[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Issue
Volume 12, October
Previous Issue
Volume 12, August
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Future Internet, Volume 12, Issue 9 (September 2020) – 20 articles

Cover Story (view full-size image): Information and communication technologies are transforming modern education into more available learning matrix. One of the unexplored aspects of open education is the constant communicative interaction within the student group through use of social media. Netnography is the main research method defining the essence and characteristics of this student-led peer communication. Elaborated visual model can serve as a simple tool for diagnosing group communication processes. We revealed that online group chats perform a support function in learning. They provide a constant informational resource for educational and organizational issues and create emotional comfort. Identified features serve to define shortcomings (e.g., lack of students’ readiness to freely exchange answers to assignments) and significant factors that exist in the modern system of higher education. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
15 pages, 1553 KiB  
Article
Expectations and limitations of Cyber-Physical Systems (CPS) for Advanced Manufacturing: A View from the Grinding Industry
by Iñigo Pombo, Leire Godino, Jose Antonio Sánchez and Rafael Lizarralde
Future Internet 2020, 12(9), 159; https://doi.org/10.3390/fi12090159 - 22 Sep 2020
Cited by 16 | Viewed by 3438
Abstract
Grinding is a critical technology in the manufacturing of high added-value precision parts, accounting for approximately 20–25% of all machining costs in the industrialized world. It is a commonly used process in the finishing of parts in numerous key industrial sectors such as [...] Read more.
Grinding is a critical technology in the manufacturing of high added-value precision parts, accounting for approximately 20–25% of all machining costs in the industrialized world. It is a commonly used process in the finishing of parts in numerous key industrial sectors such as transport (including the aeronautical, automotive and railway industries), and energy or biomedical industries. As in the case of many other manufacturing technologies, grinding relies heavily on the experience and knowledge of the operatives. For this reason, considerable efforts have been devoted to generating a systematic and sustainable approach that reduces and eventually eliminates costly trial-and-error strategies. The main contribution of this work is that, for the first time, a complete digital twin (DT) for the grinding industry is presented. The required flow of information between numerical simulations, advanced mechanical testing and industrial practice has been defined, thus producing a virtual mirror of the real process. The structure of the DT comprises four layers, which integrate: (1) scientific knowledge of the process (advanced process modeling and numerical simulation); (2) characterization of materials through specialized mechanical testing; (3) advanced sensing techniques, to provide feedback for process models; and (4) knowledge integration in a configurable open-source industrial tool. To this end, intensive collaboration between all the involved agents (from university to industry) is essential. One of the most remarkable results is the development of new and more realistic models for predicting wheel wear, which currently can only be known in industry through costly trial-and-error strategies. Also, current work is focused on the development of an intelligent grinding wheel, which will provide on-line information about process variables such as temperature and forces. This is a critical issue in the advance towards a zero-defect grinding process. Full article
Show Figures

Figure 1

Figure 1
<p>Structure and interaction between layers in the digital twin (DT) for the grinding industry.</p>
Full article ">Figure 2
<p>The discrete element method DEM model of a high-performance alumina grinding wheel.</p>
Full article ">Figure 3
<p>A disk specimen configuration used for (<b>a</b>) conventional Brazilian tests and (<b>b</b>) modified Brazilian tests.</p>
Full article ">Figure 4
<p>Layer 4: The Grinding Research Assisting Tool (GREAT).</p>
Full article ">
20 pages, 893 KiB  
Article
On Frequency Estimation and Detection of Heavy Hitters in Data Streams
by Federica Ventruto, Marco Pulimeno, Massimo Cafaro and Italo Epicoco
Future Internet 2020, 12(9), 158; https://doi.org/10.3390/fi12090158 - 18 Sep 2020
Cited by 5 | Viewed by 2742
Abstract
A stream can be thought of as a very large set of data, sometimes even infinite, which arrives sequentially and must be processed without the possibility of being stored. In fact, the memory available to the algorithm is limited and it is not [...] Read more.
A stream can be thought of as a very large set of data, sometimes even infinite, which arrives sequentially and must be processed without the possibility of being stored. In fact, the memory available to the algorithm is limited and it is not possible to store the whole stream of data which is instead scanned upon arrival and summarized through a succinct data structure in order to maintain only the information of interest. Two of the main tasks related to data stream processing are frequency estimation and heavy hitter detection. The frequency estimation problem requires estimating the frequency of each item, that is the number of times or the weight with which each appears in the stream, while heavy hitter detection means the detection of all those items with a frequency higher than a fixed threshold. In this work we design and analyze ACMSS, an algorithm for frequency estimation and heavy hitter detection, and compare it against the state of the art ASketch algorithm. We show that, given the same budgeted amount of memory, for the task of frequency estimation our algorithm outperforms ASketch with regard to accuracy. Furthermore, we show that, under the assumptions stated by its authors, ASketch may not be able to report all of the heavy hitters whilst ACMSS will provide with high probability the full list of heavy hitters. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

Figure 1
<p>Efficiency of the algorithms: Stream processing throughput.</p>
Full article ">Figure 2
<p>Accuracy of the algorithms: Average Absolute Error.</p>
Full article ">Figure 3
<p>Accuracy of the algorithms: Average Relative Error.</p>
Full article ">Figure 4
<p>Accuracy of the algorithms: Recall.</p>
Full article ">Figure 5
<p>Accuracy of the algorithms: Precision.</p>
Full article ">
21 pages, 824 KiB  
Review
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
by In Lee
Future Internet 2020, 12(9), 157; https://doi.org/10.3390/fi12090157 - 18 Sep 2020
Cited by 152 | Viewed by 38598
Abstract
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and [...] Read more.
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept. Full article
(This article belongs to the Special Issue Frontiers in Cyber Security)
Show Figures

Figure 1

Figure 1
<p>Internet of Things (IoT) cyber risk management framework.</p>
Full article ">Figure 2
<p>Example risk matrix.</p>
Full article ">Figure 3
<p>IoT cybersecurity cost–benefit analysis.</p>
Full article ">
16 pages, 1022 KiB  
Article
A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages
by Abdallah Ghourabi, Mahmood A. Mahmood and Qusay M. Alzubi
Future Internet 2020, 12(9), 156; https://doi.org/10.3390/fi12090156 - 18 Sep 2020
Cited by 87 | Viewed by 11079
Abstract
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This is because 82% of SMSs are read within [...] Read more.
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This is because 82% of SMSs are read within 5 min., but consumers only open one in four e-mails they receive. The importance of SMS for mobile phone users has attracted the attention of spammers. In fact, the volume of SMS spam has increased considerably in recent years with the emergence of new security threats, such as SMiShing. In this paper, we propose a hybrid deep learning model for detecting SMS spam messages. This detection model is based on the combination of two deep learning methods CNN and LSTM. It is intended to deal with mixed text messages that are written in Arabic or English. For the comparative evaluation, we also tested other well-known machine learning algorithms. The experimental results that we present in this paper show that our CNN-LSTM model outperforms the other algorithms. It achieved a very good accuracy of 98.37%. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Architecture of the spam detection model.</p>
Full article ">Figure 2
<p>Word embedding process.</p>
Full article ">Figure 3
<p>Architecture of the CNN-LSTM model.</p>
Full article ">Figure 4
<p>An example of an Arabic spam message.</p>
Full article ">Figure 5
<p>Parameters of CNN architecture.</p>
Full article ">Figure 6
<p>Parameters of LSTM architecture.</p>
Full article ">Figure 7
<p>Parameters of CNN-LSTM architecture.</p>
Full article ">Figure 8
<p>Comparison of the proposed CNN-LSTM model with other classifiers.</p>
Full article ">Figure 9
<p>Confusion Matrix of CNN-LSTM model.</p>
Full article ">Figure 10
<p>ROC curve of CNN-LSTM model.</p>
Full article ">
18 pages, 3081 KiB  
Article
Improving Human Activity Monitoring by Imputation of Missing Sensory Data: Experimental Study
by Ivan Miguel Pires, Faisal Hussain, Nuno M. Garcia and Eftim Zdravevski
Future Internet 2020, 12(9), 155; https://doi.org/10.3390/fi12090155 - 17 Sep 2020
Cited by 22 | Viewed by 2940
Abstract
The automatic recognition of human activities with sensors available in off-the-shelf mobile devices has been the subject of different research studies in recent years. It may be useful for the monitoring of elderly people to present warning situations, monitoring the activity of sports [...] Read more.
The automatic recognition of human activities with sensors available in off-the-shelf mobile devices has been the subject of different research studies in recent years. It may be useful for the monitoring of elderly people to present warning situations, monitoring the activity of sports people, and other possibilities. However, the acquisition of the data from different sensors may fail for different reasons, and the human activities are recognized with better accuracy if the different datasets are fulfilled. This paper focused on two stages of a system for the recognition of human activities: data imputation and data classification. Regarding the data imputation, a methodology for extrapolating the missing samples of a dataset to better recognize the human activities was proposed. The K-Nearest Neighbors (KNN) imputation technique was used to extrapolate the missing samples in dataset captures. Regarding the data classification, the accuracy of the previously implemented method, i.e., Deep Neural Networks (DNN) with normalized and non-normalized data, was improved in relation to the previous results without data imputation. Full article
(This article belongs to the Special Issue Deep Neural Networks on Reconfigurable Embedded Systems)
Show Figures

Figure 1

Figure 1
<p>Workflow of the proposed methodology.</p>
Full article ">Figure 2
<p>Workflow of the data imputation scheme.</p>
Full article ">Figure 3
<p>Accelerometer sample related to moving downstairs.</p>
Full article ">Figure 4
<p>Imputed data for the accelerometer sample related to moving downstairs.</p>
Full article ">Figure 5
<p>Performance of deep learning model when utilizing only accelerometer data to classify the human daily living activities across four data normalization and data imputation scenarios.</p>
Full article ">Figure 6
<p>Performance of deep learning model when utilizing accelerometer and magnetometer data to classify the human daily living activities across four data normalization and data imputation scenarios.</p>
Full article ">Figure 7
<p>Performance of deep learning model when utilizing accelerometer, magnetometer, and gyroscope data to classify the human daily living activities across four data normalization and data imputation scenarios.</p>
Full article ">
20 pages, 2015 KiB  
Article
An Empirical Recommendation Framework to Support Location-Based Services
by Animesh Chandra Roy, Mohammad Shamsul Arefin, A. S. M. Kayes, Mohammad Hammoudeh and Khandakar Ahmed
Future Internet 2020, 12(9), 154; https://doi.org/10.3390/fi12090154 - 17 Sep 2020
Cited by 3 | Viewed by 3800
Abstract
The rapid growth of Global Positioning System (GPS) and availability of real-time Geo-located data allow the mobile devices to provide information which leads towards the Location Based Services (LBS). The need for providing suggestions to personals about the activities of their interests, the [...] Read more.
The rapid growth of Global Positioning System (GPS) and availability of real-time Geo-located data allow the mobile devices to provide information which leads towards the Location Based Services (LBS). The need for providing suggestions to personals about the activities of their interests, the LBS contributing more effectively to this purpose. Recommendation system (RS) is one of the most effective and efficient features that has been initiated by the LBS. Our proposed system is intended to design a recommendation system that will provide suggestions to the user and also find a suitable place for a group of users and it is according to their preferred type of places. In our work, we propose the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm for clustering the check-in spots of the user’s and user-based Collaborative Filtering (CF) to find similar users as we are considering constructing an interest profile for each user. We also introduced a grid-based structure to present the Point of Interest (POI) into a map. Finally, similarity calculation is done to make the recommendations. We evaluated our system on real world users and acquired the F-measure score on average 0.962 and 0.964 for a single user and for a group of user respectively. We also observed that our system provides effective recommendations for a single user as well as for a group of users. Full article
(This article belongs to the Special Issue Sustainable Smart City)
Show Figures

Figure 1

Figure 1
<p>User check-in spots.</p>
Full article ">Figure 2
<p>System Architecture.</p>
Full article ">Figure 3
<p>Categorization Using DBSACN.</p>
Full article ">Figure 4
<p>POIs into a Grid Map.</p>
Full article ">Figure 5
<p>Recommendation for a Single User.</p>
Full article ">Figure 6
<p>Recommendations for a Group of User.</p>
Full article ">Figure 7
<p>Comparison between Cosine and Pearson similarity.</p>
Full article ">Figure 8
<p>Performance metrics for the single user.</p>
Full article ">Figure 9
<p>Performance metrics for the group of users.</p>
Full article ">
9 pages, 756 KiB  
Article
From Symptom Tracking to Contact Tracing: A Framework to Explore and Assess COVID-19 Apps
by Abinaya Megan Ramakrishnan, Aparna Nicole Ramakrishnan, Sarah Lagan and John Torous
Future Internet 2020, 12(9), 153; https://doi.org/10.3390/fi12090153 - 8 Sep 2020
Cited by 12 | Viewed by 4755
Abstract
Smartphone applications related to coronavirus disease 2019 (COVID-19) continue to emerge and evolve, but despite a wide variety of different app functions, there has yet to be a comprehensive study of what the most prevalent publicly available apps provide, and there exists no [...] Read more.
Smartphone applications related to coronavirus disease 2019 (COVID-19) continue to emerge and evolve, but despite a wide variety of different app functions, there has yet to be a comprehensive study of what the most prevalent publicly available apps provide, and there exists no standardized evaluation system for end users to determine the safety and efficacy of an app before they download it. Furthermore, limited oversight means that the rapidly growing space creates challenges for end users trying to find a relevant app. We adapted the M-Health Index and Navigation Database (MIND) from apps.digitalpsych.org that previously has been used to evaluate mental health applications to guide the assessment of COVID apps. Using this framework, we conducted a thorough analysis of the top-100 returned coronavirus apps on two separate dates a month apart to understand the clinical utility and features of COVID-19 apps and how these change in a short period of time. We ultimately identified a significant turnover rate, as well as privacy concerns around lack of privacy policies and disclosure of personal information. Our research offers insight into the current status of COVID-19 apps and provides a comprehensive and adaptable framework to help individuals assess the growing number of such digital tools in the wake of the pandemic. Full article
(This article belongs to the Special Issue Recent Advances of Machine Learning Techniques on Smartphones)
Show Figures

Figure 1

Figure 1
<p>A Framework to Assess coronavirus disease 2019 (COVID-19)-Related Apps. Five main levels of consideration, with guiding questions at each level, illustrate the various facets of evaluation.</p>
Full article ">Figure 2
<p>Categories of Top-Returned COVID-19 Apps. Screening tools were the most common type of app returned in both May and June.</p>
Full article ">Figure 3
<p>Mental Health Components of COVID-19 Apps. An increasing number of COVID-19 apps offered mental health support from May to June, most commonly through providing psychoeducational information and links to resources for care.</p>
Full article ">
16 pages, 1164 KiB  
Article
Generic Tasks for Algorithms
by Gregor Milicic, Sina Wetzel and Matthias Ludwig
Future Internet 2020, 12(9), 152; https://doi.org/10.3390/fi12090152 - 3 Sep 2020
Cited by 5 | Viewed by 3271
Abstract
Due to its links to computer science (CS), teaching computational thinking (CT) often involves the handling of algorithms in activities, such as their implementation or analysis. Although there already exists a wide variety of different tasks for various learning environments in the area [...] Read more.
Due to its links to computer science (CS), teaching computational thinking (CT) often involves the handling of algorithms in activities, such as their implementation or analysis. Although there already exists a wide variety of different tasks for various learning environments in the area of computer science, there is less material available for CT. In this article, we propose so-called Generic Tasks for algorithms inspired by common programming tasks from CS education. Generic Tasks can be seen as a family of tasks with a common underlying structure, format, and aim, and can serve as best-practice examples. They thus bring many advantages, such as facilitating the process of creating new content and supporting asynchronous teaching formats. The Generic Tasks that we propose were evaluated by 14 experts in the field of Science, Technology, Engineering, and Mathematics (STEM) education. Apart from a general estimation in regard to the meaningfulness of the proposed tasks, the experts also rated which and how strongly six core CT skills are addressed by the tasks. We conclude that, even though the experts consider the tasks to be meaningful, not all CT-related skills can be specifically addressed. It is thus important to define additional tasks for CT that are detached from algorithms and programming. Full article
(This article belongs to the Special Issue Computational Thinking)
Show Figures

Figure 1

Figure 1
<p>The basic idea for the Generic Tasks (GTs) for algorithms.</p>
Full article ">Figure 2
<p>One example for possible input.</p>
Full article ">Figure 3
<p>Agreement with the statement “Students can learn a lot when completing this task” for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>14</mn> </mrow> </semantics></math> raters aggregated for the three different algorithms, resulting in <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>42</mn> </mrow> </semantics></math> answers per GT.</p>
Full article ">Figure 4
<p>Summary of the experts’ evaluations of the GTs regarding the six core computational thinking (CT) skills [<a href="#B8-futureinternet-12-00152" class="html-bibr">8</a>] on a six-point Likert scale from 0 (not addressed at all) to 5 (very strongly addressed). The symbol × marks the arithmetic mean.</p>
Full article ">Figure A1
<p>The three original algorithms that the Generic Tasks were derived from (<b>left</b>). Plus: The sprite draws a plus sign (<b>middle</b>). Odd–Even: The sprite goes through the numbers from 1 until 20 and thinks about whether the number is odd or even (<b>right</b>). Guess a number: The user can guess a number.</p>
Full article ">Figure A2
<p>Possible result for the task “Plus”.</p>
Full article ">
10 pages, 584 KiB  
Article
Intransitiveness: From Games to Random Walks
by Alberto Baldi and Franco Bagnoli
Future Internet 2020, 12(9), 151; https://doi.org/10.3390/fi12090151 - 3 Sep 2020
Cited by 1 | Viewed by 2799
Abstract
Many games in which chance plays a role can be simulated as a random walk over a graph of possible configurations of board pieces, cards, dice or coins. The end of the game generally consists of the appearance of a predefined winning pattern; [...] Read more.
Many games in which chance plays a role can be simulated as a random walk over a graph of possible configurations of board pieces, cards, dice or coins. The end of the game generally consists of the appearance of a predefined winning pattern; for random walks, this corresponds to an absorbing trap. The strategy of a player consist of betting on a given sequence, i.e., in placing a trap on the graph. In two-players games, the competition between strategies corresponds to the capabilities of the corresponding traps in capturing the random walks originated by the aleatory components of the game. The concept of dominance transitivity of strategies implies an advantage for the first player, who can choose the strategy that, at least statistically, wins. However, in some games, the second player is statistically advantaged, so these games are denoted “intransitive”. In an intransitive game, the second player can choose a location for his/her trap which captures more random walks than that of the first one. The transitivity concept can, therefore, be extended to generic random walks and in general to Markov chains. We analyze random walks on several kinds of networks (rings, scale-free, hierarchical and city-inspired) with many variations: traps can be partially absorbing, the walkers can be biased and the initial distribution can be arbitrary. We found that the transitivity concept can be quite useful for characterizing the combined properties of a graph and that of the walkers. Full article
(This article belongs to the Special Issue Selected Papers from the INSCI2019: Internet Science 2019)
Show Figures

Figure 1

Figure 1
<p>Analysis of the Penney Game with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, fair coins and fully absorbing traps. (<b>a</b>) Transition graph, where every node is a possibly winning sequence, the links go from one sequence to the sequences which can be obtained with a coin toss. Each link weights 1/2. (<b>b</b>) Weighted adjacency matrix (Markov matrix) <math display="inline"><semantics> <mi mathvariant="bold-italic">M</mi> </semantics></math> of the system, where the sequences (indexes) are read as base-two numbers. (<b>c</b>) Victory matrix and (<b>d</b>) victory graph, where arrows mark which sequence wins with the largest probability over the given one.</p>
Full article ">Figure 2
<p>Complete analysis of the Penney Game for <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> and loaded coins.</p>
Full article ">Figure 3
<p>Victory graph for the Penney Game with <math display="inline"><semantics> <mrow> <mo>ℓ</mo> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math> and loaded coins (<math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>0.51</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 4
<p>(<b>a</b>) Intransitiveness index <math display="inline"><semantics> <mi>σ</mi> </semantics></math> vs absorbency <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> for a scale-free network with 100 nodes as a function of the absorbency parameter <math display="inline"><semantics> <mi>ε</mi> </semantics></math>. There is intransitive behaviour for intermediate values of this parameter. (<b>b</b>) The small subnet presumably responsible for the the intransitive region <math display="inline"><semantics> <mrow> <mi>σ</mi> <mo>&gt;</mo> <mn>0</mn> </mrow> </semantics></math> (<b>c</b>) Intransitiveness index <math display="inline"><semantics> <mi>σ</mi> </semantics></math> vs absorbency <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> for this subnet.</p>
Full article ">Figure 5
<p>(<b>a</b>) Example index matrix for hierarchical matrices (communities <math display="inline"><semantics> <mrow> <msub> <mi>l</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>2</mn> <mo>,</mo> <msub> <mi>l</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>6</mn> <mo>,</mo> <msub> <mi>l</mi> <mn>3</mn> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>): for an entry <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <msub> <mi>I</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> </mrow> </semantics></math>, the corresponding adjacency matrix has ones with probability <math display="inline"><semantics> <msub> <mi>p</mi> <mi>k</mi> </msub> </semantics></math>. (<b>b</b>) Average intransitiveness index <math display="inline"><semantics> <mi>σ</mi> </semantics></math> vs absorbency <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> for hierarchical communities (<math display="inline"><semantics> <mrow> <msub> <mi>l</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>l</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>l</mi> <mn>3</mn> </msub> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, average over 1000 simulations).</p>
Full article ">Figure 6
<p>(<b>a</b>) A “square” city, where streets are alternating one-way (<math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>). (<b>b</b>) Average intransitiveness index <math display="inline"><semantics> <mi>σ</mi> </semantics></math> vs absorbency <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math> for a “square” city, where <span class="html-italic">p</span> denotes the probability of having two-way streets instead of alternating one-way (city with <math display="inline"><semantics> <mrow> <mn>4</mn> <mo>×</mo> <mn>4</mn> </mrow> </semantics></math> streets, average over 1000 simulations; the results are largely independent on the city size).</p>
Full article ">Figure 7
<p>(<b>a</b>) “Square” city with periodic boundary conditions and different absorbancy (<math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>). For large enough asymmetry <span class="html-italic">p</span>, there is an intransitive region near (<math display="inline"><semantics> <mrow> <msub> <mi>ϵ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>). (<b>b</b>) Same city but with reflecting boundary conditions, here one observes an intransitive region for intermediate values of <math display="inline"><semantics> <msub> <mi>ϵ</mi> <mn>2</mn> </msub> </semantics></math>. The curve with <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> is different from other since in this case one doe not have to average over different realizations (1000) of the choice of one-way streets.</p>
Full article ">
23 pages, 4236 KiB  
Review
Integrating IP Mobility Management Protocols and MANET: A Survey
by Mohammad Al mojamed
Future Internet 2020, 12(9), 150; https://doi.org/10.3390/fi12090150 - 3 Sep 2020
Cited by 4 | Viewed by 3442
Abstract
The Mobile ad hoc Network (MANET) is a collection of mobile devices that forms a self-created, self-administered, and self-organized network. It is an infrastructureless network that does not require an existing infrastructure to operate. MANET suits scenarios where a temporary network is needed, [...] Read more.
The Mobile ad hoc Network (MANET) is a collection of mobile devices that forms a self-created, self-administered, and self-organized network. It is an infrastructureless network that does not require an existing infrastructure to operate. MANET suits scenarios where a temporary network is needed, such as emergency rescue, the military field, and disaster areas. MANET is an isolated network, and communication is restricted to the participating nodes’ transmission coverage. In order to increase its connectivity and its application scope, however, MANET requires integration with other networks, forming a hybrid MANET. The integration of MANET and IP networks raises many challenges and issues. Mobility management is one of the main challenges. Traditional mobility management protocols provide seamless mobility in a single hop infrastructure network. Consequently, mobile nodes can maintain their global connectivity without interrupting the ongoing sessions. Mobility management becomes more challenging in a network that relies on multi-hop communication, such as MANET. This paper presents a survey of the use of mobility management systems when integrating MANET with the internet, with the objective of serving as a handy reference in this field of research. It presents, analyzes, and discusses existing mobility management solutions for integrated MANET networks. It also investigates their shortcomings and provides a comparative study of the surveyed proposals. Full article
(This article belongs to the Section Smart System Infrastructure and Applications)
Show Figures

Figure 1

Figure 1
<p>Micro versus macro mobility.</p>
Full article ">Figure 2
<p>Mobile IPv4.</p>
Full article ">Figure 3
<p>Route optimization in Mobile IPv6.</p>
Full article ">Figure 4
<p>Hierarchical Mobile Internet Protocol (MIP).</p>
Full article ">Figure 5
<p>Cellular IP Architecture.</p>
Full article ">Figure 6
<p>Handoff-Aware Wireless Access Internet Infrastructure (HAWAII) hierarchy based on domains.</p>
Full article ">Figure 7
<p>Taxonomy of Mobile ad hoc Network (MANET) routing protocols.</p>
Full article ">Figure 8
<p>An efficient integrated routing for interconnecting mobile MANET and the internet.</p>
Full article ">Figure 9
<p>Integrating DSR-based mobile ad hoc networks with the internet [<a href="#B41-futureinternet-12-00150" class="html-bibr">41</a>].</p>
Full article ">Figure 10
<p>An OLSR-IP access network interconnected to a Mobile-IP [<a href="#B43-futureinternet-12-00150" class="html-bibr">43</a>].</p>
Full article ">Figure 11
<p>Robust and flexible internet connectivity for mobile ad hoc networks [<a href="#B50-futureinternet-12-00150" class="html-bibr">50</a>].</p>
Full article ">Figure 12
<p>Integrating mobile IP with ad hoc networks [<a href="#B55-futureinternet-12-00150" class="html-bibr">55</a>].</p>
Full article ">
15 pages, 651 KiB  
Article
Design and Validation of a Questionnaire to Measure Future Spanish Teachers’ Perceptions of Cinema in Pre-School and Primary Education: Towards Active and Technological Learning
by Alejandro Lorenzo-Lledó
Future Internet 2020, 12(9), 149; https://doi.org/10.3390/fi12090149 - 3 Sep 2020
Cited by 2 | Viewed by 3156
Abstract
State of the art: Cinema, because of the eclectic nature of art, technology and mass media, can be manifested as an educational tool in the classroom. In this sense, the educational possibilities detected in the cinema are numerous. The pre-service teacher education in [...] Read more.
State of the art: Cinema, because of the eclectic nature of art, technology and mass media, can be manifested as an educational tool in the classroom. In this sense, the educational possibilities detected in the cinema are numerous. The pre-service teacher education in the figure of the teacher determines their educational resources. Purpose: The general objective of this study is to design and validate an instrument to measure the perceptions of students of Pre-School Teacher Degree and Primary Teacher Degree in Spanish universities about cinema as a teaching resource in Pre-School and Primary Education. Design/methodology: For this purpose, a systematic and planned process was developed for the design and validation of the Percepciones sobre las potencialidades del cine como recurso didáctico en las aulas de Infantil y Primaria ((PECID) (perceptions about the potentialities of cinema as a didactic resource in pre-school and primary classrooms)) questionnaire. Main findings: The results obtained showed a good content validity of 25 items after an expert judgement. On the other hand, a reliability of the internal consistency of the instrument of 0.978 was obtained. Furthermore, a three-factor structure was confirmed through factor analysis. Conclusions: It is concluded that the PECID questionnaire is a valid and reliable instrument to measure the perceptions of future teachers in Spain about using cinema as a resource for future teaching. Full article
(This article belongs to the Section Techno-Social Smart Systems)
Show Figures

Figure 1

Figure 1
<p>Factor distribution diagram in confirmatory factor analysis.</p>
Full article ">
12 pages, 350 KiB  
Review
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation
by Max Ismailov, Michail Tsikerdekis and Sherali Zeadally
Future Internet 2020, 12(9), 148; https://doi.org/10.3390/fi12090148 - 31 Aug 2020
Cited by 7 | Viewed by 4700
Abstract
Identity deception in online social networks is a pervasive problem. Ongoing research is developing methods for identity deception detection. However, the real-world efficacy of these methods is currently unknown because they have been evaluated largely through laboratory experiments. We present a review of [...] Read more.
Identity deception in online social networks is a pervasive problem. Ongoing research is developing methods for identity deception detection. However, the real-world efficacy of these methods is currently unknown because they have been evaluated largely through laboratory experiments. We present a review of representative state-of-the-art results on identity deception detection. Based on this analysis, we identify common methodological weaknesses for these approaches, and we propose recommendations that can increase their effectiveness for when they are applied in real-world environments. Full article
(This article belongs to the Special Issue Security and Privacy in Social Networks and Solutions)
Show Figures

Figure 1

Figure 1
<p>Typical identity deception detection experimental workflow. Data are selected from public sources or are simulated. Features are selected based on social and/or user behavior data. A model is constructed based on a machine learning algorithm, and it is further evaluated using metrics such as the f-score.</p>
Full article ">
30 pages, 1593 KiB  
Review
Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey
by Babangida Isyaku, Mohd Soperi Mohd Zahid, Maznah Bte Kamat, Kamalrulnizam Abu Bakar and Fuad A. Ghaleb
Future Internet 2020, 12(9), 147; https://doi.org/10.3390/fi12090147 - 31 Aug 2020
Cited by 79 | Viewed by 9725
Abstract
Software defined networking (SDN) is an emerging network paradigm that decouples the control plane from the data plane. The data plane is composed of forwarding elements called switches and the control plane is composed of controllers. SDN is gaining popularity from industry and [...] Read more.
Software defined networking (SDN) is an emerging network paradigm that decouples the control plane from the data plane. The data plane is composed of forwarding elements called switches and the control plane is composed of controllers. SDN is gaining popularity from industry and academics due to its advantages such as centralized, flexible, and programmable network management. The increasing number of traffics due to the proliferation of the Internet of Thing (IoT) devices may result in two problems: (1) increased processing load of the controller, and (2) insufficient space in the switches’ flow table to accommodate the flow entries. These problems may cause undesired network behavior and unstable network performance, especially in large-scale networks. Many solutions have been proposed to improve the management of the flow table, reducing controller processing load, and mitigating security threats and vulnerabilities on the controllers and switches. This paper provides comprehensive surveys of existing schemes to ensure SDN meets the quality of service (QoS) demands of various applications and cloud services. Finally, potential future research directions are identified and discussed such as management of flow table using machine learning. Full article
(This article belongs to the Special Issue Future Networks: Latest Trends and Developments)
Show Figures

Figure 1

Figure 1
<p>Software defined networking architecture.</p>
Full article ">Figure 2
<p>Single vs. multiple flow table. (<b>A</b>) Single Flow Table and (<b>B</b>) Multiple Flow Table respectively.</p>
Full article ">Figure 3
<p>Example of reactive entry installation.</p>
Full article ">Figure 4
<p>Example of proactive entry installation.</p>
Full article ">Figure 5
<p>Taxonomy of software defined networking (SDN) performance Challenges.</p>
Full article ">Figure 6
<p>Example of TCAM Rule Update Operation.</p>
Full article ">Figure 7
<p>Taxonomy of flow entries management.</p>
Full article ">Figure 8
<p>Example of traffic flow with variability of inter arrival time.</p>
Full article ">
22 pages, 295 KiB  
Article
Social Media, Quo Vadis? Prospective Development and Implications
by Laura Studen and Victor Tiberius
Future Internet 2020, 12(9), 146; https://doi.org/10.3390/fi12090146 - 28 Aug 2020
Cited by 30 | Viewed by 7440
Abstract
Over the past two decades, social media have become a crucial and omnipresent cultural and economic phenomenon, which has seen platforms come and go and advance technologically. In this study, we explore the further development of social media regarding interactive technologies, platform development, [...] Read more.
Over the past two decades, social media have become a crucial and omnipresent cultural and economic phenomenon, which has seen platforms come and go and advance technologically. In this study, we explore the further development of social media regarding interactive technologies, platform development, relationships to news media, the activities of institutional and organizational users, and effects of social media on the individual and the society over the next five to ten years by conducting an international, two-stage Delphi study. Our results show that enhanced interaction on platforms, including virtual and augmented reality, somatosensory sense, and touch- and movement-based navigation are expected. AIs will interact with other social media users. Inactive user profiles will outnumber active ones. Platform providers will diversify into the WWW, e-commerce, edu-tech, fintechs, the automobile industry, and HR. They will change to a freemium business model and put more effort into combating cybercrime. Social media will become the predominant news distributor, but fake news will still be problematic. Firms will spend greater amounts of their budgets on social media advertising, and schools, politicians, and the medical sector will increase their social media engagement. Social media use will increasingly lead to individuals’ psychic issues. Society will benefit from economic growth and new jobs, increased political interest, democratic progress, and education due to social media. However, censorship and the energy consumption of platform operators might rise. Full article
27 pages, 813 KiB  
Article
CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews
by Franklin Tchakounté, Athanase Esdras Yera Pagor, Jean Claude Kamgang and Marcellin Atemkeng
Future Internet 2020, 12(9), 145; https://doi.org/10.3390/fi12090145 - 27 Aug 2020
Cited by 6 | Viewed by 3087
Abstract
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely [...] Read more.
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely on application features and application execution threads. Google provides additional elements to enable consumers to collectively evaluate applications providing their experiences via reviews or showing their satisfaction through rating. The latter is more informal and hides details of rating whereas the former is textually expressive but requires further processing to understand opinions behind it. Literature lacks approaches which mine reviews through sentiment analysis to extract useful information to improve the security aspects of provided applications. This work goes in this direction and in a fine-grained way, investigates in terms of confidentiality, integrity, availability, and authentication (CIAA). While assuming that reviews are reliable and not fake, the proposed approach determines review polarities based on CIAA-related keywords. We rely on the popular classifier Naive Bayes to classify reviews into positive, negative, and neutral sentiment. We then provide an aggregation model to fusion different polarities to obtain application global and CIAA reputations. Quantitative experiments have been conducted on 13 applications including e-banking, live messaging and anti-malware apps with a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results show that 23% of applications (03 apps) have a reputation greater than 0.5 with an accent on integrity, authentication, and availability, while the remaining 77% has a polarity under 0.5. Developers should make a lot of effort in security while developing codes and that more efforts should be made to improve confidentiality reputation. Results also show that applications with good functionality-related reputation generally offer a bad security-related reputation. This situation means that even if the number of security reviews is low, it does not mean that the security aspect is not a consumer preoccupation. Unlike, developers put much more time to test whether applications work without errors even if they include possible security vulnerabilities. A quantitative comparison against well-known rating systems reveals the effectiveness and robustness of CIAA-RepDroid to repute apps in terms of security. CIAA-RepDroid can be associated with existing rating solutions to recommend developers exact CIAA aspects to improve within source codes. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Excerpt of critical words of the Instagram application.</p>
Full article ">Figure 3
<p>Result of the analysis of a review.</p>
Full article ">Figure 4
<p>Reputation-based security vs. reputation-based functionality.</p>
Full article ">
17 pages, 411 KiB  
Article
Topic Detection Based on Sentence Embeddings and Agglomerative Clustering with Markov Moment
by Svetlana S. Bodrunova, Andrey V. Orekhov, Ivan S. Blekanov, Nikolay S. Lyudkevich and Nikita A. Tarasov
Future Internet 2020, 12(9), 144; https://doi.org/10.3390/fi12090144 - 26 Aug 2020
Cited by 18 | Viewed by 4658
Abstract
The paper is dedicated to solving the problem of optimal text classification in the area of automated detection of typology of texts. In conventional approaches to topicality-based text classification (including topic modeling), the number of clusters is to be set up by the [...] Read more.
The paper is dedicated to solving the problem of optimal text classification in the area of automated detection of typology of texts. In conventional approaches to topicality-based text classification (including topic modeling), the number of clusters is to be set up by the scholar, and the optimal number of clusters, as well as the quality of the model that designates proximity of texts to each other, remain unresolved questions. We propose a novel approach to the automated definition of the optimal number of clusters that also incorporates an assessment of word proximity of texts, combined with text encoding model that is based on the system of sentence embeddings. Our approach combines Universal Sentence Encoder (USE) data pre-processing, agglomerative hierarchical clustering by Ward’s method, and the Markov stopping moment for optimal clustering. The preferred number of clusters is determined based on the “e-2” hypothesis. We set up an experiment on two datasets of real-world labeled data: News20 and BBC. The proposed model is tested against more traditional text representation methods, like bag-of-words and word2vec, to show that it provides a much better-resulting quality than the baseline DBSCAN and OPTICS models with different encoding methods. We use three quality metrics to demonstrate that clustering quality does not drop when the number of clusters grows. Thus, we get close to the convergence of text clustering and text classification. Full article
(This article belongs to the Special Issue Selected Papers from the INSCI2019: Internet Science 2019)
Show Figures

Figure 1

Figure 1
<p>Results of the proposed approach made on datasets from scikit-learn.</p>
Full article ">
13 pages, 3927 KiB  
Article
Online Group Student Peer-Communication as an Element of Open Education
by Daria Bylieva, Zafer Bekirogullari, Dmitry Kuznetsov, Nadezhda Almazova, Victoria Lobatyuk and Anna Rubtsova
Future Internet 2020, 12(9), 143; https://doi.org/10.3390/fi12090143 - 26 Aug 2020
Cited by 25 | Viewed by 4804
Abstract
Information and communication technologies transform modern education into a more available learning matrix. One of the unexplored aspects of open education is the constant communicative interaction within the student group by using social media. The aim of the study was to determine principal [...] Read more.
Information and communication technologies transform modern education into a more available learning matrix. One of the unexplored aspects of open education is the constant communicative interaction within the student group by using social media. The aim of the study was to determine principal functions of student-led communication in the educational process, the method for assessing its strong points and the disadvantages disrupting traditional learning. For the primary study of the phenomenon, we used methods that made it possible to propose approaches to further analysis. Netnography is the main research method defining the essence and characteristics of the student-led peer-communication. In our research, we applied data visualization, analytical and quantitative methods and developed a set of quantitative indicators that can be used to assess various aspects of student communication in chats. The elaborated visual model can serve as a simple tool for diagnosing group communication processes. We revealed that online group chats perform a support function in learning. They provide constant informational resource on educational and organizational issues and create emotional comfort. Identified features serve to define shortcomings (e.g., lack of students’ readiness to freely exchange answers to assignments) and significant factors (e.g., underutilized opportunities for self-organization) that exist in the modern system of higher education. Full article
(This article belongs to the Special Issue E-Learning and Technology Enhanced Learning)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The main content of student conversations.</p>
Full article ">Figure 2
<p>Average indicators for group communication, presented as an image.</p>
Full article ">Figure 3
<p>Examples of visual representation of the features of groups with the longest (<b>a</b>) and shortest (<b>b</b>) average message size.</p>
Full article ">Figure 4
<p>The most common words in student conversations.</p>
Full article ">
18 pages, 2946 KiB  
Article
A Hybrid SWIM Data Naming Scheme Based on TLC Structure
by Zhijun Wu and Bohua Cui
Future Internet 2020, 12(9), 142; https://doi.org/10.3390/fi12090142 - 25 Aug 2020
Viewed by 2186
Abstract
Aiming at the problem of low interconnection efficiency caused by the wide variety of data in SWIM (System-Wide Information Management) and the inconsistent data naming methods, this paper proposes a new TLC (Type-Length-Content) structure hybrid data naming scheme combined with Bloom filters. This [...] Read more.
Aiming at the problem of low interconnection efficiency caused by the wide variety of data in SWIM (System-Wide Information Management) and the inconsistent data naming methods, this paper proposes a new TLC (Type-Length-Content) structure hybrid data naming scheme combined with Bloom filters. This solution can meet the uniqueness and durability requirements of SWIM data names, solve the “suffix loopholes” encountered in prefix-based route aggregation in hierarchical naming, and realize scalable and effective route state aggregation. Simulation verification results show that the hybrid naming scheme is better than prefix-based aggregation in the probability of route identification errors. In terms of search time, this scheme has increased by 17.8% and 18.2%, respectively, compared with the commonly used hierarchical and flat naming methods. Compared with the other two naming methods, scalability has increased by 19.1% and 18.4%, respectively. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

Figure 1
<p>The overall design of the naming scheme.</p>
Full article ">Figure 2
<p>Generation of aggregate object identifiers (OID).</p>
Full article ">Figure 3
<p>The format of digest type-length-content (TLC).</p>
Full article ">Figure 4
<p>Mixed naming structure combination.</p>
Full article ">Figure 5
<p>“Hierarchical component-based” hybrid naming structure.</p>
Full article ">Figure 6
<p>Example of the naming of “hierarchical-flat-attribute” based on TLC structure.</p>
Full article ">Figure 7
<p>The name-based data forwarding process in SWIM.</p>
Full article ">Figure 8
<p>Experimental test environment.</p>
Full article ">Figure 9
<p>Comparison of error resolution rate between Bloom filter and prefix aggregation.</p>
Full article ">Figure 10
<p>Comparison of query time of different layers in the mixed naming method.</p>
Full article ">Figure 11
<p>Comparison of query time for large-scale content names.</p>
Full article ">Figure 12
<p>Comparison of the average query time under different numbers of layers.</p>
Full article ">
13 pages, 4306 KiB  
Article
A Distributed Architecture for Smart Recycling Using Machine Learning
by Dimitris Ziouzios, Dimitris Tsiktsiris, Nikolaos Baras and Minas Dasygenis
Future Internet 2020, 12(9), 141; https://doi.org/10.3390/fi12090141 - 24 Aug 2020
Cited by 44 | Viewed by 6122
Abstract
Recycling is vital for a sustainable and clean environment. Developed and developing countries are both facing the problem of solid management waste and recycling issues. Waste classification is a good solution to separate the waste from the recycle materials. In this work, we [...] Read more.
Recycling is vital for a sustainable and clean environment. Developed and developing countries are both facing the problem of solid management waste and recycling issues. Waste classification is a good solution to separate the waste from the recycle materials. In this work, we propose a cloud based classification algorithm for automated machines in recycling factories using machine learning. We trained an efficient MobileNet model, able to classify five different types of waste. The inference can be performed in real-time on a cloud server. Various techniques are described and used in order to improve the classification accuracy, such as data augmentation and hyper-parameter tuning. Multiple industrial stations are supported and interconnected via custom data transmission protocols, along with security features. Experimental results indicated that our solution can achieve excellent performance with 96.57% accuracy utilizing a cloud server. Full article
(This article belongs to the Section Smart System Infrastructure and Applications)
Show Figures

Figure 1

Figure 1
<p>In the proposed system architecture, captured images are being offloaded to the cloud for the classification process.</p>
Full article ">Figure 2
<p>Illustration of TrashNet data from different classes.</p>
Full article ">Figure 3
<p>The optimal learning rate of the MobileNet-V2 model is <math display="inline"><semantics> <mrow> <mn>1.66</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math>. We are using this optimum rate for training our model.</p>
Full article ">Figure 4
<p>Confusion matrix of our model on (<b>a</b>) train and (<b>b</b>) test data. As we can see the model confused mostly samples of metal/glass and plastic/metal.</p>
Full article ">Figure 5
<p>Top losses of the trained model in terms of various evaluation metrics.</p>
Full article ">
27 pages, 2488 KiB  
Article
Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks
by Newton Masinde, Liat Khitman, Iakov Dlikman and Kalman Graffi
Future Internet 2020, 12(9), 140; https://doi.org/10.3390/fi12090140 - 20 Aug 2020
Cited by 6 | Viewed by 3076
Abstract
Peer-to-peer (P2P) networks have been under investigation for several years now, with many novel mechanisms proposed as is shown by available articles. Much of the research focused on showing how the proposed mechanism improves system performance. In addition, several applications were proposed to [...] Read more.
Peer-to-peer (P2P) networks have been under investigation for several years now, with many novel mechanisms proposed as is shown by available articles. Much of the research focused on showing how the proposed mechanism improves system performance. In addition, several applications were proposed to harness the benefits of the P2P networks. Of these applications, online social networks (OSNs) raised much interest particularly because of the scalability and privacy concerns with centralized OSNs, hence several proposals are in existence. However, accompanying studies on the overall performance of the P2P network under the weight of the OSN applications outside simulations are very few, if any. In this paper, the aim is to undertake a systematic evaluation of the performance of a P2P framework for online social networks called LibreSocial. Benchmark tests are designed, taking into account the random behavior of users, effects of churn on system stability and effect of replication factor. We manage to run benchmark tests for up to 2000 nodes and show the performance against costs of the system in general. From the results it is evident that LibreSocial’s performance is capable of meeting the needs of users. Full article
(This article belongs to the Special Issue Security and Privacy in Social Networks and Solutions)
Show Figures

Figure 1

Figure 1
<p>A P2P Social Network architecture.</p>
Full article ">Figure 2
<p>Monitoring setup.</p>
Full article ">Figure 3
<p>Screenshots of LibreSocial.</p>
Full article ">Figure 4
<p>Transition probabilities.</p>
Full article ">Figure 5
<p>Test setup.</p>
Full article ">Figure 6
<p>Analysis of plugin for 100 Nodes tests.</p>
Full article ">Figure 7
<p>Analysis of plugin for 500 Nodes tests.</p>
Full article ">Figure 8
<p>Realistic user behavior.</p>
Full article ">Figure 9
<p>Stability and scalability analysis.</p>
Full article ">Figure 10
<p>Node count analysis.</p>
Full article ">Figure 11
<p>Mean hop count analysis.</p>
Full article ">Figure 12
<p>Number of replicas analysis.</p>
Full article ">Figure 13
<p>Maximum storage time analysis.</p>
Full article ">Figure 14
<p>Maximum retrieval time analysis.</p>
Full article ">Figure 15
<p>Maximum message send rate analysis.</p>
Full article ">Figure 16
<p>Maximum message receive rate analysis.</p>
Full article ">Figure 17
<p>Maximum used space analysis.</p>
Full article ">Figure 18
<p>Maximum used memory analysis.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop