Alberto Francia, Stefano Mariani, Giuseppe Adduce, Sandro Vecchiarelli, Franco Zambonelli
Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables better organisation of business processes. However, currently, most software systems for competency management adopted by the industry are either organisation-centric or centralised: that is, they either lock-in students and employees wishing to export their competencies elsewhere, or they require users’ trust and for users to give up privacy (to store their personal data) while being prone to faults. In this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box®, an existing application for the management of digital competencies that has been improved to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership.
{"title":"Digital Management of Competencies in Web 3.0: The C-Box® Approach","authors":"Alberto Francia, Stefano Mariani, Giuseppe Adduce, Sandro Vecchiarelli, Franco Zambonelli","doi":"10.3390/fi15110350","DOIUrl":"https://doi.org/10.3390/fi15110350","url":null,"abstract":"Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables better organisation of business processes. However, currently, most software systems for competency management adopted by the industry are either organisation-centric or centralised: that is, they either lock-in students and employees wishing to export their competencies elsewhere, or they require users’ trust and for users to give up privacy (to store their personal data) while being prone to faults. In this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box®, an existing application for the management of digital competencies that has been improved to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"41 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134909210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since data are the gold of modern business, companies put a huge effort into collecting internal and external information, such as process, supply chain, or customer data. To leverage the full potential of gathered information, data have to be free of errors and corruptions. Thus, the impacts of data quality and data validation approaches become more and more relevant. At the same time, the impact of information and communication technologies has been increasing for several years. This leads to increasing energy consumption and the associated emission of climate-damaging gases such as carbon dioxide (CO2). Since these gases cause serious problems (e.g., climate change) and lead to climate targets not being met, it is a major goal for companies to become climate neutral. Our work focuses on quality aspects in smart manufacturing lines and presents a finite automaton to validate an incoming stream of manufacturing data. Through this process, we aim to achieve a sustainable use of manufacturing resources. In the course of this work, we aim to investigate possibilities to implement data validation in resource-saving ways. Our automaton enables the detection of errors in a continuous data stream and reports discrepancies directly. By making inconsistencies visible and annotating affected data sets, we are able to increase the overall data quality. Further, we build up a fast feedback loop, allowing us to quickly intervene and remove sources of interference. Through this fast feedback, we expect a lower consumption of material resources on the one hand because we can intervene in case of error and optimize our processes. On the other hand, our automaton decreases the immaterial resources needed, such as the required energy consumption for data validation, due to more efficient validation steps. We achieve the more efficient validation steps by the already-mentioned automaton structure. Furthermore, we reduce the response time through additional recognition of overtaking data records. In addition, we implement an improved check for complex inconsistencies. Our experimental results show that we are able to significantly reduce memory usage and thus decrease the energy consumption for our data validation task.
{"title":"A Finite State Automaton for Green Data Validation in a Real-World Smart Manufacturing Environment with Special Regard to Time-Outs and Overtaking","authors":"Simon Paasche, Sven Groppe","doi":"10.3390/fi15110349","DOIUrl":"https://doi.org/10.3390/fi15110349","url":null,"abstract":"Since data are the gold of modern business, companies put a huge effort into collecting internal and external information, such as process, supply chain, or customer data. To leverage the full potential of gathered information, data have to be free of errors and corruptions. Thus, the impacts of data quality and data validation approaches become more and more relevant. At the same time, the impact of information and communication technologies has been increasing for several years. This leads to increasing energy consumption and the associated emission of climate-damaging gases such as carbon dioxide (CO2). Since these gases cause serious problems (e.g., climate change) and lead to climate targets not being met, it is a major goal for companies to become climate neutral. Our work focuses on quality aspects in smart manufacturing lines and presents a finite automaton to validate an incoming stream of manufacturing data. Through this process, we aim to achieve a sustainable use of manufacturing resources. In the course of this work, we aim to investigate possibilities to implement data validation in resource-saving ways. Our automaton enables the detection of errors in a continuous data stream and reports discrepancies directly. By making inconsistencies visible and annotating affected data sets, we are able to increase the overall data quality. Further, we build up a fast feedback loop, allowing us to quickly intervene and remove sources of interference. Through this fast feedback, we expect a lower consumption of material resources on the one hand because we can intervene in case of error and optimize our processes. On the other hand, our automaton decreases the immaterial resources needed, such as the required energy consumption for data validation, due to more efficient validation steps. We achieve the more efficient validation steps by the already-mentioned automaton structure. Furthermore, we reduce the response time through additional recognition of overtaking data records. In addition, we implement an improved check for complex inconsistencies. Our experimental results show that we are able to significantly reduce memory usage and thus decrease the energy consumption for our data validation task.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"121 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136381617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikolaos Baras, Antonios Chatzisavvas, Dimitris Ziouzios, Ioannis Vanidis, Minas Dasygenis
In the ever-evolving landscape of warehousing, the integration of unmanned ground vehicles (UGVs) has profoundly revolutionized operational efficiency. Despite this advancement, a key determinant of UGV productivity remains its energy management and battery placement strategies. While many studies explored optimizing the pathways within warehouses and determining ideal power station locales, there remains a gap in addressing the dynamic needs of energy-efficient UGVs operating in tandem. The current literature largely focuses on static designs, often overlooking the challenges of multi-UGV scenarios. This paper introduces a novel algorithm based on affinity propagation (AP) for smart battery and charging station placement in modern warehouses. The idea of the proposed algorithm is to divide the initial area into multiple sub-areas based on their traffic, and then identify the optimal battery location within each sub-area. A salient feature of this algorithm is its adeptness at determining the most strategic battery station placements, emphasizing uninterrupted operations and minimized downtimes. Through extensive evaluations in a synthesized realistic setting, our results underscore the algorithm’s proficiency in devising enhanced solutions within feasible time constraints, paving the way for more energy-efficient and cohesive UGV-driven warehouse systems.
{"title":"Improving the Efficiency of Modern Warehouses Using Smart Battery Placement","authors":"Nikolaos Baras, Antonios Chatzisavvas, Dimitris Ziouzios, Ioannis Vanidis, Minas Dasygenis","doi":"10.3390/fi15110353","DOIUrl":"https://doi.org/10.3390/fi15110353","url":null,"abstract":"In the ever-evolving landscape of warehousing, the integration of unmanned ground vehicles (UGVs) has profoundly revolutionized operational efficiency. Despite this advancement, a key determinant of UGV productivity remains its energy management and battery placement strategies. While many studies explored optimizing the pathways within warehouses and determining ideal power station locales, there remains a gap in addressing the dynamic needs of energy-efficient UGVs operating in tandem. The current literature largely focuses on static designs, often overlooking the challenges of multi-UGV scenarios. This paper introduces a novel algorithm based on affinity propagation (AP) for smart battery and charging station placement in modern warehouses. The idea of the proposed algorithm is to divide the initial area into multiple sub-areas based on their traffic, and then identify the optimal battery location within each sub-area. A salient feature of this algorithm is its adeptness at determining the most strategic battery station placements, emphasizing uninterrupted operations and minimized downtimes. Through extensive evaluations in a synthesized realistic setting, our results underscore the algorithm’s proficiency in devising enhanced solutions within feasible time constraints, paving the way for more energy-efficient and cohesive UGV-driven warehouse systems.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134908496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Serôdio, José Cunha, Guillermo Candela, Santiago Rodriguez, Xosé Ramón Sousa, Frederico Branco
The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation. To support this connectivity, mission-critical applications are emerging with challenging network requirements. The primary goals of 6G include providing sophisticated and high-quality services, extremely reliable and further-enhanced mobile broadband (feMBB), low-latency communication (ERLLC), long-distance and high-mobility communications (LDHMC), ultra-massive machine-type communications (umMTC), extremely low-power communications (ELPC), holographic communications, and quality of experience (QoE), grounded in incorporating massive broad-bandwidth machine-type (mBBMT), mobile broad-bandwidth and low-latency (MBBLL), and massive low-latency machine-type (mLLMT) communications. In attaining its objectives, 6G faces challenges that demand inventive solutions, incorporating AI, softwarization, cloudification, virtualization, and slicing features. Technologies like network function virtualization (NFV), network slicing, and software-defined networking (SDN) play pivotal roles in this integration, which facilitates efficient resource utilization, responsive service provisioning, expanded coverage, enhanced network reliability, increased capacity, densification, heightened availability, safety, security, and reduced energy consumption. It presents innovative network infrastructure concepts, such as resource-as-a-service (RaaS) and infrastructure-as-a-service (IaaS), featuring management and service orchestration mechanisms. This includes nomadic networks, AI-aware networking strategies, and dynamic management of diverse network resources. This paper provides an in-depth survey of the wireless evolution leading to 6G networks, addressing future issues and challenges associated with 6G technology to support V2X environments considering presenting
{"title":"The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges","authors":"Carlos Serôdio, José Cunha, Guillermo Candela, Santiago Rodriguez, Xosé Ramón Sousa, Frederico Branco","doi":"10.3390/fi15110348","DOIUrl":"https://doi.org/10.3390/fi15110348","url":null,"abstract":"The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation. To support this connectivity, mission-critical applications are emerging with challenging network requirements. The primary goals of 6G include providing sophisticated and high-quality services, extremely reliable and further-enhanced mobile broadband (feMBB), low-latency communication (ERLLC), long-distance and high-mobility communications (LDHMC), ultra-massive machine-type communications (umMTC), extremely low-power communications (ELPC), holographic communications, and quality of experience (QoE), grounded in incorporating massive broad-bandwidth machine-type (mBBMT), mobile broad-bandwidth and low-latency (MBBLL), and massive low-latency machine-type (mLLMT) communications. In attaining its objectives, 6G faces challenges that demand inventive solutions, incorporating AI, softwarization, cloudification, virtualization, and slicing features. Technologies like network function virtualization (NFV), network slicing, and software-defined networking (SDN) play pivotal roles in this integration, which facilitates efficient resource utilization, responsive service provisioning, expanded coverage, enhanced network reliability, increased capacity, densification, heightened availability, safety, security, and reduced energy consumption. It presents innovative network infrastructure concepts, such as resource-as-a-service (RaaS) and infrastructure-as-a-service (IaaS), featuring management and service orchestration mechanisms. This includes nomadic networks, AI-aware networking strategies, and dynamic management of diverse network resources. This paper provides an in-depth survey of the wireless evolution leading to 6G networks, addressing future issues and challenges associated with 6G technology to support V2X environments considering presenting","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"31 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zdenko Kljaić, Danijel Pavković, Mihael Cipek, Maja Trstenjak, Tomislav Josip Mlinarić, Mladen Nikšić
This article presents a review of cutting-edge technologies poised to shape the future of railway transportation systems, focusing on enhancing their intelligence, safety, and environmental sustainability. It illustrates key aspects of the energy-transport-information/communication system nexus as a framework for future railway systems development. Initially, we provide a review of the existing challenges within the realm of railway transportation. Subsequently, we delve into the realm of emerging propulsion technologies, which are pivotal for ensuring the sustainability of transportation. These include innovative solutions such as alternative fuel-based systems, hydrogen fuel cells, and energy storage technologies geared towards harnessing kinetic energy and facilitating power transfer. In the following section, we turn our attention to emerging information and telecommunication systems, including Long-Term Evolution (LTE) and fifth generation New Radio (5G NR) networks tailored for railway applications. Additionally, we delve into the integral role played by the Industrial Internet of Things (Industrial IoT) in this evolving landscape. Concluding our analysis, we examine the integration of information and communication technologies and remote sensor networks within the context of Industry 4.0. This leveraging of information pertaining to transportation infrastructure promises to bolster energy efficiency, safety, and resilience in the transportation ecosystem. Furthermore, we examine the significance of the smart grid in the realm of railway transport, along with the indispensable resources required to bring forth the vision of energy-smart railways.
{"title":"An Overview of Current Challenges and Emerging Technologies to Facilitate Increased Energy Efficiency, Safety, and Sustainability of Railway Transport","authors":"Zdenko Kljaić, Danijel Pavković, Mihael Cipek, Maja Trstenjak, Tomislav Josip Mlinarić, Mladen Nikšić","doi":"10.3390/fi15110347","DOIUrl":"https://doi.org/10.3390/fi15110347","url":null,"abstract":"This article presents a review of cutting-edge technologies poised to shape the future of railway transportation systems, focusing on enhancing their intelligence, safety, and environmental sustainability. It illustrates key aspects of the energy-transport-information/communication system nexus as a framework for future railway systems development. Initially, we provide a review of the existing challenges within the realm of railway transportation. Subsequently, we delve into the realm of emerging propulsion technologies, which are pivotal for ensuring the sustainability of transportation. These include innovative solutions such as alternative fuel-based systems, hydrogen fuel cells, and energy storage technologies geared towards harnessing kinetic energy and facilitating power transfer. In the following section, we turn our attention to emerging information and telecommunication systems, including Long-Term Evolution (LTE) and fifth generation New Radio (5G NR) networks tailored for railway applications. Additionally, we delve into the integral role played by the Industrial Internet of Things (Industrial IoT) in this evolving landscape. Concluding our analysis, we examine the integration of information and communication technologies and remote sensor networks within the context of Industry 4.0. This leveraging of information pertaining to transportation infrastructure promises to bolster energy efficiency, safety, and resilience in the transportation ecosystem. Furthermore, we examine the significance of the smart grid in the realm of railway transport, along with the indispensable resources required to bring forth the vision of energy-smart railways.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"36 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135216009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nirmalya Thakur, Kesha A. Patel, Audrey Poon, Rishika Shah, Nazif Azizi, Changhee Han
Exoskeletons have emerged as a vital technology in the last decade and a half, with diverse use cases in different domains. Even though several works related to the analysis of Tweets about emerging technologies exist, none of those works have focused on the analysis of Tweets about exoskeletons. The work of this paper aims to address this research gap by presenting multiple novel findings from a comprehensive analysis of about 150,000 Tweets about exoskeletons posted between May 2017 and May 2023. First, findings from temporal analysis of these Tweets reveal the specific months per year when a significantly higher volume of Tweets was posted and the time windows when the highest number of Tweets, the lowest number of Tweets, Tweets with the highest number of hashtags, and Tweets with the highest number of user mentions were posted. Second, the paper shows that there are statistically significant correlations between the number of Tweets posted per hour and the different characteristics of these Tweets. Third, the paper presents a multiple linear regression model to predict the number of Tweets posted per hour in terms of these characteristics of Tweets. The R2 score of this model was observed to be 0.9540. Fourth, the paper reports that the 10 most popular hashtags were #exoskeleton, #robotics, #iot, #technology, #tech, #innovation, #ai, #sci, #construction and #news. Fifth, sentiment analysis of these Tweets was performed, and the results show that the percentages of positive, neutral, and negative Tweets were 46.8%, 33.1%, and 20.1%, respectively. To add to this, in the Tweets that did not express a neutral sentiment, the sentiment of surprise was the most common sentiment. It was followed by sentiments of joy, disgust, sadness, fear, and anger, respectively. Furthermore, hashtag-specific sentiment analysis revealed several novel insights. For instance, for almost all the months in 2022, the usage of #ai in Tweets about exoskeletons was mainly associated with a positive sentiment. Sixth, lexicon-based approaches were used to detect possibly sarcastic Tweets and Tweets that contained news, and the results are presented. Finally, a comparison of positive Tweets, negative Tweets, neutral Tweets, possibly sarcastic Tweets, and Tweets that contained news is presented in terms of the different characteristic properties of these Tweets. The findings reveal multiple novel insights related to the similarities, variations, and trends of character count, hashtag usage, and user mentions in such Tweets during this time range.
{"title":"A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023","authors":"Nirmalya Thakur, Kesha A. Patel, Audrey Poon, Rishika Shah, Nazif Azizi, Changhee Han","doi":"10.3390/fi15100346","DOIUrl":"https://doi.org/10.3390/fi15100346","url":null,"abstract":"Exoskeletons have emerged as a vital technology in the last decade and a half, with diverse use cases in different domains. Even though several works related to the analysis of Tweets about emerging technologies exist, none of those works have focused on the analysis of Tweets about exoskeletons. The work of this paper aims to address this research gap by presenting multiple novel findings from a comprehensive analysis of about 150,000 Tweets about exoskeletons posted between May 2017 and May 2023. First, findings from temporal analysis of these Tweets reveal the specific months per year when a significantly higher volume of Tweets was posted and the time windows when the highest number of Tweets, the lowest number of Tweets, Tweets with the highest number of hashtags, and Tweets with the highest number of user mentions were posted. Second, the paper shows that there are statistically significant correlations between the number of Tweets posted per hour and the different characteristics of these Tweets. Third, the paper presents a multiple linear regression model to predict the number of Tweets posted per hour in terms of these characteristics of Tweets. The R2 score of this model was observed to be 0.9540. Fourth, the paper reports that the 10 most popular hashtags were #exoskeleton, #robotics, #iot, #technology, #tech, #innovation, #ai, #sci, #construction and #news. Fifth, sentiment analysis of these Tweets was performed, and the results show that the percentages of positive, neutral, and negative Tweets were 46.8%, 33.1%, and 20.1%, respectively. To add to this, in the Tweets that did not express a neutral sentiment, the sentiment of surprise was the most common sentiment. It was followed by sentiments of joy, disgust, sadness, fear, and anger, respectively. Furthermore, hashtag-specific sentiment analysis revealed several novel insights. For instance, for almost all the months in 2022, the usage of #ai in Tweets about exoskeletons was mainly associated with a positive sentiment. Sixth, lexicon-based approaches were used to detect possibly sarcastic Tweets and Tweets that contained news, and the results are presented. Finally, a comparison of positive Tweets, negative Tweets, neutral Tweets, possibly sarcastic Tweets, and Tweets that contained news is presented in terms of the different characteristic properties of these Tweets. The findings reveal multiple novel insights related to the similarities, variations, and trends of character count, hashtag usage, and user mentions in such Tweets during this time range.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"18 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135463060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefano Ferilli, Eleonora Bernasconi, Davide Di Pierro, Domenico Redavid
With the progressive improvements in the power, effectiveness, and reliability of AI solutions, more and more critical human problems are being handled by automated AI-based tools and systems. For more complex or particularly critical applications, the level of knowledge, not just information, must be handled by systems where explicit relationships among objects are represented and processed. For this purpose, the knowledge representation branch of AI proposes Knowledge Graphs, widely used in the Semantic Web, where different online applications may interact by understanding the meaning of the data they process and exchange. This paper describes a framework and online platform for the Internet-based knowledge graph definition, population, and exploitation based on the LPG graph model. Its main advantages are its efficiency and representational power and the wide range of functions that it provides to its users beyond traditional Semantic Web reasoning: network analysis, data mining, multistrategy reasoning, and knowledge browsing. Still, it can also be mapped onto the SW.
{"title":"A Graph DB-Based Solution for Semantic Technologies in the Future Internet","authors":"Stefano Ferilli, Eleonora Bernasconi, Davide Di Pierro, Domenico Redavid","doi":"10.3390/fi15100345","DOIUrl":"https://doi.org/10.3390/fi15100345","url":null,"abstract":"With the progressive improvements in the power, effectiveness, and reliability of AI solutions, more and more critical human problems are being handled by automated AI-based tools and systems. For more complex or particularly critical applications, the level of knowledge, not just information, must be handled by systems where explicit relationships among objects are represented and processed. For this purpose, the knowledge representation branch of AI proposes Knowledge Graphs, widely used in the Semantic Web, where different online applications may interact by understanding the meaning of the data they process and exchange. This paper describes a framework and online platform for the Internet-based knowledge graph definition, population, and exploitation based on the LPG graph model. Its main advantages are its efficiency and representational power and the wide range of functions that it provides to its users beyond traditional Semantic Web reasoning: network analysis, data mining, multistrategy reasoning, and knowledge browsing. Still, it can also be mapped onto the SW.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135617548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. However, there are still significant problems that need to be resolved. One of them is to protect communications on these systems from threat actors. In this paper, we use blockchain technology as a defense mechanism against such issues. Drones can communicate data safely, without the need for a centralized authority (ground station), when using a blockchain to facilitate communication between them in a leader–follower hierarchy structure. Solidity has been used to create a compact, lightweight, and effective smart contract that automates the process of choosing a position in a certain swarm formation structure. Additionally, a mechanism for electing a new leader is proposed. The effectiveness of the presented model is assessed through a simulation that makes use of a DApp we created and Gazebo software. The purpose of this work is to develop a reliable and secure UAV swarm communication system that will enable widespread global adoption by numerous sectors.
{"title":"Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms","authors":"Athanasios Koulianos, Antonios Litke","doi":"10.3390/fi15100344","DOIUrl":"https://doi.org/10.3390/fi15100344","url":null,"abstract":"Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. However, there are still significant problems that need to be resolved. One of them is to protect communications on these systems from threat actors. In this paper, we use blockchain technology as a defense mechanism against such issues. Drones can communicate data safely, without the need for a centralized authority (ground station), when using a blockchain to facilitate communication between them in a leader–follower hierarchy structure. Solidity has been used to create a compact, lightweight, and effective smart contract that automates the process of choosing a position in a certain swarm formation structure. Additionally, a mechanism for electing a new leader is proposed. The effectiveness of the presented model is assessed through a simulation that makes use of a DApp we created and Gazebo software. The purpose of this work is to develop a reliable and secure UAV swarm communication system that will enable widespread global adoption by numerous sectors.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is network slicing, which allows the creation of multiple virtual networks to support various use cases on a unified physical network. However, the limited availability of radio resources in the 5G cloud-Radio Access Network (C-RAN) and the ever-increasing data traffic volume necessitate efficient resource allocation algorithms to ensure quality of service (QoS) for each network slice. This paper proposes an Adaptive Slice Allocation (ASA) mechanism for the 5G C-RAN, designed to dynamically allocate resources and adapt to changing network conditions and traffic delay tolerances. The ASA system incorporates slice admission control and dynamic resource allocation to maximize network resource efficiency while meeting the QoS requirements of each slice. Through extensive simulations, we evaluate the ASA system’s performance in terms of resource consumption, average waiting time, and total blocking probability. Comparative analysis with a popular static slice allocation (SSA) approach demonstrates the superiority of the ASA system in achieving a balanced utilization of system resources, maintaining slice isolation, and provisioning QoS. The results highlight the effectiveness of the proposed ASA mechanism in optimizing future internet connectivity within the context of 5G C-RAN, paving the way for enhanced network performance and improved user experiences.
{"title":"Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities","authors":"Salman Ali AlQahtani","doi":"10.3390/fi15100343","DOIUrl":"https://doi.org/10.3390/fi15100343","url":null,"abstract":"With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is network slicing, which allows the creation of multiple virtual networks to support various use cases on a unified physical network. However, the limited availability of radio resources in the 5G cloud-Radio Access Network (C-RAN) and the ever-increasing data traffic volume necessitate efficient resource allocation algorithms to ensure quality of service (QoS) for each network slice. This paper proposes an Adaptive Slice Allocation (ASA) mechanism for the 5G C-RAN, designed to dynamically allocate resources and adapt to changing network conditions and traffic delay tolerances. The ASA system incorporates slice admission control and dynamic resource allocation to maximize network resource efficiency while meeting the QoS requirements of each slice. Through extensive simulations, we evaluate the ASA system’s performance in terms of resource consumption, average waiting time, and total blocking probability. Comparative analysis with a popular static slice allocation (SSA) approach demonstrates the superiority of the ASA system in achieving a balanced utilization of system resources, maintaining slice isolation, and provisioning QoS. The results highlight the effectiveness of the proposed ASA mechanism in optimizing future internet connectivity within the context of 5G C-RAN, paving the way for enhanced network performance and improved user experiences.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"68 51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these paradigms. By using an approach similar to software testing, i.e., a mixture of systematic and experience, we analyze obstacles specific to forensics in fog and edge computing such as spatial dispersion and possibly incomplete recordings, and derive how far these obstacles can be overcome by adapting processes and techniques from other branches of network forensics, and how new solutions could look otherwise. In addition, we present a discussion of open problems of network forensics in fog and edge environments and discusses the challenges for an investigator.
{"title":"Challenges of Network Forensic Investigation in Fog and Edge Computing","authors":"Daniel Spiekermann, Jörg Keller","doi":"10.3390/fi15100342","DOIUrl":"https://doi.org/10.3390/fi15100342","url":null,"abstract":"While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these paradigms. By using an approach similar to software testing, i.e., a mixture of systematic and experience, we analyze obstacles specific to forensics in fog and edge computing such as spatial dispersion and possibly incomplete recordings, and derive how far these obstacles can be overcome by adapting processes and techniques from other branches of network forensics, and how new solutions could look otherwise. In addition, we present a discussion of open problems of network forensics in fog and edge environments and discusses the challenges for an investigator.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135888048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}