Next Issue
Volume 13, October
Previous Issue
Volume 13, August
 
 

Future Internet, Volume 13, Issue 9 (September 2021) – 21 articles

Cover Story (view full-size image): Building fires constitute a significant threat that affects property, the environment, and human health. The management of this risk requires an efficient fire evacuation system for buildings’ occupants. Therefore, a smart fire evacuation system that combines building information modeling (BIM) and smart technologies is proposed. The system provides the following capacities: (i) early fire detection, (ii) the evaluation of environmental data, (iii) the identification of the best evacuation path, and (iv) information for occupants about the best evacuation routes. The system was implemented in a research building at Lille University in France. The results show the system’s capacities and benefits, particularly for the identification of the best evacuation paths. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
3 pages, 157 KiB  
Editorial
Wireless Internet, Multimedia, and Artificial Intelligence: New Applications and Infrastructures
by Roberto Saia, Salvatore Carta and Olaf Bergmann
Future Internet 2021, 13(9), 240; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090240 - 21 Sep 2021
Viewed by 1723
Abstract
The potential offered by the Internet, combined with the enormous number of connectable devices, offers benefits in many areas of our modern societies, both public and private. The possibility of making heterogeneous devices communicate with each other through the Internet has given rise [...] Read more.
The potential offered by the Internet, combined with the enormous number of connectable devices, offers benefits in many areas of our modern societies, both public and private. The possibility of making heterogeneous devices communicate with each other through the Internet has given rise to a constantly growing scenario, which was unthinkable not long ago. This unstoppable growth takes place thanks to the continuous availability of increasingly sophisticated device features, an ever-increasing bandwidth and reliability of the connections, and the ever-lower consumption of the devices, which grants them long autonomy. This scenario of exponential growth also involves other sectors such as, for example, that of Artificial Intelligence (AI), which offers us increasingly sophisticated approaches that can be synergistically combined with wireless devices and the Internet in order to create powerful applications for everyday life. Precisely for the aforementioned reasons, the community of researchers, year by year, dedicates more time and resources in this direction. It should be observed that this happens in an atypical way concerning the other research fields, and this is because the achieved progress and the developed applications have practical applications in numerous and different domains. Full article
26 pages, 4889 KiB  
Article
A Fusion-Based Hybrid-Feature Approach for Recognition of Unconstrained Offline Handwritten Hindi Characters
by Danveer Rajpal, Akhil Ranjan Garg, Om Prakash Mahela, Hassan Haes Alhelou and Pierluigi Siano
Future Internet 2021, 13(9), 239; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090239 - 18 Sep 2021
Cited by 3 | Viewed by 2282
Abstract
Hindi is the official language of India and used by a large population for several public services like postal, bank, judiciary, and public surveys. Efficient management of these services needs language-based automation. The proposed model addresses the problem of handwritten Hindi character recognition [...] Read more.
Hindi is the official language of India and used by a large population for several public services like postal, bank, judiciary, and public surveys. Efficient management of these services needs language-based automation. The proposed model addresses the problem of handwritten Hindi character recognition using a machine learning approach. The pre-trained DCNN models namely; InceptionV3-Net, VGG19-Net, and ResNet50 were used for the extraction of salient features from the characters’ images. A novel approach of fusion is adopted in the proposed work; the DCNN-based features are fused with the handcrafted features received from Bi-orthogonal discrete wavelet transform. The feature size was reduced by the Principal Component Analysis method. The hybrid features were examined with popular classifiers namely; Multi-Layer Perceptron (MLP) and Support Vector Machine (SVM). The recognition cost was reduced by 84.37%. The model achieved significant scores of precision, recall, and F1-measure—98.78%, 98.67%, and 98.69%—with overall recognition accuracy of 98.73%. Full article
(This article belongs to the Special Issue Service-Oriented Systems and Applications)
Show Figures

Figure 1

15 pages, 2179 KiB  
Article
WATS-SMS: A T5-Based French Wikipedia Abstractive Text Summarizer for SMS
by Jean Louis Ebongue Kedieng Fendji, Désiré Manuel Taira, Marcellin Atemkeng and Adam Musa Ali
Future Internet 2021, 13(9), 238; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090238 - 18 Sep 2021
Cited by 4 | Viewed by 3171
Abstract
Text summarization remains a challenging task in the natural language processing field despite the plethora of applications in enterprises and daily life. One of the common use cases is the summarization of web pages which has the potential to provide an overview of [...] Read more.
Text summarization remains a challenging task in the natural language processing field despite the plethora of applications in enterprises and daily life. One of the common use cases is the summarization of web pages which has the potential to provide an overview of web pages to devices with limited features. In fact, despite the increasing penetration rate of mobile devices in rural areas, the bulk of those devices offer limited features in addition to the fact that these areas are covered with limited connectivity such as the GSM network. Summarizing web pages into SMS becomes, therefore, an important task to provide information to limited devices. This work introduces WATS-SMS, a T5-based French Wikipedia Abstractive Text Summarizer for SMS. It is built through a transfer learning approach. The T5 English pre-trained model is used to generate a French text summarization model by retraining the model on 25,000 Wikipedia pages then compared with different approaches in the literature. The objective is twofold: (1) to check the assumption made in the literature that abstractive models provide better results compared to extractive ones; and (2) to evaluate the performance of our model compared to other existing abstractive models. A score based on ROUGE metrics gave us a value of 52% for articles with length up to 500 characters against 34.2% for transformer-ED and 12.7% for seq-2seq-attention; and a value of 77% for articles with larger size against 37% for transformers-DMCA. Moreover, an architecture including a software SMS-gateway has been developed to allow owners of mobile devices with limited features to send requests and to receive summaries through the GSM network. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

16 pages, 815 KiB  
Article
Real-Time Power Electronics Laboratory to Strengthen Distance Learning Engineering Education on Smart Grids and Microgrids
by Juan Roberto López Gutiérrez, Pedro Ponce and Arturo Molina
Future Internet 2021, 13(9), 237; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090237 - 17 Sep 2021
Cited by 6 | Viewed by 2651
Abstract
In the science and engineering fields of study, a hands-on learning experience is as crucial a part of the learning process for the student as the theoretical aspect of a given subject. With the COVID-19 pandemic in 2020, educational institutions were forced to [...] Read more.
In the science and engineering fields of study, a hands-on learning experience is as crucial a part of the learning process for the student as the theoretical aspect of a given subject. With the COVID-19 pandemic in 2020, educational institutions were forced to migrate to digital platforms to ensure the continuity of the imparted lectures. The online approach can be challenging for engineering programs, especially in courses that employ practical laboratory methods as the primary teaching strategies. Laboratory courses that include specialized hardware and software cannot migrate to a virtual environment without compromising the advantages that a hands-on method provides to the engineering student. This work assesses different approaches in the virtualization process of a laboratory facility, diving these into key factors such as required communication infrastructure and available technologies; it opens a discussion on the trends and possible obstacles in the virtualization of a Real-Time (RT) laboratory intended for Microgrid education in a power electronics laboratory course, exposing the main simulation strategies that can be used in an RT environment and how these have different effects on the learning process of student, as well as addressing the main competencies an engineering student can strengthen through interaction with RT simulation technologies. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

13 pages, 995 KiB  
Article
Preference for Number of Friends in Online Social Networks
by Fanhui Meng, Haoming Sun, Jiarong Xie, Chengjun Wang, Jiajing Wu and Yanqing Hu
Future Internet 2021, 13(9), 236; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090236 - 16 Sep 2021
Cited by 4 | Viewed by 2754
Abstract
Preferences or dislikes for specific numbers are ubiquitous in human society. In traditional Chinese culture, people show special preference for some numbers, such as 6, 8, 10, 100, 200, etc. By analyzing the data of 6.8 million users of Sina Weibo, one of [...] Read more.
Preferences or dislikes for specific numbers are ubiquitous in human society. In traditional Chinese culture, people show special preference for some numbers, such as 6, 8, 10, 100, 200, etc. By analyzing the data of 6.8 million users of Sina Weibo, one of the largest online social media platforms in China, we discover that users exhibit a distinct preference for the number 200, i.e., a significant fraction of users prefer to follow 200 friends. This number, which is very close to the Dunbar number that predicts the cognitive limit on the number of stable social relationships, motivates us to investigate how the preference for numbers in traditional Chinese culture is reflected on social media. We systematically portray users who prefer 200 friends and analyze their several important social features, including activity, popularity, attention tendency, regional distribution, economic level, and education level. We find that the activity and popularity of users with the preference for the number 200 are relatively lower than others. They are more inclined to follow popular users, and their social portraits change relatively slowly. Besides, users who have a stronger preference for the number 200 are more likely to be located in regions with underdeveloped economies and education. That indicates users with the preference for the number 200 are likely to be vulnerable groups in society and are easily affected by opinion leaders. Full article
(This article belongs to the Section Techno-Social Smart Systems)
Show Figures

Figure 1

13 pages, 3120 KiB  
Article
Reader–Tag Commands via Modulation Cutoff Intervals in RFID Systems
by Abdallah Y. Alma’aitah and Mohammad A. Massad
Future Internet 2021, 13(9), 235; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090235 - 16 Sep 2021
Viewed by 1592
Abstract
Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack [...] Read more.
Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack of carrier sensing at the tags. This paper proposes the modulation cutoff intervals (MCI) process as a novel reader–tag interaction given the lack of carrier sensing constraints in passive RFID tags. MCI is facilitated through a simple digital baseband modulation termination (DBMT) circuit at the tag. DBMT detects the continuous-wave cutoff by the reader. In addition, DBMT provides different flags based on the duration of the continuous-wave cutoff. Given this capability at the tag, the reader cuts off its continuous-wave transmission for predefined intervals to indicate different commands to the interrogated tag(s). The MCI process is applied to tag interrogation (or anti-collision) and tag-counting protocols. The MCI process effect was evaluated by the two protocols under high and low tag populations. The performance of such protocols was significantly enhanced with precise synchronization within time slots with more than 50% and more than 55.6% enhancement on time and power performance of anti-collision and counting protocols, respectively. Through the MCI process, fast and power-efficient tag identification is achieved in inventory systems with low and high tag mobility; alternatively, in addition to the rapid and power efficient interaction with tags, anonymous tag counting is conducted by the proposed process. Full article
Show Figures

Figure 1

19 pages, 20867 KiB  
Article
A Study of Gender Bias in Face Presentation Attack and Its Mitigation
by Norah Alshareef, Xiaohong Yuan, Kaushik Roy and Mustafa Atay
Future Internet 2021, 13(9), 234; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090234 - 14 Sep 2021
Cited by 4 | Viewed by 3156
Abstract
In biometric systems, the process of identifying or verifying people using facial data must be highly accurate to ensure a high level of security and credibility. Many researchers investigated the fairness of face recognition systems and reported demographic bias. However, there was not [...] Read more.
In biometric systems, the process of identifying or verifying people using facial data must be highly accurate to ensure a high level of security and credibility. Many researchers investigated the fairness of face recognition systems and reported demographic bias. However, there was not much study on face presentation attack detection technology (PAD) in terms of bias. This research sheds light on bias in face spoofing detection by implementing two phases. First, two CNN (convolutional neural network)-based presentation attack detection models, ResNet50 and VGG16 were used to evaluate the fairness of detecting imposer attacks on the basis of gender. In addition, different sizes of Spoof in the Wild (SiW) testing and training data were used in the first phase to study the effect of gender distribution on the models’ performance. Second, the debiasing variational autoencoder (DB-VAE) (Amini, A., et al., Uncovering and Mitigating Algorithmic Bias through Learned Latent Structure) was applied in combination with VGG16 to assess its ability to mitigate bias in presentation attack detection. Our experiments exposed minor gender bias in CNN-based presentation attack detection methods. In addition, it was proven that imbalance in training and testing data does not necessarily lead to gender bias in the model’s performance. Results proved that the DB-VAE approach (Amini, A., et al., Uncovering and Mitigating Algorithmic Bias through Learned Latent Structure) succeeded in mitigating bias in detecting spoof faces. Full article
(This article belongs to the Collection Machine Learning Approaches for User Identity)
Show Figures

Figure 1

22 pages, 18330 KiB  
Article
A Review on Clustering Techniques: Creating Better User Experience for Online Roadshow
by Zhou-Yi Lim, Lee-Yeng Ong and Meng-Chew Leow
Future Internet 2021, 13(9), 233; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090233 - 13 Sep 2021
Cited by 7 | Viewed by 3362
Abstract
Online roadshow is a relatively new concept that has higher flexibility and scalability compared to the physical roadshow. This is because online roadshow is accessible through digital devices anywhere and anytime. In a physical roadshow, organizations can measure the effectiveness of the roadshow [...] Read more.
Online roadshow is a relatively new concept that has higher flexibility and scalability compared to the physical roadshow. This is because online roadshow is accessible through digital devices anywhere and anytime. In a physical roadshow, organizations can measure the effectiveness of the roadshow by interacting with the customers. However, organizations cannot monitor the effectiveness of the online roadshow by using the same method. A good user experience is important to increase the advertising effects on the online roadshow website. In web usage mining, clustering can discover user access patterns from the weblog. By applying a clustering technique, the online roadshow website can be further improved to provide a better user experience. This paper presents a review of clustering techniques used in web usage mining, namely the partition-based, hierarchical, density-based, and fuzzy clustering techniques. These clustering techniques are analyzed from three perspectives: their similarity measures, the evaluation metrics used to determine the optimality of the clusters, and the functional purpose of applying the techniques to improve the user experience of the website. By applying clustering techniques in different stages of the user activities in the online roadshow website, the advertising effectiveness of the website can be enhanced in terms of its affordance, flow, and interactivity. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Graphical abstract

24 pages, 820 KiB  
Article
Spectrum Demand Forecasting for IoT Services
by Daniel Jaramillo-Ramirez and Manuel Perez
Future Internet 2021, 13(9), 232; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090232 - 08 Sep 2021
Cited by 1 | Viewed by 1963
Abstract
The evolution of IoT has come with the challenge of connecting not only a massive number of devices, but also providing an always wider variety of services. In the next few years, a big increase in the number of connected devices is expected, [...] Read more.
The evolution of IoT has come with the challenge of connecting not only a massive number of devices, but also providing an always wider variety of services. In the next few years, a big increase in the number of connected devices is expected, together with an important increase in the amount of traffic generated. Never before have wireless communications permeated so deeply in all industries and economic sectors. Therefore, it is crucial to correctly forecast the spectrum needs, which bands should be used for which services, and the economic potential of its utilization. This paper proposes a methodology for spectrum forecasting consisting of two phases: a market study and a spectrum forecasting model. The market study determines the main drivers of the IoT industry for any country: services, technologies, frequency bands, and the number of devices that will require IoT connectivity. The forecasting model takes the market study as the input and calculates the spectrum demand in 5 steps: Defining scenarios for spectrum contention, calculating the offered traffic load, calculating a capacity for some QoS requirements, finding the spectrum required, and adjusting according to key spectral efficiency determinants. This methodology is applied for Colombia’s IoT spectrum forecast. We provide a complete step-by-step implementation in fourteen independent spectrum contention scenarios, calculating offered traffic, required capacity, and spectrum for cellular licensed bands and non-cellular unlicensed bands in a 10-year period. Detailed results are presented specifying coverage area requirements per economic sector, frequency band, and service. The need for higher teledensity and higher spectral efficiency turns out to be a determining factor for spectrum savings. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

25 pages, 11180 KiB  
Article
User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model
by Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam
Future Internet 2021, 13(9), 231; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090231 - 06 Sep 2021
Cited by 4 | Viewed by 3401
Abstract
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, diagnosis system of Parkinson’s disease, Attention-deficit/hyperactivity disorders, analysis [...] Read more.
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, diagnosis system of Parkinson’s disease, Attention-deficit/hyperactivity disorders, analysis of vulnerable people (stressed, elderly, or drugged), prediction of gender, handedness and so on. Classical authentication systems are image-based, text-dependent, and password or fingerprint-based where the former one has the risk of information leakage. Alternatively, image processing and pattern-analysis-based systems are vulnerable to camera attributes, camera frames, light effect, and the quality of the image or pattern. Thus, in this paper, we concentrate on real-time and context-free handwriting data analysis for robust user authentication systems using digital pen-tablet sensor data. Most of the state-of-the-art authentication models show suboptimal performance for improper features. This research proposed a robust and efficient user identification system using an optimal feature selection technique based on the features from the sensor’s signal of pen and tablet devices. The proposed system includes more genuine and accurate numerical data which are used for features extraction model based on both the kinematic and statistical features of individual handwritings. Sensor data of digital pen-tablet devices generate high dimensional feature vectors for user identification. However, all the features do not play equal contribution to identify a user. Hence, to find out the optimal features, we utilized a hybrid feature selection model. Extracted features are then fed to the popular machine learning (ML) algorithms to generate a nonlinear classifier through training and testing phases. The experimental result analysis shows that the proposed model achieves more accurate and satisfactory results which ensure the practicality of our system for user identification with low computational cost. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Graphical abstract

28 pages, 754 KiB  
Article
Exploring Variability of Visual Accessibility Options in Operating Systems
by Austin Waffo Kouhoué, Yoann Bonavero, Thomas Bouétou Bouétou and Marianne Huchard
Future Internet 2021, 13(9), 230; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090230 - 04 Sep 2021
Cited by 3 | Viewed by 2311
Abstract
Digital technologies are an opportunity to overcome disabilities, provided that accessibility is ensured. In this paper, we focus on visual accessibility and the way it is supported in Operating Systems (OS). The significant variability in this support has practical consequences, e.g., the difficulty [...] Read more.
Digital technologies are an opportunity to overcome disabilities, provided that accessibility is ensured. In this paper, we focus on visual accessibility and the way it is supported in Operating Systems (OS). The significant variability in this support has practical consequences, e.g., the difficulty to recommend or select an OS, or migrate from one OS to another. This suggests building a variability model for OS that would classify them and would serve as a reference. We propose a methodology to build such a variability model with the help of the Formal Concept Analysis (FCA) framework. In addition, as visual accessibility can be divided into several concerns (e.g., zoom, or contrast), we leverage an extension of FCA, namely Relational Concept Analysis. We also build an ontology to dispose of a standardized description of visual accessibility options. We apply our proposal to the analysis of the variability of a few representative operating systems. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

13 pages, 892 KiB  
Article
Globally Scheduling Volunteer Computing
by David P. Anderson
Future Internet 2021, 13(9), 229; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090229 - 31 Aug 2021
Cited by 2 | Viewed by 3457
Abstract
Volunteer computing uses millions of consumer computing devices (desktop and laptop computers, tablets, phones, appliances, and cars) to do high-throughput scientific computing. It can provide Exa-scale capacity, and it is a scalable and sustainable alternative to data-center computing. Currently, about 30 science projects [...] Read more.
Volunteer computing uses millions of consumer computing devices (desktop and laptop computers, tablets, phones, appliances, and cars) to do high-throughput scientific computing. It can provide Exa-scale capacity, and it is a scalable and sustainable alternative to data-center computing. Currently, about 30 science projects use volunteer computing in areas ranging from biomedicine to cosmology. Each project has application programs with particular hardware and software requirements (memory, GPUs, VM support, and so on). Each volunteered device has specific hardware and software capabilities, and each device owner has preferences for which science areas they want to support. This leads to a scheduling problem: how to dynamically assign devices to projects in a way that satisfies various constraints and that balances various goals. We describe the scheduling policy used in Science United, a global manager for volunteer computing. Full article
(This article belongs to the Special Issue Parallel, Distributed and Grid/Cloud/P2P Computing)
Show Figures

Figure 1

12 pages, 1674 KiB  
Technical Note
Network Theory and Switching Behaviors: A User Guide for Analyzing Electronic Records Databases
by Giorgio Gronchi, Marco Raglianti and Fabio Giovannelli
Future Internet 2021, 13(9), 228; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090228 - 31 Aug 2021
Viewed by 1918
Abstract
As part of studies that employ health electronic records databases, this paper advocates the employment of graph theory for investigating drug-switching behaviors. Unlike the shared approach in this field (comparing groups that have switched with control groups), network theory can provide information about [...] Read more.
As part of studies that employ health electronic records databases, this paper advocates the employment of graph theory for investigating drug-switching behaviors. Unlike the shared approach in this field (comparing groups that have switched with control groups), network theory can provide information about actual switching behavior patterns. After a brief and simple introduction to fundamental concepts of network theory, here we present (i) a Python script to obtain an adjacency matrix from a records database and (ii) an illustrative example of the application of network theory basic concepts to investigate drug-switching behaviors. Further potentialities of network theory (weighted matrices and the use of clustering algorithms), along with the generalization of these methods to other kinds of switching behaviors beyond drug switching, are discussed. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

17 pages, 387 KiB  
Article
Megalos: A Scalable Architecture for the Virtualization of Large Network Scenarios
by Mariano Scazzariello, Lorenzo Ariemma, Giuseppe Di Battista and Maurizio Patrignani
Future Internet 2021, 13(9), 227; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090227 - 30 Aug 2021
Cited by 6 | Viewed by 3571
Abstract
We introduce an open-source, scalable, and distributed architecture, called Megalos, that supports the implementation of virtual network scenarios consisting of virtual devices (VDs) where each VD may have several Layer 2 interfaces assigned to virtual LANs. We rely on Docker containers to realize [...] Read more.
We introduce an open-source, scalable, and distributed architecture, called Megalos, that supports the implementation of virtual network scenarios consisting of virtual devices (VDs) where each VD may have several Layer 2 interfaces assigned to virtual LANs. We rely on Docker containers to realize vendor-independent VDs and we leverage Kubernetes for the management of the nodes of a distributed cluster. Our architecture does not require platform-specific configurations and supports a seamless interconnection between the virtual environment and the physical one. Also, it guarantees the segregation of each virtual LAN traffic from the traffic of other LANs, from the cluster traffic, and from Internet traffic. Further, a packet is only sent to the cluster node containing the recipient VD. We produce several example applications where we emulate large network scenarios, with thousands of VDs and LANs. Finally, we experimentally show the scalability potential of Megalos by measuring the overhead of the distributed environment and of its signaling protocols. Full article
(This article belongs to the Special Issue Information Processing and Management for Large and Complex Networks)
Show Figures

Figure 1

17 pages, 1279 KiB  
Article
Improving RE-SWOT Analysis with Sentiment Classification: A Case Study of Travel Agencies
by Shu-Fen Tu, Ching-Sheng Hsu and Yu-Tzu Lu
Future Internet 2021, 13(9), 226; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090226 - 30 Aug 2021
Cited by 1 | Viewed by 4941
Abstract
Nowadays, many companies collect online user reviews to determine how users evaluate their products. Dalpiaz and Parente proposed the RE-SWOT method to automatically generate a SWOT matrix based on online user reviews. The SWOT matrix is an important basis for a company to [...] Read more.
Nowadays, many companies collect online user reviews to determine how users evaluate their products. Dalpiaz and Parente proposed the RE-SWOT method to automatically generate a SWOT matrix based on online user reviews. The SWOT matrix is an important basis for a company to perform competitive analysis; therefore, RE-SWOT is a very helpful tool for organizations. Dalpiaz and Parente calculated feature performance scores based on user reviews and ratings to generate the SWOT matrix. However, the authors did not propose a solution for situations when user ratings are not available. Unfortunately, it is not uncommon for forums to only have user reviews but no user ratings. In this paper, sentiment analysis is used to deal with the situation where user ratings are not available. We also use KKday, a start-up online travel agency in Taiwan as an example to demonstrate how to use the proposed method to build a SWOT matrix. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

18 pages, 1611 KiB  
Article
Spatiotemporal Traffic Prediction Using Hierarchical Bayesian Modeling
by Taghreed Alghamdi, Khalid Elgazzar and Taysseer Sharaf
Future Internet 2021, 13(9), 225; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090225 - 30 Aug 2021
Cited by 1 | Viewed by 1913
Abstract
Hierarchical Bayesian models (HBM) are powerful tools that can be used for spatiotemporal analysis. The hierarchy feature associated with Bayesian modeling enhances the accuracy and precision of spatiotemporal predictions. This paper leverages the hierarchy of the Bayesian approach using the three models; the [...] Read more.
Hierarchical Bayesian models (HBM) are powerful tools that can be used for spatiotemporal analysis. The hierarchy feature associated with Bayesian modeling enhances the accuracy and precision of spatiotemporal predictions. This paper leverages the hierarchy of the Bayesian approach using the three models; the Gaussian process (GP), autoregressive (AR), and Gaussian predictive processes (GPP) to predict long-term traffic status in urban settings. These models are applied on two different datasets with missing observation. In terms of modeling sparse datasets, the GPP model outperforms the other models. However, the GPP model is not applicable for modeling data with spatial points close to each other. The AR model outperforms the GP models in terms of temporal forecasting. The GP model is used with different covariance matrices: exponential, Gaussian, spherical, and Matérn to capture the spatial correlation. The exponential covariance yields the best precision in spatial analysis with the Gaussian process, while the Gaussian covariance outperforms the others in temporal forecasting. Full article
Show Figures

Figure 1

21 pages, 3824 KiB  
Article
YouTube Videos in the Virtual Flipped Classroom Model Using Brain Signals and Facial Expressions
by María Artemisa Sangermán Jiménez, Pedro Ponce and Esteban Vázquez-Cano
Future Internet 2021, 13(9), 224; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090224 - 30 Aug 2021
Cited by 10 | Viewed by 3155
Abstract
As a result of the confinement due to the COVID-19 pandemic, various educational institutions migrated their face-to-face teaching modality to a virtual modality. This article presents the implementation of the Flipped Classroom model in a completely virtual format to develop grammatical competency in [...] Read more.
As a result of the confinement due to the COVID-19 pandemic, various educational institutions migrated their face-to-face teaching modality to a virtual modality. This article presents the implementation of the Flipped Classroom model in a completely virtual format to develop grammatical competency in Spanish. The model used videos from YouTube, one of the leading global social network platforms, and the videoconferencing system Zoom, the tool selected by the studied educational institution to continue academic operations during the health confinement. The model was enriched with the Index for Learning Style test to provide more differentiated teaching. This study showed considerable improvement in the academic performance of high school students taking a Spanish course at the Mexico City campus of Tecnologico de Monterrey. Of the total sample, 98% increased their score by between 2 and 46 points, from a total of 100, in their grammatical competency in Spanish. Additionally, the student satisfaction survey showed that more than 90% considered the course methodology beneficial for developing their grammatical competency in Spanish. This study demonstrates the potential of the Flipped Classroom model in a virtual format. This teaching structure using the Flipped Classroom model could be replicated in various educational settings and for different areas of knowledge. Full article
(This article belongs to the Special Issue E-Learning and Technology Enhanced Learning II)
Show Figures

Figure 1

12 pages, 1285 KiB  
Article
The Role of Verbal Aggression in Cyberbullying Perpetration and Victimization by Middle School Students
by Jen Eden and Anthony J. Roberto
Future Internet 2021, 13(9), 223; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090223 - 30 Aug 2021
Cited by 4 | Viewed by 3436
Abstract
This manuscript examined the role trait verbal aggression plays in cyberbullying victimization and perpetration in adolescence. More than 400 middle school students (46.8% males and 52.2% females) completed a questionnaire on trait verbal aggression and their history of cyberbullying perpetration and victimization. Linear [...] Read more.
This manuscript examined the role trait verbal aggression plays in cyberbullying victimization and perpetration in adolescence. More than 400 middle school students (46.8% males and 52.2% females) completed a questionnaire on trait verbal aggression and their history of cyberbullying perpetration and victimization. Linear regression analyses revealed that trait verbal aggression was a statistically significant predictor of both cyberbullying perpetration and victimization, that cyberbullying perpetration and cyberbullying victimization are related, and that cyberbullying perpetration appears to increase with age, while cyberbullying victimization does not. Ideas and implications for future applications of verbal aggression and cyberbullying are discussed. Full article
(This article belongs to the Special Issue Cyberbullying Analysis in Higher Education)
Show Figures

Figure 1

10 pages, 385 KiB  
Article
Stiffness Analysis to Predict the Spread Out of Fake Information
by Raffaele D’Ambrosio, Giuseppe Giordano, Serena Mottola and Beatrice Paternoster
Future Internet 2021, 13(9), 222; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090222 - 28 Aug 2021
Cited by 11 | Viewed by 2408
Abstract
This work highlights how the stiffness index, which is often used as a measure of stiffness for differential problems, can be employed to model the spread of fake news. In particular, we show that the higher the stiffness index is, the more rapid [...] Read more.
This work highlights how the stiffness index, which is often used as a measure of stiffness for differential problems, can be employed to model the spread of fake news. In particular, we show that the higher the stiffness index is, the more rapid the transit of fake news in a given population. The illustration of our idea is presented through the stiffness analysis of the classical SIR model, commonly used to model the spread of epidemics in a given population. Numerical experiments, performed on real data, support the effectiveness of the approach. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

16 pages, 9390 KiB  
Article
A BIM-Based Smart System for Fire Evacuation
by Rania Wehbe and Isam Shahrour
Future Internet 2021, 13(9), 221; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090221 - 25 Aug 2021
Cited by 29 | Viewed by 5522
Abstract
Building fires constitute a significant threat that affects property, the environment, and human health. The management of this risk requires an efficient fire evacuation system for buildings’ occupants. Therefore, a smart fire evacuation system that combines building information modeling (BIM) and smart technologies [...] Read more.
Building fires constitute a significant threat that affects property, the environment, and human health. The management of this risk requires an efficient fire evacuation system for buildings’ occupants. Therefore, a smart fire evacuation system that combines building information modeling (BIM) and smart technologies is proposed. The system provides the following capacities: (i) early fire detection; (ii) the evaluation of environmental data; (iii) the identification of the best evacuation path; and (iv) information for occupants about the best evacuation routes. The system was implemented in a research building at Lille University in France. The results show the system’s capacities and benefits, particularly for the identification of the best evacuation paths. Full article
Show Figures

Figure 1

13 pages, 1960 KiB  
Article
Trend Prediction of Event Popularity from Microblogs
by Xujian Zhao and Wei Li
Future Internet 2021, 13(9), 220; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13090220 - 24 Aug 2021
Cited by 3 | Viewed by 2034
Abstract
Owing to rapid development of the Internet and the rise of the big data era, microblog has become the main means for people to spread and obtain information. If people can accurately predict the development trend of a microblog event, it will be [...] Read more.
Owing to rapid development of the Internet and the rise of the big data era, microblog has become the main means for people to spread and obtain information. If people can accurately predict the development trend of a microblog event, it will be of great significance for the government to carry out public relations activities on network event supervision and guide the development of microblog event reasonably for network crisis. This paper presents effective solutions to deal with trend prediction of microblog events’ popularity. Firstly, by selecting the influence factors and quantifying the weight of each factor with an information entropy algorithm, the microblog event popularity is modeled. Secondly, the singular spectrum analysis is carried out to decompose and reconstruct the time series of the popularity of microblog event. Then, the box chart method is used to divide the popularity of microblog event into various trend spaces. In addition, this paper exploits the Bi-LSTM model to deal with trend prediction with a sequence to label model. Finally, the comparative experimental analysis is carried out on two real data sets crawled from Sina Weibo platform. Compared to three comparative methods, the experimental results show that our proposal improves F1-score by up to 39%. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop