Inf. Comput.Pub Date : 2023-06-12DOI: 10.3390/info14060331
Xin Song, Daofang Chang, Tian Luo
{"title":"A Single-Product Multi-Period Inventory Routing Problem under Intermittent Demand","authors":"Xin Song, Daofang Chang, Tian Luo","doi":"10.3390/info14060331","DOIUrl":"https://doi.org/10.3390/info14060331","url":null,"abstract":"Demand fluctuations and uncertainty bring challenges to inventory management, and intermittent demand patterns increase the risk of inventory backlogs and raise inventory holding costs. In previous studies on inventory routing problems, different variants have been proposed to cope with complicated industrial scenarios. However, there are few studies on inventory routing problems with intermittent demand patterns. To solve this problem, we introduce a lateral transshipment strategy and build a single-product multi-period inventory routing mixed integer programming model to reduce customers’ inventory backlogs, balance regional inventory, reduce inventory holding costs, and improve inventory management efficiency. Furthermore, we design an adaptive large-neighborhood search algorithm with new operators to improve the solving efficiency. The experimental results show that an appropriate transshipment price can reduce the share of distribution costs. Another finding is that higher-capacity vehicles lead to higher revenue. Our findings not only expand the scope of the IRP domain but also provide actionable management insights for business practitioners.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"59 1","pages":"331"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84000743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-11DOI: 10.3390/info14060327
F. Almeida, P. Carneiro
{"title":"Perceived Importance of Metrics for Agile Scrum Environments","authors":"F. Almeida, P. Carneiro","doi":"10.3390/info14060327","DOIUrl":"https://doi.org/10.3390/info14060327","url":null,"abstract":"Metrics are key elements that can give us valuable information about the effectiveness of agile software development processes, particularly considering the Scrum environment. This study aims to learn about the metrics adopted to assess agile development processes and explore the impact of how the role performed by each member in Scrum contributed to increasing/reducing the perception of the importance of these metrics. The impact of years of experience in Scrum on this perception was also explored. To this end, a quantitative study was conducted with 191 Scrum professionals in companies based in Portugal. The results show that the Scrum role is not a determining factor, while individuals with more years of experience have a higher perception of the importance of metrics related to team performance. The same conclusion is observed for the business value metric of the product backlog and the percentage of test automation in the testing phase. The findings allow for extending the knowledge about Scrum project management processes and their teams, in addition to offering important insights into the implementation of metrics for software engineering companies that adopt Scrum.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"96 1","pages":"327"},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-09DOI: 10.3390/info14060326
H. Park, Ivan Ureta, Boyoung Kim
{"title":"Trend Analysis of Decentralized Autonomous Organization Using Big Data Analytics","authors":"H. Park, Ivan Ureta, Boyoung Kim","doi":"10.3390/info14060326","DOIUrl":"https://doi.org/10.3390/info14060326","url":null,"abstract":"Decentralized Autonomous Organizations (DAOs) have gained widespread attention in academia and industry as potential future models for decentralized governance and organization. In order to understand the trends and future potential of this rapidly growing technology, it is crucial to conduct research in the field. This research aims at a data-driven approach for the objective content analysis of big data related to DAOs, using text mining and Latent Dirichlet Allocation (LDA)-based topic modeling. The study analyzed tweets with the hashtag #DAO and all Reddit data with “DAO”. The results were from the identification of the top 100 frequently appearing keywords, as well as the top 20 keywords with high network centrality, and key topics related to finance, gaming, and fundraising, from both Twitter and Reddit. The analysis revealed twelve topics from Twitter and eight topics from Reddit, with the term “community” frequently appearing across many of these topics. The findings provide valuable insights into the current trend and future potential of DAOs, and should be used by researchers to guide further research in the field and by decision makers to explore innovative ways to govern the organizations.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"33 1","pages":"326"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90580986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monetary Compensation and Private Information Sharing in Augmented Reality Applications","authors":"Gilad Taub, Avshalom Elmalech, Noa Aharony, Ariel Rosenfeld","doi":"10.3390/info14060325","DOIUrl":"https://doi.org/10.3390/info14060325","url":null,"abstract":"This research studied people’s responses to requests that ask for accessing their personal information when using augmented reality (AR) technology. AR is a new technology that superimposes digital information onto the real world, creating a unique user experience. As such, AR is often associated with the collection and use of personal information, which may lead to significant privacy concerns. To investigate these potential concerns, we adopted an experimental approach and examined people’s actual responses to real-world requests for various types of personal information while using a designated AR application on their personal smartphones. Our results indicate that the majority (57%) of people are willing to share sensitive personal information with an unknown third party without any compensation other than using the application. Moreover, there is variability in the individuals’ willingness to allow access to various kinds of personal information. For example, while 75% of participants were open to granting access to their microphone, only 35% of participants agreed to allow access to their contacts. Lastly, monetary compensation is linked with an increased willingness to share personal information. When no compensation was offered, only 35% of the participants agreed to grant access to their contacts, but when a low compensation was offered, 57.5% of the participants agreed. These findings combine to suggest several practical implications for the development and distribution of AR technologies.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"49 1","pages":"325"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83688044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-08DOI: 10.3390/info14060324
M. Wynn, Peter Jones
{"title":"Corporate Responsibility in the Digital Era","authors":"M. Wynn, Peter Jones","doi":"10.3390/info14060324","DOIUrl":"https://doi.org/10.3390/info14060324","url":null,"abstract":"As the digital era advances, many industries continue to expand their use of digital technologies to support company operations, notably at the customer interface, bringing new commercial opportunities and increased efficiencies. However, there are new sets of responsibilities associated with the deployment of these technologies, encompassed within the emerging concept of corporate digital responsibility (CDR), which to date has received little attention in the academic literature. This exploratory paper thus looks to make a small contribution to addressing this gap in the literature. The paper adopts a qualitative, inductive research method, employing an initial scoping literature review followed by two case studies. Based on the research findings, a simple model of CDR parameters is put forward. The article includes a discussion of a number of emergent issues—fair and equitable access, personal and social well-being, environmental implications, and cross-supply chain complexities—and a conclusion that summarises the main findings and suggests possible directions for future research.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"168 1","pages":"324"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73408946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-06DOI: 10.3390/info14060322
Zoe Hoy, X. Xu
{"title":"Agile Software Requirements Engineering Challenges-Solutions - A Conceptual Framework from Systematic Literature Review","authors":"Zoe Hoy, X. Xu","doi":"10.3390/info14060322","DOIUrl":"https://doi.org/10.3390/info14060322","url":null,"abstract":"Agile software requirements engineering processes enable quick responses to reflect changes in the client’s software requirements. However, there are challenges associated with agile requirements engineering processes, which hinder fast, sustainable software development. Research addressing the challenges with available solutions is patchy, diverse and inclusive. In this study, we use a systematic literature review coupled with thematic classification and gap mapping analysis to examine extant solutions against challenges; the typologies/classifications of challenges faced with agile software development in general and specifically in requirements engineering and how the solutions address the challenges. Our study covers the period from 2009 to 2023. Scopus—the largest database for credible academic publications was searched. Using the exclusion criteria to filter the articles, a total of 78 valid papers were selected and reviewed. Following our investigation, we develop a framework that takes a three-dimensional view of agile requirements engineering solutions and suggest an orchestrated approach balancing the focus between the business context, project management and agile techniques. This study contributes to the theoretical frontier of agile software requirement engineering approaches and guidelines for practice.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"4 1","pages":"322"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88830078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-06DOI: 10.3390/info14060323
Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, E. Radoi, A. Guéroui
{"title":"M-Ary Direct Modulation Chirp Spread Spectrum for Spectrally Efficient Communications","authors":"Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, E. Radoi, A. Guéroui","doi":"10.3390/info14060323","DOIUrl":"https://doi.org/10.3390/info14060323","url":null,"abstract":"Spread spectrum techniques, such as the Chirp Spread Spectrum (CSS) used by LoRa technology, are important for machine-to-machine communication in the context of the Internet of Things. They offer high processing gain, reliable communication over long ranges, robustness to interference and noise in harsh environments, etc. However, these features are compromised by their poor spectral efficiency, resulting in a very low data transmission rate. This paper deals with a spectrally efficient variant of CSS. The system uses M-ary phase keying to modulate the data and exploits CSS’s properties to transmit the modulated symbols as overlapping chirps. The overlapping of chirp signals may affect the system performance due to inter-symbol interference. Therefore, we analyse the relationship between the number of overlaps and the effect of inter-symbol interference (ISI), and we also determine the BER expression as a function of the number of overlaps. Finally, we derive the optimal number of overlapping symbols that corresponds to the minimum error probability.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"114 1","pages":"323"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77715490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-06-03DOI: 10.3390/info14060321
A. Dima, Stefan Ruseti, Denis Iorga, C. Banica, Mihai Dascalu
{"title":"Multi-Task Romanian Email Classification in a Business Context","authors":"A. Dima, Stefan Ruseti, Denis Iorga, C. Banica, Mihai Dascalu","doi":"10.3390/info14060321","DOIUrl":"https://doi.org/10.3390/info14060321","url":null,"abstract":"Email classification systems are essential for handling and organizing the massive flow of communication, especially in a business context. Although many solutions exist, the lack of standardized classification categories limits their applicability. Furthermore, the lack of Romanian language business-oriented public datasets makes the development of such solutions difficult. To this end, we introduce a versatile automated email classification system based on a novel public dataset of 1447 manually annotated Romanian business-oriented emails. Our corpus is annotated with 5 token-related labels, as well as 5 sequence-related classes. We establish a strong baseline using pre-trained Transformer models for token classification and multi-task classification, achieving an F1-score of 0.752 and 0.764, respectively. We publicly release our code together with the dataset of labeled emails.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"241 1","pages":"321"},"PeriodicalIF":0.0,"publicationDate":"2023-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74489681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-05-31DOI: 10.3390/info14060319
Iffah Zulaikha Saiful Bahri, S. Saon, A. Mahamad, K. Isa, U. Fadlilah, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi
{"title":"Interpretation of Bahasa Isyarat Malaysia (BIM) Using SSD-MobileNet-V2 FPNLite and COCO mAP","authors":"Iffah Zulaikha Saiful Bahri, S. Saon, A. Mahamad, K. Isa, U. Fadlilah, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi","doi":"10.3390/info14060319","DOIUrl":"https://doi.org/10.3390/info14060319","url":null,"abstract":"This research proposes a study on two-way communication between deaf/mute and normal people using an Android application. Despite advancements in technology, there is still a lack of mobile applications that facilitate two-way communication between deaf/mute and normal people, especially by using Bahasa Isyarat Malaysia (BIM). This project consists of three parts: First, we use BIM letters, which enables the recognition of BIM letters and BIM combined letters to form a word. In this part, a MobileNet pre-trained model is implemented to train the model with a total of 87,000 images for 29 classes, with a 10% test size and a 90% training size. The second part is BIM word hand gestures, which consists of five classes that are trained with the SSD-MobileNet-V2 FPNLite 320 × 320 pre-trained model with a speed of 22 s/frame rate and COCO mAP of 22.2, with a total of 500 images for all five classes and first-time training set to 2000 steps, while the second- and third-time training are set to 2500 steps. The third part is Android application development using Android Studio, which contains the features of the BIM letters and BIM word hand gestures, with the trained models converted into TensorFlow Lite. This feature also includes the conversion of speech to text, whereby this feature allows converting speech to text through the Android application. Thus, BIM letters obtain 99.75% accuracy after training the models, while BIM word hand gestures obtain 61.60% accuracy. The suggested system is validated as a result of these simulations and tests.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"5 1","pages":"319"},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86494484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. Comput.Pub Date : 2023-05-30DOI: 10.3390/info14060315
S. Sakka, V. Liagkou, C. Stylios
{"title":"Exploiting Security Issues in Human Activity Recognition Systems (HARSs)","authors":"S. Sakka, V. Liagkou, C. Stylios","doi":"10.3390/info14060315","DOIUrl":"https://doi.org/10.3390/info14060315","url":null,"abstract":"Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"41 1","pages":"315"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73813438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}