Next Issue
Volume 14, July
Previous Issue
Volume 14, May
 
 

Future Internet, Volume 14, Issue 6 (June 2022) – 30 articles

Cover Story (view full-size image): Businesses operating in digital environments require increased supply-chain automation, interoperability, and data governance. While research on the semantic web and interoperability has recently received much attention, there is a dearth of studies that have investigated the relationship between these concepts in sufficient depth. This study conducted a review and bibliometric analysis of over 3500 papers on the semantic web and interoperability that were published over the past twenty years. Keyword co-occurrence and co-citation networks were used to identify primary research hotspots and group relevant literature. The results reveal a significant emphasis on certain frameworks/techniques and key areas contributing to the flow of knowledge and the growth of the semantic web and interoperability field. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
13 pages, 793 KiB  
Review
6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap
by Chiara Suraci, Sara Pizzi, Federico Montori, Marco Di Felice and Giuseppe Araniti
Future Internet 2022, 14(6), 189; https://doi.org/10.3390/fi14060189 - 19 Jun 2022
Cited by 14 | Viewed by 4065
Abstract
The pandemic caused by COVID-19 has shed light on the urgency of bridging the digital divide to guarantee equity in the fruition of different services by all citizens. The inability to access the digital world may be due to a lack of network [...] Read more.
The pandemic caused by COVID-19 has shed light on the urgency of bridging the digital divide to guarantee equity in the fruition of different services by all citizens. The inability to access the digital world may be due to a lack of network infrastructure, which we refer to as service-delivery divide, or to the physical conditions, handicaps, age, or digital illiteracy of the citizens, that is mentioned as service-fruition divide. In this paper, we discuss the way how future sixth-generation (6G) systems can remedy actual limitations in the realization of a truly digital world. Hence, we introduce the key technologies for bridging the digital gap and show how they can work in two use cases of particular importance, namely eHealth and education, where digital inequalities have been dramatically augmented by the pandemic. Finally, considerations about the socio-economical impacts of future 6G solutions are drawn. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies)
Show Figures

Figure 1

33 pages, 2634 KiB  
Article
Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage
by Furkan Paligu and Cihan Varol
Future Internet 2022, 14(6), 188; https://doi.org/10.3390/fi14060188 - 17 Jun 2022
Cited by 2 | Viewed by 3425
Abstract
Social media usage is increasing at a rapid rate. Everyday users are leaving a substantial amount of data as artifacts in these applications. As the size and velocity of data increase, innovative technologies such as Web Storage and IndexedDB are emerging. Consequently, forensic [...] Read more.
Social media usage is increasing at a rapid rate. Everyday users are leaving a substantial amount of data as artifacts in these applications. As the size and velocity of data increase, innovative technologies such as Web Storage and IndexedDB are emerging. Consequently, forensic investigators are facing challenges to adapt to the emerging technologies to establish reliable techniques for extracting and analyzing suspect information. This paper investigates the convenience and efficacy of performing forensic investigations with a time frame and social network connection analysis on IndexedDB technology. It focuses on artifacts from prevalently used social networking site Instagram on the Mozilla Firefox browser. A single case pretest–posttest quasi-experiment is designed and executed over Instagram web application to produce artifacts that are later extracted, processed, characterized, and presented in forms of information suited to forensic investigation. The artifacts obtained from Mozilla Firefox are crossed-checked with artifacts of Google Chrome for verification. In the end, the efficacy of using these artifacts in forensic investigations is shown with a demonstration through a proof-of-concept tool. The results indicate that Instagram artifacts stored in IndexedDB technology can be utilized efficiently for forensic investigations, with a large variety of information ranging from fully constructed user data to time and location indicators. Full article
(This article belongs to the Special Issue Cybersecurity and Cybercrime in the Age of Social Media)
Show Figures

Figure 1

15 pages, 7516 KiB  
Article
Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers
by Vincenza Carchiolo, Marco Grassia, Michele Malgeri and Giuseppe Mangioni
Future Internet 2022, 14(6), 187; https://doi.org/10.3390/fi14060187 - 16 Jun 2022
Cited by 9 | Viewed by 2283
Abstract
The study of the behaviors of large community of researchers and what correlations exist between their environment, such as grouping rules by law or specific institution policies, and their performance is an important topic since it affects the metrics used to evaluate the [...] Read more.
The study of the behaviors of large community of researchers and what correlations exist between their environment, such as grouping rules by law or specific institution policies, and their performance is an important topic since it affects the metrics used to evaluate the quality of the research. Moreover, in several countries, such as Italy, these metrics are also used to define the recruitment and funding policies. To effectively study these topics, we created a procedure that allow us to craft a large dataset of Italian Academic researchers, having the most important performance indices together with co-authorships information, mixing data extracted from the official list of academic researchers provided by Italian Ministry of University and Research and the Elsevier’s Scopus database. In this paper, we discuss our approach to automate the process of correct association of profiles and the mapping of publications reducing the use of computational resources. We also present the characteristics of four datasets related to specific research fields defined by the Italian Ministry of University and Research used to group the Italian researchers. Then, we present several examples of how the information extracted from these datasets can help to achieve a better understanding of the dynamics influencing scientist performances. Full article
Show Figures

Figure 1

23 pages, 2414 KiB  
Article
Multilayer Backbones for Internet of Battlefield Things
by Evangelia Fragkou, Dimitrios Papakostas, Theodoros Kasidakis and Dimitrios Katsaros
Future Internet 2022, 14(6), 186; https://doi.org/10.3390/fi14060186 - 15 Jun 2022
Cited by 3 | Viewed by 2757
Abstract
The Internet of Battlefield Things is a newly born cyberphysical system and, even though it shares a lot with the Internet of Things and with ad hoc networking, substantial research is required to cope with its scale and peculiarities. This article examines a [...] Read more.
The Internet of Battlefield Things is a newly born cyberphysical system and, even though it shares a lot with the Internet of Things and with ad hoc networking, substantial research is required to cope with its scale and peculiarities. This article examines a fundamental problem pertaining to the routing of information, i.e., the calculation of a backbone network. We model an IoBT network as a network with multiple layers and employ the concept of domination for multilayer networks. This is a significant departure from earlier works, and in spite of the huge literature on the topic during the past twenty years, the problem in IoBT networks is different since these networks are multilayer networks, thus making inappropriate all the past, related literature because it deals with single layer (flat) networks. We establish the computational complexity of our problem, and design a distributed algorithm for computing connected dominating sets with small cardinality. We analyze the performance of the proposed algorithm on generated topologies, and compare it against two—the only existing—competitors. The proposed algorithm establishes itself as the clear winner in all experiments concerning the dominating set from a size-wise and an energy-wise perspective achieving a performance gain of about 15%. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)
Show Figures

Figure 1

13 pages, 684 KiB  
Article
An Indoor Smart Parking Algorithm Based on Fingerprinting
by Silvia Stranieri
Future Internet 2022, 14(6), 185; https://doi.org/10.3390/fi14060185 - 14 Jun 2022
Cited by 6 | Viewed by 2126
Abstract
In the last few years, researchers from many research fields are investigating the problem affecting all the drivers in big and populated cities: the parking problem. In outdoor environments, the problem can be solved by relying on vehicular ad hoc networks, which guarantee [...] Read more.
In the last few years, researchers from many research fields are investigating the problem affecting all the drivers in big and populated cities: the parking problem. In outdoor environments, the problem can be solved by relying on vehicular ad hoc networks, which guarantee communication among vehicles populating the network. When it comes to indoor settings, the problem gets harder, since drivers cannot count on classic GPS localization. In this work, a smart parking solution for a specific indoor setting is provided, exploiting the fingerprint approach for indoor localization. The considered scenario is a multi-level car park inside an airport building. The algorithm provides a vehicle allocation inside the car park in quadratic time over the number of parking slots, by also considering the driver’s preferences on the terminal to be reached. Full article
(This article belongs to the Special Issue Wireless Technology for Indoor Localization System)
Show Figures

Figure 1

20 pages, 2005 KiB  
Article
A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network
by Kavitha Rani Balmuri, Srinivas Konda, Wen-Cheng Lai, Parameshachari Bidare Divakarachari, Kavitha Malali Vishveshwarappa Gowda and Hemalatha Kivudujogappa Lingappa
Future Internet 2022, 14(6), 184; https://doi.org/10.3390/fi14060184 - 14 Jun 2022
Cited by 13 | Viewed by 3443
Abstract
Nowadays, the Long-Term Evolution-Advanced system is widely used to provide 5G communication due to its improved network capacity and less delay during communication. The main issues in the 5G network are insufficient user resources and burst errors, because it creates losses in data [...] Read more.
Nowadays, the Long-Term Evolution-Advanced system is widely used to provide 5G communication due to its improved network capacity and less delay during communication. The main issues in the 5G network are insufficient user resources and burst errors, because it creates losses in data transmission. In order to overcome this, an effective Radio Resource Management (RRM) is required to be developed in the 5G network. In this paper, the Long Short-Term Memory (LSTM) network is proposed to develop the radio resource management in the 5G network. The proposed LSTM-RRM is used for assigning an adequate power and bandwidth to the desired user equipment of the network. Moreover, the Grid Search Optimization (GSO) is used for identifying the optimal hyperparameter values for LSTM. In radio resource management, a request queue is used to avoid the unwanted resource allocation in the network. Moreover, the losses during transmission are minimized by using frequency interleaving and guard level insertion. The performance of the LSTM-RRM method has been analyzed in terms of throughput, outage percentage, dual connectivity, User Sum Rate (USR), Threshold Sum Rate (TSR), Outdoor Sum Rate (OSR), threshold guaranteed rate, indoor guaranteed rate, and outdoor guaranteed rate. The indoor guaranteed rate of LSTM-RRM for 1400 m of building distance improved up to 75.38% compared to the existing QOC-RRM. Full article
(This article belongs to the Topic Wireless Communications and Edge Computing in 6G)
Show Figures

Figure 1

27 pages, 5503 KiB  
Article
A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization
by Roberto De Fazio, Massimo De Vittorio and Paolo Visconti
Future Internet 2022, 14(6), 183; https://doi.org/10.3390/fi14060183 - 11 Jun 2022
Cited by 8 | Viewed by 3007
Abstract
Breathing is essential for human life. Issues related to respiration can be an indicator of problems related to the cardiorespiratory system; thus, accurate breathing monitoring is fundamental for establishing the patient’s condition. This paper presents a ready-to-use and discreet chest band for monitoring [...] Read more.
Breathing is essential for human life. Issues related to respiration can be an indicator of problems related to the cardiorespiratory system; thus, accurate breathing monitoring is fundamental for establishing the patient’s condition. This paper presents a ready-to-use and discreet chest band for monitoring the respiratory parameters based on the piezoresistive transduction mechanism. In detail, it relies on a strain sensor realized with a pressure-sensitive fabric (EeonTex LTT-SLPA-20K) for monitoring the chest movements induced by respiration. In addition, the band includes an Inertial Measurement Unit (IMU), which is used to remove the motion artefacts from the acquired signal, thereby improving the measurement reliability. Moreover, the band comprises a low-power conditioning and acquisition section that processes the signal from sensors, providing a reliable measurement of the respiration rate (RR), in addition to other breathing parameters, such as inhalation (TI) and exhalation (TE) times, inhalation-to-exhalation ratio (IER), and flow rate (V). The device wirelessly transmits the extracted parameters to a host device, where a custom mobile application displays them. Different test campaigns were carried out to evaluate the performance of the designed chest band in measuring the RR, by comparing the measurements provided by the chest band with those obtained by breath count. In detail, six users, of different genders, ages, and physical constitutions, were involved in the tests. The obtained results demonstrated the effectiveness of the proposed approach in detecting the RR. The achieved performance was in line with that of other RR monitoring systems based on piezoresistive textiles, but which use more powerful acquisition systems or have low wearability. In particular, the inertia-assisted piezoresistive chest band obtained a Pearson correlation coefficient with respect to the measurements based on breath count of 0.96 when the user was seated. Finally, Bland–Altman analysis demonstrated that the developed system obtained 0.68 Breaths Per Minute (BrPM) mean difference (MD), and Limits of Agreement (LoAs) of +3.20 and −1.75 BrPM when the user was seated. Full article
Show Figures

Figure 1

22 pages, 2470 KiB  
Review
An In-Depth Review on Blockchain Simulators for IoT Environments
by Jason Zheng, Chidinma Dike, Stefan Pancari, Yi Wang, George C. Giakos, Wafa Elmannai and Bingyang Wei
Future Internet 2022, 14(6), 182; https://doi.org/10.3390/fi14060182 - 10 Jun 2022
Cited by 10 | Viewed by 4515
Abstract
Simulating blockchain technology within the IoT has never been as important. Along with this comes the need to find suitable blockchain simulators capable of simulating blockchain networks within an IoT environment. Despite there being a wide variety of blockchain simulators, not all are [...] Read more.
Simulating blockchain technology within the IoT has never been as important. Along with this comes the need to find suitable blockchain simulators capable of simulating blockchain networks within an IoT environment. Despite there being a wide variety of blockchain simulators, not all are capable of simulating within an IoT environment and not all are suitable for every IoT environment. This article will review previously published works and present a list of suitable blockchain simulators as well as a few untested simulators that have the potential to simulate blockchain networks within an IoT environment. A total of 18 blockchain simulators are presented and discussed in this paper. In addition, a comprehensive list of the advantages and limitations of each simulator is presented to demonstrate the best situation in which simulators should be used. Finally, recommendations are made on when each simulator should be used and in what situation it should be avoided. Full article
(This article belongs to the Special Issue Blockchain for the Internet of Things)
Show Figures

Figure 1

23 pages, 717 KiB  
Article
A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining
by Qifan Chen, Yang Lu, Charmaine S. Tam and Simon K. Poon
Future Internet 2022, 14(6), 181; https://doi.org/10.3390/fi14060181 - 9 Jun 2022
Cited by 4 | Viewed by 2118
Abstract
Process mining aims to gain knowledge of business processes via the discovery of process models from event logs generated by information systems. The insights revealed from process mining heavily rely on the quality of the event logs. Activities extracted from different data sources [...] Read more.
Process mining aims to gain knowledge of business processes via the discovery of process models from event logs generated by information systems. The insights revealed from process mining heavily rely on the quality of the event logs. Activities extracted from different data sources or the free-text nature within the same system may lead to inconsistent labels. Such inconsistency would then lead to redundancy in activity labels, which refer to labels that have different syntax but share the same behaviours. Redundant activity labels can introduce unnecessary complexities to the event logs. The identification of these labels from data-driven process discovery are difficult and rely heavily on human intervention. Neither existing process discovery algorithms nor event data preprocessing techniques can solve such redundancy efficiently. In this paper, we propose a multi-view approach to automatically detect redundant activity labels by using not only context-aware features such as control–flow relations and attribute values but also semantic features from the event logs. Our evaluation of several publicly available datasets and a real-life case study demonstrate that our approach can efficiently detect redundant activity labels even with low-occurrence frequencies. The proposed approach can add value to the preprocessing step to generate more representative event logs. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

21 pages, 2475 KiB  
Article
High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method
by Shangkun Deng, Yingke Zhu, Xiaoru Huang, Shuangyang Duan and Zhe Fu
Future Internet 2022, 14(6), 180; https://doi.org/10.3390/fi14060180 - 9 Jun 2022
Cited by 6 | Viewed by 3394
Abstract
Futures price-movement-direction forecasting has always been a significant and challenging subject in the financial market. In this paper, we propose a combination approach that integrates the XGBoost (eXtreme Gradient Boosting), SMOTE (Synthetic Minority Oversampling Technique), and NSGA-II (Non-dominated Sorting Genetic Algorithm-II) methods. We [...] Read more.
Futures price-movement-direction forecasting has always been a significant and challenging subject in the financial market. In this paper, we propose a combination approach that integrates the XGBoost (eXtreme Gradient Boosting), SMOTE (Synthetic Minority Oversampling Technique), and NSGA-II (Non-dominated Sorting Genetic Algorithm-II) methods. We applied the proposed approach on the direction prediction and simulation trading of rebar futures, which are traded on the Shanghai Futures Exchange. Firstly, the minority classes of the high-frequency rebar futures price change magnitudes are oversampled using the SMOTE algorithm to overcome the imbalance problem of the class data. Then, XGBoost is adopted to construct a multiclassification model for the price-movement-direction prediction. Next, the proposed approach employs NSGA-II to optimize the parameters of the pre-designed trading rule for trading simulation. Finally, the price-movement direction is predicted, and we conducted the high-frequency trading based on the optimized XGBoost model and the trading rule, with the classification and trading performances empirically evaluated by four metrics over four testing periods. Meanwhile, the LIME (Local Interpretable Model-agnostic Explanations) is applied as a model explanation approach to quantify the prediction contributions of features to the forecasting samples. From the experimental results, we found that the proposed approach performed best in terms of direction prediction accuracy, profitability, and return–risk ratio. The proposed approach could be beneficial for decision-making of the rebar traders and related companies engaged in rebar futures trading. Full article
(This article belongs to the Special Issue Machine Learning for Software Engineering)
Show Figures

Figure 1

22 pages, 5436 KiB  
Article
Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia
by Nayomi Kankanamge, Tan Yigitcanlar and Ashantha Goonetilleke
Future Internet 2022, 14(6), 179; https://doi.org/10.3390/fi14060179 - 9 Jun 2022
Cited by 4 | Viewed by 5068
Abstract
Providing convenient and effective online education is important for the public to be better prepared for disaster events. Nonetheless, the effectiveness of such education is questionable due to the limited use of online tools and platforms, which also results in narrow community outreach. [...] Read more.
Providing convenient and effective online education is important for the public to be better prepared for disaster events. Nonetheless, the effectiveness of such education is questionable due to the limited use of online tools and platforms, which also results in narrow community outreach. Correspondingly, understanding public perceptions of disaster education methods and experiences for the adoption of novel methods is critical, but this is an understudied area of research. The aim of this study is to understand public perceptions towards online disaster education practices for disaster preparedness and evaluate the effectiveness of the gamification method in increasing public awareness. This study utilizes social media analytics and conducts a gamification exercise. The analysis involved Twitter posts (n = 13,683) related to the 2019–2020 Australian bushfires, and surveyed participants (n = 52) before and after experiencing a gamified application—i.e., STOP Disasters! The results revealed that: (a) The public satisfaction level is relatively low for traditional bushfire disaster education methods; (b) The study participants’ satisfaction level is relatively high for an online gamified application used for disaster education; and (c) The use of virtual and augmented reality was found to be promising for increasing the appeal of gamified applications, along with using a blended traditional and gamified approach. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

16 pages, 5612 KiB  
Article
EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection
by Jinghui Feng, Haopeng Kuang and Lihua Zhang
Future Internet 2022, 14(6), 178; https://doi.org/10.3390/fi14060178 - 9 Jun 2022
Cited by 8 | Viewed by 2675
Abstract
Feature selection can efficiently improve classification accuracy and reduce the dimension of datasets. However, feature selection is a challenging and complex task that requires a high-performance optimization algorithm. In this paper, we propose an enhanced binary bat algorithm (EBBA) which is originated from [...] Read more.
Feature selection can efficiently improve classification accuracy and reduce the dimension of datasets. However, feature selection is a challenging and complex task that requires a high-performance optimization algorithm. In this paper, we propose an enhanced binary bat algorithm (EBBA) which is originated from the conventional binary bat algorithm (BBA) as the learning algorithm in a wrapper-based feature selection model. First, we model the feature selection problem and then transfer it as a fitness function. Then, we propose an EBBA for solving the feature selection problem. In EBBA, we introduce the Lévy flight-based global search method, population diversity boosting method and chaos-based loudness method to improve the BA and make it more applicable to feature selection problems. Finally, the simulations are conducted to evaluate the proposed EBBA and the simulation results demonstrate that the proposed EBBA outmatches other comparison benchmarks. Moreover, we also illustrate the effectiveness of the proposed improved factors by tests. Full article
(This article belongs to the Topic Big Data and Artificial Intelligence)
Show Figures

Figure 1

12 pages, 5213 KiB  
Article
Evaluation of Online Teaching Quality Based on Facial Expression Recognition
by Changbo Hou, Jiajun Ai, Yun Lin, Chenyang Guan, Jiawen Li and Wenyu Zhu
Future Internet 2022, 14(6), 177; https://doi.org/10.3390/fi14060177 - 8 Jun 2022
Cited by 14 | Viewed by 3806
Abstract
In 21st-century society, with the rapid development of information technology, the scientific and technological strength of all walks of life is increasing, and the field of education has also begun to introduce high and new technologies gradually. Affected by the epidemic, online teaching [...] Read more.
In 21st-century society, with the rapid development of information technology, the scientific and technological strength of all walks of life is increasing, and the field of education has also begun to introduce high and new technologies gradually. Affected by the epidemic, online teaching has been implemented all over the country, forming an education model of “dual integration” of online and offline teaching. However, the disadvantages of online teaching are also very obvious; that is, teachers cannot understand the students’ listening status in real-time. Therefore, our study adopts automatic face detection and expression recognition based on a deep learning framework and other related technologies to solve this problem, and it designs an analysis system of students’ class concentration based on expression recognition. The students’ class concentration analysis system can help teachers detect students’ class concentration and improve the efficiency of class evaluation. In this system, OpenCV is used to call the camera to collect the students’ listening status in real-time, and the MTCNN algorithm is used to detect the face of the video to frame the location of the student’s face image. Finally, the obtained face image is used for real-time expression recognition by using the VGG16 network added with ECANet, and the students’ emotions in class are obtained. The experimental results show that the method in our study can more accurately identify students’ emotions in class and carry out a teaching effect evaluation, which has certain application value in intelligent education fields, such as the smart classroom and distance learning. For example, a teaching evaluation module can be added to the teaching software, and teachers can know the listening emotions of each student in class while lecturing. Full article
(This article belongs to the Special Issue Computer Vision in Advanced Education)
Show Figures

Figure 1

21 pages, 4473 KiB  
Article
Toward Semi-Supervised Graphical Object Detection in Document Images
by Goutham Kallempudi, Khurram Azeem Hashmi, Alain Pagani, Marcus Liwicki, Didier Stricker and Muhammad Zeshan Afzal
Future Internet 2022, 14(6), 176; https://doi.org/10.3390/fi14060176 - 8 Jun 2022
Cited by 5 | Viewed by 2929
Abstract
The graphical page object detection classifies and localizes objects such as Tables and Figures in a document. As deep learning techniques for object detection become increasingly successful, many supervised deep neural network-based methods have been introduced to recognize graphical objects in documents. However, [...] Read more.
The graphical page object detection classifies and localizes objects such as Tables and Figures in a document. As deep learning techniques for object detection become increasingly successful, many supervised deep neural network-based methods have been introduced to recognize graphical objects in documents. However, these models necessitate a substantial amount of labeled data for the training process. This paper presents an end-to-end semi-supervised framework for graphical object detection in scanned document images to address this limitation. Our method is based on a recently proposed Soft Teacher mechanism that examines the effects of small percentage-labeled data on the classification and localization of graphical objects. On both the PubLayNet and the IIIT-AR-13K datasets, the proposed approach outperforms the supervised models by a significant margin in all labeling ratios (1%, 5%, and 10%). Furthermore, the 10% PubLayNet Soft Teacher model improves the average precision of Table, Figure, and List by +5.4,+1.2, and +3.2 points, respectively, with a similar total mAP as the Faster-RCNN baseline. Moreover, our model trained on 10% of IIIT-AR-13K labeled data beats the previous fully supervised method +4.5 points. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

38 pages, 1900 KiB  
Review
Overview of Blockchain Oracle Research
by Giulio Caldarelli
Future Internet 2022, 14(6), 175; https://doi.org/10.3390/fi14060175 - 8 Jun 2022
Cited by 23 | Viewed by 6210
Abstract
Whereas the use of distributed ledger technologies has previously been limited to cryptocurrencies, other sectors—such as healthcare, supply chain, and finance—can now benefit from them because of bitcoin scripts and smart contracts. However, these applications rely on oracles to fetch data from the [...] Read more.
Whereas the use of distributed ledger technologies has previously been limited to cryptocurrencies, other sectors—such as healthcare, supply chain, and finance—can now benefit from them because of bitcoin scripts and smart contracts. However, these applications rely on oracles to fetch data from the real world, which cannot reproduce the trustless environment provided by blockchain networks. Despite their crucial role, academic research on blockchain oracles is still in its infancy, with few contributions and a heterogeneous approach. This study undertakes a bibliometric analysis by highlighting institutions and authors that are actively contributing to the oracle literature. Investigating blockchain oracle research state of the art, research themes, research directions, and converging studies will also be highlighted to discuss, on the one hand, current advancements in the field and, on the other hand, areas that require more investigation. The results also show that although worldwide collaboration is still lacking, various authors and institutions have been working in similar directions. Full article
(This article belongs to the Topic Recent Trends in Blockchain and Its Applications)
Show Figures

Figure 1

27 pages, 5021 KiB  
Article
Investigating the Country of Origin and the Role of the .eu TLD in External Trade of European Union Member States
by Andreas Giannakoulopoulos, Minas Pergantis, Laida Limniati and Alexandros Kouretsis
Future Internet 2022, 14(6), 174; https://doi.org/10.3390/fi14060174 - 4 Jun 2022
Cited by 1 | Viewed by 2420
Abstract
The Internet, and specifically the World Wide Web, has always been a useful tool in the effort to achieve more outward-looking economies. The launch of the .eu TLD (top-level domain) in December of 2005 introduced the concept of a pan-European Internet identity that [...] Read more.
The Internet, and specifically the World Wide Web, has always been a useful tool in the effort to achieve more outward-looking economies. The launch of the .eu TLD (top-level domain) in December of 2005 introduced the concept of a pan-European Internet identity that aimed to enhance the status of European citizens and businesses on the global Web. In this study, the countries of origin of websites that choose to use the .eu TLD are investigated and the reasoning behind that choice, as well as its relation to each country’s economy and external trade are discussed. Using the Web as a tool, information regarding a vast number of existing .eu websites was collected, through means of Web data extraction, and this information was analyzed and processed by a detailed algorithm that produced results concerning each website’s most probable country of origin based on a multitude of factors. This acquired knowledge was then used to investigate relations with each member-state’s presence in its local ccTLD, its GDP and its external trade revenue. The study establishes a correlation between presence in the .eu TLD and external trade that is both independent of a country’s GDP and stronger than the relation between its local ccTLD presence and external trade. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

12 pages, 371 KiB  
Article
IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials
by Nikos Fotiou, Vasilios A. Siris, George Xylomenos and George C. Polyzos
Future Internet 2022, 14(6), 173; https://doi.org/10.3390/fi14060173 - 1 Jun 2022
Cited by 1 | Viewed by 2299
Abstract
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests and many-to-one [...] Read more.
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests and many-to-one responses, and this creates security challenges. In this paper, we focus on the provenance that has been received by an authorized device. We provide an effective and flexible solution for securing IoT group communication using CoAP, where a CoAP client sends a request to a CoAP group and receives multiple responses by many IoT devices, acting as CoAP servers. We design a solution that allows CoAP servers to digitally sign their responses in a way that clients can verify that a response has been generated by an authorized member of the CoAP group. In order to achieve our goal, we leverage Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). In particular, we consider that each group is identified by a DID, and each group member has received a VC that allows it to participate in that group. The only information a client needs to know is the DID of the group, which is learned using DNSSEC. Our solution allows group members to rotate their signing keys, it achieves group member revocation, and it has minimal communication and computational overhead. Full article
(This article belongs to the Special Issue Internet of Things (IoT) for Industry 4.0)
Show Figures

Figure 1

17 pages, 3759 KiB  
Review
Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market
by Sofana Reka S, Prakash Venugopal, Ravi V, Hassan Haes Alhelou, Amer Al-Hinai and Pierluigi Siano
Future Internet 2022, 14(6), 172; https://doi.org/10.3390/fi14060172 - 31 May 2022
Cited by 15 | Viewed by 9197
Abstract
The automotive industry is marching towards cleaner energy in the impending future. The need for cleaner energy is promoted by the government to a large degree in the global market in order to reduce pollution. Automobiles contribute to an upper scale in regard [...] Read more.
The automotive industry is marching towards cleaner energy in the impending future. The need for cleaner energy is promoted by the government to a large degree in the global market in order to reduce pollution. Automobiles contribute to an upper scale in regard to the level of pollution in the environment. For cleaner energy in automobiles, the industry needs to be revolutionized in all needed ways to a massive extent. The industry has to move from the traditional internal combustion engine, for which the main sources of energy are nonrenewable sources, to alternative methods and sources of energy. The automotive industry is now focusing on electric vehicles, and more research is being highlighted from vehicle manufacturers to find solutions for the problems faced in the field of electrification. Therefore, to accomplish full electrification, there is a long way to go, and this also requires a change in the existing infrastructure in addition to many innovations in the fields of infrastructure and grid connectively as well as the economic impacts of electric vehicles in society. In this work, an analysis of the electric vehicle market with the economic impacts of electric vehicles is studied. This therefore requires the transformation of the automotive industry. Full article
(This article belongs to the Special Issue Big Data Analytics, Privacy and Visualization)
Show Figures

Figure 1

13 pages, 1326 KiB  
Article
Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model
by Tingting Wang, Zhuolin Li, Xiulin Geng, Baogang Jin and Lingyu Xu
Future Internet 2022, 14(6), 171; https://doi.org/10.3390/fi14060171 - 31 May 2022
Cited by 10 | Viewed by 2256
Abstract
The accurate prediction of sea surface temperature (SST) is the basis for our understanding of local and global climate characteristics. At present, the existing sea temperature prediction methods fail to take full advantage of the potential spatial dependence between variables. Among them, graph [...] Read more.
The accurate prediction of sea surface temperature (SST) is the basis for our understanding of local and global climate characteristics. At present, the existing sea temperature prediction methods fail to take full advantage of the potential spatial dependence between variables. Among them, graph neural networks (GNNs) modeled on the relationships between variables can better deal with space–time dependency issues. However, most of the current graph neural networks are applied to data that already have a good graph structure, while in SST data, the dependency relationship between spatial points needs to be excavated rather than existing as prior knowledge. In order to predict SST more accurately and break through the bottleneck of existing SST prediction methods, we urgently need to develop an adaptive SST prediction method that is independent of predefined graph structures and can take full advantage of the real temporal and spatial correlations hidden indata sets. Therefore, this paper presents a graph neural network model designed specifically for space–time sequence prediction that can automatically learn the relationships between variables and model them. The model automatically extracts the dependencies between sea temperature multi-variates by embedding the nodes of the adaptive graph learning module, so that the fine-grained spatial correlations hidden in the sequence data can be accurately captured. Figure learning modules, graph convolution modules, and time convolution modules are integrated into a unified end-to-end framework for learning. Experiments were carried out on the Bohai Sea surface temperature data set and the South China Sea surface temperature data set, and the results show that the model presented in this paper is significantly better than other sea temperature model predictions in two remote-sensing sea temperature data sets and the surface temperature of the South China Sea is easier to predict than the surface temperature of the Bohai Sea. Full article
(This article belongs to the Topic Complex Systems and Network Science)
Show Figures

Figure 1

18 pages, 1273 KiB  
Article
Detection of Students’ Problems in Distance Education Using Topic Modeling and Machine Learning
by Huda Alhazmi
Future Internet 2022, 14(6), 170; https://doi.org/10.3390/fi14060170 - 31 May 2022
Cited by 4 | Viewed by 3087
Abstract
Following the rapid spread of COVID-19 to all the world, most countries decided to temporarily close their educational institutions. Consequently, distance education opportunities have been created for education continuity. The abrupt change presented educational challenges and issues. The aim of this study is [...] Read more.
Following the rapid spread of COVID-19 to all the world, most countries decided to temporarily close their educational institutions. Consequently, distance education opportunities have been created for education continuity. The abrupt change presented educational challenges and issues. The aim of this study is to investigate the content of Twitter posts to detect the arising topics regarding the challenges of distance education. We focus on students in Saudi Arabia to identify the problems they faced in their distance education experience. We developed a workflow that integrates unsupervised and supervised machine learning techniques in two phases. An unsupervised topic modeling algorithm was applied on a subset of tweets to detect underlying latent themes related to distance education issues. Then, a multi-class supervised machine learning classification technique was carried out in two levels to classify the tweets under discussion to categories and further to sub-categories. We found that 76,737 tweets revealed five underlying themes: educational issues, social issues, technological issues, health issues, and attitude and ethical issues. This study presents an automated methodology that identifies underlying themes in Twitter content with a minimum human involvement. The results of this work suggest that the proposed model could be utilized for collecting and analyzing social media data to provide insights into students’ educational experience. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

16 pages, 5432 KiB  
Article
An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters
by Guangwei Fan, Chuanzhen Sheng, Baoguo Yu, Lu Huang and Qiang Rong
Future Internet 2022, 14(6), 169; https://doi.org/10.3390/fi14060169 - 31 May 2022
Cited by 6 | Viewed by 2215
Abstract
In terms of indoor and outdoor positioning, in recent years, researchers at home and abroad have proposed some multisource integrated navigation and positioning methods, but these methods are navigation and positioning methods for a single scene. When it comes to the switching of [...] Read more.
In terms of indoor and outdoor positioning, in recent years, researchers at home and abroad have proposed some multisource integrated navigation and positioning methods, but these methods are navigation and positioning methods for a single scene. When it comes to the switching of indoor and outdoor complex scenes, these methods will cause the results of position with a marked jump and affect the accuracy of navigation and positioning. Aiming at the navigation and positioning problem in the case of indoor and outdoor complex scene switching, this paper proposes a multisource elastic navigation and positioning method based on particle filters, which makes full use of the redundant information of multisource sensors, constructs an elastic multisource fusion navigation and positioning model after eliminating abnormal data, elastically gives different particle weights to multisource sensors according to environmental changes and realizes the elastic fusion and positioning of multisource sensors through filtering. The test results show that this method has high navigation and positioning accuracy, the dynamic positioning accuracy is better than 0.7 m and there will be no jumping of positioning results in the process of scene switching, which improves the navigation and positioning accuracy and stability in complex and changeable indoor and outdoor environments. Full article
(This article belongs to the Special Issue Wireless Technology for Indoor Localization System)
Show Figures

Figure 1

14 pages, 370 KiB  
Article
Fraud Detection Using Neural Networks: A Case Study of Income Tax
by Belle Fille Murorunkwere, Origene Tuyishimire, Dominique Haughton and Joseph Nzabanita
Future Internet 2022, 14(6), 168; https://doi.org/10.3390/fi14060168 - 31 May 2022
Cited by 14 | Viewed by 8124
Abstract
Detecting tax fraud is a top objective for practically all tax agencies in order to maximize revenues and maintain a high level of compliance. Data mining, machine learning, and other approaches such as traditional random auditing have been used in many studies to [...] Read more.
Detecting tax fraud is a top objective for practically all tax agencies in order to maximize revenues and maintain a high level of compliance. Data mining, machine learning, and other approaches such as traditional random auditing have been used in many studies to deal with tax fraud. The goal of this study is to use Artificial Neural Networks to identify factors of tax fraud in income tax data. The results show that Artificial Neural Networks perform well in identifying tax fraud with an accuracy of 92%, a precision of 85%, a recall score of 99%, and an AUC-ROC of 95%. All businesses, either cross-border or domestic, the period of the business, small businesses, and corporate businesses, are among the factors identified by the model to be more relevant to income tax fraud detection. This study is consistent with the previous closely related work in terms of features related to tax fraud where it covered all tax types together using different machine learning models. To the best of our knowledge, this study is the first to use Artificial Neural Networks to detect income tax fraud in Rwanda by comparing different parameters such as layers, batch size, and epochs and choosing the optimal ones that give better accuracy than others. For this study, a simple model with no hidden layers, softsign activation function performs better. The evidence from this study will help auditors in understanding the factors that contribute to income tax fraud which will reduce the audit time and cost, as well as recover money foregone in income tax fraud. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Graphical abstract

20 pages, 8925 KiB  
Article
Data Anonymization: An Experimental Evaluation Using Open-Source Tools
by Joana Tomás, Deolinda Rasteiro and Jorge Bernardino
Future Internet 2022, 14(6), 167; https://doi.org/10.3390/fi14060167 - 30 May 2022
Cited by 8 | Viewed by 5347
Abstract
In recent years, the use of personal data in marketing, scientific and medical investigation, and forecasting future trends has really increased. This information is used by the government, companies, and individuals, and should not contain any sensitive information that allows the identification of [...] Read more.
In recent years, the use of personal data in marketing, scientific and medical investigation, and forecasting future trends has really increased. This information is used by the government, companies, and individuals, and should not contain any sensitive information that allows the identification of an individual. Therefore, data anonymization is essential nowadays. Data anonymization changes the original data to make it difficult to identify an individual. ARX Data Anonymization and Amnesia are two popular open-source tools that simplify this process. In this paper, we evaluate these tools in two ways: with the OSSpal methodology, and using a public dataset with the most recent tweets about the Pfizer and BioNTech vaccine. The assessment with the OSSpal methodology determines that ARX Data Anonymization has better results than Amnesia. In the experimental evaluation using the public dataset, it is possible to verify that Amnesia has some errors and limitations, but the anonymization process is simpler. Using ARX Data Anonymization, it is possible to upload big datasets and the tool does not show any error in the anonymization process. We concluded that ARX Data Anonymization is the one recommended to use in data anonymization. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

20 pages, 784 KiB  
Article
Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality
by Zhaohui Huang and Vasilis Friderikos
Future Internet 2022, 14(6), 166; https://doi.org/10.3390/fi14060166 - 30 May 2022
Cited by 3 | Viewed by 2174
Abstract
Mobile Augmented Reality (MAR) applications demand significant communication, computing and caching resources to support an efficient amalgamation of augmented reality objects (AROs) with the physical world in multiple video view streams. In this paper, the MAR service is decomposed and anchored at different [...] Read more.
Mobile Augmented Reality (MAR) applications demand significant communication, computing and caching resources to support an efficient amalgamation of augmented reality objects (AROs) with the physical world in multiple video view streams. In this paper, the MAR service is decomposed and anchored at different edge cloud locations to optimally explore the scarce edge cloud resources, especially during congestion episodes. In that way, the proposed scheme enables an efficient processing of popular view streams embedded with AROs. More specifically, in this paper, we explicitly utilize the notion of content popularity not only to synthetic objects but also to the video view streams. In this case, popular view streams are cached in a proactive manner, together with preferred/popular AROs, in selected edge caching locations to improve the overall user experience during different mobility events. To achieve that, a joint optimization problem considering mobility, service decomposition, and the balance between service delay and the preference of view streams and embedded AROs is proposed. To tackle the curse of dimensionality of the optimization problem, a nominal long short-term memory (LSTM) neural network is proposed, which is trained offline with optimal solutions and provides high-quality real-time decision making within a gap between 5.6% and 9.8% during inference. Evidence from a wide set of numerical investigations shows that the proposed set of schemes owns around 15% to 38% gains in delay and hence substantially outperforms nominal schemes, which are oblivious to user mobility and the inherent multi-modality and potential decomposition of the MAR services. Full article
Show Figures

Figure 1

28 pages, 8024 KiB  
Review
On End-to-End Intelligent Automation of 6G Networks
by Abdallah Moubayed, Abdallah Shami and Anwer Al-Dulaimi
Future Internet 2022, 14(6), 165; https://doi.org/10.3390/fi14060165 - 29 May 2022
Cited by 12 | Viewed by 5431
Abstract
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital [...] Read more.
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital transformation and enable growth and sustainability by offering the means to interact and control the digital and virtual worlds that are decoupled from their physical location. One of the main challenges facing 6G networks is “end-to-end network automation”. This is because such networks have to deal with more complex infrastructure and a diverse set of heterogeneous services and fragmented use cases. Accordingly, this paper aims at envisioning the role of different enabling technologies towards end-to-end intelligent automated 6G networks. To this end, this paper first reviews the literature focusing on the orchestration and automation of next-generation networks by discussing in detail the challenges facing efficient and fully automated 6G networks. This includes automating both the operational and functional elements for 6G networks. Additionally, this paper defines some of the key technologies that will play a vital role in addressing the research gaps and tackling the aforementioned challenges. More specifically, it outlines how advanced data-driven paradigms such as reinforcement learning and federated learning can be incorporated into 6G networks for more dynamic, efficient, effective, and intelligent network automation and orchestration. Full article
(This article belongs to the Special Issue Internet of Things and Cyber-Physical Systems)
Show Figures

Graphical abstract

20 pages, 566 KiB  
Article
The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers
by Samer Khamaiseh, Abdullah Al-Alaj, Mohammad Adnan and Hakam W. Alomari
Future Internet 2022, 14(6), 164; https://doi.org/10.3390/fi14060164 - 27 May 2022
Cited by 6 | Viewed by 2327
Abstract
The design of existing machine-learning-based DoS detection systems in software-defined networking (SDN) suffers from two major problems. First, the proper time window for conducting network traffic analysis is unknown and has proven challenging to determine. Second, it is unable to detect unknown types [...] Read more.
The design of existing machine-learning-based DoS detection systems in software-defined networking (SDN) suffers from two major problems. First, the proper time window for conducting network traffic analysis is unknown and has proven challenging to determine. Second, it is unable to detect unknown types of DoS saturation attacks. An unknown saturation attack is an attack that is not represented in the training data. In this paper, we evaluate three supervised classifiers for detecting a family of DDoS flooding attacks (UDP, TCP-SYN, IP-Spoofing, TCP-SARFU, and ICMP) and their combinations using different time windows. This work represents an extension of the runner-up best-paper award entitled ‘Detecting Saturation Attacks in SDN via Machine Learning’ published in the 2019 4th International Conference on Computing, Communications and Security (ICCCS). The results in this paper show that the trained supervised models fail in detecting unknown saturation attacks, and their overall detection performance decreases when the time window of the network traffic increases. Moreover, we investigate the performance of four semi-supervised classifiers in detecting unknown flooding attacks. The results indicate that semi-supervised classifiers outperform the supervised classifiers in the detection of unknown flooding attacks. Furthermore, to further increase the possibility of detecting the known and unknown flooding attacks, we propose an enhanced hybrid approach that combines two supervised and semi-supervised classifiers. The results demonstrate that the hybrid approach has outperformed individually supervised or semi-supervised classifiers in detecting the known and unknown flooding DoS attacks in SDN. Full article
(This article belongs to the Special Issue Software Defined Networking and Cyber Security)
Show Figures

Figure 1

19 pages, 770 KiB  
Article
Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution
by Andreia Araújo, Filipe Portela, Filipe Alvelos and Saulo Ruiz
Future Internet 2022, 14(6), 163; https://doi.org/10.3390/fi14060163 - 27 May 2022
Cited by 1 | Viewed by 2140
Abstract
In microfinance, with more loans, there is a high risk of increasing overdue loans by overloading the resources available to take actions on the repayment. So, three experiments were conducted to search for a distribution of the loans through the officers available to [...] Read more.
In microfinance, with more loans, there is a high risk of increasing overdue loans by overloading the resources available to take actions on the repayment. So, three experiments were conducted to search for a distribution of the loans through the officers available to maximize the probability of recovery. Firstly, the relation between the loan and some characteristics of the officers was analyzed. The results were not that strong with F1 scores between 0 and 0.74, with a lot of variation in the scores of the good predictions. Secondly, the loan is classified as paid/unpaid based on what prediction could result of the analysis of the characteristics of the loan. The Support Vector Machine had potential to be a solution with a F1 score average of 0.625; however, when predicting the unpaid loans, it showed to be random with a score of 0.55. Finally, the experiment focused on segmentation of the overdue loans in different groups, from where it would be possible to know their prioritization. The visualization of three clusters in the data was clear through Principal Component Analysis. To reinforce this good visualization, the final silhouette score was 0.194, which reflects that is a model that can be trusted. This way, an implementation of clustering loans into three groups, and a respective prioritization scale would be the best strategy to organize and assign the loans to maximize recovery. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

15 pages, 1359 KiB  
Article
What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research
by Horst Treiblmaier
Future Internet 2022, 14(6), 162; https://doi.org/10.3390/fi14060162 - 26 May 2022
Cited by 6 | Viewed by 3191
Abstract
The disruptive impact of blockchain technologies can be felt across numerous industries as it threatens to disrupt existing business models and economic structures. To better understand this impact, academic researchers regularly apply well-established theories and methods. The vast majority of these approaches are [...] Read more.
The disruptive impact of blockchain technologies can be felt across numerous industries as it threatens to disrupt existing business models and economic structures. To better understand this impact, academic researchers regularly apply well-established theories and methods. The vast majority of these approaches are based on multivariate methods that rely on average behavior and treat extreme cases as outliers. However, as recent history has shown, current developments in blockchain and cryptocurrencies are frequently characterized by aberrant behavior and unexpected events that shape individuals’ perceptions, market behavior, and public policymaking. In this paper, I apply various scenario tools to identify such extreme scenarios and illustrate their underlying structure as bundles of interdependent factors. Using the case of Bitcoin, I illustrate that the identification of extreme positive and negative scenarios is complex and heavily depends on underlying economic assumptions. I present three scenarios in which Bitcoin is characterized as a financial savior, as a severe threat to economic stability, or as a substitute to overcome several shortcomings of the existing financial system. The research questions that can be derived from these scenarios bridge behavioral and design science research and provide a fertile ground for impactful future research. Full article
Show Figures

Graphical abstract

32 pages, 2434 KiB  
Review
Charting Past, Present, and Future Research in the Semantic Web and Interoperability
by Abderahman Rejeb, John G. Keogh, Wayne Martindale, Damion Dooley, Edward Smart, Steven Simske, Samuel Fosso Wamba, John G. Breslin, Kosala Yapa Bandara, Subhasis Thakur, Kelly Liu, Bridgette Crowley, Sowmya Desaraju, Angela Ospina and Horia Bradau
Future Internet 2022, 14(6), 161; https://doi.org/10.3390/fi14060161 - 25 May 2022
Cited by 9 | Viewed by 7848
Abstract
Huge advances in peer-to-peer systems and attempts to develop the semantic web have revealed a critical issue in information systems across multiple domains: the absence of semantic interoperability. Today, businesses operating in a digital environment require increased supply-chain automation, interoperability, and data governance. [...] Read more.
Huge advances in peer-to-peer systems and attempts to develop the semantic web have revealed a critical issue in information systems across multiple domains: the absence of semantic interoperability. Today, businesses operating in a digital environment require increased supply-chain automation, interoperability, and data governance. While research on the semantic web and interoperability has recently received much attention, a dearth of studies investigates the relationship between these two concepts in depth. To address this knowledge gap, the objective of this study is to conduct a review and bibliometric analysis of 3511 Scopus-registered papers on the semantic web and interoperability published over the past two decades. In addition, the publications were analyzed using a variety of bibliometric indicators, such as publication year, journal, authors, countries, and institutions. Keyword co-occurrence and co-citation networks were utilized to identify the primary research hotspots and group the relevant literature. The findings of the review and bibliometric analysis indicate the dominance of conference papers as a means of disseminating knowledge and the substantial contribution of developed nations to the semantic web field. In addition, the keyword co-occurrence network analysis reveals a significant emphasis on semantic web languages, sensors and computing, graphs and models, and linking and integration techniques. Based on the co-citation clustering, the Internet of Things, semantic web services, ontology mapping, building information modeling, bioinformatics, education and e-learning, and semantic web languages were identified as the primary themes contributing to the flow of knowledge and the growth of the semantic web and interoperability field. Overall, this review substantially contributes to the literature and increases scholars’ and practitioners’ awareness of the current knowledge composition and future research directions of the semantic web field. Full article
(This article belongs to the Special Issue Information Retrieval on the Semantic Web)
Show Figures

Graphical abstract

19 pages, 891 KiB  
Article
Quantum Key Distribution in Kubernetes Clusters
by Ignazio Pedone and Antonio Lioy
Future Internet 2022, 14(6), 160; https://doi.org/10.3390/fi14060160 - 25 May 2022
Cited by 2 | Viewed by 3718
Abstract
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for QKD in several domains such as Cloud Computing and [...] Read more.
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for QKD in several domains such as Cloud Computing and NFV. This paper extends a previous work whose main objective was to propose a new software stack, the Quantum Software Stack (QSS), to integrate QKD into software-defined infrastructures. The contribution of this paper is twofold: enhancing the previous work adding functionalities to the first version of the QSS, and presenting a practical integration of the QSS in Kubernetes, which is the de-facto standard for container orchestration. Full article
(This article belongs to the Special Issue Software Defined Networking and Cyber Security)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop