Next Issue
Volume 13, May
Previous Issue
Volume 13, March
 
 

Future Internet, Volume 13, Issue 4 (April 2021) – 20 articles

Cover Story (view full-size image): The paper presents a two-layer overlay network caching system for content distribution in network edges. It is used to define some caching scenarios with increasing complexity which refer to real situations, including mobile 5G connectivity. For each scenario, the maximization of the hit ratio leads to the formulation of NP-complete optimization problems. The proposed heuristic solutions are based on the theory of the maximization of monotone submodular functions under matroid constraints. After determining the approximation ratio of the greedy heuristic algorithms, a numerical performance analysis is presented. This analysis includes a comparison with the LFU eviction strategy adapted to the analyzed systems. Results show very good performance under the hypotheses of either known or unknown popularity of contents. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
15 pages, 944 KiB  
Article
Pervasive Intelligent Models to Predict the Outcome of COVID-19 Patients
by Ana Teresa Ferreira, Carlos Fernandes, José Vieira and Filipe Portela
Future Internet 2021, 13(4), 102; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040102 - 20 Apr 2021
Cited by 5 | Viewed by 2325
Abstract
Nowadays, there is an increasing need to understand the behavior of COVID-19. After the Directorate-General of Health of Portugal made available the infected patient’s data, it became possible to analyze it and gather some conclusions, obtaining a better understanding of the matter. In [...] Read more.
Nowadays, there is an increasing need to understand the behavior of COVID-19. After the Directorate-General of Health of Portugal made available the infected patient’s data, it became possible to analyze it and gather some conclusions, obtaining a better understanding of the matter. In this context, the project developed—ioCOVID19—Intelligent Decision Support Platform aims to identify patterns and develop intelligent models to predict and support clinical decisions. This article explores which typologies are associated with different outcomes to help clinicians fight the virus with a decision support system. So, to achieve this purpose, classification algorithms were used, and one target was studied—Patients outcome, that is, to predict if the patient will die or recover. Regarding the obtained results, the model that stood out is composed of scenario s4 (composed of all comorbidities, symptoms, and age), the decision tree algorithm, and the oversampling sampling method. The obtained results by the studied metrics were (in order of importance): Sensitivity of 95.20%, Accuracy of 90.67%, and Specificity of 86.08%. The models were deployed as a service, and they are part of a clinical decision support system that is available for authorized users anywhere and anytime. Full article
(This article belongs to the Special Issue Data Science and Knowledge Discovery)
Show Figures

Figure 1

21 pages, 5750 KiB  
Article
Coronary Centerline Extraction from CCTA Using 3D-UNet
by Alexandru Dorobanțiu, Valentin Ogrean and Remus Brad
Future Internet 2021, 13(4), 101; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040101 - 19 Apr 2021
Cited by 5 | Viewed by 3756
Abstract
The mesh-type coronary model, obtained from three-dimensional reconstruction using the sequence of images produced by computed tomography (CT), can be used to obtain useful diagnostic information, such as extracting the projection of the lumen (planar development along an artery). In this paper, we [...] Read more.
The mesh-type coronary model, obtained from three-dimensional reconstruction using the sequence of images produced by computed tomography (CT), can be used to obtain useful diagnostic information, such as extracting the projection of the lumen (planar development along an artery). In this paper, we have focused on automated coronary centerline extraction from cardiac computed tomography angiography (CCTA) proposing a 3D version of U-Net architecture, trained with a novel loss function and with augmented patches. We have obtained promising results for accuracy (between 90–95%) and overlap (between 90–94%) with various network training configurations on the data from the Rotterdam Coronary Artery Centerline Extraction benchmark. We have also demonstrated the ability of the proposed network to learn despite the huge class imbalance and sparse annotation present in the training data. Full article
Show Figures

Figure 1

16 pages, 319 KiB  
Article
Linking Phubbing Behavior to Self-Reported Attentional Failures and Media Multitasking
by Kayla S. Sansevere and Nathan Ward
Future Internet 2021, 13(4), 100; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040100 - 14 Apr 2021
Cited by 8 | Viewed by 2950
Abstract
Phubbing, or using a phone to snub another person, has been investigated through social and personality frameworks. Phubbing involves attending to and performing competing tasks, implying the involvement of attentional abilities. Yet, past research has not yet used a cognitive framework to establish [...] Read more.
Phubbing, or using a phone to snub another person, has been investigated through social and personality frameworks. Phubbing involves attending to and performing competing tasks, implying the involvement of attentional abilities. Yet, past research has not yet used a cognitive framework to establish a link between phubbing and attention. Using self-report data from a large online sample, we explored the associations between phubbing and everyday attentional failures. Phubbing was associated with difficulties in attentional shifting and distractibility, frequent attentional lapses, spontaneous and deliberate mind wandering, and attention-related cognitive errors. When examining these attention variables alongside several psychosocial and personality variables, attention-related cognitive errors acted as the biggest predictor of phubbing behavior. Phubbing was also positively correlated with media multitasking, which is a conceptually similar yet distinct technology use behavior. The results suggest that perceived everyday attentional failures are strongly associated with, and to an extent can predict, phubbing behavior, even more so than some social and personality variables. Technology has incorporated itself as a necessity, or at the very least a favored convenience, in most people’s lives. Characterizing technology multitasking behaviors from a variety of frameworks can help us better understand who is engaging in these behaviors and why. Full article
(This article belongs to the Section Techno-Social Smart Systems)
18 pages, 590 KiB  
Review
ICT in Rural Areas from the Perspective of Dairy Farming: A Systematic Review
by Alba Vázquez-López, Martín Barrasa-Rioja and Manuel Marey-Perez
Future Internet 2021, 13(4), 99; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040099 - 13 Apr 2021
Cited by 10 | Viewed by 3820
Abstract
This study presents a systematic review of 169 papers concerning the ICT (Information and Communication Technologies) related to rural areas, specifically to dairy farms. The objective was to delve into the relationship between dairy farmers and the administrative authorities via e-government, comparing this [...] Read more.
This study presents a systematic review of 169 papers concerning the ICT (Information and Communication Technologies) related to rural areas, specifically to dairy farms. The objective was to delve into the relationship between dairy farmers and the administrative authorities via e-government, comparing this area to another eight concerning the farmer’s needs and expectations in relation to the ICT in different fields of their business. We observed that areas such as connectivity and digital inclusion are the most covered areas not only at the study level but also at the government level since countries all over the world are trying to develop politics to put an end to the so-called “digital divide,” which affects rural areas more intensely. This is increasing due to the growing technological innovations. The areas of the market, production, financial development, management and counseling, Smart Farming, and Internet of Things have been approached, associated with the ICT in dairy farms, showing in the latter two an increasing number of papers in the last few years. The area of public administration in relation to dairy farms has also been covered, being remarkable the low number of pieces of research concerning the interaction by the farmers, more specifically by dairy farmers, with the public administration, which is surprising due to the new global need and especially in the European Union (EU) of interacting with it telematically by all legal entities. The results show that there are still barriers to the implementation of the electronic government (e-government) since the websites do not meet the user’s expectations. Therefore, this study lays the ground for future research on this area. As a graphical abstract of the contributions of this paper, we present a graphic summary, where the different contributions by areas and expressed in percentage values are shown. Full article
(This article belongs to the Section Techno-Social Smart Systems)
Show Figures

Graphical abstract

19 pages, 4720 KiB  
Article
Differentiated Teaching Based on Standardized Metrics Integrating Fuzzy Logic Type 2 Detection Theory: High School Case—PrepaTec, Mexico
by María Artemisa Sangermán Jiménez and Pedro Ponce
Future Internet 2021, 13(4), 98; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040098 - 13 Apr 2021
Cited by 2 | Viewed by 2559
Abstract
Universities and high schools constantly research and develop educational methods to improve the student learning process. This paper presents a novel educational methodology for students to obtain better learning results in Spanish grammar through an intervention that fuses differentiated instructions, standardized evaluation, and [...] Read more.
Universities and high schools constantly research and develop educational methods to improve the student learning process. This paper presents a novel educational methodology for students to obtain better learning results in Spanish grammar through an intervention that fuses differentiated instructions, standardized evaluation, and a Fuzzy Logic Type 2 system. This successful case study in a Mexico City high school reports improved Spanish grammar outcomes after the intervention. Before then, 79% of the students did not obtain satisfactory scores in a national Spanish evaluation. This educational methodology uses a flexible intervention plan that could be replicated or tailored for various educational scenarios and topics using the same framework. Full article
Show Figures

Graphical abstract

15 pages, 752 KiB  
Article
Implementation of a Virtual Assistant for the Academic Management of a University with the Use of Artificial Intelligence
by William Villegas-Ch, Joselin García-Ortiz, Karen Mullo-Ca, Santiago Sánchez-Viteri and Milton Roman-Cañizares
Future Internet 2021, 13(4), 97; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040097 - 13 Apr 2021
Cited by 17 | Viewed by 4878
Abstract
Currently, private universities, as a result of the pandemic that the world is facing, are going through very delicate moments in several areas, both academic and financial. Academically, there are learning problems and these are directly related to the dropout rate, which brings [...] Read more.
Currently, private universities, as a result of the pandemic that the world is facing, are going through very delicate moments in several areas, both academic and financial. Academically, there are learning problems and these are directly related to the dropout rate, which brings financial problems. Added to this are the economic problems caused by the pandemic, where the rates of students who want to access a private education have dropped considerably. For this reason, it is necessary for all private universities to have support to improve their student income and avoid cuts in budgets and resources. However, the academic part represents a great effort to fulfill their academic activities, which are the priority, with attention on those interested in pursuing a training programs. To solve these problems, it is important to integrate technologies such as Chatbots, which use artificial intelligence in such a way that tasks such as providing information on an academic courses are addressed by them, reducing the administrative burden and improving the user experience. At the same time, this encourages people to be a part of the college. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

22 pages, 457 KiB  
Review
Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey
by Shawal Khan, Ishita Sharma, Mazzamal Aslam, Muhammad Zahid Khan and Shahzad Khan
Future Internet 2021, 13(4), 96; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040096 - 10 Apr 2021
Cited by 31 | Viewed by 5939
Abstract
A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control and real-time information, event allocation. [...] Read more.
A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control and real-time information, event allocation. VANETs have received attention in support of safe driving, intelligent navigation, emergency and entertainment applications in vehicles. Nevertheless, these increasingly linked vehicles pose a range of new safety and security risks to both the host and its associated properties and may even have fatal consequences. Violations of national privacy and vehicle identities are a major obstacle to introducing forced contact protocols in vehicles. Location privacy refers to the privacy of the vehicle (driver) and the location of the vehicle. Whenever a vehicle sends a message, no one but authorized entities should know their real identity and location of the vehicle. All the messages sent by the vehicle must be authenticated before processing, hence location privacy is an important design aspect to be considered in VANETs operations. The novelty of this paper is that it specifically reviews location privacy in VANETs in terms of operational and safety concerns. Furthermore, it presents a critical analysis of various attacks, identity thefts, manipulation and other techniques in vogue for location privacy protection available in state-of-the-art solutions for VANETs. The efforts in this paper will help researchers to develop a great breadth of understanding pertaining to location privacy issues and various security threats encountered by VANETs and present the critical analysis of the available state-of-the- art solutions to maintain location privacy in VANETs. Full article
(This article belongs to the Collection Information Systems Security)
Show Figures

Figure 1

16 pages, 2948 KiB  
Review
Blockchain Applications in Agribusiness: A Systematic Review
by Geneci da Silva Ribeiro Rocha, Letícia de Oliveira and Edson Talamini
Future Internet 2021, 13(4), 95; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040095 - 08 Apr 2021
Cited by 39 | Viewed by 7014
Abstract
Blockchain is a technology that can be applied in different sectors to solve various problems. As a complex system, agribusiness presents many possibilities to take advantage of blockchain technology. The main goal of this paper is to identify the purposes for which blockchain [...] Read more.
Blockchain is a technology that can be applied in different sectors to solve various problems. As a complex system, agribusiness presents many possibilities to take advantage of blockchain technology. The main goal of this paper is to identify the purposes for which blockchain has been applied in the agribusiness sector, for which a PRISMA-based systematic review was carried out. The scientific literature corpus was accessed and selected from Elsevier’s Scopus and ISI of Knowledge’s Web of Science (WoS) platforms, using the PRISMA protocol procedures. Seventy-one articles were selected for analysis. Blockchain application in agribusiness is a novel topic, with the first publication dating from 2016. The technological development prevails more than blockchain applications since it has been addressed mainly in the Computer Sciences and Engineering. Blockchain applications for agribusiness management of financial, energy, logistical, environmental, agricultural, livestock, and industrial purposes have been reported in the literature. The findings suggest that blockchain brings many benefits when used in agribusiness supply chains. We concluded that the research on blockchain applications in agribusiness is only at an early stage, as many prototypes are being developed and tested in the laboratory. In the near future, blockchain will be increasingly applied across all economic sectors, including agribusiness, promoting greater reliability and agility in information with a reduced cost. Several gaps for future studies were observed, with significant value for science, industry, and society. Full article
(This article belongs to the Special Issue Blockchain: Applications, Challenges, and Solutions)
Show Figures

Figure 1

20 pages, 846 KiB  
Article
Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning
by Haokun Fang and Quan Qian
Future Internet 2021, 13(4), 94; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040094 - 08 Apr 2021
Cited by 133 | Viewed by 14368
Abstract
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated learning. The core idea is all learning parties [...] Read more.
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated learning. The core idea is all learning parties just transmitting the encrypted gradients by homomorphic encryption. From experiments, the model trained by PFMLP has almost the same accuracy, and the deviation is less than 1%. Considering the computational overhead of homomorphic encryption, we use an improved Paillier algorithm which can speed up the training by 25–28%. Moreover, comparisons on encryption key length, the learning network structure, number of learning clients, etc. are also discussed in detail in the paper. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

19 pages, 3934 KiB  
Article
iCaps-Dfake: An Integrated Capsule-Based Model for Deepfake Image and Video Detection
by Samar Samir Khalil, Sherin M. Youssef and Sherine Nagy Saleh
Future Internet 2021, 13(4), 93; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040093 - 05 Apr 2021
Cited by 32 | Viewed by 7195
Abstract
Fake media is spreading like wildfire all over the internet as a result of the great advancement in deepfake creation tools and the huge interest researchers and corporations are showing to explore its limits. Now anyone can create manipulated unethical media forensics, defame, [...] Read more.
Fake media is spreading like wildfire all over the internet as a result of the great advancement in deepfake creation tools and the huge interest researchers and corporations are showing to explore its limits. Now anyone can create manipulated unethical media forensics, defame, humiliate others or even scam them out of their money with a click of a button. In this research a new deepfake detection approach, iCaps-Dfake, is proposed that competes with state-of-the-art techniques of deepfake video detection and addresses their low generalization problem. Two feature extraction methods are combined, texture-based Local Binary Patterns (LBP) and Convolutional Neural Networks (CNN) based modified High-Resolution Network (HRNet), along with an application of capsule neural networks (CapsNets) implementing a concurrent routing technique. Experiments have been conducted on large benchmark datasets to evaluate the performance of the proposed model. Several performance metrics are applied and experimental results are analyzed. The proposed model was primarily trained and tested on the DeepFakeDetectionChallenge-Preview (DFDC-P) dataset then tested on Celeb-DF to examine its generalization capability. Experiments achieved an Area-Under Curve (AUC) score improvement of 20.25% over state-of-the-art models. Full article
(This article belongs to the Special Issue Digital and Social Media in the Disinformation Age)
Show Figures

Figure 1

23 pages, 1873 KiB  
Review
Site Experience Enhancement and Perspective in Cultural Heritage Fruition—A Survey on New Technologies and Methodologies Based on a “Four-Pillars” Approach
by Agnese Augello, Ignazio Infantino, Giovanni Pilato and Gianpaolo Vitale
Future Internet 2021, 13(4), 92; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040092 - 04 Apr 2021
Cited by 9 | Viewed by 3040
Abstract
This paper deals with innovative fruition modalities of cultural heritage sites. Based on two ongoing experiments, four pillars are considered, that is, User Localization, Multimodal Interaction, User Understanding and Gamification. A survey of the existing literature regarding one or more [...] Read more.
This paper deals with innovative fruition modalities of cultural heritage sites. Based on two ongoing experiments, four pillars are considered, that is, User Localization, Multimodal Interaction, User Understanding and Gamification. A survey of the existing literature regarding one or more issues related to the four pillars is proposed. It aims to put in evidence the exploitation of these contributions to cultural heritage. It is discussed how a cultural site can be enriched, extended and transformed into an intelligent multimodal environment in this perspective. This new augmented environment can focus on the visitor, analyze his activity and behavior, and make his experience more satisfying, fulfilling and unique. After an in-depth overview of the existing technologies and methodologies for the fruition of cultural interest sites, the two experiments are described in detail and the authors’ vision of the future is proposed. Full article
Show Figures

Figure 1

17 pages, 2916 KiB  
Article
Characterization of the Teaching Profile within the Framework of Education 4.0
by María Soledad Ramírez-Montoya, María Isabel Loaiza-Aguirre, Alexandra Zúñiga-Ojeda and May Portuguez-Castro
Future Internet 2021, 13(4), 91; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040091 - 01 Apr 2021
Cited by 50 | Viewed by 7426
Abstract
The authors of the Education 4.0 concept postulated a flexible combination of digital literacy, critical thinking, and problem-solving in educational environments linked to real-world scenarios. Therefore, teachers have been challenged to develop new methods and resources to integrate into their planning in order [...] Read more.
The authors of the Education 4.0 concept postulated a flexible combination of digital literacy, critical thinking, and problem-solving in educational environments linked to real-world scenarios. Therefore, teachers have been challenged to develop new methods and resources to integrate into their planning in order to help students develop these desirable and necessary skills; hence, the question: What are the characteristics of a teacher to consider within the framework of Education 4.0? This study was conducted in a higher education institution in Ecuador, with the aim to identify the teaching profile required in new undergraduate programs within the framework of Education 4.0 in order to contribute to decision-making about teacher recruitment, professional training and evaluation, human talent management, and institutional policies interested in connecting competencies with the needs of society. Descriptive and exploratory approaches, where we applied quantitative and qualitative instruments (surveys) to 337 undergraduate students in education programs and 313 graduates, were used. We also included interviews with 20 experts in the educational field and five focus groups with 32 chancellors, school principals, university professors, and specialists in the educational area. The data were triangulated, and the results were organized into the categories of (a) processes as facilitators (b), soft skills, (c) human sense, and (d) the use of technologies. The results outlined the profile of a professor as a specialized professional with competencies for innovation, complex problem solving, entrepreneurship, collaboration, international perspective, leadership, and connection with the needs of society. This research study may be of value to administrators, educational and social entrepreneurs, trainers, and policy-makers interested in implementing innovative training programs and in supporting management and policy decisions. Full article
Show Figures

Figure 1

18 pages, 1652 KiB  
Article
A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems
by Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar and Omar Alfandi
Future Internet 2021, 13(4), 90; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040090 - 31 Mar 2021
Cited by 26 | Viewed by 3540
Abstract
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft [...] Read more.
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N^3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory. Full article
(This article belongs to the Special Issue Privacy and Security Landscape and Challenges beyond COVID-19)
Show Figures

Figure 1

21 pages, 784 KiB  
Article
Overlapping Community Detection of Bipartite Networks Based on a Novel Community Density
by Yubo Peng, Bofeng Zhang and Furong Chang
Future Internet 2021, 13(4), 89; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040089 - 31 Mar 2021
Cited by 5 | Viewed by 2244
Abstract
Community detection plays an essential role in understanding network topology and mining underlying information. A bipartite network is a complex network with more important authenticity and applicability than a one-mode network in the real world. There are many communities in the network that [...] Read more.
Community detection plays an essential role in understanding network topology and mining underlying information. A bipartite network is a complex network with more important authenticity and applicability than a one-mode network in the real world. There are many communities in the network that present natural overlapping structures in the real world. However, most of the research focuses on detecting non-overlapping community structures in the bipartite network, and the resolution of the existing evaluation function for the community structure’s merits are limited. So, we propose a novel function for community detection and evaluation of the bipartite network, called community density D. And based on community density, a bipartite network community detection algorithm DSNE (Density Sub-community Node-pair Extraction) is proposed, which is effective for overlapping community detection from a micro point of view. The experiments based on artificially-generated networks and real-world networks show that the DSNE algorithm is superior to some existing excellent algorithms; in comparison, the community density (D) is better than the bipartite network’s modularity. Full article
Show Figures

Figure 1

17 pages, 4205 KiB  
Article
Research on the Impacts of Generalized Preceding Vehicle Information on Traffic Flow in V2X Environment
by Xiaoyuan Wang, Junyan Han, Chenglin Bai, Huili Shi, Jinglei Zhang and Gang Wang
Future Internet 2021, 13(4), 88; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040088 - 30 Mar 2021
Cited by 10 | Viewed by 2435
Abstract
With the application of vehicles to everything (V2X) technologies, drivers can obtain massive traffic information and adjust their car-following behavior according to the information. The macro-characteristics of traffic flow are essentially the overall expression of the micro-behavior of drivers. There are some shortcomings [...] Read more.
With the application of vehicles to everything (V2X) technologies, drivers can obtain massive traffic information and adjust their car-following behavior according to the information. The macro-characteristics of traffic flow are essentially the overall expression of the micro-behavior of drivers. There are some shortcomings in the previous researches on traffic flow in the V2X environment, which result in difficulties to employ the related models or methods in exploring the characteristics of traffic flow affected by the information of generalized preceding vehicles (GPV). Aiming at this, a simulation framework based on the car-following model and the cellular automata (CA) is proposed in this work, then the traffic flow affected by the information of GPV is simulated and analyzed utilizing this framework. The research results suggest that the traffic flow, which is affected by the information of GPV in the V2X environment, would operate with a higher value of velocity, volume as well as jamming density and can maintain the free flow state with a much higher density of vehicles. The simulation framework constructed in this work can provide a reference for further research on the characteristics of traffic flow affected by various information in the V2X environment. Full article
Show Figures

Figure 1

13 pages, 511 KiB  
Article
Performance Analysis of Internet of Things Interactions via Simulation-Based Queueing Models
by Georgios Bouloukakis, Ioannis Moscholios, Nikolaos Georgantas and Valérie Issarny
Future Internet 2021, 13(4), 87; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040087 - 29 Mar 2021
Cited by 7 | Viewed by 2014
Abstract
Numerous middleware application programming interfaces (APIs) and protocols were introduced in the literature in order to facilitate the application development of the Internet of Things (IoT). Such applications are built on reliable or even unreliable protocols that may implement different quality-of-service (QoS) delivery [...] Read more.
Numerous middleware application programming interfaces (APIs) and protocols were introduced in the literature in order to facilitate the application development of the Internet of Things (IoT). Such applications are built on reliable or even unreliable protocols that may implement different quality-of-service (QoS) delivery modes. The exploitation of these protocols, APIs and QoS modes, can satisfy QoS requirements in critical IoT applications (e.g., emergency response operations). To study QoS in IoT applications, it is essential to leverage a performance analysis methodology. Queueing-network models offer a modeling and analysis framework that can be adopted for the IoT interactions of QoS representation through either analytical or simulation models. In this paper, various types of queueing models are presented that can be used for the representation of various QoS settings of IoT interactions. In particular, we propose queueing models to represent message-drop probabilities, intermittent mobile connectivity, message availability or validity, the prioritization of important information, and the processing or transmission of messages. Our simulation models demonstrate the significant effect on delivery success rates and response times when QoS settings are varied. Full article
(This article belongs to the Special Issue Distributed Ledger Technologies for IoT and Softwarized Networks)
Show Figures

Figure 1

26 pages, 8492 KiB  
Article
Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability
by Neo C. K. Yiu
Future Internet 2021, 13(4), 86; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040086 - 29 Mar 2021
Cited by 33 | Viewed by 8069
Abstract
Existing product anti-counterfeiting and traceability solutions across today’s internationally spanning supply chain networks are indeed developed and implemented with centralized system architecture relying on centralized authorities or intermediaries. Vulnerabilities of centralized product anti-counterfeiting solutions could possibly lead to system failure or susceptibility of [...] Read more.
Existing product anti-counterfeiting and traceability solutions across today’s internationally spanning supply chain networks are indeed developed and implemented with centralized system architecture relying on centralized authorities or intermediaries. Vulnerabilities of centralized product anti-counterfeiting solutions could possibly lead to system failure or susceptibility of malicious modifications performed on product records or various potential attacks to the system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has progressed from simply being a use case of immutable ledger for cryptocurrency transactions, to a programmable interactive environment of developing decentralized and reliable applications addressing different use cases globally. Key areas of decentralization, fundamental system requirements, and feasible mechanisms of developing decentralized product anti-counterfeiting and traceability ecosystems utilizing blockchain technology are identified in this research, via a series of security analyses performed against solutions currently implemented in supply chain industry with centralized architecture. The decentralized solution will be a secure and immutable scientific data provenance tracking and management platform where provenance records, providing compelling properties on data integrity of luxurious goods, are recorded and verified automatically across the supply chain. Full article
(This article belongs to the Special Issue Blockchain: Applications, Challenges, and Solutions)
Show Figures

Figure 1

31 pages, 997 KiB  
Article
Two-Layer Network Caching for Different Service Requirements
by Gianluca Reali and Mauro Femminella
Future Internet 2021, 13(4), 85; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040085 - 27 Mar 2021
Cited by 2 | Viewed by 2232
Abstract
Network caching is a technique used to speed-up user access to frequently requested contents in complex data networks. This paper presents a two-layer overlay network caching system for content distribution. It is used to define some caching scenarios with increasing complexity, which refers [...] Read more.
Network caching is a technique used to speed-up user access to frequently requested contents in complex data networks. This paper presents a two-layer overlay network caching system for content distribution. It is used to define some caching scenarios with increasing complexity, which refers to real situations, including mobile 5G connectivity. For each scenario our aim is to maximize the hit ratio, which leads to the formulation of NP-complete optimization problems. The heuristic solutions proposed are based on the theory of the maximization of monotone submodular functions under matroid constraints. After the determination of the approximation ratio of the greedy heuristic algorithms proposed, a numerical performance analysis is shown. This analysis includes a comparison with the Least-Frequently Used (LFU) eviction strategy adapted to the analyzed systems. Results show very good performance, under the hypotheses of either known or unknown popularity of contents. Full article
(This article belongs to the Special Issue Information Processing and Management for Large and Complex Networks)
Show Figures

Figure 1

33 pages, 8009 KiB  
Article
Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology
by Neo C. K. Yiu
Future Internet 2021, 13(4), 84; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040084 - 25 Mar 2021
Cited by 22 | Viewed by 5925
Abstract
An interesting research problem in the supply chain industry is evaluating and determining the provenance of physical goods—demonstrating the authenticity of luxury goods such as bottled wine. However, many supply chain systems and networks have been built and implemented with centralized system architecture, [...] Read more.
An interesting research problem in the supply chain industry is evaluating and determining the provenance of physical goods—demonstrating the authenticity of luxury goods such as bottled wine. However, many supply chain systems and networks have been built and implemented with centralized system architecture, relying on centralized authorities or any form of intermediary, and leading to issues such as single-point processing, storage and failure, which could be susceptible to malicious modifications to product records or various potential attacks to system components by dishonest participant nodes traversing along the supply chain. Blockchain technology has evolved from merely being a decentralized, distributed and immutable ledger of cryptocurrency transactions to a programmable interactive environment for building decentralized and reliable applications addressing different use-cases and existing problems in the world. In this research, with a chosen research method of proof-by-demonstration, the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS) is proposed and developed, decentralizing a legacy anti-counterfeiting system of the supply-chain industry using Blockchain technology to facilitate trustworthy data provenance retrieval, verification and management, as well as strengthening the capability of the product’s anti-counterfeiting and traceability qualities in the wine industry, with the capacity to further extend this to the supply chain industry as a whole. The proposed dNAS utilizes a decentralized blockchain network with a consensus protocol compatible with the concept of enterprise blockchain, programmable smart contracts and a distributed file storage system to develop a secure and immutable scientific-data provenance tracking and management platform on which provenance records, providing compelling properties of the data integrity of luxurious goods, are recorded, verified and validated automatically. Full article
(This article belongs to the Special Issue The Next Blockchain Wave Current Challenges and Future Prospects)
Show Figures

Figure 1

12 pages, 425 KiB  
Article
Simulating and Evaluating a Real-World ElasticSearch System Using the RECAP DES Simulator
by Malika Bendechache, Sergej Svorobej, Patricia Takako Endo, Adrian Mihai and Theo Lynn
Future Internet 2021, 13(4), 83; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13040083 - 24 Mar 2021
Cited by 4 | Viewed by 2579
Abstract
Simulation has become an indispensable technique for modelling and evaluating the performance of large-scale systems efficiently and at a relatively low cost. ElasticSearch (ES) is one of the most popular open source large-scale distributed data indexing systems worldwide. In this paper, we use [...] Read more.
Simulation has become an indispensable technique for modelling and evaluating the performance of large-scale systems efficiently and at a relatively low cost. ElasticSearch (ES) is one of the most popular open source large-scale distributed data indexing systems worldwide. In this paper, we use the RECAP Discrete Event Simulator (DES) simulator, an extension of CloudSimPlus, to model and evaluate the performance of a real-world cloud-based ES deployment by an Irish small and medium-sized enterprise (SME), Opening.io. Following simulation experiments that explored how much query traffic the existing Opening.io architecture could cater for before performance degradation, a revised architecture was proposed, adding a new virtual machine in order to dissolve the bottleneck. The simulation results suggest that the proposed improved architecture can handle significantly larger query traffic (about 71% more) than the current architecture used by Opening.io. The results also suggest that the RECAP DES simulator is suitable for simulating ES systems and can help companies to understand their infrastructure bottlenecks under various traffic scenarios and inform optimisation and scalability decisions. Full article
(This article belongs to the Special Issue Resource Management in Fog/Edge Computing)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop