scispace - formally typeset
Search or ask a question

Showing papers in "Future Internet in 2019"


Journal ArticleDOI
TL;DR: A self-contained review of ML techniques and IoT applications in Intelligent Transportation Systems (ITS) and obtain a clear view of the trends in the aforementioned fields and spot possible coverage needs.
Abstract: With the rise of the Internet of Things (IoT), applications have become smarter and connected devices give rise to their exploitation in all aspects of a modern city. As the volume of the collected data increases, Machine Learning (ML) techniques are applied to further enhance the intelligence and the capabilities of an application. The field of smart transportation has attracted many researchers and it has been approached with both ML and IoT techniques. In this review, smart transportation is considered to be an umbrella term that covers route optimization, parking, street lights, accident prevention/detection, road anomalies, and infrastructure applications. The purpose of this paper is to make a self-contained review of ML techniques and IoT applications in Intelligent Transportation Systems (ITS) and obtain a clear view of the trends in the aforementioned fields and spot possible coverage needs. From the reviewed articles it becomes profound that there is a possible lack of ML coverage for the Smart Lighting Systems and Smart Parking applications. Additionally, route optimization, parking, and accident/detection tend to be the most popular ITS applications among researchers.

305 citations


Journal ArticleDOI
TL;DR: It is illustrated how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks.
Abstract: Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving through the value chain network. The application of the Internet of Things (IoT) can help companies to observe, track, and monitor products, activities, and processes within their respective value chain networks. Other applications of IoT include product monitoring to optimize operations in warehousing‚ manufacturing, and transportation. In combination with IoT, Blockchain technology can enable a broad range of different application scenarios to enhance value chain transparency and to increase B2B trust. When combined, IoT and Blockchain technology have the potential to increase the effectiveness and efficiency of modern supply chains. The contribution of this paper is twofold. First, we illustrate how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks. Second, we derive six research propositions outlining how Blockchain technology can impact key features of the IoT (i.e., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects.

200 citations


Journal ArticleDOI
TL;DR: This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
Abstract: The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.

200 citations


Journal ArticleDOI
TL;DR: The main aim of the review carried out in this paper is to examine and assess the most relevant systems, applications, and communication protocols that will distinguish the future road infrastructures used by vehicles.
Abstract: The transport sector is commonly subordinate to several issues, such as traffic congestion and accidents. Despite this, in recent years, it is also evolving with regard to cooperation between vehicles. The fundamental objective of this trend is to increase road safety, attempting to anticipate the circumstances of potential danger. Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Vehicle-to-Everything (V2X) technologies strive to give communication models that can be employed by vehicles in different application contexts. The resulting infrastructure is an ad-hoc mesh network whose nodes are not only vehicles but also all mobile devices equipped with wireless modules. The interaction between the multiple connected entities consists of information exchange through the adoption of suitable communication protocols. The main aim of the review carried out in this paper is to examine and assess the most relevant systems, applications, and communication protocols that will distinguish the future road infrastructures used by vehicles. The results of the investigation reveal the real benefits that technological cooperation can involve in road safety.

144 citations


Journal ArticleDOI
TL;DR: This work, with a reference to the literature and the aid of large scale simulations in realistic urban and highway scenarios, provides an insight in short range cellular-vehicle-to-anything (C-V2X) comparison, also trying to isolate the contribution of the physical and medium access control layers.
Abstract: The revolution of cooperative connected and automated vehicles is about to begin and a key milestone is the introduction of short range wireless communications between cars. Given the tremendous expected market growth, two different technologies have been standardized by international companies and consortia, namely IEEE 802.11p, out for nearly a decade, and short range cellular-vehicle-to-anything (C-V2X), of recent definition. In both cases, evolutions are under discussion. The former is only decentralized and based on a sensing before transmitting access, while the latter is based on orthogonal resources that can be also managed by an infrastructure. Although studies have been conducted to highlight advantages and drawbacks of both, doubts still remain. In this work, with a reference to the literature and the aid of large scale simulations in realistic urban and highway scenarios, we provide an insight in such a comparison, also trying to isolate the contribution of the physical and medium access control layers.

97 citations


Journal ArticleDOI
TL;DR: LoRaWAN technology, the state of art studies in the literature and open opportunities are introduced and theses will provide open opportunities.
Abstract: Internet of Things (IoT) expansion led the market to find alternative communication technologies since existing protocols are insufficient in terms of coverage, energy consumption to fit IoT needs. Low Power Wide Area Networks (LPWAN) emerged as an alternative cost-effective communication technology for the IoT market. LoRaWAN is an open LPWAN standard developed by LoRa Alliance and has key features i.e., low energy consumption, long-range communication, builtin security, GPS-free positioning. In this paper, we will introduce LoRaWAN technology, the state of art studies in the literature and provide open opportunities.

91 citations


Journal ArticleDOI
TL;DR: The model focuses on the acceptance of new technologies by older people and underscores the need for the adoption of the IoT for the AAL domain.
Abstract: The internet of things (IoT) aims to extend the internet to real-world objects, connecting smart and sensing devices into a global network infrastructure by connecting physical and virtual objects. The IoT has the potential to increase the quality of life of inhabitants and users of intelligent ambient assisted living (AAL) environments. The paper overviews and discusses the IoT technologies and their foreseen impacts and challenges for the AAL domain. The results of this review are summarized as the IoT based gerontechnology acceptance model for the assisted living domain. The model focuses on the acceptance of new technologies by older people and underscores the need for the adoption of the IoT for the AAL domain.

90 citations


Journal ArticleDOI
TL;DR: An overview of challenges posed by fog and edge computing in relation to simulation is provided and simulation frameworks used extensively in the modelling of cloud computing environments are used extensively.
Abstract: The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a deluge of connected heterogeneous end points located at the edge of networks while, at the same time, meeting quality of service levels. The complexity of computing at the edge makes it increasingly difficult for infrastructure providers to plan for and provision resources to meet this demand. While simulation frameworks are used extensively in the modelling of cloud computing environments in order to test and validate technical solutions, they are at a nascent stage of development and adoption for fog and edge computing. This paper provides an overview of challenges posed by fog and edge computing in relation to simulation.

89 citations


Journal ArticleDOI
TL;DR: This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage).
Abstract: Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.

85 citations


Journal ArticleDOI
TL;DR: The hardware architectures of typical IoT devices are presented and many of the low power techniques which make them appealing for a large scale of applications are summed up.
Abstract: In today’s world, ruled by a great amount of data and mobile devices, cloud-based systems are spreading all over. Such phenomenon increases the number of connected devices, broadcast bandwidth, and information exchange. These fine-grained interconnected systems, which enable the Internet connectivity for an extremely large number of facilities (far beyond the current number of devices) go by the name of Internet of Things (IoT). In this scenario, mobile devices have an operating time which is proportional to the battery capacity, the number of operations performed per cycle and the amount of exchanged data. Since the transmission of data to a central cloud represents a very energy-hungry operation, new computational paradigms have been implemented. The computation is not completely performed in the cloud, distributing the power load among the nodes of the system, and data are compressed to reduce the transmitted power requirements. In the edge-computing paradigm, part of the computational power is moved toward data collection sources, and, only after a first elaboration, collected data are sent to the central cloud server. Indeed, the “edge” term refers to the extremities of systems represented by IoT devices. This survey paper presents the hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications. An overview of the newest research topics is discussed, besides a final example of a complete functioning system, embedding all the introduced features.

85 citations


Journal ArticleDOI
TL;DR: A large-scale agent-based transport simulation (MATSim) is linked with a generic epidemic spread model to simulate the spread of communicable diseases in an urban environment to improve comprehension of the disease spread dynamics and to take better steps towards the prevention and control of an epidemic.
Abstract: Human mobility is a key element in the understanding of epidemic spreading. Thus, correctly modeling and quantifying human mobility is critical for studying large-scale spatial transmission of infectious diseases and improving epidemic control. In this study, a large-scale agent-based transport simulation (MATSim) is linked with a generic epidemic spread model to simulate the spread of communicable diseases in an urban environment. The use of an agent-based model allows reproduction of the real-world behavior of individuals’ daily path in an urban setting and allows the capture of interactions among them, in the form of a spatial-temporal social network. This model is used to study seasonal influenza outbreaks in the metropolitan area of Zurich, Switzerland. The observations of the agent-based models are compared with results from classical SIR models. The model presented is a prototype that can be used to analyze multiple scenarios in the case of a disease spread at an urban scale, considering variations of different model parameters settings. The results of this simulation can help to improve comprehension of the disease spread dynamics and to take better steps towards the prevention and control of an epidemic.

Journal ArticleDOI
TL;DR: It is discussed how these wireless technologies, being either standard or proprietary, can adapt to IoT scenarios (e.g., smart cities and smart agriculture) in which the heterogeneity of the involved devices is a key feature.
Abstract: The Internet of Things (IoT), being a “network of networks”, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on mesh topologies is very attractive, thanks to their scalability and reliability (in the presence of failures). In this paper, we provide a comprehensive survey of the following relevant wireless technologies: IEEE 802.11, Bluetooth, IEEE 802.15.4-oriented, and Sub-GHz-based LoRa. Our goal is to highlight how various communication technologies may be suitable for mesh networking, either providing a native support or being adapted subsequently. Hence, we discuss how these wireless technologies, being either standard or proprietary, can adapt to IoT scenarios (e.g., smart cities and smart agriculture) in which the heterogeneity of the involved devices is a key feature. Finally, we provide reference use cases involving all the analyzed mesh-oriented technologies.

Journal ArticleDOI
TL;DR: The findings show that despite state-of-the-art cyber security preparations and trained personnel, hackers are still successful in their malicious acts of stealing sensitive information that is crucial to organizations.
Abstract: The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organizations’ human capital cyber security knowledge bases are very low. In particular, the lack of social engineering awareness is a concern in the context of human cyber security risks. This study highlights pitfalls and ongoing issues that organizations encounter in the process of developing the human knowledge to protect from social engineering attacks. A detailed literature review is provided to support these arguments with analysis of contemporary approaches. The findings show that despite state-of-the-art cyber security preparations and trained personnel, hackers are still successful in their malicious acts of stealing sensitive information that is crucial to organizations. The factors influencing users’ proficiency in threat detection and mitigation have been identified as business environmental, social, political, constitutional, organizational, economical, and personal. Challenges with respect to both traditional and modern tools have been analyzed to suggest the need for profiling at-risk employees (including new hires) and developing training programs at each level of the hierarchy to ensure that the hackers do not succeed.

Journal ArticleDOI
TL;DR: A novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing infrastructure for accommodating mission critical and delay sensitive traffic.
Abstract: Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entities called Virtualized Network Functions (VNFs). NFV is often complemented with the Cloud Computing paradigm to provide networking functions to enterprise customers and end-users remote from their premises. NFV along with Cloud Computing has also started to be seen in Internet of Things (IoT) platforms as a means to provide networking functions to the IoT traffic. The intermix of IoT, NFV, and Cloud technologies, however, is still in its infancy creating a rich and open future research area. To this end, in this paper, we propose a novel approach to facilitate the placement and deployment of service chained VNFs in a network cloud infrastructure that can be extended using the Mobile Edge Computing (MEC) infrastructure for accommodating mission critical and delay sensitive traffic. Our aim is to minimize the end-to-end communication delay while keeping the overall deployment cost to minimum. Results reveal that the proposed approach can significantly reduce the delay experienced, while satisfying the Service Providers’ goal of low deployment costs.

Journal ArticleDOI
TL;DR: The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications, and shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it.
Abstract: Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.

Journal ArticleDOI
TL;DR: The results of the research show the most important actions for achieving user recruitment and loyalty with Digital Marketing from the opinions of consulted experts and the requirements for companies that wish to implement a model to optimize conversions using the current digital economy are shown.
Abstract: Currently, the digital economy contributes decisively to an increase in competitiveness, especially as a digital transformation involves migrating to new technological models where digital marketing is a key part of growth and user loyalty strategies. Internet and Digital Marketing have become important factors in campaigns, which attract and retain Internet users. This study aims to identify the main ways in which users can be gained and retained by using Digital Marketing. The Delphi method with in-depth interviews was the methodology used in this study. The results of the research show the most important actions for achieving user recruitment and loyalty with Digital Marketing from the opinions of consulted experts. The limitations of this study are those related to the number of experts included in the study, and the number of research papers consulted in the literature review. The literature review and the results of this research are used to propose new solid research with a consolidated critical methodology. This research deals with a new approach that will optimize web technologies for the evolution of user trends, and therefore, will be of academic and professional use for marketing managers and web solution developers. The conclusions of the investigation show the key factors, discarding others that do not affect the optimization of conversions in B2C businesses such as the duration of the session and the rebound percentage. Likewise, the results of the research identify the specific actions that must be carried out to attract and retain users in B2C companies that use the Digital Marketing ecosystem on the Internet. The requirements for companies that wish to implement a model to optimize conversions using the current digital economy are also shown.

Journal ArticleDOI
TL;DR: A two-stream network and multi-facial features for driver fatigue detection that can combine static and dynamic image information, while partial facial images as network inputs can focus on fatigue-related information, which brings better performance.
Abstract: Road traffic accidents caused by fatigue driving are common causes of human casualties. In this paper, we present a driver fatigue detection algorithm using two-stream network models with multi-facial features. The algorithm consists of four parts: (1) Positioning mouth and eye with multi-task cascaded convolutional neural networks (MTCNNs). (2) Extracting the static features from a partial facial image. (3) Extracting the dynamic features from a partial facial optical flow. (4) Combining both static and dynamic features using a two-stream neural network to make the classification. The main contribution of this paper is the combination of a two-stream network and multi-facial features for driver fatigue detection. Two-stream networks can combine static and dynamic image information, while partial facial images as network inputs can focus on fatigue-related information, which brings better performance. Moreover, we applied gamma correction to enhance image contrast, which can help our method achieve better results, noted by an increased accuracy of 2% in night environments. Finally, an accuracy of 97.06% was achieved on the National Tsing Hua University Driver Drowsiness Detection (NTHU-DDD) dataset.

Journal ArticleDOI
TL;DR: A survey of the fast growing field of blockchain, discussing its advantages and possible drawbacks and their implications for the future of the Internet and the authors' personal lives and societies in general.
Abstract: Blockchain is a new technology, often referred to as the Internet of Value. As with all new technologies, there is no consensus on its potential value, with some people claiming that it will bring more disruptive changes than the Internet and others contesting the extent of its importance. Despite predictions that the future is perilous, there is evidence that blockchain is a remarkable, new technology that will change the way transactions are made, based on its ability to guarantee trust among unknown actors, assure the immutability of records, while also making intermediaries obsolete. The importance of blockchain can be confirmed by the interest in digital currencies, the great number of published blockchain papers, as well as MDPI’s journal Future Internet which exclusively publishes blockchain articles, including this special issue covering present and future blockchain challenges. This paper is a survey of the fast growing field of blockchain, discussing its advantages and possible drawbacks and their implications for the future of the Internet and our personal lives and societies in general. The paper consists of the following parts; the first provides a general introduction and discusses the disruptive changes initiated by blockchain, the second discusses the unique value of blockchain and its general characteristics, the third presents an overview of industries with the greatest potential for disruptive changes, the forth describes the four major blockchain applications with the highest prospective advantages, and the fifth part of the paper ends with a discussion on the most notable subset of innovative blockchain applications—Smart Contracts, DAOs (Decentralized Autonomous Organizations) and super safe networks—and their future implications. There is also a concluding section, which summarizes the paper, describes the future of blockchain, and mentions the challenges to be overcome.

Journal ArticleDOI
TL;DR: The findings of the research showed that the top factors that contribute to higher rankings are the existence of website SSL certificate as well as keyword in URL, the quantity of backlinks pointing to a website, the text length, and the domain age, which is not perfectly aligned with what the literature review showed.
Abstract: The World Wide Web has become an essential modern tool for people’s daily routine. The fact that it is a convenient means for communication and information search has made it extremely popular. This fact led companies to start using online advertising by creating corporate websites. With the rapid increase in the number of websites, search engines had to come up with a solution of algorithms and programs to qualify the results of a search and provide the users with relevant content to their search. On the other side, developers, in pursuit of the highest rankings in the search engine result pages (SERPs), began to study and observe how search engines work and which factors contribute to higher rankings. The knowledge that has been extracted constituted the base for the creation of the profession of Search Engine Optimization (SEO). This paper consists of two parts. The first part aims to perform a literature review of the factors that affect the ranking of websites in the SERPs and to highlight the top factors that contribute to better ranking. To achieve this goal, a collection and analysis of academic papers was conducted. According to our research, 24 website characteristics came up as factors affecting any website’s ranking, with the most references mentioning quality and quantity of backlinks, social media support, keyword in title tag, website structure, website size, loading time, domain age, and keyword density. The second part consists of our research which was conducted manually using the phrases “hotel Athens”, “email marketing”, and “casual shoes”. For each one of these keywords, the first 15 Google results were examined considering the factors found in the literature review. For the measurement of the significance of each factor, the Spearman correlation was calculated and every factor was compared with the ranking of the results individually. The findings of the research showed us that the top factors that contribute to higher rankings are the existence of website SSL certificate as well as keyword in URL, the quantity of backlinks pointing to a website, the text length, and the domain age, which is not perfectly aligned with what the literature review showed us.

Journal ArticleDOI
TL;DR: A strong connection between phubbing and online addiction behaviours is confirmed and a multidimensional model is developed considering psychological dimensions and information and communication technology related habits is developed.
Abstract: Phubbing could be defined as a new form of addiction; however, checking the phone and ignoring the speaker could also be linked to the increased availability of virtual social environments. We developed a multidimensional model for phubbing considering psychological dimensions and information and communication technology related habits. We collected data through online questionnaires and surveys. The best model obtained from our data was constituted by Information and Communication Technologies’ (ICTs) usage behaviours, Trait Anxiety, Virtual Sense of Community and Neuroticism. Finally, our study confirmed a strong connection between phubbing and online addiction behaviours.

Journal ArticleDOI
TL;DR: The current state-of-the-art in the context of intelligent transportation systems (ITS) is brought forth and a software-defined heterogeneous vehicular networking (SDHVNet) architecture is proposed for ensuring a highly agile networking infrastructure to ensure rapid network innovation on-demand.
Abstract: The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous vehicles. Today, vehicles communicate wirelessly with other vehicles and vulnerable pedestrians in their immediate vicinity to share timely safety-critical information primarily for collision mitigation. Furthermore, vehicles connect with the traffic management entities via their supporting network infrastructure to become more aware of any potential hazards on the roads and for guidance pertinent to their current and anticipated speeds and travelling course to ensure more efficient traffic flows. Therefore, a secure and low-latency communication is highly indispensable in order to meet the stringent performance requirements of such safety-critical vehicular applications. However, the heterogeneity of diverse radio access technologies and inflexibility in their deployment results in network fragmentation and inefficient resource utilization, and these, therefore, act as bottlenecks in realizing the aims for a highly efficient vehicular networking architecture. In order to overcome such sorts of bottlenecks, this article brings forth the current state-of-the-art in the context of intelligent transportation systems (ITS) and subsequently proposes a software-defined heterogeneous vehicular networking (SDHVNet) architecture for ensuring a highly agile networking infrastructure to ensure rapid network innovation on-demand. Finally, a number of potential architectural challenges and their probable solutions are discussed.

Journal ArticleDOI
TL;DR: A multimodal emotion recognition framework by combining facial expression and EEG, based on a valence-arousal emotional model, to improve the performance of emotion recognition is adopted.
Abstract: Emotion recognition plays an essential role in human–computer interaction. Previous studies have investigated the use of facial expression and electroencephalogram (EEG) signals from single modal for emotion recognition separately, but few have paid attention to a fusion between them. In this paper, we adopted a multimodal emotion recognition framework by combining facial expression and EEG, based on a valence-arousal emotional model. For facial expression detection, we followed a transfer learning approach for multi-task convolutional neural network (CNN) architectures to detect the state of valence and arousal. For EEG detection, two learning targets (valence and arousal) were detected by different support vector machine (SVM) classifiers, separately. Finally, two decision-level fusion methods based on the enumerate weight rule or an adaptive boosting technique were used to combine facial expression and EEG. In the experiment, the subjects were instructed to watch clips designed to elicit an emotional response and then reported their emotional state. We used two emotion datasets—a Database for Emotion Analysis using Physiological Signals (DEAP) and MAHNOB-human computer interface (MAHNOB-HCI)—to evaluate our method. In addition, we also performed an online experiment to make our method more robust. We experimentally demonstrated that our method produces state-of-the-art results in terms of binary valence/arousal classification, based on DEAP and MAHNOB-HCI data sets. Besides this, for the online experiment, we achieved 69.75% accuracy for the valence space and 70.00% accuracy for the arousal space after fusion, each of which has surpassed the highest performing single modality (69.28% for the valence space and 64.00% for the arousal space). The results suggest that the combination of facial expressions and EEG information for emotion recognition compensates for their defects as single information sources. The novelty of this work is as follows. To begin with, we combined facial expression and EEG to improve the performance of emotion recognition. Furthermore, we used transfer learning techniques to tackle the problem of lacking data and achieve higher accuracy for facial expression. Finally, in addition to implementing the widely used fusion method based on enumerating different weights between two models, we also explored a novel fusion method, applying boosting technique.

Journal ArticleDOI
TL;DR: In this article, the multiscale cross-correlations involving the Bitcoin (BTC), Ethereum (ETH), Euro (EUR) and US dollar (USD) are studied over the period between 1 July 2016 and 31 December 2018.
Abstract: Based on the high-frequency recordings from Kraken, a cryptocurrency exchange and professional trading platform that aims to bring Bitcoin and other cryptocurrencies into the mainstream, the multiscale cross-correlations involving the Bitcoin (BTC), Ethereum (ETH), Euro (EUR) and US dollar (USD) are studied over the period between 1 July 2016 and 31 December 2018. It is shown that the multiscaling characteristics of the exchange rate fluctuations related to the cryptocurrency market approach those of the Forex. This, in particular, applies to the BTC/ETH exchange rate, whose Hurst exponent by the end of 2018 started approaching the value of 0.5, which is characteristic of the mature world markets. Furthermore, the BTC/ETH direct exchange rate has already developed multifractality, which manifests itself via broad singularity spectra. A particularly significant result is that the measures applied for detecting cross-correlations between the dynamics of the BTC/ETH and EUR/USD exchange rates do not show any noticeable relationships. This could be taken as an indication that the cryptocurrency market has begun decoupling itself from the Forex.

Journal ArticleDOI
TL;DR: This paper considers concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model.
Abstract: Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.

Journal ArticleDOI
TL;DR: This paper analyzes and compares the consistency model implementation on five popular NoSQL databases: Redis, Cassandra, MongoDB, Neo4j, and OrientDB, and concludes that imposing strong consistency will result in less availability when subject to network partition events.
Abstract: Internet has become so widespread that most popular websites are accessed by hundreds of millions of people on a daily basis. Monolithic architectures, which were frequently used in the past, were mostly composed of traditional relational database management systems, but quickly have become incapable of sustaining high data traffic very common these days. Meanwhile, NoSQL databases have emerged to provide some missing properties in relational databases like the schema-less design, horizontal scaling, and eventual consistency. This paper analyzes and compares the consistency model implementation on five popular NoSQL databases: Redis, Cassandra, MongoDB, Neo4j, and OrientDB. All of which offer at least eventual consistency, and some have the option of supporting strong consistency. However, imposing strong consistency will result in less availability when subject to network partition events.

Journal ArticleDOI
TL;DR: The joint problem of MEC server selection by the end-users and their optimal data offloading, as well as the optimal price setting by the MEC servers is studied in a multiple M EC servers and multiple end- users environment.
Abstract: Software Defined Networks (SDN) and Mobile Edge Computing (MEC), capable of dynamically managing and satisfying the end-users computing demands, have emerged as key enabling technologies of 5G networks. In this paper, the joint problem of MEC server selection by the end-users and their optimal data offloading, as well as the optimal price setting by the MEC servers is studied in a multiple MEC servers and multiple end-users environment. The flexibility and programmability offered by the SDN technology enables the realistic implementation of the proposed framework. Initially, an SDN controller executes a reinforcement learning framework based on the theory of stochastic learning automata towards enabling the end-users to select a MEC server to offload their data. The discount offered by the MEC server, its congestion and its penetration in terms of serving end-users’ computing tasks, and its announced pricing for its computing services are considered in the overall MEC selection process. To determine the end-users’ data offloading portion to the selected MEC server, a non-cooperative game among the end-users of each server is formulated and the existence and uniqueness of the corresponding Nash Equilibrium is shown. An optimization problem of maximizing the MEC servers’ profit is formulated and solved to determine the MEC servers’ optimal pricing with respect to their offered computing services and the received offloaded data. To realize the proposed framework, an iterative and low-complexity algorithm is introduced and designed. The performance of the proposed approach was evaluated through modeling and simulation under several scenarios, with both homogeneous and heterogeneous end-users.

Journal ArticleDOI
TL;DR: This method used Word2vec to construct a context sentence vector, and sense definition vectors then give each word sense a score using cosine similarity to compute the similarity between those sentence vectors, and shows that this method outperforms many unsupervised systems participating in the SENSEVAL-3 English lexical sample task.
Abstract: Words have different meanings (i.e., senses) depending on the context. Disambiguating the correct sense is important and a challenging task for natural language processing. An intuitive way is to select the highest similarity between the context and sense definitions provided by a large lexical database of English, WordNet. In this database, nouns, verbs, adjectives, and adverbs are grouped into sets of cognitive synonyms interlinked through conceptual semantics and lexicon relations. Traditional unsupervised approaches compute similarity by counting overlapping words between the context and sense definitions which must match exactly. Similarity should compute based on how words are related rather than overlapping by representing the context and sense definitions on a vector space model and analyzing distributional semantic relationships among them using latent semantic analysis (LSA). When a corpus of text becomes more massive, LSA consumes much more memory and is not flexible to train a huge corpus of text. A word-embedding approach has an advantage in this issue. Word2vec is a popular word-embedding approach that represents words on a fix-sized vector space model through either the skip-gram or continuous bag-of-words (CBOW) model. Word2vec is also effectively capturing semantic and syntactic word similarities from a huge corpus of text better than LSA. Our method used Word2vec to construct a context sentence vector, and sense definition vectors then give each word sense a score using cosine similarity to compute the similarity between those sentence vectors. The sense definition also expanded with sense relations retrieved from WordNet. If the score is not higher than a specific threshold, the score will be combined with the probability of that sense distribution learned from a large sense-tagged corpus, SEMCOR. The possible answer senses can be obtained from high scores. Our method shows that the result (50.9% or 48.7% without the probability of sense distribution) is higher than the baselines (i.e., original, simplified, adapted and LSA Lesk) and outperforms many unsupervised systems participating in the SENSEVAL-3 English lexical sample task.

Journal ArticleDOI
TL;DR: The combination of AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil governance, smart cities, small communities, supply chains, personalized medicine and other fields, and thereby deliver benefits to many people.
Abstract: An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper selection of the elements and the homogeneity of the data contained within, constructing and maintaining the integrity of a dataset is difficult. Blockchain as a highly secure storage medium presents a technological quantum leap in maintaining data integrity. Furthermore, blockchain’s immutability constructs a fruitful environment for creating high quality, permanent and growing datasets for deep learning. The combination of AI and blockchain could impact fields like Internet of things (IoT), identity, financial markets, civil governance, smart cities, small communities, supply chains, personalized medicine and other fields, and thereby deliver benefits to many people.

Journal ArticleDOI
TL;DR: This study analyzes and compares the relevance ranking algorithms employed by various academic platforms to identify the importance of citations received in their algorithms, and indicates that citation counts are clearly the main SEO factor in these academic search engines.
Abstract: Search engine optimization (SEO) constitutes the set of methods designed to increase the visibility of, and the number of visits to, a web page by means of its ranking on the search engine results pages. Recently, SEO has also been applied to academic databases and search engines, in a trend that is in constant growth. This new approach, known as academic SEO (ASEO), has generated a field of study with considerable future growth potential due to the impact of open science. The study reported here forms part of this new field of analysis. The ranking of results is a key aspect in any information system since it determines the way in which these results are presented to the user. The aim of this study is to analyze and compare the relevance ranking algorithms employed by various academic platforms to identify the importance of citations received in their algorithms. Specifically, we analyze two search engines and two bibliographic databases: Google Scholar and Microsoft Academic, on the one hand, and Web of Science and Scopus, on the other. A reverse engineering methodology is employed based on the statistical analysis of Spearman’s correlation coefficients. The results indicate that the ranking algorithms used by Google Scholar and Microsoft are the two that are most heavily influenced by citations received. Indeed, citation counts are clearly the main SEO factor in these academic search engines. An unexpected finding is that, at certain points in time, Web of Science (WoS) used citations received as a key ranking factor, despite the fact that WoS support documents claim this factor does not intervene.

Journal ArticleDOI
TL;DR: This paper summarizes the efforts of academics and practitioners toward describing devices in order to enable dynamic reconfiguration by machines or humans, and proposes a set of concepts for describing devices.
Abstract: Industry 4.0 demands a dynamic optimization of production lines. They are formed by sets of heterogeneous devices that cooperate towards a shared goal. The Internet of Things can serve as a technology enabler for implementing such a vision. Nevertheless, the domain is struggling in finding a shared understanding of the concepts for describing a device. This aspect plays a fundamental role in enabling an “intelligent interoperability” among sensor and actuators that will constitute a dynamic Industry 4.0 production line. In this paper, we summarize the efforts of academics and practitioners toward describing devices in order to enable dynamic reconfiguration by machines or humans. We also propose a set of concepts for describing devices, and we analyze how present initiatives are covering these aspects.