Sei sulla pagina 1di 16

Accepted Manuscript

Socio-cyber network: The potential of cyber-physical system to define


human behaviors using Big Data analytics

Awais Ahmad, Muhammad Babar, Sadia Din, Shehzad Khalid, Muhammad Mazhar Ullah,
Anand Paul, Alavalapati Goutham Reddy, Nasro Min-Allah

PII: S0167-739X(17)30778-1
DOI: https://doi.org/10.1016/j.future.2017.12.027
Reference: FUTURE 3865

To appear in: Future Generation Computer Systems

Received date : 26 April 2017


Revised date : 27 November 2017
Accepted date : 22 December 2017

Please cite this article as: A. Ahmad, M. Babar, S. Din, S. Khalid, M.M. Ullah, A. Paul, A.G.
Reddy, N. Min-Allah, Socio-cyber network: The potential of cyber-physical system to define
human behaviors using Big Data analytics, Future Generation Computer Systems (2018),
https://doi.org/10.1016/j.future.2017.12.027

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to
our customers we are providing this early version of the manuscript. The manuscript will undergo
copyediting, typesetting, and review of the resulting proof before it is published in its final form.
Please note that during the production process errors may be discovered which could affect the
content, and all legal disclaimers that apply to the journal pertain.
Socio-Cyber Network: The Potential of
Cyber-Physical System to Define Human Behaviors
using Big Data Analytics
Awais Ahmad1, Muhammad Babar2, Sadia Din3, Shehzad Khalid4, Muhammad Mazhar Ullah3, Anand Paul3,
Alavalapati Goutham Reddy4*, Nasro Min-Allah5
1
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, Republic of Korea
2
Department of Computer Software Engineering, National University of Sciences and Technology, Islamabad, Pakistan
3
School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea
4
Department of Computer & Information Security, Sejong University, Seoul, 05006, South Korea
5
College of Computer Science and Information Technology, University of Dammam, KSA
ahmad.marwat@gmail.com, babar.phd@students.mcs.edu.pk, saadia.deen@gmail.com, shehzad_khalid@hotmail.com,
rathoremazhar@gmail.com, paul.editor@gmail.com, *goutham.ace@gmail.com, nabdullatief@uod.edu.sa

Abstract— The growing gap between users and the Big Data interact with other physical objects. Moreover, up to certain
analytics requires innovative tools that address the challenges extent, and due to the terminology of ‘smartness’, these objects
faced by big data volume, variety, and velocity. Therefore, it are intelligent in nature that show intellectual behavior in
becomes computationally inefficient to analyze such massive establishing connections and interaction with other physical
volume of data. Moreover, advancements in the field of Big Data objects based on some protocols, and operate autonomously.
application and data science leads toward a new paradigm of
human behavior, where various smart devices integrate with each
Some of the general examples are building automation system,
other and establish a relationship. However, majority of the smart watches, transportation system, intelligent healthcare
systems are either memoryless or computational inefficient, which system, smart watch, smart TV, security system, etc. [1-2].
are unable to define or predict human behavior. Therefore, Such interaction and operation are increased when they are
keeping in view the aforementioned needs, there is a requirement connected via the internet, which makes the terminology of
for a system that can efficiently analyze a stream of Big Data ‘cyber-physical system (CPS)’. Thus, improving the quality of
within their requirements. Hence, this paper presents a system life, performance and security.
architecture that integrates social network with the technical So far, CPS plays a vital role in supporting interactions
network. We derive a novel notion of ‘Socio-Cyber Network’, between various objects so that they can send their data, to
where a friendship is made based on the geo-location information
of the user, where trust index is used based on graphs theory. The
carry out actions, and provide a bridge between heterogeneous
proposed graph theory provides a better understanding of objects to interact among themselves. Thus, for this purpose,
extraction knowledge from the data and finding relationship the notion of a web of things and service oriented architectures
between different users. To check the efficiency of the proposed is also introduced that supports heterogeneity [3-4].
algorithms exploited in the proposed system architecture, we have Having understood the fact that CPS plays a vital role in
implemented our proposed system using Hadoop and providing a platform through which devices are interconnected.
MapReduce. MapReduce for cyber-physical system (CPS) is Now, a challenge is how humans and smart objects will interact
supported by a parallel algorithm that efficiently process a huge with each other? Initially, the role of cyber was providing a
volume of data sets. The system is implemented using Spark human-to-human connection in which the basic content of
GraphX tool at the top of the Hadoop parallel nodes to generate
and process graphs with near real-time. Moreover, the system is
communication was designed by humans, i.e., to be consumed
evaluated in terms of efficiency by considering the system by other humans. However, with the recent advent in CPS and
throughput and processing time. The results show that the web of things terminologies, the designing of contents are
proposed system is more scalable and efficient. changed from human to devices. Thus, it has an overwhelming
influence upon our lives, i.e., these days, a secret and
Index Terms— Big Data, socio-cyber network, human non-touchable research area. And also, it requires an
behavior, graphs, friendship, trust index. understanding of how CPS plays a key role in enhancing and
understanding our smart environment.
I. INTRODUCTION Moreover, the enhancement of CPS starting its impact in the
Recently, the scope of the digital world in increased in a way social networks. For instance, “Like-Art” [5], in which the
that a number of smart objects are connecting in a huge perspective of social network and “Like it” from Facebook is
quantity. It is due to the exploitation of low-cost internet pooled with the physical contact over undulating hand. Such
extensions, air-interface, and revolution in miniaturization. activity is read by sensors that are connected to the Internet.
Hence, it results in decreasing the cost of a smart device. These Therefore, by doing so, visitors are then able to specify that an
smart devices are referred to physical devices, which has the explicit representation is favorite in the cyber world by
capability to sense physical stimulate, aggregate the data, and interacting with the physical environment.
The exploitation of the social network with the internet is the social network, which finally helps in analyzing the
investigated in [6], where the human social network is used to behavior of human by considering friends management, social
share various resources presented by smart devices. In the monitoring, and social analysis. The proposed system
similar context, the establishment of Ubiquitous Internet of architecture is tested and implemented using Hadoop
Things architecture stimulated by the societal association of ecosystem by considering various datasets, such as social
human being [7]. Moreover, the bond between social and network, healthcare, and intelligent transportation system.
technical network is discussed in [8], where they came up with
a terminology of ‘socio-technical networks’. This concept is II. RESEARCH CONTRIBUTION
widely used in the context of Internet of Things. Having such The main contribution of this paper is as follows.
information where social network integrates with the technical
 At first, we present a hierarchical framework for
network tends to connect millions of smart devices [2], where
integrating social network with the technical network.
users can understand various activities, such as likes and
dislikes. Other activities are, e.g., which places are visited The framework first internments the scalable features of
often, and healthcare system using wireless body area sensor CPS, which helps in the extension of network
network, in which devices interact with each other using the commodities. Moreover, the proposed system
Internet. Due to such interaction of smart devices, a rapid architecture assists the network in data aggregation. The
growth is seen in generating a massive volume of data. This exploitation of reliability index, trust index, and
massive amount of data requires some sort of medium where it reputation index in the architecture bridges the social
can be stored, e.g., databases. This growth is in the form of user activities of the users.
three Vs. Such a volume, velocity, and veracity. Moreover, the  Moreover, we proposed a novel notion of ‘socio-cyber
massive growth uses the common medium for communication, network’, which is based on graph analysis that connects
i.e., the Internet. According to the report published by CISCO, edges of various attributes involved in the social and
humans that use smart devices generating 2.5 quintillion byte of technical network. The proposed graph-based technique
data in each day [9]. facilitates the system architecture to provide in-depth
Additionally, it is also stated that relational databases run knowledge of the big data being generated by smart
over archived data in response to postmortems in the case of device connected to each other.
credit card transactions. In addition, various data processing  Finally, we conduct the extensive simulation using
techniques are also developed to maintain data aggregation in a
Hadoop-based analysis by considering the simulated
fault-tolerant manner. Such data is access by means of any
scenario of the social and technical network. From the
query mechanism generated by users. In such circumstances,
generic big data analytics are achieved by traditional database results and discussion, we show that the proposed
vendors. These are used for data aggregation. These vendors system architecture is feasible for analyzing human
are generally software based, or they only provide analytical behavior using big data.
services, which runs over third party services. Generally, The remainder of this paper is organized as follows. In
traditional databases are unable to predict human behavior. Section 3, we give a detailed description of the background
Nowadays, interaction models are designed that are based on and related studies. In Section IV, we presents the basic level
human inquiries about the information given by objects (i.e., knowledge about the social structure of human behavior. In
human-object interaction). However, this model will be shifted Section v, we propose multilevel system design architecture
to object-object interaction in a near future. Therefore, in this for communication. Also, we described proposed system
way, the object will look for other so that to provide compound architecture and their parts in the same section. In Section
facilities that will be useful for humans. This mechanism may VI, a detailed simulation results and discussion are provided.
increase the interaction complexity. Furthermore, various Finally, Section 5 offers the conclusion of the paper.
challenges can be found, in which scalability issues are one of
the keys confront in said case [11]. In such scenario, several III. RELATED WORK
techniques are given for real-time analysis of human behavior MapReduce programming paradigm producing a large
[11-12]. However, the majority of these schemes are unable to amount of datasets that is responsible for the extensive diversity
process and analyze big data. of real world tasks [13]. MapReduce divides input data into
Thus, based on the aforementioned explanation and small independent chunks which dealt in a parallel manner
challenges, there is a need to change the existing traditional completely. The MapReduce architecture classifies the maps
paradigms of analyzing big data to predict and assist human outputs and sends to the reduce job. Basically, the input and
behavior. To do so, a system architecture requires that is based output of the task are kept in the file system. MapReduce is a
on the interaction of various activities of users, let say parallel programming model, which perform three main task at
friendship selection. Moreover, advancement in the field of big the same time i.e., simplicity, load balancing, and fault
data analytics is one of the utmost crucial factors to analyze tolerance. The Google File System (GFS) normally inspired
human behavior. Therefore, this paper we extend the concept of from the MapReduce model gives the reliability and efficiency
smartbuddy [41] presents system architecture to analyze human of data storage required for large databases applications [14].
behavior based on knowledge extraction. Knowledge extract MapReduce model motivated by functional languages.
plays a vital role in providing the depth of experience, which Functional languages have a map and reduce primeval exist in
helps the user in creating reliability index. Moreover, trust functional languages. Depending on the framework
index is also examined by exploiting graph based search using
requirement numerous execution can be feasible in MapReduce big data and handling with online and offline huge data which
platform. Few recently executions are existed in literature work comes from IoT. Data which comes from connected things can
e.g. networked machines clustering [13], shared memory be store and analyze with the help of different storage facilities
multi-core system techniques [15-16], graphic processors and such as cloud and big data techniques [26], [40], and [42].
asymmetric multi-core processors approach [17]. These storage services enhance data scalability, flexibility,
The majority of exploratory research depend on the novel availability, and adaptability. Beside that when connecting
technologies this is disclosed by current research. Now people social network with IoT the big data concept has kept sidewise.
are now totally depending on these emergency technologies. So Because big data and IoT has a very powerful association with
these smart things are very perspicacious and capable of each other. So many devices are used in the network to generate
interfacing with people. In the literature, authors stated about big data while pushing IoT concept towards the SIoT. The
Things. These things are interconnected and communicate with above mention study still has a deficiency of analyzing big data.
each other with the help of internet [18]. This is labeled as So in IoT things require such technique through which big data
neologism Blobject i.e., objects that blog. Furthermore, can be analyzed and processed in an efficient manner. We
Embodied Microblogging (EM) 15 has many issues in IoT. The believe that for the creek of big data processing to defining
focal point of the author in this study is human to human instead human dynamics there is an utter requirement of strong system
of human to things. architecture.
According to a survey, people think that IoT and social
network are related to each other. To be very careful they IV. THE SOCIAL STRUCTURE OF HUMAN BEHAVIOR
assumed internet vision as ‘Ubiquitous IoT’ [19]. Ubiquitous In this section, we provide the abstract level information
IoT is almost near to the notion of social institute model. It about the social structure and their relationship with the human
seems that this conviction does not understand the fundamental behavior. The role of social structure is referred to life-cycle of
keynote of the social network in IoT. human being since it is the first form of parental relationship,
Miscellaneous platforms and structural designs are designed i.e., parental object relationship [27]. Such relation is defined
for illustrating the combination of social network and IoT in the among analogous objects, which is constructed in the same
last decade [2] [20-21]. This type of combination helps to period of time and by the same manufacturer. This, this
design the social organization network model in IoT. The relationship is easily entrenched during their new production.
function of the web cannot be undervalued in which, with the Also, it may not be changed over the period of time. Based on
help of the web various devices are interconnected with each the social structure, human behavior is also coming from this
other [3]. This idea is named as Web of Things (WoT). A relationship (referred to as statistical and physical complex
three-tier architecture is designed to access the system without systems).
difficulty through uniform web services RESTfull APIs [22]. In addition, objects establish their relationship either by
This proposed architecture interpret raw information into working together or working at the same place. It is similar to
ordinary language and after that translate ordinary language human’s way of life, e.g., human’s share personal experiences
into machine readable language. either secretly or in a public. Such types of relations are resolute
Paraimpu is a social tool used to comprise and easily whenever objects reside at the same place or they are interacted
interconnect smart things, mashup services, and devices to with each other using common medium, i.e., the Internet. These
make personal applications in Internet of Things. It also relationships are established as a location-based application or
connects the Web to physical Things, and APIs to create situation-based application [27]. Sometimes, changes are so
personalized applications. The proposed scheme exploits the frequent based on the duration of location or working,
social network for user verification, import users accounts, interaction frequency [28-29].
friend list and communication with each other. Likewise, a If we consider objects owned by a user, such mobile, laptop,
social access controller (SAC) is designed to spread the social etc. These devices are termed as ‘users-ownership’ as shown in
network idea [23]. This proposed system verifies proxy Figure 1. Such type of ownership is generally for a longer
between smart objects and users. By using social network period of time, and users are using these technologies for a
verification API, SAC assist in handling access control depend longer period of time. These objects interact with another
on the current social organization of a network. Moreover, object with user choice, preferences, or sometimes due to the
various other schemes of the social network are designed for bound situation (e.g., emergency). These are devices are
many different demands. For example, users can share data properly authorized by users and they are used to exchange
with each other with the help of SenseShare application [24]. data, e.g., contacts, messages, online purchasing, etc. The
But the user cannot communicate with sensors using lashing theme is that devices with similar properties are used to
SenseShare. Additionally, Friends and Things applications share best practices in order to solve ‘friend’s problem’.
(FAT) assists the user to share their data with trusted users. Thus, having such knowledge of social relationships, the
In the literature review, there are many types of research behavior can be derived from the interaction of these devices.
done to handle a huge amount of data and provide IoT services The variations in behavior in terms of social and technological
for a wide scope of frameworks. Although big data has are the collections and values of billions or even trillions of
numerous difficulties but IoT begin to be a very valuable study individual user verdicts, benefits, activities, or primaries. These
in research [25] [43], and [44]. IoT uses many big data tools regularities in terms of variations and frequencies for human
that are very important for analyzing big data for instance behavior are daily activities, such reading/sending emails,
MapReduce, Cassandra, NoSQL, etc. Furthermore, in the study messages, facebook likes or sharing videos or other data,
different proposed architecture are used for implementation of
sports, online shopping, and other work patterns are usually by different functionalities enables read and write operations
considered to be random. Also, the verdicts of these activities high effectively. In this section, we will first introduce the
are difficult to judge/assess. Moreover, in 1837, Simeon Denis layered architecture that supports complete system design for
Poisson revealed that various activities follows up a high-performance computing. Afterward, we will present the
distribution, i.e., denominated Poisson Distributed [30]. Thus, design and working of the designed system.
the discussion was made based on the traditional queuing A. IV-Tier Layered Architecture
model based on Poisson distribution, which offers new
indications nearly the long tail distribution of inter events Based on the needs of analyzing big data, we propose an
times/frequencies that unsurprisingly arise in human activities. IV-Tier architecture model. The designed model assists
Social Tech. other different objects to interact with each other using the shared
Network Network Network medium. The proposed architectural model integrate various
data generated by difference application, under the same
domain, i.e., social internet of things, which supports the
research community to provide the generalized framework and
architecture that can help the domestic users in the case of
security, healthcare, elderly age people and kids, and
Service Social Relation- Participa- Service Relation transportation system, machine-to-machine network, wireless
tion Composit-
APIs Graph Ship
model ion
control sensor network, and vehicular network, etc. As Figure 2 shows
M ngt.
that the proposed IV-Tier architectural model consists of four
layers.
Tier I: Data Generation handles data generation through
Time based Owner influence various objects and then collecting and aggregating that data.
Since a different number of objects are involved in generating
Human
Location based
Behavior
Object influence the data. Therefore, an enormous number of heterogeneous data
is produced with various format, a different point of origin, and
Situation based Other influence
periodicity. Moreover, various data have security, privacy, and
Figure 1. Basic components of Social structure platform for human quality requirements. Also, in sensor’s data, the Metadata is
behavior always greater than the actual measure. Therefore early
registration and filtration technique are applied at this layer,
Usually, the change from burst or intensive activities to
which filters the unnecessary Metadata, as well as redundant
non-activities is a common nature of human being, who are
data, is also discarded.
tend to follow-up their routine fashion of diet, sports, online
shopping, and social network in a very rigorous way up to a Tier-II: This layer provides end-to-end connectivity to various
point where its priority is reduced or even forgotten. So far, the devices. Moreover, data is aggregated at this point generated
analysis of human behavior is examined by using weblogs, from various devices and arrange them in the proper format.
smartphones, shopping center queues, and sometimes
Tier-III: Data storage and Processing Layer is the primary layer
interaction with physical stimuli i.e., earthquake, flood, and
of the whole system architecture, which handles the processing
other disasters. Apparently, smart cities and the CPS opening a
of data. Since we need a real-time stream of the data and offline
new way to a data source that enables new peers of
data analysis. Therefore, we need a third party real-time tool to
consequences in enumerating and understanding of human
combine with the processing server to provide the real-time
behavior. Human behavior follows to comprehend through big
implementation. To provide real-time implementations, Strom,
data and evidence of non-Poisson distribution activity in an
Spark, VoltDb, and Hupa can be used. For instance, to be very
individual behavior.
specific in the case of data analysis, the implementation part
Nowadays, society is coming up with new ways of
could be achieved by using MapReduce. At this layer, the same
interactions between people via smart devices, social network,
structure of MapReduce and HDFS is used. With this system,
that lead towards an informative society, where information is
we can also use HIVE, HBASE, and SQL supposed for
just one click away from the user. Specifically, in this work, we
managing Database (in-memory or Offline) to store historical
analyze the potential of big data for smart cities, social network,
information.
and technical network through our proposed system
architecture, and defining a new role by a novel terminology Tier-IV: Service layer is the lowermost layer responsible for
‘socio-cyber network’. Secondly, analyzing big data that gives incorporating the third party interfaces to objects and human.
us a brief knowledge of the human behavior. And finally, This layer can be used autonomously as a single site, merged
influence on behavior via continuous feedback by means with other locations, or deployed in cloud interface. There are
knowledge extraction and experiences. different other features as well. For instance, the unique global
ID management is the key element in the application layer that
V. PROPOSED MULTILEVEL SYSTEM DESIGN handles identifying the object throughout the universe. Vendor
The multilevel active storage and processing aim to extend the control is another feature deals with the definition of the
existing storage and processing systems. The system activities duly performed by different objects. The proposed
architecture is composed of four layers. Each layer is supported architectural layers involve different objects that need
intelligent power to interact with a human. For this reason, a
sm
mart algorithmm is required aat the applicattion level thatt could generator, sessionn initiating, setting up com
mmunicating rrules,
effficiently and effectively innteract with tthe human. V Various inteeract with heeterogeneous objects andd terminating the
tassks could be performed bby this featurees, such as request
r sesssion.

Figure 2. Foour-tier communnication model

Figure 3. Soocio-cyber systeem architecture


B. Socio-Cyber Network
3. Processing Layer
This layer is responsible for processing sub-graphs which were
The idea of exploiting social network and technical network, sent to the processing server by the intermediate layers. From
termed as ‘socio-cyber network’, based on the Internet that the literature, it is recognized that the traditional approaches do
allows objects to establish relation based on the extracting not efficiently analyze Big Data. Therefore, a new system with
knowledge from the data. After extracting knowledge, the novel algorithms is required that can efficiently analyze human
proposed system architecture generates the number of trails by behavior using Big Data. Therefore, keeping in view the
looking into user behavior. Moreover, trust index is generated aforementioned requirements, the proposed system architecture
by finalizing specific trails of the experience, which helps in is powered by the processing layer, which acts as a core
connecting graph of varies vertices of the experience as shown component for the designing system. The processing layer
in Figure 3. In order to understand the actual working of the initially performs load balancing algorithm. Load balancing is
proposed system architecture, it is further divided into used for distributing load to each server in equal size. This
following sub-sections. equal size distribution enhances the system efficiency and all
1. Data Collection Layer the server will process the equal amount of output, and generate
This layer is responsible for data generation. Devices involved an output at the same time. After load balancing, the data
in this layer uses communication medium, such as the Internet, chunks (referred to as sub-graphs) are sent to the raw data
ZigBee, Wi-Fi, etc. to communicate with each other. The storage device. Raw data storage device is used for storing
communication medium handles collecting data from all the sub-graphs in a sequential form. This unit helps the system if
objects (i.e., social network, technical network, and another the data has some missing values, it can re-accessed from the
network) and then relay it towards the communication layer as previous layers. After storing the data, if there is metadata (after
shown in Figure 3. Initially, metadata is collected whose nature arranging data in graphs form) than it is the time to discard
heterogeneous. Moreover, this layer is also capable of finding those data. Moreover, the semantic engine will check whether
the redundant data. For this technique, some related techniques the graphs that are ready for processing is at low scale, medium
are used to find the redundant data [1] [31]. Afterward, those scale, or large scale. The semantic engine pass-on their
metadata, as well as redundant, are discarded. In the literature, instruction to the Hadoop system to react accordingly (i.e.,
various schemes tackle the entire amount of data, which uses assign memory and processing power).
additional system requirements. Therefore, the proposed a. Knowledge Extraction: Knowledge extract is a process of
system does not encounter processing of raw data, redundant capturing useful information, developing, sharing effective
data, or metadata. After elimination of redundant data, the information, and recapitulate all activities with a motive of
useful amount of data is classified by the identifier and message using knowledge in an efficient manner so that users get their
type. Once the data is classified, the data is converted to required objectives. Generally, Knowledge Pyramid (DIKW
machine readable form, which provides an easy solution for the Pyramid) presented in [32], is used for illustration functional
processing to understand it very well and process accordingly. relationship among data (D), information (I), knowledge (K),
2. Communication Layer and wisdom (W). Therefore, based on the aforementioned
This layer is responsible for transmission of data from source to explanation of DIKW, we consider the data and put together
the design system for analysis purpose. It used high-speed all the data in a context. When certain information becomes
Internet, GPRS, 3G, 4G/LTE, or WIMAX as a source of the actionable, it is then transformed into knowledge. Afterward,
medium provider. In addition, it uses Wi-Fi or Bluetooth when a certain information is consolidated, it transforms into
communication technology to transfer data from source to the experience. Initially, the data is considered to be a
designed server if the devices and system are kept near to each subgraph. For instance, these sub-graphs include the data of
other. All the communication with the various units of the temperature, traffic data, or other technical data. When a
analysis system is done by Ethernet. In this layer, we exploit the certain action is performed by sub-graphs, which become
nature of graph that generates or updates each time when new more sophisticated data. So, in other words, these sub-graphs
data is added to the system. Initially, it creates a new graph but include directions, which specifies the relationship between
at later stages, when it meets any incoming data, it just updates two entities, i.e., online data, temperature data, and other
the graph by either adding a new node, new edge or updating data. It can be stated in another word, e.g., we have a
the weights on the edge. It uses an efficient searching knowledge base. The scenario of the action (let say
mechanism, which uses indexing to search particular edge to be emergency alarm, online shopping, etc.) specifies how our
updated when required. Graph building layer also increases the system reacts in the modifying environment. Moreover, how
efficiency of the system by making the graph be processed on a solution to the action is performed is achieved by analyzing
multiple parallel servers simultaneously while dividing the sub-graphs since sub-graphs include insight information.
graph into various independent mutually exclusive Afterward, this level provides the advantage of learning
parts/subgraphs. The exploitation of graphs in the system mechanism using previous experience. After specifying
assists the HPC to process the data efficiently. It is important to knowledge from the data, the useful information is referred
note that unlike the previous system for HPC, our designed follow the friendship selection, which specifies the notion of
system is not only deals with the processing efficiency. trust index using graphs.
However, its main task is to analyze the huge amount of data in b. Trust index based on friendship selection: At this section,
limited resources of the Hadoop server. the exploitation of geo-location information is used to ensure
the friendship selection among various data attributes based
on the locatiion of the obj bjects. For insstance, if maxximum edges, which is i denoted byy RG = ( , E , ) with tthree
users reside in one housee, so it is likkely to happeen that tyypes of weiights. Each intersection of the roadds is
majority of the users has probablyy similar chhoices. reepresented by a vertex of thhe road graph RRG, denoted bby ,
Moreover, thhey need similar environmeent behavior, which wwhere i repreesents the inntersection nuumber. The road
requires balaanced temperaature or moistture inside a house. bbetween two inntersections iss represented by an edge of the
Apparently, iif users are farr away from eaach other, thenn there ggraph between two vertices, denoted by (E E , ), wheree E is
is very less cchance to be ccorrelated witth each other due to thhe edge (road) from interrsection too ),. Each edge
high-securityy concerns. Inn this case, the trust inddex is (EE , ),) havee three type oof weights, whhich representss the
drastically deecreased. For trust index, we are consiidering
current traffic scenarios inccluding 1) the distance betw ween
distance as a threshold. F For instance, if one user is i two
twwo intersectioon and , ddenoted by DIST D , 2)) the
kilometers awway from anotther user, and there is no freequent
calls, messagges, or any othher contact. Thhen, we can saay that aaverage speed of all vehicles from inteersection andd ,
both users doo not have any relation. Andd hence, there should
s ddenoted by AV VG_SP , 33) the numberr of vehicles ggoing
be no trust vaalue. Moreoveer, trust index can be calculaated as fr
from intersectiion to , ddenoted by NO_VEH N , . A
how many tiime users sharre informationn with anotheer user saample road graph of a smaall part of thee city is show wn in
using Internet services. FFigure 4. Thhe undirected edges show w the road from
inntersection tto and from to .
TThe graph proocessing is doone by dividinng the graph into
mmutually excluusive N subgrraphs, i.e., G11, G2, G3 …, Gn
suuch that G1 ∩ G2 ∩ G3 ∩ … ∩ Gn = Φ, aas shown in Fiigure
55. It is better ooption to diviide the graph based on thee city
environment, ii.e., dividing the graph depending uponn the
bbridges in the ccity. Each of tthe Subgraph Gi is processeed by
thhe separate noode and then at result agggregation level the
reesults are agggregated. Lateer, the followwing decisionss are
Figure 4. Graph developpment for smart transportation mmade using varrious graph allgorithms by pparallel processsing
oof the subgraphhs.
Based on thee aforementionned informatioon, the use off graph
Now w the data is reeady for processing in the deesigned server.. The
algorithms w with interchaanging weighhts is propossed to
desiigned system iis powered paarallel algorithhms, which equually
analyze humaan behavior baased on frienddship selectionn. Here
andd parallel proceess the data. O Once the data is processed,, it is
we provide a description off few of the usse cases of thee smart
requuired to the stoore the resultss in a local dissk, where theyy can
transportationn decisions ussing graph alggorithms. How wever,
be used
u for futurre usage. Thuus, it is reallyy hard to storee the
the practice iss not limited oonly to these use cases; we ccan use
resuults or perform
m a traditional MapReduce
M fuunction. In ordder to
graph technoologies and allgorithms to make lots off other
cope with such siituation, we caame up with thhe extension oof the
transportationn-related com mplex decisioons. We aree also
systtem that providdes enough loccal memory too store the dataa and
describing hoow the graphs are generated from vehiculaar data
resuult. For thiss purpose. T The incorporration knowlledge
and few otheer smart trannsportation decisions that ccan be
extrraction, reliabbility index, and
a trust indeex. In some ccases
made using graphs,
g such as, finding quuickest and shhortest
usinng traditional aapproaches, soometimes we ddo not get whaat we
path towards destination, ffinding the coongested or bllocked
actuually want, or the results arre corrupted. H Hence, we neeed to
road, findinng the quickkest route too more thann one
proccess the wholee data again. Thus,
T reducing the computatiional
destinations, how a proposeed system willl guide user baased on
andd processing efficiency off the system m. Therefore, our
the experiencce and knowleddge of the prevvious system etc.,
e by
desiigned system sstores the resuults, analyze thhe results and then
using real-tim
me vehicular ddata.
it is displayed to tthe users.

VI. IMPLEEMENTATION RESULTS AND


D ANALYSIS

Thee proposed sysstem is implem mented using SSpark and GraaphX


withh Hadoop sinngle node seetup on UBU UNTU 14.04 LTS
coreeTMi5 machinne with 3.2 GH Hz processor aand 4 GB memmory.
For real-time traaffic, we gennerated Pcap packets from m the
dataasets by usinng Wireshark libraries andd retransmit tthem
tow
wards the developed system. Hadoop-pcapp-lib,
Haddoop-pcap-serde, and Hadooop Pcap Inputt libraries are used
for network paackets processing and geenerating Haddoop
Reaadable form (sequence file)) at collectionn and aggregaation
Figure 5. Divisions of graphhs unitt so that it ccan be processsed by Hadooop and GrapphX.
GraaphX is used tto build and pprocess graphhs with the aimm of
Graph Buildiing: The traffi
fic data is reprresented by diirected makking smart trannsportation deecisions. We have consideredd the
and weightedd road graph RG
G including veertices and weeighted masssive volume of data from m [33-39].Thee intensity off the
traaffic varies froom time to tim
me on the samee road. The inttensity we take real-timee traffic inform
mation to calcculate the shoortest
annalysis at the various
v time oof the day helpps the authoriities to andd quickest pathh between souurce and destiination rather than
m
manage and maake a proper plan for the trafffic on that parrticular onlyy the distance information.
me. Figure 6 sshows the inteensity of the ttraffic in one of the
tim
Figuure 11 shows the percentagge of humidityy inside the hoome.
rooads of Aarhus city. We cann see at earlyy morning 7:00-9:00
Gennerally, humiddity plays an immportant role oon user behaviior in
annd noon time 11:25-12:30; the traffic is higher on thee road.
casee if the user is doing physicaal exercise or any other actiivity.
Thhis might be bbecause of the office and schhool start time and at
Morreover, if therre is an increase in the hum midity, the usagge of
nooon the kid's scchool end timee. Therefore, tthe proposed ssystem
elecctricity also inncreases. For this case, the proposed schheme
annnounced the authorities w when the inteensity of the traffic
exploits the phennomena of leaarning mechannism. Humidiity is
increases on a pparticular road at any time off the day. Morreover,
meaasured by sennsors, and thhis data is trransferred to our
the system also has the capabiility to identifyy the blockagee of the
propposed schemee for experienccing the levell of humidity. Our
rooad based on thhe current trafffic informatioon. The blockkage of
propposed schemee considers sevveral reading, and thus creaating
the road can bee identified byy the number of vehicles annd the
one threshold durring the montth of Decembeer 2016. Baseed on
avverage speed. When the nuumber of vehicles is more on the
the previous know wledge, the prroposed schem me will predicct for
rooad, and the avverage speed iss too low, this shows the bloockage
the month of JanuaryJ 20166. Thus, the user will rreact
off the road. Theerefore, based on such expeerience, the user will
accoordingly if huumidity is incrreased or decrreased as show wn in
tryy to find a tim
me at which theere is very lesss traffic.
Figuure 11. Similarrly, the same ttechnique is foollowed for ouutside
Fiigure 7 shows the estimated time to reach home. For insstance, tem
mperature as shhown in Figuree 12.
the user often travels from m home to ooffice. Initiallyy, the
prroposed system m experiencees the route and a gathers aall the
traaffic analysis based on the graphs. Afterrward, the prooposed
syystem analyzees traffic data. Once dataa is processeed and
annalyzed, it givves suggestionns to the user about the estiimated
tim
me to reach their home. Hennce, it dependss on user whetther he
foollow such insttructions or noor. Thus, by dooing so, the user will
haave accurate information about the tim mings to reaach its
deestination. Mooreover, users at home cann also get the actual
tim
me of the userr to be arrivedd at home. It iss quite useful dduring
the emergency scenario, e.g., if the user iss late then hiss usual
mings, then it is possible thaat some emerggency has occuurred.
tim
Innitially, the analysis is perfoormed on Aarhhus city traffic. The
sppeed analysis with respecct to the inteensity of trafffic is Figuree 6. Number of vehicles in giveen time
peerformed, show wn in Figure 88. When the iintensity of traaffic is
m
more, i.e., moree vehicles on the road betw ween two poinnts, the 250 Le
ess vhicals (1‐15) More Vhicals (25‐35)
ESTIMATED TIME TO REACH (MIN)
)

avverage speed of the vehiclles is greaterr. The fall in some


(

veehicles on the road results inn a rise in thee average speeed. We 200

caan easily notiice a higher nnumber of caars, i.e., 25-330, the 150
avverage speed iss very low at vvarious times ofo the day, shoown as
a red color graaph. Whereas, at a lower intensity, i.e., 0-10 100

shhown as a bluee line, the averrage speed of the vehicles iss quite
50
higher. There aare also some abnormalitiess exist with a lower
nuumber of vehiccles the averagge speed is alsso lower. This might 0
bee because of the constructtion of the rooads or somee other
1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97
101

TIME
incidents. Norm mally, the distaance is conserrved to measuure the
tim
me to reach thhe destinationn. However, we w observed thhat the Figuure 7. Estimatedd time to reach home
h
nuumber of vehiccles and the avverage speed aalso affects thhe time
to reach the desstination. Figurre 9 shows thee blockage of one of
the roads in Aaarhus city. Baased on the prroposed schem me, the
avverage speed oof the vehicles is too low eveen when the nnumber
off vehicles is also
a low. W We can see thaat most of thee road
blockage is donne at morningg times on diffferent days. T This is
beecause of the rroad constructiion and workiing at morningg time.
Thhe time to reaach the other ppoint is shownn in Figure 100, with
respect to the inntensity of the ttraffic. We cann easily perceiive the
increase in the nnumber of vehhicles on the roadr results inn more
me to reach tto the other ppoint. More vehicles on thee road
tim
reduce average speed of thee vehicles, whhich results inn more
me to reach thhe destination.. As a result of
tim o these phenoomena, Figgure 8. Averagee speed of a vehhicle
20 Average Speeed vehiclee Count 25 Since the mainn contributionn of the work iss the processinng of
Average Speed (km/h)

18
16 20 largge graphs to acchieve smart trransportation, thus, the systeem is
14
12 15
evalluated with reespect to efficiiency in termss of throughpuut (in
10 meggabytes/sec M Mbps) and the rresponse timee (in milliseconnds).
8 10
6 While analyzing the efficiencyy results in terrms of throughhput,
4
2
5
we increase thee dataset sizze and perceeives the syystem
0 0 throoughput effectts. We noticeed that with thhe increase inn the
2014‐10‐01T05:40:00
2014‐10‐01T06:00:00
2014‐10‐02T05:55:00
2014‐10‐06T05:55:00
2014‐10‐08T05:40:00
2014‐10‐22T05:45:00
2014‐10‐23T05:45:00
2014‐10‐23T06:05:00
2014‐10‐27T06:50:00
2014‐10‐27T07:10:00
2014‐10‐28T06:40:00
2014 10 28T07:10:00
2014‐10‐28T07:10:00
2014‐10‐29T06:35:00
2014‐10‐30T07:00:00
2014‐11‐03T06:40:00
2014‐11‐04T06:45:00
2014‐11‐05T06:40:00
2014‐11‐05T07:00:00
2014‐11‐06T07:00:00
2014‐11‐10T06:40:00
2014‐11‐11T07:00:00
2014‐11‐12T06:50:00
2014‐11‐13T06:30:00
2014‐11‐13T07:00:00
dataaset the system m throughput is also increaased, as show wn in
Figuure 13. To suum up, we cann say the throoughput is directly
propportional to thhe data rate. This is becauuse of the parrallel
proccessing of the large graphs oon Hadoop ecoosystem. Whenn the
Date aand Time dataaset is larger, the Hadoop system partittions the data into
Fiigure 9. Averaage speed durinng various datte and time chunnks and proccess them in pparallel. Wee can examinee the
throoughput at hhigher (larger) dataset i..e. 5345MB, the
throoughput for thhis dataset is quite
q better thhan other systtems.
Thiss is the majoor achievemennt of the sysstem that withh an
incrrease in data size the througghput is also inncreased. Howwever
for tthe smaller daataset. Less thaan 100 MB, thhe use of Hadoop is
not efficient.
The effect of processing tim me with respeect to increasinng in
the graph is also examined whhile evaluatingg the efficienccy of
the system. We tested the syystem by increasing numbeer of
noddes and numbeer of edges from m zero to one hundred thoussand,
as shown
s in Figuure 14. The maassive increasee in the number of
edges and nodes rresults in a grradual increasee in the processsing
Figuure 10. Number of vehicles in ggiven time timee while buildinng the graph. M Moreover, eveen for one hunndred
thouusand nodes anda edges, thee processing tiime is quite loower,
i.e., less than onee thousand miilliseconds. Thherefore, baseed on
120 the efficiency resuults, we can saay that the sysstem performs well
100 andd in a real-timee if it is develooped using Spaark and GraphX X on
Haddoop ecosystem m.
Humidity (%)

80

60

40

20

0
0 5 10 15
5 20 25 30 35
Date (JJanuary 2016)

High Avg Low

Figure 11. Hum


midity inside hoome

20
Figure 13. Thrroughput of the system depending on data sizee
15
Temperature (0C)

10

0
0 5 10 15
5 20 25 30 35
‐5

‐10

‐15
Date (January 2016)

High Avg Low

Figure 12. Ouutdoor temperatture


Figgure 14. Graph ggeneration time depending on tthe number of edges
VII. CONCLUSION Collaborative Systems (INCoS), 2014 International
Conference on, pp. 581-585. IEEE, 2014.
In this paper, we proposed a novel notion ‘socio-cyber network’
[5] Sanchez Pineda, A., Maranon-Abreu, R. Like Art:
for defining human behavior using big data analytics.
Integrating Internet of Things and Social Networks,
Generally, big data is generating by smart devices that tend to
http://like-art.com/, 2014.
communication via the Internet. Generally, human behavior is
[6] D. Guinard, M. Fischer, and V. Trifa, “Sharing using
defined by exploiting social network, such as smartphone, and
social networks in a composable web of things,” in
social network. However, it does not provide in-depth
Proc. IEEE PERCOM, 2010.
knowledge of information resides inside the data. Therefore,
[7] H. Ning and Z. Wang;, “Future Internet of things
based on aforementioned features, we proposed a scheme based
architecture: like mankind neural system or social
on the experiencing the data based on learning mechanism.
organization framework?” IEEE Commun. Lett., vol.
Such experienced is gained by finding the friendship level
15, no. 4, pp. 461–463, 2011.
among devices. Friendship level is further enhanced by
[8] M. Kranz, L. Roalter, and F. Michahelles, “Things
exploiting trust index, which eventually lead toward the notion
that Twitter: social networks and the Internet of
of graph theory concept. In our proposed scheme, graph
things,” in What can the Internet of Things do for the
concept is introduced that helps the devices to find a better
Citizen (CIoT) Workshop at Pervasive, May 2010.
match and can predict the future. After processing the data
[9] Dixit, Sudhir, and Ramjee Prasad, eds. Technologies
using GraphX, results are finally stored in the results storage
for home networking. John Wiley & Sons, 2007.
device in the system architecture. The user can utilize these
[10] Nitti, Michele, Luigi Atzori, and Irena Pletikosa
results and can predict their future behavior, which helps in
Cvijikj. "Friendship selection in the social internet of
traffic management system, indoor and outdoor temperature.
things: challenges and possible strategies." IEEE
The performance of the system architecture is tested on Hadoop
Internet of Things Journal 2, no. 3 (2015): 240-247.
using UBUNTU 14.04 LTS coreTMi5 machine with 3.2 GHz
[11] T. Sun, J. Deng, and K. Deng, “Scale-free network
processor and 4 GB memory. The final evaluations show that
model with evolving local-world,” in Proc. 4th Int.
the performance of the proposed network architecture fulfills
Nat. Comput. Conf., 2008, vol. 1, pp. 237–240.
the required desires of the users connected to it, whether the
[12] K.-K. Yap, V. Srinivasan, and M. Motani, “Max:
input data is a real-time as well as offline while taking actions at
Human-centric search of the physical world.” in Proc
the real time.
3rd Int. Conf. Embedd. Netw. Sensor Syst. (Sensys’05),
2005, pp. 166–179.
ACKNOWLEDGEMENT [13] Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce:
This work was supported by the faculty research fund of simplified data processing on large
Sejong University during 2017-2018. clusters." Communications of the ACM 51, no. 1
This research was also supported by Next-Generation (2008): 107-113.
Information Computing Development Program through the [14] Ghemawat, Sanjay, Howard Gobioff, and Shun-Tak
National Research Foundation of Korea(NRF) funded by the Leung. "The Google file system." In ACM SIGOPS
Korea government(MSIT) (2017M3C4A7066010) operating systems review, vol. 37, no. 5, pp. 29-43.
ACM, 2003.
[15] Ranger, Colby, Ramanan Raghuraman, Arun
REFERENCES Penmetsa, Gary Bradski, and Christos Kozyrakis.
"Evaluating mapreduce for multi-core and
multiprocessor systems." In 2007 IEEE 13th
[1] Awais Ahmad, Anand Paul, and M. Mazhar Rathore.
International Symposium on High Performance
"An efficient divide-and-conquer approach for big
Computer Architecture, pp. 13-24. Ieee, 2007.
data analytics in machine-to-machine
[16] Yoo, Richard M., Anthony Romano, and Christos
communication." Neurocomputing 174 (2016):
Kozyrakis. "Phoenix rebirth: Scalable MapReduce on
439-453.
a large-scale shared-memory system." InWorkload
[2] Awais Ahmad, Anand Paul, M. Mazhar Rathore, and
Characterization, 2009. IISWC 2009. IEEE
Hangbae Chang. "Smart cyber society: Integration of
International Symposium on, pp. 198-207. IEEE,
capillary devices with high usability based on Cyber–
2009.
Physical System." Future Generation Computer
[17] Rafique, M. Mustafa, Benjamin Rose, Ali R. Butt, and
Systems56 (2016): 493-503.
Dimitrios S. Nikolopoulos. "Supporting MapReduce
[3] Guinard, Dominique, et al. Towards physical mashups
on large-scale asymmetric multi-core clusters." ACM
in the web of things. Networked Sensing Systems
SIGOPS Operating Systems Review 43, no. 2 (2009):
(INSS), 2009 Sixth International Conference on.
25-34.
IEEE, 2009.
[18] S. Uppoor, O. Trullols-Cruces, M. Fiore, J.M.
[4] Jara, Antonio J., Yann Bocchi, and Dominique
Barcelo-Ordinas, Generation and Analysis of a
Genoud. "Social Internet of Things: The potential of
Large-scale Urban Vehicular Mobility Dataset, IEEE
the Internet of Things for defining human
Transactions on Mobile Computing, Vol.13, No.5,
behaviours." In Intelligent Networking and
May 2014
[19] Ning, Huansheng, and Ziou Wang. "Future Internet of communication." ACM Transactions on Embedded
things architecture: like mankind neural system or Computing Systems (TECS) 15, no. 2 (2016): 39.
social organization framework?." Communications [32] J. Rowley, The wisdom hierarchy: representations of
Letters, IEEE 15, no. 4 (2011): 461-463. the DIKW hierarchy, Journal of Information Science
[20] M. Mazhar. Rathore, A. Paul, A. Ahmad, B.W. Chen, 33(2) (2007) 163-180.
B. Huang, Wen Ji "Real-Time Big Data Analytical [33] Stefan Bischof, Athanasios Karapantelakis,
Architecture for Remote Sensing Application", IEEE Cosmin-Septimiu Nechifor, Amit Sheth, Alessandra
Journal of Selected Topics in Applied Earth Mileo and Payam Barnaghi. 2014. Semantic
Observations and Remote Sensing, Volume: Modeling of Smart City Data. Position Paper in W3C
PP, Issue: 99, Page(s): 1 – 12, Digital Object Identifier Workshop on the Web of Things: Enablers and
10.1109/JSTARS.2015.2424683, 1939-1404 © 2015 services for an open Web of Devices, 25-26 June
IEEE. 2014, Berlin, Germany.
[21] Chung, T.Y., Mashal, I., Alsaryrah, O., Chang, C.H., [34] R. Tönjes, P. Barnaghi, M. Ali, A. Mileo, M.
Hsu, T.H., Li, P.S. and Kuo, W.H., 2014, September. Hauswirth, F. Ganz, S. Ganea, B. Kjærgaard, D.
MUL-SWoT: A Social Web of Things Platform for Kuemper, S. Nechifor, D. Puiu, A. Sheth, V. Tsiatsis,
Internet of Things Application Development. L. Vestergaard. 2014. Real Time IoT Stream
In Internet of Things (iThings), 2014 IEEE Processing and Large-scale Data Analytics for Smart
International Conference on, and Green Computing City Applications. poster session, European
and Communications (GreenCom), IEEE and Cyber, Conference on Networks and Communications 2014.
Physical and Social Computing (CPSCom), IEEE (pp. [35] Sefki Kolozali, Maria Bermudez-Edo, Daniel
296-299). IEEE. Puschmann, Frieder Ganz, Payam Barnaghi. 2014. A
[22] C. Zhang, C. Cheng, and Y. Ji, “Architecture design Knowledge-based Approach for Real-Time IoT Data
for social webof things”, in Proceedings of the 1st Stream Annotation and Processing. In Proc. of the
International workshop on Contect Discovery and 2014 IEEE International Conference on Internet of
Data Mining, 2012, p. 3. Things (iThings 2014), Taipei, Taiwan, September
[23] D. Duinard, M. Fischer, and V. Trifa, “Sharing using 2014.
social networks in a composable web of things”, in [36] Gramaglia, M., Trullols-Cruces, O., Naboulsi, D.,
Pervasive Computing and Communications Fiore, M. and Calderon, M. 2014. Vehicular networks
Workshop (PERCOM Workshops), 2010 8th on two Madrid highways. In 2014 Eleventh Annual
International Conference on, 2010, pp. 702-707 IEEE International Conference on Sensing,
[24] T. Schmid and M. B, Srivastava, “Exploiting social Communication, and Networking (SECON) (pp.
networks for sensor data sharding with SenseShare”, 423-431), 3 July, 2014, Singapore.
2007. [37] S. Uppoor, O. Trullols-Cruces, M. Fiore, J.M.
[25] Labrinidis A, Jagadish HV “Challenges and Barcelo-Ordinas. 2014. Generation and Analysis of a
opportunities with big data”, Proc VLDB Endowment Large-scale Urban Vehicular Mobility Dataset. IEEE
5(12):2032–2033, 2012. Transactions on Mobile Computing, Vol.13, No.5,
[26] Le, Xuan Hung, Sungyoung Lee, Phan Tran Ho True, May 2014.
Asad M. Khattak, M. Han, D. V. Hung, Mohammad [38] D. Naboulsi, M. Fiore. 2013. On the Instantaneous
M. Hassan et al. "Secured WSN-integrated cloud Topology of a Large-scale Urban Vehicular Network:
computing for u-life care." In Proceedings of the 7th the Cologne case. ACM MobiHoc 2013, Bangalore,
IEEE conference on Consumer communications and India, July 2013
networking conference, pp. 702-703. IEEE Press, [39] S. Uppoor, O. Trullols-Cruces, M. Fiore, J.M.
2010 Barcelo-Ordinas. 2014. Generation and Analysis of a
[27] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. Large-scale Urban Vehicular Mobility Dataset. IEEE
"Siot: Giving a social structure to the internet of Transactions on Mobile Computing, Vol.13, No.5,
things." IEEE communications letters 15, no. 11 May 2014.
(2011): 1193-1195. [40] Awais Ahmad, M. Khan, A. Paul, S. Din, M. M
[28] L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, Rathore, G.Jeon, G. S. Choi “Towards Modeling and
M. Beigl, and H. Gellersen, “Smart-its friends: a Optimization of Features Selection in Big Data based
technique for users to easily establish connections Social Internet of Things.” Future Generation
between smart artefacts,” ACM Ubicomp’01. Computer System 2017.
[29] A. P. Fiske, “The four elementary forms of sociality: [41] A. Paul, Awais Ahmad, M. M. Rathore, and S. Jabbar
framework for a unified theory of social relations,” “SmartBuddy: Defining Human behaviors Using Big
Psychological Review, vol. 99, 1992. Data Analytics in Social Internet of Things.” IEEE
[30] Haight, F. A., Handbook of the Poisson distribution. Wireless Communications Magazine, October 2016.
1967. [42] Sadia Din; Awais Ahmad; Anand Paul; Muhammad
[31] Ahmad, Awais, Anand Paul, Mazhar Rathore, and Mazhar Ullah Rathore; Gwanggil Jeon, “A
Hangbae Chang. "An efficient multidimensional big Cluster-Based Data Fusion Technique to Analyze Big
data fusion approach in machine-to-machine Data in Wireless Multi-Sensor System.” IEEE Access
Year: 2017, Volume: 5 Pages: 5069 – 5083.
[43] Awais Ahmad, A. Paul, S. Din, M. M Rathore, G. S.
Choi, G. Jeon “Multilevel Data Processing using
Parallel Algorithms for Analyzing Big Data in High
Performance Computing.” International Journal on
Parallel Programming, (2017) Springer. pp 1–20,
DOI: 10.1007/s10766-017-0498-x.
[44] Sadia Din, Anand Paul, Awais Ahmad,
Jeong Hong Kim “Energy efficient topology
management scheme based on clustering technique for
software defined wireless sensor network”,
Peer-to-Peer Network and Applications. (2017).
https://doi.org/10.1007/s12083-017-0607-z
Biograp
phy:
Dr. Awais Ah
D hmad receiveed his Ph.D. in Computer Science aand Engineerring from
K
Kyungpook ersity, Daegu, Korea. He iss currently w
Naational Univer working as an Assistant
Prrofessor in th
he Departmentt of Informatiion and Comm munication EEngineering, Yeungnam
Y
U
University. In 2014, he wass also a visitiing researcher in INTEL-N NTU, Nationaal Taiwan
U
University, Taiiwan, where hhe was workin ng on Wukong g Project (Smaart Home). Siince 2013,
hee has publish hed more thhan 65 Intern national Journ nals/Conferennces/Book Ch hapters in
vaarious reputed
d IEEE, Elsevvier, and Sprinnger Journals, whereas in leeading confereences, i.e.,
IE
EEE Globecom m 2015, IEEEE Globecom 2016, IEEE LCN, 2016, and IEEE IC CC 2017,
respectivvely. Dr. Awaais is also serrving as Guesst editor in various
v Elsevier and Springger Journals, including
FGCS, S Sustainble Cissties and Sociieties, and RT TIP. Moreoveer, he is an in nvited review
wer in variouss journals,
includingg IEEE Comm munication Leetters, IEEE T Transactions ono Wireless Communicatio
C ons, IEEE Traansactions
on Intelliigent Transpoortation Systemm, IEEE JSTA AR, Ad-Hoc Networks Elssevier, Compuuter Network,, Elsevier,
and IEEE E Communicaations Magaziine. Dr. Ahmaad was the reccipient of threee prestigious awards: (1) IEEE I Best
Researchh Paper Awardd: Internation nal Workshop on Ubiquitou us Sensor Sysstems (UWSSS 2015), in co onjunction
with the Smart Worldd Congress (SWC 2015), B Beijing, Chinaa, August, (2) Research Aw ward from Preesident of
Bahria UUniversity Islaamabad, Pakisstan in 2011, (3) best Paper Nomination n Award in W WCECS 2011 at a UCLA,
USA, andd (4) best Papper Award in 1st Symposiuum on CS&E, Moju Resortt, South Koreea, in 2013. His H current
research interest includdes Big Data, Internet of Thhings, Social Internet of Thhings, and Hum man Behaviorr Analysis
using Bigg Data. Dr. Aw wais has beenn a key contribbutor in the saaid fields. He was also servving as a Lab Admin of
CCMP L Labs from 2013 to 2017. Hee was also awaarded as Best Outgoing Ressearcher of CC CMP labs.

Muhammad Baabar receivess his Bachelo


M ors in Compuuter Sciences with distincttion from
U
University of Peshawar,
P 08. He did his Masters of Sciences in Computer
Pakkistan in 200
Sooftware Engiineering from m National University
U Scciences and Technology (NUST),
Isslamabad, Pakkistan in 20112. Currently y he is pursu
uing his PhD D degree in Computer
Sooftware Engiineering from m National University
U Scciences and Technology (NUST),
Isslamabad, Pakkistan. His reesearch area includes
i but not limited tto Big Data Analytics,
A
Smart City Design and Plaanning, and SSocial Web of
Innternet of Thiings (IoT), S o Things
(SSWOT).

Saadia Din receeived her Bacchelors and Masters


M in Coomputer Engiineering fromm Comsats
Innstitute of In
nformation T Technology Abbottabad
A and Abasyn University Islamabad,
Paakistan in 2010 and 2015,, respectively. In 2015, she was a visititing research at CCMP
Labs, Kyungpo ook National University Korea
K where she was work rking on Big Data and
Innternet of Thiings. She wass also workinng as a Lecturrer in Abaysnn University Islamabad
I
unntil 2016. Currently, she iss doing here Master’s commbined PhD pprogram in Ky yungpook
N
National Univeersity since 22016 March. Her area of research is 5G networkss and IoT
enabled G Green commuunication, Big g Data analyttics, Wireless Sensor Netw work. She hass published feew highly
reputed cconference succh as IEEE LC CN, ACM SA AC, ICC, Glob becom and some SCIE jourrnal at the begginning of
her reseaarch career. In IEEE LCN 2017in Singapoore, she has ch hair couple off sessions.

Shhehzad Khalidd is received his Ph.D. fro


om University
y of Manchestter, UK in 20 009. He is
A
Associate Profeessor at Deparrtment of Com
mputer Engineeering, Bahriaa University, Islamabad
I
Paakistan
D Anand Pa
Dr. aul, received the Ph.D. deg
gree in Electrrical Engineerring from thee National
Cheng Kung University,
U Tain
inan, Taiwan, in 2010. He is working as an Associate
i currently w
Prrofessor in thhe School off Computer Science and Engineering,, Kyungpook National
U
University, uth Korea. Hee is a delegatee representing South Koreaa for M2M focus group
Sou
annd for MPEG G. His researchh interests incclude Algorith
hm and Archiitecture Recon nfigurable
Em mbedded Co omputing. Hee is IEEE SeniorS memb ber and has guest edited d various
innternational jo
ournals and hhe is also part
p of Editorrial Team forr Journal of Platform
Technoloogy, ACM Appplied Computting review annd Cyber–Phy ysical Systemss. He serves ass a reviewer for
fo various
IEEE /IE
ET/Springer annd Elsevier joournals. He is the track chaair for Smart human
h compuuter interactionn in ACM
SAC 20115, 2014. He was the recip pient of the OOutstanding Innternational Student
S Schollarship award in 2004–
2010, thee Best Paper Award in Nattional Compuuter Symposiu um and in 200 09, and Internnational Confference on
Softcompputing and Neetwork Securitty, India in 20015.

Dr. Mazzhar Ullah ratthore receiveed his Masterr degree in Computer


C Coommunicationn Security fro
om the N
attional University of Scieccne and Tech hnology, Islam tan in 2012. Recently,
mabad Pakista
hee completed his Ph.D. froom Kyungpook National University D Daegu. His reesearch in
clludes Big Daata Analytics , Network Traffic
T Analyssis andMonittioring, and Computer
C
annd Networ Seecurity.

Alavalapati Go
A outham Reddyy is an Assisttant Professorr of the Deparrtment of Com mputer &
Innformation Seecurity at the Sejong Univ versity, Repub blic of Korea. Before that, he was a
V
Visiting Reseaarch Scholar at the KIN NDI Center for Computiing Research at Qatar
U
University, Qaatar. He obtaiined his Ph.D D. in Computeer Science & Engineering g from the
K
Kyungpook Naational Univerrsity, Rep. Off Korea, in February 20177. His primary y research
innterests revolvve around Innformation Seecurity and IoT. I He holds
ds several puublications
inn cryptographiic authenticatiion protocols. He is a professional membber of the ACMM and the
IEEEE.

Nasro Min-Alllah very succcessfully weaars many hatss: he is assoociated with CSAIL
N C at
M
Massachusetts Institute of Technology as a Visiting aculty; he is Associate
g Scientist/Fac
Prrofessor (on leave) and thhe Computer Science Dep partment at C COMSATS In nstitute of
Innformation Teechnology; he is the Director at Green Computing
C andd Communicaation Lab.
H received his
He h Undergraaduate and MasterM degreees in Electroonics and In nformation
Teechnology in 1998 and 20001 respectivelly from Quaid di-Azam Univversity and Haamdaramd
U
University, Pak kistan. He obbtained a PhD D in Real-tim me & Embedd dded Systems from the
G
Graduate University of the C Chinese Acad demy of Scien nces (GUCASS), P.R Chinaa in 2008.
He has bbeen enjoyingg a distinguish hed carrier booth in research
h and academ mics. He is thee author of 35 5 research
articles aand book chaapters publisheed in rankingg conferences, impact facto or journals annd book seriees such as
Springer,, Elsevier, and John Wiley y & Sons etc.. His research h interests incclude softwaree pipelining, chromatic
schedulinng, reliable coomputing and real-time systtems. He is allso the winnerr of followingg three most prestigious
p
awards: ii)-CIIT Goldeen Medallion for f Innovationn (CIMI-2009 9), ii)- Best Mobile Innovatiion in Pakistaan (BMIP-
2010), annd iii) Best Unniversity Teaccher Award, P Pakistan (2012
2).
Highlights
 Integrating CPS with Social Network
 Friendship selection based on neighboring devices
 Trust management based on geo-location information
 Analyzing Big Data using MapReduce and GraphX

Potrebbero piacerti anche