Next Issue
Volume 13, July
Previous Issue
Volume 13, May
 
 

Information, Volume 13, Issue 6 (June 2022) – 41 articles

Cover Story (view full-size image): Efficient shortest path algorithms are of key importance for routing and navigation systems. However, these applications are designed focusing on the requirements of motor vehicles, and therefore, finding paths in pedestrian sections of urban areas is not sufficiently supported. In addition, finding the shortest path is often not adequate for urban sidewalk routes, as users of these applications may also be interested in alternative routes that, although slightly longer, possess other desirable features and properties. The purpose of this paper is to present a heuristic algorithm for graph datasets that implements a penalty-based method which, by increasing certain edge weights, effectively searches for the most accessible alternative paths in multi-route cases. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
16 pages, 293 KiB  
Article
Quadratic Voting in Blockchain Governance
by Nicola Dimitri
Information 2022, 13(6), 305; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060305 - 19 Jun 2022
Cited by 3 | Viewed by 3854
Abstract
Governance in blockchain platforms is an increasingly important topic. A particular concern related to voting procedures is the formation of dominant positions, which may discourage participation of minorities. A main feature of standard majority voting is that individuals can indicate their preferences but [...] Read more.
Governance in blockchain platforms is an increasingly important topic. A particular concern related to voting procedures is the formation of dominant positions, which may discourage participation of minorities. A main feature of standard majority voting is that individuals can indicate their preferences but cannot express the intensity of their preferences. This could sometimes be a drawback for minorities who may not have the opportunity to obtain their most desirable outcomes, even when such outcomes are particularly important for them. For this reason a voting method, which in recent years gained visibility, is quadratic voting (QV), which allows voters to manifest both their preferences and the associated intensity. In voting rounds, where in each round users express their preference over binary alternatives, what characterizes QV is that the sum of the squares of the votes allocated by individuals to each round has to be equal to the total number, budget, of available votes. That is, the cost associated with a number of votes is given by the square of that number, hence it increases quadratically. In the paper, we discuss QV in proof-of-stake-based blockchain platforms, where a user’s monetary stake also represents the budget of votes available in a voting session. Considering the stake as given, the work focuses mostly on a game theoretic approach to determine the optimal allocation of votes across the rounds. We also investigate the possibility of the so-called Sybil attacks and discuss how simultaneous versus sequential staking can affect the voting outcomes with QV. Full article
(This article belongs to the Special Issue Models for Blockchain Systems: Analysis and Simulation)
24 pages, 16232 KiB  
Article
Construction of a Low-Cost Layered Interactive Dashboard with Capacitive Sensing
by Agapi Tsironi Lamari, Spyros Panagiotakis, Zacharias Kamarianakis, George Loukas, Athanasios Malamos and Evangelos Markakis
Information 2022, 13(6), 304; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060304 - 17 Jun 2022
Viewed by 2024
Abstract
In the present work, a methodology for the low-cost crafting of an interactive layered dashboard is proposed. Our aim is that the tangible surface be constructed using domestic materials that are easily available in every household. Several tests were performed on different capacitive [...] Read more.
In the present work, a methodology for the low-cost crafting of an interactive layered dashboard is proposed. Our aim is that the tangible surface be constructed using domestic materials that are easily available in every household. Several tests were performed on different capacitive materials before the selection of the most suitable one for use as a capacitive touch sensor. Various calibration methods were evaluated so that the behavior of the constructed capacitive touch sensors is smooth and reliable. The layered approach is achieved by a menu of few touch buttons on the left side of the dashboard. Thus, various different layers of content can be projected over the same construction, offering extendibility and ease of use to the users. For demonstration purposes, we developed an entertaining plus an educational application of projection mapping for the pervasive and interactive projection of multimedia content to the users of the presented tangible interface. The whole design and implementation approach are thoroughly analyzed in the paper and are presented through the illustration and application of various multimedia layers over the dashboard. An evaluation of the final construction proves the feasibility of the proposed work. Full article
(This article belongs to the Special Issue Pervasive Computing in IoT)
Show Figures

Figure 1

11 pages, 524 KiB  
Article
LoRaWAN Based Indoor Localization Using Random Neural Networks
by Winfred Ingabire, Hadi Larijani, Ryan M. Gibson and Ayyaz-UI-Haq Qureshi
Information 2022, 13(6), 303; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060303 - 16 Jun 2022
Cited by 10 | Viewed by 2571
Abstract
Global Positioning Systems (GPS) are frequently used as a potential solution for localization applications. However, GPS does not work indoors due to a lack of direct Line-of-Sight (LOS) satellite signals received from the End Device (ED) due to thick solid materials blocking the [...] Read more.
Global Positioning Systems (GPS) are frequently used as a potential solution for localization applications. However, GPS does not work indoors due to a lack of direct Line-of-Sight (LOS) satellite signals received from the End Device (ED) due to thick solid materials blocking the ultra-high frequency signals. Furthermore, fingerprint localization using Received Signal Strength Indicator (RSSI) values is typical for localization in indoor environments. Therefore, this paper develops a low-power intelligent localization system for indoor environments using Long-Range Wide-Area Networks (LoRaWAN) RSSI values with Random Neural Networks (RNN). The proposed localization system demonstrates 98.5% improvement in average localization error compared to related studies with a minimum average localization error of 0.12 m in the Line-of-Sight (LOS). The obtained results confirm LoRaWAN-RNN-based localization systems suitable for indoor environments in LOS applied in big sports halls, hospital wards, shopping malls, airports, and many more with the highest accuracy of 99.52%. Furthermore, a minimum average localization error of 13.94 m was obtained in the Non-Line-of-Sight (NLOS) scenario, and this result is appropriate for the management and control of vehicles in indoor car parks, industries, or any other fleet in a pre-defined area in the NLOS with the highest accuracy of 44.24%. Full article
(This article belongs to the Special Issue Advances in Computing, Communication & Security)
Show Figures

Figure 1

17 pages, 1360 KiB  
Article
On Producing Accurate Rating Predictions in Sparse Collaborative Filtering Datasets
by Dionisis Margaris, Costas Vassilakis and Dimitris Spiliotopoulos
Information 2022, 13(6), 302; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060302 - 15 Jun 2022
Cited by 7 | Viewed by 1944
Abstract
The typical goal of a collaborative filtering algorithm is the minimisation of the deviation between rating predictions and factual user ratings so that the recommender system offers suggestions for appropriate items, achieving a higher prediction value. The datasets on which collaborative filtering algorithms [...] Read more.
The typical goal of a collaborative filtering algorithm is the minimisation of the deviation between rating predictions and factual user ratings so that the recommender system offers suggestions for appropriate items, achieving a higher prediction value. The datasets on which collaborative filtering algorithms are applied vary in terms of sparsity, i.e., regarding the percentage of empty cells in the user–item rating matrices. Sparsity is an important factor affecting rating prediction accuracy, since research has proven that collaborative filtering over sparse datasets exhibits a lower accuracy. The present work aims to explore, in a broader context, the factors related to rating prediction accuracy in sparse collaborative filtering datasets, indicating that recommending the items that simply achieve higher prediction values than others, without considering other factors, in some cases, can reduce recommendation accuracy and negatively affect the recommender system’s success. An extensive evaluation is conducted using sparse collaborative filtering datasets. It is found that the number of near neighbours used for the prediction formulation, the rating average of the user for whom the prediction is generated and the rating average of the item concerning the prediction can indicate, in many cases, whether the rating prediction produced is reliable or not. Full article
(This article belongs to the Special Issue Information Retrieval, Recommender Systems and Adaptive Systems)
Show Figures

Figure 1

16 pages, 645 KiB  
Article
Editing Compression Dictionaries toward Refined Compression-Based Feature-Space
by Hisashi Koga, Shota Ouchi and Yuji Nakajima
Information 2022, 13(6), 301; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060301 - 15 Jun 2022
Viewed by 1366
Abstract
This paper investigates how to construct a feature space for compression-based pattern recognition which judges the similarity between two objects x and y through the compression ratio to compress x with y (’s dictionary). Specifically, we focus on the known framework called PRDC, [...] Read more.
This paper investigates how to construct a feature space for compression-based pattern recognition which judges the similarity between two objects x and y through the compression ratio to compress x with y (’s dictionary). Specifically, we focus on the known framework called PRDC, which represents an object x as a compression-ratio vector (CV) that lines up the compression ratios after x is compressed with multiple different dictionaries. By representing an object x as a CV, PRDC makes it possible to apply vector-based pattern recognition techniques to the compression-based pattern recognition. For PRDC, the dimensions, i.e., the dictionaries determine the quality of the CV space. This paper presents a practical technique to modify the chosen dictionaries in order to improve the performance of pattern recognition substantially: First, in order to make the dictionaries independent from each other, our method leaves any word shared by multiple dictionaries in only one dictionary and assures that any pair of dictionaries have no common words. Next, we transfer words among the dictionaries, so that all the dictionaries may keep roughly the same number of words and acquire the descriptive power evenly. The application to real image classification shows that our method increases classification accuracy by up to 8% compared with the case without our method, which demonstrates that our approach to keep the dictionaries independent is effective. Full article
(This article belongs to the Section Information Theory and Methodology)
Show Figures

Figure 1

12 pages, 539 KiB  
Article
An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method
by Mohammad Almseidin and Mouhammd Alkasassbeh
Information 2022, 13(6), 300; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060300 - 14 Jun 2022
Cited by 4 | Viewed by 1979
Abstract
Nowadays, the rapid growth of technology delivers many new concepts and notations that aim to increase the efficiency and comfort of human life. One of these techniques is the Internet of Things (IoT). The IoT has been used to achieve efficient operation management, [...] Read more.
Nowadays, the rapid growth of technology delivers many new concepts and notations that aim to increase the efficiency and comfort of human life. One of these techniques is the Internet of Things (IoT). The IoT has been used to achieve efficient operation management, cost-effective operations, better business opportunities, etc. However, there are many challenges facing implementing an IoT smart environment. The most critical challenge is protecting the IoT smart environment from different attacks. The IoT Botnet attacks are considered a serious challenge. The danger of this attack lies in that it could be used for several threatening commands. Therefore, the Botnet attacks could be implemented to perform the DDoS attacks, phishing attacks, spamming, and other attack scenarios. This paper has introduced a detection approach against the IoT Botnet attacks using the interpolation reasoning method. The suggested detection approach was implemented using the interpolation reasoning method instead of the classical reasoning methods to handle the knowledge base issues and reduce the size of the detection fuzzy rules. The suggested detection approach was designed, tested, and evaluated using an open-source benchmark IoT Botnet attacks dataset. The implemented experiments show that the suggested detection approach was able to detect the IoT Botnet attacks effectively with a 96.4% detection rate. Furthermore, the obtained results were compared with other literature results; the accomplished comparison showed that the suggested method is a rivalry with other methods, and it effectively reduced the false positive rate and interpolated the IoT Botnet attacks alerts even in case of a sparse rule base. Full article
(This article belongs to the Special Issue Advances in Computing, Communication & Security)
Show Figures

Figure 1

18 pages, 1883 KiB  
Article
Movie Box Office Prediction Based on Multi-Model Ensembles
by Yuan Ni, Feixing Dong, Meng Zou and Weiping Li
Information 2022, 13(6), 299; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060299 - 10 Jun 2022
Cited by 4 | Viewed by 3388
Abstract
This paper is based on the box office data of films released in China in the past, which was collected from ENDATA on 30 November 2021, providing 5683 pieces of movie data, and enabling the selection of the top 2000 pieces of movie [...] Read more.
This paper is based on the box office data of films released in China in the past, which was collected from ENDATA on 30 November 2021, providing 5683 pieces of movie data, and enabling the selection of the top 2000 pieces of movie data to be used as the box office prediction dataset. In this paper, some types of Chinese micro-data are used, and a Baidu search of the index data of movie names 30 days before and after the release date, coronavirus disease 2019 (COVID-19) data in China, and other characteristics are introduced, and the stacking algorithm is optimized by adopting a two-layer model architecture. The first layer base learners adopt Extreme Gradient Boosting (XGBoost), the Light Gradient Boosting Machine (LightGBM), Categorical Boosting (CatBoost), the Gradient Boosting Decision Tree (GBDT), random forest (RF), and support vector regression (SVR), and the second layer meta-learner adopts a multiple linear regression model, to establish a box office prediction model with a prediction error, Mean Absolute Percentage Error (MAPE), of 14.49%. In addition, in order to study the impact of the COVID-19 epidemic on the movie box office, based on the data of 187 movies released from January 2020 to November 2021, and combined with a number of data features introduced earlier, this paper uses LightGBM to establish a model. By checking the importance of model features, it is found that the situation of the COVID-19 epidemic at the time of movie release had a certain related impact on the movie box office. Full article
Show Figures

Figure 1

17 pages, 935 KiB  
Article
State-of-the-Art in Open-Domain Conversational AI: A Survey
by Tosin Adewumi, Foteini Liwicki and Marcus Liwicki
Information 2022, 13(6), 298; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060298 - 10 Jun 2022
Cited by 9 | Viewed by 3386
Abstract
We survey SoTA open-domain conversational AI models with the objective of presenting the prevailing challenges that still exist to spur future research. In addition, we provide statistics on the gender of conversational AI in order to guide the ethics discussion surrounding the issue. [...] Read more.
We survey SoTA open-domain conversational AI models with the objective of presenting the prevailing challenges that still exist to spur future research. In addition, we provide statistics on the gender of conversational AI in order to guide the ethics discussion surrounding the issue. Open-domain conversational AI models are known to have several challenges, including bland, repetitive responses and performance degradation when prompted with figurative language, among others. First, we provide some background by discussing some topics of interest in conversational AI. We then discuss the method applied to the two investigations carried out that make up this study. The first investigation involves a search for recent SoTA open-domain conversational AI models, while the second involves the search for 100 conversational AI to assess their gender. Results of the survey show that progress has been made with recent SoTA conversational AI, but there are still persistent challenges that need to be solved, and the female gender is more common than the male for conversational AI. One main takeaway is that hybrid models of conversational AI offer more advantages than any single architecture. The key contributions of this survey are (1) the identification of prevailing challenges in SoTA open-domain conversational AI, (2) the rarely held discussion on open-domain conversational AI for low-resource languages, and (3) the discussion about the ethics surrounding the gender of conversational AI. Full article
(This article belongs to the Special Issue Natural Language Processing for Conversational AI)
Show Figures

Figure 1

16 pages, 819 KiB  
Article
Attitudes toward Fashion Influencers as a Mediator of Purchase Intention
by José Magano, Manuel Au-Yong-Oliveira, Cicero Eduardo Walter and Ângela Leite
Information 2022, 13(6), 297; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060297 - 10 Jun 2022
Cited by 4 | Viewed by 9473
Abstract
Fashion influencers are a new phenomenon and profession to which many young individuals may currently aspire; such is its impact in the digital and online world. Hence, the article serves an upcoming group of fashion-influencers-to-be, as well as firms that seek the help [...] Read more.
Fashion influencers are a new phenomenon and profession to which many young individuals may currently aspire; such is its impact in the digital and online world. Hence, the article serves an upcoming group of fashion-influencers-to-be, as well as firms that seek the help of such professionals. This study aimed to test the mediating role of the attitude toward influencers in the relation between, on the one hand, perceived credibility, trustworthiness, perceived expertise, likeability, similarity, familiarity, and attractiveness, and, on the other hand, purchase intention. Path analysis was used to test a conceptual model in which attitude toward influencers mediates the relation between perceived credibility, trustworthiness, perceived expertise, likeability, similarity, familiarity, attractiveness, and purchase intention. Among the seven components, the association between perceived credibility, trustworthiness, perceived expertise, similarity, and familiarity, on the one hand, and purchase intention, on the other, was completely and significantly mediated through attitudes toward influencers. It was found that the attitude toward the influencer determines the purchase intent; this attitude is, in turn, conditioned by the competence, the resemblance, and the proximity that the consumer perceives in the influencer. Thus, to lead the consumer to buy a certain product, influencers must pay attention to perceived credibility, trustworthiness, perceived expertise, similarity, and familiarity with the product (or service). Full article
Show Figures

Figure 1

15 pages, 851 KiB  
Article
Traditional Chinese Medicine Word Representation Model Augmented with Semantic and Grammatical Information
by Yuekun Ma, Zhongyan Sun, Dezheng Zhang and Yechen Feng
Information 2022, 13(6), 296; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060296 - 10 Jun 2022
Cited by 2 | Viewed by 2000
Abstract
Text vectorization is the basic work of natural language processing tasks. High-quality vector representation with rich feature information can guarantee the quality of entity recognition and other downstream tasks in the field of traditional Chinese medicine (TCM). The existing word representation models mainly [...] Read more.
Text vectorization is the basic work of natural language processing tasks. High-quality vector representation with rich feature information can guarantee the quality of entity recognition and other downstream tasks in the field of traditional Chinese medicine (TCM). The existing word representation models mainly include the shallow models with relatively independent word vectors and the deep pre-training models with strong contextual correlation. Shallow models have simple structures but insufficient extraction of semantic and syntactic information, and deep pre-training models have strong feature extraction ability, but the models have complex structures and large parameter scales. In order to construct a lightweight word representation model with rich contextual semantic information, this paper enhances the shallow word representation model with weak contextual relevance at three levels: the part-of-speech (POS) of the predicted target words, the word order of the text, and the synonymy, antonymy and analogy semantics. In this study, we conducted several experiments in both intrinsic similarity analysis and extrinsic quantitative comparison. The results show that the proposed model achieves state-of-the-art performance compared to the baseline models. In the entity recognition task, the F1 value improved by 4.66% compared to the traditional continuous bag-of-words model (CBOW). The model is a lightweight word representation model, which reduces the training time by 51% compared to the pre-training language model BERT and reduces 89% in terms of memory usage. Full article
Show Figures

Figure 1

11 pages, 560 KiB  
Article
On the Malleability of Consumer Attitudes toward Disruptive Technologies: A Pilot Study of Cryptocurrencies
by Horst Treiblmaier and Evgeny Gorbunov
Information 2022, 13(6), 295; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060295 - 10 Jun 2022
Cited by 3 | Viewed by 2258
Abstract
The digital transformation of core marketing activities substantially impacts relations between consumers and companies. Novel technologies are usually complex, making their underlying functionality as well as the desirable and undesirable implications hard to grasp for ordinary consumers. Cryptocurrencies are a prominent yet controversial [...] Read more.
The digital transformation of core marketing activities substantially impacts relations between consumers and companies. Novel technologies are usually complex, making their underlying functionality as well as the desirable and undesirable implications hard to grasp for ordinary consumers. Cryptocurrencies are a prominent yet controversial and poorly understood example of an innovation that may transform companies’ future marketing activities. In this study, we investigate how easily consumers’ attitudes toward cryptocurrencies can be shaped by splitting a convenience sample of 100 consumers into two equal groups and exposing them to true, but biased, information about cryptocurrencies (including market forecasts), respectively, highlighting either the advantages or disadvantages of the technology. We subsequently found a significant difference in the trust, security and risk perceptions between the two groups; specifically, more positive attitudes pertaining to trust, security, risk and financial gains prevailed in the group exposed to positively-skewed information, while perceptions regarding trust, risk and the sustainability of cryptocurrencies were weaker among the group exposed to negatively-skewed information. These findings reveal some important insights into how easily consumer attitudes toward new technologies can be shaped through the presentation of lopsided information and call for further in-depth research in this important yet under-researched field. Full article
(This article belongs to the Special Issue Intelligent Information Technology)
Show Figures

Figure 1

15 pages, 311 KiB  
Article
On the Use of Mouse Actions at the Character Level
by Ángel Navarro and Francisco Casacuberta
Information 2022, 13(6), 294; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060294 - 09 Jun 2022
Cited by 2 | Viewed by 1405
Abstract
Neural Machine Translation (NMT) has improved performance in several tasks up to human parity. However, many companies still use Computer-Assisted Translation (CAT) tools to achieve perfect translation, as well as other tools. Among these tools, we find Interactive-Predictive Neural Machine Translation (IPNMT) systems, [...] Read more.
Neural Machine Translation (NMT) has improved performance in several tasks up to human parity. However, many companies still use Computer-Assisted Translation (CAT) tools to achieve perfect translation, as well as other tools. Among these tools, we find Interactive-Predictive Neural Machine Translation (IPNMT) systems, whose main feature is facilitating machine–human interactions. In the most conventional systems, the human user fixes a translation error by typing the correct word, sending this feedback to the machine which generates a new translation that satisfies it. In this article, we remove the necessity of typing to correct translations by using the bandit feedback obtained from the cursor position when the user performs a Mouse Action (MA). Our system generates a new translation that fixes the error using only the error position. The user can perform multiple MAs at the same position if the error is not fixed, each of which increases the correction probability. One of the main objectives in the IPNMT field is reducing the required human effort, in order to optimize the translation time. With the proposed technique, an 84% reduction in the number of keystrokes performed can be achieved, while still generating perfect translations. For this reason, we recommend the use of this technique in IPNMT systems. Full article
(This article belongs to the Special Issue Frontiers in Machine Translation)
Show Figures

Figure 1

15 pages, 2810 KiB  
Article
Multilingual Offline Signature Verification Based on Improved Inverse Discriminator Network
by Nurbiya Xamxidin, Mahpirat, Zhixi Yao, Alimjan Aysa and Kurban Ubul
Information 2022, 13(6), 293; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060293 - 09 Jun 2022
Cited by 5 | Viewed by 2095
Abstract
To further improve the accuracy of multilingual off-line handwritten signature verification, this paper studies the off-line handwritten signature verification of monolingual and multilingual mixture and proposes an improved verification network (IDN), which adopts user-independent (WI) handwritten signature verification, to determine the true signature [...] Read more.
To further improve the accuracy of multilingual off-line handwritten signature verification, this paper studies the off-line handwritten signature verification of monolingual and multilingual mixture and proposes an improved verification network (IDN), which adopts user-independent (WI) handwritten signature verification, to determine the true signature or false signature. The IDN model contains four neural network streams with shared weights, of which two receiving the original signature images are the discriminative streams, and the other two streams are the reverse stream of the gray inversion image. The enhanced spatial attention models connect the discriminative streams and reverse flow to realize message propagation. The IDN model uses the channel attention mechanism (SE) and the improved spatial attention module (ESA) to propose the effective feature information of signature verification. Since there is no suitable multilingual signature data set, this paper collects two language data sets (Chinese and Uyghur), including 100,000 signatures of 200 people. Our method is tested on the self-built data set and the public data sets of Bengali (BHsig-B) and Hindi (BHsig-H). The method proposed in this paper has the highest discrimination rate of FRR of 10.5%, FAR of 2.06%, and ACC of 96.33% for the mixture of two languages. Full article
(This article belongs to the Special Issue Deep Learning and Signal Processing)
Show Figures

Figure 1

12 pages, 2876 KiB  
Review
Fourth Industrial Revolution between Knowledge Management and Digital Humanities
by Muhammad Anshari, Muhammad Syafrudin and Norma Latif Fitriyani
Information 2022, 13(6), 292; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060292 - 08 Jun 2022
Cited by 20 | Viewed by 9094
Abstract
The Fourth Industrial Revolution (4IR) offers optimum productivity and efficiency via automation, expert systems, and artificial intelligence. The Fourth Industrial Revolution deploys smart sensors, Cyber-Physical Systems (CPS), Internet of Things (IoT), Internet of Services (IoS), big data and analytics, Augmented Reality (AR), autonomous [...] Read more.
The Fourth Industrial Revolution (4IR) offers optimum productivity and efficiency via automation, expert systems, and artificial intelligence. The Fourth Industrial Revolution deploys smart sensors, Cyber-Physical Systems (CPS), Internet of Things (IoT), Internet of Services (IoS), big data and analytics, Augmented Reality (AR), autonomous robots, additive manufacturing (3D Printing), and cloud computing for optimization purposes. However, the impact of 4IR has brought various changes to digital humanities, mainly in the occupations of people, but also in ethical compliance. It still requires the redefining of the roles of knowledge management (KM) as one of the tools to assist in organization growth, especially in negotiating tasks between machines and people in an organization. Knowledge management is crucial in the development of new digital skills that are governed by the ethical obligations that are necessary in the Fourth Industrial Revolution. The purpose of the study is to examine the role of KM strategies in responding to the emergence of 4IR, its impact on and challenges to the labor market, and employment. This paper also analyzes and further discusses how 4IR and employment issues are being viewed in the context of ethical dilemmas. Full article
(This article belongs to the Special Issue Knowledge Management and Digital Humanities)
Show Figures

Figure 1

18 pages, 4725 KiB  
Article
Promoting Consumer Adoption of Electric Vehicles from a Standard-Information-Behavior Perspective
by Weiwei Sun, Min Yuan and Zheng Zhang
Information 2022, 13(6), 291; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060291 - 08 Jun 2022
Cited by 5 | Viewed by 2875
Abstract
Consumer adoption of electric vehicles is essentially related to product quality factors, such as safety, performance and compatibility; however, the relationship between product quality standards and consumer behavior is not clear. Based on Multi-Attribute Utility Theory (MAUT) and Prospect Theory, we distinguish claimed [...] Read more.
Consumer adoption of electric vehicles is essentially related to product quality factors, such as safety, performance and compatibility; however, the relationship between product quality standards and consumer behavior is not clear. Based on Multi-Attribute Utility Theory (MAUT) and Prospect Theory, we distinguish claimed quality attributes, intrinsic quality attributes, measured quality attributes and perceived quality attributes and establish a conceptional model using System Dynamics (SD) simulation from the perspective of a Standard-Information-Behavior framework to explore the heterogeneous impacts of technical standards on consumers’ willingness to adopt electric vehicles. Based on the theory model and simulation, we try to explain the heterogeneous effects of three different standards: safety, performance and compatibility. We find that safety standards affect adoption through a market access mechanism, perceived performance of risk standards positively impacts customers’ perceived quality, and compatibility standards influence consumers’ perceived network value. The perceived risk, perceived quality and perceived network value influence consumer adoption willingness and behavior. The study contributes to the theory of innovation diffusion and consumer adoption behavior, and offers insights for standardizing activity, innovation diffusion and marketing product information for electric vehicles. Full article
Show Figures

Figure 1

9 pages, 258 KiB  
Article
Contextualizer: Connecting the Dots of Context with Second-Order Attention
by Diego Maupomé and Marie-Jean Meurs
Information 2022, 13(6), 290; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060290 - 08 Jun 2022
Cited by 1 | Viewed by 1750
Abstract
Composing the representation of a sentence from the tokens that it comprises is difficult, because such a representation needs to account for how the words present relate to each other. The Transformer architecture does this by iteratively changing token representations with respect to [...] Read more.
Composing the representation of a sentence from the tokens that it comprises is difficult, because such a representation needs to account for how the words present relate to each other. The Transformer architecture does this by iteratively changing token representations with respect to one another. This has the drawback of requiring computation that grows quadratically with respect to the number of tokens. Furthermore, the scalar attention mechanism used by Transformers requires multiple sets of parameters to operate over different features. The present paper proposes a lighter algorithm for sentence representation with complexity linear in sequence length. This algorithm begins with a presumably erroneous value of a context vector and adjusts this value with respect to the tokens at hand. In order to achieve this, representations of words are built combining their symbolic embedding with a positional encoding into single vectors. The algorithm then iteratively weighs and aggregates these vectors using a second-order attention mechanism, which allows different feature pairs to interact with each other separately. Our models report strong results in several well-known text classification tasks. Full article
Show Figures

Figure 1

10 pages, 420 KiB  
Communication
Human Autonomy in the Era of Augmented Reality—A Roadmap for Future Work
by David Harborth
Information 2022, 13(6), 289; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060289 - 07 Jun 2022
Cited by 6 | Viewed by 3063
Abstract
Augmented reality (AR) has found application in online games, social media, interior design, and other services since the success of the smartphone game Pokémon Go in 2016. With recent news on the metaverse and the AR cloud, the contexts in which the technology [...] Read more.
Augmented reality (AR) has found application in online games, social media, interior design, and other services since the success of the smartphone game Pokémon Go in 2016. With recent news on the metaverse and the AR cloud, the contexts in which the technology is used become more and more ubiquitous. This is problematic, since AR requires various different sensors gathering real-time, context-specific personal information about the users, causing more severe and new privacy threats compared to other technologies. These threats can have adverse consequences on information self-determination and the freedom of choice and, thus, need to be investigated as long as AR is still shapeable. This communication paper takes on a bird’s eye perspective and considers the ethical concept of autonomy as the core principle to derive recommendations and measures to ensure autonomy. These principles are supposed to guide future work on AR suggested in this article, which is strongly needed in order to end up with privacy-friendly AR technologies in the future. Full article
(This article belongs to the Collection Augmented Reality Technologies, Systems and Applications)
Show Figures

Figure 1

14 pages, 6532 KiB  
Article
A Routing and Task-Allocation Algorithm for Robotic Groups in Warehouse Environments
by Antonios Chatzisavvas, Petros Chatzitoulousis, Dimitris Ziouzios and Minas Dasygenis
Information 2022, 13(6), 288; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060288 - 06 Jun 2022
Cited by 3 | Viewed by 2333
Abstract
In recent years, the need for robotic fleets in large warehouse environments has constantly increased. The customers require faster services concerning the delivery of their products, making the use of systems such as robots and order-management software more than essential. Numerous researchers have [...] Read more.
In recent years, the need for robotic fleets in large warehouse environments has constantly increased. The customers require faster services concerning the delivery of their products, making the use of systems such as robots and order-management software more than essential. Numerous researchers have studied the problem of robot routing in a warehouse environment, aiming to suggest an efficient model concerning the robotic fleet’s management. In this research work, a methodology is proposed, providing feasible solutions for optimal pathfinding. A novel algorithm is proposed, which combines Dijkstra’s and Kuhn–Munkers algorithms efficiently. The proposed system considers the factor of energy consumption and chooses the optimal route. Moreover, the algorithm decides when a robot must head to a charging station. Finally, a software tool to visualize the movements of the robotic fleet and the real-time updates of the warehouse environment was developed. Full article
Show Figures

Figure 1

25 pages, 4727 KiB  
Article
An Interactive Virtual Home Navigation System Based on Home Ontology and Commonsense Reasoning
by Alan Schalkwijk, Motoki Yatsu and Takeshi Morita
Information 2022, 13(6), 287; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060287 - 06 Jun 2022
Cited by 1 | Viewed by 1994
Abstract
In recent years, researchers from the fields of computer vision, language, graphics, and robotics have tackled Embodied AI research. Embodied AI can learn through interaction with the real world and virtual environments and can perform various tasks in virtual environments using virtual robots. [...] Read more.
In recent years, researchers from the fields of computer vision, language, graphics, and robotics have tackled Embodied AI research. Embodied AI can learn through interaction with the real world and virtual environments and can perform various tasks in virtual environments using virtual robots. However, many of these are one-way tasks in which the interaction is interrupted only by answering questions or requests to the user. In this research, we aim to develop a two-way interactive navigation system by introducing knowledge-based reasoning to Embodied AI research. Specifically, the system obtains guidance candidates that are difficult to identify with existing common-sense reasoning alone by reasoning with the constructed home ontology. Then, we develop a two-way interactive navigation system in which the virtual robot can guide the user to the location in the virtual home environment that the user needs while repeating multiple conversations with the user. We evaluated whether the proposed system was able to present appropriate guidance locations as candidates based on users’ speech input about their home environment. For the evaluation, we extracted the speech data from the corpus of daily conversation, the speech data created by the subject, and the correct answer data for each data and calculated the precision, recall, and F-value. As a result, the F-value was 0.47 for the evaluation data extracted from the daily conversation corpus, and the F-value was 0.49 for the evaluation data created by the subject. Full article
(This article belongs to the Special Issue Knowledge Graph Technology and Its Applications)
Show Figures

Figure 1

17 pages, 2812 KiB  
Article
Dynamic Scheduling of Crane by Embedding Deep Reinforcement Learning into a Digital Twin Framework
by Zhenyu Xu, Daofang Chang, Miaomiao Sun and Tian Luo
Information 2022, 13(6), 286; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060286 - 04 Jun 2022
Cited by 4 | Viewed by 2435
Abstract
This study proposes a digital twin (DT) application framework that integrates deep reinforcement learning (DRL) algorithms for the dynamic scheduling of crane transportation in workshops. DT is used to construct the connection between the workshop service system, logical simulation environment, 3D visualization model [...] Read more.
This study proposes a digital twin (DT) application framework that integrates deep reinforcement learning (DRL) algorithms for the dynamic scheduling of crane transportation in workshops. DT is used to construct the connection between the workshop service system, logical simulation environment, 3D visualization model and physical workshop, and DRL is used to support the core decision in scheduling. First, the dynamic scheduling problem of crane transportation is constructed as a Markov decision process (MDP), and the corresponding double deep Q-network (DDQN) is designed to interact with the logic simulation environment to complete the offline training of the algorithm. Second, the trained DDQN is embedded into the DT framework, and then connected with the physical workshop and the workshop service system to realize online dynamic crane scheduling based on the real-time states of the workshop. Finally, case studies of crane scheduling under dynamic job arrival and equipment failure scenarios are presented to demonstrate the effectiveness of the proposed framework. The numerical analysis shows that the proposed method is superior to the traditional dynamic scheduling method, and it is also suitable for large-scale problems. Full article
Show Figures

Figure 1

28 pages, 8271 KiB  
Article
User Evaluation and Metrics Analysis of a Prototype Web-Based Federated Search Engine for Art and Cultural Heritage
by Minas Pergantis, Iraklis Varlamis and Andreas Giannakoulopoulos
Information 2022, 13(6), 285; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060285 - 04 Jun 2022
Cited by 3 | Viewed by 2308
Abstract
Content and metadata concerning a specialized field such as Art and Cultural Heritage are often scattered throughout the World Wide Web, making it hard for end-users to find, especially amid the vast and often commercialized general content of the Web. This paper presents [...] Read more.
Content and metadata concerning a specialized field such as Art and Cultural Heritage are often scattered throughout the World Wide Web, making it hard for end-users to find, especially amid the vast and often commercialized general content of the Web. This paper presents the process of designing and developing a Federated Search Engine (FSE) that collects such content from multiple credible sources of the world of Art and Culture and presents it to the user in a unified user-oriented manner, enhancing it with added functionality. The study focuses on the challenges such an endeavor presents and the technological tools, design decisions and methodology that lead to a fully functional, Web-based platform. This implemented search engine was evaluated by a group of stakeholders from the wider fields of art, culture and media during a closed test and the insights and feedback gained by these tests are herein analyzed and presented. These insights contain both the quantitative metrics of user engagement during the testing period and the qualitative information presented by the stakeholders through interviews. The above findings are thoroughly discussed and lead to conclusions regarding the usefulness and viability of Web applications in the aggregation and diffusion of Art and Cultural Heritage related content. Full article
(This article belongs to the Special Issue Evaluating Methods and Decision Making)
Show Figures

Figure 1

16 pages, 473 KiB  
Article
Multimodal Fake News Detection
by Isabel Segura-Bedmar and Santiago Alonso-Bartolome
Information 2022, 13(6), 284; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060284 - 02 Jun 2022
Cited by 27 | Viewed by 6144
Abstract
Over the last few years, there has been an unprecedented proliferation of fake news. As a consequence, we are more susceptible to the pernicious impact that misinformation and disinformation spreading can have on different segments of our society. Thus, the development of tools [...] Read more.
Over the last few years, there has been an unprecedented proliferation of fake news. As a consequence, we are more susceptible to the pernicious impact that misinformation and disinformation spreading can have on different segments of our society. Thus, the development of tools for the automatic detection of fake news plays an important role in the prevention of its negative effects. Most attempts to detect and classify false content focus only on using textual information. Multimodal approaches are less frequent and they typically classify news either as true or fake. In this work, we perform a fine-grained classification of fake news on the Fakeddit dataset, using both unimodal and multimodal approaches. Our experiments show that the multimodal approach based on a Convolutional Neural Network (CNN) architecture combining text and image data achieves the best results, with an accuracy of 87%. Some fake news categories, such as Manipulated content, Satire, or False connection, strongly benefit from the use of images. Using images also improves the results of the other categories but with less impact. Regarding the unimodal approaches using only text, Bidirectional Encoder Representations from Transformers (BERT) is the best model, with an accuracy of 78%. Exploiting both text and image data significantly improves the performance of fake news detection. Full article
(This article belongs to the Special Issue Sentiment Analysis and Affective Computing)
Show Figures

Figure 1

15 pages, 1886 KiB  
Article
A Novel Multi-View Ensemble Learning Architecture to Improve the Structured Text Classification
by Carlos Adriano Gonçalves, Adrián Seara Vieira, Célia Talma Gonçalves, Rui Camacho, Eva Lorenzo Iglesias and Lourdes Borrajo Diz
Information 2022, 13(6), 283; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060283 - 01 Jun 2022
Cited by 4 | Viewed by 2876
Abstract
Multi-view ensemble learning exploits the information of data views. To test its efficiency for full text classification, a technique has been implemented where the views correspond to the document sections. For classification and prediction, we use a stacking generalization based on the idea [...] Read more.
Multi-view ensemble learning exploits the information of data views. To test its efficiency for full text classification, a technique has been implemented where the views correspond to the document sections. For classification and prediction, we use a stacking generalization based on the idea that different learning algorithms provide complementary explanations of the data. The present study implements the stacking approach using support vector machine algorithms as the baseline and a C4.5 implementation as the meta-learner. Views are created with OHSUMED biomedical full text documents. Experimental results lead to the sustained conclusion that the application of multi-view techniques to full texts significantly improves the task of text classification, providing a significant contribution for the biomedical text mining research. We also have evidence to conclude that enriched datasets with text from certain sections are better than using only titles and abstracts. Full article
(This article belongs to the Special Issue Novel Methods and Applications in Natural Language Processing)
Show Figures

Figure 1

19 pages, 1999 KiB  
Article
A New Multivariate Approach for Real Time Detection of Routing Security Attacks in VANETs
by Souad Ajjaj, Souad El Houssaini, Mustapha Hain and Mohammed-Alamine El Houssaini
Information 2022, 13(6), 282; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060282 - 31 May 2022
Cited by 8 | Viewed by 1688
Abstract
Routing security attacks in Vehicular Ad hoc Networks (VANETs) represent a challenging issue that may dramatically decrease the network performances and even cause hazardous damage in both lives and equipment. This study proposes a new approach named Multivariate Statistical Detection Scheme (MVSDS), capable [...] Read more.
Routing security attacks in Vehicular Ad hoc Networks (VANETs) represent a challenging issue that may dramatically decrease the network performances and even cause hazardous damage in both lives and equipment. This study proposes a new approach named Multivariate Statistical Detection Scheme (MVSDS), capable of detecting routing security attacks in VANETs based on statistical techniques, namely the multivariate normality tests (MVN). Our detection approach consists of four main stages: first, we construct the input data by monitoring the network traffic in real time based on multiple metrics such as throughput, dropped packets ratio, and overhead traffic ratio. Secondly, we normalize the collected data by applying three different rescaling techniques, namely the Z-Score Normalization (ZSN), the Min-Max Normalization (MMN), and the Normalization by Decimal Scaling (NDS). The resulting data are modeled by a multivariate dataset sampled at different times used as an input by the detection step. The next step allows separating legitimate behavior from malicious one by continuously verifying the conformity of the dataset to the multivariate normality assumption by applying the Rao–Ali test combined with the Ryan–Joiner test. At the end of this step, the Ryan–Joiner correlation coefficient (R–J) is computed at various time windows. The measurement of this coefficient will allow identifying an attacker’s presence whenever this coefficient falls below a threshold corresponding to the normal critical values. Realistic VANET scenarios are simulated using SUMO (Simulation of Urban Mobility) and NS-3 (network simulator). Our approach implemented in the Matlab environment offers a real time detection scheme that can identify anomalous behavior relying on multivariate data. The proposed scheme is validated in different scenarios under routing attacks, mainly the black hole attack. As far as we know, our proposed approach unprecedentedly employed multivariate normality tests to attack detection in VANETs. It can further be applied to any VANET routing protocol without making any additional changes in the routing algorithm. Full article
(This article belongs to the Special Issue Automotive System Security: Recent Advances and Challenges)
Show Figures

Figure 1

17 pages, 2894 KiB  
Article
Design and Analysis of Joint Source-Channel Code System with Fixed-Length Code
by Han Bao, Can Zhang and Shaoshuai Gao
Information 2022, 13(6), 281; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060281 - 31 May 2022
Cited by 2 | Viewed by 1723
Abstract
As the demands of multimedia and data services increase, efficient communication systems are being investigated to meet the high data rate requirements. Joint source-channel coding (JSCC) schemes were proposed for improving overall system performance. However, existing JSCC systems may suffer a symbol error [...] Read more.
As the demands of multimedia and data services increase, efficient communication systems are being investigated to meet the high data rate requirements. Joint source-channel coding (JSCC) schemes were proposed for improving overall system performance. However, existing JSCC systems may suffer a symbol error rate (SER) performance loss when residual source redundancy is not fully exploited. This paper presents a novel, low-complexity JSCC system, which consists of a fixed-length source block code and an irregular convolutional channel code. A simple approach is proposed to design source codes that minimize the SER of source detection and guarantee the convergence of iterative source-channel decoding (ISCD). To improve the waterfall performance of ISCD, the channel code is optimized by using the extrinsic information transfer (EXIT) chart and the concept of irregular code. The channel code is constituted by recursive non-systematic convolutional (RNSC) subcodes. The weights of subcodes are optimized to make the EXIT curves of the channel decoder and the source decoder well-matched, and therefore, a near-capacity performance is achieved. Simulation results show that the proposed system achieves more than 1 dB gains and 0.3 dB gains compared to the separate source-channel code system and the other optimal JSCC systems, respectively. Additionally, the performance of the proposed system is within 1 dB deviation from the Shannon limit capacity. Full article
(This article belongs to the Special Issue Advances in Wireless Communications Systems)
Show Figures

Figure 1

14 pages, 3378 KiB  
Article
Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process
by Yuxuan Liu, Woon Kwan Tse, Pui Yu Kwok and Yu Hin Chiu
Information 2022, 13(6), 280; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060280 - 31 May 2022
Cited by 4 | Viewed by 6263
Abstract
In the era of global social media, Internet users’ privacy rights have been weakened, and the insight and alertness of individuals for privacy disclosure are decreasing. The security and flexibility of the system are usually the two ends of the measurement standard. While [...] Read more.
In the era of global social media, Internet users’ privacy rights have been weakened, and the insight and alertness of individuals for privacy disclosure are decreasing. The security and flexibility of the system are usually the two ends of the measurement standard. While more and more users pursue the intelligence and convenience of using social media applications, letting big data technology and AI algorithms learn and use our privacy data cannot be avoided. On the basis of literature review, this paper summarized four categories of social media user behavior, which were divided into privacy concern behavior, privacy protection behavior, active disclosure behavior, and passive participation behavior. Using analytic hierarchy process, this paper explored their relationship with five different types of privacy: defensive privacy, identity authentication privacy, interactive privacy, psychological privacy, and integration information privacy. We finally formulated the most common twelve kinds of sub-internet user behavior on the degree of personal privacy disclosure, and provide users countermeasures to prevent privacy disclosure according to the different influence weights. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Figure 1

12 pages, 2486 KiB  
Article
Efficient Edge-AI Application Deployment for FPGAs
by Stavros Kalapothas, Georgios Flamis and Paris Kitsos
Information 2022, 13(6), 279; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060279 - 28 May 2022
Cited by 12 | Viewed by 4738
Abstract
Field Programmable Gate Array (FPGA) accelerators have been widely adopted for artificial intelligence (AI) applications on edge devices (Edge-AI) utilizing Deep Neural Networks (DNN) architectures. FPGAs have gained their reputation due to the greater energy efficiency and high parallelism than microcontrollers (MCU) and [...] Read more.
Field Programmable Gate Array (FPGA) accelerators have been widely adopted for artificial intelligence (AI) applications on edge devices (Edge-AI) utilizing Deep Neural Networks (DNN) architectures. FPGAs have gained their reputation due to the greater energy efficiency and high parallelism than microcontrollers (MCU) and graphical processing units (GPU), while they are easier to develop and more reconfigurable than the Application Specific Integrated Circuit (ASIC). The development and building of AI applications on resource constraint devices such as FPGAs remains a challenge, however, due to the co-design approach, which requires a valuable expertise in low-level hardware design and in software development. This paper explores the efficacy and the dynamic deployment of hardware accelerated applications on the Kria KV260 development platform based on the Xilinx Kria K26 system-on-module (SoM), which includes a Zynq multiprocessor system-on-chip (MPSoC). The platform supports the Python-based PYNQ framework and maintains a high level of versatility with the support of custom bitstreams (overlays). The demonstration proved the reconfigurabibilty and the overall ease of implementation with low-footprint machine learning (ML) algorithms. Full article
Show Figures

Figure 1

25 pages, 2100 KiB  
Article
Extended Reality in Marketing—A Multiple Case Study on Internet of Things Platforms
by Ralf Wagner and Diana Cozmiuc
Information 2022, 13(6), 278; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060278 - 27 May 2022
Cited by 11 | Viewed by 5900
Abstract
This research highlights how cloud platform as a service technologies host extended reality technologies and convergent technologies in integrated solutions. It was only around 2019 that scholarly literature conceptualized the role of extended reality, that is, augmented reality, virtual reality, and mixed reality, [...] Read more.
This research highlights how cloud platform as a service technologies host extended reality technologies and convergent technologies in integrated solutions. It was only around 2019 that scholarly literature conceptualized the role of extended reality, that is, augmented reality, virtual reality, and mixed reality, in the marketing function. This article is a multiple case study on the leading eleven platform as a service vendors. They provide the programming technology required to host software as a service in the cloud, making the software available from everywhere. Of the eleven cases, 10% integrate technologies in solutions. Research results show that extended reality technologies reinvent digital marketing; as part of this, they shape the customer delivery model in terms of customer value proposition; favor the choice of customer channel (the omnichannel); possibly lead to new customer relationships, such as cocreation; and reach global mass customers. Extended reality in the delivery model is complemented by other technologies in the operating model. These combinations provide the foundations of the business models, which are either network or platform business models. This study identifies a number of solutions enabled by extended reality, which have an integrated goal in the form of customer value contribution and are to be studied in further articles. Full article
(This article belongs to the Special Issue Big Data, IoT and Cloud Computing)
Show Figures

Figure 1

12 pages, 742 KiB  
Article
Working Conditions and Work Engagement by Gender and Digital Work Intensity
by Paula Rodríguez-Modroño
Information 2022, 13(6), 277; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060277 - 27 May 2022
Cited by 7 | Viewed by 3445
Abstract
Telework and other flexible working arrangements, which have exponentially expanded with new advancements in digitalization and the impact of COVID-19, are modifying working conditions and workers’ engagement. Using the ‘job demands-resources’ model, we applied multivariate techniques to examine the different ways in which [...] Read more.
Telework and other flexible working arrangements, which have exponentially expanded with new advancements in digitalization and the impact of COVID-19, are modifying working conditions and workers’ engagement. Using the ‘job demands-resources’ model, we applied multivariate techniques to examine the different ways in which telework intensity impacts working conditions by gender. Increased intensity of remote working was positively associated with better skills and discretion and work engagement, while it was negatively associated with the other dimensions of job quality (particularly with working time quality). Even though women usually score higher than men in work intensity or working time quality, high intense female teleworkers experience a downturn with respect to these two items. Low and medium intensities of teleworking were positively associated with skills and discretion, working time quality, improved physical environment, and especially with better prospects and earnings. In conclusion, the intensity of teleworking and gender affect job quality and work engagement in different degrees, highlighting the importance of including these multiple effects on the design of flexible working arrangements. Full article
(This article belongs to the Special Issue Digital Work—Information Technology and Commute Choice)
Show Figures

Figure 1

17 pages, 4059 KiB  
Article
Research on Small Sample Data-Driven Inspection Technology of UAV for Transmission Line Insulator Defect Detection
by Lei Pan, Lan Chen, Shengli Zhu, Wenyan Tong and Like Guo
Information 2022, 13(6), 276; https://0-doi-org.brum.beds.ac.uk/10.3390/info13060276 - 27 May 2022
Cited by 7 | Viewed by 2090
Abstract
Insulators are important safety devices on high-voltage transmission lines. An insulator inspection system based on UAVs is widely used. Insulator defect detection is performed against two main engineering problems: 1. The scarcity of defect images, which leads to a network overfitting problem. 2. [...] Read more.
Insulators are important safety devices on high-voltage transmission lines. An insulator inspection system based on UAVs is widely used. Insulator defect detection is performed against two main engineering problems: 1. The scarcity of defect images, which leads to a network overfitting problem. 2. The small object detection, which is caused by the long aerial photography distance, and the low resolution of the insulator defect area pictures. In this study, firstly, the super-resolution reconstruction method is used to augment the dataset, which can not only solve the overfitting problem but also enrich the image texture features and pixel values of defect areas. Secondly, in the process of insulator defect detection, a two-stage cascading method is used. In the first stage, the rotated object detection algorithm is used to realize the object location of insulator strings, and then images of the identified insulators are cropped to reduce the proportion of the background area in defect images. In the second stage, YOLO v5 is used for the detection of insulator caps that are missing defects. The method proposed shows good detection effect on the self-built training set which contains only 85 images captured from real inspection environments. The method has practical industrial application value. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop