• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Service Search Model Using Emerging Technologies

    2023-12-12 15:51:24FarhanAminandGyuSangChoi
    Computers Materials&Continua 2023年10期

    Farhan Amin and Gyu Sang Choi

    Department of Information and Communication Engineering,Yeungnam University,Gyeongsan,38541,Korea

    ABSTRACT In recent years,the Internet of Things (IoT) has played a vital role in providing various services to users in a smart city.However,searching for services,objects,data,and frameworks remains a concern.The technological advancements in Cyber-Physical Systems (CPSs) and the Social Internet of Things (SIoT) open a new era of research.Thus,we propose a Cyber-Physical-Social Systems (CPSs) for service search.Herein,service search and object discovery operation carries with the suitable selection of friends in the network.Our proposed model constructs a graph and performs social network analysis(SNA).We suggest degree centrality,clustering,and scalefree emergence and show that a rational selection of friends per service exploration increases the overall network navigability.The efficiency of our proposed system is verified using real-world datasets based on service processing time,path length,giant component,and network diameter.The simulation results proved that our proposed system is efficient,robust,and scalable.

    KEYWORDS Internet of Things;Social Internet of Things;Cyber-Physical Social systems;smart cities;service search;smart cities

    1 Introduction

    The traditional networks and services are efficiently utilized under the umbrella of a smart city [1].The key services are smart traffic management,smart healthcare,waste management,urban transport,etc.The Internet of Things(IoT)is a leading technology that connects a huge number of homogeneous and heterogeneous objects.These objects can communicate and provide various services in these application scenarios.According to a recent research survey [2],the number of IoT devices will be in billions by 2025.Therefore,searching for a service in IoT devices acts as a challenging task[3–5].In addition,since a device can have several connections,therefore requires a large search space.The IoT is based on centralized systems and hence has limited the service selection and also has scalability issues.To address the scalability issue,a new technology is introduced,named the Social Internet of Things (SIoT).SIoT works as a cluster between the IoT and social networks [6].Moreover,the social networking feature is not only limited to the online social networking for instance;Facebook and Twitter,but it could applied to the natural sciences.The communication among these devices is improved by using smart objects,especially when they were connected to others.These smart objects can communicate directly or indirectly by utilizing their neighbors.The power of establishing social relationships enables the SIoT objects to establish relationships and also behave socially [7].Therefore,smart objects can request and also provide various services.One of the promising features of the SIoT is that every object can look for a desired service by using neighborhood relations,such as querying neighbors in a distributed manner.Hence,the overall network navigability is increased.The Cyber-Physical Systems(CPS)are popular nowadays and becoming the fundamental conceptual approaches of Industry 4.0 [8].These intelligent systems comprised controllers,sensors,actuators,etc.All these devices work together and provide support for the physical and cyber worlds [9].A necessity in the modern world is to provide the cyber-physical infrastructure combined with new software platforms that combine emerging technologies [10].Presently,the global world is evolving into a hybrid world with the integration of cyber,physical,and social aspects.These are referred to as Cyber-Physical-Social Systems(CPSs)[11,12].The objectives of CPSS to provide efficient,convenient,and personalized services to the humans[13,14].The general structure of a CPSS is shown in Fig.1.In this figure,we can see those cyber,physical,and social systems were connected.The social system(networks) interact with each other and are hence composed of virtual and physical spaces.The social system is comprised of people having relations among them.The relation is formed based on the social interaction and measurement of performance based on personal experience,perception,and observation.The physical systems were divided into sensors and actuators.The sensing devices comprised of sensors,temperature sensors,and actuators as shown in the figure.These smart objects were connected using different technologies using wired and wireless techniques to process the valuable data and shown in the virtual space.CPSS has been an active research topic for more than a decade and plays a very important role as an interface between several objects to send and receive data and carry out actions.The integration of CPSs and emerging technologies helps to improve the user services especially in smart cities.Many researchers have worked in this direction.For instance,Zhou et al.[15]presented a survey on the development of CPSs.For evaluation,they identified five diverse aspects and listed are as follows.The development of CPS to CPSSs,architecture design,applications,and standards,the enabling techniques,and networks.A technical study conducted by Amin et al.[16]proposed CPSs for the analysis of high communication traffic areas in a smart city.It is a two-step procedure,in the first step;the high communication areas named hotspots were extracted in the network.In the second step;to quantify the importance of each hotspot a deep analysis has been performed based on certain network metrics,for example,degree,and Eigenvector centrality etc.The authors concluded that these metrics help to identify the importance of each hotspot in the network.In addition,this study is helpful for the researchers who were working in the telecom domain.A similar research carried by Ahmad et al.[17] proposed a Socio-cyber network based on the human behaviors.In this study,they have performed a big data analysis.The proposed model integrates the social network with the technical network.The friendship is established based on the trust index and geolocation information of the user.The proposed model provides a better understanding of extracting knowledge.Similarly,Dautovic et al.[18] proposed a collaborative data processing platform using stream processing technology.The key objective of this platform is to distribute the workload among all devices.Yetis et al.[19] proposed a cyber-physical-social system for a smart city.The proposed system regularly reports smart city problems that people face in their environment by solving cyber,physical,and social factors.Li et al.[20] focused on multi-objective optimization based on power load stability.From this literature,we found that although the research on this topic is recent and ongoing;however,there is limited literature reported on the SIoT,especially in the development of CPSS.Therefore,there is a need to find alternative services and data retrieval methods[21]using CPss and emerging technologies.

    Figure 1:General structure of CPSS

    1.1 Motivation and Problem Statement

    The potential service selection and the framework for achieving a greater connection is a key problem in IoT and remains the same in the development of smart cities[7].The primary motivation of our research study is to find the desired service for objects in the IoT.Therefore,we propose to develop an innovative solution for the service search using emerging intelligence,i.e.,SIoT,and CPSS.Our proposed model is expected to boost the selection and composition of services provided by objects and networks that have access to the physical world.The key objective of this research is to provide a model for object discovery and potential services selection using intelligent friend selection.In particular,the recent CPSs systems were developed without considering SIoT.Therefore,our research aims to fully exploit the emerging technologies combined with the advantages in the existing systems.We proposed a system for the potential service selection and showed how required service discovery has been performed with the proper selection of potential friends in the network and will impact in terms of achieving higher network navigability.We perform a detailed analysis using service processing time,average path length,degrees,network diameter,etc.

    1.2 Benefits of Our Research

    Our research is beneficial for researchers who have the intention to learn the structural properties of a large-scale network and wants to learn the interactions among devices in a distributed manner,as well as low-cost routing and service search methods.

    1.3 Contribution of This Study

    ? The current state-of-the-art models are purely based on global network navigability and thus lack existing short paths.Thus,a large time is required for service search in the network.We solve this problem by employing local network navigability.In our proposed system,we suggested network-based properties for instance;neighborhood degree,local clustering,and scale-free emergence to increase the overall network navigability.

    ? The distributed nature of our proposed system can discover the desired services very quickly and hence it requires less service execution time and also is scalable.

    ? We analyzed how the proposed system behaves when the routing is performed by each object only exploiting local information for instance;friends,namely their degrees.Hence,it guarantees lows cost routing.

    ? The proposed system is evaluated using four real data sets and compared with current state of art models.The efficiency is measured by considering the giant component,network diameter,path length,and service processing time.

    The rest of the study is organized as follows.Section 2 presents the relevant background and the core concepts of emerging technologies.Section 3 explains our proposed multilevel system design model.Section 4 explains the experimentation and finally,Section 5 concludes the conclusion of our study.

    2 Related Work

    Herein,we review the most recent literature.Herein we briefly discuss the current state of the art along with suitable supporting literature.

    2.1 The Current State of ART in CPSs

    The IoT is a leading technology and is widely used to develop the infrastructure in smart cities.The objects in the IoT were connected and passed data to the others.Millions of objects were connected and transferred data at the same time therefore,it leads to the generation of large data and hence the scalability issue arises.The service search is the key challenge that remains for the growth of IoT[16].In order,to overcome this issue,the Social Internet of Things(SIoT)has been developed.The SIoT works as a cluster between the IoT and social networks.The power of utilizing social relationships is helpful to overcome the issue of scalability.In addition,generally,social networks have large data and the power of SIoT is also helpful to solve problems in handling large-scale data.For example;Sivrikaya et al.[14]proposed a framework for service selection in a smart city using IoT.The research is excellent,however,they did not consider the centrality metrics.Another study conducted by Keung et al.[22]proposed a framework for robotic and facility control using edge intelligence for the industrial Internet of Things(IIoT).They suggested Artificial Intelligence(AI)and IIoT-based agnostic robotic architecture for resource synchronization.Another research conducted by Keung et al.[23] addressed the issue of value utilization and creation in IIoT.For this,they proposed a graph theory-based solution named multi-deep Robotic Mobile Fulfillment System (RMFS).It is used for identifying the short paths using fast computing.For this purpose,they proposed three-tier IIoT architecture including RMFS,a supplier,and a disposal center.The proposed model comprised different storage locations.The assignment rules and strategies were implemented under the particular parties to reduce the operation cost.For performance evaluation,they compared with a genetic heuristic algorithm,Astar,and the Dijkstra algorithm.Zheng et al.[24] presented a manufacturing network based on graph knowledge and the multi-agent re-enforcement learning for the IIoT.They suggested self-X cognitive manufacturing which is the combination of self-configuration,self-optimization,and selfadjust.Similarly,Xia et al.[25]proposed a novel convolutional network-based approach for predicting the material removal rate in a chemical plantation.The Knowledge Graphs (KG) were used for unorganized maintenance.Xia et al.[26]researched maintenance planning and recommendation using knowledge and neural network graphs.In this research,at first,a KG is formed.The maintenance is established based on a well-defined domain-specific ontology schema.Then,a compressed relational graph convolutional network is proposed to predict the faults in maintenance.Finally,a maintenance test case using oil drilling equipment is carried out to check the efficiency.One more study conducted by Xia et al.[27] proposed an approach for fault diagnosis in complex networks.Presently,fault diagnosis in graphs is performed using Graph Neural Networks(GNN)is performed based on data similarity.Therefore,they cannot guarantee the quality.Therefore,a proposed hybrid approach is combined with the hypergraph construction method.Zhou et al.[28] developed a deep learningbased personalized recommender system.This system predicts the click-through rate for a given item and is suitable for online advertising.Zhang et al.[29] proposed a model for wind power operation and maintenancebased on social and physical information.They suggested cognitive measurement and intelligent guide using simulation.Tan et al.[30] proposed a block-chain-based access control framework to increase the privacy preservation.The access control is ensured and the transactions issued and the encryption is performed by using a domain management server.Two problems were associated;first,it takes plenty of time to protect the security and privacy and secondly occupied a large space,therefore,not suitable for the mobile devices.Secondly,the operation function does not provide a standard permission mechanism to access the chain of records in the network.Keung et al.[31]presented a study on the development of a cloud-based Robotic Mobile Fulfillment System(RMFS).They first presented a critical analysis of cloud-based services for IoT development.Secondly,theoretical research was conducted from the most recent literature.In addition,they proposed a cloudbased architecture using a conflict avoidance strategy in the multi-layer multi-deep warehouse.One more similar research was conducted by Kung et al.[23]and addressed value creation by utilizing the IIoT.In this research,a graph-based heuristic is used for computing the short paths in the network.They suggested Diikstra,A-star,and genetic algorithm for the comparison.The unique feature of this model is that it integrates the physical and cyber layers using cloud.From literature,we concluded that SIoT is useful in the development of CPSs.But,there is a limited research has been reported on this topic.Therefore,we proposed a service discovery model using SIoT and CPSs.The proposed model is explained given in Section 3.

    3 Proposed Multilevel System Design Model

    The proposed conceptual multilevel system model is shown in Fig.2.It is a four-layered model consisting of data collection,communication,processing,and application layers.In this section,we explain the functionality of each layer in detail.

    3.1 DataCollection Layer

    The first layer(the top layer shown in the figure)is used for data generation.The main function of our proposed system is to generate and efficiently process large graphs from Facebook,Slashdot,Bright kite,and IoT real objects.The IoT data set for a smart city is comprised of sensors and actuators etc.The data generation layer integrates all the features necessary to gather sensor information on a real-time basis.The preprocessing is performed and the data set size is reduced.In this way,unnecessary information will be discarded efficiently.

    Figure 2:Proposed multilevel system design model

    3.2 Communication Layer

    In this layer,all devices were equipped with a communication medium,for instance;Wireless Fidelity (WIFI) and Worldwide Interoperability for Microwave Access (WiMax),etc.This layer handles the data collected from various objects for instance;Bright kite,Facebook,Real IoT,and other social networks.The purpose is to collect the data from the source to the design system.Herein,we suggest,high-speed communication technologies such as;Long-Term Evolution (LTE),WIFI,WiMax,and Ethernet technologies.These technologies are helpful to transfer the data from the source to the designed server.It is possible if the devices and systems are kept near each other.At first,a graph is created.When the incoming data is received the graph is modified by adding new nodes and edges.

    3.3 Data Processing Layer

    This layer receives the data from the above layer with the key function to normalize the data into a meaningful form.In this way,the useful information is extracted.Usually,the processing of a large amount of data requires more power and resources.The traditional methods of data processing are not feasible to analyze large amounts of data.Therefore,there is a need to develop a system that can efficiently pre-process the incoming stream of data.For this purpose,the incoming data is first stored in the database and then handled by using Python Data analysis(Pandas)as shown in Fig.2.The key functions of Pandas are to perform cleansing,transforming,and the manipulation of the data.Network X[32]generates a graph from the dataset,and then,network centrality metrics were applied.The data storage initially creates‘filtered big data’and Herein,the errors and the redundant data were removed.The servers process an equal amount of data and generate the output at the same time.Finally,the error-free data is converted into a graph.The graph database extracts the potential friendship metrics for instance;degree centrality,and clustering coefficient,and the scalefree emergence structure has been applied to the graph.After following these steps,the processed data is forwarded to the next layer.

    Graph Building

    The graph-building process has been performed in this layer.Herein,the social network data is denoted by an undirected and unweighted GraphG,and whereG=(V,E),whereVandEare vertices and edges.In this network,the edge is a connection between pairs,andn=|V|denotes nodes or objects,andm=|E|denotes edges.A reference graph deployment is shown in Fig.3.Our proposed multi-level system design model is empowered with various powerful algorithms and hence equally processes the large-scale data.Finally,the dataset has been sent for processing to a designated server.Once the processing has been completed the data is stored on local a disk for future use.

    Figure 3:Reference graph deployment

    3.4 Application Layer

    The key parts in this layer are a data center using the cloud,data storage,and prediction as shown in Fig.2.The upper layer graph database sends the partial and complete results to this layer.At first,these results were stored in the data center using the cloud.As the functionality of both servers same.Therefore,It depends upon the user if he wants to choose two separate servers is feasible.The decision is depending upon the keeping because of systems cost.In addition,the application layer handles the database management and storage.Moreover,several essential activities for instance;data storage and analysis were performed by the objects that were stored.Finally,our proposed system first stores secondly analyze,and third presents the results to users.

    4 Results Analysis and Discussion

    Herein,we discuss the details of the experimental results.For the readers,we have divided it into two parts.In the first part,we discuss the basic network indicators and then we discuss the dataset and the achieved experimental results based on the proposed network indicators.

    4.1 Network Indicators

    These metrics capture the connectivity and the centrality of objects in the network and are known as network indicators [33].The basic network properties are clustering coefficient,degree of connectivity,network diameter and path length,etc.The explanation details were given below.

    4.1.1 Network Degree

    A network is a collection of nodes and edges altogether.The network degree distribution P(k)of a network is then defined to be the fraction of nodes in the network with degreekor simply network degree the probability distribution of the node degree[34].It is one of the most important properties of scale-free networks[35].The degrees were calculated in Eq.(1).

    wherenis the total number of nodes in a network andnkof them have degreek.In addition,this is a very important property and it affects the overall network navigability.The nodes that have higher degrees are helpful in terms of achieving higher network navigability.

    4.1.2 Average Degree

    The average number of edges per node in a graph is known as the average degree.It is increased by increasing the number of edges in the network.

    4.1.3 Clustering Coefficient

    This measure is introduced by Watts et al.in[36].It is a measure of the closeness of nodes to form a clique[7].Its range is from(0,1).It is measured based on the below equation:

    wherenis the number of objects andCiis the local clustering.

    4.1.4 Degree of Connectivity(Giant Component)

    A portion or group of nodes is directly or indirectly connected and the nodes in a graph.It is increased by increasing the number of links in the network.In many cases,it is observed as high and known as a higher giant component.If the network is fully connected it means that it has a 100%giant component and all objects were reachable to all others in the network using neighbors or friends.

    4.1.5 Path Length

    The path length in a graph is the average number of edges that must be traversed to go from one vertex to another.To assess the size of the network,the average path length is suggested.It is simply the average distance between two vertices and averaged over possible pairs of vertices.It is measured by adding all the minimum distances betweeniandjvertices.The average path length is determined as

    whereNdenotes the total number of vertices in the network,the distance is denoted by nodeIandjbyLijandNchoose 2 denotes all possible numbers of pair vertices.For an efficient algorithm,the path length should be short/low.

    4.2 Dataset Description and Preparation

    In this research,we take a real large-size IoT-generated dataset.The datasets include 1)the Real IoT dataset[37]including all the details of the points of various places in a smart city.In this dataset,a variety of real IoT objects were collected.2)Social network datasets,such as Facebook[38],Brightkite[38],and Slashdot[39].The Facebook and Brightkite dataset was developed by the SNAP library at Stanford University.

    4.3 Potential Service Search and Object Discovery

    Fig.4 illustrates the reference model for potential service discovery in a social network and is derived from Fig.3.In this figure,Nrnamed service seeker is looking for a specific service and provider namedNb.The dotted line designates an initiating request betweenNr Nb.To accept this request,NbimplementsAlgorithm1.Initially,the computation of degrees has been performed.We suggested the maximum number of links or friends byr=5.Upon request initiation in Step 1,the degree of each object is computed until each object reaches a certainr.This is to attain clustering.In case of a large number of friends and exceeds certainr.It simply refuses the incoming request.A minimum of mutual friends were selected using Eq.(5).

    Figure 4:Social network reference model

    In this example;we examine thatNchas minimum mutual friends or zero degrees hence this step results in the elimination ofNcfrom the list and the creation of a new link withNr.IfNchas zero degrees,in that case,Ncwill be recommended to one of the friends or friendsNb.In this example,a friendship circle has been established betweenNrandNb.In Step 2;Nbdecides the oldest friend has minimum degrees.In this case,the candidates areNa,andNq.We examine thatNphas no friends.Hence,it results in the removal of the link betweenNpandNb.In Step 3,the search for the eldest friend in neighbors ofNbhas been performed.In this step,if the search in the 1sthop is failed it is shifted to the 2ndand 3rdhop.A new link is established betweenNpandNr.In Step 4,Nbneighbors were selected based on the frequency of communication and trustworthiness priorities[40].

    4.4 Experimental Results

    We have divided this section into two subsections.We first,explain the graph visualization and in the second subsection,we explain the results based on the service processing time,giant component,network diameter,and path length.The overall framework is implemented using Network X to generate and process the graphs(which abstracts the relation among the data)in near real-time[32].Network X [32] is a package for the Python programming language and is used to create and study the structure,manipulation,dynamics,and functions.The network information is received based on the objects profile and movement.it is noteable that until now the SIoT is not completely deployed.Therfore,the most experimention is performed by using IoT simulation tools.For instance,in this research,we have used‘Network X’.The experiments parameters were listed in Table 1.In this table,one could examine that the nodes and edges were given for the Facebook,Brig kite for proposed model and the BA model.

    Table 1:Parameters for experiments

    4.4.1 Graph Visualization

    Fig.5 illustrates the graph visualization of our proposed system using small nodes and edges.Initially,we deploy our few objects and later we increased them.It is noted that If the number of objects were large it is difficult to visualize.Therefore,for better visualization,we prefer to deploy a few nods or objects in the network for the easiness of readers.

    Figure 5:Graph visualization

    4.4.2 Giant Component Experiment

    Fig.6 shows the giant component experiment.The Giant component presents a large fraction of objects in the network.It is a measure that represents whether a graph is fully or completely connected or not.In this experiment,we check whether proposed the graph of our proposed system is completely connected or not.Generally,the access of the objects to others using short paths.It means the giant component completely depends upon the number of objects.If we have many objects it means that we have a larger giant component.If a graph shows 100%,It means that the proposed model is efficient and most of the objects can be accessed by using small paths.In this experiment,we presented the probability of connected objects as a percentage.From Fig.6,one could observe that we were achieving the 100%giant component.We examine that the giant component is increased slightly by increasing the number of connections.In this figure,the graph initially starts from 0 and slightly increased with many connections and finally reaches 100%.As mentioned earlier that if the giant component is 100%it means that the proposed system is highly efficient and objects were fully connected.Hence the objects can easily access others by using these short paths.In this step,we achieved efficient results.Therefore,we proceed to other experiments to measure the efficiency of our proposed system.

    Figure 6:Giant component experiment

    4.4.3 Degree Distribution Experiment

    The objective of this experiment is to verify whether the proposed system follows power law or not.For readers of this study,the algorithm is considered highly efficient if the system follows a power law.We have used three datasets,for instance,Facebook,SIoT,and Bright kite.Fig.7 illustrates the degree distribution using Facebook and Bright kite datasets.In the Facebook and bright kite datasets,the vertical red line indicates the occurrence of power law[41].On the other hand,the blue line indicates the deployment of objects using our system.In this figure,one could easily examine that the blue line is very close to the red line and hence it makes a 90-degree angle.The algorithm is considered as efficient if the system flows power law.In this figure,we can see that our proposed system behaves the same as a power law.We have repeated the same experiment for the Bright Kite dataset and can see the same behavior as shown in Fig.7(Right side).In this figure,we examine that the objects were very high and the distribution has many curves.As compared to the previous ones,the blue line is very close to the red line and also makes a 90-degree angle.These results again prove that our proposed system completely follows a power law,no matter which dataset we were using.We have again changed the dataset and repeated the same experiment for SIoT dataset shown in Fig.8.In this figure,we surprisingly see that it behaves similarly to the previous datasets.Hence,by examining these results we proved that our proposed system is highly efficient and completely follows power law no matter which dataset was used in the experiment.

    Figure 7:Degree distribution using different datasets

    4.4.4 Network Diameter

    In Fig.9,we have experimented with the network diameter.If we look carefully at this figure,we could examine that except for the beginning period,the diameter of the proposed system is lower.The network diameter decreases significantly.In the connected graph,all objects are connected directly or indirectly.By using analysis we derived a conclusion that by reducing the network diameter,the network users contact more tightly.Hence,the service search process becomes efficient especially when it is initiated between the friends in the network.We derived a conclusion from this experiment that our proposed system is highly efficient.

    Figure 8:SIoT datasets

    Figure 9:Network diameter

    4.4.5 Path Length Experiment

    Fig.10 illustrates the average path length experiment.In this figure,a reader can see that we have compared our proposed system(red color)with the BA(green color)and the Random Network model(blue color).The X-axis is the hop distance and the Y-axis is the computed averaged path length.If the objects are located around 3,9,and 12 meters away from the target objects it shows the shortest path length.The average path length of the proposed model is smaller than the current state-of-the-art random Network[42]and the Barabasi and Albert model[41].The reason is that our proposed system has local knowledge of the network and therefore,each object is capable of routing to select the best route to reach the target object.

    Figure 10:Average path length

    4.4.6 Service Processing Time

    Fig.11 presents the processing time of our proposed system.The X-axis presents the Dataset size and the Y-axis is the processing time.The efficiency is measured by using datasets (mentioned previously) and the processing time is measured in milliseconds.We can see in this figure that the increase in data size results in a decrease in the processing time.Initially,it starts slowly,and later it grows quickly.For the large dataset,the processing time is decussated.It means that our proposed system is highly efficient.We analyze the overall throughput to correspond to the data size.The throughput is directly proportional to data size it is due to the nature of our proposed system.Hence,it means that our proposed system is highly efficient.

    Figure 11:Service processing time

    In Table 1,we compare our proposed model and the state-of-the-art model.We examine that the Giant component of our proposed model archives 100%.The path length and the diameter also demonstrate efficacy as compared to the others and based on this compassion we could say that our proposed system is efficient as compared to the others.The clustering coefficient and the network diameter results are also satisfactory.Based on these results we could say that our proposed system is highly efficient as compared to the art of the state model.

    5 Conclusion

    We herein proposed a method for building a combined CPSS and SIoT-based model for efficient service search and object discovery.Our proposed system first converts the large-scale social network data into a graph and then applies the degree centrality,clustering,and scale-free emergence structure.These metrics are helpful to find the central or most influential objects in the network.In addition,the potential service search and the object discovery are performed using the right selection of friends in the network.The key objective of the right friend selection is to achieve higher network navigability.The efficiency of our proposed system is verified using real-world datasets based on service processing time,path length,giant component,and also network diameter.From experimental results,it is proved that the proposed system is highly efficient,robust,and scalable.In addition,we prove that the degree distribution follows the power law,the average distance and network diameter shrink and also the network density is greater and has a large giant component in our proposed system.But some issues such as the number of friends and trust are not discussed therefore,they will be addressed in future studies.

    Acknowledgement:We thank our families and colleagues who provided us with moral support.

    Funding Statement:This work was supported in part by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1006159)and(NRF-2021R1A6A1A03039493).

    Author Contributions:The authors’contributions to this work are as follows: conceptualization,F.Amin;methodology,F.Amin;software,F.Amin;validation,G.S.Choi;draft preparation,F.Amin and G.S.Choi;review and editing,G.S.Choi;visualization,F.Amin;supervision,G.S.Choi;funding acquisition,G.S.Choi.All authors have read and agreed to the published version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the paper.

    Conflicts of Interest:The authors declare that they have no conflicts of interest regarding the present study.

    午夜精品久久久久久毛片777| 91麻豆精品激情在线观看国产| 成人鲁丝片一二三区免费| 国产伦精品一区二区三区视频9 | 国产69精品久久久久777片| 床上黄色一级片| www日本在线高清视频| 午夜久久久久精精品| 久久久久九九精品影院| 亚洲av电影在线进入| 国产精品久久久久久亚洲av鲁大| 丁香六月欧美| 狂野欧美激情性xxxx| 叶爱在线成人免费视频播放| 丰满的人妻完整版| 波多野结衣高清无吗| 国产视频一区二区在线看| 内地一区二区视频在线| 18禁在线播放成人免费| 热99在线观看视频| 免费在线观看影片大全网站| 在线观看舔阴道视频| 99久久综合精品五月天人人| 精品欧美国产一区二区三| 我要搜黄色片| 国产精品一及| 女人高潮潮喷娇喘18禁视频| 18+在线观看网站| 久久久久精品国产欧美久久久| 十八禁人妻一区二区| 乱人视频在线观看| 一二三四社区在线视频社区8| 久久精品国产亚洲av香蕉五月| 欧美一区二区精品小视频在线| 亚洲人成网站高清观看| 桃色一区二区三区在线观看| 在线观看午夜福利视频| 变态另类丝袜制服| 最新中文字幕久久久久| 日本免费一区二区三区高清不卡| 婷婷精品国产亚洲av| 欧美+日韩+精品| 国产精品 欧美亚洲| 国产精品美女特级片免费视频播放器| 欧美性猛交黑人性爽| 国产精品一及| 国产男靠女视频免费网站| 全区人妻精品视频| 日韩欧美在线乱码| 日日摸夜夜添夜夜添小说| 国产色婷婷99| 国产v大片淫在线免费观看| 久99久视频精品免费| 欧美在线一区亚洲| 嫩草影院精品99| 一二三四社区在线视频社区8| 在线观看一区二区三区| 此物有八面人人有两片| 中文字幕av成人在线电影| 在线观看免费视频日本深夜| 伊人久久精品亚洲午夜| 国产成人av激情在线播放| 蜜桃亚洲精品一区二区三区| 最新在线观看一区二区三区| 最近在线观看免费完整版| 一区二区三区免费毛片| 乱人视频在线观看| 国产精品三级大全| 亚洲精品色激情综合| 国产伦精品一区二区三区视频9 | 99久久久亚洲精品蜜臀av| 看黄色毛片网站| 中文字幕人妻熟人妻熟丝袜美 | 国产亚洲精品av在线| 蜜桃久久精品国产亚洲av| 老司机午夜十八禁免费视频| 国产精品美女特级片免费视频播放器| 日韩欧美精品免费久久 | 精品一区二区三区av网在线观看| 看黄色毛片网站| 欧美最新免费一区二区三区 | 熟女电影av网| 精华霜和精华液先用哪个| 十八禁网站免费在线| 亚洲在线自拍视频| 丰满人妻熟妇乱又伦精品不卡| 午夜日韩欧美国产| 网址你懂的国产日韩在线| 亚洲精品在线美女| 亚洲专区中文字幕在线| 男女午夜视频在线观看| 深夜精品福利| 90打野战视频偷拍视频| 在线观看午夜福利视频| 亚洲成人久久爱视频| 一级黄片播放器| e午夜精品久久久久久久| 国内精品久久久久久久电影| 亚洲av免费高清在线观看| 欧美性感艳星| 一个人免费在线观看的高清视频| 欧美性感艳星| 在线观看午夜福利视频| 欧美成狂野欧美在线观看| 亚洲精品影视一区二区三区av| 亚洲内射少妇av| 变态另类丝袜制服| 亚洲熟妇熟女久久| 女生性感内裤真人,穿戴方法视频| 一二三四社区在线视频社区8| 国产av不卡久久| 亚洲国产欧美人成| 女生性感内裤真人,穿戴方法视频| 黄色女人牲交| av天堂在线播放| 老熟妇仑乱视频hdxx| 久久精品91蜜桃| 亚洲成人免费电影在线观看| 伊人久久精品亚洲午夜| 少妇熟女aⅴ在线视频| 国产色爽女视频免费观看| 中文字幕人妻熟人妻熟丝袜美 | 色av中文字幕| 丰满人妻熟妇乱又伦精品不卡| 黄色丝袜av网址大全| 欧美国产日韩亚洲一区| www.熟女人妻精品国产| 国产淫片久久久久久久久 | 日韩欧美精品v在线| 国产精品久久久久久亚洲av鲁大| 国产精品亚洲一级av第二区| 日韩精品中文字幕看吧| 国产亚洲精品av在线| 波多野结衣巨乳人妻| 看免费av毛片| 国产精品一区二区免费欧美| 天堂影院成人在线观看| 国产成人啪精品午夜网站| 亚洲avbb在线观看| 人妻久久中文字幕网| 日本黄色片子视频| 成人无遮挡网站| 欧美黑人欧美精品刺激| 国产91精品成人一区二区三区| 国产精品爽爽va在线观看网站| 69人妻影院| 偷拍熟女少妇极品色| 天堂√8在线中文| 3wmmmm亚洲av在线观看| 最新中文字幕久久久久| 亚洲,欧美精品.| 国内毛片毛片毛片毛片毛片| 色精品久久人妻99蜜桃| 久久久久国内视频| 久久久久国内视频| 欧美色欧美亚洲另类二区| 日本三级黄在线观看| 小蜜桃在线观看免费完整版高清| 天堂av国产一区二区熟女人妻| 欧美黄色淫秽网站| 久久天躁狠狠躁夜夜2o2o| 男女之事视频高清在线观看| 欧美成狂野欧美在线观看| 少妇的丰满在线观看| 国产在线精品亚洲第一网站| 日日夜夜操网爽| 欧洲精品卡2卡3卡4卡5卡区| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 天堂√8在线中文| 亚洲熟妇熟女久久| 亚洲国产欧美人成| 欧美成人a在线观看| 亚洲av五月六月丁香网| 老熟妇仑乱视频hdxx| 国内揄拍国产精品人妻在线| 看免费av毛片| 色综合欧美亚洲国产小说| 国内久久婷婷六月综合欲色啪| 中文在线观看免费www的网站| 中文资源天堂在线| 亚洲va日本ⅴa欧美va伊人久久| 国产 一区 欧美 日韩| 天堂网av新在线| 国产亚洲精品综合一区在线观看| 内射极品少妇av片p| 国产毛片a区久久久久| 国产精品亚洲一级av第二区| av福利片在线观看| 亚洲一区二区三区色噜噜| 亚洲成人中文字幕在线播放| 亚洲成人中文字幕在线播放| 成人国产一区最新在线观看| 精品人妻1区二区| 无遮挡黄片免费观看| 男人舔女人下体高潮全视频| 欧美午夜高清在线| 国产国拍精品亚洲av在线观看 | www.色视频.com| 欧美黑人欧美精品刺激| 亚洲成人中文字幕在线播放| 好男人在线观看高清免费视频| 91麻豆av在线| 国产成+人综合+亚洲专区| 人人妻人人澡欧美一区二区| 国产精品久久久久久精品电影| 久久久久久久午夜电影| 免费观看人在逋| 久久久久久大精品| 午夜福利免费观看在线| 叶爱在线成人免费视频播放| 最近最新免费中文字幕在线| 最新在线观看一区二区三区| 啦啦啦韩国在线观看视频| 18+在线观看网站| 一本综合久久免费| av福利片在线观看| 国产乱人视频| 免费高清视频大片| 九色成人免费人妻av| 成人午夜高清在线视频| 亚洲人成伊人成综合网2020| 午夜精品一区二区三区免费看| 午夜日韩欧美国产| 在线观看66精品国产| 99国产极品粉嫩在线观看| 天堂动漫精品| 亚洲av一区综合| 亚洲国产色片| 久久草成人影院| 韩国av一区二区三区四区| 1000部很黄的大片| 免费av毛片视频| 麻豆国产97在线/欧美| 国产午夜精品久久久久久一区二区三区 | 亚洲成人久久性| 伊人久久大香线蕉亚洲五| 无遮挡黄片免费观看| 岛国视频午夜一区免费看| 在线观看美女被高潮喷水网站 | 久久精品夜夜夜夜夜久久蜜豆| 变态另类丝袜制服| 国内毛片毛片毛片毛片毛片| 亚洲精华国产精华精| 成人鲁丝片一二三区免费| 人妻久久中文字幕网| 国产高清videossex| 国产激情偷乱视频一区二区| 国产探花极品一区二区| 亚洲电影在线观看av| 婷婷精品国产亚洲av在线| 欧美bdsm另类| 日本精品一区二区三区蜜桃| 国产精品自产拍在线观看55亚洲| 丝袜美腿在线中文| avwww免费| 中文字幕人妻丝袜一区二区| 欧美性感艳星| 久久性视频一级片| 免费看日本二区| 国产成人a区在线观看| 国产精品99久久久久久久久| 中文亚洲av片在线观看爽| 人人妻人人澡欧美一区二区| 国产精品,欧美在线| 综合色av麻豆| 午夜老司机福利剧场| 91在线精品国自产拍蜜月 | av黄色大香蕉| 两人在一起打扑克的视频| 男女那种视频在线观看| 婷婷精品国产亚洲av| 美女大奶头视频| 免费看美女性在线毛片视频| 国产亚洲精品久久久com| 国产精品亚洲av一区麻豆| 99久久成人亚洲精品观看| 在线播放无遮挡| 日韩欧美国产一区二区入口| 欧美日韩中文字幕国产精品一区二区三区| 日韩亚洲欧美综合| 日本在线视频免费播放| 成人精品一区二区免费| 国产精品综合久久久久久久免费| 亚洲精品粉嫩美女一区| 真人一进一出gif抽搐免费| 亚洲av成人精品一区久久| 在线十欧美十亚洲十日本专区| 波野结衣二区三区在线 | 精品人妻偷拍中文字幕| 久久99热这里只有精品18| 嫩草影院入口| 精品久久久久久久久久久久久| 国产亚洲精品久久久久久毛片| 免费电影在线观看免费观看| 久久久久久久午夜电影| www.www免费av| 特大巨黑吊av在线直播| 国产亚洲精品综合一区在线观看| 日韩精品青青久久久久久| 免费电影在线观看免费观看| 午夜福利在线观看吧| 黄色丝袜av网址大全| 国产亚洲精品久久久久久毛片| 国产91精品成人一区二区三区| 亚洲av熟女| 欧美色欧美亚洲另类二区| 久久精品国产综合久久久| 女人高潮潮喷娇喘18禁视频| 国产欧美日韩精品亚洲av| 国产精品 国内视频| 熟女少妇亚洲综合色aaa.| 国产免费男女视频| 久久婷婷人人爽人人干人人爱| 两个人视频免费观看高清| 亚洲第一欧美日韩一区二区三区| 免费看光身美女| 国产av在哪里看| www.999成人在线观看| 欧美性猛交黑人性爽| 可以在线观看的亚洲视频| 脱女人内裤的视频| 我的老师免费观看完整版| 久久精品综合一区二区三区| 欧美色视频一区免费| 特大巨黑吊av在线直播| 丁香六月欧美| 一区二区三区高清视频在线| 五月玫瑰六月丁香| 俺也久久电影网| 天堂影院成人在线观看| 欧美最新免费一区二区三区 | 亚洲男人的天堂狠狠| 国产亚洲精品av在线| 91av网一区二区| 久久天躁狠狠躁夜夜2o2o| 国产v大片淫在线免费观看| 久久久久久久久中文| 日韩欧美 国产精品| 欧美黄色片欧美黄色片| 欧美成人一区二区免费高清观看| www国产在线视频色| 亚洲国产日韩欧美精品在线观看 | 嫁个100分男人电影在线观看| 亚洲国产精品久久男人天堂| 欧美不卡视频在线免费观看| 国产精品影院久久| 19禁男女啪啪无遮挡网站| 久久久国产成人免费| 免费av观看视频| avwww免费| 日韩av在线大香蕉| 99热6这里只有精品| 淫妇啪啪啪对白视频| 国产精品一区二区三区四区免费观看 | 黑人欧美特级aaaaaa片| 亚洲人成网站在线播放欧美日韩| 婷婷六月久久综合丁香| 一个人观看的视频www高清免费观看| 亚洲av成人精品一区久久| 又粗又爽又猛毛片免费看| 18禁美女被吸乳视频| 欧美国产日韩亚洲一区| h日本视频在线播放| 欧美av亚洲av综合av国产av| 亚洲精品国产精品久久久不卡| 久久九九热精品免费| 一级毛片女人18水好多| 神马国产精品三级电影在线观看| 狠狠狠狠99中文字幕| 尤物成人国产欧美一区二区三区| 精品一区二区三区视频在线观看免费| 中文字幕人成人乱码亚洲影| e午夜精品久久久久久久| 国内精品一区二区在线观看| 亚洲美女视频黄频| www.www免费av| 九色国产91popny在线| 日韩人妻高清精品专区| 99在线人妻在线中文字幕| 少妇人妻精品综合一区二区 | 女人高潮潮喷娇喘18禁视频| 国产精品久久久久久人妻精品电影| 真实男女啪啪啪动态图| 午夜福利在线观看免费完整高清在 | 一本久久中文字幕| 免费在线观看日本一区| 欧美三级亚洲精品| 午夜福利18| 日韩欧美三级三区| 女警被强在线播放| netflix在线观看网站| avwww免费| 别揉我奶头~嗯~啊~动态视频| xxx96com| 动漫黄色视频在线观看| 国产精品,欧美在线| 久久久色成人| 久久久久久久久中文| 欧美av亚洲av综合av国产av| 夜夜爽天天搞| 真实男女啪啪啪动态图| 国产高清视频在线播放一区| 99国产综合亚洲精品| 亚洲男人的天堂狠狠| 亚洲av二区三区四区| 一进一出好大好爽视频| 久9热在线精品视频| 老司机深夜福利视频在线观看| 一级a爱片免费观看的视频| 丝袜美腿在线中文| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国产精华一区二区三区| 久久久精品大字幕| 欧美+亚洲+日韩+国产| 制服丝袜大香蕉在线| 欧美中文综合在线视频| 国产免费一级a男人的天堂| 床上黄色一级片| 操出白浆在线播放| 特级一级黄色大片| 麻豆国产97在线/欧美| 熟女少妇亚洲综合色aaa.| 12—13女人毛片做爰片一| 丝袜美腿在线中文| 校园春色视频在线观看| 在线天堂最新版资源| www.999成人在线观看| 国产精品嫩草影院av在线观看 | 在线观看av片永久免费下载| 九九久久精品国产亚洲av麻豆| 免费在线观看亚洲国产| 午夜免费男女啪啪视频观看 | 国产午夜福利久久久久久| 乱人视频在线观看| 观看免费一级毛片| 97人妻精品一区二区三区麻豆| 久久九九热精品免费| 麻豆一二三区av精品| 日韩成人在线观看一区二区三区| 伊人久久大香线蕉亚洲五| 欧美午夜高清在线| 日本 欧美在线| 高清在线国产一区| 人人妻人人看人人澡| 看片在线看免费视频| 在线观看免费视频日本深夜| 久久久久久久久大av| 久久天躁狠狠躁夜夜2o2o| 成人亚洲精品av一区二区| 成年版毛片免费区| 国产高清视频在线观看网站| 操出白浆在线播放| 国产视频一区二区在线看| 美女黄网站色视频| 桃红色精品国产亚洲av| 欧美乱色亚洲激情| 一进一出好大好爽视频| 少妇的丰满在线观看| 又紧又爽又黄一区二区| 午夜免费观看网址| 免费观看的影片在线观看| 观看免费一级毛片| 亚洲 国产 在线| a级毛片a级免费在线| 熟女人妻精品中文字幕| 看免费av毛片| 国产高清激情床上av| 成人av在线播放网站| 少妇熟女aⅴ在线视频| 国产成年人精品一区二区| 欧美中文日本在线观看视频| 不卡一级毛片| 欧美zozozo另类| 真人做人爱边吃奶动态| 99久久精品热视频| 国产日本99.免费观看| 国产老妇女一区| 我要搜黄色片| 脱女人内裤的视频| 男女做爰动态图高潮gif福利片| 99热6这里只有精品| 国产精品亚洲一级av第二区| 亚洲av免费在线观看| 成人av在线播放网站| 韩国av一区二区三区四区| 丁香欧美五月| 久久九九热精品免费| 午夜免费男女啪啪视频观看 | 亚洲成人精品中文字幕电影| 免费观看人在逋| 亚洲成a人片在线一区二区| 亚洲av五月六月丁香网| 久久精品国产自在天天线| 在线观看日韩欧美| 亚洲精品在线美女| 欧美性感艳星| 国产aⅴ精品一区二区三区波| 2021天堂中文幕一二区在线观| 国产精品嫩草影院av在线观看 | 久久精品国产自在天天线| 真人一进一出gif抽搐免费| 小说图片视频综合网站| 制服丝袜大香蕉在线| 亚洲在线观看片| 啦啦啦免费观看视频1| 欧美日韩一级在线毛片| 国产伦一二天堂av在线观看| 国产高清激情床上av| 国产成人aa在线观看| 国产老妇女一区| 性色avwww在线观看| 国产老妇女一区| 午夜福利在线观看吧| 日韩欧美在线乱码| 美女免费视频网站| 国产精品久久视频播放| 男女那种视频在线观看| 又紧又爽又黄一区二区| 十八禁网站免费在线| 别揉我奶头~嗯~啊~动态视频| 免费一级毛片在线播放高清视频| 国产三级中文精品| 国产精品自产拍在线观看55亚洲| 女人被狂操c到高潮| 老熟妇乱子伦视频在线观看| 丰满乱子伦码专区| 精品人妻一区二区三区麻豆 | 久久香蕉国产精品| 两人在一起打扑克的视频| 国语自产精品视频在线第100页| 国产成年人精品一区二区| e午夜精品久久久久久久| 激情在线观看视频在线高清| 亚洲av成人不卡在线观看播放网| 亚洲性夜色夜夜综合| 在线免费观看不下载黄p国产 | 亚洲自拍偷在线| 99riav亚洲国产免费| 久久精品国产综合久久久| 亚洲内射少妇av| 最新美女视频免费是黄的| 久久亚洲精品不卡| 欧美3d第一页| 成年版毛片免费区| 国产一区二区三区在线臀色熟女| 亚洲av成人精品一区久久| 色噜噜av男人的天堂激情| 成人鲁丝片一二三区免费| 国产乱人视频| tocl精华| 全区人妻精品视频| 女人十人毛片免费观看3o分钟| 国产亚洲精品av在线| 国产黄a三级三级三级人| 亚洲在线自拍视频| 香蕉av资源在线| svipshipincom国产片| 18禁黄网站禁片免费观看直播| 99热6这里只有精品| 精品人妻偷拍中文字幕| 男人和女人高潮做爰伦理| 在线观看免费视频日本深夜| 国产精品 国内视频| 亚洲最大成人中文| 亚洲av第一区精品v没综合| 国产亚洲精品av在线| 淫秽高清视频在线观看| 真人做人爱边吃奶动态| 国产精品三级大全| 中文字幕久久专区| 岛国视频午夜一区免费看| 久久人妻av系列| 国产私拍福利视频在线观看| 欧美中文综合在线视频| 国内揄拍国产精品人妻在线| 欧美日韩亚洲国产一区二区在线观看| 亚洲美女黄片视频| e午夜精品久久久久久久| 91字幕亚洲| 亚洲人成伊人成综合网2020| 成人三级黄色视频| 狂野欧美白嫩少妇大欣赏| 亚洲精品亚洲一区二区| 午夜激情欧美在线| 亚洲精品日韩av片在线观看 | 特级一级黄色大片| 制服丝袜大香蕉在线| 熟妇人妻久久中文字幕3abv| 日本免费a在线| 久久精品国产亚洲av涩爱 | 午夜影院日韩av| 99久国产av精品| avwww免费| xxx96com| 久久久久久久午夜电影| 一本综合久久免费| 久久久色成人| 婷婷六月久久综合丁香| 亚洲成av人片在线播放无| 男人和女人高潮做爰伦理| 国产高清激情床上av| 国产伦在线观看视频一区| 99精品久久久久人妻精品| 香蕉av资源在线| 亚洲最大成人中文| 国产中年淑女户外野战色| 日本精品一区二区三区蜜桃| 老司机在亚洲福利影院| 免费在线观看亚洲国产| 一二三四社区在线视频社区8| 欧美不卡视频在线免费观看| 亚洲人成伊人成综合网2020| www.999成人在线观看| 成年版毛片免费区| 欧美黄色淫秽网站|