic transformed healthcare delivery models and accelerated the implementation and adoption of telemedicine solutions. We employed a modular remote monitoring system
[...] Read more.
Clinical characteristics of COVID-19 patients have been mostly described in hospitalised patients, yet most are managed in an outpatient setting. The COVID-19 pandemic transformed healthcare delivery models and accelerated the implementation and adoption of telemedicine solutions. We employed a modular remote monitoring system with multi-modal data collection, aggregation, and analytics features to monitor mild COVID-19 patients and report their characteristics and symptoms. At enrolment, the patients were equipped with wearables, which were associated with their accounts, provided the respective in-system consents, and, in parallel, reported the demographics and patient characteristics. The patients monitored their vitals and symptoms daily during a 14-day monitoring period. Vital signs were entered either manually or automatically through wearables. We enrolled 162 patients from February to May 2022. The median age was 51 (42–60) years; 44% were male, 22% had at least one comorbidity, and 73.5% were fully vaccinated. The vitals of the patients were within normal range throughout the monitoring period. Thirteen patients were asymptomatic, while the rest had at least one symptom for a median of 11 (7–16) days. Fatigue was the most common symptom, followed by fever and cough. Loss of taste and smell was the longest-lasting symptom. Age positively correlated with the duration of fatigue, anorexia, and low-grade fever. Comorbidities, the number of administered doses, the days since the last dose, and the days since the positive test did not seem to affect the number of sick days or symptomatology. The i-COVID platform allowed us to provide remote monitoring and reporting of COVID-19 outpatients. We were able to report their clinical characteristics while simultaneously helping reduce the spread of the virus through hospitals by minimising hospital visits. The monitoring platform also offered advanced knowledge extraction and analytic capabilities to detect health condition deterioration and automatically trigger personalised support workflows.
Full article
(This article belongs to the Special Issue Health Data Information Retrieval)
►▼
Show Figures
Figure 1
Open AccessArticle
MCF-YOLOv5: A Small Target Detection Algorithm Based on Multi-Scale Feature Fusion Improved YOLOv5
by
Song Gao, Mingwang Gao and Zhihui Wei
Information 2024, 15(5), 285; https://doi.org/10.3390/info15050285 - 17 May 2024
Abstract
In recent years, many deep learning-based object detection methods have performed well in various applications, especially in large-scale object detection. However, when detecting small targets, previous object detection algorithms cannot achieve good results due to the characteristics of the small targets themselves. To
[...] Read more.
In recent years, many deep learning-based object detection methods have performed well in various applications, especially in large-scale object detection. However, when detecting small targets, previous object detection algorithms cannot achieve good results due to the characteristics of the small targets themselves. To address the aforementioned issues, we propose the small object algorithm model MCF-YOLOv5, which has undergone three improvements based on YOLOv5. Firstly, a data augmentation strategy combining Mixup and Mosaic is used to increase the number of small targets in the image and reduce the interference of noise and changes in detection. Secondly, in order to accurately locate the position of small targets and reduce the impact of unimportant information on small targets in the image, the attention mechanism coordinate attention is introduced in YOLOv5’s neck network. Finally, we improve the Feature Pyramid Network (FPN) structure and add a small object detection layer to enhance the feature extraction ability of small objects and improve the detection accuracy of small objects. The experimental results show that, with a small increase in computational complexity, the proposed MCF-YOLOv5 achieves better performance than the baseline on both the VisDrone2021 dataset and the Tsinghua Tencent100K dataset. Compared with YOLOv5, MCF-YOLOv5 has improved detection APsmall by 3.3% and 3.6%, respectively.
Full article
(This article belongs to the Special Issue Intelligent Image Processing by Deep Learning)
►▼
Show Figures
Figure 1
Open AccessArticle
Resonating with the World: Thinking Critically about Brain Criticality in Consciousness and Cognition
by
Gerry Leisman and Paul Koch
Information 2024, 15(5), 284; https://doi.org/10.3390/info15050284 - 17 May 2024
Abstract
Aim: Biofields combine many physiological levels, both spatially and temporally. These biofields reflect naturally resonant forms of synaptic energy reflected in growing and spreading waves of brain activity. This study aims to theoretically understand better how resonant continuum waves may be reflective of
[...] Read more.
Aim: Biofields combine many physiological levels, both spatially and temporally. These biofields reflect naturally resonant forms of synaptic energy reflected in growing and spreading waves of brain activity. This study aims to theoretically understand better how resonant continuum waves may be reflective of consciousness, cognition, memory, and thought. Background: The metabolic processes that maintain animal cellular and physiological functions are enhanced by physiological coherence. Internal biological-system coordination and sensitivity to particular stimuli and signal frequencies are two aspects of coherent physiology. There exists significant support for the notion that exogenous biologically and non-biologically generated energy entrains human physiological systems. All living things have resonant frequencies that are either comparable or coherent; therefore, eventually, all species will have a shared resonance. An organism’s biofield activity and resonance are what support its life and allow it to react to stimuli. Methods: As the naturally resonant forms of synaptic energy grow and spread waves of brain activity, the temporal and spatial frequency of the waves are effectively regulated by a time delay (T) in inter-layer signals in a layered structure that mimics the structure of the mammalian cortex. From ubiquitous noise, two different types of waves can arise as a function of T. One is coherent, and as T rises, so does its resonant spatial frequency. Results: Continued growth eventually causes both the wavelength and the temporal frequency to abruptly increase. Two waves expand simultaneously and randomly interfere in an area of T values as a result. Conclusion: We suggest that because of this extraordinary dualism, which has its roots in the phase relationships of amplified waves, coherent waves are essential for memory retrieval, whereas random waves represent original cognition.
Full article
(This article belongs to the Special Issue The Resonant Brain: A Themed Issue Dedicated to Professor Stephen Grossberg)
►▼
Show Figures
Figure 1
Open AccessArticle
Optimizing Energy Efficiency in Opportunistic Networks: A Heuristic Approach to Adaptive Cluster-Based Routing Protocol
by
Meisam Sharifi Sani, Saeid Iranmanesh, Hamidreza Salarian, Faisel Tubbal and Raad Raad
Information 2024, 15(5), 283; https://doi.org/10.3390/info15050283 - 16 May 2024
Abstract
Opportunistic Networks (OppNets) are characterized by intermittently connected nodes with fluctuating performance. Their dynamic topology, caused by node movement, activation, and deactivation, often relies on controlled flooding for routing, leading to significant resource consumption and network congestion. To address this challenge, we propose
[...] Read more.
Opportunistic Networks (OppNets) are characterized by intermittently connected nodes with fluctuating performance. Their dynamic topology, caused by node movement, activation, and deactivation, often relies on controlled flooding for routing, leading to significant resource consumption and network congestion. To address this challenge, we propose the Adaptive Clustering-based Routing Protocol (ACRP). This ACRP protocol uses the common member-based adaptive dynamic clustering approach to produce optimal clusters, and the OppNet is converted into a TCP/IP network. This protocol adaptively creates dynamic clusters in order to facilitate the routing by converting the network from a disjointed to a connected network. This strategy creates a persistent connection between nodes, resulting in more effective routing and enhanced network performance. It should be noted that ACRP is scalable and applicable to a variety of applications and scenarios, including smart cities, disaster management, military networks, and distant places with inadequate infrastructure. Simulation findings demonstrate that the ACRP protocol outperforms alternative clustering approaches such as kRop, QoS-OLSR, LBC, and CBVRP. The analysis of the ACRP approach reveals that it can boost packet delivery by 28% and improve average end-to-end, throughput, hop count, and reachability metrics by 42%, 45%, 44%, and 80%, respectively.
Full article
(This article belongs to the Special Issue Advances in Communication Systems and Networks)
►▼
Show Figures
Figure 1
Open AccessArticle
Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
by
Junaid Khan, Congxu Zhu, Wajid Ali, Muhammad Asim and Sadique Ahmad
Information 2024, 15(5), 282; https://doi.org/10.3390/info15050282 - 15 May 2024
Abstract
Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication. Traditional schemes are based on the main mathematical operations, including pairing, pairing-based scalar multiplication, bilinear pairing, exponential operations, elliptic curve scalar multiplication,
[...] Read more.
Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication. Traditional schemes are based on the main mathematical operations, including pairing, pairing-based scalar multiplication, bilinear pairing, exponential operations, elliptic curve scalar multiplication, and point multiplication operations. These traditional operands are cost-intensive and require high computing power and bandwidth overload, thus affecting efficiency. Due to the cost-intensive nature and high resource requirements, traditional approaches are not feasible and are unsuitable for resource-limited IoT devices. Furthermore, the lack of essential security attributes in traditional schemes, such as unforgeability, public verifiability, non-repudiation, forward secrecy, and resistance to denial-of-service attacks, puts data security at high risk. To overcome these challenges, we have introduced a novel signcryption algorithm based on hyperelliptic curve divisor multiplication, which is much faster than other traditional mathematical operations. Hence, the proposed methodology is based on a hyperelliptic curve, due to which it has enhanced security with smaller key sizes that reduce computational complexity by 38.16% and communication complexity by 62.5%, providing a well-balanced solution by utilizing few resources while meeting the security and efficiency requirements of resource-constrained devices. The proposed strategy also involves formal security validation, which provides confidence for the proposed methodology in practical implementations.
Full article
(This article belongs to the Special Issue Intelligent Information Processing for Sensors and IoT Communications)
►▼
Show Figures
Figure 1
Open AccessEditorial
Preface to the Special Issue on Computational Linguistics and Natural Language Processing
by
Peter Z. Revesz
Information 2024, 15(5), 281; https://doi.org/10.3390/info15050281 - 15 May 2024
Abstract
Computational linguistics and natural language processing are at the heart of the AI revolution that is currently transforming our lives [...]
Full article
(This article belongs to the Special Issue Computational Linguistics and Natural Language Processing)
Open AccessArticle
Fuzzy Integrated Delphi-ISM-MICMAC Hybrid Multi-Criteria Approach to Optimize the Artificial Intelligence (AI) Factors Influencing Cost Management in Civil Engineering
by
Hongxia Hu, Shouguo Jiang, Shankha Shubhra Goswami and Yafei Zhao
Information 2024, 15(5), 280; https://doi.org/10.3390/info15050280 - 14 May 2024
Abstract
This research paper presents a comprehensive study on optimizing the critical artificial intelligence (AI) factors influencing cost management in civil engineering projects using a multi-criteria decision-making (MCDM) approach. The problem addressed revolves around the need to effectively manage costs in civil engineering endeavors
[...] Read more.
This research paper presents a comprehensive study on optimizing the critical artificial intelligence (AI) factors influencing cost management in civil engineering projects using a multi-criteria decision-making (MCDM) approach. The problem addressed revolves around the need to effectively manage costs in civil engineering endeavors amidst the growing complexity of projects and the increasing integration of AI technologies. The methodology employed involves the utilization of three MCDM tools, specifically Delphi, interpretive structural modeling (ISM), and Cross-Impact Matrix Multiplication Applied to Classification (MICMAC). A total of 17 AI factors, categorized into eight broad groups, were identified and analyzed. Through the application of different MCDM techniques, the relative importance and interrelationships among these factors were determined. The key findings reveal the critical role of certain AI factors, such as risk mitigation and cost components, in optimizing the cost management processes. Moreover, the hierarchical structure generated through ISM and the influential factors identified via MICMAC provide insights for prioritizing strategic interventions. The implications of this study extend to informing decision-makers in the civil engineering domain about effective strategies for leveraging AI in their cost management practices. By adopting a systematic MCDM approach, stakeholders can enhance project outcomes while optimizing resource allocation and mitigating financial risks.
Full article
(This article belongs to the Special Issue AI Applications in Construction and Infrastructure)
►▼
Show Figures
Figure 1
Open AccessArticle
Locally Centralized Execution for Less Redundant Computation in Multi-Agent Cooperation
by
Yidong Bai and Toshiharu Sugawara
Information 2024, 15(5), 279; https://doi.org/10.3390/info15050279 - 14 May 2024
Abstract
Decentralized execution is a widely used framework in multi-agent reinforcement learning. However, it has a well-known but neglected shortcoming, redundant computation, that is, the same/similar computation is performed redundantly in different agents owing to their overlapping observations. This study proposes a novel method,
[...] Read more.
Decentralized execution is a widely used framework in multi-agent reinforcement learning. However, it has a well-known but neglected shortcoming, redundant computation, that is, the same/similar computation is performed redundantly in different agents owing to their overlapping observations. This study proposes a novel method, the locally centralized team transformer (LCTT), to address this problem. This method first proposes a locally centralized execution framework that autonomously determines some agents as leaders that generate instructions and other agents as workers to act according to the received instructions without running their policy networks. For the LCTT, we subsequently propose the team-transformer (T-Trans) structure, which enables leaders to generate targeted instructions for each worker, and the leadership shift, which enables agents to determine those that should instruct or be instructed by others. The experimental results demonstrated that the proposed method significantly reduces redundant computations without decreasing rewards and achieves faster learning convergence.
Full article
(This article belongs to the Special Issue Intelligent Agent and Multi-Agent System)
►▼
Show Figures
Figure 1
Open AccessArticle
Impact of Handedness on Driver’s Situation Awareness When Driving under Unfamiliar Traffic Regulations
by
Nesreen M. Alharbi and Hasan J. Alyamani
Information 2024, 15(5), 278; https://doi.org/10.3390/info15050278 - 13 May 2024
Abstract
Situation awareness (SA) describes an individual’s understanding of their surroundings and actions in the near future based on the individual’s comprehension and understanding of the surrounding inputs. SA measurements can be applied to improve system performance or human effectiveness in many fields of
[...] Read more.
Situation awareness (SA) describes an individual’s understanding of their surroundings and actions in the near future based on the individual’s comprehension and understanding of the surrounding inputs. SA measurements can be applied to improve system performance or human effectiveness in many fields of study, including driving. However, in some scenarios drivers might need to drive in unfamiliar traffic regulations (UFTRs), where the traffic rules and vehicle configurations are a bit different from what the drivers are used to under familiar traffic regulations. Such driving conditions require drivers to adapt their attention, knowledge, and reactions to safely reach the destination. This ability is influenced by the degree of handedness. In such tasks, mixed-/left-handed people show better performance than strong right-handed people. This paper aims to explore the influence of the degree of handedness on SA when driving under UFTRs. We analyzed the SA of two groups of drivers: strong right-handed drivers and mixed-/left-handed drivers. Both groups were not familiar with driving in keep-left traffic regulations. Using a driving simulator, all participants drove in a simulated keep-left traffic system. The participants’ SA was measured using a subjective assessment, named the Participant Situation Awareness Questionnaire PSAQ, and performance-based assessment. The results of the study indicate that mixed-/left-handed participants had significantly higher SA than strong right-handed participants when measured by performance-based assessment. Also, in the subjective assessment, mixed-/left-handed participants had significantly higher PSAQ performance scores than strong right-handed participants. The findings of this study suggest that advanced driver assistance systems (ADAS), which show improvement in road safety, should adapt the system functionality based on the driver’s degree of handedness when driving under UFTRs.
Full article
(This article belongs to the Section Information Applications)
►▼
Show Figures
Figure 1
Open AccessArticle
Enhancing E-Learning Adaptability with Automated Learning Style Identification and Sentiment Analysis: A Hybrid Deep Learning Approach for Smart Education
by
Tahir Hussain, Lasheng Yu, Muhammad Asim, Afaq Ahmed and Mudasir Ahmad Wani
Information 2024, 15(5), 277; https://doi.org/10.3390/info15050277 - 13 May 2024
Abstract
In smart education, adaptive e-learning systems personalize the educational process by tailoring it to individual learning styles. Traditionally, identifying these styles relies on learners completing surveys and questionnaires, which can be tedious and may not reflect their true preferences. Additionally, this approach assumes
[...] Read more.
In smart education, adaptive e-learning systems personalize the educational process by tailoring it to individual learning styles. Traditionally, identifying these styles relies on learners completing surveys and questionnaires, which can be tedious and may not reflect their true preferences. Additionally, this approach assumes that learning styles are fixed, leading to a cold-start problem when automatically identifying styles based on e-learning platform behaviors. To address these challenges, we propose a novel approach that annotates unlabeled student feedback using multi-layer topic modeling and implements the Felder–Silverman Learning Style Model (FSLSM) to identify learning styles automatically. Our method involves learners answering four FSLSM-based questions upon logging into the e-learning platform and providing personal information like age, gender, and cognitive characteristics, which are weighted using fuzzy logic. We then analyze learners’ behaviors and activities using web usage mining techniques, classifying their learning sequences into specific styles with an advanced deep learning model. Additionally, we analyze textual feedback using latent Dirichlet allocation (LDA) for sentiment analysis to enhance the learning experience further. The experimental results demonstrate that our approach outperforms existing models in accurately detecting learning styles and improves the overall quality of personalized content delivery.
Full article
(This article belongs to the Special Issue Artificial Intelligence and Games Science in Education)
►▼
Show Figures
Figure 1
Open AccessReview
A Neoteric Approach toward Social Media in Public Health Informatics: A Narrative Review of Current Trends and Future Directions
by
Asma Tahir Awan, Ana Daniela Gonzalez and Manoj Sharma
Information 2024, 15(5), 276; https://doi.org/10.3390/info15050276 - 13 May 2024
Abstract
Social media has become more popular in the last few years. It has been used in public health development and healthcare settings to promote healthier lifestyles. Given its important role in today’s culture, it is necessary to understand its current trends and future
[...] Read more.
Social media has become more popular in the last few years. It has been used in public health development and healthcare settings to promote healthier lifestyles. Given its important role in today’s culture, it is necessary to understand its current trends and future directions in public health. This review aims to describe and summarize how public health professionals have been using social media to improve population outcomes. This review highlights the substantial influence of social media in advancing public health objectives. The key themes explored encompass the utilization of social media to advance health initiatives, monitor diseases, track behaviors, and interact with communities. Additionally, it discusses potential future directions on how social media can be used to improve population health. The findings show how social media has been used as a tool for research, implementing health campaigns, and health promotion. Social media integration with artificial intelligence (AI) and Generative Pre-Trained Transformers (GPTs) can impact and offer an innovative approach to tackle the problems and difficulties in health informatics. The research shows how social media will keep growing and evolving and, if used effectively, has the potential to help close public health gaps across different cultures and improve population health.
Full article
(This article belongs to the Special Issue Recent Advances in Social Media Mining and Analysis)
►▼
Show Figures
Figure 1
Open AccessArticle
Crowd Counting in Diverse Environments Using a Deep Routing Mechanism Informed by Crowd Density Levels
by
Abdullah N Alhawsawi, Sultan Daud Khan and Faizan Ur Rehman
Information 2024, 15(5), 275; https://doi.org/10.3390/info15050275 - 13 May 2024
Abstract
►▼
Show Figures
Automated crowd counting is a crucial aspect of surveillance, especially in the context of mass events attended by large populations. Traditional methods of manually counting the people attending an event are error-prone, necessitating the development of automated methods. Accurately estimating crowd counts across
[...] Read more.
Automated crowd counting is a crucial aspect of surveillance, especially in the context of mass events attended by large populations. Traditional methods of manually counting the people attending an event are error-prone, necessitating the development of automated methods. Accurately estimating crowd counts across diverse scenes is challenging due to high variations in the sizes of human heads. Regression-based crowd-counting methods often overestimate counts in low-density situations, while detection-based models struggle in high-density scenarios to precisely detect the head. In this work, we propose a unified framework that integrates regression and detection models to estimate the crowd count in diverse scenes. Our approach leverages a routing strategy based on crowd density variations within an image. By classifying image patches into density levels and employing a Patch-Routing Module (PRM) for routing, the framework directs patches to either the Detection or Regression Network to estimate the crowd count. The proposed framework demonstrates superior performance across various datasets, showcasing its effectiveness in handling diverse scenes. By effectively integrating regression and detection models, our approach offers a comprehensive solution for accurate crowd counting in scenarios ranging from low-density to high-density situations.
Full article
Figure 1
Open AccessArticle
Utilizing Machine Learning for Context-Aware Digital Biomarker of Stress in Older Adults
by
Md Saif Hassan Onim, Himanshu Thapliyal and Elizabeth K. Rhodus
Information 2024, 15(5), 274; https://doi.org/10.3390/info15050274 - 12 May 2024
Abstract
Identifying stress in older adults is a crucial field of research in health and well-being. This allows us to take timely preventive measures that can help save lives. That is why a nonobtrusive way of accurate and precise stress detection is necessary. Researchers
[...] Read more.
Identifying stress in older adults is a crucial field of research in health and well-being. This allows us to take timely preventive measures that can help save lives. That is why a nonobtrusive way of accurate and precise stress detection is necessary. Researchers have proposed many statistical measurements to associate stress with sensor readings from digital biomarkers. With the recent progress of Artificial Intelligence in the healthcare domain, the application of machine learning is showing promising results in stress detection. Still, the viability of machine learning for digital biomarkers of stress is under-explored. In this work, we first investigate the performance of a supervised machine learning algorithm (Random Forest) with manual feature engineering for stress detection with contextual information. The concentration of salivary cortisol was used as the golden standard here. Our framework categorizes stress into No Stress, Low Stress, and High Stress by analyzing digital biomarkers gathered from wearable sensors. We also provide a thorough knowledge of stress in older adults by combining physiological data obtained from wearable sensors with contextual clues from a stress protocol. Our context-aware machine learning model, using sensor fusion, achieved a macroaverage F-1 score of 0.937 and an accuracy of 92.48% in identifying three stress levels. We further extend our work to get rid of the burden of manual feature engineering. We explore Convolutional Neural Network (CNN)-based feature encoder and cortisol biomarkers to detect stress using contextual information. We provide an in-depth look at the CNN-based feature encoder, which effectively separates useful features from physiological inputs. Both of our proposed frameworks, i.e., Random Forest with engineered features and a Fully Connected Network with CNN-based features validate that the integration of digital biomarkers of stress can provide more insight into the stress response even without any self-reporting or caregiver labels. Our method with sensor fusion shows an accuracy and F-1 score of 83.7797% and 0.7552, respectively, without context and 96.7525% accuracy and 0.9745 F-1 score with context, which also constitutes a 4% increase in accuracy and a 0.4 increase in F-1 score from RF.
Full article
(This article belongs to the Special Issue From Data to Diagnosis: Recent Advances of Machine Learning in Biomedical and Health Informatics)
Open AccessArticle
Insights into Cybercrime Detection and Response: A Review of Time Factor
by
Hamed Taherdoost
Information 2024, 15(5), 273; https://doi.org/10.3390/info15050273 - 12 May 2024
Abstract
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and individuals. Nevertheless, the swift process of digitization has concurrently led to the emergence of cybercrime, which
[...] Read more.
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and individuals. Nevertheless, the swift process of digitization has concurrently led to the emergence of cybercrime, which takes advantage of weaknesses in interconnected systems. The growing dependence of society on digital communication, commerce, and information sharing has led to the exploitation of these platforms by malicious actors for hacking, identity theft, ransomware, and phishing attacks. With the growing dependence of organizations, businesses, and individuals on digital platforms for information exchange, commerce, and communication, malicious actors have identified the susceptibilities present in these systems and have begun to exploit them. This study examines 28 research papers focusing on intrusion detection systems (IDS), and phishing detection in particular, and how quickly responses and detections in cybersecurity may be made. We investigate various approaches and quantitative measurements to comprehend the link between reaction time and detection time and emphasize the necessity of minimizing both for improved cybersecurity. The research focuses on reducing detection and reaction times, especially for phishing attempts, to improve cybersecurity. In smart grids and automobile control networks, faster attack detection is important, and machine learning can help. It also stresses the necessity to improve protocols to address increasing cyber risks while maintaining scalability, interoperability, and resilience. Although machine-learning-based techniques have the potential for detection precision and reaction speed, obstacles still need to be addressed to attain real-time capabilities and adjust to constantly changing threats. To create effective defensive mechanisms against cyberattacks, future research topics include investigating innovative methodologies, integrating real-time threat intelligence, and encouraging collaboration.
Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
►▼
Show Figures
Figure 1
Open AccessArticle
Control of Qubit Dynamics Using Reinforcement Learning
by
Dimitris Koutromanos, Dionisis Stefanatos and Emmanuel Paspalakis
Information 2024, 15(5), 272; https://doi.org/10.3390/info15050272 - 11 May 2024
Abstract
The progress in machine learning during the last decade has had a considerable impact on many areas of science and technology, including quantum technology. This work explores the application of reinforcement learning (RL) methods to the quantum control problem of state transfer in
[...] Read more.
The progress in machine learning during the last decade has had a considerable impact on many areas of science and technology, including quantum technology. This work explores the application of reinforcement learning (RL) methods to the quantum control problem of state transfer in a single qubit. The goal is to create an RL agent that learns an optimal policy and thus discovers optimal pulses to control the qubit. The most crucial step is to mathematically formulate the problem of interest as a Markov decision process (MDP). This enables the use of RL algorithms to solve the quantum control problem. Deep learning and the use of deep neural networks provide the freedom to employ continuous action and state spaces, offering the expressivity and generalization of the process. This flexibility helps to formulate the quantum state transfer problem as an MDP in several different ways. All the developed methodologies are applied to the fundamental problem of population inversion in a qubit. In most cases, the derived optimal pulses achieve fidelity equal to or higher than 0.9999, as required by quantum computing applications. The present methods can be easily extended to quantum systems with more energy levels and may be used for the efficient control of collections of qubits and to counteract the effect of noise, which are important topics for quantum sensing applications.
Full article
(This article belongs to the Special Issue Quantum Information Processing and Machine Learning)
►▼
Show Figures
Figure 1
Open AccessArticle
Cyclic Air Braking Strategy for Heavy Haul Trains on Long Downhill Sections Based on Q-Learning Algorithm
by
Changfan Zhang, Shuo Zhou, Jing He and Lin Jia
Information 2024, 15(5), 271; https://doi.org/10.3390/info15050271 - 11 May 2024
Abstract
►▼
Show Figures
Cyclic air braking is a key factor affecting the safe operation of trains on long downhill sections. However, a train’s cycle braking strategy is constrained by multiple factors such as driving environment, speed, and air-refilling time. A Q-learning algorithm-based cyclic braking strategy for
[...] Read more.
Cyclic air braking is a key factor affecting the safe operation of trains on long downhill sections. However, a train’s cycle braking strategy is constrained by multiple factors such as driving environment, speed, and air-refilling time. A Q-learning algorithm-based cyclic braking strategy for a heavy haul train on long downhill sections is proposed to address this challenge. First, the operating environment of a heavy haul train on long downhill sections is designed, considering various constraint parameters, such as the characteristics of special operating routes, allowable operating speeds, and train tube air-refilling time. Second, the operating status and braking operation of a heavy haul train on long downhill sections are discretized in order to establish a Q-table based on state–action pairs. The training of algorithm performance is achieved by continuously updating Q-tables. Finally, taking the heavy haul train formation as the study object, actual line data from the Shuozhou–Huanghua Railway are used for experimental simulation, and different hyperparameters and entry speed conditions are considered. The results show that the safe and stable cyclic braking of a heavy haul train on long downhill sections is achieved. The effectiveness of the Q-learning control strategy is verified.
Full article
Figure 1
Open AccessArticle
A Comparative Analysis of the Bayesian Regularization and Levenberg–Marquardt Training Algorithms in Neural Networks for Small Datasets: A Metrics Prediction of Neolithic Laminar Artefacts
by
Maurizio Troiano, Eugenio Nobile, Fabio Mangini, Marco Mastrogiuseppe, Cecilia Conati Barbaro and Fabrizio Frezza
Information 2024, 15(5), 270; https://doi.org/10.3390/info15050270 - 10 May 2024
Abstract
This study aims to present a comparative analysis of the Bayesian regularization backpropagation and Levenberg–Marquardt training algorithms in neural networks for the metrics prediction of damaged archaeological artifacts, of which the state of conservation is often fragmented due to different reasons, such as
[...] Read more.
This study aims to present a comparative analysis of the Bayesian regularization backpropagation and Levenberg–Marquardt training algorithms in neural networks for the metrics prediction of damaged archaeological artifacts, of which the state of conservation is often fragmented due to different reasons, such as ritual, use wear, or post-depositional processes. The archaeological artifacts, specifically laminar blanks (so-called blades), come from different sites located in the Southern Levant that belong to the Pre-Pottery B Neolithic (PPNB) (10,100/9500–400 cal B.P.). This paper shows the entire procedure of the analysis, from its normalization of the dataset to its comparative analysis and overfitting problem resolution.
Full article
(This article belongs to the Special Issue Techniques and Data Analysis in Cultural Heritage)
►▼
Show Figures
Figure 1
Open AccessArticle
L-PCM: Localization and Point Cloud Registration-Based Method for Pose Calibration of Mobile Robots
by
Dandan Ning and Shucheng Huang
Information 2024, 15(5), 269; https://doi.org/10.3390/info15050269 - 10 May 2024
Abstract
The autonomous navigation of mobile robots contains three parts: map building, global localization, and path planning. Precise pose data directly affect the accuracy of global localization. However, the cumulative error problems of sensors and various estimation strategies cause the pose to have a
[...] Read more.
The autonomous navigation of mobile robots contains three parts: map building, global localization, and path planning. Precise pose data directly affect the accuracy of global localization. However, the cumulative error problems of sensors and various estimation strategies cause the pose to have a large gap in data accuracy. To address these problems, this paper proposes a pose calibration method based on localization and point cloud registration, which is called L-PCM. Firstly, the method obtains the odometer and IMU (inertial measurement unit) data through the sensors mounted on the mobile robot and uses the UKF (unscented Kalman filter) algorithm to filter and fuse the odometer data and IMU data to obtain the estimated pose of the mobile robot. Secondly, the AMCL (adaptive Monte Carlo localization) is improved by combining the UKF fusion model of the IMU and odometer to obtain the modified global initial pose of the mobile robot. Finally, PL-ICP (point to line-iterative closest point) point cloud registration is used to calibrate the modified global initial pose to obtain the global pose of the mobile robot. Through simulation experiments, it is verified that the UKF fusion algorithm can reduce the influence of cumulative errors and the improved AMCL algorithm can optimize the pose trajectory. The average value of the position error is about 0.0447 m, and the average value of the angle error is stabilized at about 0.0049 degrees. Meanwhile, it has been verified that the L-PCM is significantly better than the existing AMCL algorithm, with a position error of about 0.01726 m and an average angle error of about 0.00302 degrees, effectively improving the accuracy of the pose.
Full article
(This article belongs to the Section Artificial Intelligence)
►▼
Show Figures
Figure 1
Journal Menu
► ▼ Journal Menu-
- Information Home
- Aims & Scope
- Editorial Board
- Reviewer Board
- Topical Advisory Panel
- Instructions for Authors
- Special Issues
- Topics
- Sections & Collections
- Article Processing Charge
- Indexing & Archiving
- Editor’s Choice Articles
- Most Cited & Viewed
- Journal Statistics
- Journal History
- Journal Awards
- Society Collaborations
- Conferences
- Editorial Office
Journal Browser
► ▼ Journal BrowserHighly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Drones, Information, Sensors
Recent Advances and Technologies in Emergency Response, Security and Disaster Management Applications
Topic Editors: Evangelos Maltezos, Eleftherios Ouzounoglou, Panagiotis Michalis, Angelos Amditis, Stefanos Vrochidis, Norman Kerle, Christos NtanosDeadline: 20 May 2024
Topic in
Algorithms, Diagnostics, Entropy, Information, J. Imaging
Application of Machine Learning in Molecular Imaging
Topic Editors: Allegra Conti, Nicola Toschi, Marianna Inglese, Andrea Duggento, Matthew Grech-Sollars, Serena Monti, Giancarlo Sportelli, Pietro CarraDeadline: 31 May 2024
Topic in
Drones, Electronics, Future Internet, Information, Mathematics
Future Internet Architecture: Difficulties and Opportunities
Topic Editors: Peiying Zhang, Haotong Cao, Keping YuDeadline: 30 June 2024
Topic in
Algorithms, Computation, Information, Mathematics
Complex Networks and Social Networks
Topic Editors: Jie Meng, Xiaowei Huang, Minghui Qian, Zhixuan XuDeadline: 31 July 2024
Conferences
Special Issues
Special Issue in
Information
Health Data Information Retrieval
Guest Editors: Mario Ciampi, Mario SicuranzaDeadline: 31 May 2024
Special Issue in
Information
Text Mining: Challenges, Algorithms, Tools and Applications
Guest Editor: Fei LiuDeadline: 15 June 2024
Special Issue in
Information
Systems Engineering and Knowledge Management
Guest Editor: Vladimír BurešDeadline: 30 June 2024
Special Issue in
Information
New Generation of Intelligent Transit Systems: Theory and Applications
Guest Editor: Antonio ComiDeadline: 15 July 2024
Topical Collections
Topical Collection in
Information
Natural Language Processing and Applications: Challenges and Perspectives
Collection Editor: Diego Reforgiato Recupero
Topical Collection in
Information
Knowledge Graphs for Search and Recommendation
Collection Editors: Pierpaolo Basile, Annalina Caputo
Topical Collection in
Information
Augmented Reality Technologies, Systems and Applications
Collection Editors: Ramon Fabregat, Jorge Bacca-Acosta, N.D. Duque-Mendez