A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is ...disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes) at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid) will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.
The adoption of blockchain technology (BCT) in a supply chain holds great potential for textile industries by executing transactions among stakeholders in a most reliable and verifiable way. Textile ...industries in emerging economies, like Pakistan, confront severe economic pressures and uncertain environment and strive to achieve sustainable supply chain excellence through blockchain implementation. This study is an initiative to analyze the key barriers in adopting BCT-related practices within the textile industry. This study conducts an extensive review of the literature using fuzzy Delphi approach for finalizing the barriers and applied fuzzy analytical hierarchy process (AHP) for prioritizing the barriers under uncertain environment. Based on the extensive review of the literature and panel discussions with experts, a total of five main barriers and 21 sub-barriers were categorized and ranked. The results and findings prioritize technological and system-related barriers (TSB) first, and human resources and R&D (HRB) barriers second among the other barrier dimensions. This paper highlights the need for an inclusive understanding of the various technological, environmental, and socio-economic perspectives to create blockchain applications that work for the textile sector. This study’s key findings and policy guidelines can assist concerned stakeholders in making strategic decisions for adopting BCT within the textile supply chain. The managerial implications are provided for the industrial decision-makers and policymakers aiming to integrate BCT into the supply chain processes. Presently, there exists no research in the context of Pakistan that highlights the challenges faced during the adoption of BCT in the supply chain. For this purpose, an approach in the form of an integrated model based on fuzzy set theory is developed. Finally, the robustness of the proposed model is checked through sensitivity analysis.
A new integration of wireless communication technologies into the automobile industry has instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) security. ...Intelligent Transportation Systems (ITS) are set up, aiming to offer promising applications for efficient and safe communication for future automotive technology. Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications. Consequently, security requirements related to vehicular networks are more complex as compared to mobile networks and conventional wireless networks. This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. Unique characteristics of vehicular networks are presented which make the embedded security applications computationally hard as well as memory constrained. The current study also deals with the fundamental security requirements, essential for vehicular communication. Furthermore, awareness of security threats and their cryptographic solutions in terms of future automotive industry are discussed. In addition, asymmetric, symmetric, and lightweight cryptographic solutions are summarized. These strategies can be enhanced or incorporated all in all to meet the security perquisites of future cars security.
Topic-level social influence analysis has been playing an important role in the online social networks like microblogs. Previous works usually use the cumulative number of links, such as the number ...of followers, to measure users’ topic-level influence in a static network. However, they ignore the dynamics of influence and the methods they proposed can not be applied to social streams. To address the limitations of prior works, we firstly propose a novel topic-level influence over time (TIT) model integrating the text, links and time to analyze the topic-level temporal influence of each user. We then design an influence decay based approach to measure users’ topic-level influence from the learned temporal influence. In order to track the influencers in data streams, we combine TIT and the influence decay method into a united online model (named oTIT), which is applicable to dynamic scenario. Through extensive experiments, we demonstrate the superiority of our approach, compared with the baseline and the state-of-the-art method. Moreover, we discover influence exhibits significantly different variation patterns over different topics, which verifies our viewpoint and gives us a new angle to understand its dynamic nature.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Public feelings and reactions associated with finance are gaining significant importance as they help individuals, public health, financial and non-financial institutions, and the government ...understand mental health, the impact of policies, and counter-response. Every individual sentiment linked with a financial text can be categorized, whether it is a headline or the detailed content published in a newspaper. The Guardian newspaper is considered one of the most famous and the biggest websites for digital media on the internet. Moreover, it can be one of the vital platforms for tracking the public’s mental health and feelings via sentimental analysis of news headlines and detailed content related to finance. One of the key purposes of this study is the public’s mental health tracking via the sentimental analysis of financial text news primarily published on digital media to identify the overall mental health of the public and the impact of national or international financial policies. A dataset was collected using The Guardian application programming interface and processed using the support vector machine, AdaBoost, and single layer convolutional neural network. Among all identified techniques, the single layer convolutional neural network with a classification accuracy of 0.939 is considered the best during the training and testing phases as it produced efficient performance and effective results compared to other techniques, such as support vector machine and AdaBoost with associated classification accuracies 0.677 and 0.761, respectively. The findings of this research would also benefit public health, as well as financial and non-financial institutions.
Deep neural networks are efficient methods of recognizing image patterns and have been largely implemented in computer vision applications. Object detection has many applications in computer vision, ...including face and vehicle detection, video surveillance, and plant leaf detection. An automatic flower identification system over categories is still challenging due to similarities among classes and intraclass variation, so the deep learning model requires more precisely labeled and high-quality data. In this proposed work, an optimized and generalized deep convolutional neural network using Faster-Recurrent Convolutional Neural Network (Faster-RCNN) and Single Short Detector (SSD) is used for detecting, localizing, and classifying flower objects. We prepared 2000 images for various pretrained models, including ResNet 50, ResNet 101, and Inception V2, as well as Mobile Net V2. In this study, 70% of the images were used for training, 25% for validation, and 5% for testing. The experiment demonstrates that the proposed Faster-RCNN model using the transfer learning approach gives an optimum mAP score of 83.3% with 300 and 91.3% with 100 proposals on ten flower classes. In addition, the proposed model could identify, locate, and classify flowers and provide essential details that include flower name, class classification, and multilabeling techniques.
Full text
Available for:
FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK
In this paper, we focus on the problem of discovering internally connected communities in event-based social networks (EBSNs) and propose a community detection method by utilizing social influences ...between users. Different from traditional social network, EBSNs contain different types of entities and links, and users in EBSNs have more complex behaviours. This leads to poor performance of the traditional social influence computation method in EBSNs. Therefore, to quantify the pairwise social influence accurately in EBSNs, we first propose to compute two types of social influences, i.e., structure-based social influence and behaviour-based social influence, by utilizing the online social network structure and offline social behaviours of users. In particular, based on the specific features of EBSNs, the similarities of user preference on three aspects (i.e., topics, regions and organizers) are utilized to measure the behaviour-based social influence. Then, we obtain the unified pairwise social influence by combining these two types of social influences through a weight function. Next, we present a social influence based community detection algorithm which is referred to as SICD. In SICD, inspired by the nonlinear feature learning ability of the autoencoder, we first devise a neighborhood based deep autoencoder algorithm to obtain nonlinear community-oriented latent representations of users, and then utilize the k-means algorithm for community detection. Experimental results conducted on real-world dataset show the effectiveness of our proposed algorithm.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Hospital information system (HIS) is an electronic system that aims to provide comprehensive hospital- and patient-related information to authorized people, on one click. The diffusion of HIS is in ...the early phase, and the rate of adoption is very slow in Pakistan. The aim of this study is to identify the factors influencing the adoption of HIS in public sector hospitals of Pakistan. Data were collected through a questionnaire from two major cities in Pakistan. In order to examine the data and test the hypothesis of this study, Confirmatory factor analysis (CFA) and Structure Equation Modeling (SEM) technique were applied. The empirical results clarify that top management support, financial revenue, relative Advantage, compatibility, coercive pressure, and mimetic pressure are positive while complexity is negatively influencing the adoption of HIS. Furthermore, these empirical results will be helpful in establishing the framework for the adoption of HIS in public sector hospitals of Pakistan.
Full text
Available for:
BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
9.
Prediction of Rising Venues in Citation Networks Zia, Muhammad Azam; Zhang, Zhongbao; Li, Guangda ...
Journal of advanced computational intelligence and intelligent informatics,
07/2017, Volume:
21, Issue:
4
Journal Article
Peer reviewed
Open access
Prediction of rising stars has become a core issue in data mining and social networks. Prediction of rising venues could unveil rapidly emerging research venues in citation network. The aim of this ...research is to predict the rising venues. First, we presented five effective prediction features along with their mathematical formulations for extracting rising venues. The underlying features are composed by incorporating the citation count, publications, cited to and cited by information at venue level. For prediction purpose, we employ four machine learning algorithms including Bayesian Network, Support Vector Machine, Multilayer Perceptron and Random Forest. Experimental results demonstrate that proposed features set are effective for rising venues prediction. Our empirical analysis spotlights the rising venues that demonstrate the continuous improvement over time and finally become the leading scientific venues.
The Vehicular Ad Hoc Network (VANET) plays a vital role in the development of smart cities, especially in ensuring vehicles' safety on roads. However, VANET wireless-based networks face some ...challenges such as security, stability, communication, and reliability. To resolve these issues, we propose a fuzzy cluster head selection scheme in Cognitive Radio (CR) VANET, which uses the CR technology for the spectrum sensing algorithm. In this technology, the free spectrums of the primary user are utilized by secondary users without any correlation. Moreover, we have considered some input parameters such as vehicles' average velocity, distance, network connectivity level, lane weight and trustworthiness for the fuzzy system based CR VANET in this research. The selected cluster head provides stability and reliability to the cluster compared to the state of art techniques. Extensive experiments were conducted in order to evaluate the effectiveness of the proposed approach. However, simulation results authenticate more stable and secure cluster formation using the proposed fuzzy logic based CR VANET.