Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 15, February
Previous Issue
Volume 14, December
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Future Internet, Volume 15, Issue 1 (January 2023) – 39 articles

Cover Story (view full-size image): Smart cities usually employ wireless mesh networks (WMN) to extend their communication range. However, such large-scale IoT deployments may face several network challenges related to the existing network characteristics, e.g., areas with dynamic network changes. Named-data networking (NDN) can enhance IoT performance, through the content naming scheme and in-network caching, but it necessitates adaptability to wireless connectivity conditions. In this study, we target efficient NDN communication in terms of performance (i.e., delay), evaluating and discussing the benefits provided by (i) a dynamic SDN-based solution that integrates the NDN operation with the routing decisions of a WMN routing protocol; and (ii) a static one based on clustering of real WMN quality measurements. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
21 pages, 9280 KiB  
Article
Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking
by Neamah S. Radam, Sufyan T. Faraj Al-Janabi and Khalid Sh. Jasim
Future Internet 2023, 15(1), 39; https://doi.org/10.3390/fi15010039 - 16 Jan 2023
Cited by 3 | Viewed by 2627
Abstract
The multi-controller placement problem (MCPP) represents one of the most challenging issues in software-defined networks (SDNs). High-efficiency and scalable optimized solutions can be achieved for a given position in such networks, thereby enhancing various aspects of programmability, configuration, and construction. In this paper, [...] Read more.
The multi-controller placement problem (MCPP) represents one of the most challenging issues in software-defined networks (SDNs). High-efficiency and scalable optimized solutions can be achieved for a given position in such networks, thereby enhancing various aspects of programmability, configuration, and construction. In this paper, we propose a model called simulated annealing for multi-controllers in SDN (SA-MCSDN) to solve the problem of placing multiple controllers in appropriate locations by considering estimated distances and distribution times among the controllers, as well as between controllers and switches (C2S). We simulated the proposed mathematical model using Network Simulator NS3 in the Linux Ubuntu environment to extract the performance results. We then compared the results of this single-solution algorithm with those obtained by our previously proposed multi-solution harmony search particle swarm optimization (HS-PSO) algorithm. The results reveal interesting aspects of each type of solution. We found that the proposed model works better than previously proposed models, according to some of the metrics upon which the network relies to achieve optimal performance. The metrics considered in this work are propagation delay, round-trip time (RTT), matrix of time session (TS), average delay, reliability, throughput, cost, and fitness value. The simulation results presented herein reveal that the proposed model achieves high reliability and satisfactory throughput with a short access time standard, addressing the issues of scalability and flexibility and achieving high performance to support network efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>The iterative process of the scientific method [<a href="#B28-futureinternet-15-00039" class="html-bibr">28</a>].</p>
Full article ">Figure 2
<p>Multi-controller SDN simulation environment.</p>
Full article ">Figure 3
<p>Flow chart of the SA-MCSDN algorithm.</p>
Full article ">Figure 4
<p>Multi-controller placement optimization by the SA-MCSDN algorithm.</p>
Full article ">Figure 5
<p>Optimal node placement relative to other nodes.</p>
Full article ">Figure 6
<p>Comparison of propagation delay.</p>
Full article ">Figure 7
<p>Comparison of average RTT.</p>
Full article ">Figure 8
<p>Comparison of the matrix of time session (TS).</p>
Full article ">Figure 9
<p>Comparison of average delay.</p>
Full article ">Figure 10
<p>Comparison of reliability.</p>
Full article ">Figure 11
<p>Comparison of throughput.</p>
Full article ">Figure 12
<p>Comparison of cost.</p>
Full article ">Figure 13
<p>Comparison of fitness values.</p>
Full article ">
14 pages, 1597 KiB  
Article
Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness
by Geneci da Silva Ribeiro Rocha, Diego Durante Mühl, Hermenegildo Almeida Chingamba, Letícia de Oliveira and Edson Talamini
Future Internet 2023, 15(1), 38; https://doi.org/10.3390/fi15010038 - 16 Jan 2023
Cited by 6 | Viewed by 3032
Abstract
Information technologies such as blockchain are developing fast, overcoming bottlenecks, and quickly taking advantage of their application. The present study analyzes recent changes concerning the benefits, disadvantages, challenges, and opportunities of blockchain applications in agribusiness. Interviews were conducted with and a questionnaire was [...] Read more.
Information technologies such as blockchain are developing fast, overcoming bottlenecks, and quickly taking advantage of their application. The present study analyzes recent changes concerning the benefits, disadvantages, challenges, and opportunities of blockchain applications in agribusiness. Interviews were conducted with and a questionnaire was applied to professionals working in the development and application of blockchain technology in agribusiness, to compare their perception of the recent advances. The results showed that the importance of blockchain technology to improve governance and information flow along supply chains has increased, and this is the main perceived benefit. The main disadvantages were removing intermediaries and the high cost of implementing the technology. The absence of a widely accepted platform in blockchain operations is the leading and growing challenge, while patterns for blockchain technology seem to be being overcome. The integration of blockchain with new technologies, and the competitiveness provided by the technology, are seen as the main and growing opportunities. Despite the study limitations, we conclude that the benefits and opportunities associated with blockchain application in agribusiness outweigh the challenges and disadvantages in number and importance, and are becoming more relevant. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)
Show Figures

Figure 1

Figure 1
<p>The framework of methodological phases and procedures carried out in the research. Source: elaborated by the authors.</p>
Full article ">Figure 2
<p>Changes in perceptions of the benefits (<b>A</b>) and disadvantages (<b>B</b>) of applying blockchain technology in agribusiness. Source: prepared by the authors based on survey data.</p>
Full article ">Figure 3
<p>Changes in perceptions of the challenges (<b>A</b>) and opportunities (<b>B</b>) of applying blockchain technology in agribusiness. Source: prepared by the authors based on survey data.</p>
Full article ">
21 pages, 3340 KiB  
Article
Cost-Profiling Microservice Applications Using an APM Stack
by Sjouke de Vries, Frank Blaauw and Vasilios Andrikopoulos
Future Internet 2023, 15(1), 37; https://doi.org/10.3390/fi15010037 - 13 Jan 2023
Cited by 1 | Viewed by 3411
Abstract
Understanding how the different parts of a cloud-native application contribute to its operating expenses is an important step towards optimizing this cost. However, with the adoption and rollout of microservice architectures, the gathering of the necessary data becomes much more involved and nuanced [...] Read more.
Understanding how the different parts of a cloud-native application contribute to its operating expenses is an important step towards optimizing this cost. However, with the adoption and rollout of microservice architectures, the gathering of the necessary data becomes much more involved and nuanced due to the distributed and heterogeneous nature of these architectures. Existing solutions for this purpose are either closed-source and proprietary or focus only on the infrastructural footprint of the applications. In response to that, in this work, we present a cost-profiling solution aimed at Kubernetes-based microservice applications, building on a popular open-source application performance monitoring (APM) stack. By means of a case study with a data engineering company, we demonstrate how our proposed solution can provide deeper insights into the cost profile of the various application components and drive informed decision-making in managing the deployment of the application. Full article
(This article belongs to the Special Issue Cloud-Native Observability)
Show Figures

Figure 1

Figure 1
<p>Diagram of the architecture of the platform used for the case study.</p>
Full article ">Figure 2
<p>Overview of the Elastic Stack architecture.</p>
Full article ">Figure 3
<p>High-level architectural view of the proposed solution with the target cluster set up for the case.</p>
Full article ">Figure 4
<p>Partial, zoomed-out view of the CPT dashboard with data from a specific deployment of the data platform. Cost-specific charts are offered in addition to the expected utilization-driven ones.</p>
Full article ">Figure 5
<p>VM instance distribution per environment.</p>
Full article ">Figure 6
<p>Hourly cost breakdown across both environments.</p>
Full article ">Figure 7
<p>Hourly utilization per microservice deployment in the production environment.</p>
Full article ">Figure 8
<p>Node instance count in the production environment.</p>
Full article ">Figure 9
<p>Deployment cost comparison in the production environment.</p>
Full article ">
27 pages, 1149 KiB  
Article
A Multi-Agent Approach to Binary Classification Using Swarm Intelligence
by Sean Grimes and David E. Breen
Future Internet 2023, 15(1), 36; https://doi.org/10.3390/fi15010036 - 12 Jan 2023
Cited by 1 | Viewed by 2826
Abstract
Wisdom-of-Crowds-Bots (WoC-Bots) are simple, modular agents working together in a multi-agent environment to collectively make binary predictions. The agents represent a knowledge-diverse crowd, with each agent trained on a subset of available information. A honey-bee-derived swarm aggregation mechanism is used to elicit a [...] Read more.
Wisdom-of-Crowds-Bots (WoC-Bots) are simple, modular agents working together in a multi-agent environment to collectively make binary predictions. The agents represent a knowledge-diverse crowd, with each agent trained on a subset of available information. A honey-bee-derived swarm aggregation mechanism is used to elicit a collective prediction with an associated confidence value from the agents. Due to their multi-agent design, WoC-Bots can be distributed across multiple hardware nodes, include new features without re-training existing agents, and the aggregation mechanism can be used to incorporate predictions from other sources, thus improving overall predictive accuracy of the system. In addition to these advantages, we demonstrate that WoC-Bots are competitive with other top classification methods on three datasets and apply our system to a real-world sports betting problem, producing a consistent return on investment from 1 January 2021 through 15 November 2022 on most major sports. Full article
(This article belongs to the Special Issue Modern Trends in Multi-Agent Systems)
Show Figures

Figure 1

Figure 1
<p>Representation of the full interaction arena split across 16 nodes.</p>
Full article ">Figure 2
<p>Comparison of five classification methods with two versions of the swarm (first and last columns) for the breast cancer dataset.</p>
Full article ">Figure 3
<p>Runtime Comparison for a Single Prediction for All Methods.</p>
Full article ">Figure 4
<p>Comparison of five classification methods with two versions of the swarm (first and last columns) for the Hollywood movies dataset.</p>
Full article ">Figure 5
<p>Comparison of five classification methods with two versions of the swarm (first and last columns) for the airline passenger satisfaction dataset.</p>
Full article ">Figure 6
<p>Cellular Morphology Features—System Accuracy.</p>
Full article ">Figure 7
<p>Cast, Crew, Production Features—System Accuracy.</p>
Full article ">Figure 8
<p>Interaction time (ms) for 1250 agents on 1, 4, 9, and 16 nodes, using data from <a href="#sec2dot2dot1-futureinternet-15-00036" class="html-sec">Section 2.2.1</a> with cellular morphology features.</p>
Full article ">Figure 9
<p>Interaction time (ms) for 5000 agents on 1, 4, 9, and 16 nodes, using data from <a href="#sec2dot2dot1-futureinternet-15-00036" class="html-sec">Section 2.2.1</a> with cellular morphology features.</p>
Full article ">Figure 10
<p>Swarm timing (ms) for 1250 agents on 1, 2, 4, 9, and 16 nodes, using data from <a href="#sec2dot2dot1-futureinternet-15-00036" class="html-sec">Section 2.2.1</a> with cellular morphology features, with agents moving freely between nodes.</p>
Full article ">Figure 11
<p>Swarm timing (ms) for 1250 agents on 1, 2, 4, 9, and 16 nodes, using data from <a href="#sec2dot2dot1-futureinternet-15-00036" class="html-sec">Section 2.2.1</a> with cellular morphology features, with node-localized swarming.</p>
Full article ">Figure 12
<p>Comparison of prediction accuracy for breast cancer, Hollywood success, and airline passenger satisfaction when allowing free movement between nodes vs. node-local swarming.</p>
Full article ">Figure 13
<p>Total units earned over time for all sports tested on, moneyline and spread bets, 1 January 2021 through 15 November 2022.</p>
Full article ">
27 pages, 1792 KiB  
Review
Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions
by Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan
Future Internet 2023, 15(1), 35; https://doi.org/10.3390/fi15010035 - 12 Jan 2023
Cited by 16 | Viewed by 4571
Abstract
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due [...] Read more.
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)
Show Figures

Figure 1

Figure 1
<p>Blockchain construction.</p>
Full article ">Figure 2
<p>An instance of blockchain immutability.</p>
Full article ">Figure 3
<p>Redactable blockchain implementation challenges.</p>
Full article ">Figure 4
<p>Paper taxonomy analyzing redactable blockchain state of art.</p>
Full article ">Figure 5
<p>Ateniese’s proposal: randomness update in redacted block (edit).</p>
Full article ">Figure 6
<p>Derler proposal.</p>
Full article ">Figure 7
<p>The Huang et al. (2019) RCB signature chain.</p>
Full article ">
19 pages, 5776 KiB  
Article
Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System
by Siyuan Yang, Mondher Bouazizi, Tomoaki Ohtsuki, Yohei Shibata, Wataru Takabatake, Kenji Hoshino and Atsushi Nagate
Future Internet 2023, 15(1), 34; https://doi.org/10.3390/fi15010034 - 12 Jan 2023
Cited by 3 | Viewed by 2197
Abstract
In this paper, we propose a novel Deep Reinforcement Learning Evolution Algorithm (DRLEA) method to control the antenna parameters of the High-Altitude Platform Station (HAPS) mobile to reduce the number of low-throughput users. Considering the random movement of the HAPS caused by the [...] Read more.
In this paper, we propose a novel Deep Reinforcement Learning Evolution Algorithm (DRLEA) method to control the antenna parameters of the High-Altitude Platform Station (HAPS) mobile to reduce the number of low-throughput users. Considering the random movement of the HAPS caused by the winds, the throughput of the users might decrease. Therefore, we propose a method that can dynamically adjust the antenna parameters based on the throughput of the users in the coverage area to reduce the number of low-throughput users by improving the users’ throughput. Different from other model-based reinforcement learning methods, such as the Deep Q Network (DQN), the proposed method combines the Evolution Algorithm (EA) with Reinforcement Learning (RL) to avoid the sub-optimal solutions in each state. Moreover, we consider non-uniform user distribution scenarios, which are common in the real world, rather than ideal uniform user distribution scenarios. To evaluate the proposed method, we do the simulations under four different real user distribution scenarios and compare the proposed method with the conventional EA and RL methods. The simulation results show that the proposed method effectively reduces the number of low throughput users after the HAPS moves. Full article
(This article belongs to the Special Issue State-of-the-Art Future Internet Technology in Japan 2022-2023)
Show Figures

Figure 1

Figure 1
<p>A HAPS system model.</p>
Full article ">Figure 2
<p>Movement scenarios.</p>
Full article ">Figure 3
<p>Antenna parameters.</p>
Full article ">Figure 4
<p>Example of an antenna pattern for vertical or horizontal polarization.</p>
Full article ">Figure 5
<p>Throughput.</p>
Full article ">Figure 6
<p>An example of how to find the optimal solution.</p>
Full article ">Figure 7
<p>The pipeline of the proposed DRLEA method.</p>
Full article ">Figure 8
<p>The four user distribution scenarios: (<b>a</b>) Tokyo, (<b>b</b>) Osaka, (<b>c</b>) Sendai, and (<b>d</b>) Nagoya.</p>
Full article ">Figure 9
<p>CDF of UE throughput performance under the HAPS with rotation.</p>
Full article ">Figure 10
<p>CDF of UE throughput performance under the HAPS with shifting.</p>
Full article ">
15 pages, 1388 KiB  
Article
Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations
by Leny Vinceslas, Safak Dogan, Srikumar Sundareshwar and Ahmet M. Kondoz
Future Internet 2023, 15(1), 33; https://doi.org/10.3390/fi15010033 - 11 Jan 2023
Cited by 3 | Viewed by 2282
Abstract
By design, distributed ledger technologies persist low-level data, which makes conducting complex business analysis of the recorded operations challenging. Existing blockchain visualization and analytics tools such as block explorers tend to rely on this low-level data and complex interfacing to provide an enriched [...] Read more.
By design, distributed ledger technologies persist low-level data, which makes conducting complex business analysis of the recorded operations challenging. Existing blockchain visualization and analytics tools such as block explorers tend to rely on this low-level data and complex interfacing to provide an enriched level of analytics. The ability to derive richer analytics could be improved through the availability of a higher level abstraction of the data. This article proposes an abstraction layer architecture that enables the design of high-level analytics of distributed ledger systems and the decentralized applications that run on top. Based on the analysis of existing initiatives and identification of the relevant user requirements, this work aims to establish key insights and specifications to improve the auditability and intuitiveness of distributed ledger systems by leveraging the development of future user interfaces. To illustrate the benefits offered by the proposed abstraction layer architecture, a regulated sector use case is explored. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)
Show Figures

Figure 1

Figure 1
<p>Transaction handling in different ledger architectures [<a href="#B10-futureinternet-15-00033" class="html-bibr">10</a>]. (<b>a</b>) Conventional centralized ledger. (<b>b</b>) Decentralized ledger.</p>
Full article ">Figure 2
<p>Screen-shots of Hyperledger Explorer [<a href="#B39-futureinternet-15-00033" class="html-bibr">39</a>]. (<b>a</b>) Dashboard main view; (<b>b</b>) block explorer view; and (<b>c</b>) transaction details pop-up window.</p>
Full article ">Figure 3
<p>Abstracted visualizations. (<b>a</b>) Transaction-oriented abstraction; and (<b>b</b>) account-oriented abstraction.</p>
Full article ">Figure 4
<p>Abstraction layer architecture.</p>
Full article ">Figure 5
<p>Application architecture and stack structures.</p>
Full article ">Figure 6
<p>RegNet network visualization. The information used to populate the visualization is based on the data of the HF network deployed as a proof-of-concept in the RegNet case scenario.</p>
Full article ">Figure 7
<p>Concept design of the network topology view of the RegNet dashboard. From the left to the right column: page selection, news feed, network topology visualization and transaction insights. The analytics used to populate the dashboard are based on the data of the HF network deployed as a proof-of-concept in the RegNet case scenario.</p>
Full article ">
21 pages, 7660 KiB  
Article
Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data
by Sandulika Abesinghe, Nayomi Kankanamge, Tan Yigitcanlar and Surabhi Pancholi
Future Internet 2023, 15(1), 32; https://doi.org/10.3390/fi15010032 - 9 Jan 2023
Cited by 9 | Viewed by 4119
Abstract
The image of a city represents the sum of beliefs, ideas, and impressions that people have of that city. Mostly, city images are assessed through direct or indirect interviews and cognitive mapping exercises. Such methods consume more time and effort and are limited [...] Read more.
The image of a city represents the sum of beliefs, ideas, and impressions that people have of that city. Mostly, city images are assessed through direct or indirect interviews and cognitive mapping exercises. Such methods consume more time and effort and are limited to a small number of people. However, recently, people tend to use social media to express their thoughts and experiences of a place. Taking this into consideration, this paper attempts to explore city images through social media big data, considering Colombo, Sri Lanka, as the testbed. The aim of the study is to examine the image of a city through Lynchian elements—i.e., landmarks, paths, nodes, edges, and districts—by using community sentiments expressed and images posted on social media platforms. For that, this study conducted various analyses—i.e., descriptive, image processing, sentiment, popularity, and geo-coded social media analyses. The study findings revealed that: (a) the community sentiments toward the same landmarks, paths, nodes, edges, and districts change over time; (b) decisions related to locating landmarks, paths, nodes, edges, and districts have a significant impact on community cognition in perceiving cities; and (c) geo-coded social media data analytics is an invaluable approach to capture the image of a city. The study informs urban authorities in their placemaking efforts by introducing a novel methodological approach to capture an image of a city. Full article
Show Figures

Figure 1

Figure 1
<p>Case study area.</p>
Full article ">Figure 2
<p>The CUP framework.</p>
Full article ">Figure 3
<p>Exemplified image processing. (<b>a</b>) Input image: inserted Image; (<b>b</b>) output image: heat map of the features used to make the correct predictions.</p>
Full article ">Figure 4
<p>Distribution of place names according to the Lynchian category.</p>
Full article ">Figure 5
<p>Sentiment analysis with distribution of positively classified tweets: (<b>a</b>) sentiment analysis 2015–2016; (<b>b</b>) sentiment analysis 2017–2018; (<b>c</b>) sentiment analysis 2019–2020.</p>
Full article ">Figure 6
<p>Exemplary tweets posted sharing positive sentiments about ARC and DP.</p>
Full article ">Figure 7
<p>Color density matrix: Twitter popularity analysis.</p>
Full article ">Figure 8
<p>Sceneries of: (<b>a</b>) KH shared on Instagram; (<b>b</b>) MLB shared on Twitter.</p>
Full article ">Figure 9
<p>Temporal changes of the sentiment values by zones.</p>
Full article ">
16 pages, 5311 KiB  
Article
Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion
by Qingyan Zhou, Hao Li, Youhua Zhang and Junhong Zheng
Future Internet 2023, 15(1), 31; https://doi.org/10.3390/fi15010031 - 9 Jan 2023
Cited by 2 | Viewed by 2006
Abstract
Traditional product evaluation research is to collect data through questionnaires or interviews to optimize product design, but the whole process takes a long time to deploy and cannot fully reflect the market situation. Aiming at this problem, we propose a product evaluation prediction [...] Read more.
Traditional product evaluation research is to collect data through questionnaires or interviews to optimize product design, but the whole process takes a long time to deploy and cannot fully reflect the market situation. Aiming at this problem, we propose a product evaluation prediction model based on multi-level deep feature fusion of online reviews. It mines product satisfaction from the massive reviews published by users on e-commerce websites, and uses this model to analyze the relationship between design attributes and customer satisfaction, design products based on customer satisfaction. Our proposed model can be divided into the following four parts: First, the DSCNN (Depthwise Separable Convolutions) layer and pooling layer are used to combine extracting shallow features from the primordial data. Secondly, CBAM (Convolutional Block Attention Module) is used to realize the dimension separation of features, enhance the expressive ability of key features in the two dimensions of space and channel, and suppress the influence of redundant information. Thirdly, BiLSTM (Bidirectional Long Short-Term Memory) is used to overcome the complexity and nonlinearity of product evaluation prediction, output the predicted result through the fully connected layer. Finally, using the global optimization capability of the genetic algorithm, the hyperparameter optimization of the model constructed above is carried out. The final forecasting model consists of a series of decision rules that avoid model redundancy and achieve the best forecasting effect. It has been verified that the method proposed in this paper is better than the above-mentioned models in five evaluation indicators such as MSE, MAE, RMSE, MAPE and SMAPE, compared with Support Vector Regression (SVR), DSCNN, BiLSTM and DSCNN-BiLSTM. By predicting customer emotional satisfaction, it can provide accurate decision-making suggestions for enterprises to design new products. Full article
Show Figures

Figure 1

Figure 1
<p>Using Genetic Algorithm (GA) to optimize Spatiotemporal correlation forecast model.</p>
Full article ">Figure 2
<p>DSCNN structure diagram.</p>
Full article ">Figure 3
<p>LSTM structure diagram.</p>
Full article ">Figure 4
<p>BiLSTM structure diagram.</p>
Full article ">Figure 5
<p>CBAM network structure diagram.</p>
Full article ">Figure 6
<p>CAM structure diagram.</p>
Full article ">Figure 7
<p>SAM structure diagram.</p>
Full article ">Figure 8
<p>Genetic Algorithm optimization flow chart.</p>
Full article ">Figure 9
<p>Spatiotemporal correlation prediction model with attention mechanism.</p>
Full article ">Figure 10
<p>Flowchart of the transformation of raw data into serialized data.</p>
Full article ">Figure 11
<p>Fitness graph under different fitness functions.</p>
Full article ">Figure 12
<p>Graph of predicted results of different models.</p>
Full article ">Figure 12 Cont.
<p>Graph of predicted results of different models.</p>
Full article ">Figure 13
<p>Satisfaction prediction results.</p>
Full article ">
15 pages, 2893 KiB  
Article
Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network
by Ke Zhao, Rui Han and Xu Wang
Future Internet 2023, 15(1), 30; https://doi.org/10.3390/fi15010030 - 7 Jan 2023
Cited by 4 | Viewed by 2360
Abstract
The fifth-generation communication technology (5G) and information-centric networks (ICNs) are acquiring more and more attention. Cache plays a significant part in the 5G-ICN architecture that the industry has suggested. 5G mobile terminals switch between different base stations quickly, creating a significant amount of [...] Read more.
The fifth-generation communication technology (5G) and information-centric networks (ICNs) are acquiring more and more attention. Cache plays a significant part in the 5G-ICN architecture that the industry has suggested. 5G mobile terminals switch between different base stations quickly, creating a significant amount of traffic and a significant amount of network latency. This brings great challenges to 5G-ICN mobile cache. It appears urgent to improve the cache placement strategy. This paper suggests a hybrid caching strategy called time segmentation-based hybrid caching (TSBC) strategy, based on the 5G-ICN bearer network infrastructure. A base station’s access frequency can change throughout the course of the day due to the “tidal phenomena” of mobile networks. To distinguish the access frequency, we split each day into periods of high and low liquidity. To maintain the diversity of cache copies during periods of high liquidity, we replace the path’s least-used cache copy. We determine the cache value of each node in the path and make caching decisions during periods of low liquidity to make sure users can access the content they are most interested in quickly. The simulation results demonstrate that the proposed strategy has a positive impact on both latency and the cache hit ratio. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>5G-ICN network architecture.</p>
Full article ">Figure 2
<p>5G-ICN BN architecture.</p>
Full article ">Figure 3
<p>The process of selecting a cache node.</p>
Full article ">Figure 4
<p>The process of determining whether a node is cached.</p>
Full article ">Figure 5
<p>Simulation topologies.</p>
Full article ">Figure 6
<p>Cache performance with different skewness.</p>
Full article ">Figure 7
<p>Cache performance with different user movement rate.</p>
Full article ">
19 pages, 1501 KiB  
Article
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
by Brent Pethers and Abubakar Bello
Future Internet 2023, 15(1), 29; https://doi.org/10.3390/fi15010029 - 7 Jan 2023
Cited by 7 | Viewed by 3792
Abstract
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing [...] Read more.
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email design and influence techniques in susceptibility to cyber sextortion attacks. Using a quantitative methodology, a survey measured susceptibility to cyber sextortion with a focus on four different email design cues. One-way repeated measures ANOVA, post hoc comparison tests, Friedman nonparametric test, and Spearman correlation tests were conducted with results indicating that attention to email source and title/subject line significantly increased individuals’ susceptibility, while attention to grammar and spelling, and urgency cues, had lesser influence. As such, the influence of these message-related factors should be considered when implementing effective security controls to mitigate the risks and vulnerabilities to cyber sextortion attacks. Full article
(This article belongs to the Special Issue Cybersecurity and Cybercrime in the Age of Social Media)
Show Figures

Figure 1

Figure 1
<p>Each of the theories and models of deception, persuasion, and phishing susceptibility; and their relation to the current study.</p>
Full article ">Figure 2
<p>The hypothesized relationship between the attention given to various design cues within sextortion emails; and their effects on participants’ likelihood of responding to these emails, and hence being vulnerable to sextortion attacks.</p>
Full article ">Figure 3
<p>Scatterplot of participants’ attentional email habits and cyber sextortion susceptibility scores when no email design cue was specified.</p>
Full article ">Figure 4
<p>Scatterplot of participants’ general email habits and cyber sextortion susceptibility scores when attention was focused on grammar and spelling.</p>
Full article ">
12 pages, 1103 KiB  
Article
Adapting Recommendations on Environmental Education Programs
by Katerina Kabassi, Anastasia Papadaki and Athanasios Botonis
Future Internet 2023, 15(1), 28; https://doi.org/10.3390/fi15010028 - 4 Jan 2023
Cited by 1 | Viewed by 1846
Abstract
Stakeholders in Environmental Education (EE) often face difficulties identifying and selecting programs that best suit their needs. This is due, in part, to the lack of expertise in evaluation knowledge and practice, as well as to the absence of a unified database of [...] Read more.
Stakeholders in Environmental Education (EE) often face difficulties identifying and selecting programs that best suit their needs. This is due, in part, to the lack of expertise in evaluation knowledge and practice, as well as to the absence of a unified database of Environmental Education Programs (EEPs) with a defined structure. This article presents the design and development of a web application for evaluating and selecting EEPs. The certified users of the application can insert, view, and evaluate the registered EEPs. At the same time, the application creates and maintains for each user an individual and dynamic user model reflecting their personal preferences. Finally, using all the above information and applying a combination of Multi-Criteria Decision-Making Methods (MCDM), the application provides a comparative and adaptive evaluation in order to help each user to select the EEPs that best suit his/her needs. The personalized recommendations are based on the information about the user stored in the user model and the results of the EEPs evaluations by the users that have applied them. As a case study, we used the EEPs from the Greek Educational System. Full article
Show Figures

Figure 1

Figure 1
<p>Flow diagram of basic system functionality.</p>
Full article ">Figure 2
<p>Use Case Diagram.</p>
Full article ">
21 pages, 14593 KiB  
Article
Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations
by Emilio Matricciani and Carlo Riva
Future Internet 2023, 15(1), 27; https://doi.org/10.3390/fi15010027 - 3 Jan 2023
Cited by 3 | Viewed by 1917
Abstract
Because of rain attenuation, the equivalent baseband transfer function of large bandwidth radio-links will not be ideal. We report the results concerning radio links to/from satellites orbiting in GeoSurf satellite constellations located at Spino d’Adda, Prague, Madrid, and Tampa, which are all sites [...] Read more.
Because of rain attenuation, the equivalent baseband transfer function of large bandwidth radio-links will not be ideal. We report the results concerning radio links to/from satellites orbiting in GeoSurf satellite constellations located at Spino d’Adda, Prague, Madrid, and Tampa, which are all sites in different climatic regions. By calculating rain attenuation and phase delay with the Synthetic Storm Technique, we have found that in a 10-GHz bandwidth centered at 80 GHz (W-Band)—to which we refer to as “ultra-wideband-, both direct and orthogonal channels will introduce significant amplitude and phase distortions, which increase with rain attenuation. Only “narrow-band” channels (100~200 MHz) will not be affected. The ratio between the probability of bit error with rain attenuation and the probability of bit error with no rain attenuation increases with rain attenuation. The estimated loss in the signal-to-noise ratio can reach 3~4 dB. All results depend on the site, Tampa being the worst. To confirm these findings, future work will need a full Monte Carlo digital simulation. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Cartesian plane in which the phasors (vectors) at angular speed <math display="inline"><semantics> <mrow> <msub> <mi>ω</mi> <mi>c</mi> </msub> </mrow> </semantics></math> are fixed (non-rotating). The two side-bands of Equation (1) can be represented by two vectors rotating in phase counterclockwise (upper side-band, positive rotation) and clockwise (lower side-band, negative rotation) with angular speed <math display="inline"><semantics> <mrow> <mo>+</mo> <mi>ω</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mo>−</mo> <mi>ω</mi> </mrow> </semantics></math>, respectively.</p>
Full article ">Figure 2
<p>Cartesian plane in which the phasors (vectors) at angular speed <math display="inline"><semantics> <mrow> <msub> <mi>ω</mi> <mi>c</mi> </msub> </mrow> </semantics></math> are fixed (non-rotating). The two side-bands of Equation (1) are shown at the output of the medium transfer function. <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mi>r</mi> </msub> <mfenced> <mi>ψ</mi> </mfenced> <mo> </mo> </mrow> </semantics></math> acts on the two side-bands in phase (real axis), while <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mi>i</mi> </msub> <mfenced> <mi>ψ</mi> </mfenced> </mrow> </semantics></math> acts on them by producing orthogonal side-bands (imaginary axis).</p>
Full article ">Figure 3
<p>Annual probability distributions (%) <math display="inline"><semantics> <mrow> <mi>P</mi> <mfenced> <mi>R</mi> </mfenced> </mrow> </semantics></math> at Spino d’Adda, Madrid, Tampa, and Prague.</p>
Full article ">Figure 4
<p>Baseband receiver in ideal conditions. <math display="inline"><semantics> <mrow> <mi>S</mi> <mfenced> <mi>f</mi> </mfenced> </mrow> </semantics></math> is the two-sided spectrum of the Nyquist impulse, <math display="inline"><semantics> <mrow> <msqrt> <mrow> <mi>S</mi> <mfenced> <mi>f</mi> </mfenced> </mrow> </msqrt> </mrow> </semantics></math> is its matched filter, and <math display="inline"><semantics> <mrow> <mi>n</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> is the receiver total additive Gaussian white noise.</p>
Full article ">Figure 5
<p>Quadrature baseband receiver in rain attenuation. <math display="inline"><semantics> <mrow> <mi>S</mi> <mfenced> <mi>f</mi> </mfenced> </mrow> </semantics></math> is the two-sided spectrum of the Nyquist reference impulse assumed to be positive, <math display="inline"><semantics> <mrow> <msqrt> <mrow> <mi>S</mi> <mfenced> <mi>f</mi> </mfenced> </mrow> </msqrt> </mrow> </semantics></math> is the matched filter, and <math display="inline"><semantics> <mrow> <mi>n</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> is the receiver total additive Gaussian white noise.</p>
Full article ">Figure 6
<p>SST-simulated rain attenuation event at Spino d’Adda at 80 GHz (8 May 2000, starts at 0:48 AM local time). <b>Upper panel</b>: Rain attenuation at 80 GHz (circular polarization). <b>Lower panel</b>: Relative attenuation at the extreme of a 10-GHz bandwidth.</p>
Full article ">Figure 7
<p>SST-simulated rain attenuation event at Spino d’Adda at 80 GHz GHz (8 May 2000, starts at 0:48 AM local time). <b>Upper panel</b>: Time delay at 80 GHz (circular polarization). <b>Lower panel</b>: Relative time delay at the extreme of a 10-GHz bandwidth.</p>
Full article ">Figure 8
<p>Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) parts of the passband transfer function at the time of maximum rain attenuation (32.6 dB) in the event shown in <a href="#futureinternet-15-00027-f006" class="html-fig">Figure 6</a> and <a href="#futureinternet-15-00027-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 9
<p>Spino d’Adda. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the cross-channel.</p>
Full article ">Figure 10
<p>Spino d’Adda. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the cross-channel. <math display="inline"><semantics> <mrow> <mn>9</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 11 dB.</p>
Full article ">Figure 11
<p>Spino d’Adda. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the cross-channel. <math display="inline"><semantics> <mrow> <mn>18</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 22 dB.</p>
Full article ">Figure 12
<p>Spino d’Adda. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and imaginary (<b>lower panel</b>) transfer functions of the cross-channel. <math display="inline"><semantics> <mrow> <mn>27</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 33 dB.</p>
Full article ">Figure 13
<p>Spino d’Adda. Probability ratio <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> between the probability of bit error with rain and the probability of bit error with no rain (ideal case): <math display="inline"><semantics> <mrow> <mi>P</mi> <mfenced> <mi>ε</mi> </mfenced> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>u</mi> <mi>e</mi> </mrow> </mfenced> <mo>,</mo> <mo> </mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>g</mi> <mi>r</mi> <mi>e</mi> <mi>e</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>m</mi> <mi>a</mi> <mi>g</mi> <mi>e</mi> <mi>n</mi> <mi>t</mi> <mi>a</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>c</mi> <mi>y</mi> <mi>a</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>6</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> </mrow> </mfenced> </mrow> </semantics></math>. Direct case: continuous lines; with interference: dashed lines. <b>Left</b>: negative interfering impulse; <b>Right</b>: positive interfering impulse.</p>
Full article ">Figure 14
<p>Probability ratio <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> between the probability of bit error with rain and the probability of bit error with no rain (ideal case) vs. probability of bit error in the direct channel with no interference, according to the average SNR (continuous lines) and <math display="inline"><semantics> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation of SNR (dashed lines), at Spino d’Adda, Prague, Madrid, Tampa. Blue lines, <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> dB; red lines, <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mn>20</mn> </mrow> </semantics></math> dB.</p>
Full article ">Figure A1
<p>Madrid. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A2
<p>Madrid. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>9</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 11 dB dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A3
<p>Madrid. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>18</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 22 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A4
<p>Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>27</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 33 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A5
<p>Prague. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A6
<p>Prague. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>9</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 11 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A7
<p>Prague. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>18</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 22 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A8
<p>Prague. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>27</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 33 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A9
<p>Tampa. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>2.5</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 3.5 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A10
<p>Tampa. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>9</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 11 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A11
<p>Tampa. Average value (continuous line) and ±1 no standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>18</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 22 dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A12
<p>Tampa. Average value (continuous line) and <math display="inline"><semantics> <mrow> <mo>±</mo> <mn>1</mn> </mrow> </semantics></math> standard deviation (dashed lines) baseband equivalent transfer functions in the range <math display="inline"><semantics> <mrow> <mn>27</mn> <mo>≤</mo> <mo> </mo> </mrow> </semantics></math> A &lt; 33 dB. dB. <b>Left column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the direct channel; <b>Right column</b>: Real (<b>upper panel</b>) and Imaginary (<b>lower panel</b>) transfer functions of the orthogonal channel.</p>
Full article ">Figure A13
<p>Madrid. Probability ratio <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> between the probability of bit error with rain and the probability of bit error with no rain (ideal case): <math display="inline"><semantics> <mrow> <mi>P</mi> <mfenced> <mi>ε</mi> </mfenced> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>u</mi> <mi>e</mi> </mrow> </mfenced> <mo>,</mo> <mo> </mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> <mfenced> <mrow> <mi>g</mi> <mi>r</mi> <mi>e</mi> <mi>e</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> <mfenced> <mrow> <mi>m</mi> <mi>a</mi> <mi>g</mi> <mi>e</mi> <mi>n</mi> <mi>t</mi> <mi>a</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mfenced> <mrow> <mi>c</mi> <mi>y</mi> <mi>a</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>6</mn> </mrow> </msup> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> </mrow> </mfenced> </mrow> </semantics></math>. Direct case: continuous lines; with interference: dashed lines. <b>Left</b>: negative interfering impulse; <b>Right</b>: positive interfering impulse.</p>
Full article ">Figure A14
<p>Prague. Probability ratio <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> between the probability of bit error with rain and the probability of bit error with no rain (ideal case): <math display="inline"><semantics> <mrow> <mi>P</mi> <mfenced> <mi>ε</mi> </mfenced> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>u</mi> <mi>e</mi> </mrow> </mfenced> <mo>,</mo> <mo> </mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>g</mi> <mi>r</mi> <mi>e</mi> <mi>e</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>m</mi> <mi>a</mi> <mi>g</mi> <mi>e</mi> <mi>n</mi> <mi>t</mi> <mi>a</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>c</mi> <mi>y</mi> <mi>a</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>6</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> </mrow> </mfenced> </mrow> </semantics></math>. Direct case: continuous lines; with interference: dashed lines. <b>Left</b>: negative interfering impulse; <b>Right</b>: positive interfering impulse.</p>
Full article ">Figure A15
<p>Tampa. Probability ratio <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> between the probability of bit error with rain and the probability of bit error with no rain (ideal case): <math display="inline"><semantics> <mrow> <mi>P</mi> <mfenced> <mi>ε</mi> </mfenced> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>u</mi> <mi>e</mi> </mrow> </mfenced> <mo>,</mo> <mo> </mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>g</mi> <mi>r</mi> <mi>e</mi> <mi>e</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>m</mi> <mi>a</mi> <mi>g</mi> <mi>e</mi> <mi>n</mi> <mi>t</mi> <mi>a</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>c</mi> <mi>y</mi> <mi>a</mi> <mi>n</mi> </mrow> </mfenced> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>6</mn> </mrow> </msup> <mo> </mo> <mfenced> <mrow> <mi>b</mi> <mi>l</mi> <mi>a</mi> <mi>c</mi> <mi>k</mi> </mrow> </mfenced> </mrow> </semantics></math>. Direct case: continuous lines; with interference: dashed lines. <b>Left</b>: negative interfering impulse; <b>Right</b>: positive interfering impulse.</p>
Full article ">
25 pages, 2214 KiB  
Article
Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation
by Teresa Gonçalves, Rute Veladas, Hua Yang, Renata Vieira, Paulo Quaresma, Paulo Infante, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes and Carolina Gonçalves
Future Internet 2023, 15(1), 26; https://doi.org/10.3390/fi15010026 - 3 Jan 2023
Viewed by 2407
Abstract
This paper presents an analysis of the calls made to the Portuguese National Health Contact Center (SNS24) during a three years period. The final goal was to develop a system to help nurse attendants select the appropriate clinical pathway (from 59 options) for [...] Read more.
This paper presents an analysis of the calls made to the Portuguese National Health Contact Center (SNS24) during a three years period. The final goal was to develop a system to help nurse attendants select the appropriate clinical pathway (from 59 options) for each call. It examines several aspects of the calls distribution like age and gender of the user, date and time of the call and final referral, among others and presents comparative results for alternative classification models (SVM and CNN) and different data samples (three months, one and two years data models). For the task of selecting the appropriate pathway, the models, learned on the basis of the available data, achieved F1 values that range between 0.642 (3 months CNN model) and 0.783 (2 years CNN model), with SVM having a more stable performance (between 0.743 and 0.768 for the corresponding data samples). These results are discussed regarding error analysis and possibilities for explaining the system decisions. A final meta evaluation, based on a clinical expert overview, compares the different choices: the nurse attendants (reference ground truth), the expert and the automatic decisions (2 models), revealing a higher agreement between the ML models, followed by their agreement with the clinical expert, and minor agreement with the reference. Full article
(This article belongs to the Special Issue Internet of Things (IoT) for Smart Living and Public Health)
Show Figures

Figure 1

Figure 1
<p>Total number of calls per district per 100,000 inhabitants (image generated using <a href="https://paintmaps.com/" target="_blank">https://paintmaps.com/</a>, accessed on 9 November 2022).</p>
Full article ">Figure 2
<p>Distribution of calls per clinical pathway.</p>
Full article ">Figure 3
<p>Distribution of calls by relation of the caller to the citizen.</p>
Full article ">Figure 4
<p>Distribution of calls per the age of the citizen.</p>
Full article ">Figure 5
<p>Distribution of calls per age for the 10 most frequent pathways (clustered by similarity).</p>
Full article ">Figure 6
<p>Distribution of calls per hour of the day <b>(top</b>), day of the week (<b>bottom-left</b>) and month of the year (<b>bottom-right</b>).</p>
Full article ">Figure 7
<p>Distribution of calls per age for the 10 most frequent pathways (clustered by similarity over time).</p>
Full article ">Figure 8
<p>Distribution of referrals per pathway.</p>
Full article ">Figure 9
<p>Distribution of referrals for the 10 most common pathways.</p>
Full article ">Figure 10
<p>Per class performance: F1 value vs. support.</p>
Full article ">Figure 11
<p>ELI5 output for two “Ocular problem” pathway examples: the left example was classified as “Ocular problem”; the right example was classified as “Cough”.</p>
Full article ">
13 pages, 1866 KiB  
Article
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
by Qiang Li
Future Internet 2023, 15(1), 25; https://doi.org/10.3390/fi15010025 - 3 Jan 2023
Cited by 8 | Viewed by 2430
Abstract
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path [...] Read more.
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system. Full article
(This article belongs to the Special Issue Security for Vehicular Ad Hoc Networks)
Show Figures

Figure 1

Figure 1
<p>Security Architecture.</p>
Full article ">Figure 2
<p>Equipment Registration and Private Key Generation Process.</p>
Full article ">Figure 3
<p>V2V Identity authentication and key agreement process.</p>
Full article ">Figure 4
<p>Experiment Environment.</p>
Full article ">Figure 5
<p>Authentication Process Simulation with Software.</p>
Full article ">
24 pages, 2851 KiB  
Article
Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service
by Jinze Du, Chengtai Gao and Tao Feng
Future Internet 2023, 15(1), 24; https://doi.org/10.3390/fi15010024 - 31 Dec 2022
Cited by 6 | Viewed by 4566
Abstract
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. [...] Read more.
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protocol using a model detection method combining the Dolev–Yao attack model and the Coloring Petri Net (CPN) theory. Because of the security loopholes in the original protocol, a timestamp was introduced into the original protocol, and the shared key establishment process in the original protocol lacked fairness and consistency. We adopted a new establishment method to establish the shared secret and re-verified its security. The results show that the overall security of the protocol has been improved by 16.7% while effectively preventing current replay attack. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Simple model initial state of protocol communication process.</p>
Full article ">Figure 2
<p>Simple model final state of protocol communication process.</p>
Full article ">Figure 3
<p>DDS standard architecture.</p>
Full article ">Figure 4
<p>Message flow model of DDS protocol.</p>
Full article ">Figure 5
<p>A top-level model for the DDS protocol.</p>
Full article ">Figure 6
<p>The mid-level model of the DDS protocol.</p>
Full article ">Figure 7
<p>Alternative transition NETBase’s internal model.</p>
Full article ">Figure 8
<p>Publisher internal model for alternative transition.</p>
Full article ">Figure 9
<p>Subscriber internal model for alternative transition.</p>
Full article ">Figure 10
<p>Publisher’ internal model for alternative transition.</p>
Full article ">Figure 11
<p>Subscriber’ internal model for alternative transition.</p>
Full article ">Figure 12
<p>Attacker model.</p>
Full article ">Figure 13
<p>Identity authentication result.</p>
Full article ">Figure 14
<p>Model of the new scheme message flow.</p>
Full article ">Figure 15
<p>The mid-level model of the new scheme of DDS protocol.</p>
Full article ">Figure 16
<p>The new scheme replaces the internal model of the transition Publisher.</p>
Full article ">Figure 17
<p>The new scheme replaces the internal model of the transition Subscriber.</p>
Full article ">Figure 18
<p>The new scheme replaces the transition Publisher’s internal model.</p>
Full article ">Figure 19
<p>The new scheme replaces the transition Subscriber’s internal model.</p>
Full article ">Figure 20
<p>ASK-CTL formula and its verification results.</p>
Full article ">Figure 21
<p>Attacker model for the new scheme.</p>
Full article ">Figure 22
<p>Protocol termination status query under replay attack.</p>
Full article ">
19 pages, 8158 KiB  
Article
A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams
by Barbara Cardone, Ferdinando Di Martino and Vittorio Miraglia
Future Internet 2023, 15(1), 23; https://doi.org/10.3390/fi15010023 - 30 Dec 2022
Cited by 5 | Viewed by 2510
Abstract
Hot and cold spot identification is a spatial analysis technique used in various issues to identify regions where a specific phenomenon is either strongly or poorly concentrated or sensed. Many hot/cold spot detection techniques are proposed in literature; clustering methods are generally applied [...] Read more.
Hot and cold spot identification is a spatial analysis technique used in various issues to identify regions where a specific phenomenon is either strongly or poorly concentrated or sensed. Many hot/cold spot detection techniques are proposed in literature; clustering methods are generally applied in order to extract hot and cold spots as polygons on the maps; the more precise the determination of the area of the hot (cold) spots, the greater the computational complexity of the clustering algorithm. Furthermore, these methods do not take into account the hidden information provided by users through social networks, which is significant for detecting the presence of hot/cold spots based on the emotional reactions of citizens. To overcome these critical points, we propose a GIS-based hot and cold spot detection framework encapsulating a classification model of emotion categories of documents extracted from social streams connected to the investigated phenomenon is implemented. The study area is split into subzones; residents’ postings during a predetermined time period are retrieved and analyzed for each subzone. The proposed model measures for each subzone the prevalence of pleasant and unpleasant emotional categories in different time frames; with the aid of a fuzzy-based emotion classification approach, subzones in which unpleasant/pleasant emotions prevail over the analyzed time period are labeled as hot/cold spots. A strength of the proposed framework is to significantly reduce the CPU time of cluster-based hot and cold spot detection methods as it does not require detecting the exact geometric shape of the spot. Our framework was tested to detect hot and cold spots related to citizens’ discomfort due to heatwaves in the study area made up of the municipalities of the northeastern area of the province of Naples (Italy). The results show that the hot spots, where the greatest discomfort is felt, correspond to areas with a high population/building density. On the contrary, cold spots cover urban areas having a lower population density. Full article
Show Figures

Figure 1

Figure 1
<p>Example of Pleasant/Unpleasant ER fuzzy partition.</p>
Full article ">Figure 2
<p>Schema of the proposed GIS-based framework.</p>
Full article ">Figure 3
<p>Schema of the social messages emotion classification framework proposed in [<a href="#B6-futureinternet-15-00023" class="html-bibr">6</a>].</p>
Full article ">Figure 4
<p>FESC: logical overview.</p>
Full article ">Figure 5
<p>The study area—the 18 municipalities of the northeastern area of the province of Naples (Italy).</p>
Full article ">Figure 6
<p>Pleasant and unpleasant emotion relevance thematic maps in the year 2020. (<b>a</b>) Pleasant emotion relevance. (<b>b</b>) Unpleasant emotion relevance.</p>
Full article ">Figure 7
<p>Pleasant and unpleasant emotion relevance thematic maps in the year 2021. (<b>a</b>) Pleasant emotion relevance. (<b>b</b>) Unpleasant emotion relevance.</p>
Full article ">Figure 8
<p>Pleasant and unpleasant emotion relevance thematic maps in 2022. (<b>a</b>) Pleasant emotion relevance. (<b>b</b>) Unpleasant emotion relevance.</p>
Full article ">Figure 9
<p>Map of Hot and Cold spots in the study area.</p>
Full article ">
20 pages, 9080 KiB  
Article
A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting
by Songtao Huang, Jun Shen, Qingquan Lv, Qingguo Zhou and Binbin Yong
Future Internet 2023, 15(1), 22; https://doi.org/10.3390/fi15010022 - 30 Dec 2022
Cited by 9 | Viewed by 2819
Abstract
Electricity load forecasting has seen increasing importance recently, especially with the effectiveness of deep learning methods growing. Improving the accuracy of electricity load forecasting is vital for public resources management departments. Traditional neural network methods such as long short-term memory (LSTM) and bidirectional [...] Read more.
Electricity load forecasting has seen increasing importance recently, especially with the effectiveness of deep learning methods growing. Improving the accuracy of electricity load forecasting is vital for public resources management departments. Traditional neural network methods such as long short-term memory (LSTM) and bidirectional LSTM (BiLSTM) have been widely used in electricity load forecasting. However, LSTM and its variants are not sensitive to the dynamic change of inputs and miss the internal nonperiodic rules of series, due to their discrete observation interval. In this paper, a novel neural ordinary differential equation (NODE) method, which can be seen as a continuous version of residual network (ResNet), is applied to electricity load forecasting to learn dynamics of time series. We design three groups of models based on LSTM and BiLSTM and compare the accuracy between models using NODE and without NODE. The experimental results show that NODE can improve the prediction accuracy of LSTM and BiLSTM. It indicates that NODE is an effective approach to improving the accuracy of electricity load forecasting. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of LSTM.</p>
Full article ">Figure 2
<p>The structure of BiLSTM.</p>
Full article ">Figure 3
<p>The latent trajectory created by forward propagation when inputting an initial value into NODE. These arrows represent the time point that is created by the adaptive mechanism of ODE solver to approach the real solution during the integration process.</p>
Full article ">Figure 4
<p>The structure of the NODE block.</p>
Full article ">Figure 5
<p>The schematic diagram of the sliding window.</p>
Full article ">Figure 6
<p>The model structures of OCBL and CBL.</p>
Full article ">Figure 7
<p>The model structures of OBLL and BLL.</p>
Full article ">Figure 8
<p>The model structures of OBBLL and BBLL.</p>
Full article ">Figure 9
<p>The RMSE metric comparison of three groups of models, respectively, in future steps 1, 3, 5, and 7 in Queensland in 2019. The dotted line divides the different comparative model groups. In each comparative model group, different colors represent different steps. The model with NODE is on the left side and the model without NODE is on the right side.</p>
Full article ">Figure 10
<p>The MAPE metric comparison of three groups of models, respectively, in future steps 1, 3, 5, and 7 in Queensland in 2019. The dotted line divides the different comparative model groups. In each comparative model group, different colors represent different steps. The model with NODE is on the left side and the model without NODE is on the right side.</p>
Full article ">Figure 11
<p>The MAE metric comparison of three groups of models, respectively, in future steps 1, 3, 5, and 7 in Queensland in 2019. The dotted line divides the different comparative model groups. In each comparative model group, different colors represent different steps. The model with NODE is on the left side and the model without NODE is on the right side.</p>
Full article ">Figure 12
<p>The prediction results and local observation for 3-step forecasting in 2019. (<b>A</b>) represents the whole prediction result. (<b>B</b>–<b>D</b>) describe the prediction result of different local observation interval.</p>
Full article ">Figure 13
<p>The prediction results and local observation for 5-step forecasting in 2019. (<b>A</b>) represents the whole prediction result. (<b>B</b>–<b>D</b>) describe the prediction result of different local observation interval.</p>
Full article ">Figure 14
<p>The prediction results and local observation for 7-step forecasting in 2019. (<b>A</b>) represents the whole prediction result. (<b>B</b>–<b>D</b>) describe the prediction result of different local observation interval.</p>
Full article ">
21 pages, 2088 KiB  
Review
The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review
by Khando Khando, M. Sirajul Islam and Shang Gao
Future Internet 2023, 15(1), 21; https://doi.org/10.3390/fi15010021 - 30 Dec 2022
Cited by 32 | Viewed by 61253
Abstract
The interplay between finance and technology with the use of the internet triggered the emergence of digital payment technologies. Such technological innovation in the payment industry is the foundation for financial inclusion. However, despite the continuous progress and potential of moving the payment [...] Read more.
The interplay between finance and technology with the use of the internet triggered the emergence of digital payment technologies. Such technological innovation in the payment industry is the foundation for financial inclusion. However, despite the continuous progress and potential of moving the payment landscape towards digital payments and connecting the population to the ubiquitous digital environment, some critical issues need to be addressed to achieve a more harmonious inclusive and sustainable cashless society. The study aims to provide a comprehensive literature review on the emerging digital payment technologies and associated challenges. By systematically reviewing existing empirical studies, this study puts forward the state-of-the-art classification of digital payment technologies and presents four categories of digital payment technologies: card payment, e-payment,mobile payment and cryptocurrencies. Subsequently, the paper presents the key challenges in digital payment technologies categorized into broad themes: social, economic, technical, awareness and legal. The classification and categorization of payment technologies and associated challenges can be useful to both researchers and practitioners to understand, elucidate and develop a coherent digital payment strategy. Full article
(This article belongs to the Collection Featured Reviews of Future Internet Research)
Show Figures

Figure 1

Figure 1
<p>Illustrating Systematic Review Process (Okoli and Schabram, 2010).</p>
Full article ">Figure 2
<p>Emerging digital payment technologies with study location.</p>
Full article ">Figure 3
<p>Percentage and number of studies conducted in each category of Digital Payment Technologies.</p>
Full article ">Figure 4
<p>Classification of digital payment technology challenges.</p>
Full article ">Figure 5
<p>Categorization of digital payment technology challenges.</p>
Full article ">
18 pages, 326 KiB  
Article
Teachers’ Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations
by Maria Perifanou, Anastasios A. Economides and Stavros A. Nikou
Future Internet 2023, 15(1), 20; https://doi.org/10.3390/fi15010020 - 29 Dec 2022
Cited by 29 | Viewed by 7038
Abstract
The integration of augmented reality (AR) in education is promising since it enhances teaching and offers more engaging and appealing learning experiences. Teachers can have a catalytic role towards the adoption of AR in education; therefore, their perspectives with regard to AR in [...] Read more.
The integration of augmented reality (AR) in education is promising since it enhances teaching and offers more engaging and appealing learning experiences. Teachers can have a catalytic role towards the adoption of AR in education; therefore, their perspectives with regard to AR in teaching and learning are very important. The current study explores teachers’ views on the integration of AR in education through an open-ended questionnaire that has been answered by 93 educators worldwide. A set of digital skills that can support student-centered pedagogies in an appropriate infrastructure are the main requirement for effective teaching with AR. Among the perceived benefits and opportunities are interactive teaching and learning, increased interest and engagement, better understanding of complex concepts. As barriers, participants reported the lack of AR educational applications, the cost of buying and maintaining AR equipment and resources, the lack of teachers’ and students’ digital skills, classroom management issues, and security and ethical issues. Moreover, survey participants highlighted the need for raising teachers’ awareness for the added value of AR in education and the need for teachers’ continuous professional development. Implications and future research recommendations on the integration of AR in education are discussed. Full article
21 pages, 1445 KiB  
Article
Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks
by Sarantis Kalafatidis, Sotiris Skaperas, Vassilis Demiroglou, Lefteris Mamatas and Vassilis Tsaoussidis
Future Internet 2023, 15(1), 19; https://doi.org/10.3390/fi15010019 - 29 Dec 2022
Cited by 7 | Viewed by 3232
Abstract
The Internet of Things (IoT) is a key technology for smart community networks, such as smart-city environments, and its evolution calls for stringent performance requirements (e.g., low delay) to support efficient communication among a wide range of objects, including people, sensors, vehicles, etc. [...] Read more.
The Internet of Things (IoT) is a key technology for smart community networks, such as smart-city environments, and its evolution calls for stringent performance requirements (e.g., low delay) to support efficient communication among a wide range of objects, including people, sensors, vehicles, etc. At the same time, these ecosystems usually adopt wireless mesh technology to extend their communication range in large-scale IoT deployments. However, due to the high range of coverage, the smart-city WMNs may face different network challenges according to the network characteristic, for example, (i) areas that include a significant number of wireless nodes or (ii) areas with frequent dynamic changes such as link failures due to unstable topologies. Named-Data Networking (NDN) can enhance WMNs to meet such IoT requirements, thanks to the content naming scheme and in-network caching, but it necessitates adaptability to the challenging conditions of WMNs. In this work, we aim at efficient end-to-end NDN communication in terms of performance (i.e., delay), performing extended experimentation over a real WMN, evaluating and discussing the benefits provided by two SDN-based NDN strategies: (1) a dynamic SDN-based solution that integrates the NDN operation with the routing decisions of a WMN routing protocol; (2) a static one which based on SDN-based clustering and real WMN performance measurements. Our key contributions include (i) the implementation of two types of NDN path selection strategies; (ii) experimentation and data collection over the w-iLab.t Fed4FIRE+ testbed with real WMN conditions; (ii) real measurements released as open-data, related to the performance of the wireless links in terms of RSSI, delay, and packet loss among the wireless nodes of the corresponding testbed. Full article
(This article belongs to the Special Issue Software-Defined Networking for the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Example of NDN communication over CityLab testbed [<a href="#B4-futureinternet-15-00019" class="html-bibr">4</a>].</p>
Full article ">Figure 2
<p>SDN-based Experimentation System.</p>
Full article ">Figure 3
<p>NDN path selection using the proactive strategy.</p>
Full article ">Figure 4
<p>Evaluation of the wireless links.</p>
Full article ">Figure 5
<p>WMN topology, considering the 9th floor of the w-iLab.1 test.</p>
Full article ">Figure 6
<p>Average <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>T</mi> <msub> <mi>T</mi> <mrow> <mi>N</mi> <mi>D</mi> <msub> <mi>N</mi> <mi>c</mi> </msub> </mrow> </msub> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>T</mi> <msub> <mi>T</mi> <mrow> <mi>N</mi> <mi>D</mi> <msub> <mi>N</mi> <mi>p</mi> </msub> </mrow> </msub> </mrow> </semantics></math> and <span class="html-italic">Total Delay</span>.</p>
Full article ">Figure 7
<p>Number of Hops and <span class="html-italic">Best Path Changes (BPC)</span> pers round.</p>
Full article ">Figure 8
<p>WMN topology, considering the 10th floor of the w-iLab.1 test-bed.</p>
Full article ">Figure 9
<p>Selected topology—w-iLab.1 office lab 10th floor [<a href="#B38-futureinternet-15-00019" class="html-bibr">38</a>].</p>
Full article ">Figure 10
<p>RSSI clustering results among network nodes.</p>
Full article ">Figure 11
<p>Delay clustering results among network nodes.</p>
Full article ">Figure 12
<p>RSSI-Delay clustering results among network nodes.</p>
Full article ">
3 pages, 162 KiB  
Editorial
VR, AR, and 3-D User Interfaces for Measurement and Control
by Annalisa Liccardo and Francesco Bonavolontà
Future Internet 2023, 15(1), 18; https://doi.org/10.3390/fi15010018 - 29 Dec 2022
Cited by 1 | Viewed by 1923
Abstract
The topics of virtual, mixed, and extended reality have now become key areas in various fields of scientific and industrial applications, and the interest in them is made tangible by the numerous papers available in the scientific literature. In this regard, the Special [...] Read more.
The topics of virtual, mixed, and extended reality have now become key areas in various fields of scientific and industrial applications, and the interest in them is made tangible by the numerous papers available in the scientific literature. In this regard, the Special Issue “VR, AR, and 3-D User Interfaces for Measurement and Control” received a fair number of varied contributions that analyzed different aspects of the implementation of virtual, mixed, and extended reality systems and approaches in the real world. They range from investigating the requirements of new potential technologies to the prediction verification of the effectiveness and benefits of their use, the analysis of the difficulties of interaction with graphical interfaces to the possibility of performing complex and risky tasks (such as surgical operations) using mixed reality viewers. All contributions were of a high standard and mainly highlight that measurement and control applications based on the new models of interaction with reality are by now increasingly ready to leave laboratory spaces and become objects and features of common life. The significant benefits of this technology will radically change the way we live and interact with information and the reality around us, and it will surely be worthy of further exploration, maybe even in a new Special Issue of Future Internet. Full article
(This article belongs to the Special Issue VR, AR, and 3-D User Interfaces for Measurement and Control)
19 pages, 892 KiB  
Article
Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast
by Yunchuan Liu, Amir Ghasemkhani and Lei Yang
Future Internet 2023, 15(1), 17; https://doi.org/10.3390/fi15010017 - 28 Dec 2022
Cited by 1 | Viewed by 2204
Abstract
This paper investigates the short-term wind farm generation forecast. It is observed from the real wind farm generation measurements that wind farm generation exhibits distinct features, such as the non-stationarity and the heterogeneous dynamics of ramp and non-ramp events across different classes of [...] Read more.
This paper investigates the short-term wind farm generation forecast. It is observed from the real wind farm generation measurements that wind farm generation exhibits distinct features, such as the non-stationarity and the heterogeneous dynamics of ramp and non-ramp events across different classes of wind turbines. To account for the distinct features of wind farm generation, we propose a Drifting Streaming Peaks-over-Threshold (DSPOT)-enhanced self-evolving neural networks-based short-term wind farm generation forecast. Using DSPOT, the proposed method first classifies the wind farm generation data into ramp and non-ramp datasets, where time-varying dynamics are taken into account by utilizing dynamic ramp thresholds to separate the ramp and non-ramp events. We then train different neural networks based on each dataset to learn the different dynamics of wind farm generation by the NeuroEvolution of Augmenting Topologies (NEAT), which can obtain the best network topology and weighting parameters. As the efficacy of the neural networks relies on the quality of the training datasets (i.e., the classification accuracy of the ramp and non-ramp events), a Bayesian optimization-based approach is developed to optimize the parameters of DSPOT to enhance the quality of the training datasets and the corresponding performance of the neural networks. Based on the developed self-evolving neural networks, both distributional and point forecasts are developed. The experimental results show that compared with other forecast approaches, the proposed forecast approach can substantially improve the forecast accuracy, especially for ramp events. The experiment results indicate that the accuracy improvement in a 60 min horizon forecast in terms of the mean absolute error (MAE) is at least 33.6% for the whole year data and at least 37% for the ramp events. Moreover, the distributional forecast in terms of the continuous rank probability score (CRPS) is improved by at least 35.8% for the whole year data and at least 35.2% for the ramp events. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the DSPOT-enhanced self-evolving neural networks.</p>
Full article ">Figure 2
<p>Locational distribution of the Mitsubishi and GE wind turbines in the wind farm.</p>
Full article ">Figure 3
<p>Empirical distribution of power outputs of GE and Mitsubishi turbines in 4 seasons and ramp events, where season 4 is from October to December.</p>
Full article ">Figure 4
<p>Empirical ramp distributions of GE and Mitsubishi turbines in different time windows <span class="html-italic">l</span> and different time periods, which follow the generalized Pareto distribution.</p>
Full article ">Figure 5
<p>Workflow of NEAT.</p>
Full article ">Figure 6
<p>Encoding of an NN with 1 output and 3 inputs.</p>
Full article ">Figure 7
<p>Mutation by appending a connection, where the link from Node 1 to Node 4 is inserted.</p>
Full article ">Figure 8
<p>Mutation by appending a node, where Node 6 is inserted between Node 1 and Node 5.</p>
Full article ">Figure 9
<p>MAE versus feature dimension size.</p>
Full article ">Figure 10
<p>On 5 January 2010.</p>
Full article ">Figure 11
<p>On 19 March 2010.</p>
Full article ">Figure 12
<p>On 9 October 2010.</p>
Full article ">
12 pages, 3571 KiB  
Article
Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance
by Qadri Hamarsheh, Omar Daoud, Mohammed Baniyounis and Ahlam Damati
Future Internet 2023, 15(1), 16; https://doi.org/10.3390/fi15010016 - 28 Dec 2022
Cited by 7 | Viewed by 2232
Abstract
The interest in vehicle-to-vehicle communication has gained a high demand in the last decade. This is due to the need for safe and robust smart communication, while this type of communication is vulnerable to latency and power. Therefore, this work proposes the Narrowband [...] Read more.
The interest in vehicle-to-vehicle communication has gained a high demand in the last decade. This is due to the need for safe and robust smart communication, while this type of communication is vulnerable to latency and power. Therefore, this work proposes the Narrowband Internet-of-Things to enhance the robustness of the vehicular communication system. Accordingly, the system’s QoS is enhanced. This enhancement is based on proposing two parts to cover the latency and the harmonics issues, in addition to proposing a distributed antenna configuration for the moving vehicles under a machine learning benchmark, which uses the across-entropy algorithm. The proposed environment has been simulated and compared to the state-of-the-art work performance. The simulation results verify the proposed work performance based on three different parameters; namely the latency, the mean squared error rate, and the transmitted signal block error rate. From these results, the proposed work outperforms the literature; at the probability of 10−3, the proposed work reduces the peak power deficiency by almost 49%, an extra 23.5% enhancement has been attained from the self-interference cancellation side, and a bit error rate enhancement by a ratio of 31%. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>V2V benchmark for N moving vehicles based on LTE structure.</p>
Full article ">Figure 2
<p>MIMO antennas deployment in V2V-LTE infrastructure.</p>
Full article ">Figure 3
<p>The physical layer modification for the V2V communications process.</p>
Full article ">Figure 4
<p>Flowchart of the W-DFT process.</p>
Full article ">Figure 5
<p>Suppressing the side-lobes based on the W-DFT process.</p>
Full article ">Figure 6
<p>The communication link modification based on the wavelet-stage.</p>
Full article ">Figure 7
<p>The comparison results based on CCDF curves.</p>
Full article ">Figure 8
<p>The comparison results based on MSE factor curves.</p>
Full article ">Figure 9
<p>The comparison results based on CCDF curves.</p>
Full article ">Figure 10
<p>The comparison results based on BER curves.</p>
Full article ">
13 pages, 408 KiB  
Article
BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization
by Moreno La Quatra and Luca Cagliero
Future Internet 2023, 15(1), 15; https://doi.org/10.3390/fi15010015 - 27 Dec 2022
Cited by 44 | Viewed by 5121
Abstract
The emergence of attention-based architectures has led to significant improvements in the performance of neural sequence-to-sequence models for text summarization. Although these models have proved to be effective in summarizing English-written documents, their portability to other languages is limited thus leaving plenty of [...] Read more.
The emergence of attention-based architectures has led to significant improvements in the performance of neural sequence-to-sequence models for text summarization. Although these models have proved to be effective in summarizing English-written documents, their portability to other languages is limited thus leaving plenty of room for improvement. In this paper, we present BART-IT, a sequence-to-sequence model, based on the BART architecture that is specifically tailored to the Italian language. The model is pre-trained on a large corpus of Italian-written pieces of text to learn language-specific features and then fine-tuned on several benchmark datasets established for abstractive summarization. The experimental results show that BART-IT outperforms other state-of-the-art models in terms of ROUGE scores in spite of a significantly smaller number of parameters. The use of BART-IT can foster the development of interesting NLP applications for the Italian language. Beyond releasing the model to the research community to foster further research and applications, we also discuss the ethical implications behind the use of abstractive summarization models. Full article
(This article belongs to the Special Issue State-of-the-Art Future Internet Technology in Italy 2022–2023)
Show Figures

Figure 1

Figure 1
<p>ROUGE-2 comparison between IT5, BART-IT, mT5, and mBART on benchmark datasets. The last four bars represent the performance of the models in terms of summaries/second on a single NVIDIA A6000 GPU.</p>
Full article ">
42 pages, 15670 KiB  
Article
Human–Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition
by Roberto De Fazio, Vincenzo Mariano Mastronardi, Matteo Petruzzi, Massimo De Vittorio and Paolo Visconti
Future Internet 2023, 15(1), 14; https://doi.org/10.3390/fi15010014 - 27 Dec 2022
Cited by 22 | Viewed by 12964
Abstract
Human–machine interaction (HMI) refers to systems enabling communication between machines and humans. Systems for human–machine interfaces have advanced significantly in terms of materials, device design, and production methods. Energy supply units, logic circuits, sensors, and data storage units must be flexible, stretchable, undetectable, [...] Read more.
Human–machine interaction (HMI) refers to systems enabling communication between machines and humans. Systems for human–machine interfaces have advanced significantly in terms of materials, device design, and production methods. Energy supply units, logic circuits, sensors, and data storage units must be flexible, stretchable, undetectable, biocompatible, and self-healing to act as human–machine interfaces. This paper discusses the technologies for providing different haptic feedback of different natures. Notably, the physiological mechanisms behind touch perception are reported, along with a classification of the main haptic interfaces. Afterward, a comprehensive overview of wearable haptic interfaces is presented, comparing them in terms of cost, the number of integrated actuators and sensors, their main haptic feedback typology, and their future application. Additionally, a review of sensing systems that use haptic feedback technologies—specifically, smart gloves—is given by going through their fundamental technological specifications and key design requirements. Furthermore, useful insights related to the design of the next-generation HMI devices are reported. Lastly, a novel smart glove based on thin and conformable AlN (aluminum nitride) piezoelectric sensors is demonstrated. Specifically, the device acquires and processes the signal from the piezo sensors to classify performed gestures through an onboard machine learning (ML) algorithm. Then, the design and testing of the electronic conditioning section of AlN-based sensors integrated into the smart glove are shown. Finally, the architecture of a wearable visual-tactile recognition system is presented, combining visual data acquired by a micro-camera mounted on the user’s glass with the haptic ones provided by the piezoelectric sensors. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

Figure 1
<p>Workflow used for the selection of papers included in the survey of haptic technologies.</p>
Full article ">Figure 2
<p>Distribution of documents analyzed for realizing the survey of haptic technologies.</p>
Full article ">Figure 3
<p>Kinesthetic (<b>left</b>) and tactile feedback (<b>right</b>)are shown in a schematic depiction of haptic feedback. The awareness of muscles and joints in response to a gesture, stretch, weight, etc., is known as kinesthetic feedback. The sense of surface hardness, temperature, and other properties of the skin’s surface derived through mechanoreceptors is known as tactile feedback.</p>
Full article ">Figure 4
<p>Examples of hydraulically driven tactile interfaces. Illustration of a hydraulic glove with a joint-stretching mechanism providing kinesthetic feedback (<b>a</b>). A diagram of a hydraulic actuator that changes the cavity to provide out-of-plane displacement for tactile feedback (<b>b</b>) [<a href="#B31-futureinternet-15-00014" class="html-bibr">31</a>]. An electrostatic mechanism controls the hydraulic actuators leading to dielectric normal and lateral motion as a result of cavity deformation (<b>c</b>) [<a href="#B31-futureinternet-15-00014" class="html-bibr">31</a>].</p>
Full article ">Figure 5
<p>Examples of interfaces with piezoelectric actuators for generating haptic feedback. Illustration of the piezoelectric haptic feedback system (<b>a</b>). To give rapid feedback on the contraction and release of haptic sensations, a smart glove incorporates sensors and PZT stimulators (<b>b</b>) [<a href="#B34-futureinternet-15-00014" class="html-bibr">34</a>].</p>
Full article ">Figure 6
<p>Thermal-based haptic interfaces. Joule-heating interface for haptic feedback: schematic representation of Joule heaters [<a href="#B24-futureinternet-15-00014" class="html-bibr">24</a>] (<b>a</b>); haptic feedback interfaces utilizing thermal electric actuators. A diagram of a thermoelectric mechanism [<a href="#B2-futureinternet-15-00014" class="html-bibr">2</a>] (<b>b</b>); microfluidic and other thermal-based haptic interfaces. The systems for micro-fluidic heat transfer are depicted schematically (left). Thermoregulatory clothing that circulates liquid cooling through flexible, thermally conductive silicone aluminum tubes to cool the body (center and right) (<b>c</b>).</p>
Full article ">Figure 7
<p>Operating principle of neural stimulation-based tactile interfacing system. Schematic depicting the mode in which electric current excites the nerve to produce electro-tactile sensations (<b>a</b>) using pulsed signals (<b>b</b>); an example of prosthesis based on neural stimulation tactile where feedback intensity is steadily controlled when an amputated user pounds a nail (<b>c</b>) [<a href="#B45-futureinternet-15-00014" class="html-bibr">45</a>].</p>
Full article ">Figure 8
<p>Vi-Hab system with highlighted main components: the wearable band and 5 vibrating motors [<a href="#B56-futureinternet-15-00014" class="html-bibr">56</a>]; a force sensitive resistors (FSR) and related motor are present for each finger of the dummy hand (from 1 to 5, totally five). The wearable band (in the inset) wraps around the upper arm such that each motor falls in line with the natural position of the fingers as shown by the red arrows.</p>
Full article ">Figure 9
<p>Glove-based HMI for general purposes; it includes (<b>a</b>) triboelectric finger sensors for sensing bending movements (<b>b</b>) with a related operating principle (<b>c</b>), a triboelectric palm sensor (<b>c</b>) for detecting the sliding movements (<b>d</b>) with a related operating principle (<b>e</b>), and piezoelectric mechanical stimulator for generating haptic feedback (<b>f</b>) [<a href="#B34-futureinternet-15-00014" class="html-bibr">34</a>].</p>
Full article ">Figure 10
<p>Three-dimensional model of the presented ungrounded tactile device with the main components highlighted (<b>a</b>) and the assembled device without the handle (<b>b</b>) [<a href="#B69-futureinternet-15-00014" class="html-bibr">69</a>].</p>
Full article ">Figure 11
<p>Three-dimensional model and screenshots of type-A (<b>a</b>) and type-B (<b>b</b>) tactile interfaces applied on fingertips. LF, LR, RF, and RR stand for the locations of the piezo actuator [<a href="#B83-futureinternet-15-00014" class="html-bibr">83</a>].</p>
Full article ">Figure 12
<p>Average Weber fraction according to the haptic feedback type (<b>a</b>). The results concerning the haptic condition come from earlier research [<a href="#B89-futureinternet-15-00014" class="html-bibr">89</a>]. Mean subjective assessment of realism according to the haptic interface type (<b>b</b>) [<a href="#B83-futureinternet-15-00014" class="html-bibr">83</a>]. For both images, the standard errors are shown by the error bars. The single-star symbol (*) indicates that the observed significance level (<span class="html-italic">p</span>-value) of the test is lower than 0.05; in detail, it was equal to 0.013 for the test reported in (<b>b</b>).</p>
Full article ">Figure 13
<p>Manual user interaction without the use of any equipment (<b>a1</b>). The doctor assesses the finger angle with goniometers for therapeutic purposes (<b>a2</b>). A smart glove that recognizes gestures and uses a highly stretchy, polymer-enhanced strain sensor (<b>a3</b>) [<a href="#B111-futureinternet-15-00014" class="html-bibr">111</a>]. An interactive smart glove that uses touch and the Lorm alphabet to facilitate communication for the deafblind (<b>a4</b>) [<a href="#B112-futureinternet-15-00014" class="html-bibr">112</a>]. An IMMU-assisted smart glove for capturing and identifying 3D human gestures (<b>a5</b>) [<a href="#B110-futureinternet-15-00014" class="html-bibr">110</a>]. Gesture-based methods for deafblind remote communication utilizing PARLOMA, a revolutionary human–robot interaction system (<b>a6</b>). A soft intelligent glove for hand rehabilitation that combines touch and gesture methods (<b>a7</b>). For badminton, a sensory glove is employed to describe delicate hand motions (<b>a8</b>). Tactile feedback and integrated haptic sensing (<b>b1</b>). Gas-permeable, multipurpose electronic-skin electronic realized by laser-induced porous graphene and a spongy layer made of elastomer with a sugar template (<b>b2</b>). An energy-autonomous electronic skin (<b>b3</b>). A smart glove designed as an assistive device integrating touch sensors and actuators for persons who are deafblind (<b>b4</b>). A material for electronic skin applications that is self-healing and self-powered (<b>b5</b>) [<a href="#B93-futureinternet-15-00014" class="html-bibr">93</a>].</p>
Full article ">Figure 14
<p>The designed sensory glove with highlighted the main components (<b>left</b>) and worn by a user (<b>right</b>) [<a href="#B110-futureinternet-15-00014" class="html-bibr">110</a>].</p>
Full article ">Figure 15
<p>Schematic of B: Ionic glove, constituted by pressure pads, which contain conductive fluid applied to the prosthesis’ fingertip, a battery-powered fluidic controller, and an armband equipped with SMA actuators, worn by the user’s remaining limb to softly squeeze their arm [<a href="#B119-futureinternet-15-00014" class="html-bibr">119</a>].</p>
Full article ">Figure 16
<p>Haptic armband constituted of five re-entrant hexagonal components obtained by 3D printing. The device is actuated by twisted SMA wires, and the Kapton tape serves as a heat-resistant barrier [<a href="#B119-futureinternet-15-00014" class="html-bibr">119</a>].</p>
Full article ">Figure 17
<p>Schematic representation of the jamming elements’ positioning on the tremor suppression glove [<a href="#B125-futureinternet-15-00014" class="html-bibr">125</a>].</p>
Full article ">Figure 18
<p>Illustration of the different layers constituting the sensor, and in the box, the representation of the connection package made by 3D printing (<b>a</b>). Illustration of the sensor’s shape and dimensions (<b>b</b>). Photograph of the resulting sensor connected with a coaxial cable (<b>c</b>) [<a href="#B20-futureinternet-15-00014" class="html-bibr">20</a>].</p>
Full article ">Figure 19
<p>The detection of hand motions using the developed WHSs. (<b>A</b>) Five sensors are attached to the back of a human hand in positioning scheme (i) and picture (ii). A detected signal corresponding to the hyperextension of the index finger (iii). (<b>B</b>) The signal provided by WHS applied to the middle finger for different hand apertures. (<b>C</b>,<b>D</b>) The detected signals generated by five WHSs at the hand’s rear, starting from the closed (<b>C</b>) or the open (<b>D</b>) hand, for various conditions: distended index finger (i), index and middle finger (ii); thumb, index, and middle finger (iii); all fingers except for the pinkie (iv); all fingers (v). (<b>E</b>) A series of actions involving the thumb and pinkie that begin with the closed hand. (<b>F</b>) The reliability measurement obtained during 100 repetitions of the closed-opened hand. The measurements were carried out by applying the WHSs on the middle finger and pinkie.</p>
Full article ">Figure 20
<p>Block diagram reporting the overall architecture of the proposed AlN-based piezoelectric glove.</p>
Full article ">Figure 21
<p>Graphical representation of the designed inferring chain for gesture recognition.</p>
Full article ">Figure 22
<p>Three-dimensional model of the developed piezoelectric glove with highlighted the main components: AlN flexible sensors, conditioning board, acquisition and processing board, and Lipo battery.</p>
Full article ">Figure 23
<p>Block diagram of the front-end dedicated to the AlN-based piezoelectric sensors [<a href="#B129-futureinternet-15-00014" class="html-bibr">129</a>].</p>
Full article ">Figure 24
<p>Schematic of the designed charge amplifier. The piezoelectric transducer is represented with its Thevenin equivalent circuit.</p>
Full article ">Figure 25
<p>Overall schematic of the designed Band-pass filter based on Sallen–Key cells.</p>
Full article ">Figure 26
<p>Bode diagram of the overall system’s frequency response: magnitude (<b>a</b>) and phase (<b>b</b>).</p>
Full article ">Figure 27
<p>PCB board of the overall conditioning section (<b>a</b>) and 3D model view (<b>b</b>).</p>
Full article ">Figure 28
<p>Three flexible AlN sensors used in the preliminary tests: triangular tip (<b>a</b>), large rectangular (<b>b</b>), and small rectangular (<b>c</b>).</p>
Full article ">Figure 29
<p>Waveforms of the output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mi>out</mi> </mrow> </msub> </mrow> </semantics></math> (yellow trace) and the filtered output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mrow> <mi>out</mi> <mo>,</mo> <mo> </mo> <mi>filtered</mi> </mrow> </mrow> </msub> </mrow> </semantics></math> (cyan trace) in response to the flexural (<b>a</b>) and impulsive (<b>b</b>) solicitations.</p>
Full article ">Figure 30
<p>Application of the sensor on the index finger (<b>a</b>) and corresponding output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mi>out</mi> </mrow> </msub> </mrow> </semantics></math> (yellow trace) and the filtered output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mrow> <mi>out</mi> <mo>,</mo> <mo> </mo> <mi>filtered</mi> </mrow> </mrow> </msub> </mrow> </semantics></math> (cyan trace) related to finger bending (<b>b</b>).</p>
Full article ">Figure 31
<p>Application of the sensor on the wrist (<b>a</b>) and corresponding output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mi>out</mi> </mrow> </msub> </mrow> </semantics></math> (yellow trace) and the filtered output signal <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="normal">V</mi> <mrow> <mrow> <mi>out</mi> <mo>,</mo> <mo> </mo> <mi>filtered</mi> </mrow> </mrow> </msub> </mrow> </semantics></math> (cyan trace) related to wrist bending (<b>b</b>).</p>
Full article ">Figure 32
<p>Graphical representation of the proposed combined tactile and image recognition system.</p>
Full article ">
20 pages, 5182 KiB  
Article
A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network
by Jiaxu Zhao, Binting Su, Xuli Rao and Zhide Chen
Future Internet 2023, 15(1), 13; https://doi.org/10.3390/fi15010013 - 27 Dec 2022
Cited by 4 | Viewed by 3011
Abstract
In this paper, we build a recommender system for a new study area: social commerce, which combines rich information about social network users and products on an e-commerce platform. The idea behind this recommender system is that a social network contains abundant information [...] Read more.
In this paper, we build a recommender system for a new study area: social commerce, which combines rich information about social network users and products on an e-commerce platform. The idea behind this recommender system is that a social network contains abundant information about its users which could be exploited to create profiles of the users. For social commerce, the quality of the profiles of potential consumers determines whether the recommender system is a success or a failure. In our work, not only the user’s textual information but also the tags and the relationships between users have been considered in the process of building user profiling model. A topic model has been adopted in our system, and a feedback mechanism also been design in this paper. Then, we apply a collative filtering method and a clustering algorithm in order to obtain a high recommendation accuracy. We do an empirical analysis based on real data collected on a social network and an e-commerce platform. We find that the social network has an impact on e-commerce, so social commerce could be realized. Simulations show that our topic model has a better performance in topic finding, meaning that our profile-building model is suitable for a social commerce recommender system. Full article
(This article belongs to the Section Techno-Social Smart Systems)
Show Figures

Figure 1

Figure 1
<p>An abstract graph of social network.</p>
Full article ">Figure 2
<p>System model of the proposed cross-platform recommender system (CPRec).</p>
Full article ">Figure 3
<p>An abstract representation of LDA principle.</p>
Full article ">Figure 4
<p>Generation process of Microblogs.</p>
Full article ">Figure 5
<p>Plate notation of Microblogs Topic Discovery Model.</p>
Full article ">Figure 6
<p>Diagrams of three time functions.</p>
Full article ">Figure 7
<p>The detailed process of collecting data.</p>
Full article ">Figure 8
<p>An instance of the special users we study.</p>
Full article ">Figure 9
<p>The curves of different shop owner’s commodities sales.</p>
Full article ">Figure 10
<p>Statistical results of keywords in users’ interest profiles.</p>
Full article ">Figure 11
<p>The impact of parameter <math display="inline"><semantics> <mi>μ</mi> </semantics></math> on MAE.</p>
Full article ">Figure 12
<p>The comparison results of CF and CFUP.</p>
Full article ">
25 pages, 2657 KiB  
Article
Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach
by Giuseppe Vizzari and Thomas Cecconello
Future Internet 2023, 15(1), 12; https://doi.org/10.3390/fi15010012 - 27 Dec 2022
Cited by 8 | Viewed by 4605
Abstract
Pedestrian simulation is a consolidated but still lively area of research. State of the art models mostly take an agent-based perspective, in which pedestrian decisions are made according to a manually defined model. Reinforcement learning (RL), on the other hand, is used to [...] Read more.
Pedestrian simulation is a consolidated but still lively area of research. State of the art models mostly take an agent-based perspective, in which pedestrian decisions are made according to a manually defined model. Reinforcement learning (RL), on the other hand, is used to train an agent situated in an environment how to act so as to maximize an accumulated numerical reward signal (a feedback provided by the environment to every chosen action). We explored the possibility of applying RL to pedestrian simulation. We carefully defined a reward function combining elements related to goal orientation, basic proxemics, and basic way-finding considerations. The proposed approach employs a particular training curriculum, a set of scenarios growing in difficulty supporting an incremental acquisition of general movement competences such as orientation, walking, and pedestrian interaction. The learned pedestrian behavioral model is applicable to situations not presented to the agents in the training phase, and seems therefore reasonably general. This paper describes the basic elements of the approach, the training procedure, and an experimentation within a software framework employing Unity and ML-Agents. Full article
(This article belongs to the Special Issue Modern Trends in Multi-Agent Systems)
Show Figures

Figure 1

Figure 1
<p>Example environments and annotations: (<b>a</b>) ‘turns’ environment and annotations; (<b>b</b>) ‘unidirectional door’ environment and annotations.</p>
Full article ">Figure 2
<p>Rays and provided information: yellow = agent, cyan = intermediate target, green = final target, and transparent = wall or none of the others. Pedestrian agents are depicted in red.</p>
Full article ">Figure 3
<p>A selection of training environments: white blocks are obstacles, and agents can be red or blue to indicate that they belong to groups having different goals in the environment (e.g., the eastern or northern exits in the intersection environment).</p>
Full article ">Figure 4
<p>Trend in the reward throughout the training phase.</p>
Full article ">Figure 5
<p>Anchor environment execution.</p>
Full article ">Figure 6
<p>Omega environment execution.</p>
Full article ">Figure 7
<p>“Door choice” environment execution.</p>
Full article ">Figure 8
<p>“Bidirectional door” environment execution.</p>
Full article ">Figure 9
<p>Desired and actual walking speeds in the “crowded bidirectional door” environment.</p>
Full article ">Figure 10
<p>Agent trajectories in the “crowded bidirectional door” environment. (<b>a</b>) Agent positions in the overall environment. (<b>b</b>) Agent positions in the door area.</p>
Full article ">Figure 11
<p>Fundamental diagram (speed vs. density) in a 25 m<math display="inline"><semantics> <msup> <mrow/> <mn>2</mn> </msup> </semantics></math> (5 × 5 m) area around the door.</p>
Full article ">Figure 12
<p>Quantitative results describing pedestrians’ dynamics in the T-junction environment. (<b>a</b>) Agents’ positions in the merge area. (<b>b</b>) Agents’ velocities in the whole environment.</p>
Full article ">Figure 13
<p>Additional large environments in which the model was tested (<b>a</b>,<b>b</b>), and those finally included in the curriculum (<b>c</b>,<b>d</b>).</p>
Full article ">
20 pages, 1031 KiB  
Article
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
by Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici
Future Internet 2023, 15(1), 9; https://doi.org/10.3390/fi15010009 - 26 Dec 2022
Cited by 14 | Viewed by 3689
Abstract
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks’ security has become a crucial issue. Anomaly-based intrusion detection systems (IDS) using machine learning have [...] Read more.
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks’ security has become a crucial issue. Anomaly-based intrusion detection systems (IDS) using machine learning have recently gained increased popularity due to their generation’s ability to detect unseen attacks. However, the deployment of anomaly-based AI-assisted IDS for IoT devices is computationally expensive. A high-performance and ultra-low power consumption anomaly-based IDS framework is proposed and evaluated in this paper. The framework has achieved the highest accuracy of 98.57% and 99.66% on the UNSW-NB15 and IoT-23 datasets, respectively. The inference engine on the MAX78000EVKIT AI-microcontroller is 11.3 times faster than the Intel Core i7-9750H 2.6 GHz and 21.3 times faster than NVIDIA GeForce GTX 1650 graphics cards, when the power drawn was 18mW. In addition, the pipelined design on the PYNQ-Z2 SoC FPGA board with the Xilinx Zynq xc7z020-1clg400c device is optimised to run at the on-chip frequency (100 MHz), which shows a speedup of 53.5 times compared to the MAX78000EVKIT. Full article
(This article belongs to the Special Issue Anomaly Detection in Modern Networks)
Show Figures

Figure 1

Figure 1
<p>The proposed HH-NIDS framework architecture.</p>
Full article ">Figure 2
<p>The HH-NIDS framework’s processing flow from training to hardware implementations.</p>
Full article ">Figure 3
<p>Neural network inference acceleration on Zynq-7000 SoC architecture.</p>
Full article ">Figure 4
<p>The generated FPGA block architecture using the HLS implementation approach.</p>
Full article ">Figure 5
<p>Pipeline implementation of the <span class="html-italic">Neuron Network Architecture</span> block on an FPGA-based architecture includes four phases: Input buffering (P1), Layer_0 calculation (P2), Layer_1 calculation (P3), and Output buffering (P4).</p>
Full article ">Figure 6
<p>The <span class="html-italic">MULx11</span> block calculation architecture.</p>
Full article ">Figure 7
<p>The trained results in fifty epochs with three different learning rates: 0.0005, 0.001, and 0.01 for the MAX78000 microcontroller.</p>
Full article ">Figure 8
<p>The trained results in fifty epochs with three different learning rates: 0.0005, 0.001, and 0.01 for the PYNQ-Z2 SoC FPGA.</p>
Full article ">Figure 9
<p>The pre-process, inference, and post-process time from different implementations.</p>
Full article ">Figure 10
<p>The CPU, GPU, and FPGA inference times for different input buffer sizes.</p>
Full article ">Figure 11
<p>The wareform simulation results from the NN on FPGA using a Verilog approach.</p>
Full article ">
24 pages, 1214 KiB  
Article
Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study
by Tihomir Orehovački, Luka Blašković and Matej Kurevija
Future Internet 2023, 15(1), 8; https://doi.org/10.3390/fi15010008 - 26 Dec 2022
Cited by 6 | Viewed by 6824
Abstract
Mobile banking is nowadays a standard service provided by banks worldwide because it adds convenience for people. There is no more rushing to a bank or waiting in lines for a simple transaction that can be conducted from anywhere and at any time [...] Read more.
Mobile banking is nowadays a standard service provided by banks worldwide because it adds convenience for people. There is no more rushing to a bank or waiting in lines for a simple transaction that can be conducted from anywhere and at any time in the blink of an eye. To be consumed by a respective amount of bank clients regularly, mobile banking applications are required to be continuously improved and updated, be in line with recent security standards, and meet quality requirements. This paper tackles the perceived quality of mobile banking applications that are most commonly used in Croatia and has three objectives in that respect. The first one is to identify the extent to which pragmatic and hedonic dimensions of quality contribute to customers’ satisfaction and their behavioral intentions related to the continuous use of mobile banking applications. The second one is to determine if there are significant differences in the perceived quality between users of diverse mobile banking applications as well as between users who belong to different age groups. The last one is to uncover the advantages and disadvantages of evaluated mobile banking applications. For this purpose, an empirical study was carried out, during which data were collected with an online questionnaire. The sample was composed of 130 participants who are representative and regular users of mobile banking applications. The psychometric features of the proposed research model, which represents an interplay of perceived quality attributes, were tested using the partial least squares structural equation modeling (PLS-SEM) method. Differences in the perceived quality among different mobile banking applications and customers of various age groups were explored with Kruskal–Wallis tests. Pros and cons of mobile banking applications were identified with the help of descriptive statistics. Study findings indicate that, in the context of mobile banking applications used in Croatia, feedback quality and responsiveness contribute to the ease of use, usefulness is affected by both ease of use and efficiency, responsiveness has a significant impact on efficiency while ease of use, usefulness, and security of personal data are predictors of customers’ satisfaction which in turn influences their behavioral intentions. While no significant difference exists in the perceived quality of four examined mobile banking applications, we found a significant difference in the perceived quality among three age groups of users of mobile banking applications. The most commonly reported advantages of mobile banking applications were related to facets of their efficiency and usefulness, whereas their main drawback appeared to be the lack of features dealing with the personalization of offered services. The reported and discussed results of an empirical study can be used as a set of guidelines for future advances in the evaluation and design of mobile banking applications. Full article
(This article belongs to the Special Issue Information Networks with Human-Centric AI)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Research model with corresponding hypotheses.</p>
Full article ">Figure 2
<p>Login screens of evaluated mobile banking applications (from left to right: PBZ Mobile banking, Erste George, m-zaba, OTP m-banking).</p>
Full article ">Figure 3
<p>Comparison of item means per mobile banking applications.</p>
Full article ">Figure 4
<p>Comparison of item means per age groups of users.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop