ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Artikel  (3.472)
  • MDPI  (2.484)
  • MDPI Publishing  (988)
  • Minerals  (1.931)
  • Information  (1.541)
  • 151794
  • 180701
Sammlung
  • Artikel  (3.472)
Verlag/Herausgeber
Erscheinungszeitraum
Zeitschrift
  • 1
    Publikationsdatum: 2020
    Beschreibung: During highly automated driving, the passenger is allowed to conduct non-driving related activities (NDRA) and no longer has to act as a fallback at the functional limits of the driving automation system. Previous research has shown that at lower levels of automation, passengers still wish to be informed about automated vehicle behavior to a certain extent. Due to the aim of the introduction of urban automated driving, which is characterized by high complexity, we investigated the information needs and visual attention of the passenger during urban, highly automated driving. Additionally, there was an investigation into the influence of the experience of automated driving and of NDRAs on these results. Forty participants took part in a driving simulator study. As well as the information presented on the human–machine interface (system status, navigation information, speed and speed limit), participants requested information about maneuvers, reasons for maneuvers, environmental settings and additional navigation data. Visual attention was significantly affected by the NDRA, while the experience of automated driving had no effect. Experience and NDRA showed no significant effect on the need for information. Differences in information needs seem to be due to the requirements of the individual passenger, rather than the investigated factors.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Publikationsdatum: 2020
    Beschreibung: The Delphi method is one of the basic tools for forecasting values in various types of issues. It uses the knowledge of experts, which is properly aggregated (e.g., in the form of descriptive statistics measures) and returns to the previous group of experts again, thus starting the next round of forecasting. The multi-stage prediction under the Delphi method allows for better stabilization of the results, which is extremely important in the process of forecasting. Experts in the forecasting process often have access to time series forecasting software but do not necessarily use it. Therefore, it seems advisable to add to the aggregate the value obtained using forecasting software. The advantage of this approach is in saving the time and costs of obtaining a forecast. That should be understood as a smaller burden on data analysts and the value of their work. According to the above mentioned key factors, the main contribution of the article is the use of a virtual expert in the form of a computer-enhanced mathematical tool, i.e., a programming library for a forecasting time series. The chosen software tool is the Prophet library—a Facebook tool that can be used in Python or R programming languages.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Publikationsdatum: 2020
    Beschreibung: Nowadays, we are observing a growing interest about Big Data applications in different healthcare sectors. One of this is definitely cardiology. In fact, electrocardiogram produces a huge amount of data about the heart health status that need to be stored and analysed in order to detect a possible issues. In this paper, we focus on the arrhythmia detection problem. Specifically, our objective is to address the problem of distributed processing considering big data generated by electrocardiogram (ECG) signals in order to carry out pre-processing analysis. Specifically, an algorithm for the identification of heartbeats and arrhythmias is proposed. Such an algorithm is designed in order to carry out distributed processing over the Cloud since big data could represent the bottleneck for cardiology applications. In particular, we implemented the Menard algorithm in Apache Spark in order to process big data coming form ECG signals in order to identify arrhythmias. Experiments conducted using a dataset provided by the Physionet.org European ST-T Database show an improvement in terms of response times. As highlighted by our outcomes, our solution provides a scalable and reliable system, which may address the challenges raised by big data in healthcare.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Publikationsdatum: 2020
    Beschreibung: Arabic is one of the most semantically and syntactically complex languages in the world. A key challenging issue in text mining is text summarization, so we propose an unsupervised score-based method which combines the vector space model, continuous bag of words (CBOW), clustering, and a statistically-based method. The problems with multidocument text summarization are the noisy data, redundancy, diminished readability, and sentence incoherency. In this study, we adopt a preprocessing strategy to solve the noise problem and use the word2vec model for two purposes, first, to map the words to fixed-length vectors and, second, to obtain the semantic relationship between each vector based on the dimensions. Similarly, we use a k-means algorithm for two purposes: (1) Selecting the distinctive documents and tokenizing these documents to sentences, and (2) using another iteration of the k-means algorithm to select the key sentences based on the similarity metric to overcome the redundancy problem and generate the initial summary. Lastly, we use weighted principal component analysis (W-PCA) to map the sentences’ encoded weights based on a list of features. This selects the highest set of weights, which relates to important sentences for solving incoherency and readability problems. We adopted Recall-Oriented Understudy for Gisting Evaluation (ROUGE) as an evaluation measure to examine our proposed technique and compare it with state-of-the-art methods. Finally, an experiment on the Essex Arabic Summaries Corpus (EASC) using the ROUGE-1 and ROUGE-2 metrics showed promising results in comparison with existing methods.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Publikationsdatum: 2020
    Beschreibung: During automated driving, there is a need for interaction between the automated vehicle (AV) and the passengers inside the vehicle and between the AV and the surrounding road users outside of the car. For this purpose, different types of human machine interfaces (HMIs) are implemented. This paper introduces an HMI framework and describes the different HMI types and the factors influencing their selection and content. The relationship between these HMI types and their influencing factors is also presented in the framework. Moreover, the interrelations of the HMI types are analyzed. Furthermore, we describe how the framework can be used in academia and industry to coordinate research and development activities. With the help of the HMI framework, we identify research gaps in the field of HMI for automated driving to be explored in the future.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Publikationsdatum: 2020
    Beschreibung: We propose a new supervised learning algorithm for classification and regression problems where two or more preliminary predictors are available. We introduce KernelCobra, a non-linear learning strategy for combining an arbitrary number of initial predictors. KernelCobra builds on the COBRA algorithm introduced by [], which combined estimators based on a notion of proximity of predictions on the training data. While the COBRA algorithm used a binary threshold to declare which training data were close and to be used, we generalise this idea by using a kernel to better encapsulate the proximity information. Such a smoothing kernel provides more representative weights to each of the training points which are used to build the aggregate and final predictor, and KernelCobra systematically outperforms the COBRA algorithm. While COBRA is intended for regression, KernelCobra deals with classification and regression. KernelCobra is included as part of the open source Python package Pycobra (0.2.4 and onward), introduced by []. Numerical experiments were undertaken to assess the performance (in terms of pure prediction and computational complexity) of KernelCobra on real-life and synthetic datasets.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Publikationsdatum: 2020
    Beschreibung: Computational ontologies are machine-processable structures which represent particular domains of interest. They integrate knowledge which can be used by humans or machines for decision making and problem solving. The main aim of this systematic review is to investigate the role of formal ontologies in information systems development, i.e., how these graphs-based structures can be beneficial during the analysis and design of the information systems. Specific online databases were used to identify studies focused on the interconnections between ontologies and systems engineering. One-hundred eighty-seven studies were found during the first phase of the investigation. Twenty-seven studies were examined after the elimination of duplicate and irrelevant documents. Mind mapping was substantially helpful in organising the basic ideas and in identifying five thematic groups that show the main roles of formal ontologies in information systems development. Formal ontologies are mainly used in the interoperability of information systems, human resource management, domain knowledge representation, the involvement of semantics in unified modelling language (UML)-based modelling, and the management of programming code and documentation. We explain the main ideas in the reviewed studies and suggest possible extensions to this research.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Publikationsdatum: 2020
    Beschreibung: The transfer learning method is used to extend our existing model to more difficult scenarios, thereby accelerating the training process and improving learning performance. The conditional adversarial domain adaptation method proposed in 2018 is a particular type of transfer learning. It uses the domain discriminator to identify which images the extracted features belong to. The features are obtained from the feature extraction network. The stability of the domain discriminator directly affects the classification accuracy. Here, we propose a new algorithm to improve the predictive accuracy. First, we introduce the Lipschitz constraint condition into domain adaptation. If the constraint condition can be satisfied, the method will be stable. Second, we analyze how to make the gradient satisfy the condition, thereby deducing the modified gradient via the spectrum regularization method. The modified gradient is then used to update the parameter matrix. The proposed method is compared to the ResNet-50, deep adaptation network, domain adversarial neural network, joint adaptation network, and conditional domain adversarial network methods using the datasets that are found in Office-31, ImageCLEF-DA, and Office-Home. The simulations demonstrate that the proposed method has a better performance than other methods with respect to accuracy.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Publikationsdatum: 2020
    Beschreibung: The most challenging issue with low-resource languages is the difficulty of obtaining enough language resources. In this paper, we propose a language service framework for low-resource languages that enables the automatic creation and customization of new resources from existing ones. To achieve this goal, we first introduce a service-oriented language infrastructure, the Language Grid; it realizes new language services by supporting the sharing and combining of language resources. We then show the applicability of the Language Grid to low-resource languages. Furthermore, we describe how we can now realize the automation and customization of language services. Finally, we illustrate our design concept by detailing a case study of automating and customizing bilingual dictionary induction for low-resource Turkic languages and Indonesian ethnic languages.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Publikationsdatum: 2020
    Beschreibung: Keywords: virtual reality system; multi-channel cognition; cognitive load; QFD; human–computer interaction; prediction optimization
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Publikationsdatum: 2020
    Beschreibung: Acoustic underwater communication is a challenging task. For a reliable transmission, not only good channel estimation and equalization, but also strong error correcting codes are needed. In this paper, we present the results of the coding competition “Wanted: Best channel codes for short underwater messages” as well as our own findings on the influence of the modulation alphabet size in the example of non-binary polar codes. Furthermore, the proposals of the competition are compared to other commonly used channel codes.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Publikationsdatum: 2020
    Beschreibung: Information on automated driving functions when automation is not activated but is available have not been investigated thus far. As the possibility of conducting non-driving related activities (NDRAs) is one of the most important aspects when it comes to perceived usefulness of automated cars and many NDRAs are time-dependent, users should know the period for which automation is available, even when not activated. This article presents a study (N = 33) investigating the effects of displaying the availability duration before—versus after—activation of the automation on users’ activation behavior and on how the system is rated. Furthermore, the way of addressing users regarding the availability on a more personal level to establish “sympathy” with the system was examined with regard to acceptance, usability, and workload. Results show that displaying the availability duration before activating the automation reduces the frequency of activations when no NDRA is executable within the automated drive. Moreover, acceptance and usability were higher and workload was reduced as a result of this information being provided. No effects were found with regard to how the user was addressed.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Publikationsdatum: 2020
    Beschreibung: The research on complex networks is a hot topic in many fields, among which community detection is a complex and meaningful process, which plays an important role in researching the characteristics of complex networks. Community structure is a common feature in the network. Given a graph, the process of uncovering its community structure is called community detection. Many community detection algorithms from different perspectives have been proposed. Achieving stable and accurate community division is still a non-trivial task due to the difficulty of setting specific parameters, high randomness and lack of ground-truth information. In this paper, we explore a new decision-making method through real-life communication and propose a preferential decision model based on dynamic relationships applied to dynamic systems. We apply this model to the label propagation algorithm and present a Community Detection based on Preferential Decision Model, called CDPD. This model intuitively aims to reveal the topological structure and the hierarchical structure between networks. By analyzing the structural characteristics of complex networks and mining the tightness between nodes, the priority of neighbor nodes is chosen to perform the required preferential decision, and finally the information in the system reaches a stable state. In the experiments, through the comparison of eight comparison algorithms, we verified the performance of CDPD in real-world networks and synthetic networks. The results show that CDPD not only has better performance than most recent algorithms on most datasets, but it is also more suitable for many community networks with ambiguous structure, especially sparse networks.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Publikationsdatum: 2020
    Beschreibung: Usually taken as linguistic features by Part-Of-Speech (POS) tagging, Named Entity Recognition (NER) is a major task in Natural Language Processing (NLP). In this paper, we put forward a new comprehensive-embedding, considering three aspects, namely character-embedding, word-embedding, and pos-embedding stitched in the order we give, and thus get their dependencies, based on which we propose a new Character–Word–Position Combined BiLSTM-Attention (CWPC_BiAtt) for the Chinese NER task. Comprehensive-embedding via the Bidirectional Llong Short-Term Memory (BiLSTM) layer can get the connection between the historical and future information, and then employ the attention mechanism to capture the connection between the content of the sentence at the current position and that at any location. Finally, we utilize Conditional Random Field (CRF) to decode the entire tagging sequence. Experiments show that CWPC_BiAtt model we proposed is well qualified for the NER task on Microsoft Research Asia (MSRA) dataset and Weibo NER corpus. A high precision and recall were obtained, which verified the stability of the model. Position-embedding in comprehensive-embedding can compensate for attention-mechanism to provide position information for the disordered sequence, which shows that comprehensive-embedding has completeness. Looking at the entire model, our proposed CWPC_BiAtt has three distinct characteristics: completeness, simplicity, and stability. Our proposed CWPC_BiAtt model achieved the highest F-score, achieving the state-of-the-art performance in the MSRA dataset and Weibo NER corpus.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Publikationsdatum: 2020
    Beschreibung: In future trac, automated vehicles may be equipped with external human-machine interfaces (eHMIs) that can communicate with pedestrians. Previous research suggests that, during first encounters, pedestrians regard text-based eHMIs as clearer than light-based eHMIs. However, in much of the previous research, pedestrians were asked to imagine crossing the road, and unable or not allowed to do so. We investigated the eects of eHMIs on participants’ crossing behavior. Twenty-four participants were immersed in a virtual urban environment using a head-mounted display coupled to a motion-tracking suit. We manipulated the approaching vehicles’ behavior (yielding, nonyielding) and eHMI type (None, Text, Front Brake Lights). Participants could cross the road whenever they felt safe enough to do so. The results showed that forward walking velocities, as recorded at the pelvis, were, on average, higher when an eHMI was present compared to no eHMI if the vehicle yielded. In nonyielding conditions, participants showed a slight forward motion and refrained from crossing. An analysis of participants’ thorax angle indicated rotation towards the approaching vehicles and subsequent rotation towards the crossing path. It is concluded that results obtained via a setup in which participants can cross the road are similar to results from survey studies, with eHMIs yielding a higher crossing intention compared to no eHMI. The motion suit allows investigating pedestrian behaviors related to bodily attention and hesitation.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Publikationsdatum: 2020
    Beschreibung: In this paper, an efficient high-order multiple signal classification (MUSIC)-like method is proposed for mixed-field source localization. Firstly, a non-Hermitian matrix is designed based on a high-order cumulant. One of the steering matrices, that is related only with the directions of arrival (DOA), is proved to be orthogonal with the eigenvectors corresponding to the zero eigenvalues. The other steering matrix that contains the information of both the DOA and range is proved to span the same column subspace with the eigenvectors corresponding to the non-zero eigenvalues. By applying the Gram–Schmidt orthogonalization, the range estimation can be achieved one by one after substituting each estimated DOA. The analysis shows that the computational complexity of the proposed method is lower than other methods, and the effectiveness of the proposed method is shown with some simulation results.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Publikationsdatum: 2020
    Beschreibung: The ability to stop malware as soon as they start spreading will always play an important role in defending computer systems. It must be a huge benefit for organizations as well as society if intelligent defense systems could themselves detect and prevent new types of malware as soon as they reveal only a tiny amount of samples. An approach introduced in this paper takes advantage of One-shot/Few-shot learning algorithms to solve the malware classification problems using a Memory Augmented Neural Network in combination with the Natural Language Processing techniques such as word2vec, n-gram. We embed the malware’s API calls, which are very valuable sources of information for identifying malware’s behaviors, in the different feature spaces, and then feed them to the one-shot/few-shot learning models. Evaluating the model on the two datasets (FFRI 2017 and APIMDS) shows that the models with different parameters could yield high accuracy on malware classification with only a few samples. For example, on the APIMDS dataset, it was able to guess 78.85% correctly after seeing only nine malware samples and 89.59% after fine-tuning with a few other samples. The results confirmed very good accuracies compared to the other traditional methods, and point to a new area of malware research.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Publikationsdatum: 2020
    Beschreibung: A common use case for blockchain smart contracts (SC) is that of governing interaction amongst mutually untrusted parties, by automatically enforcing rules for interaction. However, while many contributions in the literature assess SC computational expressiveness, an evaluation of their power in terms of coordination (i.e., governing interaction) is still missing. This is why in this paper we test mainstream SC implementations by evaluating their expressive power in coordinating both inter-users and inter-SC activities. To do so, we exploit the archetypal Linda coordination model as a benchmark—a common practice in the field of coordination models and languages—by discussing to what extent mainstream blockchain technologies support its implementation. As they reveal some notable limitations (affecting, in particular, coordination between SC) we then show how Tenderfone, a custom blockchain implementation providing for a more expressive notion of SC, addresses the aforementioned limitations.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Publikationsdatum: 2020
    Beschreibung: Virtualization has the advantages of strong scalability and high fidelity in host node emulation. It can effectively meet the requirements of network emulation, including large scale, high fidelity, and flexible construction. However, for router emulation, virtual routers built with virtualization and routing software use Linux Traffic Control to emulate bandwidth, delay, and packet loss rates, which results in serious distortions in congestion scenarios. Motivated by this deficiency, we propose a novel router emulation method that consists of virtualization plane, routing plane, and a traffic control method. We designed and implemented our traffic control module in multi-scale virtualization, including the kernel space of a KVM-based virtual router and the user space of a Docker-based virtual router. Experiments show not only that the proposed method achieves high-fidelity router emulation, but also that its performance is consistent with that of a physical router in congestion scenarios. These findings provide good support for network research into congestion scenarios on virtualization-based emulation platforms.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Publikationsdatum: 2020
    Beschreibung: In this paper the Buechner–Tavani model of digital trust is revised—new conditions for self-trust are incorporated into the model. These new conditions raise several philosophical problems concerning the idea of a substantial self for social robotics, which are closely examined. I conclude that reductionism about the self is incompatible with, while the idea of a substantial self is compatible with, trust relations between human agents, between human agents and artificial agents, and between artificial agents.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Publikationsdatum: 2020
    Beschreibung: Linguistic Pythagorean fuzzy (LPF) set is an efficacious technique to comprehensively represent uncertain assessment information by combining the Pythagorean fuzzy numbers and linguistic variables. In this paper, we define several novel essential operations of LPF numbers based upon Einstein operations and discuss several relations between these operations. For solving the LPF numbers fusion problem, several LPF aggregation operators, including LPF Einstein weighted averaging (LPFEWA) operator, LPF Einstein weighted geometric (LPFEWG) operator and LPF Einstein hybrid operator, are propounded; the prominent characteristics of these operators are investigated as well. Furthermore, a multi-attribute group decision making (MAGDM) approach is presented on the basis of the developed operators under an LPF environment. Ultimately, two application cases are utilized to demonstrate the practicality and feasibility of the developed decision approach and the comparison analysis is provided to manifest the merits of it.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Publikationsdatum: 2020
    Beschreibung: With the rise of electric vehicles, the key of electric vehicle charging is how to charge them in residential areas and other closed environments. Addressing this problem is extremely important for avoiding adverse effects on the load and stability of the neighboring grids where multi-user centralized charging takes place. Therefore, we propose a charging dynamic scheduling algorithm based on user bidding. First, we determine the user charging priority according to bidding. Then, we design a resource allocation policy based on game theory, which could assign charge slots for users. Due to users leaving and urgent user needs, we found an alternate principle that can improve the flexibility slot utilization of charging. Simulation results show that the algorithm could meet the priority needs of users with higher charging prices and timely responses to requests. Meanwhile, this algorithm can ensure orderly electric vehicle charging, improve power utilization efficiency, and ease pressure on grid loads.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Publikationsdatum: 2020
    Beschreibung: This paper discusses the nuances of a social robot, how and why social robots are becoming increasingly significant, and what they are currently being used for. This paper also reflects on the current design of social robots as a means of interaction with humans and also reports potential solutions about several important questions around the futuristic design of these robots. The specific questions explored in this paper are: “Do social robots need to look like living creatures that already exist in the world for humans to interact well with them?”; “Do social robots need to have animated faces for humans to interact well with them?”; “Do social robots need to have the ability to speak a coherent human language for humans to interact well with them?” and “Do social robots need to have the capability to make physical gestures for humans to interact well with them?”. This paper reviews both verbal as well as nonverbal social and conversational cues that could be incorporated into the design of social robots, and also briefly discusses the emotional bonds that may be built between humans and robots. Facets surrounding acceptance of social robots by humans and also ethical/moral concerns have also been discussed.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Publikationsdatum: 2020
    Beschreibung: In this paper, the viability of neural network implementations of core technologies (the focus of this paper is on text technologies) for 10 resource-scarce South African languages is evaluated. Neural networks are increasingly being used in place of other machine learning methods for many natural language processing tasks with good results. However, in the South African context, where most languages are resource-scarce, very little research has been done on neural network implementations of core language technologies. In this paper, we address this gap by evaluating neural network implementations of four core technologies for ten South African languages. The technologies we address are part of speech tagging, named entity recognition, compound analysis and lemmatization. Neural architectures that performed well on similar tasks in other settings were implemented for each task and the performance was assessed in comparison with currently used machine learning implementations of each technology. The neural network models evaluated perform better than the baselines for compound analysis, are viable and comparable to the baseline on most languages for POS tagging and NER, and are viable, but not on par with the baseline, for Afrikaans lemmatization.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Publikationsdatum: 2020
    Beschreibung: Online privacy has become immensely important with the growth of technology and the expansion of communication. Social Media Networks have risen to the forefront of current communication trends. With the current trends in social media, the question now becomes how can we actively protect ourselves on these platforms? Users of social media networks share billions of images a day. Whether intentional or unintentional, users tend to share private information within these images. In this study, we investigate (1) the users’ perspective of privacy, (2) pervasiveness of privacy leaks on Twitter, and (3) the threats and dangers on these platforms. In this study, we incorporate techniques such as text analysis, analysis of variance, and crowdsourcing to process the data received from these sources. Based on the results, the participants’ definitions of privacy showed overlap regardless of age or gender identity. After looking at the survey results, most female participants displayed a heightened fear of dangers on social media networks because of threats in the following areas: assets and identity. When the participants were asked to rank the threats on social media, they showed a high concern for burglary and kidnapping. We find that participants need more education about the threats of visual content and how these privacy leaks can lead to physical, mental, and emotional danger.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Publikationsdatum: 2020
    Beschreibung: The adoption of games in the classroom has been studied from different angles, such as the readiness of teachers to use games or the barriers encountered. However, actual classroom practices with regard to the use of games have not been examined on a larger scale. With this research, we gave teachers a voice to report on their actual practices. We examined the current practices of a large sample of Estonian teachers (N = 1258, which constitutes almost 9% of the total Estonian teacher population) in primary and secondary education in 2017. We found that most of the teachers use games on a regular basis. Mainly, they use the games for motivation and alternation, but they also use them to consolidate and teach new skills. While awareness and motivation are high and experimentation on using games is widespread, practices appear fragmentary and not widely sustained. As a result of this study, we suggest the creation of an evidence base and a better integration of social support structures into teacher education. This is the first large-scale study to look into Estonian teacher’s actual practices, and although Estonian teachers have relatively high autonomy and technical skills, we believe that these results and further investigations are applicable in other contexts as well.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Publikationsdatum: 2020
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Publikationsdatum: 2020
    Beschreibung: In this paper, we derive recursive algorithms for calculating the determinant and inverse of the generalized Vandermonde matrix. The main advantage of the recursive algorithms is the fact that the computational complexity of the presented algorithm is better than calculating the determinant and the inverse by means of classical methods, developed for the general matrices. The results of this article do not require any symbolic calculations and, therefore, can be performed by a numerical algorithm implemented in a specialized (like Matlab or Mathematica) or general-purpose programming language (C, C++, Java, Pascal, Fortran, etc.).
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Publikationsdatum: 2020
    Beschreibung: With the growth of e-services in the past two decades, the concept of web accessibility has been given attention to ensure that every individual can benefit from these services without any barriers. Web accessibility is considered one of the main factors that should be taken into consideration while developing webpages. Web Content Accessibility Guidelines 2.0 (WCAG 2.0) have been developed to guide web developers to ensure that web contents are accessible for all users, especially disabled users. Many automatic tools have been developed to check the compliance of websites with accessibility guidelines such as WCAG 2.0 and to help web developers and content creators with designing webpages without barriers for disabled people. Despite the popularity of accessibility evaluation tools in practice, there is no systematic way to compare the performance of web accessibility evaluators. This paper first presents two novel frameworks. The first one is proposed to compare the performance of web accessibility evaluation tools in detecting web accessibility issues based on WCAG 2.0. The second framework is utilized to evaluate webpages in meeting these guidelines. Six homepages of Saudi universities were chosen as case studies to substantiate the concept of the proposed frameworks. Furthermore, two popular web accessibility evaluators, Wave and SiteImprove, are selected to compare their performance. The outcomes of studies conducted using the first proposed framework showed that SiteImprove outperformed WAVE. According to the outcomes of the studies conducted, we can conclude that web administrators would benefit from the first framework in selecting an appropriate tool based on its performance to evaluate their websites based on accessibility criteria and guidelines. Moreover, the findings of the studies conducted using the second proposed framework showed that the homepage of Taibah University is more accessible than the homepages of other Saudi universities. Based on the findings of this study, the second framework can be used by web administrators and developers to measure the accessibility of their websites. This paper also discusses the most common accessibility issues reported by WAVE and SiteImprove.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Publikationsdatum: 2020
    Beschreibung: Disaster scenarios are particularly catastrophic in urban environments, which are very densely populated in many cases. Disasters not only endanger the life of people, but also affect the existing communication infrastructures. In fact, such an infrastructure could be completely destroyed or damaged; even when it continues working, it suffers from high access demand to its limited resources within a short period of time. This work evaluates the performances of smartphones and leverages the ubiquitous presence of mobile devices in urban scenarios to assist search and rescue activities following a disaster. Specifically, it proposes a collaborative protocol that opportunistically organizes mobile devices in multiple tiers by targeting a fair energy consumption in the whole network. Moreover, it introduces a data collection scheme that employs drones to scan the disaster area and to visit mobile devices and collect their data in a short time. Simulation results in realistic settings show that the proposed solution balances the energy consumption in the network by means of efficient drone routes and smart self-organization, thereby effectively assisting search and rescue operations.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Publikationsdatum: 2020
    Beschreibung: Since the actual factors in the instant distribution service scenario are not considered enough in the existing distribution route optimization, a route optimization model of the instant distribution system based on customer time satisfaction is proposed. The actual factors in instant distribution, such as the soft time window, the pay-to-order mechanism, the time for the merchant to prepare goods before delivery, and the deliveryman’s order combining, were incorporated in the model. A multi-objective optimization framework based on the total cost function and time satisfaction of the customer was established. Dual-layer chromosome coding based on the deliveryman-to-node mapping and the access order was conducted, and the nondominated sorting genetic algorithm version II (NSGA-II) was used to solve the problem. According to the numerical results, when time satisfaction of the customer was considered in the instant distribution routing problem, the customer satisfaction increased effectively and the balance between customer satisfaction and delivery cost in the means of Pareto optimization were obtained, with a minor increase in the delivery cost, while the number of deliverymen slightly increased to meet the on-time delivery needs of customers.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Publikationsdatum: 2020
    Beschreibung: Relation extraction is an important task with many applications in natural language processing, such as structured knowledge extraction, knowledge graph construction, and automatic question answering system construction. However, relatively little past work has focused on the construction of the corpus and extraction of Uyghur-named entity relations, resulting in a very limited availability of relation extraction research and a deficiency of annotated relation data. This issue is addressed in the present article by proposing a hybrid Uyghur-named entity relation extraction method that combines a conditional random field model for making suggestions regarding annotation based on extracted relations with a set of rules applied by human annotators to rapidly increase the size of the Uyghur corpus. We integrate our relation extraction method into an existing annotation tool, and, with the help of human correction, we implement Uyghur relation extraction and expand the existing corpus. The effectiveness of our proposed approach is demonstrated based on experimental results by using an existing Uyghur corpus, and our method achieves a maximum weighted average between precision and recall of 61.34%. The method we proposed achieves state-of-the-art results on entity and relation extraction tasks in Uyghur.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Publikationsdatum: 2020
    Beschreibung: Traditional methods for identifying naming ignore the correlation between named entities and lose hierarchical structural information between the named entities in a given text. Although traditional named-entity methods are effective for conventional datasets that have simple structures, they are not as effective for sports texts. This paper proposes a Chinese sports text named-entity recognition method based on a character graph convolutional neural network (Char GCN) with a self-attention mechanism model. In this method, each Chinese character in the sports text is regarded as a node. The edge between the nodes is constructed using a similar character position and the character feature of the named-entity in the sports text. The internal structural information of the entity is extracted using a character map convolutional neural network. The hierarchical semantic information of the sports text is captured by the self-attention model to enhance the relationship between the named entities and capture the relevance and dependency between the characters. The conditional random fields classification function can accurately identify the named entities in the Chinese sports text. The results conducted on four datasets demonstrate that the proposed method improves the F-Score values significantly to 92.51%, 91.91%, 93.98%, and 95.01%, respectively, in comparison to the traditional naming methods.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Publikationsdatum: 2020
    Beschreibung: With the development and popular application of Building Internet of Things (BIoT) systems, numerous types of equipment are connected, and a large volume of equipment data is collected. For convenient equipment management, the equipment should be identified and labeled. Traditionally, this process is performed manually, which not only is time consuming but also causes unavoidable omissions. In this paper, we propose a k-means clustering-based electrical equipment identification toward smart building application that can automatically identify the unknown equipment connected to BIoT systems. First, load characteristics are analyzed and electrical features for equipment identification are extracted from the collected data. Second, k-means clustering is used twice to construct the identification model. Preliminary clustering adopts traditional k-means algorithm to the total harmonic current distortion data and separates equipment data into two to three clusters on the basis of their electrical characteristics. Later clustering uses an improved k-means algorithm, which weighs Euclidean distance and uses the elbow method to determine the number of clusters and analyze the results of preliminary clustering. Then, the equipment identification model is constructed by selecting the cluster centroid vector and distance threshold. Finally, identification results are obtained online on the basis of the model outputs by using the newly collected data. Successful applications to BIoT system verify the validity of the proposed identification method.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Publikationsdatum: 2020
    Beschreibung: This article presents a defect detection model of sugarcane plantation images. The objective is to assess the defect areas occurring in the sugarcane plantation before the harvesting seasons. The defect areas in the sugarcane are usually caused by storms and weeds. This defect detection algorithm uses high-resolution sugarcane plantations and image processing techniques. The algorithm for defect detection consists of four processes: (1) data collection, (2) image preprocessing, (3) defect detection model creation, and (4) application program creation. For feature extraction, the researchers used image segmentation and convolution filtering by 13 masks together with mean and standard deviation. The feature extraction methods generated 26 features. The K-nearest neighbors algorithm was selected to develop a model for the classification of the sugarcane areas. The color selection method was also chosen to detect defect areas. The results show that the model can recognize and classify the characteristics of the objects in sugarcane plantation images with an accuracy of 96.75%. After the comparison with the expert surveyor’s assessment, the accurate relevance obtained was 92.95%. Therefore, the proposed model can be used as a tool to calculate the percentage of defect areas and solve the problem of evaluating errors of yields in the future.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Publikationsdatum: 2020
    Beschreibung: Today, Android accounts for more than 80% of the global market share. Such a high rate makes Android applications an important topic that raises serious questions about its security, privacy, misbehavior and correctness. Application code analysis is obviously the most appropriate and natural means to address these issues. However, no analysis could be led with confidence in the absence of a solid formal foundation. In this paper, we propose a full-fledged formal approach to build the operational semantics of a given Android application by reverse-engineering its assembler-type code, called Smali. We call the new formal language Smali + . Its semantics consist of two parts. The first one models a single-threaded program, in which a set of main instructions is presented. The second one presents the semantics of a multi-threaded program which is an important feature in Android that has been glossed over in the-state-of-the-art works. All multi-threading essentials such as scheduling, threads communication and synchronization are considered in these semantics. The resulting semantics, forming Smali + , are intended to provide a formal basis for developing security enforcement, analysis and misbehaving detection techniques for Android applications.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Publikationsdatum: 2020
    Beschreibung: This paper gives an overview of the cutting-edge approaches that perform facial cue analysis in the healthcare area. The document is not limited to global face analysis but it also concentrates on methods related to local cues (e.g., the eyes). A research taxonomy is introduced by dividing the face in its main features: eyes, mouth, muscles, skin, and shape. For each facial feature, the computer vision-based tasks aiming at analyzing it and the related healthcare goals that could be pursued are detailed.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Publikationsdatum: 2020
    Beschreibung: Public administrations handle large amounts of data in relation to their internal processes as well as to the services that they offer. Following public-sector information reuse regulations and worldwide open data publication trends, these administrations are increasingly publishing their data as open data. However, open data are often released without agreed data models and in non-reusable formats, reducing interoperability and efficiency in data reuse. These aspects hinder interoperability with other administrations and do not allow taking advantage of the associated knowledge in an efficient manner. This paper presents the continued work performed by the Zaragoza city council over more than 15 years in order to generate its knowledge graph, which constitutes the key piece of their data management system, whose main strengthen is the open-data-by-default policy. The main functionalities that have been developed for the internal and external exploitation of the city’s open data are also presented. Finally, some city council experiences and lessons learned during this process are also explained.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Publikationsdatum: 2020
    Beschreibung: In the modern business environment, characterized by rapid technological advancements and globalization, abetted by IoT and Industry 5.0 phenomenon, innovation is indispensable for competitive advantage and economic growth. However, many organizations are facing problems in its true implementation due to the absence of a practical innovation management framework, which has made the implementation of the concept elusive instead of persuasive. The present study has proposed a new innovation management framework labeled as “Absolute Innovation Management (AIM)” to make innovation more understandable, implementable, and part of the organization’s everyday routine by synergizing the innovation ecosystem, design thinking, and corporate strategy to achieve competitive advantage and economic growth. The current study used an integrative literature review methodology to develop the “Absolute Innovation Management” framework. The absolute innovation management framework links the innovation ecosystem with the corporate strategy of the firm by adopting innovation management as a strategy through design thinking. Thus, making innovation more user/human-centered that is desirable by the customer, viable for business and technically feasible, creating both entrepreneurial and customer value, and boosting corporate venturing and corporate entrepreneurship to achieve competitive advantage and economic growth while addressing the needs of IoT and Industry 5.0 era. In sum, it synergizes innovation, design thinking, and strategy to make businesses future-ready for IoT and industry 5.0 revolution. The present study is significant, as it not only make considerable contributions to the existing literature on innovation management by developing a new framework but also makes the concept more practical, implementable and part of an organization’s everyday routine.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Publikationsdatum: 2020
    Beschreibung: The Treemap is one of the most relevant information visualization (InfoVis) techniques to support the analysis of large hierarchical data structures or data clusters. Despite that, Treemap still presents some challenges for data representation, such as the few options for visual data mappings and the inability to represent zero and negative values. Additionally, visualizing high dimensional data requires many hierarchies, which can impair data visualization. Thus, this paper proposes to add layered glyphs to Treemap’s items to mitigate these issues. Layered glyphs are composed of N partially visible layers, and each layer maps one data dimension to a visual variable. Since the area of the upper layers is always smaller than the bottom ones, the layers can be stacked to compose a multidimensional glyph. To validate this proposal, we conducted a user study to compare three scenarios of visual data mappings for Treemaps: only Glyphs (G), Glyphs and Hierarchy (GH), and only Hierarchy (H). Thirty-six volunteers with a background in InfoVis techniques, organized into three groups of twelve (one group per scenario), performed 8 InfoVis tasks using only one of the proposed scenarios. The results point that scenario GH presented the best accuracy while having a task-solving time similar to scenario H, which suggests that representing more data in Treemaps with layered glyphs enriched the Treemap visualization capabilities without impairing the data readability.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Publikationsdatum: 2020
    Beschreibung: Traffic lights have been used for decades to control and manage traffic flows crossing road intersections to increase traffic efficiency and road safety. However, relying on fixed time cycles may not be ideal in dealing with the increasing congestion level in cities. Therefore, we propose a new Adaptive Traffic Light Control System (ATLCS) to assist traffic management authorities in efficiently dealing with traffic congestion in cities. The main idea of our ATLCS consists in synchronizing a number of traffic lights controlling consecutive junctions by creating a delay between the times at which each of them switches to green in a given direction. Such a delay is dynamically updated based on the number of vehicles waiting at each junction, thereby allowing vehicles leaving the city centre to travel a long distance without stopping (i.e., minimizing the number of occurrences of the `stop and go’ phenomenon), which in turn reduces their travel time as well. The performance evaluation of our ATLCS has shown that the average travel time of vehicles traveling in the synchronized direction has been significantly reduced (by up to 39%) compared to non-synchronized fixed time Traffic Light Control Systems. Moreover, the overall achieved improvement across the simulated road network was 17%.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Publikationsdatum: 2020
    Beschreibung: This paper examines how social media are affecting Japanese civil society organizations, in relation to efficacy and political participation. Using data from the 2017 Japan Interest Group Study survey, we analyzed how the flow of information leads to the political participation of civil society organizations. The total number of respondents (organizations) were 1285 (942 organizations in Tokyo and 343 from Ibaraki). In the analysis of our survey we focused on the data portion related to information behavior and efficacy and investigated the meta-cognition of efficacy in lobbying among civil society organizations in Tokyo and Ibaraki. We found that organizations that use social media were relatively few. However, among the few organizations that use social media, we found that these organizations have a much higher meta-cognition of political efficacy in comparison to those that do not use social media. For instance, social media usage had a higher tendency of having cognition of being able to exert influence upon others. We also found that organizations that interact with citizens have a higher tendency to use social media. The correspondence analysis results point towards a hypothesis of how efficacy and participation are mutually higher among the organizations that use social media in Japan.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Publikationsdatum: 2020
    Beschreibung: Aiming at the problem that the assembly body model is difficult to classify and retrieve(large information redundancy and poor data consistency), an assembly body retrieval methodoriented to key structures was presented. In this paper, a decision formal context is transformedfrom the 3D structure model. The 3D assembly structure model of parts is defined by the adjacencygraph of function surface and qualitative geometric constraint graph. The assembly structure iscoded by the linear symbol representation of compounds in chemical database. An importance orcohesion as the weight to a decision-making objective on the context is defined by a rough set method.A weighted concept lattice is introduced on it. An important formal concept means a key structure,since the concept represents the relations between parts’ function surfaces. It can greatly improve thequery efficiency.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Publikationsdatum: 2020
    Beschreibung: Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and even controlling them. Several role-based access control (RBAC) mechanisms have been proposed to alleviate these problems, but the security has not been fully realized. In this work, however, we present an RBAC model based on blockchain technology to enhance user authentication before knowledge is accessed and utilized in a knowledge management system (KMS). Our blockchain-based system model and the smart contract ensure that transparency and knowledge resource immutability are achieved. We also present smart contract algorithms and discussions about the model. As an essential part of RBAC model applied to KMS environment, trust is ensured in the network. Evaluation results show that our system is efficient.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Publikationsdatum: 2020
    Beschreibung: The location and grade setting of a timber logistics center is an important link in the optimization of the timber logistics system, the rationality of which can effectively improve the efficiency of the timber logistics supply chain. There is a long distance between the main forested areas in China, and more than 55% of the timber demand depends on imports. Research and practice of systematically planning timber logistics centers in the whole country have not been well carried out, which reduces the efficiency of timber logistics. In this paper, 47 timber trading markets with a certain scale in China are selected as the basis for logistics center selection. Based on their transportation network relationship and the number of enterprises in the market, combined with the complex network theory and data analysis method, the network characteristics of three different transportation networks are measured. After determining the transportation capacity indicator, the logistics capacity coefficient is measured based on the freight volume of each node. Then, the important nodes are identified, and each node is graded to systematically set up the timber logistics center.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Publikationsdatum: 2020
    Beschreibung: The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of industrial control systems. This paper proposes an incremental unsupervised anomaly detection method that can quickly analyze and process large-scale real-time data. Our evaluation on the Secure Water Treatment dataset shows that the method is converging to its offline counterpart for infinitely growing data streams.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Publikationsdatum: 2020
    Beschreibung: Algorithms and abstract automata (abstract machines) are used to describe, model, explore and improve computers, cell phones, computer networks, such as the Internet, and processes in them. Traditional models of information processing systems—abstract automata—are aimed at performing transformations of data. These transformations are performed by their hardware (abstract devices) and controlled by their software (programs)—both of which stay unchanged during the whole computational process. However, in physical computers, their software is also changing by special tools such as interpreters, compilers, optimizers and translators. In addition, people change the hardware of their computers by extending the external memory. Moreover, the hardware of computer networks is incessantly altering—new computers and other devices are added while other computers and other devices are disconnected. To better represent these peculiarities of computers and computer networks, we introduce and study a more complete model of computations, which is called a triadic automaton or machine. In contrast to traditional models of computations, triadic automata (machine) perform computational processes transforming not only data but also hardware and programs, which control data transformation. In addition, we further develop taxonomy of classes of automata and machines as well as of individual automata and machines according to information they produce.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Publikationsdatum: 2020
    Beschreibung: The rise of social networks is rapidly spreading in China. Using social platforms, individuals are no longer just receivers of Internet information, as consumers generate and share contents with others. Social interaction and spontaneous promotion activities are carried out among consumers, but with the growth of traditional e-commerce slowing down, social commerce derived from social networks is gradually taking shape. Based on Hajli’s theoretical model, this study uses the social support theory and social commerce construct to study consumers’ social commerce behavior from a total of 1277 valid sample questionnaires that were distributed in a social platform environment in China. Through the empirical research evaluation using PLS-SEM, the statistical analysis results prove that social commerce constructs do promote social interaction of consumers. Such constructs have a positive effect on social support and social commerce intentions. In this regard, social support is embodied in information support and emotional support, and has a positive effect on social commerce intention. This study also conducts cross-cultural empirical comparisons. In comparison with Hajli’s research, this study has the same results in evaluation of Chinese samples. Among the users who exhibit social commerce intentions, social commerce construction is more important than social support.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Publikationsdatum: 2020
    Beschreibung: Knowledge base (KB) is an important aspect in artificial intelligence. One significant challenge faced by KB construction is that it contains many noises, which prevent its effective usage. Even though some KB cleansing algorithms have been proposed, they focus on the structure of the knowledge graph and neglect the relation between the concepts, which could be helpful to discover wrong relations in KB. Motived by this, we measure the relation of two concepts by the distance between their corresponding instances and detect errors within the intersection of the conflicting concept sets. For efficient and effective knowledge base cleansing, we first apply a distance-based model to determine the conflicting concept sets using two different methods. Then, we propose and analyze several algorithms on how to detect and repair the errors based on our model, where we use a hash method for an efficient way to calculate distance. Experimental results demonstrate that the proposed approaches could cleanse the knowledge bases efficiently and effectively.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Publikationsdatum: 2020
    Beschreibung: In the context of the rapid development of online shopping, enterprises and consumers realized the importance of an effective online short video display. However, academics rarely explored the content of a short video display and its impacts on consumers’ perceptions. This paper discusses the impacts of this display form on consumers’ perceived quality via questionnaires and scenario experiments based on the existing literature and theories. A short video of clothes was the main research object. We used an experimental design that included 2 (time: long, short) × 2 (display perspectives: overall, specific) × 2 (scenarios: outdoors, indoors) groups of experiments, for a total of eight groups of scenario experiments, to verify our hypotheses. The results reveal that the short video display makes consumers have a higher perceived quality compared with the long video display. Compared with a video that only includes an overall view of the product, a video that provides both an overall view and the details of the product makes consumers have a higher perceived quality. Consumers were found to have a higher perceived quality of products shot outdoors compared with products shot indoors.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Publikationsdatum: 2020
    Beschreibung: This paper proposes an improved Harmony Search algorithm, and gives the definition of the Global Sharing Factor of the Harmony Search (HS) algorithm. In the definition, the number of creations of the HS algorithm is applied to the sharing factor and calculated. In this algorithm, the natural harmony encoding method is used to encode the initial harmony, and the total path length of all vehicles is taken as the optimization objective function. A new harmony generation strategy is proposed as follows: each tone component in an evolution is calculated separately using the new learning strategy and update strategy. In the calculation process, the tone component is judged by whether it needs to be adjusted according to the adjustment strategy. In this way, the problems of singularity and randomness of the new harmony generation strategy of basic HS are solved to improve the diversity of algorithm solutions. Then, a new Harmony Search method with Global Sharing Factor based on natural number coding and decoding for the Vehicle Routing Problem (GSF-HS-VRP) is proposed. The improved Global Sharing Factor-Harmony Search-Vehicle Routing Problem (GSF-HS-VRP) algorithm is applied to capacity-limited vehicle path optimization problems compared with the HS, Improved Harmony Search (IHS), Global-best Harmony Search (GHS), and Self-adaptive Global Best Harmony Search (SGHS) algorithms. The small-scale data and Solomon examples were adopted as the experimental data. Compared with the other four algorithms, the GSF-HS-VRP algorithm has the shortest running time, more rapid convergence speed, and higher efficiency. In the multi-vehicle test, with the increase of the number of vehicles, the optimized path of the vehicle is more satisfied in relation to the actual needs of customers. The results showed that this method could effectively improve the optimization performance of the capacity-limited vehicle routing problem.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    facet.materialart.
    Unbekannt
    MDPI
    Publikationsdatum: 2020
    Beschreibung: Energy consumption is a relevant matter in the design of IoT applications. Edge units—sensors and actuators—save energy by operating intermittently. When idle, they suspend their operation, losing the content of the onboard memory. Their internal state, needed to resume their work, is recorded on external storage: in the end, their internal operation is stateless. The backend infrastructure does not follow the same design principle: concentrators, routers, and servers are always-on devices that frustrate the energy-saving operation of edge devices. In this paper, we show how serverless functions, asynchronously invoked by the stateless edge devices, are an energy-saving option. We introduce a basic model for system operation and energy footprint evaluation. To demonstrate its soundness, we study a simple use case, from the design to a prototype.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Publikationsdatum: 2020
    Beschreibung: Location prediction has attracted much attention due to its important role in many location-based services. The existing location prediction methods have large trajectory information loss and low prediction accuracy. Hence, they are unsuitable for vehicle location prediction of the intelligent transportation system, which needs small trajectory information loss and high prediction accuracy. To solve the problem, a vehicle location prediction algorithm was proposed in this paper, which is based on a spatiotemporal feature transformation method and a hybrid long short-term memory (LSTM) neural network model. In the algorithm, the transformation method is used to convert a vehicle trajectory into an appropriate input of the neural network model, and then the vehicle location at the next time is predicted by the neural network model. The experimental results show that the trajectory information of an original taxi trajectory is basically reserved by its shadowed taxi trajectory, and the trajectory points of the predicted taxi trajectory are close to those of the shadowed taxi trajectory. It proves that our proposed algorithm effectively reduces the information loss of vehicle trajectory and improves the accuracy of vehicle location prediction. Furthermore, the experimental results also show that the algorithm has a higher distance percentage and a shorter average distance than the other predication models. Therefore, our proposed algorithm is better than the other prediction models in the accuracy of vehicle location predication.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Publikationsdatum: 2020
    Beschreibung: Named entity recognition (NER) is a fundamental step for many natural language processing tasks and hence enhancing the performance of NER models is always appreciated. With limited resources being available, NER for South-East Asian languages like Telugu is quite a challenging problem. This paper attempts to improve the NER performance for Telugu using gazetteer-related features, which are automatically generated using Wikipedia pages. We make use of these gazetteer features along with other well-known features like contextual, word-level, and corpus features to build NER models. NER models are developed using three well-known classifiers—conditional random field (CRF), support vector machine (SVM), and margin infused relaxed algorithms (MIRA). The gazetteer features are shown to improve the performance, and theMIRA-based NER model fared better than its counterparts SVM and CRF.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Publikationsdatum: 2020
    Beschreibung: The last few decades have seen widespread advances in technological means to characterise observable aspects of human behaviour such as gaze or posture. Among others, these developments have also led to significant advances in social robotics. At the same time, however, social robots are still largely evaluated in idealised or laboratory conditions, and it remains unclear whether the technological progress is sufficient to let such robots move “into the wild”. In this paper, we characterise the problems that a social robot in the real world may face, and review the technological state of the art in terms of addressing these. We do this by considering what it would entail to automate the diagnosis of Autism Spectrum Disorder (ASD). Just as for social robotics, ASD diagnosis fundamentally requires the ability to characterise human behaviour from observable aspects. However, therapists provide clear criteria regarding what to look for. As such, ASD diagnosis is a situation that is both relevant to real-world social robotics and comes with clear metrics. Overall, we demonstrate that even with relatively clear therapist-provided criteria and current technological progress, the need to interpret covert behaviour cannot yet be fully addressed. Our discussions have clear implications for ASD diagnosis, but also for social robotics more generally. For ASD diagnosis, we provide a classification of criteria based on whether or not they depend on covert information and highlight present-day possibilities for supporting therapists in diagnosis through technological means. For social robotics, we highlight the fundamental role of covert behaviour, show that the current state-of-the-art is unable to characterise this, and emphasise that future research should tackle this explicitly in realistic settings.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Publikationsdatum: 2020
    Beschreibung: Drivers struggle to understand how, and when, to safely use their cars’ complex automated functions. Training is necessary but costly and time consuming. A Digital In-Car Tutor (DIT) is proposed to support drivers in learning about, and trying out, their car automation during regular drives. During this driving simulator study, we investigated the effects of a DIT prototype on appropriate automation use and take-over quality. The study had three sessions, each containing multiple driving scenarios. Participants needed to use the automation when they thought that it was safe, and turn it off if it was not. The control group read an information brochure before driving, while the experiment group received the DIT during the first driving session. DIT users showed more correct automation use and a better take-over quality during the first driving session. The DIT especially reduced inappropriate reliance behaviour throughout all sessions. Users of the DIT did show some under-trust during the last driving session. Overall, the concept of a DIT shows potential as a low-cost and time-saving solution for safe guided learning in partially automated cars.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Publikationsdatum: 2020
    Beschreibung: This paper focuses on the characteristics of research data quality, and aims to cover the most important issues related to it, giving particular attention to its attributes and to data governance. The corporate word’s considerable interest in the quality of data is obvious in several thoughts and issues reported in business-related publications, even if there are apparent differences between values and approaches to data in corporate and in academic (research) environments. The paper also takes into consideration that addressing data quality would be unimaginable without considering big data.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Publikationsdatum: 2020
    Beschreibung: To improve utilization of text storage resources and efficiency of data transmission, we proposed two syllable-based Uyghur text compression coding schemes. First, according to the statistics of syllable coverage of the corpus text, we constructed a 12-bit and 16-bit syllable code tables and added commonly used symbols—such as punctuation marks and ASCII characters—to the code tables. To enable the coding scheme to process Uyghur texts mixed with other language symbols, we introduced a flag code in the compression process to distinguish the Unicode encodings that were not in the code table. The experiments showed that the 12-bit coding scheme had an average compression ratio of 0.3 on Uyghur text less than 4 KB in size and that the 16-bit coding scheme had an average compression ratio of 0.5 on text less than 2 KB in size. Our compression schemes outperformed GZip, BZip2, and the LZW algorithm on short text and could be effectively applied to the compression of Uyghur short text for storage and applications.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Publikationsdatum: 2020
    Beschreibung: Inferring customers’ preferences and recommending suitable products is a challenging task for companies, although recommender systems are constantly evolving. Loyalty is an indicator that measures the preference relationship between customers and products in the field of marketing. To this end, the aim of this study is to explore whether customer loyalty can improve the accuracy of the recommender system. Two algorithms based on complex networks are proposed: a recommendation algorithm based on bipartite graph and PersonalRank (BGPR), and a recommendation algorithm based on single vertex set network and DeepWalk (SVDW). In both algorithms, loyalty is taken as an attribute of the customer, and the relationship between customers and products is abstracted into the network topology. During the random walk among nodes in the network, product recommendations for customers are completed. Taking a real estate group in Malaysia as an example, the experimental results verify that customer loyalty can indeed improve the accuracy of the recommender system. We can also conclude that companies are more effective at recommending customers with moderate loyalty levels.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Publikationsdatum: 2020
    Beschreibung: In this study, a total of 94,511 surveys were used for the analysis, using raw data from the recent 3 years (2016–2018) of the Korea Youth Risk Behavior Survey (KYRBS) to compare differences in obesity rates based on eating behavior and physical activity among high school students. The cross-analysis and logistic regression were performed in the composite sample design using the SPSS 25.0 statistical package. The results are as follows. First, the more physical activity male students have, the lower the obesity rate. Female students, however, showed a minor difference. Second, the group that drinks the soda was 1158 times more likely to be obese than the group that does not drink the soda, and third, the group that eats the fast food was 1129 times more likely to be obese than the group that does not. Fourth, students belonging to male or female schools had a 1230 times higher obesity rate than coeducational students. Fifth, the obesity rate was 1150 times higher for second grade and 1263 times higher for third grade compared to the first grade. Finally, there was no significant difference related to the nutrition education. It is suggested that, to fight youth obesity in high school students, institutions need to raise public awareness of this problem through information campaigns aimed at improving and fostering potentially existing educational measures.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Publikationsdatum: 2020
    Beschreibung: Digital and networking technologies are increasingly used to predict who is at risk of attempting suicide. Such digitalized suicide prevention within and beyond mental health care raises ethical, social and legal issues for a range of actors involved. Here, I will draw on key literature to explore what issues (might) arise in relation to digitalized suicide prevention practices. I will start by reviewing some of the initiatives that are already implemented, and address some of the issues associated with these and with potential future initiatives. Rather than addressing the breadth of issues, however, I will then zoom in on two key issues: first, the duty of care and the duty to report, and how these two legal and professional standards may change within and through digitalized suicide prevention; and secondly a more philosophical exploration of how digitalized suicide prevention may alter human subjectivity. To end with the by now famous adagio, digitalized suicide prevention is neither good nor bad, nor is it neutral, and I will argue that we need sustained academic and social conversation about who can and should be involved in digitalized suicide prevention practices and, indeed, in what ways it can and should (not) happen.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Publikationsdatum: 2020
    Beschreibung: Together with the disruptive development of modern sub-symbolic approaches to artificial intelligence (AI), symbolic approaches to classical AI are re-gaining momentum, as more and more researchers exploit their potential to make AI more comprehensible, explainable, and therefore trustworthy. Since logic-based approaches lay at the core of symbolic AI, summarizing their state of the art is of paramount importance now more than ever, in order to identify trends, benefits, key features, gaps, and limitations of the techniques proposed so far, as well as to identify promising research perspectives. Along this line, this paper provides an overview of logic-based approaches and technologies by sketching their evolution and pointing out their main application areas. Future perspectives for exploitation of logic-based technologies are discussed as well, in order to identify those research fields that deserve more attention, considering the areas that already exploit logic-based approaches as well as those that are more likely to adopt logic-based approaches in the future.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Publikationsdatum: 2020
    Beschreibung: Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situation that different values of a sensitive attribute may have different sensitivity requirements. To solve this problem, we defined three security levels for different sensitive attribute values that have different sensitivity requirements, and given an L s l -diversity model for multiple sensitive attributes. Following this, we proposed three specific greed algorithms based on the maximal-bucket first (MBF), maximal single-dimension-capacity first (MSDCF) and maximal multi-dimension-capacity first (MMDCF) algorithms and the maximal security-level first (MSLF) greed policy, named as MBF based on MSLF (MBF-MSLF), MSDCF based on MSLF (MSDCF-MSLF) and MMDCF based on MSLF (MMDCF-MSLF), to implement the L s l -diversity model for multiple sensitive attributes. The experimental results show that the three algorithms can greatly reduce the information loss of the published microdata, but their runtime is only a small increase, and their information loss tends to be stable with the increasing of data volume. And they can solve the problem that the information loss of MBF, MSDCF and MMDCF increases greatly with the increasing of sensitive attribute number.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Publikationsdatum: 2020
    Beschreibung: The main drivers for the continuous development of Vehicular ad-hoc Networks (VANETs) are safety applications and services. However, in recent years, new interests have emerged regarding the introduction of new applications and services for non-urgent content (e.g., videos, ads, sensing and touristic information) dissemination. However, there is a lack of real studies considering content dissemination strategies to understand when and to whom the content should be disseminated using real vehicular traces gathered from real vehicular networks. This work presents a realistic study of strategies for dissemination of non-urgent content with the main goal of improving content delivery as well as minimizing network congestion and resource usage. First, we perform an exhaustive network characterization. Then, several content strategies are specified and evaluated in different scenarios (city center and parking lot). All the obtained results show that there are two content distribution strategies that clearly set themselves apart due to their superior performance: Local Rarest Bundle First and Local Rarest Generation First.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Publikationsdatum: 2020
    Beschreibung: The article outlines the main concept and examples of mathematical models needed to estimate system potential and digitalization performance indicators. Such an estimation differs in that it is performed with predictive mathematical models. The purpose of such an estimation is to enable a set of problems of system design and functional design of information technologies to be solved as mathematical problems, predictively and analytically. The hypothesis of the research is that the quality of system functioning in changing conditions can be evaluated analytically, based on predictive mathematical models. We suggested a property of the system potential (or system capability) that describes the effects of the compliance of changing system functioning with changing conditions analytically and predictively. Thus, it describes the performance of the use of information operations to realize functioning in changing conditions. The example includes system’s environment graph-theoretic models and system’s models regarding IT use to react to changing environments. As a result of the suggested models and methods, the quantitative estimation of system potential regarding information technology use becomes possible depending on the parameters and variables of the problems to be solved. Use cases of problems decision with the use of such indicators include choosing optimal information technology implementation and the synthesis of information operation characteristics.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Publikationsdatum: 2020
    Beschreibung: This paper is a part of an exploratory study with the goal of investigating the applicability of collaboratively-developed enterprise resource planning (the CD-ERP approach) within Libyan public universities. Since it is being proposed in order to overcome the topical issue of information system (IS) development in Libyan higher education (LHE), Libyan universities were investigated to assess IS performance while using the approach of methodological assessment. Accordingly, three public universities were chosen to be studied, namely the University of Tripoli (UOT), Misurata University (MU), and Sirte University (SU). The UOT was run as an initial study to identify practical problems in conducting a formal study. Previous papers have discussed the use of a formal study, in which a methodological assessment of IS performance at Libyan universities was conducted. The findings from all three cases are discussed and analyzed on the basis of selected techniques and models. This analysis indicates the low level of the ISs implemented in LHE at the university level, as well as the lack of system development capabilities within these universities. This paper focuses on the management of information flow between universities during student exchange. Business process maps are presented, and improvements based on the CD-ERP approach are proposed.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Publikationsdatum: 2020
    Beschreibung: Robotic and other autonomous systems that need to operate in environments with people should respect social rules. One important aspect of this is personal space, which is the space surrounding a person. When two people are in a conversation, they position themselves such that a so-called shared interaction space is created in the middle of them. The aim of the current research was to experimentally investigate the shape and size of this shared interaction space in different formations. In three experiments, we had a robot approaching two people who were having a conversation from 5 different directions, and those people indicated what would be a comfortable distance for the robot to stop. We expected that people would take the personal space of their conversation partner into account when stopping the robot. Findings of the three studies mostly confirm this expectation. Apart from some exceptions, people tend to stop the robot at a similar distance from their conversation partner as from themselves. If these findings are applied in the behavior of robotic and other autonomous systems, people would be more likely to trust and later accept robots in their physical space, ultimately creating natural social interactions between humans and robots.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Publikationsdatum: 2020
    Beschreibung: DouDiZhu, a multiplayer game with incomplete information, is the most popular card game in China. Although there are many DouDiZhu card games in the world, the specific characteristics of classical DouDiZhu card games are a harmonious combination of player numbers, player characters (landlords and peasants), deck numbers, and scoring systems. However, research on the complexity and attractiveness of DouDiZhu has not established. Therefore, in this paper, artificial intelligence (AI) players of different levels of DouDiZhu game were constructed for research, self-game simulation was conducted for DouDiZhu AI players, and game refinement measures were used to evaluate and identify the best Settings of the game. The results show that classical DouDiZhu provides the most complex game setup for all types of DouDiZhu AI players, while also clarifying its popularity.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Publikationsdatum: 2020
    Beschreibung: This paper aims to review, characterize and comparatively analyze selected organizations’ analytics maturity models. Eleven various organizations’ analytics maturity models (AMMs) were characterized. The models’ characteristics were developed based on an academic literature review as well as reports and publications shared by analytics sector operators. Most of the analyzed models comprised five analytics maturity levels. Comprehensive descriptions of an organization’s analytics maturity levels were available for all models. However, no detailed description of the assessment process or criteria for placing an organization at a specific analytics development level were available in all cases. Selected analytics maturity models were described in such a detailed manner that their application in an independent assessment of an organization’s analytics maturity was possible. In the future, an increase is expected in both the number and availability of new analytics maturity models, in particular those personalized and dedicated to a specific sector or business, and the number of entities involved in an assessment of an organization’s analytics maturity and the implementation of data analytics in organizations. The article presents and summarizes selected features of eleven various organizations’ analytics maturity models. This is the firstever such extensive review of those models.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Publikationsdatum: 2020
    Beschreibung: The negative impact of brand negative online word-of-mouth (OWOM) on social images in social media is far greater than the promotion of positive OWOM. Thus, how to optimize brand image by improving the positive OWOM effect and slowing the negative OWOM communication has turned into an urgent problem for brand enterprises. On this basis, we analyze the evolution process of the OWOM communication group of the social media brand network based on the SOR (stimulus-organism-response) theory of psychology. Through constructing the heterogeneous brand OWOM communication dynamic model and conducting the multi-agent-based simulation experiment, the dynamic visualization of brand OWOM communication effect combined the thinking model of viral marketing is realized. Experiments show that the ability of brand communicators to persuade has a direct impact on the persistence and breadth of brand communication. When the acceptance of the consumer market is high, the negative OWOM of the brand has a relatively huge impact on consumers.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Publikationsdatum: 2020
    Beschreibung: After publication of the research paper [1], two identical figures were pointed out: Figure 18 and Figure 19. In fact, the wrong figure was Figure 19[...]
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Publikationsdatum: 2020
    Beschreibung: Research on the role of non-driving related tasks (NDRT) in the area of automated driving is indispensable. At the same time, the construct mode awareness has received considerable interest in regard to human–machine interface (HMI) evaluation. Based on the expectation that HMI design and practice with different levels of driving automation influence NDRT engagement, a driving simulator study was conducted. In a 2 × 5 (automation level x block) design, N = 49 participants completed several transitions of control. They were told that they could engage in an NDRT if they felt safe and comfortable to do so. The NDRT was the Surrogate Reference Task (SuRT) as a representative of a wide range of visual–manual NDRTs. Engagement (i.e., number of inputs on the NDRT interface) was assessed at the onset of a respective episode of automated driving (i.e., after transition) and during ongoing automation (i.e., before subsequent transition). Results revealed that over time, NDRT engagement increased during both L2 and L3 automation until stable engagement at the third block. This trend was observed for both onset and ongoing NDRT engagement. The overall engagement level and the increase in engagement are significantly stronger for L3 automation compared to L2 automation. These results outline the potential of NDRT engagement as an online non-intrusive measure for mode awareness. Moreover, repeated interaction is necessary until users are familiar with the automated system and its HMI to engage in NDRTs. These results provide researchers and practitioners with indications about users’ minimum degree of familiarity with driving automation and HMIs for mode awareness testing.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Publikationsdatum: 2020
    Beschreibung: The projected introduction of conditional automated driving systems to the market has sparked multifaceted research on human–machine interfaces (HMIs) for such systems. By moderating the roles of the human driver and the driving automation system, the HMI is indispensable in avoiding side effects of automation such as mode confusion, misuse, and disuse. In addition to safety aspects, the usability of HMIs plays a vital role in improving the trust and acceptance of the automated driving system. This paper aggregates common research methods and findings based on an extensive literature review. Empirical studies, frameworks, and review articles are included. Findings and conclusions are presented with a focus on study characteristics such as test cases, dependent variables, testing environments, or participant samples. These methods and findings are discussed critically, taking into consideration requirements for usability assessments of HMIs in the context of conditional automated driving. The paper concludes with a derivation of recommended study characteristics framing best practice advice for the design of experiments. The advised selection of scenarios and metrics will be applied in a future validation study series comprising a driving simulator experiment and three real driving experiments on test tracks in Germany, the USA, and Japan.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Publikationsdatum: 2020
    Beschreibung: Time crystal was conceived in the 1970s as an autonomous engine made of only clocks to explain the life-like features of a virus. Later, time crystal was extended to living cells like neurons. The brain controls most biological clocks that regenerate the living cells continuously. Most cognitive tasks and learning in the brain run by periodic clock-like oscillations. Can we integrate all cognitive tasks in terms of running clocks of the hardware? Since the existing concept of time crystal has only one clock with a singularity point, we generalize the basic idea of time crystal so that we could bond many clocks in a 3D architecture. Harvesting inside phase singularity is the key. Since clocks reset continuously in the brain–body system, during reset, other clocks take over. So, we insert clock architecture inside singularity resembling brain components bottom-up and top-down. Instead of one clock, the time crystal turns to a composite, so it is poly-time crystal. We used century-old research on brain rhythms to compile the first hardware-free pure clock reconstruction of the human brain. Similar to the global effort on connectome, a spatial reconstruction of the brain, we advocate a global effort for more intricate mapping of all brain clocks, to fill missing links with respect to the brain’s temporal map. Once made, reverse engineering the brain would remain a mere engineering challenge.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Publikationsdatum: 2020
    Beschreibung: Paraphrase detection is important for a number of applications, including plagiarism detection, authorship attribution, question answering, text summarization, text mining in general, etc. In this paper, we give a performance overview of various types of corpus-based models, especially deep learning (DL) models, with the task of paraphrase detection. We report the results of eight models (LSI, TF-IDF, Word2Vec, Doc2Vec, GloVe, FastText, ELMO, and USE) evaluated on three different public available corpora: Microsoft Research Paraphrase Corpus, Clough and Stevenson and Webis Crowd Paraphrase Corpus 2011. Through a great number of experiments, we decided on the most appropriate approaches for text pre-processing: hyper-parameters, sub-model selection—where they exist (e.g., Skipgram vs. CBOW), distance measures, and semantic similarity/paraphrase detection threshold. Our findings and those of other researchers who have used deep learning models show that DL models are very competitive with traditional state-of-the-art approaches and have potential that should be further developed.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Publikationsdatum: 2020
    Beschreibung: This article presents the use of data processing to apprehend mathematical questions such as the Riemann Hypothesis (RH) by numerical calculation. Calculations are performed alongside graphs of the argument of the complex numbers ζ(x+iy)=a+ib and ξ(x+iy)=p+iq, in the critical strip. On the one hand, the two-dimensional surface angle tan−1(b/a) of the Riemann Zeta function ζ  is related to the semi-angle of the fractional part of y2πln(y2π) and, on the other hand, the Ksi function ζ  of the Riemann functional equation is analyzed with respect to the coordinates (x,1−x;y). The computation of the power series expansion of the ξ function with its symmetry analysis highlights the RH by the underlying ratio of Gamma functions inside the ζ  formula. The ζ  power series beside the angle of both surfaces of the ζ  function enables to exhibit a Bézout identity au+bv≡c between the components (a,b) of the ζ function, which illustrates the RH. The geometric transformations in complex space of the Zeta and Ksi functions, illustrated graphically, as well as series expansions, calculated by computer, make it possible to elucidate this mathematical problem numerically. A final theoretical outlook gives deeper insights on the functional equation’s mechanisms, by adopting a computer–scientific perspective.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Publikationsdatum: 2020
    Beschreibung: The use of technological solutions to address the production of goods and offering of services is ubiquitous. Health and social issues, however, have only slowly been permeated by technological solutions. Whilst several advances have been made in health in recent years, the adoption of technology to combat social problems has lagged behind. In this paper, we explore Big Data-driven Artificial Intelligence (AI) applied to social systems; i.e., social computing, the concept of artificial intelligence as an enabler of novel social solutions. Through a critical analysis of the literature, we elaborate on the social and human interaction aspects of technology that must be in place to achieve such enabling and address the limitations of the current state of the art in this regard. We review cultural, political, and other societal impacts of social computing, impact on vulnerable groups, and ethically-aligned design of social computing systems. We show that this is not merely an engineering problem, but rather the intersection of engineering with health sciences, social sciences, psychology, policy, and law. We then illustrate the concept of ethically-designed social computing with a use case of our ongoing research, where social computing is used to support safety and security in home-sharing settings, in an attempt to simultaneously combat youth homelessness and address loneliness in seniors, identifying the risks and potential rewards of such a social computing application.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Publikationsdatum: 2020
    Beschreibung: This paper examines how machine learning (ML) and natural language processing (NLP) can be used to identify, analyze, and generate West African folk tales. Two corpora of West African and Western European folk tales are compiled and used in three experiments on cross-cultural folk tale analysis. In the text generation experiment, two types of deep learning text generators are built and trained on the West African corpus. We show that although the texts range between semantic and syntactic coherence, each of them contains West African features. The second experiment further examines the distinction between the West African and Western European folk tales by comparing the performance of an LSTM (acc. 0.74) with a BoW classifier (acc. 0.93), indicating that the two corpora can be clearly distinguished in terms of vocabulary. An interactive t-SNE visualization of a hybrid classifier (acc. 0.85) highlights the culture-specific words for both. The third experiment describes an ML analysis of narrative structures. Classifiers trained on parts of folk tales according to the three-act structure are quite capable of distinguishing these parts (acc. 0.78). Common n-grams extracted from these parts not only underline cross-cultural distinctions in narrative structures, but also show the overlap between verbal and written West African narratives.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Publikationsdatum: 2020
    Beschreibung: The design of a computer-supported serious game concerning inhibition skills in children with Attention Deficit/Hyperactivity Disorder (ADHD) is reported. The game consists of a series of activities, each eliciting the tendency to respond in an immediate, inadequate way. The game is based on the Dual Pathway Model of ADHD proposed by Sonuga-Barke. In the game, children must block impulsive tendencies, reflect upon the situation, inhibit irrelevant thoughts, and find the non-intuitive solution. In the game, the player personifies a superhero, who is asked to save a realm on the opposite side of the Earth (Antonyms) where things happen according to the opposite of the usual rules. The hero faces a series of challenges, in the form of mini-games, to free the planet from enemies crossing different scenarios. To succeed in the game, the player should change his/her attitude by thinking before performing any action rather than acting on impulse. The player is induced to be reflective and thoughtful as well. Results from the evaluation of a preliminary version of the serious game are reported. They support the notion that Antonyms is an adequate tool to lead children to inhibit their tendency to behave impulsively.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Publikationsdatum: 2020
    Beschreibung: In this research we presented different approaches to investigate the possible relationships between the largest crowd-based knowledge source and the market potential of particular cryptocurrencies. Identification of such relations is crucial because their existence may be used to create a broad spectrum of analyses and reports about cryptocurrency projects and to obtain a comprehensive outlook of the blockchain domain. The activities on the blockchain reach different levels of anonymity which renders them hard objects of studies. In particular, the standard tools used to characterize social trends and variables that describe cryptocurrencies’ situations are unsuitable to be used in the environment that extensively employs cryptographic techniques to hide real users. The employment of Wikipedia to trace crypto assets value need examination because the portal allows gathering of different opinions—content of the articles is edited by a group of people. Consequently, the information can be more attractive and useful for the readers than in case of non-collaborative sources of information. Wikipedia Articles often appears in the premium position of such search engines as Google, Bing, Yahoo and others. One may expect different demand on information about particular cryptocurrency depending on the different events (e.g., sharp fluctuations of price). Wikipedia offers only information about cryptocurrencies that are important from the point of view of language community of the users in Wikipedia. This “filter” helps to better identify those cryptocurrencies that have a significant influence on the regional markets. The models encompass linkages between different variables and properties. In one model cryptocurrency projects are ranked with the means of articles sentiment and quality. In another model, Wikipedia visits are linked to cryptocurrencies’ popularity. Additionally, the interactions between information demand in different Wikipedia language versions are elaborated. They are used to assess the geographical esteem of certain crypto coins. The information about the legal status of cryptocurrency technologies in different states that are offered by Wikipedia is used in another proposed model. It allows assessment of the adoption of cryptocurrencies in a given legislature. Finally, a model is developed that joins Wikipedia articles editions and deletions with the social sentiment towards particular cryptocurrency projects. The mentioned analytical purposes that permit assessment of the popularity of blockchain technologies in different local communities are not the only results of the paper. The models can show which country has the biggest demand on particular cryptocurrencies, such as Bitcoin, Ethereum, Ripple, Bitcoin Cash, Monero, Litecoin, Dogecoin and others.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Publikationsdatum: 2020
    Beschreibung: The purpose of this extension of the ESM’2019 conference paper is to propose some means to implement an artificial thinking model that simulates human psychological behavior. The first necessary model is the time fuzzy vector space model (TFVS). Traditional fuzzy logic uses fuzzification/defuzzification, fuzzy rules and implication to assess and combine several significant attributes to make deductions. The originality of TFVS is not to be another fuzzy logic model but rather a fuzzy object-oriented model which implements a dynamic object structural, behavior analogy and which encapsulates time fuzzy vectors in the object components and their attributes. The second model is a fuzzy vector space object oriented model and method (FVSOOMM) that describes how-to realize step by step the appropriate TFVS from the ontology class diagram designed with the Unified Modeling Language (UML). The third contribution concerns the cognitive model (Emotion, Personality, Interactions, Knowledge (Connaissance) and Experience) EPICE the layers of which are necessary to design the features of the artificial thinking model (ATM). The findings are that the TFVS model provides the appropriate time modelling tools to design and implement the layers of the EPICE model and thus the cognitive pyramids of the ATM. In practice, the emotion of cognitive dissonance during buying decisions is proposed and a game addiction application depicts the gamer decision process implementation with TFVS and finite state automata. Future works propose a platform to automate the implementation of TFVS according to the steps of the FVSOOMM method. An application is a case-based reasoning temporal approach based on TFVS and on dynamic distances computing between time resultant vectors in order to assess and compare similar objects’ evolution. The originality of this work is to provide models, tools and a method to design and implement some features of an artificial thinking model.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Publikationsdatum: 2020
    Beschreibung: Within a workshop on evaluation methods for automated vehicles (AVs) at the Driving Assessment 2019 symposium in Santa Fe; New Mexico, a heuristic evaluation methodology that aims at supporting the development of human–machine interfaces (HMIs) for AVs was presented. The goal of the workshop was to bring together members of the human factors community to discuss the method and to further promote the development of HMI guidelines and assessment methods for the design of HMIs of automated driving systems (ADSs). The workshop included hands-on experience of rented series production partially automated vehicles, the application of the heuristic assessment method using a checklist, and intensive discussions about possible revisions of the checklist and the method itself. The aim of the paper is to summarize the results of the workshop, which will be used to further improve the checklist method and make the process available to the scientific community. The participants all had previous experience in HMI design of driver assistance systems, as well as development and evaluation methods. They brought valuable ideas into the discussion with regard to the overall value of the tool against the background of the intended application, concrete improvements of the checklist (e.g., categorization of items; checklist items that are currently perceived as missing or redundant in the checklist), when in the design process the tool should be applied, and improvements for the usability of the checklist.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Publikationsdatum: 2020
    Beschreibung: In this paper, we proposed a verification method for the message passing behavior of IoT systems by checking the accumulative event relation of process models. In an IoT system, it is hard to verify the behavior of message passing by only looking at the sequence of packet transmissions recorded in the system log. We proposed a method to extract event relations from the log and check for any minor deviations that exist in the system. Using process mining, we extracted the variation of a normal process model from the log. We checked for any deviation that is hard to be detected unless the model is accumulated and stacked over time. Message passing behavior can be verified by comparing the similarity of the process tree model, which represents the execution relation between each message passing event. As a result, we can detect minor deviations such as missing events and perturbed event order with occurrence probability as low as 3%.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Publikationsdatum: 2020
    Beschreibung: Digitalization affects the relation between human agents and technological objects. This paper looks at digital behavior change technologies (BCT) from a deontological perspective. It identifies three moral requirements that are relevant for ethical approaches in the tradition of Kantian deontology: epistemic rationalism, motivational rationalism and deliberational rationalism. It argues that traditional Kantian ethics assumes human ‘subjects’ to be autonomous agents, whereas ‘objects’ are mere passive tools. Digitalization, however, challenges this Cartesian subject-object dualism: digital technologies become more and more autonomous and take on agency. Similarly, human subjects can outsource agency and will-power to technologies. In addition, our intersubjective relations are being more and more shaped by digital technologies. The paper therefore re-examines the three categories ‘subject’, ‘object’ and ‘intersubjectivity’ in light of digital BCTs and suggests deontological guidelines for digital objects, digital subjects and a digitally mediated intersubjectivity, based on a re-examination of the requirements of epistemic, motivational and deliberational rationalism.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Publikationsdatum: 2020
    Beschreibung: Digital territories focus on community transformation through sustainable development, saving resources in local governments, bridging the digital gap, and using technology to build smart infrastructure. This article presents the design and implementation of a smart system, called the Waste Treatment System (WTS), for controlling parameters of waste decomposition in the trash bins installed in Riobamba city (Ecuador). The prototype allows monitoring in real time both the amount of waste and the level of rottenness of garbage by means of the measurement of different parameters that indicate the characteristics of the leachates generated inside. The motivation of this work was to yield an efficient solution to urban waste treatment that optimizes resources in the collection process by providing real-time information to improve collection frequency vehicles and also reduce emissions by the decomposition of organic waste. The tests allowed assessing technical aspects such as the maximum coverage of wireless communication, the transmission channel capacity for each prototype, the data-processing requirements, and other more particular parameters such as the production of leachates due to the frequency of collection and the environmental conditions, which will be useful in future work on environmental impact.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Publikationsdatum: 2020
    Beschreibung: This study investigated the use of digital media, specifically social media technologies, in the workplace in Taiwan. The data for this study were collected through an online survey. Participants responded to questions asking whether social technologies could be a source of empowerment, leading to equality. Respondents included female and male employees. The findings reveal that both genders use social technology platforms for business support, experience benefits, and believe that these technologies could provide empowerment for success. Detailed results are reported in this paper, including a comparative analysis. The differences between women and men using Facebook and YouTube were significant. Women in Taiwan have a higher awareness of the benefits of social technologies, specifically Facebook, when used for business support and empowerment. This paper reveals a comparison between the attitudes of women and men when using social technologies and investigates the realization of the economic empowerment component.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Publikationsdatum: 2020
    Beschreibung: The consumption of natural, green, organic products represents an increasingly important subject for contemporary society, organizations, consumers and researchers. Demographic and cultural factors, traditions and consumption habits, along with the individual desire to adopt a healthy lifestyle in accordance with principles of sustainability and environmental protection are relevant vectors in the search, choice and consumption of green products. Producers and retailers have identified the interest of modern consumers, introducing a varied range of green grocery and non-food products to match expectations and needs. Using the case study method, this paper highlights the transition of the organic market in an emerging European country: Romania. During the era of state economy, organic and natural products were interchangeable, but after liberalization of the market, the rise of the organic sector began with the establishment of inspection and certification bodies, establishment of procedures, and the appearance of specialized agricultural farms, processors and sellers. Consumers understood soon enough the advantages and benefits of organic products and a healthy lifestyle, and the market for organic products has been developing steadily. We show the current state of development and discuss its evolution, outlining the different market statistics, and making recommendations regarding future development possibilities.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Publikationsdatum: 2020
    Beschreibung: The growing interest in wearable robots opens the challenge for developing intuitive and natural control strategies. Among several human–machine interaction approaches, myoelectric control consists of decoding the motor intention from muscular activity (or EMG signals) with the aim of driving prosthetic or assistive robotic devices accordingly, thus establishing an intimate human–machine connection. In this scenario, bio-inspired approaches, e.g., synergy-based controllers, are revealed to be the most robust. However, synergy-based myo-controllers already proposed in the literature consider muscle patterns that are computed considering only the total variance reconstruction rate of the EMG signals, without taking into account the performance of the controller in the task (or application) space. In this work, extending a previous study, the authors presented an autoencoder-based neural model able to extract muscles synergies for motion intention detection while optimizing the task performance in terms of force/moment reconstruction. The proposed neural topology has been validated with EMG signals acquired from the main upper limb muscles during planar isometric reaching tasks performed in a virtual environment while wearing an exoskeleton. The presented model has been compared with the non-negative matrix factorization algorithm (i.e., the most used approach in the literature) in terms of muscle synergy extraction quality, and with three techniques already presented in the literature in terms of goodness of shoulder and elbow predicted moments. The results of the experimental comparisons have showed that the proposed model outperforms the state-of-art synergy-based joint moment estimators at the expense of the quality of the EMG signals reconstruction. These findings demonstrate that a trade-off, between the capability of the extracted muscle synergies to better describe the EMG signals variability and the task performance in terms of force reconstruction, can be achieved. The results of this study might open new horizons on synergies extraction methodologies, optimized synergy-based myo-controllers and, perhaps, reveals useful hints about their origin.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Publikationsdatum: 2020
    Beschreibung: Unmanned aerial vehicles (UAVs) received an unprecedented surge of people’s interest worldwide in recent years. This paper investigates the specific problem of cooperative mission planning for multiple UAVs on the battlefield from a hierarchical decision-making perspective. From the view of the actual mission planning issue, the two key problems to be solved in UAV collaborative mission planning are mission allocation and route planning. In this paper, both of these problems are taken into account via a hierarchical decision-making model. Firstly, we use a target clustering algorithm to divide the original targets into target subgroups, where each target subgroup contains multiple targets. Secondly, a fuzzy ant colony algorithm is used to calculate the global path between target subgroups for a single-target group. Thirdly, a fuzzy ant colony algorithm is also used to calculate the local path between multiple targets for a single-target subgroup. After three levels of decision-making, the complete path for multiple UAVs can be obtained. In order to improve the efficiency of a collaborative task between different types of UAVs, a cooperative communication strategy is developed, which can reduce the number of UAVs performing tasks. Finally, experimental results demonstrate the effectiveness of the proposed cooperative mission planning and cooperative communication strategy for multiple UAVs.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Publikationsdatum: 2020
    Beschreibung: Image aesthetic evaluation refers to the subjective aesthetic evaluation of images. Computational aesthetics has been widely concerned due to the limitations of subjective evaluation. Aiming at the problem that the existing evaluation methods of image aesthetic quality only extract the low-level features of images and they have a low correlation with human subjective perception, this paper proposes an aesthetic evaluation model based on latent semantic features. The aesthetic features of images are extracted by superpixel segmentation that is based on weighted density POI (Point of Interest), which includes semantic features, texture features, and color features. These features are mapped to feature words by LLC (Locality-constrained Linear Coding) and, furthermore, latent semantic features are extracted using the LDA (Latent Dirichlet Allocation). Finally, the SVM classifier is used to establish the classification prediction model of image aesthetics. The experimental results on the AVA dataset show that the feature coding based on latent semantics proposed in this paper improves the adaptability of the image aesthetic prediction model, and the correlation with human subjective perception reaches 83.75%.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Publikationsdatum: 2020
    Beschreibung: The Infrastructure for Spatial Information in Europe (INSPIRE) Directive (2007) requires public organisations across Europe to share environmentally-related spatial datasets to support decision making and management of the environment. Despite the environmental focus of INSPIRE, it offers limited guidance for archaeological datasets. Most primary data is created outside, but ultimately curated within, the public sector. As spatial evidence from fieldwork activities is not considered by the Directive, it overlooks a range of barriers to sharing data, such as project-based fieldwork, a lack of data standards, and formatting and licencing variations. This paper submits that these challenges are best addressed through the formalised management of primary research data through an archaeological Spatial Data Infrastructure (SDI). SDIs deliver more efficient data management and release economic value by saving time and money. Better stewardship of archaeological data will also lead to more informed research and stewardship of the historic environment. ARIADNE already provides a digital infrastructure for research data, but the landscape and spatial component has been largely overlooked. However, rather than developing a separate solution, the full potential of spatial data from archaeological research can and should be realised through ARIADNE.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Publikationsdatum: 2020
    Beschreibung: Improvements in Web platforms for data exchange and trading are creating more opportunities for users to obtain data from data providers of different domains. However, the current data exchange platforms are limited to unilateral information provision from data providers to users. In contrast, there are insufficient means for data providers to learn what kinds of data users desire and for what purposes. In this paper, we propose and discuss the description items for sharing users’ calls for data as data requests in the data marketplace. We also discuss structural differences in data requests and providable data using variables, as well as possibilities of data matching. In the study, we developed an interactive platform, named “treasuring every encounter of data affairs” (TEEDA), to facilitate matching and interactions between data providers and users. The basic features of TEEDA are described in this paper. From experiments, we found the same distributions of the frequency of variables but different distributions of the number of variables in each piece of data, which are important factors to consider in the discussion of data matching in the data marketplace.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Publikationsdatum: 2020
    Beschreibung: Camera shaking and object movement can cause the output images to suffer from blurring, noise, and other artifacts, leading to poor image quality and low dynamic range. Raw images contain minimally processed data from the image sensor compared with JPEG images. In this paper, an anti-shake high-dynamic-range imaging method is presented. This method is more robust to camera motion than previous techniques. An algorithm based on information entropy is employed to choose a reference image from the raw image sequence. To further improve the robustness of the proposed method, the Oriented FAST and Rotated BRIEF (ORB) algorithm is adopted to register the inputs, and a simple Laplacian pyramid fusion method is implanted to generate the high-dynamic-range image. Additionally, a large dataset with 435 various exposure image sequences is collected, which includes the corresponding JPEG image sequences to test the effectiveness of the proposed method. The experimental results illustrate that the proposed method achieves better performance in terms of anti-shake ability and preserves more details for real scene images than traditional algorithms. Furthermore, the proposed method is suitable for extreme-exposure image pairs, which can be applied to binocular vision systems to acquire high-quality real scene images, and has a lower algorithm complexity than deep learning-based fusion methods.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Publikationsdatum: 2020
    Beschreibung: The main objective of this article was to identify the conditions for the use of smartphones and mobile applications in Poland in the second half of 2018. The scope of the present analysis was limited to a selected sample of more than 470 respondents, and it examined the group of the most active users of smartphones and mobile applications. The author adopted the CAWI (computer associated web interview) method, which was previously verified by a randomly selected pilot sample, in his study. The obtained results were compared with the findings of other studies. They indicated that users of smartphones and mobile applications in Poland do not differ in their assessments from users in Europe and around the world. In this context, the key implication for researchers is the identified level of development of the use of smartphones and mobile applications in Poland at the end of 2018. The main limitation of the research was the selection of the research sample, which consisted only of members of the academic community. The scope of this article aimed to fill a gap in terms of the quantitative and qualitative methods that are applied to examine the use of mobile devices and mobile software. At the same time, this study creates the foundations for further research on intercultural differences. It is important to note that the present research sample needs to be extended beyond the academic community for the research results to be fully generalized.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Publikationsdatum: 2020
    Beschreibung: In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area network, a full duplex MAC protocol has to deal with several unique issues and challenges that arise because of the dynamic nature of the wireless environment. In this paper, we have discussed several existing full duplex MAC protocols and have shown qualitative comparisons among these full duplex MAC protocols. Full duplex in-band wireless communication has the potential to double the capacity of wireless network. Inter-client Interference (ICI) is a hindrance in achieving double spectral efficiency of the in-band full-duplex wireless medium. In this paper, we have classified existing solutions to the ICI problem and compared the solutions with respect to the proposed approaches, their advantages and disadvantages.We have also identified and discussed several issues and challenges of designing a full duplex MAC protocol. Results of qualitative comparisons of various wireless full duplex MAC protocols may be applied to design new protocols as well as researchers may find the identified issues and challenges helpful to solve various problems of a full duplex MAC protocol.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Publikationsdatum: 2020
    Beschreibung: The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceive the users by providing security and privacy protections that are weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized them based on the real security features they provide, or on their popularity. From the analysis, we extracted a set of recommendations that developers should follow in order to build usable, secure and privacy-friendly barcode scanning applications. Based on them, we also implemented BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a user experience test on our app and we compared it with DroidLa, the most popular/secure QR code reader app. The results show that our app has nice features, such as ease of use, provides security trust, is effective and efficient.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Publikationsdatum: 2020
    Beschreibung: The effect of one of the most popular 3D visualization and modelling technologies with haptic and touch feedback possibilities—augmented reality (AR)—is analysed herein. That includes a specific solution, incorporating augmented reality. A case study for delivering STEM (science, technology, engineering, and mathematics) content using this tool at one secondary school in Sofia is presented. The experience gained in one school year of using facilities for a STEM enrichment program has been examined.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Publikationsdatum: 2020
    Beschreibung: The particle filter method is a basic tool for inference on nonlinear partially observed Markov process models. Recently, it has been applied to solve constrained nonlinear filtering problems. Incorporating constraints could improve the state estimation performance compared to unconstrained state estimation. This paper introduces an iterative truncated unscented particle filter, which provides a state estimation method with inequality constraints. In this method, the proposal distribution is generated by an iterative unscented Kalman filter that is supplemented with a designed truncation method to satisfy the constraints. The detailed iterative unscented Kalman filter and truncation method is provided and incorporated into the particle filter framework. Experimental results show that the proposed algorithm is superior to other similar algorithms.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Publikationsdatum: 2020
    Beschreibung: The orientation of plate images in license plate recognition is one of the factors that influence its accuracy. In particular, tilted plate images are harder to detect and recognize characters with than aligned ones. To this end, the rectification of plates in a preprocessing step is essential to improve their performance. We propose deep models to estimate four-corner coordinates of tilted plates. Since the predicted corners can then be used to rectify plate images, they can help improve plate recognition in plate recognition. The main contributions of this work are a set of open-structured hybrid networks to predict corner positions and a novel loss function that combines pixel-wise differences with position-wise errors, producing performance improvements. Regarding experiments using proprietary plate images, one of the proposed modes produces a 3.1% improvement over the established warping method.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Publikationsdatum: 2020
    Beschreibung: The current paper focuses on the investigation of spoken-language classification in audio broadcasting content. The approach reflects a real-word scenario, encountered in modern media/monitoring organizations, where semi-automated indexing/documentation is deployed, which could be facilitated by the proposed language detection preprocessing. Multilingual audio recordings of specific radio streams are formed into a small dataset, which is used for the adaptive classification experiments, without seeking—at this step—for a generic language recognition model. Specifically, hierarchical discrimination schemes are followed to separate voice signals before classifying the spoken languages. Supervised and unsupervised machine learning is utilized at various windowing configurations to test the validity of our hypothesis. Besides the analysis of the achieved recognition scores (partial and overall), late integration models are proposed for semi-automatically annotation of new audio recordings. Hence, data augmentation mechanisms are offered, aiming at gradually formulating a Generic Audio Language Classification Repository. This database constitutes a program-adaptive collection that, beside the self-indexing metadata mechanisms, could facilitate generic language classification models in the future, through state-of-art techniques like deep learning. This approach matches the investigatory inception of the project, which seeks for indicators that could be applied in a second step with a larger dataset and/or an already pre-trained model, with the purpose to deliver overall results.
    Digitale ISSN: 2078-2489
    Thema: Informatik
    Publiziert von MDPI
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...