Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 9, April
Previous Issue
Volume 9, February
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Information, Volume 9, Issue 3 (March 2018) – 23 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
15 pages, 2143 KiB  
Article
A Dynamic Fuzzy Approach Based on the EDAS Method for Multi-Criteria Subcontractor Evaluation
by Mehdi Keshavarz-Ghorabaee, Maghsoud Amiri, Edmundas Kazimieras Zavadskas, Zenonas Turskis and Jurgita Antucheviciene
Information 2018, 9(3), 68; https://doi.org/10.3390/info9030068 - 19 Mar 2018
Cited by 62 | Viewed by 7948
Abstract
Selection of appropriate subcontractors for outsourcing is very important for the success of construction projects. This can improve the overall quality of projects and promote the qualification and reputation of the main contractors. The evaluation of subcontractors can be made by some experts [...] Read more.
Selection of appropriate subcontractors for outsourcing is very important for the success of construction projects. This can improve the overall quality of projects and promote the qualification and reputation of the main contractors. The evaluation of subcontractors can be made by some experts or decision-makers with respect to some criteria. If this process is done in different time periods, it can be defined as a dynamic multi-criteria group decision-making (MCGDM) problem. In this study, we propose a new fuzzy dynamic MCGDM approach based on the EDAS (Evaluation based on Distance from Average Solution) method for subcontractor evaluation. In the procedure of the proposed approach, the sets of alternatives, criteria and decision-makers can be changed at different time periods. Also, the proposed approach gives more weight to newer decision information for aggregating the overall performance of alternatives. A numerical example is used to illustrate the proposed approach and show the application of it in subcontractor evaluation. The results demonstrate that the proposed approach is efficient and useful in real-world decision-making problems. Full article
Show Figures

Figure 1

Figure 1
<p>A triangular fuzzy number.</p>
Full article ">Figure 2
<p>The flowchart of the proposed approach.</p>
Full article ">Figure 3
<p>The changes in the rank of alternatives at different time periods.</p>
Full article ">
2 pages, 138 KiB  
Editorial
Special Issue on Context Awareness
by Daniele Riboni
Information 2018, 9(3), 67; https://doi.org/10.3390/info9030067 - 18 Mar 2018
Cited by 1 | Viewed by 3429
Abstract
Context-awareness is a fundamental ingredient of pervasive computing.[...] Full article
(This article belongs to the Special Issue Context Awareness)
18 pages, 874 KiB  
Article
Non-Negative Tensor Factorization for Human Behavioral Pattern Mining in Online Games
by Anna Sapienza, Alessandro Bessi and Emilio Ferrara
Information 2018, 9(3), 66; https://doi.org/10.3390/info9030066 - 16 Mar 2018
Cited by 28 | Viewed by 7096
Abstract
Multiplayer online battle arena is a genre of online games that has become extremely popular. Due to their success, these games also drew the attention of our research community, because they provide a wealth of information about human online interactions and behaviors. A [...] Read more.
Multiplayer online battle arena is a genre of online games that has become extremely popular. Due to their success, these games also drew the attention of our research community, because they provide a wealth of information about human online interactions and behaviors. A crucial problem is the extraction of activity patterns that characterize this type of data, in an interpretable way. Here, we leverage the Non-negative Tensor Factorization to detect hidden correlated behaviors of playing in a well-known game: League of Legends. To this aim, we collect the entire gaming history of a group of about 1000 players, which accounts for roughly 100K matches. By applying our framework we are able to separate players into different groups. We show that each group exhibits similar features and playing strategies, as well as similar temporal trajectories, i.e., behavioral progressions over the course of their gaming history. We surprisingly discover that playing strategies are stable over time and we provide an explanation for this observation. Full article
(This article belongs to the Special Issue Data Mining for the Analysis of Performance and Success)
Show Figures

Figure 1

Figure 1
<p>Framework. Our methodology is divided into several steps. First, we use Decision Trees to find the features of the dataset that are meaningful in predicting users’ performance (the outcome is the feature “winner”). Once the features are selected, we create a tensor whose dimensions coincide to users, selected features, and time. We then decompose the tensor by applying NTF and detect the factor matrices A, B, and C, providing the users’ and features membership, and temporal activity respectively. Finally, we use this information to analyze the discovered groups of users characterized by similar features and temporal behavior.</p>
Full article ">Figure 2
<p>Feature membership in the components: we show the matrix <math display="inline"> <semantics> <mi mathvariant="bold">B</mi> </semantics> </math> in which we zero-out the entries which are not included in the <math display="inline"> <semantics> <mrow> <mn>95</mn> <mo>%</mo> </mrow> </semantics> </math> of the norm of the component. Here, the colorbar indicates the level of membership of each feature to the three different components. The features are respectively: assists (0), deaths (1), kills (2), and gold (3).</p>
Full article ">Figure 3
<p>K-means results: (a) 2-dimensional projection of the three clusters identified by the k-means. Each dot represents a player in its corresponding cluster, and the dot’s coordinates are given by the first two columns of the matrix <math display="inline"> <semantics> <mi mathvariant="bold">A</mi> </semantics> </math>. (b) Silhouette scores of the users belonging to the three clusters. The red line identifies the final Silhouette score of 0.35, and the width of the Silhouette profiles indicates the size of the corresponding clusters.</p>
Full article ">Figure 4
<p>Membership modulated in time, given by the product <math display="inline"> <semantics> <mrow> <msub> <mi mathvariant="bold">a</mi> <mi>r</mi> </msub> <msubsup> <mi mathvariant="bold">c</mi> <mi>r</mi> <mi>T</mi> </msubsup> </mrow> </semantics> </math>. The product is computed by separately taking into account the users belonging to the different clusters. For each cluster we report the mean of the users’ membership to each component over time, and the related standard error, marked with an error bar. Different shades of blue for cluster 0, red for cluster 1, and green for cluster 2 are assigned to distinguish the components.</p>
Full article ">Figure 5
<p>Mean values and related standard errors over time of: (<b>a</b>) number of assists; (<b>b</b>) number of deaths; (<b>c</b>) number of kills; and (<b>d</b>) amount of gold earned. We computed the mean and the standard error over the values related to users belonging to the same cluster. Clusters are marked by a unique symbol and color, which is maintained in all the figures, to highlight the different cluster characteristics.</p>
Full article ">Figure 6
<p>Temporal activity of each component. The values displayed coincide to those in the columns of <math display="inline"> <semantics> <mi mathvariant="bold">C</mi> </semantics> </math>. The different markers characterize the different components, according to the clusters colouring.</p>
Full article ">Figure 7
<p>Kernel Density Estimation (KDE) computed on the values related to the feature <span class="html-italic">winner</span> (binary feature equal to 1 if a player wins the match and equal to 0 if a player loses). The figure shows the probability density function for each cluster. We maintained the color code used throughout the text to discriminate the different clusters.</p>
Full article ">
42 pages, 10819 KiB  
Article
Storytelling and Visualization: An Extended Survey
by Chao Tong, Richard Roberts, Rita Borgo, Sean Walton, Robert S. Laramee, Kodzo Wegba, Aidong Lu, Yun Wang, Huamin Qu, Qiong Luo and Xiaojuan Ma
Information 2018, 9(3), 65; https://doi.org/10.3390/info9030065 - 14 Mar 2018
Cited by 99 | Viewed by 25046
Abstract
Throughout history, storytelling has been an effective way of conveying information and knowledge. In the field of visualization, storytelling is rapidly gaining momentum and evolving cutting-edge techniques that enhance understanding. Many communities have commented on the importance of storytelling in data visualization. Storytellers [...] Read more.
Throughout history, storytelling has been an effective way of conveying information and knowledge. In the field of visualization, storytelling is rapidly gaining momentum and evolving cutting-edge techniques that enhance understanding. Many communities have commented on the importance of storytelling in data visualization. Storytellers tend to be integrating complex visualizations into their narratives in growing numbers. In this paper, we present a survey of storytelling literature in visualization and present an overview of the common and important elements in storytelling visualization. We also describe the challenges in this field as well as a novel classification of the literature on storytelling in visualization. Our classification scheme highlights the open and unsolved problems in this field as well as the more mature storytelling sub-fields. The benefits offer a concise overview and a starting point into this rapidly evolving research trend and provide a deeper understanding of this topic. Full article
(This article belongs to the Section Information Theory and Methodology)
Show Figures

Figure 1

Figure 1
<p>The proposed method to author a story is to record the user’s natural interaction with the visualization software. This image shows the process of the story creation by Wohlfart. Green annotations represent user interaction and red annotations refer to internal system processes. As soon as the software starts recording, a new story is created and all interactions are logged [<a href="#B19-information-09-00065" class="html-bibr">19</a>]. Image courtesy of Wohlfart [<a href="#B19-information-09-00065" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>A table summarizing the visualization techniques used in each storytelling paper. The papers are sorted alphabetically by the first author’s surname.</p>
Full article ">Figure 3
<p>Ma et al. show the interactive software used at the Exploratorium in San Francisco. The purpose of this software is to educate users on the process of how tides, currents and rivers combine in the estuary of San Francisco bay. A touch-screen is used to place floats into the virtual water so that the user can see the effects of the current on the float. Users can watch the effects of predicted tide and river flow cycles on the floats trajectory. Other contextual information is provided as an animation alongside the visualization [<a href="#B67-information-09-00065" class="html-bibr">67</a>]. Image courtesy of Ma et al. [<a href="#B67-information-09-00065" class="html-bibr">67</a>].</p>
Full article ">Figure 4
<p>This figure shows the system architecture from Lu and Shen. It integrates the information of data analysis and a single 3D data visualization method for users to explore and visualize overall time-varying data contents [<a href="#B17-information-09-00065" class="html-bibr">17</a>]. (<b>a</b>) A time-varying dataset; (<b>b</b>) Selected data features; (<b>c</b>) The distribution of time steps; (<b>d</b>) 3D visualization method; (<b>e</b>) Overall time-varying data contents. Image courtesy of Lu and shen [<a href="#B17-information-09-00065" class="html-bibr">17</a>].</p>
Full article ">Figure 5
<p>Cruz et al. show the British hegemony and the newly independent South America in 1891. Each empire and independent territory is a circle whose area is proportional to that entity’s land area. Former colonies are unfilled circles with rims in the corresponding empire’s color [<a href="#B18-information-09-00065" class="html-bibr">18</a>]. Image courtesy of Cruz et al. [<a href="#B18-information-09-00065" class="html-bibr">18</a>].</p>
Full article ">Figure 6
<p>The top two images show an overview of the CT scan data presented by Wohlfart and Hauser. A partial clipping reveals both the skin layer and bone layer, but shows the full set of data. The middle shows a zoomed view that isolates eye swelling in the image (<b>left</b>), and a filtered view that exposes some blood effusions in the swollen region. The bottom offers a comparison of the non-injured eye with the injured one and shows the cause of the swelling which is attributed to a tripod fracture just below the eye. This design offers the user a macro overview as to lay the foundations of a story background then narrows the scope to view the focal point of the image [<a href="#B20-information-09-00065" class="html-bibr">20</a>]. Image courtesy of Wohlfart [<a href="#B20-information-09-00065" class="html-bibr">20</a>].</p>
Full article ">Figure 7
<p>Lidal et al. [<a href="#B3-information-09-00065" class="html-bibr">3</a>,<a href="#B21-information-09-00065" class="html-bibr">21</a>] present a sketch-based interface for rapid modelling and exploration of various geological scenarios. The sketch-based interface is split into two windows. The Story Tree (<b>left</b>) which shows a tree graph representation of all the geological stories, and the Canvas (<b>right</b>) which shows the sketching interface which utilises a pen and paper interaction to record geological sedimentary data. A geological story is built using horizontal lines to separate different geological layers, vertical lines to show fault systems, and polygons for highlighting large sedimentary layers. The user can navigate through different geological stories with the story tree and then inspect the geological elements of that story. Image courtesy of Lidal et al. [<a href="#B21-information-09-00065" class="html-bibr">21</a>].</p>
Full article ">Figure 8
<p>Lee et al. show an example of SketchStory in information visualization presentation [<a href="#B22-information-09-00065" class="html-bibr">22</a>]. (<b>a</b>) A presenter sketches out a chart axis; (<b>b</b>) SketchStory completes the chart; (<b>c</b>) The presenter interacts with the charts. Image courtesy of Lee et al. [<a href="#B22-information-09-00065" class="html-bibr">22</a>].</p>
Full article ">Figure 9
<p>Lundblad and Jern show Vislet aimed at a comparative visualization using linked Scatter Matrix and Scatter Plot to analyze national correlation between 6 indicators between 1960 and 2010 from the World Databank [<a href="#B23-information-09-00065" class="html-bibr">23</a>]. Image courtesy of Lundblad and Jern [<a href="#B23-information-09-00065" class="html-bibr">23</a>].</p>
Full article ">Figure 10
<p>Eccles et al. show a GeoTime visualisation instance. The <span class="html-italic">l</span>-axis represented by height is temporal. <span class="html-italic">x</span>- and <span class="html-italic">y</span>-axis represent the geospatial location Here you can see a taxi driver’s route over the course of a few hours. Each pick up and drop off is labelled and the route is mapped on the x- and <span class="html-italic">y</span>-axis using the map [<a href="#B26-information-09-00065" class="html-bibr">26</a>]. Image courtesy of Eccles et al. [<a href="#B26-information-09-00065" class="html-bibr">26</a>].</p>
Full article ">Figure 11
<p>Kuhn and Stocker show the CodeTimeline collaboration view. Colors denote different user contributions and each line represents the life of files in the code. Sticky notes are added so the users can learn the history of the code beyond the file evolution [<a href="#B27-information-09-00065" class="html-bibr">27</a>]. Image courtesy of Kuhn and Stocker [<a href="#B27-information-09-00065" class="html-bibr">27</a>].</p>
Full article ">Figure 12
<p>Mahyar et al. present five levels of user engagement in information visualization [<a href="#B31-information-09-00065" class="html-bibr">31</a>]. Image courtesy of Mahyar et al. [<a href="#B31-information-09-00065" class="html-bibr">31</a>].</p>
Full article ">Figure 13
<p>Hullman et al. show the architecture of contextifier [<a href="#B32-information-09-00065" class="html-bibr">32</a>] (<b>left</b>) and illustrate Parallelism in sequencing in the NYT Copenhagen [<a href="#B14-information-09-00065" class="html-bibr">14</a>] (<b>right</b>). Image courtesy of Hullman et al. [<a href="#B14-information-09-00065" class="html-bibr">14</a>,<a href="#B32-information-09-00065" class="html-bibr">32</a>].</p>
Full article ">Figure 14
<p>Bach et al. present graph comics for data-driven storytelling [<a href="#B35-information-09-00065" class="html-bibr">35</a>]. Image courtesy of Bach et al. [<a href="#B35-information-09-00065" class="html-bibr">35</a>].</p>
Full article ">Figure 15
<p>Viegas et al. show the PostHistory visualisation. On the left is the calendar view, showing 365 squares to represent each day of the year (This image only shows data up until May). Size corresponds to the volume of email sent on that day. The colour highlights a specific recipient that has been selected in the contact panel (<b>left</b>). The contact panel shows all the contacts the user has been corresponding with over the year. A contact can be selected to highlight their interaction in the calendar view [<a href="#B36-information-09-00065" class="html-bibr">36</a>]. Image courtesy of Viegas et al. [<a href="#B36-information-09-00065" class="html-bibr">36</a>].</p>
Full article ">Figure 16
<p>Hullman and Diakopoulos demonstrate how data can be window dressed to change the viewers opinion of it. These two images visualize the same data but each illustrator has different intended outcomes. The top image shows an unstructured, complicated graph of conflicting colors and shapes, clearly intended to confuse and obstruct the data, whereas the bottom lays the data out in a simple fashion using consistent shapes and colors [<a href="#B37-information-09-00065" class="html-bibr">37</a>]. Image courtesy of Hullman and Diakopoulos [<a href="#B37-information-09-00065" class="html-bibr">37</a>].</p>
Full article ">Figure 17
<p>Figueiras shows a visualization of Chinese online censorship enhanced with storytelling. An interactive feature is added so that the user can click on an instance of censorship to learn more about it. This supplies context to the user and also may draw an empathetic response from the user [<a href="#B38-information-09-00065" class="html-bibr">38</a>]. Image courtesy of Figueiras [<a href="#B38-information-09-00065" class="html-bibr">38</a>].</p>
Full article ">Figure 18
<p>Figueiras shows the visualizations used in the focus group study and the elements that compose them [<a href="#B28-information-09-00065" class="html-bibr">28</a>]. Image courtesy of Figueiras et al. [<a href="#B28-information-09-00065" class="html-bibr">28</a>].</p>
Full article ">Figure 19
<p>Nguyen et al. present the SchemLine system [<a href="#B39-information-09-00065" class="html-bibr">39</a>]. Image courtesy of Nguyen et al. [<a href="#B39-information-09-00065" class="html-bibr">39</a>].</p>
Full article ">Figure 20
<p>Fisher et al. show daily references to four US presidential candidates from 1 January to 26 March 2008. Time passes along the <span class="html-italic">x</span>-axis for each candidate; number of mentions of the term along the <span class="html-italic">y</span>-axis [<a href="#B43-information-09-00065" class="html-bibr">43</a>]. Image courtesy of Fisher et al. [<a href="#B43-information-09-00065" class="html-bibr">43</a>].</p>
Full article ">Figure 21
<p>The figure shows the seven genres of narrative visualization presented by Segal and Heer [<a href="#B5-information-09-00065" class="html-bibr">5</a>]. These vary in terms of the number of frames and the ordering of their visual elements. A video, for example has a strict ordering and high frame number, whereas a ‘Magazine Style’ poster may have a few frames in one image that are not strictly ordered. These genre elements dictate if a story is author-driven or reader-driven. Author-driven content uses a linear ordering of scenes and has no interactivity. Reader-driven content has no prescribed order to scenes and a high level of interactivity with the reader [<a href="#B5-information-09-00065" class="html-bibr">5</a>]. Image courtesy of Segal and Heer [<a href="#B5-information-09-00065" class="html-bibr">5</a>].</p>
Full article ">Figure 22
<p>The (<b>top-left</b>) image shows the trips rendered on the map. However the cluttered view can be reduced by employing a level-of-detail approach (<b>top right</b>) which takes a subsample based on the order in which the trips occurred. The (<b>bottom-left</b>) image shows a density heat map of the taxi trips whereas the (<b>bottom-right</b>) image averages out the data in each region to make a regional density heat map [<a href="#B45-information-09-00065" class="html-bibr">45</a>]. Image courtesy of Ferreira et al. [<a href="#B45-information-09-00065" class="html-bibr">45</a>].</p>
Full article ">Figure 23
<p>Robertson et al. show the trace lines of the graph animation. The traces visualization shows bubbles at all <span class="html-italic">x</span> and <span class="html-italic">y</span> locations throughout the time frame. This is a conversion of an animation into a static image [<a href="#B46-information-09-00065" class="html-bibr">46</a>]. Image courtesy of Robertson et al. [<a href="#B46-information-09-00065" class="html-bibr">46</a>].</p>
Full article ">Figure 24
<p>Chen et al. presents video shot clustering algorithm combines both visual and audio features to generate a meaningful storyline [<a href="#B47-information-09-00065" class="html-bibr">47</a>]. Image courtesy of Chen et al. [<a href="#B47-information-09-00065" class="html-bibr">47</a>].</p>
Full article ">Figure 25
<p>Tanahashi and Ma present the overview algorithm of generating storyline visualizations [<a href="#B48-information-09-00065" class="html-bibr">48</a>]. Image courtesy of Tanahashi et al. [<a href="#B48-information-09-00065" class="html-bibr">48</a>].</p>
Full article ">Figure 26
<p>Comparison of King Lear using both methods of layout; (<b>a</b>) StoryFlow; (<b>b</b>) previous method by Tanahashi and Ma [<a href="#B48-information-09-00065" class="html-bibr">48</a>]. The StoryFlow layout presented in this paper focuses on minimising white space and efficiently ordering the story lines to ensure the most concise visual representation of a story. Intersecting lines represent interaction between characters and major events in the story are labeled to add clarity to the visualization [<a href="#B49-information-09-00065" class="html-bibr">49</a>]. Image courtesy of Liu et al. [<a href="#B49-information-09-00065" class="html-bibr">49</a>].</p>
Full article ">Figure 27
<p>Heer and Robertson show the process of transition for a scatter plot to a bar chart. The top path starts by stretching the points to size and then moving to the right location, whereas the bottom path moves the dots first, then resizes and reshapes them [<a href="#B50-information-09-00065" class="html-bibr">50</a>]. Image courtesy of Heer and Robertson [<a href="#B50-information-09-00065" class="html-bibr">50</a>].</p>
Full article ">Figure 28
<p>Bederson and Boltman show the ordering effects when presenting an animated and non-animated graphic. If the animated graphic is shown first then there is little difference in recall error, however, if the animation graphic is shown second then the recall error is significantly higher for the non-animated graphic [<a href="#B52-information-09-00065" class="html-bibr">52</a>]. Image courtesy of Bederson and Boltman [<a href="#B52-information-09-00065" class="html-bibr">52</a>].</p>
Full article ">Figure 29
<p>Akiba et al. show the AniVis animation tool displaying MRI scan data. By blending the two layers of data together, a new layer of information is revealed (middle image) [<a href="#B53-information-09-00065" class="html-bibr">53</a>]. Image courtesy of Akiba et al. [<a href="#B53-information-09-00065" class="html-bibr">53</a>].</p>
Full article ">Figure 30
<p>Bateman et al. compare two different levels of graphical embellishment of the same data. The top graph is an embellished image but still retains the recognisable features of a bar chart. The bottom image replaces the bars with a silhouette of a person next to a drink where the height of the drink corresponds to the height of the original bar. This method also uses the addition of color to emphasize the data [<a href="#B15-information-09-00065" class="html-bibr">15</a>]. Image courtesy of Bateman et al. [<a href="#B15-information-09-00065" class="html-bibr">15</a>].</p>
Full article ">Figure 31
<p>Borkin et al. design three-phase experiment to evaluate viewer performance of recognition and recall [<a href="#B30-information-09-00065" class="html-bibr">30</a>]. Image courtesy of Borkin et al. [<a href="#B30-information-09-00065" class="html-bibr">30</a>].</p>
Full article ">Figure 32
<p>Saket et al. show two visualization of the same data: node-link diagram and map-based diagram [<a href="#B55-information-09-00065" class="html-bibr">55</a>]. Image courtesy of Saket et al. [<a href="#B55-information-09-00065" class="html-bibr">55</a>].</p>
Full article ">
21 pages, 1062 KiB  
Article
Distributed State Estimation under State Inequality Constraints with Random Communication over Multi-Agent Networks
by Chen Hu, Zhenhua Li, Haoshen Lin, Bing He and Gang Liu
Information 2018, 9(3), 64; https://doi.org/10.3390/info9030064 - 13 Mar 2018
Viewed by 3781
Abstract
In this paper, we investigate distributed state estimation for multi-agent networks with random communication, where the state is constrained by an inequality. In order to deal with the problem of environmental/communication uncertainties and to save energy, we introduce two random schemes, including a [...] Read more.
In this paper, we investigate distributed state estimation for multi-agent networks with random communication, where the state is constrained by an inequality. In order to deal with the problem of environmental/communication uncertainties and to save energy, we introduce two random schemes, including a random sleep scheme and an event-triggered scheme. With the help of Kalman-consensus filter and projection on the constrained set, we propose two random distributed estimation algorithm. The estimation of each agent is achieved by projecting the consensus estimate, which is obtained by virtue of random exchange information with its neighbors. The estimation error is shown to be bounded with probability one when the agents randomly take the measurement or communicate with their neighbors. We show the stability of proposed algorithm based on Lyapunov method and projection and demonstrate their effectiveness via numerical simulations. Full article
Show Figures

Figure 1

Figure 1
<p>Topology of the multi-agent network in case 1.</p>
Full article ">Figure 2
<p>Comparison between RSKCF and SKCF.</p>
Full article ">Figure 3
<p>Performance of agents with random sleep scheme. (<b>a</b>–<b>d</b>) represent the estimation error of <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mi>k</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mn>1</mn> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mi>k</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mi>k</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mn>3</mn> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mi>x</mi> <mi>k</mi> </msub> <mrow> <mo stretchy="false">(</mo> <mn>4</mn> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics> </math>, respectively.</p>
Full article ">Figure 4
<p>Upper bound of <span class="html-italic">g</span> for a fixed <math display="inline"> <semantics> <mrow> <msup> <mi>ρ</mi> <mi>m</mi> </msup> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 5
<p>Upper bound of <span class="html-italic">g</span> for a fixed <math display="inline"> <semantics> <mrow> <msup> <mi>ρ</mi> <mi>c</mi> </msup> <mo>=</mo> <mn>0.7</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 6
<p>The triggering sequence.</p>
Full article ">Figure 7
<p>Comparison between RSKCF and ETKCF with constraints.</p>
Full article ">Figure 8
<p>Communication rate for different <math display="inline"> <semantics> <msub> <mi>Y</mi> <mi>i</mi> </msub> </semantics> </math>.</p>
Full article ">Figure 9
<p>Network topology of 30 agents.</p>
Full article ">Figure 10
<p>Comparison between algorithms 1 and 2 for case 2.</p>
Full article ">Figure 11
<p>TMSEE of position and velocity of algorithm 1. (<b>a</b>) TMSEE of position; (<b>b</b>) TMSEE of velocity.</p>
Full article ">Figure 12
<p>TMSEE of position and velocity of algorithm 2. (<b>a</b>) TMSEE of position; (<b>b</b>) TMSEE of velocity.</p>
Full article ">
17 pages, 2065 KiB  
Article
An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme
by Baolong Liu and Xiaohao Su
Information 2018, 9(3), 63; https://doi.org/10.3390/info9030063 - 10 Mar 2018
Cited by 9 | Viewed by 5165
Abstract
In order to solve the problem of tag collision in Radio Frequency Identification (RFID) system, the paper proposes a Multi-Bit Identification Collision Tree (MICT) algorithm based on a collision tree. The algorithm uses an array scheme to mark the collision bits in the [...] Read more.
In order to solve the problem of tag collision in Radio Frequency Identification (RFID) system, the paper proposes a Multi-Bit Identification Collision Tree (MICT) algorithm based on a collision tree. The algorithm uses an array scheme to mark the collision bits in the identification process, and determines the collision information according to the first few bits of the tag, which can effectively reduce the number of recognitions and the amount of communication data. The testing results show that the proposed algorithm reduces the time complexity by about 38% and the communication complexity by about 27% compared to existing collision-tree-based algorithms. Through theoretical analysis and experimental evaluation, the MICT algorithm has obvious advantages in terms of time and communication complexity compared to the other typical algorithms. The algorithm can be applied to the field of RFID-related systems to significantly improve the system efficiency. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

Figure 1
<p>Tag-tag collision diagram.</p>
Full article ">Figure 2
<p>Tag-reader collision diagram.</p>
Full article ">Figure 3
<p>Reader-reader collision diagram.</p>
Full article ">Figure 4
<p>Array storage diagram.</p>
Full article ">Figure 5
<p>Identification process based on coding.</p>
Full article ">Figure 6
<p>Algorithm flow chart of reader side.</p>
Full article ">Figure 7
<p>Comparison of query cycles.</p>
Full article ">Figure 8
<p>Comparison of data transmission.</p>
Full article ">Figure 9
<p>Comparison of simulation and analysis values.</p>
Full article ">Figure 10
<p>Comparison of query cycles.</p>
Full article ">Figure 11
<p>Comparison of data transmission.</p>
Full article ">Figure 12
<p>Comparison of the identification efficiency.</p>
Full article ">
15 pages, 1768 KiB  
Article
On the Performance of the Cache Coding Protocol
by Behnaz Maboudi, Hadi Sehat, Peyman Pahlevani and Daniel E. Lucani
Information 2018, 9(3), 62; https://doi.org/10.3390/info9030062 - 10 Mar 2018
Cited by 2 | Viewed by 4252
Abstract
Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent [...] Read more.
Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance. Full article
(This article belongs to the Special Issue Network and Rateless Coding for Video Streaming)
Show Figures

Figure 1

Figure 1
<p>The topology of a two-relay network.</p>
Full article ">Figure 2
<p>A transmission round.</p>
Full article ">Figure 3
<p>Average number of transmissions in all links in source coding.</p>
Full article ">Figure 4
<p>Average number of transmissions in all links in unrestricted coding.</p>
Full article ">Figure 5
<p>Average number of transmission rounds in cache coding.</p>
Full article ">Figure 6
<p>Average number of transmissions in all links in cache coding.</p>
Full article ">Figure 7
<p>Number of linearly dependent packets in <span class="html-italic">D</span> in cache coding.</p>
Full article ">Figure 8
<p>Number of linearly dependent packets in <span class="html-italic">D</span> in source coding.</p>
Full article ">Figure 9
<p>Average number of transmissions in cache coding and unrestricted coding by the simulation results.</p>
Full article ">Figure 10
<p>Average number of transmissions in cache coding and unrestricted coding by the heuristic results.</p>
Full article ">
14 pages, 2282 KiB  
Article
Online Learning of Discriminative Correlation Filter Bank for Visual Tracking
by Jian Wei and Feng Liu
Information 2018, 9(3), 61; https://doi.org/10.3390/info9030061 - 9 Mar 2018
Cited by 5 | Viewed by 4844
Abstract
Accurate visual tracking is a challenging research topic in the field of computer vision. The challenge emanates from various issues, such as target deformation, background clutter, scale variations, and occlusion. In this setting, discriminative correlation filter (DCF)-based trackers have demonstrated excellent performance in [...] Read more.
Accurate visual tracking is a challenging research topic in the field of computer vision. The challenge emanates from various issues, such as target deformation, background clutter, scale variations, and occlusion. In this setting, discriminative correlation filter (DCF)-based trackers have demonstrated excellent performance in terms of speed. However, existing correlation filter-based trackers cannot handle major changes in appearance due to severe occlusions, which eventually result in the development of a bounding box for target drift tracking. In this study, we use a set of DCFs called discriminative correlation filter bank (DCFB) for visual tracking to address the key causes of object occlusion and drift in a tracking-by-detection framework. In this work, we treat thxe current location of the target frame as the center, extract several samples around the target, and perform online learning of DCFB. The sliding window then extracts numerous samples within a large radius of the area where the object in the next frame is previously located. These samples are used for the DCFB to perform correlation operation in the Fourier domain to estimate the location of the new object; the coordinates of the largest correlation scores indicate the position of the new target. The DCFB is updated according to the location of the new target. Experimental results on the quantitative and qualitative evaluations on the challenging benchmark sequences show that the proposed framework improves tracking performance compared with several state-of-the-art trackers. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the proposed DCFB-based visual tracking algorithm. The operator ⨀ is the Hadamard product.</p>
Full article ">Figure 2
<p>Overview of the training process.</p>
Full article ">Figure 3
<p>Overview of the testing process.</p>
Full article ">Figure 4
<p>Precision and success plots over all sequences using OPE on the OTB100 dataset. The average score on DP at 20 pixels for each tracker is shown in the legend of the precision plot. The legend of the success plot contains the area-under-the-curve (AUC) score for each tracker.</p>
Full article ">Figure 5
<p>Precision and success plots of OPE during occlusion. The legend contains the AUC score for each tracker.</p>
Full article ">Figure 6
<p>Qualitative evaluation of our approach in comparison with four state-of-the-art trackers. Tracking results for eight challenges of occlusion sequences (<span class="html-italic">Basketball, Bolt, coke, David3, Faceocc1, Jogging1, Soccer, and Woman</span>) from the OTB100 dataset are shown. Our approach outperforms the state-of-the-art trackers in these occlusion scenarios.</p>
Full article ">
13 pages, 1677 KiB  
Article
Enhancement of RWSN Lifetime via Firework Clustering Algorithm Validated by ANN
by Ahmad Ali, Yu Ming, Tapas Si, Saima Iram and Sagnik Chakraborty
Information 2018, 9(3), 60; https://doi.org/10.3390/info9030060 - 9 Mar 2018
Cited by 25 | Viewed by 4835
Abstract
Nowadays, wireless power transfer is ubiquitously used in wireless rechargeable sensor networks (WSNs). Currently, the energy limitation is a grave concern issue for WSNs. However, lifetime enhancement of sensor networks is a challenging task need to be resolved. For addressing this issue, a [...] Read more.
Nowadays, wireless power transfer is ubiquitously used in wireless rechargeable sensor networks (WSNs). Currently, the energy limitation is a grave concern issue for WSNs. However, lifetime enhancement of sensor networks is a challenging task need to be resolved. For addressing this issue, a wireless charging vehicle is an emerging technology to expand the overall network efficiency. The present study focuses on the enhancement of overall network lifetime of the rechargeable wireless sensor network. To resolve the issues mentioned above, we propose swarm intelligence based hard clustering approach using fireworks algorithm with the adaptive transfer function (FWA-ATF). In this work, the virtual clustering method has been applied in the routing process which utilizes the firework optimization algorithm. Still now, an FWA-ATF algorithm yet not applied by any researcher for RWSN. Furthermore, the validation study of the proposed method using the artificial neural network (ANN) backpropagation algorithm incorporated in the present study. Different algorithms are applied to evaluate the performance of proposed technique that gives the best results in this mechanism. Numerical results indicate that our method outperforms existing methods and yield performance up to 80% regarding energy consumption and vacation time of wireless charging vehicle. Full article
Show Figures

Figure 1

Figure 1
<p>A WRSN with a wireless charging vehicle deployed over single-hop and multi-hop link.</p>
Full article ">Figure 2
<p>Remaining energy of nodes.</p>
Full article ">Figure 3
<p>Energy Consumption.</p>
Full article ">Figure 4
<p>Vacation Time.</p>
Full article ">Figure 5
<p>Artificial neural network (ANN) architecture.</p>
Full article ">Figure 6
<p>Regression plot (experimental vs. predicted) employing 3 factors, 10 neurons present in the hidden layer, and 1 output factor applying the ANN model.</p>
Full article ">
56 pages, 1878 KiB  
Article
Efficient Delivery of Scalable Video Using a Streaming Class Model
by Jason J. Quinlan, Ahmed H. Zahran and Cormac J. Sreenan
Information 2018, 9(3), 59; https://doi.org/10.3390/info9030059 - 8 Mar 2018
Cited by 2 | Viewed by 5981
Abstract
When we couple the rise in video streaming with the growing number of portable devices (smart phones, tablets, laptops), we see an ever-increasing demand for high-definition video online while on the move. Wireless networks are inherently characterised by restricted shared bandwidth and relatively [...] Read more.
When we couple the rise in video streaming with the growing number of portable devices (smart phones, tablets, laptops), we see an ever-increasing demand for high-definition video online while on the move. Wireless networks are inherently characterised by restricted shared bandwidth and relatively high error loss rates, thus presenting a challenge for the efficient delivery of high quality video. Additionally, mobile devices can support/demand a range of video resolutions and qualities. This demand for mobile streaming highlights the need for adaptive video streaming schemes that can adjust to available bandwidth and heterogeneity, and can provide a graceful changes in video quality, all while respecting viewing satisfaction. In this context, the use of well-known scalable/layered media streaming techniques, commonly known as scalable video coding (SVC), is an attractive solution. SVC encodes a number of video quality levels within a single media stream. This has been shown to be an especially effective and efficient solution, but it fares badly in the presence of datagram losses. While multiple description coding (MDC) can reduce the effects of packet loss on scalable video delivery, the increased delivery cost is counterproductive for constrained networks. This situation is accentuated in cases where only the lower quality level is required. In this paper, we assess these issues and propose a new approach called Streaming Classes (SC) through which we can define a key set of quality levels, each of which can be delivered in a self-contained manner. This facilitates efficient delivery, yielding reduced transmission byte-cost for devices requiring lower quality, relative to MDC and Adaptive Layer Distribution (ALD) (42% and 76% respective reduction for layer 2), while also maintaining high levels of consistent quality. We also illustrate how selective packetisation technique can further reduce the effects of packet loss on viewable quality by leveraging the increase in the number of frames per group of pictures (GOP), while offering a means of reducing overall error correction and by providing equality of data in every packet transmitted per GOP. Full article
(This article belongs to the Special Issue Network and Rateless Coding for Video Streaming)
Show Figures

Figure 1

Figure 1
<p>An example of a four-layered SVC stream encoded as MDC-FEC (blue/dark colour denotes original SVC data, green/light colour denotes additional FEC data).</p>
Full article ">Figure 2
<p>An example of a four-layered SVC stream encoded as ALD, with an STF value of 2 (red denotes additional ALD descriptions, which contain existing SVC data).</p>
Full article ">Figure 3
<p>ALD packetisation of <math display="inline"> <semantics> <msub> <mi>D</mi> <mi>c</mi> </msub> </semantics> </math>-4 from ALD in <a href="#information-09-00059-f002" class="html-fig">Figure 2</a>. It can be seen that each ALD datagram contains section segments from all layers (red denotes packet header).</p>
Full article ">Figure 4
<p>Example of a six-layer SVC stream grouped as three hierarchical classes.</p>
Full article ">Figure 5
<p>ALD with six-layer and an STF of 3.</p>
Full article ">Figure 6
<p>ALD streaming classes using the ICC class composition option—C1 denotes class one, C2 denotes class two and C3 denotes class three.</p>
Full article ">Figure 7
<p>ALD streaming classes using the ICI class composition option—C1 denotes class one, C2 denotes class two and C3 denotes class three.</p>
Full article ">Figure 8
<p>Examples of two layers allocated to class one (<math display="inline"> <semantics> <msub> <mi>C</mi> <mn>1</mn> </msub> </semantics> </math>) for (<b>a</b>) SVC plus FEC and (<b>b</b>) description-based models plus FEC; (<b>b</b>) illustrates the section structure of MDC utilised by IRP, while (<b>c</b>) illustrates an example of the IRP packetisation of the SVC class in (<b>a</b>).</p>
Full article ">Figure 9
<p>ALD with five-layer and an STF of 6.</p>
Full article ">Figure 10
<p>Two streaming classes created from ALD with five-layer and an STF of 6. C1 denotes class one and C2 denotes class two.</p>
Full article ">Figure 11
<p>Viewable quality of ALD-SC for both packetisation schemes, ROP and IRP, with a loss rate of 10%.</p>
Full article ">Figure 12
<p>Simulated network topology.</p>
Full article ">Figure 13
<p>Performance of scalable video encoding over lossy links. (<b>a</b>) versus packet loss ratio; (<b>b</b>) viewable video quality at 10% loss; (<b>c</b>) 2 s sample of viewable quality transitions.</p>
Full article ">Figure 14
<p>Transmission cost of the crew media clip for (<b>a</b>) each layer; and (<b>b</b>) each streaming class, as the STF value and associated number of ALD descriptions increase.</p>
Full article ">Figure 15
<p>Performance evaluation of considered schemes using ROP for SCs. (<b>a</b>) video quality for different schemes at 10% loss; (<b>b</b>) average Y-PSNR values for different schemes with 95% confidence interval results; (<b>c</b>) 2 s sample of viewable quality transitions for MDC (layers L2, L5 and L8) and for each of the classes of ALD-SC and MDC-SC (maximum quality per class equating to layers 2, 5 and 8).</p>
Full article ">Figure 16
<p>Performance evaluation of considered schemes using IRP for SCs. (<b>a</b>) video quality for different schemes at 10% loss; (<b>b</b>) average Y-PSNR values for different schemes with 95% confidence interval results; (<b>c</b>) 2 s sample of viewable quality transitions.</p>
Full article ">Figure A1
<p>Transmission cost for the SVC-SC classes C1, C2 and C3 for both <math display="inline"> <semantics> <mrow> <mi>L</mi> <msub> <mi>R</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>L</mi> <msubsup> <mi>R</mi> <mrow> <msub> <mi>C</mi> <mi>i</mi> </msub> </mrow> <mi>max</mi> </msubsup> </mrow> </semantics> </math> with packet loss rates from 0 to 10%.</p>
Full article ">Figure A2
<p>Transmission cost for the SVC-SC classes C1, C2 and C3 for both FEC and <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> with packet loss rates from 0 to 10%.</p>
Full article ">Figure A3
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10%.</p>
Full article ">Figure A4
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10%.</p>
Full article ">Figure A5
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> models, at a packet loss rate of 10%.</p>
Full article ">Figure A6
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> models, at a packet loss rate of 10%.</p>
Full article ">Figure A7
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10%. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A8
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10%. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A9
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 8.</p>
Full article ">Figure A10
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 8.</p>
Full article ">Figure A11
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> schemes, at a packet loss rate of 10% and a GOP of 8.</p>
Full article ">Figure A12
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> schemes, at a packet loss rate of 10% and a GOP of 8.</p>
Full article ">Figure A13
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 8. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A14
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 8. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A15
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> models, at a packet loss rate of 10% and a GOP of 8. This illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A16
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 16.</p>
Full article ">Figure A17
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 16.</p>
Full article ">Figure A18
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> schemes, at a packet loss rate of 10% and a GOP of 16.</p>
Full article ">Figure A19
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> schemes, at a packet loss rate of 10% and a GOP of 16.</p>
Full article ">Figure A20
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 16. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A21
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 16. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A22
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> models, at a packet loss rate of 10% and a GOP of 16. This illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A23
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 32. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <mi>C</mi> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A24
<p>Example of the number of viewable layers for SVC-SC, for each of the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> <mi>P</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> <mi>e</mi> <msub> <mi>t</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>e</mi> <mi>s</mi> </mrow> </msub> </mrow> </semantics> </math>, at a packet loss rate of 10% and a GOP of 32. This image illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">Figure A25
<p>A two-second example of variation in viewable quality for all <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> models, at a packet loss rate of 10% and a GOP of 32. This illustrates an increase in the <math display="inline"> <semantics> <mrow> <mi>F</mi> <mi>E</mi> <msub> <mi>C</mi> <mi>max</mi> </msub> </mrow> </semantics> </math> for C1 and C2 based on the worst case scenario, as shown in <a href="#information-09-00059-t0A2" class="html-table">Table A2</a>.</p>
Full article ">
14 pages, 1557 KiB  
Article
Blind Channel Estimation for FBMC/OQAM Systems Based on Subspace Approach
by Han Wang, Jianqing Liao, Lingwei Xu and Xianpeng Wang
Information 2018, 9(3), 58; https://doi.org/10.3390/info9030058 - 8 Mar 2018
Cited by 7 | Viewed by 4486
Abstract
The conventional channel estimation schemes for filter bank multicarrier with offset quadrature amplitude modulation (FBMC/OQAM) systems are mainly based on preamble methods. However, the utilization of preamble for channel estimation decreases the system’s spectrum efficiency. In this paper, we propose a modified subspace [...] Read more.
The conventional channel estimation schemes for filter bank multicarrier with offset quadrature amplitude modulation (FBMC/OQAM) systems are mainly based on preamble methods. However, the utilization of preamble for channel estimation decreases the system’s spectrum efficiency. In this paper, we propose a modified subspace blind channel estimation method for FBMC/OQAM systems. The proposed method distinguishes itself from previously preamble based methods by utilizing spatial diversity technique to introduce data redundancy for blind channel estimation, which leads to high spectral utilization. Thus, the proposed method can provide significant root mean square error (RMSE) performance improvement compared to conventional preamble based methods at high SNRs. Simulation results verify the validity of the proposed method in FBMC/OQAM systems. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

Figure 1
<p>The IFFT/FFT implementation diagram of the FBMC/OQAM system.</p>
Full article ">Figure 2
<p>Amplitude estimation of the real part of channel taps.</p>
Full article ">Figure 3
<p>Amplitude estimation of the imaginary part of channel taps.</p>
Full article ">Figure 4
<p>RMSE performance comparisons of preamble-based LS methods and subspace method, with 4QAM, <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>64</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics> </math>, and <math display="inline"> <semantics> <mrow> <msub> <mi>N</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>200</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 5
<p>RMSE performance of subspace blind method for different modulation and different number of <math display="inline"> <semantics> <mi>N</mi> </semantics> </math>, with <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <msub> <mi>N</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>200</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 6
<p>RMSE performance of subspace blind method for different modulation and different number of <math display="inline"> <semantics> <mi>N</mi> </semantics> </math>, with <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> <mo>,</mo> <msub> <mi>N</mi> <mi>s</mi> </msub> <mo>=</mo> <mn>200</mn> </mrow> </semantics> </math>.</p>
Full article ">Figure 7
<p>RMSE performance of subspace blind method for different number of FBMC/OQAM symbols, with 4QAM, <math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics> </math>.</p>
Full article ">
14 pages, 2116 KiB  
Article
Information Ecology in the Context of General Ecology
by Mark Burgin and Yixin Zhong
Information 2018, 9(3), 57; https://doi.org/10.3390/info9030057 - 8 Mar 2018
Cited by 8 | Viewed by 7183
Abstract
The ecological approach studied in this paper is a new level of information studies. It allows for achieving a better understanding of information processes in society as well as more efficient creation of information processing systems. At first, in Section 2, we describe [...] Read more.
The ecological approach studied in this paper is a new level of information studies. It allows for achieving a better understanding of information processes in society as well as more efficient creation of information processing systems. At first, in Section 2, we describe and analyze ecological studies in different areas ranging from biology to technology to sociology to knowledge and information. Then, in Section 3, we present elements of general ecology building methodological and philosophical foundation for information ecology. In Section 4 and Section 5, we elaborate a concise definition of information ecology and further develop information ecology as a methodological base for information studies in general based on the concepts and principles of the general theory of information. Full article
(This article belongs to the Section Information Theory and Methodology)
Show Figures

Figure 1

Figure 1
<p>A graphical representation of the Existential Triad of the World.</p>
Full article ">Figure 2
<p>The triadic informational structure “subject–object-interaction”.</p>
Full article ">Figure 3
<p>A basic fundamental triad or a basic named set.</p>
Full article ">Figure 4
<p>A basic fundamental triad or a basic named set.</p>
Full article ">Figure 5
<p>A detailed model for processes in information studies.</p>
Full article ">Figure 6
<p>Conversion of object information into perceived information in intelligent systems.</p>
Full article ">
14 pages, 2752 KiB  
Article
Residual Recurrent Neural Networks for Learning Sequential Representations
by Boxuan Yue, Junwei Fu and Jun Liang
Information 2018, 9(3), 56; https://doi.org/10.3390/info9030056 - 6 Mar 2018
Cited by 69 | Viewed by 8340
Abstract
Recurrent neural networks (RNN) are efficient in modeling sequences for generation and classification, but their training is obstructed by the vanishing and exploding gradient issues. In this paper, we reformulate the RNN unit to learn the residual functions with reference to the hidden [...] Read more.
Recurrent neural networks (RNN) are efficient in modeling sequences for generation and classification, but their training is obstructed by the vanishing and exploding gradient issues. In this paper, we reformulate the RNN unit to learn the residual functions with reference to the hidden state instead of conventional gated mechanisms such as long short-term memory (LSTM) and the gated recurrent unit (GRU). The residual structure has two main highlights: firstly, it solves the gradient vanishing and exploding issues for large time-distributed scales; secondly, the residual structure promotes the optimizations for backward updates. In the experiments, we apply language modeling, emotion classification and polyphonic modeling to evaluate our layer compared with LSTM and GRU layers. The results show that our layer gives state-of-the-art performance, outperforms LSTM and GRU layers in terms of speed, and supports an accuracy competitive with that of the other methods. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of the recurrent neural network (RNN) [<a href="#B9-information-09-00056" class="html-bibr">9</a>], long short-term memory (LSTM) [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and gated recurrent unit (GRU) [<a href="#B17-information-09-00056" class="html-bibr">17</a>].</p>
Full article ">Figure 2
<p>The structure of Res-RNN and gRes-RNN.</p>
Full article ">Figure 3
<p>Best F1 values for the RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>] and Res-RNN, Res-RNN with gates over epochs.</p>
Full article ">Figure 4
<p>Losses for IMDB database of the RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>] and Res-RNN, Res-RNN with gates over epochs.</p>
Full article ">Figure 5
<p>The losses for polyphonic databases of the RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>] and Res-RNN, Res-RNN with gates in 10,000 epochs.</p>
Full article ">Figure 6
<p>Sample of polyphonic music generation by the (<b>a</b>) RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], (<b>b</b>) LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and (<b>c</b>) GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>], (<b>d</b>) Res-RNN and (<b>e</b>) Res-RNN with gates trained with the databases of Nottingham.</p>
Full article ">Figure 7
<p>Sample of polyphonic music generation by the (<b>a</b>) RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], (<b>b</b>) LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and (<b>c</b>) GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>], (<b>d</b>) Res-RNN and (<b>e</b>) Res-RNN with gates trained with the databases of JSB Chorales.</p>
Full article ">Figure 8
<p>Sample of polyphonic music generation by the (<b>a</b>) RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], (<b>b</b>) LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and (<b>c</b>) GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>], (<b>d</b>) Res-RNN and (<b>e</b>) Res-RNN with gates trained with the databases of Muse Data.</p>
Full article ">Figure 9
<p>Sample of polyphonic music generation by the (<b>a</b>) RNN [<a href="#B9-information-09-00056" class="html-bibr">9</a>], (<b>b</b>) LSTM [<a href="#B16-information-09-00056" class="html-bibr">16</a>] and (<b>c</b>) GRU [<a href="#B17-information-09-00056" class="html-bibr">17</a>], (<b>d</b>) Res-RNN and (<b>e</b>) Res-RNN with gates trained with the databases of Piano-midi.</p>
Full article ">
15 pages, 437 KiB  
Article
A Novel Approach for Group Decision-Making from Intuitionistic Fuzzy Preference Relations and Intuitionistic Multiplicative Preference Relations
by Rui Wang and Yan-Lai Li
Information 2018, 9(3), 55; https://doi.org/10.3390/info9030055 - 5 Mar 2018
Cited by 2 | Viewed by 3953
Abstract
During the decision-making process, evaluation information may be given in different formats based on the decision makers’ research fields or personal customs. To address the situation that alternatives are evaluated by both intuitionistic fuzzy preference relations (IFPRs) and intuitionistic multiplicative preference relations (IMPRs), [...] Read more.
During the decision-making process, evaluation information may be given in different formats based on the decision makers’ research fields or personal customs. To address the situation that alternatives are evaluated by both intuitionistic fuzzy preference relations (IFPRs) and intuitionistic multiplicative preference relations (IMPRs), a new priority approach based on a net flow score function is proposed. First, the two preference relations above are transformed into the corresponding interval-valued fuzzy preference relations (IVFPRs) and interval-valued multiplicative preference relations (IVMPRs), respectively. Second, the net flow score functions of individual IFPRs and IMPRs are obtained. Third, according to information theory, a mean deviation maximization model is constructed to compute the weights of decision-makers objectively. Finally, the collective net flow score of each alternative is obtained to determine the ranking result. The proposed method is certified to be simple, valid, and practical with three examples. Full article
Show Figures

Figure 1

Figure 1
<p>Flow diagram of the proposed method. IFPR: intuitionistic fuzzy preference relations. IMPR: intuitionistic multiplicative preference relations. IVFPRs: interval-valued fuzzy preference relations. IVMPRs: interval-valued fuzzy preference relations.</p>
Full article ">
16 pages, 5065 KiB  
Article
Unix Domain Sockets Applied in Android Malware Should Not Be Ignored
by Xu Jiang, Dejun Mu and Huixiang Zhang
Information 2018, 9(3), 54; https://doi.org/10.3390/info9030054 - 4 Mar 2018
Cited by 1 | Viewed by 7380
Abstract
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing security analysis systems can track the [...] Read more.
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing security analysis systems can track the flow of information through Unix domain sockets to detect the leakage of private data through such sockets, which can result in zero-day exploits in the information security field. In this paper, we conduct the first systematic study on Unix domain sockets as applied in Android apps. Then, we identify scenarios in which such apps can leak private data through Unix domain sockets, which the existing dynamic taint analysis systems do not catch. Based on these insights, we propose and implement JDroid, a taint analysis system that can track information flows through Unix domain sockets effectively to detect such privacy leaks. Full article
Show Figures

Figure 1

Figure 1
<p>Connection-based sockets interaction.</p>
Full article ">Figure 2
<p>Datagram-oriented sockets interaction.</p>
Full article ">Figure 3
<p>Examples of private data leakage through Unix domain sockets. (<b>a</b>) Case 1; (<b>b</b>) Case 2; (<b>c</b>) Case 3.</p>
Full article ">Figure 4
<p>JDroid overview.</p>
Full article ">Figure 5
<p>The “Node” structure.</p>
Full article ">Figure 6
<p>The “write” propagation operation.</p>
Full article ">Figure 7
<p>The “sendto” and “sendmsg” methods.</p>
Full article ">Figure 8
<p>The “msghdr” struct.</p>
Full article ">Figure 9
<p>“read” taint operation.</p>
Full article ">Figure 10
<p>The “recvfrom” and “recvmsg” methods.</p>
Full article ">Figure 11
<p>Taint operation for the “recvfrom” method.</p>
Full article ">Figure 12
<p>PoC for Case 1.</p>
Full article ">Figure 13
<p>PoC for Case 2.</p>
Full article ">Figure 14
<p>Echo.apk.</p>
Full article ">Figure 15
<p>Microenchmark results.</p>
Full article ">
20 pages, 1393 KiB  
Article
On the Users’ Acceptance of IoT Systems: A Theoretical Approach
by Rino Falcone and Alessandro Sapienza
Information 2018, 9(3), 53; https://doi.org/10.3390/info9030053 - 1 Mar 2018
Cited by 31 | Viewed by 5725
Abstract
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. [...] Read more.
In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution. Full article
(This article belongs to the Special Issue Security in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Graph representing the user behavior according to its internal state.</p>
Full article ">Figure 2
<p>Graph representing the device behavior according to the estimation of the user state.</p>
Full article ">
13 pages, 1278 KiB  
Article
Multilingual and Multiword Phenomena in a lemon Old Occitan Medico-Botanical Lexicon
by Andrea Bellandi, Emiliano Giovannetti and Anja Weingart
Information 2018, 9(3), 52; https://doi.org/10.3390/info9030052 - 28 Feb 2018
Cited by 14 | Viewed by 5481
Abstract
This article illustrates the progresses made in representing a multilingual and multi-alphabetical Old Occitan medico-botanical lexicon in the context of the project Dictionnaire de Termes Médico-botaniques de l’Ancien Occitan (DiTMAO). The chosen lexical model of reference is lemon, which has been extended [...] Read more.
This article illustrates the progresses made in representing a multilingual and multi-alphabetical Old Occitan medico-botanical lexicon in the context of the project Dictionnaire de Termes Médico-botaniques de l’Ancien Occitan (DiTMAO). The chosen lexical model of reference is lemon, which has been extended accordingly to some specific linguistic and lexical features of the lexicon. In particular, issues and solutions about the modeling of multilingual and multiword phenomena are discussed, as the way they are managed through LexO, a web editor developed in the context of the project. Full article
(This article belongs to the Special Issue Towards the Multilingual Web of Data)
Show Figures

Figure 1

Figure 1
<p>Definition of sublemma and collocation.</p>
Full article ">Figure 2
<p>Formal and semantic relations between words, sublemmata and collocations.</p>
Full article ">Figure 3
<p>Modeling of bilingual variants.</p>
Full article ">Figure 4
<p>LexO’s interface. The <span class="html-italic">aristologia ’RWKH</span> multi-lexicon phrase (see <a href="#sec4-information-09-00052" class="html-sec">Section 4</a>) is composed of the <span class="html-italic">aristologia</span> entry, from the old Occitan lexicon, and the <span class="html-italic">’RWKH</span> entry from the Hebrew lexicon.</p>
Full article ">
26 pages, 2718 KiB  
Article
Forecasting Monthly Electricity Demands by Wavelet Neuro-Fuzzy System Optimized by Heuristic Algorithms
by Jeng-Fung Chen, Quang Hung Do, Thi Van Anh Nguyen and Thi Thanh Hang Doan
Information 2018, 9(3), 51; https://doi.org/10.3390/info9030051 - 28 Feb 2018
Cited by 21 | Viewed by 5739
Abstract
Electricity load forecasting plays a paramount role in capacity planning, scheduling, and the operation of power systems. Reliable and accurate planning and prediction of electricity load are therefore vital. In this study, a novel approach for forecasting monthly electricity demands by wavelet transform [...] Read more.
Electricity load forecasting plays a paramount role in capacity planning, scheduling, and the operation of power systems. Reliable and accurate planning and prediction of electricity load are therefore vital. In this study, a novel approach for forecasting monthly electricity demands by wavelet transform and a neuro-fuzzy system is proposed. Firstly, the most appropriate inputs are selected and a dataset is constructed. Then, Haar wavelet transform is utilized to decompose the load data and eliminate noise. In the model, a hierarchical adaptive neuro-fuzzy inference system (HANFIS) is suggested to solve the curse-of-dimensionality problem. Several heuristic algorithms including Gravitational Search Algorithm (GSA), Cuckoo Optimization Algorithm (COA), and Cuckoo Search (CS) are utilized to optimize the clustering parameters which help form the rule base, and adaptive neuro-fuzzy inference system (ANFIS) optimize the parameters in the antecedent and consequent parts of each sub-model. The proposed approach was applied to forecast the electricity load of Hanoi, Vietnam. The constructed models have shown high forecasting performances based on the performance indices calculated. The results demonstrate the validity of the approach. The obtained results were also compared with those of several other well-known methods including autoregressive integrated moving average (ARIMA) and multiple linear regression (MLR). In our study, the wavelet CS-HANFIS model outperformed the others and provided more accurate forecasting. Full article
Show Figures

Figure 1

Figure 1
<p>Fuzzy inference system.</p>
Full article ">Figure 2
<p>An Adaptive Neuro-Fuzzy Inference System (ANFIS) architecture of two inputs and two rules.</p>
Full article ">Figure 3
<p>The two-layer hierarchical Adaptive Neuro-Fuzzy Inference System (ANFIS) model.</p>
Full article ">Figure 4
<p>The wavelet decomposition and reconstruction of a signal.</p>
Full article ">Figure 5
<p>Pseudo code of the Gravitational Search Algorithm (GSA).</p>
Full article ">Figure 6
<p>Pseudo code of the Cuckoo Optimization Algorithm (COA).</p>
Full article ">Figure 7
<p>Pseudo code of the Cuckoo Search (CS).</p>
Full article ">Figure 8
<p>Proposed methodology.</p>
Full article ">Figure 9
<p>The flowchart of using heuristic algorithms to optimize clustering parameters</p>
Full article ">Figure 10
<p>The hierarchical Adaptive Neuro Fuzzy Inference System (ANFIS) model for forecasting electricity demand.</p>
Full article ">Figure 11
<p>Actual data and forecasting values by artificial neural network (ANN), gravitational search algorithm-hierarchical adaptive neuro-fuzzy inference system (GSA-HANFIS), and wavelet GSA-HANFIS.</p>
Full article ">Figure 12
<p>Actual data and forecasting values by ANN, cuckoo optimization algorithm-hierarchical adaptive neuro-fuzzy inference system (COA-HANFIS), and wavelet COA-HANFIS.</p>
Full article ">Figure 13
<p>Actual data and forecasting values by ANN, cuckoo search-hierarchical adaptive neuro-fuzzy inference system (CS-HANFIS), and wavelet CS-HANFIS.</p>
Full article ">
17 pages, 2073 KiB  
Article
Agent-Based Simulation of Children’s School Travel Mode with Parental Escort Decisions
by Peng Jing, Qingku You and Long Chen
Information 2018, 9(3), 50; https://doi.org/10.3390/info9030050 - 28 Feb 2018
Cited by 4 | Viewed by 4569
Abstract
In the last few years, the number of private cars has expanding quickly in China, more and more parents use cars to escort their children to school, thus cause serious traffic congestions near school in many cities. In this paper, we developed an [...] Read more.
In the last few years, the number of private cars has expanding quickly in China, more and more parents use cars to escort their children to school, thus cause serious traffic congestions near school in many cities. In this paper, we developed an agent-based model (ABM) of the parents’ choice of escort mode. The core of this model is an escort mode choice motivation adjustment function that combines distance, traffic safety and social influence. We also used ABM to exhibit the emergent decoy effect phenomenon, which is a dynamic phenomenon that the introduction of a decoy to the choice-set could increase the share of other alternatives. The model reveals the parents’ inner psychological mechanism when facing competing escort mode choice in transportation system. The simulation results show that the proportion of parents to choose bus escort was 62.45% without the decoy effect was introduced, while the proportion of parents to choose bus escort increased to 74.29% with the decoy effect was entry. The use of the ABM method gives the potential to cope with the dynamic changes in studying parent escort mode choice behavior. Full article
(This article belongs to the Section Information Applications)
Show Figures

Figure 1

Figure 1
<p>The theory of planned behavior.</p>
Full article ">Figure 2
<p>The escort mode choice motivation model.</p>
Full article ">Figure 3
<p>The parent agent’s escort mode choice decision model.</p>
Full article ">Figure 4
<p>Bus versus car example with no decoy alternative.</p>
Full article ">Figure 5
<p>Bus versus car example including decoy alternative.</p>
Full article ">Figure 6
<p>The Decoy Effect.</p>
Full article ">Figure 7
<p>Agents’ distribution and interactions.</p>
Full article ">Figure 8
<p>Simulation before the decoy entry.</p>
Full article ">Figure 9
<p>Simulation after the decoy entry.</p>
Full article ">
4 pages, 170 KiB  
Editorial
Summary of the Special Issue “Neutrosophic Information Theory and Applications” at “Information” Journal
by Florentin Smarandache and Jun Ye
Information 2018, 9(3), 49; https://doi.org/10.3390/info9030049 - 28 Feb 2018
Cited by 3 | Viewed by 3725
Abstract
Over a period of seven months (August 2017–February 2018), the Special Issue dedicated to “Neutrosophic Information Theory and Applications” by the “Information” journal (ISSN 2078-2489), located in Basel, Switzerland, was a success. The Guest Editors, Prof. Dr. Florentin Smarandache from the University of [...] Read more.
Over a period of seven months (August 2017–February 2018), the Special Issue dedicated to “Neutrosophic Information Theory and Applications” by the “Information” journal (ISSN 2078-2489), located in Basel, Switzerland, was a success. The Guest Editors, Prof. Dr. Florentin Smarandache from the University of New Mexico (USA) and Prof. Dr. Jun Ye from the Shaoxing University (China), were happy to select—helped by a team of neutrosophic reviewers from around the world, and by the “Information” journal editors themselves—and publish twelve important neutrosophic papers, authored by 27 authors and coauthors. There were a variety of neutrosophic topics studied and used by the authors and coauthors in Multi-Criteria (or Multi-Attribute and/or Group) Decision-Making, including Cross Entropy-Based MAGDM, Neutrosophic Hesitant Fuzzy Prioritized Aggregation Operators, Biparametric Distance Measures, Pattern Recognition and Medical Diagnosis, Intuitionistic Neutrosophic Graph, NC-TODIM-Based MAGDM, Neutrosophic Cubic Set, VIKOR Method, Neutrosophic Multiple Attribute Group Decision-Making, Competition Graphs, Intuitionistic Neutrosophic Environment, Neutrosophic Commutative N-Ideals, Neutrosophic N-Structures Applied to BCK/BCI-Algebras, Neutrosophic Similarity Score, Weighted Histogram, Robust Mean-Shift Tracking, and Linguistic Neutrosophic Cubic Numbers. Full article
(This article belongs to the Special Issue Neutrosophic Information Theory and Applications)
16 pages, 5082 KiB  
Article
Weighted Gradient Feature Extraction Based on Multiscale Sub-Blocks for 3D Facial Recognition in Bimodal Images
by Yingchun Guo, Ruoyu Wei and Yi Liu
Information 2018, 9(3), 48; https://doi.org/10.3390/info9030048 - 28 Feb 2018
Cited by 7 | Viewed by 6234
Abstract
In this paper, we propose a bimodal 3D facial recognition method aimed at increasing the recognition rate and reducing the effect of illumination, pose, expression, ages, and occlusion on facial recognition. There are two features extracted from the multiscale sub-blocks in both the [...] Read more.
In this paper, we propose a bimodal 3D facial recognition method aimed at increasing the recognition rate and reducing the effect of illumination, pose, expression, ages, and occlusion on facial recognition. There are two features extracted from the multiscale sub-blocks in both the 3D mode depth map and 2D mode intensity map, which are the local gradient pattern (LGP) feature and the weighted histogram of gradient orientation (WHGO) feature. LGP and WHGO features are cascaded to form the 3D facial feature vector LGP-WHGO, and are further trained and identified by the support vector machine (SVM). Experiments on the CASIA database, FRGC v2.0 database, and Bosphorus database show that, the proposed method can efficiently extract the structure information and texture information of the facial image, and have a robustness to illumination, expression, occlusion and pose. Full article
Show Figures

Figure 1

Figure 1
<p>3D face pre-processing flow diagram.</p>
Full article ">Figure 2
<p>The bimodal maps obtained from 3D face point cloud model. (<b>a</b>) Example of 3D face data model in CASIA database; (<b>b</b>) example of the depth map; (<b>c</b>) example of the intensity map.</p>
Full article ">Figure 3
<p>Multiscale operation.</p>
Full article ">Figure 4
<p>Sub-blocks’ operation: (<b>a</b>) The original depth map; (<b>b</b>) 2 × 2 sub-blocks image; (<b>c</b>) 4 × 4 sub-blocks image; (<b>d</b>) 8 × 8 sub-blocks image; (<b>e</b>) 16 × 16 sub-blocks image.</p>
Full article ">Figure 5
<p>Kirsch masks.</p>
Full article ">Figure 6
<p>Directions of the gradients. (<b>a</b>) The four different directions of relative gradients in GBP; (<b>b</b>) The eight different directions of relative gradients in LGP.</p>
Full article ">Figure 7
<p>Eight directional masks.</p>
Full article ">Figure 8
<p>Local gradient pattern (LGP) encoding process.</p>
Full article ">Figure 9
<p>LGP encoding example with <span class="html-italic">k</span> = 3.</p>
Full article ">Figure 10
<p>Samples of the CASIA database: (<b>a</b>) 18 depth map samples; (<b>b</b>) 18 intensity map samples.</p>
Full article ">Figure 11
<p>Samples of the FRGC v2.0 database: (<b>a</b>) nine depth map samples; (<b>b</b>) nine intensity map samples.</p>
Full article ">Figure 12
<p>Samples of the Bosphorus database. (<b>a</b>) 40 depth map samples; (<b>b</b>) 40 intensity map samples.</p>
Full article ">Figure 13
<p>Maps of the five descriptors: local binary pattern (LBP), local directional pattern (LDP), gradient binary pattern (GBP), LGP and weighted histogram of gradient orientation (WHGO). (<b>a</b>) The original depth map and intensity map; (<b>b</b>) corresponding LBP maps; (<b>c</b>) corresponding LDP maps; (<b>d</b>) corresponding GBP maps; (<b>e</b>) corresponding LGP maps; (<b>f</b>) corresponding WHGO maps.</p>
Full article ">Figure 14
<p>Comparison of the LGP, WHGO, and three other descriptors: (<b>a</b>) the results of the LBP descriptor; (<b>b</b>) the results of the LDP descriptor; (<b>c</b>) the results of the GBP descriptor; (<b>d</b>) the results of the LGP descriptor; (<b>e</b>) the results of the WHGO descriptor. Abscissa: gradient orientation after being quantized; Ordinate: weighted frequency value.</p>
Full article ">
17 pages, 907 KiB  
Article
The Evolution of Contextual Information Processing in Informatics
by Phivos Mylonas
Information 2018, 9(3), 47; https://doi.org/10.3390/info9030047 - 27 Feb 2018
Cited by 3 | Viewed by 4887
Abstract
After many decades of flourishing computer science it is now rather evident that in a world dominated by different kinds of digital information, both applications and people are forced to seek new, innovative structures and forms of data management and organization. Following this [...] Read more.
After many decades of flourishing computer science it is now rather evident that in a world dominated by different kinds of digital information, both applications and people are forced to seek new, innovative structures and forms of data management and organization. Following this blunt observation, researchers in informatics have strived over the recent years to tackle the non-unique and rather evolving notion of context, which aids significantly the data disambiguation process. Motivated by this environment, this work attempts to summarize and organize in a researcher-friendly tabular manner important or pioneer related research works deriving from diverse computational intelligence domains: Initially, we discuss the influence of context with respect to traditional low-level multimedia content analysis and search, and retrieval tasks and then we advance to the fields of overall computational context-awareness and the so-called human-generated contextual elements. In an effort to provide meaningful information to fellow researchers, this brief survey focuses on the impact of context in modern and popular computing undertakings of our era. More specifically, we focus to the presentation of a short review of visual context modeling methods, followed by the depiction of context-awareness in modern computing. Works dealing with the interpretation of context by human-generated interactions are also discussed herein, as the particular domain gains an ever-increasing proportion of related research nowadays. We then conclude the paper by providing a short discussion on (i) the motivation behind the included context type categorization into three main pillars; (ii) the findings and conclusions of the survey for each context category; and (iii) a couple of brief advices derived from the survey for both interested developers and fellow researchers. Full article
(This article belongs to the Special Issue Context Awareness)
Show Figures

Figure 1

Figure 1
<p>Word cloud produced by the 187 unique keywords of the 50 herein discussed papers (Created with <a href="https://wordart.com/create/ public web service" target="_blank">https://wordart.com/create/ public web service</a>).</p>
Full article ">Figure 2
<p>Diagrammatic scheme of identified contextual types.</p>
Full article ">
19 pages, 4826 KiB  
Article
An Extension of Fuzzy SWOT Analysis: An Application to Information Technology
by Mohammad Taghi Taghavifard, Hannan Amoozad Mahdiraji, Amir Massoud Alibakhshi, Edmundas Kazimieras Zavadskas and Romualdas Bausys
Information 2018, 9(3), 46; https://doi.org/10.3390/info9030046 - 27 Feb 2018
Cited by 31 | Viewed by 8110
Abstract
When considering today’s uncertain atmosphere, many people and organizations believe that strategy has lost its meaning and position. When future is predictable, common approaches for strategic planning are applicable; nonetheless, vague circumstances require different methods. Accordingly, a new approach that is compatible with [...] Read more.
When considering today’s uncertain atmosphere, many people and organizations believe that strategy has lost its meaning and position. When future is predictable, common approaches for strategic planning are applicable; nonetheless, vague circumstances require different methods. Accordingly, a new approach that is compatible with uncertainty and unstable conditions is necessary. Fuzzy logic is a worldview compatible with today complicated requirements. Regarding today’s uncertain and vague atmosphere, there is an absolute requirement to fuzzify the tools and strategic planning models, especially for dynamic and unclear environment. In this research, an extended version of Strengths, Weaknesses, Opportunities and Threats (SWOT) fuzzy approach has been presented for strategic planning based on fuzzy logic. It has solved the traditional strategic planning key problems like internal and external factors in imprecision and ambiguous environment. The model has been performed in an information technology corporation to demonstrate the capabilities in real world cases. Full article
(This article belongs to the Section Information Systems)
Show Figures

Figure 1

Figure 1
<p>Membership function.</p>
Full article ">Figure 2
<p>Scheme of algorithm.</p>
Full article ">Figure 3
<p>Example of triangular membership function for values {−1 ,2, 3}.</p>
Full article ">Figure 4
<p>Aggregation [<a href="#B27-information-09-00046" class="html-bibr">27</a>].</p>
Full article ">Figure 5
<p>Defuzzification [<a href="#B27-information-09-00046" class="html-bibr">27</a>].</p>
Full article ">Figure 6
<p>Center of gravity and coefficient of closeness.</p>
Full article ">Figure 7
<p>One quadrant fuzzy area.</p>
Full article ">Figure 8
<p>Two quadrant fuzzy area.</p>
Full article ">Figure 9
<p>Four quadrant fuzzy area.</p>
Full article ">Figure 10
<p>The stages of the proposed model.</p>
Full article ">Figure 11
<p>Aggregation result of I11 and E1 factors.</p>
Full article ">Figure 12
<p>Three α-cut plane cut pyramid.</p>
Full article ">Figure 13
<p>Fuzzy areas for α <math display="inline"> <semantics> <mrow> <mo>=</mo> <mn>0.1</mn> <mo>,</mo> <mtext> </mtext> <mn>0.5</mn> <mo>,</mo> <mtext> </mtext> <mn>0.9</mn> </mrow> </semantics> </math>.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop