Next Issue
Volume 10, April
Previous Issue
Volume 10, February
 
 

Future Internet, Volume 10, Issue 3 (March 2018) – 10 articles

Cover Story (view full-size image): The figure describes the modeling process used in our research. Since we model motion profiles in a game interaction between a human player and a robot, we first show the game playground (with a human, a robot, and towers), then the flow of data extraction and modeling. This comprises the acceleration signal extraction and processing into GASF images (the kind of heatmap shown in the figure). The pipeline follows with the GASFs being passed as input to an autoencoder, where the representation is then passed to the LDA component which is responsible to separe the type of motion into classes: represented by the different types of human description in the bottom right corner. View the paper here.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
26 pages, 349 KiB  
Article
A Statistical Analysis of Industrial Penetration and Internet Intensity in Taiwan
by Chia-Lin Chang, Michael McAleer and Yu-Chieh Wu
Future Internet 2018, 10(3), 31; https://doi.org/10.3390/fi10030031 - 16 Mar 2018
Cited by 1 | Viewed by 4852
Abstract
This paper is the first to investigate the effect of industrial penetration (geographic concentration of industries) and internet intensity (the proportion of enterprises that uses the internet) for Taiwan manufacturing firms, and analyses whether the relationships are substitutes or complements. The sample observations [...] Read more.
This paper is the first to investigate the effect of industrial penetration (geographic concentration of industries) and internet intensity (the proportion of enterprises that uses the internet) for Taiwan manufacturing firms, and analyses whether the relationships are substitutes or complements. The sample observations are based on a unique set of data, namely 153,081 manufacturing plants, and covers 26 two-digit industry categories and 358 geographical townships in Taiwan. The Heckman sample selection model is used to accommodate sample selectivity for unobservable data for firms that use the internet. The empirical results from Heckman’s two-stage estimation show that: (1) a higher degree of industrial penetration will not affect the probability that firms will use the internet, but it will affect the total expenditure on internet intensity; (2) for two-digit SIC (Standard Industrial Classification) industries, industrial penetration generally decreases the total expenditure on internet intensity; and, (3) industrial penetration and internet intensity are substitutes. Full article
15 pages, 2557 KiB  
Article
Optimal Design of Demand-Responsive Feeder Transit Services with Passengers’ Multiple Time Windows and Satisfaction
by Bo Sun, Ming Wei and Senlai Zhu
Future Internet 2018, 10(3), 30; https://doi.org/10.3390/fi10030030 - 12 Mar 2018
Cited by 25 | Viewed by 5834
Abstract
This paper presents a mixed-integer linear programming model for demand-responsive feeder transit services to assign vehicles located at different depots to pick up passengers at the demand points and transport them to the rail station. The proposed model features passengers’ one or several [...] Read more.
This paper presents a mixed-integer linear programming model for demand-responsive feeder transit services to assign vehicles located at different depots to pick up passengers at the demand points and transport them to the rail station. The proposed model features passengers’ one or several preferred time windows for boarding vehicles at the demand point and their expected ride time. Moreover, passenger satisfaction that was related only to expected ride time is fully accounted for in the model. The objective is to simultaneously minimize the operation costs of total mileage and maximize passenger satisfaction. As the problem is an extension of the nondeterministic polynomial problem with integration of the vehicle route problem, this study further develops an improved bat algorithm to yield meta-optimal solutions for the model in a reasonable amount of time. When this was applied to a case study in Nanjing City, China, the mileage and satisfaction of the proposed model were reduced by 1.4 km and increased by 7.1%, respectively, compared with the traditional model. Sensitivity analyses were also performed to investigate the impact of the number of designed bus routes and weights of objective functions on the model performance. Finally, a comparison of Cplex, standard bat algorithm, and group search optimizer is analyzed to verify the validity of the proposed algorithm. Full article
Show Figures

Figure 1

15 pages, 1305 KiB  
Article
Understanding How GitHub Supports Curation Repositories
by Yu Wu, Jessica Kropczynski, Raquel Prates and John M. Carroll
Future Internet 2018, 10(3), 29; https://doi.org/10.3390/fi10030029 - 10 Mar 2018
Cited by 4 | Viewed by 6135
Abstract
In recent years, software developers have started to appropriate GitHub repositories to curate resources, in order to systematically select, evaluate, and organize existing artifacts for preservation and future use. Curation behaviors in social media sites, such as users’ experiences to curate tweets from [...] Read more.
In recent years, software developers have started to appropriate GitHub repositories to curate resources, in order to systematically select, evaluate, and organize existing artifacts for preservation and future use. Curation behaviors in social media sites, such as users’ experiences to curate tweets from Twitter and pins on Pinterest, are well documented. However, GitHub, as a social coding platform, presents a new context for this activity, raising questions about the nature of curation on this task-driven online work site. To explore and understand curation on GitHub, we compared and contrasted curation repositories with software repositories using activity logs and analyzed the content of popular curation repositories. Our results show that: (1) curation repositories have become a favorite category of repositories in GitHub; (2) curation repositories leverage collaborative features and practices native to GitHub in new ways; (3) curation repositories collect and preserve high-quality resources for the software developers’ community. Our results suggest that curation is becoming increasingly important to the software developers’ community, and current practices can be better supported with tools designed specifically for curation. Full article
Show Figures

Figure 1

3 pages, 143 KiB  
Editorial
Ecosystemic Evolution Fed by Smart Systems
by Dino Giuli
Future Internet 2018, 10(3), 28; https://doi.org/10.3390/fi10030028 - 10 Mar 2018
Cited by 2 | Viewed by 3772
(This article belongs to the Special Issue Ecosystemic Evolution Feeded by Smart Systems)
24 pages, 5368 KiB  
Article
Security Awareness in Software-Defined Multi-Domain 5G Networks
by Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä and Pekka Ruuska
Future Internet 2018, 10(3), 27; https://doi.org/10.3390/fi10030027 - 8 Mar 2018
Cited by 8 | Viewed by 8811
Abstract
Fifth generation (5G) technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service [...] Read more.
Fifth generation (5G) technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT) authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed. Full article
Show Figures

Graphical abstract

13 pages, 4455 KiB  
Article
TwinNet: A Double Sub-Network Framework for Detecting Universal Adversarial Perturbations
by Yibin Ruan and Jiazhu Dai
Future Internet 2018, 10(3), 26; https://doi.org/10.3390/fi10030026 - 6 Mar 2018
Cited by 10 | Viewed by 5467
Abstract
Deep neural network has achieved great progress on tasks involving complex abstract concepts. However, there exist adversarial perturbations, which are imperceptible to humans, which can tremendously undermine the performance of deep neural network classifiers. Moreover, universal adversarial perturbations can even fool classifiers on [...] Read more.
Deep neural network has achieved great progress on tasks involving complex abstract concepts. However, there exist adversarial perturbations, which are imperceptible to humans, which can tremendously undermine the performance of deep neural network classifiers. Moreover, universal adversarial perturbations can even fool classifiers on almost all examples with just a single perturbation vector. In this paper, we propose TwinNet, a framework for neural network classifiers to detect such adversarial perturbations. TwinNet makes no modification of the protected classifier. It detects adversarially perturbated examples by enhancing different types of features in dedicated networks and fusing the output of the networks later. The paper empirically shows that our framework can identify adversarial perturbations effectively with a slight loss in accuracy when predicting normal examples, which outperforms state-of-the-art works. Full article
Show Figures

Figure 1

9 pages, 1107 KiB  
Article
Interference Management in Femtocells by the Adaptive Network Sensing Power Control Technique
by Tehseen Ul Hassan, Fei Gao, Babur Jalal and Sheeraz Arif
Future Internet 2018, 10(3), 25; https://doi.org/10.3390/fi10030025 - 1 Mar 2018
Cited by 6 | Viewed by 5837
Abstract
The overlay integration of low-power femtocells over macrocells in a heterogeneous network (HetNet) plays an important role in dealing with the increasing demand of spectral efficiency, coverage and higher data rates, at a nominal cost to network operators. However, the downlink (DL) transmission [...] Read more.
The overlay integration of low-power femtocells over macrocells in a heterogeneous network (HetNet) plays an important role in dealing with the increasing demand of spectral efficiency, coverage and higher data rates, at a nominal cost to network operators. However, the downlink (DL) transmission power of an inadequately deployed femtocell causes inter-cell interference (ICI), which leads to severe degradation and sometimes link failure for nearby macrocell users. In this paper, we propose an adaptive network sensing (ANS) technique for downlink power control to obviate the ICI. The simulation results have shown that the ANS power control technique successfully decreases the cell-edge macro user’s interference and enhances the throughput performance of macro users, while also optimizing the coverage and capacity of the femtocell. When compared with the Femto User Equipment (FUE)-assisted and Macro User Equipment (MUE)-assisted power control technique, the proposed technique offers a good tradeoff in reducing interference to macro users, while maintaining the quality of service (QoS) requirement of the femtocell users. Full article
(This article belongs to the Special Issue Massive MIMO Communication and Networking Systems)
Show Figures

Figure 1

14 pages, 1256 KiB  
Article
How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0
by Virginia Pilloni
Future Internet 2018, 10(3), 24; https://doi.org/10.3390/fi10030024 - 1 Mar 2018
Cited by 111 | Viewed by 14656
Abstract
We are living in the era of the fourth industrial revolution, namely Industry 4.0. This paper presents the main aspects related to Industry 4.0, the technologies that will enable this revolution, and the main application domains that will be affected by it. The [...] Read more.
We are living in the era of the fourth industrial revolution, namely Industry 4.0. This paper presents the main aspects related to Industry 4.0, the technologies that will enable this revolution, and the main application domains that will be affected by it. The effects that the introduction of Internet of Things (IoT), Cyber-Physical Systems (CPS), crowdsensing, crowdsourcing, cloud computing and big data will have on industrial processes will be discussed. The main objectives will be represented by improvements in: production efficiency, quality and cost-effectiveness; workplace health and safety, as well as quality of working conditions; products’ quality and availability, according to mass customisation requirements. The paper will further discuss the common denominator of these enhancements, i.e., data collection and analysis. As data and information will be crucial for Industry 4.0, crowdsensing and crowdsourcing will introduce new advantages and challenges, which will make most of the industrial processes easier with respect to traditional technologies. Full article
(This article belongs to the Special Issue Big Data and Internet of Thing)
Show Figures

Figure 1

18 pages, 1666 KiB  
Article
SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
by Sufian Hameed and Hassan Ahmed Khan
Future Internet 2018, 10(3), 23; https://doi.org/10.3390/fi10030023 - 27 Feb 2018
Cited by 65 | Viewed by 10150
Abstract
Software Defined Networking (SDN) has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows [...] Read more.
Software Defined Networking (SDN) has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to program and monitor our networks but it also helps in mitigating some key network problems. Distributed denial of service (DDoS) attack is among them. In this paper we propose a collaborative DDoS attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C) protocol that allows SDN-controllers lying in different autonomous systems (AS) to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective filtering of traffic near the source of attack, thus saving valuable time and network resources. We also introduced three different deployment approaches i.e., linear, central and mesh in our testbed. Based on the experimental results we demonstrate that our SDN based collaborative scheme is fast and reliable in efficiently mitigating DDoS attacks in real time with very small computational footprints. Full article
(This article belongs to the Collection Information Systems Security)
Show Figures

Figure 1

21 pages, 5769 KiB  
Article
Learning and Mining Player Motion Profiles in Physically Interactive Robogames
by Ewerton L. S. Oliveira, Davide Orrù, Luca Morreale, Tiago P. Nascimento and Andrea Bonarini
Future Internet 2018, 10(3), 22; https://doi.org/10.3390/fi10030022 - 26 Feb 2018
Cited by 7 | Viewed by 5938
Abstract
Physically-Interactive RoboGames (PIRG) are an emerging application whose aim is to develop robotic agents able to interact and engage humans in a game situation. In this framework, learning a model of players’ activity is relevant both to understand their engagement, as well as [...] Read more.
Physically-Interactive RoboGames (PIRG) are an emerging application whose aim is to develop robotic agents able to interact and engage humans in a game situation. In this framework, learning a model of players’ activity is relevant both to understand their engagement, as well as to understand specific strategies they adopted, which in turn can foster game adaptation. Following such directions and given the lack of quantitative methods for player modeling in PIRG, we propose a methodology for representing players as a mixture of existing player’s types uncovered from data. This is done by dealing both with the intrinsic uncertainty associated with the setting and with the agent necessity to act in real time to support the game interaction. Our methodology first focuses on encoding time series data generated from player-robot interaction into images, in particular Gramian angular field images, to represent continuous data. To these, we apply latent Dirichlet allocation to summarize the player’s motion style as a probabilistic mixture of different styles discovered from data. This approach has been tested in a dataset collected from a real, physical robot game, where activity patterns are extracted by using a custom three-axis accelerometer sensor module. The obtained results suggest that the proposed system is able to provide a robust description for the player interaction. Full article
(This article belongs to the Special Issue Engaging in Interaction with Robots)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop